Name "SMASHData::severity" used only once: possible typo at bin/generate-cvrf-cve.pl line 732.
Name "CanDBReader::bugzillas" used only once: possible typo at bin/generate-cvrf-cve.pl line 78.
Name "CanDBReader::note" used only once: possible typo at bin/generate-cvrf-cve.pl line 65.
Name "PInt::cve2images" used only once: possible typo at bin/generate-cvrf-cve.pl line 381.
Name "PInt::image2cves" used only once: possible typo at bin/generate-cvrf-cve.pl line 380.
cpe:2.3:a:libexpat_project:libexpat:*:*:*:*:*:*:*:*
cpe:2.3:a:libexpat_project:libexpat:2:*:*:*:*:*:*:*
cpe:2.3:a:libexpat_project:libexpat:2:*:*:*:*:*:*:*
Update is not defined in translation list.
Use of uninitialized value within %name2product in concatenation (.) or string at /home/securitybot/prod/cve-database/bin/UpdateInfoReader.pm line 1598.
SUSE:Channels/SUSE-ALP-Source-Standard_1.0 skipped
no pkglist for SUSE Liberty Linux 8, ESEA-2020:0159
no pkglist for SUSE Liberty Linux 8, ESBA-2020:0166
no pkglist for SUSE Liberty Linux 9, RHBA-2024:3832
no pkglist for SUSE Liberty Linux 9, RHSA-2024:3837
no pkglist for SUSE Liberty Linux 8, ESEA-2020:0158
no pkglist for SUSE Liberty Linux 8, ESEA-2021:0189
no pkglist for SUSE Liberty Linux 8, ESEA-2021:0190
no pkglist for SUSE Liberty Linux 8, ESSA-2020:0164
no pkglist for SUSE Liberty Linux 8, RHBA-2022:5328
SUSE:SLE-15:Update:PubClouds:Released SLES15-SAP-Azure-LI-BYOS images x86_64 has empty xml
SUSE:SLE-15:Update:PubClouds:Released SLES15-SAP-Azure-VLI-BYOS images x86_64 has empty xml
SUSE:SLE-15-SP1:Update:PubClouds:Released SLES15-SP1-CAP-Deployment-BYOS images x86_64 has empty xml
SUSE:SLE-15-SP1:Update:PubClouds:Released SLES15-SP1-CAP-Deployment-BYOS:Azure images x86_64 has empty xml
SUSE:SLE-15-SP1:Update:PubClouds:Released SLES15-SP1-CHOST-BYOS images x86_64 has empty xml
SUSE:SLE-15-SP1:Update:PubClouds:Released SLES15-SP1-Manager-4-0-Azure-BYOS images x86_64 has empty xml
SUSE:SLE-15-SP1:Update:PubClouds:Released SLES15-SP1-Manager-4-0-EC2-HVM-BYOS images x86_64 has empty xml
SUSE:SLE-15-SP1:Update:PubClouds:Released SLES15-SP1-Manager-4-0-GCE-BYOS images x86_64 has empty xml
SUSE:SLE-15-SP1:Update:PubClouds:Released SLES15-SP1-SAP-Azure-LI-BYOS images x86_64 has empty xml
SUSE:SLE-15-SP1:Update:PubClouds:Released SLES15-SP1-SAP-Azure-VLI-BYOS images x86_64 has empty xml
SUSE:SLE-15-SP1:Update:PubClouds:Released SLES15-SP1-SAPCAL images x86_64 has empty xml
SUSE:SLE-15-SP2:Update:PubClouds:Released SLES15-SP2 images x86_64 has empty xml
SUSE:SLE-15-SP2:Update:PubClouds:Released SLES15-SP2-BYOS images x86_64 has empty xml
SUSE:SLE-15-SP2:Update:PubClouds:Released SLES15-SP2-CAP-Deployment-BYOS images x86_64 has empty xml
SUSE:SLE-15-SP2:Update:PubClouds:Released SLES15-SP2-CAP-Deployment-BYOS:EC2-HVM images x86_64 has empty xml
SUSE:SLE-15-SP2:Update:PubClouds:Released SLES15-SP2-CAP-Deployment-BYOS:GCE images x86_64 has empty xml
SUSE:SLE-15-SP2:Update:PubClouds:Released SLES15-SP2-CHOST-BYOS images x86_64 has empty xml
no files in SLES15-SP2-HPC
no files in SLES15-SP2-HPC-BYOS
SUSE:SLE-15-SP2:Update:PubClouds:Released SLES15-SP2-HPC:EC2-HVM images x86_64 has empty xml
SUSE:SLE-15-SP2:Update:PubClouds:Released SLES15-SP2-Manager-4-1-Proxy-BYOS images x86_64 has empty xml
SUSE:SLE-15-SP2:Update:PubClouds:Released SLES15-SP2-Manager-4-1-Server-BYOS images x86_64 has empty xml
SUSE:SLE-15-SP2:Update:PubClouds:Released SLES15-SP2-SAP images x86_64 has empty xml
SUSE:SLE-15-SP2:Update:PubClouds:Released SLES15-SP2-SAP-Azure-LI-BYOS images x86_64 has empty xml
SUSE:SLE-15-SP2:Update:PubClouds:Released SLES15-SP2-SAP-Azure-VLI-BYOS images x86_64 has empty xml
SUSE:SLE-15-SP2:Update:PubClouds:Released SLES15-SP2-SAP-BYOS images x86_64 has empty xml
no files in SLES15-SP3
no files in SLES15-SP3-BYOS
no files in SLES15-SP3-CHOST-BYOS
no files in SLES15-SP3-HPC
no files in SLES15-SP3-HPC-BYOS
no files in SLES15-SP3-HPC:EC2-HVM
no files in SLES15-SP3-Manager-4-2-Proxy-BYOS
no files in SLES15-SP3-Manager-4-2-Server-BYOS
no files in SLES15-SP3-Micro-5-1-BYOS
no files in SLES15-SP3-Micro-5-2-BYOS
no files in SLES15-SP3-Micro-BYOS
no files in SLES15-SP3-Micro-BYOS:Azure
no files in SLES15-SP3-Micro-BYOS:EC2-HVM
no files in SLES15-SP3-SAP
no files in SLES15-SP3-SAP-Azure-LI-BYOS
no files in SLES15-SP3-SAP-Azure-VLI-BYOS
no files in SLES15-SP3-SAP-BYOS
no files in SLES15-SP3-SAPCAL
no files in SLES15-SP5
no files in SLES15-SP5-BYOS
no files in SLES15-SP5-CHOST-BYOS
no files in SLES15-SP5-HPC
no files in SLES15-SP5-HPC-BYOS
no files in SLES15-SP5-Hardened-BYOS
no files in SLES15-SP5-SAP
no files in SLES15-SP5-SAP-BYOS
no files in SLES15-SP5-SAP-Hardened
no files in SLES15-SP5-SAP-Hardened-BYOS
no files in SLES15-SP5-SAPCAL
no files in SLES12-SP4-SAP-Azure-LI-BYOS
no files in SLES12-SP4-SAP-Azure-VLI-BYOS
no files in SLES12-SP5-Azure
no files in SLES12-SP5-EC2
no files in SLES12-SP5-GCE
SUSE:SLE-12-SP5:Update:PubClouds:Released SLES12-SP5-OCI-BYOS images x86_64 has empty xml
SUSE:SLE-12-SP5:Update:PubClouds:Released SLES12-SP5-SAP-Azure-LI-BYOS images x86_64 has empty xml
SUSE:SLE-12-SP5:Update:PubClouds:Released SLES12-SP5-SAP-Azure-VLI-BYOS images x86_64 has empty xml
./smash/pintdata/publiccloudimagechangeinfo.suse.com/alibaba/sles-15-sp5-chost-byos-v20230620/package_changelogs.html:No such file or directory
./smash/pintdata/publiccloudimagechangeinfo.suse.com/alibaba/sles-15-sp5-chost-byos-v20230620/package_version_changes.html:No such file or directory
./smash/pintdata/publiccloudimagechangeinfo.suse.com/amazon/openSUSE-Leap-15-5-v20240311-hvm-ssd-arm64/package_changelogs.html:No such file or directory
./smash/pintdata/publiccloudimagechangeinfo.suse.com/amazon/openSUSE-Leap-15-5-v20240311-hvm-ssd-arm64/package_version_changes.html:No such file or directory
./smash/pintdata/publiccloudimagechangeinfo.suse.com/amazon/openSUSE-Leap-15-5-v20240311-hvm-ssd-x86_64/package_changelogs.html:No such file or directory
./smash/pintdata/publiccloudimagechangeinfo.suse.com/amazon/openSUSE-Leap-15-5-v20240311-hvm-ssd-x86_64/package_version_changes.html:No such file or directory
./smash/pintdata/publiccloudimagechangeinfo.suse.com/amazon/openSUSE-Leap-15-5-v20240612-hvm-ssd-arm64/package_changelogs.html:No such file or directory
./smash/pintdata/publiccloudimagechangeinfo.suse.com/amazon/openSUSE-Leap-15-5-v20240612-hvm-ssd-arm64/package_version_changes.html:No such file or directory
./smash/pintdata/publiccloudimagechangeinfo.suse.com/amazon/openSUSE-Leap-15-5-v20240612-hvm-ssd-x86_64/package_changelogs.html:No such file or directory
./smash/pintdata/publiccloudimagechangeinfo.suse.com/amazon/openSUSE-Leap-15-5-v20240612-hvm-ssd-x86_64/package_version_changes.html:No such file or directory
./smash/pintdata/publiccloudimagechangeinfo.suse.com/amazon/openSUSE-Leap-15-6-v20240613-hvm-ssd-arm64/package_changelogs.html:No such file or directory
./smash/pintdata/publiccloudimagechangeinfo.suse.com/amazon/openSUSE-Leap-15-6-v20240613-hvm-ssd-arm64/package_version_changes.html:No such file or directory
./smash/pintdata/publiccloudimagechangeinfo.suse.com/amazon/openSUSE-Leap-15-6-v20240613-hvm-ssd-x86_64/package_changelogs.html:No such file or directory
./smash/pintdata/publiccloudimagechangeinfo.suse.com/amazon/openSUSE-Leap-15-6-v20240613-hvm-ssd-x86_64/package_version_changes.html:No such file or directory
./smash/pintdata/publiccloudimagechangeinfo.suse.com/amazon/openSUSE-Leap-15-6-v20240703-hvm-ssd-arm64/package_changelogs.html:No such file or directory
./smash/pintdata/publiccloudimagechangeinfo.suse.com/amazon/openSUSE-Leap-15-6-v20240703-hvm-ssd-arm64/package_version_changes.html:No such file or directory
./smash/pintdata/publiccloudimagechangeinfo.suse.com/amazon/openSUSE-Leap-15-6-v20240703-hvm-ssd-x86_64/package_changelogs.html:No such file or directory
./smash/pintdata/publiccloudimagechangeinfo.suse.com/amazon/openSUSE-Leap-15-6-v20240703-hvm-ssd-x86_64/package_version_changes.html:No such file or directory
./smash/pintdata/publiccloudimagechangeinfo.suse.com/amazon/openSUSE-Leap-15-6-v20240808-hvm-ssd-arm64/package_changelogs.html:No such file or directory
./smash/pintdata/publiccloudimagechangeinfo.suse.com/amazon/openSUSE-Leap-15-6-v20240808-hvm-ssd-arm64/package_version_changes.html:No such file or directory
./smash/pintdata/publiccloudimagechangeinfo.suse.com/amazon/openSUSE-Leap-15-6-v20240808-hvm-ssd-x86_64/package_changelogs.html:No such file or directory
./smash/pintdata/publiccloudimagechangeinfo.suse.com/amazon/openSUSE-Leap-15-6-v20240808-hvm-ssd-x86_64/package_version_changes.html:No such file or directory
./smash/pintdata/publiccloudimagechangeinfo.suse.com/amazon/suse-manager-proxy-5-0-byos-v20240923-hvm-ssd-arm64/package_changelogs.html:No such file or directory
./smash/pintdata/publiccloudimagechangeinfo.suse.com/amazon/suse-manager-proxy-5-0-byos-v20240923-hvm-ssd-arm64/package_version_changes.html:No such file or directory
./smash/pintdata/publiccloudimagechangeinfo.suse.com/amazon/suse-manager-proxy-5-0-byos-v20240923-hvm-ssd-x86_64/package_changelogs.html:No such file or directory
./smash/pintdata/publiccloudimagechangeinfo.suse.com/amazon/suse-manager-proxy-5-0-byos-v20240923-hvm-ssd-x86_64/package_version_changes.html:No such file or directory
./smash/pintdata/publiccloudimagechangeinfo.suse.com/amazon/suse-manager-server-4-3-v20231129-hvm-ssd-x86_64-llc/package_changelogs.html:No such file or directory
./smash/pintdata/publiccloudimagechangeinfo.suse.com/amazon/suse-manager-server-4-3-v20231129-hvm-ssd-x86_64-llc/package_version_changes.html:No such file or directory
./smash/pintdata/publiccloudimagechangeinfo.suse.com/amazon/suse-manager-server-4-3-v20231129-hvm-ssd-x86_64-ltd/package_changelogs.html:No such file or directory
./smash/pintdata/publiccloudimagechangeinfo.suse.com/amazon/suse-manager-server-4-3-v20231129-hvm-ssd-x86_64-ltd/package_version_changes.html:No such file or directory
./smash/pintdata/publiccloudimagechangeinfo.suse.com/amazon/suse-manager-server-5-0-byos-v20240923-hvm-ssd-arm64/package_changelogs.html:No such file or directory
./smash/pintdata/publiccloudimagechangeinfo.suse.com/amazon/suse-manager-server-5-0-byos-v20240923-hvm-ssd-arm64/package_version_changes.html:No such file or directory
./smash/pintdata/publiccloudimagechangeinfo.suse.com/amazon/suse-manager-server-5-0-byos-v20240923-hvm-ssd-x86_64/package_changelogs.html:No such file or directory
./smash/pintdata/publiccloudimagechangeinfo.suse.com/amazon/suse-manager-server-5-0-byos-v20240923-hvm-ssd-x86_64/package_version_changes.html:No such file or directory
./smash/pintdata/publiccloudimagechangeinfo.suse.com/amazon/suse-sle-hpc-15-sp5-byos-v20230620-hvm-ssd-x86_64/package_changelogs.html:No such file or directory
./smash/pintdata/publiccloudimagechangeinfo.suse.com/amazon/suse-sle-hpc-15-sp5-byos-v20230620-hvm-ssd-x86_64/package_version_changes.html:No such file or directory
./smash/pintdata/publiccloudimagechangeinfo.suse.com/amazon/suse-sle-hpc-15-sp6-byos-v20240703-hvm-ssd-x86_64/package_changelogs.html:No such file or directory
./smash/pintdata/publiccloudimagechangeinfo.suse.com/amazon/suse-sle-hpc-15-sp6-byos-v20240703-hvm-ssd-x86_64/package_version_changes.html:No such file or directory
./smash/pintdata/publiccloudimagechangeinfo.suse.com/amazon/suse-sle-micro-5-3-byos-v20240716-hvm-ssd-x86_64/package_changelogs.html:No such file or directory
./smash/pintdata/publiccloudimagechangeinfo.suse.com/amazon/suse-sle-micro-5-3-byos-v20240716-hvm-ssd-x86_64/package_version_changes.html:No such file or directory
./smash/pintdata/publiccloudimagechangeinfo.suse.com/amazon/suse-sle-micro-5-3-v20240716-hvm-ssd-arm64-llc/package_changelogs.html:No such file or directory
./smash/pintdata/publiccloudimagechangeinfo.suse.com/amazon/suse-sle-micro-5-3-v20240716-hvm-ssd-arm64-llc/package_version_changes.html:No such file or directory
./smash/pintdata/publiccloudimagechangeinfo.suse.com/amazon/suse-sle-micro-5-3-v20240716-hvm-ssd-x86_64-llc/package_changelogs.html:No such file or directory
./smash/pintdata/publiccloudimagechangeinfo.suse.com/amazon/suse-sle-micro-5-3-v20240716-hvm-ssd-x86_64-llc/package_version_changes.html:No such file or directory
./smash/pintdata/publiccloudimagechangeinfo.suse.com/amazon/suse-sle-micro-5-3-v20240716-hvm-ssd-x86_64-ltd/package_changelogs.html:No such file or directory
./smash/pintdata/publiccloudimagechangeinfo.suse.com/amazon/suse-sle-micro-5-3-v20240716-hvm-ssd-x86_64-ltd/package_version_changes.html:No such file or directory
./smash/pintdata/publiccloudimagechangeinfo.suse.com/amazon/suse-sle-micro-5-4-v20240716-hvm-ssd-arm64-llc/package_changelogs.html:No such file or directory
./smash/pintdata/publiccloudimagechangeinfo.suse.com/amazon/suse-sle-micro-5-4-v20240716-hvm-ssd-arm64-llc/package_version_changes.html:No such file or directory
./smash/pintdata/publiccloudimagechangeinfo.suse.com/amazon/suse-sle-micro-5-4-v20240716-hvm-ssd-x86_64-llc/package_changelogs.html:No such file or directory
./smash/pintdata/publiccloudimagechangeinfo.suse.com/amazon/suse-sle-micro-5-4-v20240716-hvm-ssd-x86_64-llc/package_version_changes.html:No such file or directory
./smash/pintdata/publiccloudimagechangeinfo.suse.com/amazon/suse-sle-micro-5-5-byos-v20231012-hvm-ssd-arm64/package_changelogs.html:No such file or directory
./smash/pintdata/publiccloudimagechangeinfo.suse.com/amazon/suse-sle-micro-5-5-byos-v20231012-hvm-ssd-arm64/package_version_changes.html:No such file or directory
./smash/pintdata/publiccloudimagechangeinfo.suse.com/amazon/suse-sle-micro-5-5-byos-v20231012-hvm-ssd-x86_64/package_changelogs.html:No such file or directory
./smash/pintdata/publiccloudimagechangeinfo.suse.com/amazon/suse-sle-micro-5-5-byos-v20231012-hvm-ssd-x86_64/package_version_changes.html:No such file or directory
./smash/pintdata/publiccloudimagechangeinfo.suse.com/amazon/suse-sle-micro-5-5-v20231012-hvm-ssd-arm64-llc/package_changelogs.html:No such file or directory
./smash/pintdata/publiccloudimagechangeinfo.suse.com/amazon/suse-sle-micro-5-5-v20231012-hvm-ssd-arm64-llc/package_version_changes.html:No such file or directory
./smash/pintdata/publiccloudimagechangeinfo.suse.com/amazon/suse-sle-micro-5-5-v20231012-hvm-ssd-arm64-ltd/package_changelogs.html:No such file or directory
./smash/pintdata/publiccloudimagechangeinfo.suse.com/amazon/suse-sle-micro-5-5-v20231012-hvm-ssd-arm64-ltd/package_version_changes.html:No such file or directory
./smash/pintdata/publiccloudimagechangeinfo.suse.com/amazon/suse-sle-micro-5-5-v20231012-hvm-ssd-x86_64-llc/package_changelogs.html:No such file or directory
./smash/pintdata/publiccloudimagechangeinfo.suse.com/amazon/suse-sle-micro-5-5-v20231012-hvm-ssd-x86_64-llc/package_version_changes.html:No such file or directory
./smash/pintdata/publiccloudimagechangeinfo.suse.com/amazon/suse-sle-micro-5-5-v20231012-hvm-ssd-x86_64-ltd/package_changelogs.html:No such file or directory
./smash/pintdata/publiccloudimagechangeinfo.suse.com/amazon/suse-sle-micro-5-5-v20231012-hvm-ssd-x86_64-ltd/package_version_changes.html:No such file or directory
./smash/pintdata/publiccloudimagechangeinfo.suse.com/amazon/suse-sle-micro-6-0-byos-v20240611-hvm-ssd-arm64/package_changelogs.html:No such file or directory
./smash/pintdata/publiccloudimagechangeinfo.suse.com/amazon/suse-sle-micro-6-0-byos-v20240611-hvm-ssd-arm64/package_version_changes.html:No such file or directory
./smash/pintdata/publiccloudimagechangeinfo.suse.com/amazon/suse-sle-micro-6-0-byos-v20240612-hvm-ssd-x86_64/package_changelogs.html:No such file or directory
./smash/pintdata/publiccloudimagechangeinfo.suse.com/amazon/suse-sle-micro-6-0-byos-v20240612-hvm-ssd-x86_64/package_version_changes.html:No such file or directory
./smash/pintdata/publiccloudimagechangeinfo.suse.com/amazon/suse-sle-micro-6-0-v20240612-hvm-ssd-arm64-llc/package_changelogs.html:No such file or directory
./smash/pintdata/publiccloudimagechangeinfo.suse.com/amazon/suse-sle-micro-6-0-v20240612-hvm-ssd-arm64-llc/package_version_changes.html:No such file or directory
./smash/pintdata/publiccloudimagechangeinfo.suse.com/amazon/suse-sles-15-sp5-byos-v20230620-hvm-ssd-arm64/package_changelogs.html:No such file or directory
./smash/pintdata/publiccloudimagechangeinfo.suse.com/amazon/suse-sles-15-sp5-byos-v20230620-hvm-ssd-arm64/package_version_changes.html:No such file or directory
./smash/pintdata/publiccloudimagechangeinfo.suse.com/amazon/suse-sles-15-sp5-byos-v20230620-hvm-ssd-x86_64/package_changelogs.html:No such file or directory
./smash/pintdata/publiccloudimagechangeinfo.suse.com/amazon/suse-sles-15-sp5-byos-v20230620-hvm-ssd-x86_64/package_version_changes.html:No such file or directory
./smash/pintdata/publiccloudimagechangeinfo.suse.com/amazon/suse-sles-15-sp5-chost-byos-v20230619-hvm-ssd-arm64/package_changelogs.html:No such file or directory
./smash/pintdata/publiccloudimagechangeinfo.suse.com/amazon/suse-sles-15-sp5-chost-byos-v20230619-hvm-ssd-arm64/package_version_changes.html:No such file or directory
./smash/pintdata/publiccloudimagechangeinfo.suse.com/amazon/suse-sles-15-sp5-chost-byos-v20230619-hvm-ssd-x86_64/package_changelogs.html:No such file or directory
./smash/pintdata/publiccloudimagechangeinfo.suse.com/amazon/suse-sles-15-sp5-chost-byos-v20230619-hvm-ssd-x86_64/package_version_changes.html:No such file or directory
./smash/pintdata/publiccloudimagechangeinfo.suse.com/amazon/suse-sles-15-sp5-hardened-byos-v20230620-hvm-ssd-x86_64/package_changelogs.html:No such file or directory
./smash/pintdata/publiccloudimagechangeinfo.suse.com/amazon/suse-sles-15-sp5-hardened-byos-v20230620-hvm-ssd-x86_64/package_version_changes.html:No such file or directory
./smash/pintdata/publiccloudimagechangeinfo.suse.com/amazon/suse-sles-15-sp5-sapcal-v20230620-hvm-ssd-x86_64/package_changelogs.html:No such file or directory
./smash/pintdata/publiccloudimagechangeinfo.suse.com/amazon/suse-sles-15-sp5-sapcal-v20230620-hvm-ssd-x86_64/package_version_changes.html:No such file or directory
./smash/pintdata/publiccloudimagechangeinfo.suse.com/amazon/suse-sles-15-sp5-v20230620-ecs-hvm-ssd-x86_64/package_changelogs.html:No such file or directory
./smash/pintdata/publiccloudimagechangeinfo.suse.com/amazon/suse-sles-15-sp5-v20230620-ecs-hvm-ssd-x86_64/package_version_changes.html:No such file or directory
./smash/pintdata/publiccloudimagechangeinfo.suse.com/amazon/suse-sles-15-sp5-v20230620-hvm-ssd-arm64/package_changelogs.html:No such file or directory
./smash/pintdata/publiccloudimagechangeinfo.suse.com/amazon/suse-sles-15-sp5-v20230620-hvm-ssd-arm64/package_version_changes.html:No such file or directory
./smash/pintdata/publiccloudimagechangeinfo.suse.com/amazon/suse-sles-15-sp5-v20230620-hvm-ssd-x86_64/package_changelogs.html:No such file or directory
./smash/pintdata/publiccloudimagechangeinfo.suse.com/amazon/suse-sles-15-sp5-v20230620-hvm-ssd-x86_64/package_version_changes.html:No such file or directory
./smash/pintdata/publiccloudimagechangeinfo.suse.com/amazon/suse-sles-15-sp6-byos-v20240703-hvm-ssd-x86_64/package_changelogs.html:No such file or directory
./smash/pintdata/publiccloudimagechangeinfo.suse.com/amazon/suse-sles-15-sp6-byos-v20240703-hvm-ssd-x86_64/package_version_changes.html:No such file or directory
./smash/pintdata/publiccloudimagechangeinfo.suse.com/amazon/suse-sles-15-sp6-byos-v20240704-hvm-ssd-arm64/package_changelogs.html:No such file or directory
./smash/pintdata/publiccloudimagechangeinfo.suse.com/amazon/suse-sles-15-sp6-byos-v20240704-hvm-ssd-arm64/package_version_changes.html:No such file or directory
./smash/pintdata/publiccloudimagechangeinfo.suse.com/amazon/suse-sles-15-sp6-sapcal-v20240703-hvm-ssd-x86_64/package_changelogs.html:No such file or directory
./smash/pintdata/publiccloudimagechangeinfo.suse.com/amazon/suse-sles-15-sp6-sapcal-v20240703-hvm-ssd-x86_64/package_version_changes.html:No such file or directory
./smash/pintdata/publiccloudimagechangeinfo.suse.com/amazon/suse-sles-15-sp6-v20240703-ecs-hvm-ssd-x86_64/package_changelogs.html:No such file or directory
./smash/pintdata/publiccloudimagechangeinfo.suse.com/amazon/suse-sles-15-sp6-v20240703-ecs-hvm-ssd-x86_64/package_version_changes.html:No such file or directory
./smash/pintdata/publiccloudimagechangeinfo.suse.com/amazon/suse-sles-15-sp6-v20240703-hvm-ssd-arm64/package_changelogs.html:No such file or directory
./smash/pintdata/publiccloudimagechangeinfo.suse.com/amazon/suse-sles-15-sp6-v20240703-hvm-ssd-arm64/package_version_changes.html:No such file or directory
./smash/pintdata/publiccloudimagechangeinfo.suse.com/amazon/suse-sles-15-sp6-v20240703-hvm-ssd-x86_64/package_changelogs.html:No such file or directory
./smash/pintdata/publiccloudimagechangeinfo.suse.com/amazon/suse-sles-15-sp6-v20240703-hvm-ssd-x86_64/package_version_changes.html:No such file or directory
./smash/pintdata/publiccloudimagechangeinfo.suse.com/amazon/suse-sles-sap-15-sp5-byos-v20230620-hvm-ssd-x86_64/package_changelogs.html:No such file or directory
./smash/pintdata/publiccloudimagechangeinfo.suse.com/amazon/suse-sles-sap-15-sp5-byos-v20230620-hvm-ssd-x86_64/package_version_changes.html:No such file or directory
./smash/pintdata/publiccloudimagechangeinfo.suse.com/amazon/suse-sles-sap-15-sp6-byos-v20240703-hvm-ssd-x86_64/package_changelogs.html:No such file or directory
./smash/pintdata/publiccloudimagechangeinfo.suse.com/amazon/suse-sles-sap-15-sp6-byos-v20240703-hvm-ssd-x86_64/package_version_changes.html:No such file or directory
./smash/pintdata/publiccloudimagechangeinfo.suse.com/google/opensuse-leap-15-5-v20240516-arm64/package_changelogs.html:No such file or directory
./smash/pintdata/publiccloudimagechangeinfo.suse.com/google/opensuse-leap-15-5-v20240516-arm64/package_version_changes.html:No such file or directory
./smash/pintdata/publiccloudimagechangeinfo.suse.com/google/opensuse-leap-15-5-v20240516-x86-64/package_changelogs.html:No such file or directory
./smash/pintdata/publiccloudimagechangeinfo.suse.com/google/opensuse-leap-15-5-v20240516-x86-64/package_version_changes.html:No such file or directory
./smash/pintdata/publiccloudimagechangeinfo.suse.com/google/opensuse-leap-15-5-v20240808-arm64/package_changelogs.html:No such file or directory
./smash/pintdata/publiccloudimagechangeinfo.suse.com/google/opensuse-leap-15-5-v20240808-arm64/package_version_changes.html:No such file or directory
./smash/pintdata/publiccloudimagechangeinfo.suse.com/google/opensuse-leap-15-5-v20240808-x86-64/package_changelogs.html:No such file or directory
./smash/pintdata/publiccloudimagechangeinfo.suse.com/google/opensuse-leap-15-5-v20240808-x86-64/package_version_changes.html:No such file or directory
./smash/pintdata/publiccloudimagechangeinfo.suse.com/google/opensuse-leap-15-6-v20240612-arm64/package_changelogs.html:No such file or directory
./smash/pintdata/publiccloudimagechangeinfo.suse.com/google/opensuse-leap-15-6-v20240612-arm64/package_version_changes.html:No such file or directory
./smash/pintdata/publiccloudimagechangeinfo.suse.com/google/opensuse-leap-15-6-v20240612-x86-64/package_changelogs.html:No such file or directory
./smash/pintdata/publiccloudimagechangeinfo.suse.com/google/opensuse-leap-15-6-v20240612-x86-64/package_version_changes.html:No such file or directory
./smash/pintdata/publiccloudimagechangeinfo.suse.com/google/opensuse-leap-15-6-v20240703-arm64/package_changelogs.html:No such file or directory
./smash/pintdata/publiccloudimagechangeinfo.suse.com/google/opensuse-leap-15-6-v20240703-arm64/package_version_changes.html:No such file or directory
./smash/pintdata/publiccloudimagechangeinfo.suse.com/google/opensuse-leap-15-6-v20240703-x86-64/package_changelogs.html:No such file or directory
./smash/pintdata/publiccloudimagechangeinfo.suse.com/google/opensuse-leap-15-6-v20240703-x86-64/package_version_changes.html:No such file or directory
./smash/pintdata/publiccloudimagechangeinfo.suse.com/google/opensuse-leap-15-6-v20241004-arm64/package_changelogs.html:No such file or directory
./smash/pintdata/publiccloudimagechangeinfo.suse.com/google/opensuse-leap-15-6-v20241004-arm64/package_version_changes.html:No such file or directory
./smash/pintdata/publiccloudimagechangeinfo.suse.com/google/opensuse-leap-15-6-v20241004-x86-64/package_changelogs.html:No such file or directory
./smash/pintdata/publiccloudimagechangeinfo.suse.com/google/opensuse-leap-15-6-v20241004-x86-64/package_version_changes.html:No such file or directory
./smash/pintdata/publiccloudimagechangeinfo.suse.com/google/sle-hpc-15-sp5-byos-v20230620-x86-64/package_changelogs.html:No such file or directory
./smash/pintdata/publiccloudimagechangeinfo.suse.com/google/sle-hpc-15-sp5-byos-v20230620-x86-64/package_version_changes.html:No such file or directory
./smash/pintdata/publiccloudimagechangeinfo.suse.com/google/sle-hpc-15-sp6-byos-v20240703-x86-64/package_changelogs.html:No such file or directory
./smash/pintdata/publiccloudimagechangeinfo.suse.com/google/sle-hpc-15-sp6-byos-v20240703-x86-64/package_version_changes.html:No such file or directory
./smash/pintdata/publiccloudimagechangeinfo.suse.com/google/sle-micro-5-5-byos-v20231012-arm64/package_changelogs.html:No such file or directory
./smash/pintdata/publiccloudimagechangeinfo.suse.com/google/sle-micro-5-5-byos-v20231012-arm64/package_version_changes.html:No such file or directory
./smash/pintdata/publiccloudimagechangeinfo.suse.com/google/sle-micro-5-5-byos-v20231012-x86-64/package_changelogs.html:No such file or directory
./smash/pintdata/publiccloudimagechangeinfo.suse.com/google/sle-micro-5-5-byos-v20231012-x86-64/package_version_changes.html:No such file or directory
./smash/pintdata/publiccloudimagechangeinfo.suse.com/google/sle-micro-6-0-byos-v20240611-x86-64/package_changelogs.html:No such file or directory
./smash/pintdata/publiccloudimagechangeinfo.suse.com/google/sle-micro-6-0-byos-v20240611-x86-64/package_version_changes.html:No such file or directory
./smash/pintdata/publiccloudimagechangeinfo.suse.com/google/sle-micro-6-0-byos-v20240612-arm64/package_changelogs.html:No such file or directory
./smash/pintdata/publiccloudimagechangeinfo.suse.com/google/sle-micro-6-0-byos-v20240612-arm64/package_version_changes.html:No such file or directory
./smash/pintdata/publiccloudimagechangeinfo.suse.com/google/sles-15-sp5-byos-v20230620-arm64/package_changelogs.html:No such file or directory
./smash/pintdata/publiccloudimagechangeinfo.suse.com/google/sles-15-sp5-byos-v20230620-arm64/package_version_changes.html:No such file or directory
./smash/pintdata/publiccloudimagechangeinfo.suse.com/google/sles-15-sp5-byos-v20230620-x86-64/package_changelogs.html:No such file or directory
./smash/pintdata/publiccloudimagechangeinfo.suse.com/google/sles-15-sp5-byos-v20230620-x86-64/package_version_changes.html:No such file or directory
./smash/pintdata/publiccloudimagechangeinfo.suse.com/google/sles-15-sp5-chost-byos-v20230619-arm64/package_changelogs.html:No such file or directory
./smash/pintdata/publiccloudimagechangeinfo.suse.com/google/sles-15-sp5-chost-byos-v20230619-arm64/package_version_changes.html:No such file or directory
./smash/pintdata/publiccloudimagechangeinfo.suse.com/google/sles-15-sp5-chost-byos-v20230619-x86-64/package_changelogs.html:No such file or directory
./smash/pintdata/publiccloudimagechangeinfo.suse.com/google/sles-15-sp5-chost-byos-v20230619-x86-64/package_version_changes.html:No such file or directory
./smash/pintdata/publiccloudimagechangeinfo.suse.com/google/sles-15-sp5-hardened-byos-v20230620-x86-64/package_changelogs.html:No such file or directory
./smash/pintdata/publiccloudimagechangeinfo.suse.com/google/sles-15-sp5-hardened-byos-v20230620-x86-64/package_version_changes.html:No such file or directory
./smash/pintdata/publiccloudimagechangeinfo.suse.com/google/sles-15-sp5-sap-byos-v20230620-x86-64/package_changelogs.html:No such file or directory
./smash/pintdata/publiccloudimagechangeinfo.suse.com/google/sles-15-sp5-sap-byos-v20230620-x86-64/package_version_changes.html:No such file or directory
./smash/pintdata/publiccloudimagechangeinfo.suse.com/google/sles-15-sp5-sap-v20230620-x86-64/package_changelogs.html:No such file or directory
./smash/pintdata/publiccloudimagechangeinfo.suse.com/google/sles-15-sp5-sap-v20230620-x86-64/package_version_changes.html:No such file or directory
./smash/pintdata/publiccloudimagechangeinfo.suse.com/google/sles-15-sp5-sapcal-v20230620-x86-64/package_changelogs.html:No such file or directory
./smash/pintdata/publiccloudimagechangeinfo.suse.com/google/sles-15-sp5-sapcal-v20230620-x86-64/package_version_changes.html:No such file or directory
./smash/pintdata/publiccloudimagechangeinfo.suse.com/google/sles-15-sp5-v20230620-arm64/package_changelogs.html:No such file or directory
./smash/pintdata/publiccloudimagechangeinfo.suse.com/google/sles-15-sp5-v20230620-arm64/package_version_changes.html:No such file or directory
./smash/pintdata/publiccloudimagechangeinfo.suse.com/google/sles-15-sp5-v20230620-x86-64/package_changelogs.html:No such file or directory
./smash/pintdata/publiccloudimagechangeinfo.suse.com/google/sles-15-sp5-v20230620-x86-64/package_version_changes.html:No such file or directory
./smash/pintdata/publiccloudimagechangeinfo.suse.com/google/sles-15-sp6-byos-v20240703-arm64/package_changelogs.html:No such file or directory
./smash/pintdata/publiccloudimagechangeinfo.suse.com/google/sles-15-sp6-byos-v20240703-arm64/package_version_changes.html:No such file or directory
./smash/pintdata/publiccloudimagechangeinfo.suse.com/google/sles-15-sp6-byos-v20240703-x86-64/package_changelogs.html:No such file or directory
./smash/pintdata/publiccloudimagechangeinfo.suse.com/google/sles-15-sp6-byos-v20240703-x86-64/package_version_changes.html:No such file or directory
./smash/pintdata/publiccloudimagechangeinfo.suse.com/google/sles-15-sp6-hardened-byos-v20240703-x86-64/package_changelogs.html:No such file or directory
./smash/pintdata/publiccloudimagechangeinfo.suse.com/google/sles-15-sp6-hardened-byos-v20240703-x86-64/package_version_changes.html:No such file or directory
./smash/pintdata/publiccloudimagechangeinfo.suse.com/google/sles-15-sp6-sap-byos-v20240703-x86-64/package_changelogs.html:No such file or directory
./smash/pintdata/publiccloudimagechangeinfo.suse.com/google/sles-15-sp6-sap-byos-v20240703-x86-64/package_version_changes.html:No such file or directory
./smash/pintdata/publiccloudimagechangeinfo.suse.com/google/sles-15-sp6-sap-v20240703-x86-64/package_changelogs.html:No such file or directory
./smash/pintdata/publiccloudimagechangeinfo.suse.com/google/sles-15-sp6-sap-v20240703-x86-64/package_version_changes.html:No such file or directory
./smash/pintdata/publiccloudimagechangeinfo.suse.com/google/sles-15-sp6-sapcal-v20240703-x86-64/package_changelogs.html:No such file or directory
./smash/pintdata/publiccloudimagechangeinfo.suse.com/google/sles-15-sp6-sapcal-v20240703-x86-64/package_version_changes.html:No such file or directory
./smash/pintdata/publiccloudimagechangeinfo.suse.com/google/sles-15-sp6-v20240703-arm64/package_changelogs.html:No such file or directory
./smash/pintdata/publiccloudimagechangeinfo.suse.com/google/sles-15-sp6-v20240703-arm64/package_version_changes.html:No such file or directory
./smash/pintdata/publiccloudimagechangeinfo.suse.com/google/sles-15-sp6-v20240703-x86-64/package_changelogs.html:No such file or directory
./smash/pintdata/publiccloudimagechangeinfo.suse.com/google/sles-15-sp6-v20240703-x86-64/package_version_changes.html:No such file or directory
./smash/pintdata/publiccloudimagechangeinfo.suse.com/google/sles-sap-15-sp5-hardened-byos-v20230620-x86-64/package_changelogs.html:No such file or directory
./smash/pintdata/publiccloudimagechangeinfo.suse.com/google/sles-sap-15-sp5-hardened-byos-v20230620-x86-64/package_version_changes.html:No such file or directory
./smash/pintdata/publiccloudimagechangeinfo.suse.com/google/sles-sap-15-sp5-hardened-v20230620-x86-64/package_changelogs.html:No such file or directory
./smash/pintdata/publiccloudimagechangeinfo.suse.com/google/sles-sap-15-sp5-hardened-v20230620-x86-64/package_version_changes.html:No such file or directory
./smash/pintdata/publiccloudimagechangeinfo.suse.com/google/sles-sap-15-sp6-hardened-byos-v20240703-x86-64/package_changelogs.html:No such file or directory
./smash/pintdata/publiccloudimagechangeinfo.suse.com/google/sles-sap-15-sp6-hardened-byos-v20240703-x86-64/package_version_changes.html:No such file or directory
./smash/pintdata/publiccloudimagechangeinfo.suse.com/google/sles-sap-15-sp6-hardened-v20240703-x86-64/package_changelogs.html:No such file or directory
./smash/pintdata/publiccloudimagechangeinfo.suse.com/google/sles-sap-15-sp6-hardened-v20240703-x86-64/package_version_changes.html:No such file or directory
./smash/pintdata/publiccloudimagechangeinfo.suse.com/google/suse-manager-proxy-5-0-byos-v20240923-arm64/package_changelogs.html:No such file or directory
./smash/pintdata/publiccloudimagechangeinfo.suse.com/google/suse-manager-proxy-5-0-byos-v20240923-arm64/package_version_changes.html:No such file or directory
./smash/pintdata/publiccloudimagechangeinfo.suse.com/google/suse-manager-proxy-5-0-byos-v20240923-x86-64/package_changelogs.html:No such file or directory
./smash/pintdata/publiccloudimagechangeinfo.suse.com/google/suse-manager-proxy-5-0-byos-v20240923-x86-64/package_version_changes.html:No such file or directory
./smash/pintdata/publiccloudimagechangeinfo.suse.com/google/suse-manager-server-5-0-byos-v20240923-arm64/package_changelogs.html:No such file or directory
./smash/pintdata/publiccloudimagechangeinfo.suse.com/google/suse-manager-server-5-0-byos-v20240923-arm64/package_version_changes.html:No such file or directory
./smash/pintdata/publiccloudimagechangeinfo.suse.com/google/suse-manager-server-5-0-byos-v20240923-x86-64/package_changelogs.html:No such file or directory
./smash/pintdata/publiccloudimagechangeinfo.suse.com/google/suse-manager-server-5-0-byos-v20240923-x86-64/package_version_changes.html:No such file or directory
./smash/pintdata/publiccloudimagechangeinfo.suse.com/microsoft/suse-manager-proxy-5-0-byos-v20240923-x86_64/package_changelogs.html:No such file or directory
./smash/pintdata/publiccloudimagechangeinfo.suse.com/microsoft/suse-manager-proxy-5-0-byos-v20240923-x86_64/package_version_changes.html:No such file or directory
./smash/pintdata/publiccloudimagechangeinfo.suse.com/microsoft/suse-manager-server-4-3-byos-v20231214-x86_64/package_changelogs.html:No such file or directory
./smash/pintdata/publiccloudimagechangeinfo.suse.com/microsoft/suse-manager-server-4-3-byos-v20231214-x86_64/package_version_changes.html:No such file or directory
./smash/pintdata/publiccloudimagechangeinfo.suse.com/microsoft/suse-manager-server-5-0-byos-v20240923-x86_64/package_changelogs.html:No such file or directory
./smash/pintdata/publiccloudimagechangeinfo.suse.com/microsoft/suse-manager-server-5-0-byos-v20240923-x86_64/package_version_changes.html:No such file or directory
./smash/pintdata/publiccloudimagechangeinfo.suse.com/microsoft/suse-opensuse-leap-15-5-v20240301-arm64/package_changelogs.html:No such file or directory
./smash/pintdata/publiccloudimagechangeinfo.suse.com/microsoft/suse-opensuse-leap-15-5-v20240301-arm64/package_version_changes.html:No such file or directory
./smash/pintdata/publiccloudimagechangeinfo.suse.com/microsoft/suse-opensuse-leap-15-5-v20240301-x86_64/package_changelogs.html:No such file or directory
./smash/pintdata/publiccloudimagechangeinfo.suse.com/microsoft/suse-opensuse-leap-15-5-v20240301-x86_64/package_version_changes.html:No such file or directory
./smash/pintdata/publiccloudimagechangeinfo.suse.com/microsoft/suse-opensuse-leap-15-5-v20240708-arm64/package_changelogs.html:No such file or directory
./smash/pintdata/publiccloudimagechangeinfo.suse.com/microsoft/suse-opensuse-leap-15-5-v20240708-arm64/package_version_changes.html:No such file or directory
./smash/pintdata/publiccloudimagechangeinfo.suse.com/microsoft/suse-opensuse-leap-15-5-v20240708-x86_64/package_changelogs.html:No such file or directory
./smash/pintdata/publiccloudimagechangeinfo.suse.com/microsoft/suse-opensuse-leap-15-5-v20240708-x86_64/package_version_changes.html:No such file or directory
./smash/pintdata/publiccloudimagechangeinfo.suse.com/microsoft/suse-opensuse-leap-15-5-v20240808-arm64/package_changelogs.html:No such file or directory
./smash/pintdata/publiccloudimagechangeinfo.suse.com/microsoft/suse-opensuse-leap-15-5-v20240808-arm64/package_version_changes.html:No such file or directory
./smash/pintdata/publiccloudimagechangeinfo.suse.com/microsoft/suse-opensuse-leap-15-5-v20240808-x86_64/package_changelogs.html:No such file or directory
./smash/pintdata/publiccloudimagechangeinfo.suse.com/microsoft/suse-opensuse-leap-15-5-v20240808-x86_64/package_version_changes.html:No such file or directory
./smash/pintdata/publiccloudimagechangeinfo.suse.com/microsoft/suse-opensuse-leap-15-6-v20240702-arm64/package_changelogs.html:No such file or directory
./smash/pintdata/publiccloudimagechangeinfo.suse.com/microsoft/suse-opensuse-leap-15-6-v20240702-arm64/package_version_changes.html:No such file or directory
./smash/pintdata/publiccloudimagechangeinfo.suse.com/microsoft/suse-opensuse-leap-15-6-v20240702-x86_64/package_changelogs.html:No such file or directory
./smash/pintdata/publiccloudimagechangeinfo.suse.com/microsoft/suse-opensuse-leap-15-6-v20240702-x86_64/package_version_changes.html:No such file or directory
./smash/pintdata/publiccloudimagechangeinfo.suse.com/microsoft/suse-opensuse-leap-15-6-v20240808-arm64/package_changelogs.html:No such file or directory
./smash/pintdata/publiccloudimagechangeinfo.suse.com/microsoft/suse-opensuse-leap-15-6-v20240808-arm64/package_version_changes.html:No such file or directory
./smash/pintdata/publiccloudimagechangeinfo.suse.com/microsoft/suse-opensuse-leap-15-6-v20241003-x86_64/package_changelogs.html:No such file or directory
./smash/pintdata/publiccloudimagechangeinfo.suse.com/microsoft/suse-opensuse-leap-15-6-v20241003-x86_64/package_version_changes.html:No such file or directory
./smash/pintdata/publiccloudimagechangeinfo.suse.com/microsoft/suse-sle-hpc-15-sp2-byos-v20240207-x86_64/package_changelogs.html:No such file or directory
./smash/pintdata/publiccloudimagechangeinfo.suse.com/microsoft/suse-sle-hpc-15-sp2-byos-v20240207-x86_64/package_version_changes.html:No such file or directory
./smash/pintdata/publiccloudimagechangeinfo.suse.com/microsoft/suse-sle-hpc-15-sp4-byos-v20231214-x86_64/package_changelogs.html:No such file or directory
./smash/pintdata/publiccloudimagechangeinfo.suse.com/microsoft/suse-sle-hpc-15-sp4-byos-v20231214-x86_64/package_version_changes.html:No such file or directory
./smash/pintdata/publiccloudimagechangeinfo.suse.com/microsoft/suse-sle-hpc-15-sp4-byos-v20240206-x86_64/package_changelogs.html:No such file or directory
./smash/pintdata/publiccloudimagechangeinfo.suse.com/microsoft/suse-sle-hpc-15-sp4-byos-v20240206-x86_64/package_version_changes.html:No such file or directory
./smash/pintdata/publiccloudimagechangeinfo.suse.com/microsoft/suse-sle-hpc-15-sp5-byos-v20230620-x86_64/package_changelogs.html:No such file or directory
./smash/pintdata/publiccloudimagechangeinfo.suse.com/microsoft/suse-sle-hpc-15-sp5-byos-v20230620-x86_64/package_version_changes.html:No such file or directory
./smash/pintdata/publiccloudimagechangeinfo.suse.com/microsoft/suse-sle-hpc-15-sp5-v20230620-x86_64/package_changelogs.html:No such file or directory
./smash/pintdata/publiccloudimagechangeinfo.suse.com/microsoft/suse-sle-hpc-15-sp5-v20230620-x86_64/package_version_changes.html:No such file or directory
./smash/pintdata/publiccloudimagechangeinfo.suse.com/microsoft/suse-sle-hpc-15-sp5-v20231214-x86_64/package_changelogs.html:No such file or directory
./smash/pintdata/publiccloudimagechangeinfo.suse.com/microsoft/suse-sle-hpc-15-sp5-v20231214-x86_64/package_version_changes.html:No such file or directory
./smash/pintdata/publiccloudimagechangeinfo.suse.com/microsoft/suse-sle-micro-5-3-byos-v20240716-x86_64/package_changelogs.html:No such file or directory
./smash/pintdata/publiccloudimagechangeinfo.suse.com/microsoft/suse-sle-micro-5-3-byos-v20240716-x86_64/package_version_changes.html:No such file or directory
./smash/pintdata/publiccloudimagechangeinfo.suse.com/microsoft/suse-sle-micro-5-5-byos-v20231012-x86_64/package_changelogs.html:No such file or directory
./smash/pintdata/publiccloudimagechangeinfo.suse.com/microsoft/suse-sle-micro-5-5-byos-v20231012-x86_64/package_version_changes.html:No such file or directory
./smash/pintdata/publiccloudimagechangeinfo.suse.com/microsoft/suse-sle-micro-5-5-byos-v20231018-arm64/package_changelogs.html:No such file or directory
./smash/pintdata/publiccloudimagechangeinfo.suse.com/microsoft/suse-sle-micro-5-5-byos-v20231018-arm64/package_version_changes.html:No such file or directory
./smash/pintdata/publiccloudimagechangeinfo.suse.com/microsoft/suse-sle-micro-5-5-v20231012-arm64-llc/package_changelogs.html:No such file or directory
./smash/pintdata/publiccloudimagechangeinfo.suse.com/microsoft/suse-sle-micro-5-5-v20231012-arm64-llc/package_version_changes.html:No such file or directory
./smash/pintdata/publiccloudimagechangeinfo.suse.com/microsoft/suse-sle-micro-5-5-v20231012-x86_64-llc/package_changelogs.html:No such file or directory
./smash/pintdata/publiccloudimagechangeinfo.suse.com/microsoft/suse-sle-micro-5-5-v20231012-x86_64-llc/package_version_changes.html:No such file or directory
./smash/pintdata/publiccloudimagechangeinfo.suse.com/microsoft/suse-sles-15-sp2-byos-v20240207-x86_64/package_changelogs.html:No such file or directory
./smash/pintdata/publiccloudimagechangeinfo.suse.com/microsoft/suse-sles-15-sp2-byos-v20240207-x86_64/package_version_changes.html:No such file or directory
./smash/pintdata/publiccloudimagechangeinfo.suse.com/microsoft/suse-sles-15-sp3-byos-v20240207-x86_64/package_changelogs.html:No such file or directory
./smash/pintdata/publiccloudimagechangeinfo.suse.com/microsoft/suse-sles-15-sp3-byos-v20240207-x86_64/package_version_changes.html:No such file or directory
./smash/pintdata/publiccloudimagechangeinfo.suse.com/microsoft/suse-sles-15-sp4-byos-v20231214-x86_64/package_changelogs.html:No such file or directory
./smash/pintdata/publiccloudimagechangeinfo.suse.com/microsoft/suse-sles-15-sp4-byos-v20231214-x86_64/package_version_changes.html:No such file or directory
./smash/pintdata/publiccloudimagechangeinfo.suse.com/microsoft/suse-sles-15-sp4-byos-v20240207-arm64/package_changelogs.html:No such file or directory
./smash/pintdata/publiccloudimagechangeinfo.suse.com/microsoft/suse-sles-15-sp4-byos-v20240207-arm64/package_version_changes.html:No such file or directory
./smash/pintdata/publiccloudimagechangeinfo.suse.com/microsoft/suse-sles-15-sp4-byos-v20240207-x86_64/package_changelogs.html:No such file or directory
./smash/pintdata/publiccloudimagechangeinfo.suse.com/microsoft/suse-sles-15-sp4-byos-v20240207-x86_64/package_version_changes.html:No such file or directory
./smash/pintdata/publiccloudimagechangeinfo.suse.com/microsoft/suse-sles-15-sp4-hardened-byos-v20231214-x86_64/package_changelogs.html:No such file or directory
./smash/pintdata/publiccloudimagechangeinfo.suse.com/microsoft/suse-sles-15-sp4-hardened-byos-v20231214-x86_64/package_version_changes.html:No such file or directory
./smash/pintdata/publiccloudimagechangeinfo.suse.com/microsoft/suse-sles-15-sp4-sapcal-v20231214-x86_64/package_changelogs.html:No such file or directory
./smash/pintdata/publiccloudimagechangeinfo.suse.com/microsoft/suse-sles-15-sp4-sapcal-v20231214-x86_64/package_version_changes.html:No such file or directory
./smash/pintdata/publiccloudimagechangeinfo.suse.com/microsoft/suse-sles-15-sp5-basic-v20230620-x86_64/package_changelogs.html:No such file or directory
./smash/pintdata/publiccloudimagechangeinfo.suse.com/microsoft/suse-sles-15-sp5-basic-v20230620-x86_64/package_version_changes.html:No such file or directory
./smash/pintdata/publiccloudimagechangeinfo.suse.com/microsoft/suse-sles-15-sp5-byos-v20230620-arm64/package_changelogs.html:No such file or directory
./smash/pintdata/publiccloudimagechangeinfo.suse.com/microsoft/suse-sles-15-sp5-byos-v20230620-arm64/package_version_changes.html:No such file or directory
./smash/pintdata/publiccloudimagechangeinfo.suse.com/microsoft/suse-sles-15-sp5-byos-v20230620-x86_64/package_changelogs.html:No such file or directory
./smash/pintdata/publiccloudimagechangeinfo.suse.com/microsoft/suse-sles-15-sp5-byos-v20230620-x86_64/package_version_changes.html:No such file or directory
./smash/pintdata/publiccloudimagechangeinfo.suse.com/microsoft/suse-sles-15-sp5-byos-v20231214-arm64/package_changelogs.html:No such file or directory
./smash/pintdata/publiccloudimagechangeinfo.suse.com/microsoft/suse-sles-15-sp5-byos-v20231214-arm64/package_version_changes.html:No such file or directory
./smash/pintdata/publiccloudimagechangeinfo.suse.com/microsoft/suse-sles-15-sp5-byos-v20231214-x86_64/package_changelogs.html:No such file or directory
./smash/pintdata/publiccloudimagechangeinfo.suse.com/microsoft/suse-sles-15-sp5-byos-v20231214-x86_64/package_version_changes.html:No such file or directory
./smash/pintdata/publiccloudimagechangeinfo.suse.com/microsoft/suse-sles-15-sp5-chost-byos-v20230619-arm64/package_changelogs.html:No such file or directory
./smash/pintdata/publiccloudimagechangeinfo.suse.com/microsoft/suse-sles-15-sp5-chost-byos-v20230619-arm64/package_version_changes.html:No such file or directory
./smash/pintdata/publiccloudimagechangeinfo.suse.com/microsoft/suse-sles-15-sp5-chost-byos-v20230619-x86_64/package_changelogs.html:No such file or directory
./smash/pintdata/publiccloudimagechangeinfo.suse.com/microsoft/suse-sles-15-sp5-chost-byos-v20230619-x86_64/package_version_changes.html:No such file or directory
./smash/pintdata/publiccloudimagechangeinfo.suse.com/microsoft/suse-sles-15-sp5-hardened-byos-v20230620-x86_64/package_changelogs.html:No such file or directory
./smash/pintdata/publiccloudimagechangeinfo.suse.com/microsoft/suse-sles-15-sp5-hardened-byos-v20230620-x86_64/package_version_changes.html:No such file or directory
./smash/pintdata/publiccloudimagechangeinfo.suse.com/microsoft/suse-sles-15-sp5-sapcal-v20230620-x86_64/package_changelogs.html:No such file or directory
./smash/pintdata/publiccloudimagechangeinfo.suse.com/microsoft/suse-sles-15-sp5-sapcal-v20230620-x86_64/package_version_changes.html:No such file or directory
./smash/pintdata/publiccloudimagechangeinfo.suse.com/microsoft/suse-sles-15-sp5-v20230620-arm64/package_changelogs.html:No such file or directory
./smash/pintdata/publiccloudimagechangeinfo.suse.com/microsoft/suse-sles-15-sp5-v20230620-arm64/package_version_changes.html:No such file or directory
./smash/pintdata/publiccloudimagechangeinfo.suse.com/microsoft/suse-sles-15-sp5-v20230620-x86_64/package_changelogs.html:No such file or directory
./smash/pintdata/publiccloudimagechangeinfo.suse.com/microsoft/suse-sles-15-sp5-v20230620-x86_64/package_version_changes.html:No such file or directory
./smash/pintdata/publiccloudimagechangeinfo.suse.com/microsoft/suse-sles-15-sp5-v20240207-arm64/package_changelogs.html:No such file or directory
./smash/pintdata/publiccloudimagechangeinfo.suse.com/microsoft/suse-sles-15-sp5-v20240207-arm64/package_version_changes.html:No such file or directory
./smash/pintdata/publiccloudimagechangeinfo.suse.com/microsoft/suse-sles-15-sp6-hardened-byos-v20240808-x86_64/package_changelogs.html:No such file or directory
./smash/pintdata/publiccloudimagechangeinfo.suse.com/microsoft/suse-sles-15-sp6-hardened-byos-v20240808-x86_64/package_version_changes.html:No such file or directory
./smash/pintdata/publiccloudimagechangeinfo.suse.com/microsoft/suse-sles-15-sp6-v20240808-arm64/package_changelogs.html:No such file or directory
./smash/pintdata/publiccloudimagechangeinfo.suse.com/microsoft/suse-sles-15-sp6-v20240808-arm64/package_version_changes.html:No such file or directory
./smash/pintdata/publiccloudimagechangeinfo.suse.com/microsoft/suse-sles-sap-15-sp2-v20231214-x86_64/package_changelogs.html:No such file or directory
./smash/pintdata/publiccloudimagechangeinfo.suse.com/microsoft/suse-sles-sap-15-sp2-v20231214-x86_64/package_version_changes.html:No such file or directory
./smash/pintdata/publiccloudimagechangeinfo.suse.com/microsoft/suse-sles-sap-15-sp3-byos-v20231214-x86_64/package_changelogs.html:No such file or directory
./smash/pintdata/publiccloudimagechangeinfo.suse.com/microsoft/suse-sles-sap-15-sp3-byos-v20231214-x86_64/package_version_changes.html:No such file or directory
./smash/pintdata/publiccloudimagechangeinfo.suse.com/microsoft/suse-sles-sap-15-sp4-v20231214-x86_64/package_changelogs.html:No such file or directory
./smash/pintdata/publiccloudimagechangeinfo.suse.com/microsoft/suse-sles-sap-15-sp4-v20231214-x86_64/package_version_changes.html:No such file or directory
./smash/pintdata/publiccloudimagechangeinfo.suse.com/microsoft/suse-sles-sap-15-sp5-byos-v20230620-x86_64/package_changelogs.html:No such file or directory
./smash/pintdata/publiccloudimagechangeinfo.suse.com/microsoft/suse-sles-sap-15-sp5-byos-v20230620-x86_64/package_version_changes.html:No such file or directory
./smash/pintdata/publiccloudimagechangeinfo.suse.com/microsoft/suse-sles-sap-15-sp5-byos-v20231214-x86_64/package_changelogs.html:No such file or directory
./smash/pintdata/publiccloudimagechangeinfo.suse.com/microsoft/suse-sles-sap-15-sp5-byos-v20231214-x86_64/package_version_changes.html:No such file or directory
./smash/pintdata/publiccloudimagechangeinfo.suse.com/microsoft/suse-sles-sap-15-sp5-hardened-byos-v20230620-x86_64/package_changelogs.html:No such file or directory
./smash/pintdata/publiccloudimagechangeinfo.suse.com/microsoft/suse-sles-sap-15-sp5-hardened-byos-v20230620-x86_64/package_version_changes.html:No such file or directory
./smash/pintdata/publiccloudimagechangeinfo.suse.com/microsoft/suse-sles-sap-15-sp5-hardened-byos-v20231214-x86_64/package_changelogs.html:No such file or directory
./smash/pintdata/publiccloudimagechangeinfo.suse.com/microsoft/suse-sles-sap-15-sp5-hardened-byos-v20231214-x86_64/package_version_changes.html:No such file or directory
./smash/pintdata/publiccloudimagechangeinfo.suse.com/microsoft/suse-sles-sap-15-sp5-hardened-v20230620-x86_64/package_changelogs.html:No such file or directory
./smash/pintdata/publiccloudimagechangeinfo.suse.com/microsoft/suse-sles-sap-15-sp5-hardened-v20230620-x86_64/package_version_changes.html:No such file or directory
./smash/pintdata/publiccloudimagechangeinfo.suse.com/microsoft/suse-sles-sap-15-sp5-hardened-v20240207-x86_64/package_changelogs.html:No such file or directory
./smash/pintdata/publiccloudimagechangeinfo.suse.com/microsoft/suse-sles-sap-15-sp5-hardened-v20240207-x86_64/package_version_changes.html:No such file or directory
./smash/pintdata/publiccloudimagechangeinfo.suse.com/microsoft/suse-sles-sap-15-sp5-v20230620-x86_64/package_changelogs.html:No such file or directory
./smash/pintdata/publiccloudimagechangeinfo.suse.com/microsoft/suse-sles-sap-15-sp5-v20230620-x86_64/package_version_changes.html:No such file or directory
./smash/pintdata/publiccloudimagechangeinfo.suse.com/microsoft/suse-sles-sap-15-sp6-hardened-v20240808-x86_64/package_changelogs.html:No such file or directory
./smash/pintdata/publiccloudimagechangeinfo.suse.com/microsoft/suse-sles-sap-15-sp6-hardened-v20240808-x86_64/package_version_changes.html:No such file or directory
Use of uninitialized value $mtime in numeric lt (<) at bin/generate-cvrf-cve.pl line 162.
generating CVRF / CVE pages at Tue Oct 29 01:10:15 2024
Use of uninitialized value $mtime in numeric lt (<) at bin/generate-cvrf-cve.pl line 162.
Use of uninitialized value $mtime in numeric lt (<) at bin/generate-cvrf-cve.pl line 162.
Use of uninitialized value $mtime in numeric lt (<) at bin/generate-cvrf-cve.pl line 162.
notsure where SUSE Linux Enterprise Module for Package Hub 15 SP6 is contained?
notsure where SUSE Linux Enterprise Module for Package Hub 15 SP5 is contained?
Use of uninitialized value $mtime in numeric lt (<) at bin/generate-cvrf-cve.pl line 162.
Use of uninitialized value $mtime in numeric lt (<) at bin/generate-cvrf-cve.pl line 162.
--- /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2024-50382.xml 2024-10-28 01:10:12.591797000 +0100
+++ /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2024-50382.xml.new 2024-10-29 01:10:24.640070000 +0100
@@ -14,13 +14,13 @@
1
- 2
- 2024-10-28T00:10:12Z
+ 3
+ 2024-10-29T00:10:24Z
current
2024-10-24T23:10:36Z
- 2024-10-28T00:10:12Z
+ 2024-10-29T00:10:24Z
cve-database/bin/generate-cvrf-cve.pl
2020-12-27T01:00:00Z
@@ -33,6 +33,10 @@
+ https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/UY4RL4FBV22PQSJS56OEWPJTGWTDJO2U/
+ E-Mail link for openSUSE-SU-2024:14429-1
+
+
https://www.suse.com/support/security/rating/
SUSE Security Ratings
Use of uninitialized value $mtime in numeric lt (<) at bin/generate-cvrf-cve.pl line 162.
--- /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2024-50063.xml 2024-10-26 01:10:14.400256000 +0200
+++ /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2024-50063.xml.new 2024-10-29 01:10:28.845804000 +0100
@@ -14,13 +14,13 @@
1
- 3
- 2024-10-25T23:10:14Z
+ 4
+ 2024-10-29T00:10:28Z
current
2024-10-21T23:11:06Z
- 2024-10-25T23:10:14Z
+ 2024-10-29T00:10:28Z
cve-database/bin/generate-cvrf-cve.pl
2020-12-27T01:00:00Z
@@ -67,7 +67,1171 @@
SUSE Security Ratings
-
+
+
+
+ SUSE Linux Enterprise Module for Basesystem 15 SP5
+
+
+ SUSE Linux Enterprise Module for Development Tools 15 SP5
+
+
+
+
+ SUSE Linux Enterprise Module for Basesystem 15 SP6
+
+
+ SUSE Linux Enterprise Module for Development Tools 15 SP6
+
+
+
+
+ SUSE Linux Enterprise High Availability Extension 12 SP5
+
+
+
+
+ SUSE Linux Enterprise High Performance Computing 12 SP5
+
+
+
+
+ SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS
+
+
+
+
+ SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS
+
+
+
+
+ SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS
+
+
+
+
+ SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS
+
+
+
+
+ SUSE Linux Enterprise Module for Basesystem 15 SP5
+
+
+ SUSE Linux Enterprise Module for Development Tools 15 SP5
+
+
+ SUSE Linux Enterprise Module for Public Cloud 15 SP5
+
+
+
+
+ SUSE Linux Enterprise Module for Basesystem 15 SP6
+
+
+ SUSE Linux Enterprise Module for Development Tools 15 SP6
+
+
+ SUSE Linux Enterprise Module for Public Cloud 15 SP6
+
+
+
+
+ SUSE Linux Enterprise Live Patching 12 SP5
+
+
+
+
+ SUSE Linux Enterprise Live Patching 15 SP2
+
+
+
+
+ SUSE Linux Enterprise Live Patching 15 SP3
+
+
+
+
+ SUSE Linux Enterprise Live Patching 15 SP4
+
+
+
+
+ SUSE Linux Enterprise Live Patching 15 SP5
+
+
+
+
+ SUSE Linux Enterprise Live Patching 15 SP6
+
+
+
+
+ SUSE Linux Enterprise Micro 5.0
+
+
+
+
+ SUSE Linux Enterprise Micro 5.1
+
+
+
+
+ SUSE Linux Enterprise Micro 5.2
+
+
+
+
+ SUSE Linux Enterprise Micro 5.3
+
+
+
+
+ SUSE Linux Enterprise Micro 5.4
+
+
+
+
+ SUSE Linux Enterprise Micro 5.5
+
+
+
+
+ SUSE Linux Enterprise Micro 6.0
+
+
+
+
+ SUSE Linux Enterprise Real Time 12 SP5
+
+
+
+
+ SUSE Real Time Module 15 SP5
+
+
+
+
+ SUSE Linux Enterprise Server 11 SP4 LTSS
+
+
+
+
+ SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE
+
+
+
+
+ SUSE Linux Enterprise Server 12 SP2-LTSS
+
+
+
+
+ SUSE Linux Enterprise Server 12 SP4-LTSS
+
+
+
+
+ SUSE Linux Enterprise Server 12 SP5
+
+
+ SUSE Linux Enterprise Software Development Kit 12 SP5
+
+
+ SUSE Linux Enterprise Workstation Extension 12 SP5
+
+
+
+
+ SUSE Linux Enterprise Server 12 SP5-LTSS
+
+
+
+
+ SUSE Linux Enterprise Server 15 SP1-LTSS
+
+
+
+
+ SUSE Linux Enterprise Server 15 SP2-LTSS
+
+
+
+
+ SUSE Linux Enterprise Server 15 SP3-LTSS
+
+
+
+
+ SUSE Linux Enterprise Server 15 SP4-LTSS
+
+
+
+
+ SUSE Linux Enterprise Module for Basesystem 15 SP5
+
+
+ SUSE Linux Enterprise Module for Development Tools 15 SP5
+
+
+ SUSE Linux Enterprise Module for Public Cloud 15 SP5
+
+
+
+
+ SUSE Linux Enterprise Module for Basesystem 15 SP6
+
+
+ SUSE Linux Enterprise Module for Development Tools 15 SP6
+
+
+ SUSE Linux Enterprise Module for Public Cloud 15 SP6
+
+
+
+
+ SUSE Linux Enterprise Server 15-LTSS
+
+
+
+
+ SUSE Linux Enterprise Server Teradata 12 SP3
+
+
+
+
+ SUSE Linux Enterprise Server Teradata 12 SP3-LTSS
+
+
+
+
+ SUSE Linux Enterprise Server Teradata 15 SP4
+
+
+
+
+ SUSE Linux Enterprise Server for SAP Applications 12 SP5
+
+
+ SUSE Linux Enterprise Software Development Kit 12 SP5
+
+
+ SUSE Linux Enterprise Workstation Extension 12 SP5
+
+
+
+
+ SUSE Linux Enterprise Server for SAP Applications 15 SP2
+
+
+
+
+ SUSE Linux Enterprise Server for SAP Applications 15 SP3
+
+
+
+
+ SUSE Linux Enterprise Server for SAP Applications 15 SP4
+
+
+
+
+ SUSE Linux Enterprise Module for Basesystem 15 SP5
+
+
+ SUSE Linux Enterprise Module for Development Tools 15 SP5
+
+
+ SUSE Linux Enterprise Module for Public Cloud 15 SP5
+
+
+
+
+ SUSE Linux Enterprise Module for Basesystem 15 SP6
+
+
+ SUSE Linux Enterprise Module for Development Tools 15 SP6
+
+
+ SUSE Linux Enterprise Module for Public Cloud 15 SP6
+
+
+
+
+ SUSE Manager Proxy 4.3
+
+
+
+
+ SUSE Manager Retail Branch Server 4.3
+
+
+
+
+ SUSE Manager Server 4.3
+
+
+
+
+ openSUSE Leap 15.5
+
+
+
+
+ openSUSE Leap 15.6
+
+
+
+ cluster-md-kmp-default
+
+
+ dlm-kmp-default
+
+
+ gfs2-kmp-default
+
+
+ kernel-default
+
+
+ kernel-default-base
+
+
+ kernel-default-devel
+
+
+ kernel-default-extra
+
+
+ kernel-default-kgraft
+
+
+ kernel-default-kgraft-devel
+
+
+ kernel-default-livepatch
+
+
+ kernel-default-livepatch-devel
+
+
+ kernel-default-man
+
+
+ kernel-default-optional
+
+
+ kernel-default-vdso
+
+
+ kernel-devel
+
+
+ kernel-devel-azure
+
+
+ kernel-devel-rt
+
+
+ kernel-macros
+
+
+ kernel-rt
+
+
+ kernel-source
+
+
+ kernel-source-azure
+
+
+ kernel-source-rt
+
+
+ kernel-source-vanilla
+
+
+ kselftests-kmp-default
+
+
+ ocfs2-kmp-default
+
+
+ reiserfs-kmp-default
+
+
+ cluster-md-kmp-default as a component of SUSE Linux Enterprise High Availability Extension 12 SP5
+
+
+ dlm-kmp-default as a component of SUSE Linux Enterprise High Availability Extension 12 SP5
+
+
+ gfs2-kmp-default as a component of SUSE Linux Enterprise High Availability Extension 12 SP5
+
+
+ ocfs2-kmp-default as a component of SUSE Linux Enterprise High Availability Extension 12 SP5
+
+
+ kernel-default as a component of SUSE Linux Enterprise High Availability Extension 12 SP5
+
+
+ kernel-source as a component of SUSE Linux Enterprise High Availability Extension 12 SP5
+
+
+ kernel-default as a component of SUSE Linux Enterprise High Performance Computing 12 SP5
+
+
+ kernel-source as a component of SUSE Linux Enterprise High Performance Computing 12 SP5
+
+
+ kernel-source-azure as a component of SUSE Linux Enterprise High Performance Computing 12 SP5
+
+
+ kernel-default as a component of SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS
+
+
+ kernel-default-devel as a component of SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS
+
+
+ kernel-devel as a component of SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS
+
+
+ kernel-macros as a component of SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS
+
+
+ kernel-source as a component of SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS
+
+
+ kernel-default as a component of SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS
+
+
+ kernel-default-devel as a component of SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS
+
+
+ reiserfs-kmp-default as a component of SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS
+
+
+ kernel-devel as a component of SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS
+
+
+ kernel-macros as a component of SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS
+
+
+ kernel-source as a component of SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS
+
+
+ kernel-default as a component of SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS
+
+
+ kernel-default-devel as a component of SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS
+
+
+ reiserfs-kmp-default as a component of SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS
+
+
+ kernel-devel as a component of SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS
+
+
+ kernel-macros as a component of SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS
+
+
+ kernel-source as a component of SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS
+
+
+ kernel-default as a component of SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS
+
+
+ kernel-default-devel as a component of SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS
+
+
+ reiserfs-kmp-default as a component of SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS
+
+
+ kernel-devel as a component of SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS
+
+
+ kernel-macros as a component of SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS
+
+
+ kernel-source as a component of SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS
+
+
+ kernel-default-kgraft as a component of SUSE Linux Enterprise Live Patching 12 SP5
+
+
+ kernel-default-kgraft-devel as a component of SUSE Linux Enterprise Live Patching 12 SP5
+
+
+ kernel-default as a component of SUSE Linux Enterprise Live Patching 12 SP5
+
+
+ kernel-source as a component of SUSE Linux Enterprise Live Patching 12 SP5
+
+
+ kernel-default-livepatch as a component of SUSE Linux Enterprise Live Patching 15 SP2
+
+
+ kernel-default-livepatch-devel as a component of SUSE Linux Enterprise Live Patching 15 SP2
+
+
+ kernel-default as a component of SUSE Linux Enterprise Live Patching 15 SP2
+
+
+ kernel-source as a component of SUSE Linux Enterprise Live Patching 15 SP2
+
+
+ kernel-default-livepatch as a component of SUSE Linux Enterprise Live Patching 15 SP3
+
+
+ kernel-default-livepatch-devel as a component of SUSE Linux Enterprise Live Patching 15 SP3
+
+
+ kernel-default as a component of SUSE Linux Enterprise Live Patching 15 SP3
+
+
+ kernel-source as a component of SUSE Linux Enterprise Live Patching 15 SP3
+
+
+ kernel-default-livepatch as a component of SUSE Linux Enterprise Live Patching 15 SP4
+
+
+ kernel-default-livepatch-devel as a component of SUSE Linux Enterprise Live Patching 15 SP4
+
+
+ kernel-default as a component of SUSE Linux Enterprise Live Patching 15 SP4
+
+
+ kernel-source as a component of SUSE Linux Enterprise Live Patching 15 SP4
+
+
+ kernel-default-livepatch as a component of SUSE Linux Enterprise Live Patching 15 SP5
+
+
+ kernel-default-livepatch-devel as a component of SUSE Linux Enterprise Live Patching 15 SP5
+
+
+ kernel-default as a component of SUSE Linux Enterprise Live Patching 15 SP5
+
+
+ kernel-source as a component of SUSE Linux Enterprise Live Patching 15 SP5
+
+
+ kernel-default-livepatch as a component of SUSE Linux Enterprise Live Patching 15 SP6
+
+
+ kernel-default-livepatch-devel as a component of SUSE Linux Enterprise Live Patching 15 SP6
+
+
+ kernel-default as a component of SUSE Linux Enterprise Live Patching 15 SP6
+
+
+ kernel-source as a component of SUSE Linux Enterprise Live Patching 15 SP6
+
+
+ kernel-default as a component of SUSE Linux Enterprise Micro 5.0
+
+
+ kernel-default as a component of SUSE Linux Enterprise Micro 5.1
+
+
+ kernel-rt as a component of SUSE Linux Enterprise Micro 5.1
+
+
+ kernel-source as a component of SUSE Linux Enterprise Micro 5.1
+
+
+ kernel-source-rt as a component of SUSE Linux Enterprise Micro 5.1
+
+
+ kernel-default as a component of SUSE Linux Enterprise Micro 5.2
+
+
+ kernel-rt as a component of SUSE Linux Enterprise Micro 5.2
+
+
+ kernel-source as a component of SUSE Linux Enterprise Micro 5.2
+
+
+ kernel-source-rt as a component of SUSE Linux Enterprise Micro 5.2
+
+
+ kernel-default as a component of SUSE Linux Enterprise Micro 5.3
+
+
+ kernel-rt as a component of SUSE Linux Enterprise Micro 5.3
+
+
+ kernel-source as a component of SUSE Linux Enterprise Micro 5.3
+
+
+ kernel-source-rt as a component of SUSE Linux Enterprise Micro 5.3
+
+
+ kernel-default as a component of SUSE Linux Enterprise Micro 5.4
+
+
+ kernel-rt as a component of SUSE Linux Enterprise Micro 5.4
+
+
+ kernel-source as a component of SUSE Linux Enterprise Micro 5.4
+
+
+ kernel-source-rt as a component of SUSE Linux Enterprise Micro 5.4
+
+
+ kernel-default as a component of SUSE Linux Enterprise Micro 5.5
+
+
+ kernel-source as a component of SUSE Linux Enterprise Micro 5.5
+
+
+ kernel-source-rt as a component of SUSE Linux Enterprise Micro 5.5
+
+
+ kernel-default as a component of SUSE Linux Enterprise Micro 6.0
+
+
+ kernel-devel as a component of SUSE Linux Enterprise Micro 6.0
+
+
+ kernel-macros as a component of SUSE Linux Enterprise Micro 6.0
+
+
+ kernel-source as a component of SUSE Linux Enterprise Micro 6.0
+
+
+ kernel-devel-rt as a component of SUSE Linux Enterprise Micro 6.0
+
+
+ kernel-source-rt as a component of SUSE Linux Enterprise Micro 6.0
+
+
+ kernel-default as a component of SUSE Linux Enterprise Module for Basesystem 15 SP5
+
+
+ kernel-default-devel as a component of SUSE Linux Enterprise Module for Basesystem 15 SP5
+
+
+ kernel-devel as a component of SUSE Linux Enterprise Module for Basesystem 15 SP5
+
+
+ kernel-macros as a component of SUSE Linux Enterprise Module for Basesystem 15 SP5
+
+
+ kernel-source as a component of SUSE Linux Enterprise Module for Basesystem 15 SP5
+
+
+ kernel-default as a component of SUSE Linux Enterprise Module for Basesystem 15 SP6
+
+
+ kernel-default-devel as a component of SUSE Linux Enterprise Module for Basesystem 15 SP6
+
+
+ kernel-devel as a component of SUSE Linux Enterprise Module for Basesystem 15 SP6
+
+
+ kernel-macros as a component of SUSE Linux Enterprise Module for Basesystem 15 SP6
+
+
+ kernel-source as a component of SUSE Linux Enterprise Module for Basesystem 15 SP6
+
+
+ kernel-default as a component of SUSE Linux Enterprise Module for Development Tools 15 SP5
+
+
+ kernel-source as a component of SUSE Linux Enterprise Module for Development Tools 15 SP5
+
+
+ kernel-default as a component of SUSE Linux Enterprise Module for Development Tools 15 SP6
+
+
+ kernel-source as a component of SUSE Linux Enterprise Module for Development Tools 15 SP6
+
+
+ kernel-devel-azure as a component of SUSE Linux Enterprise Module for Public Cloud 15 SP5
+
+
+ kernel-source-azure as a component of SUSE Linux Enterprise Module for Public Cloud 15 SP5
+
+
+ kernel-devel-azure as a component of SUSE Linux Enterprise Module for Public Cloud 15 SP6
+
+
+ kernel-source-azure as a component of SUSE Linux Enterprise Module for Public Cloud 15 SP6
+
+
+ kernel-devel-rt as a component of SUSE Linux Enterprise Real Time 12 SP5
+
+
+ kernel-source-rt as a component of SUSE Linux Enterprise Real Time 12 SP5
+
+
+ kernel-default as a component of SUSE Linux Enterprise Server 11 SP4 LTSS
+
+
+ kernel-source as a component of SUSE Linux Enterprise Server 11 SP4 LTSS
+
+
+ kernel-default as a component of SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE
+
+
+ kernel-default-base as a component of SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE
+
+
+ kernel-default-devel as a component of SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE
+
+
+ kernel-source as a component of SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE
+
+
+ kernel-default as a component of SUSE Linux Enterprise Server 12 SP2-LTSS
+
+
+ kernel-default-base as a component of SUSE Linux Enterprise Server 12 SP2-LTSS
+
+
+ kernel-default-devel as a component of SUSE Linux Enterprise Server 12 SP2-LTSS
+
+
+ kernel-default-man as a component of SUSE Linux Enterprise Server 12 SP2-LTSS
+
+
+ kernel-devel as a component of SUSE Linux Enterprise Server 12 SP2-LTSS
+
+
+ kernel-macros as a component of SUSE Linux Enterprise Server 12 SP2-LTSS
+
+
+ kernel-source as a component of SUSE Linux Enterprise Server 12 SP2-LTSS
+
+
+ kernel-default as a component of SUSE Linux Enterprise Server 12 SP4-LTSS
+
+
+ kernel-default-base as a component of SUSE Linux Enterprise Server 12 SP4-LTSS
+
+
+ kernel-default-devel as a component of SUSE Linux Enterprise Server 12 SP4-LTSS
+
+
+ kernel-default-man as a component of SUSE Linux Enterprise Server 12 SP4-LTSS
+
+
+ kernel-devel as a component of SUSE Linux Enterprise Server 12 SP4-LTSS
+
+
+ kernel-macros as a component of SUSE Linux Enterprise Server 12 SP4-LTSS
+
+
+ kernel-source as a component of SUSE Linux Enterprise Server 12 SP4-LTSS
+
+
+ kernel-default as a component of SUSE Linux Enterprise Server 12 SP5
+
+
+ kernel-default-base as a component of SUSE Linux Enterprise Server 12 SP5
+
+
+ kernel-default-devel as a component of SUSE Linux Enterprise Server 12 SP5
+
+
+ kernel-default-man as a component of SUSE Linux Enterprise Server 12 SP5
+
+
+ kernel-devel as a component of SUSE Linux Enterprise Server 12 SP5
+
+
+ kernel-macros as a component of SUSE Linux Enterprise Server 12 SP5
+
+
+ kernel-source as a component of SUSE Linux Enterprise Server 12 SP5
+
+
+ kernel-devel-azure as a component of SUSE Linux Enterprise Server 12 SP5
+
+
+ kernel-source-azure as a component of SUSE Linux Enterprise Server 12 SP5
+
+
+ kernel-default as a component of SUSE Linux Enterprise Server 12 SP5-LTSS
+
+
+ kernel-default-base as a component of SUSE Linux Enterprise Server 12 SP5-LTSS
+
+
+ kernel-default-devel as a component of SUSE Linux Enterprise Server 12 SP5-LTSS
+
+
+ kernel-default-man as a component of SUSE Linux Enterprise Server 12 SP5-LTSS
+
+
+ kernel-devel as a component of SUSE Linux Enterprise Server 12 SP5-LTSS
+
+
+ kernel-macros as a component of SUSE Linux Enterprise Server 12 SP5-LTSS
+
+
+ kernel-source as a component of SUSE Linux Enterprise Server 12 SP5-LTSS
+
+
+ kernel-devel-azure as a component of SUSE Linux Enterprise Server 12 SP5-LTSS
+
+
+ kernel-source-azure as a component of SUSE Linux Enterprise Server 12 SP5-LTSS
+
+
+ kernel-default as a component of SUSE Linux Enterprise Server 15 SP1-LTSS
+
+
+ kernel-default-base as a component of SUSE Linux Enterprise Server 15 SP1-LTSS
+
+
+ kernel-default-devel as a component of SUSE Linux Enterprise Server 15 SP1-LTSS
+
+
+ kernel-default-man as a component of SUSE Linux Enterprise Server 15 SP1-LTSS
+
+
+ reiserfs-kmp-default as a component of SUSE Linux Enterprise Server 15 SP1-LTSS
+
+
+ kernel-devel as a component of SUSE Linux Enterprise Server 15 SP1-LTSS
+
+
+ kernel-macros as a component of SUSE Linux Enterprise Server 15 SP1-LTSS
+
+
+ kernel-source as a component of SUSE Linux Enterprise Server 15 SP1-LTSS
+
+
+ kernel-default as a component of SUSE Linux Enterprise Server 15 SP2-LTSS
+
+
+ kernel-default-devel as a component of SUSE Linux Enterprise Server 15 SP2-LTSS
+
+
+ reiserfs-kmp-default as a component of SUSE Linux Enterprise Server 15 SP2-LTSS
+
+
+ kernel-devel as a component of SUSE Linux Enterprise Server 15 SP2-LTSS
+
+
+ kernel-macros as a component of SUSE Linux Enterprise Server 15 SP2-LTSS
+
+
+ kernel-source as a component of SUSE Linux Enterprise Server 15 SP2-LTSS
+
+
+ kernel-default as a component of SUSE Linux Enterprise Server 15 SP3-LTSS
+
+
+ kernel-default-devel as a component of SUSE Linux Enterprise Server 15 SP3-LTSS
+
+
+ reiserfs-kmp-default as a component of SUSE Linux Enterprise Server 15 SP3-LTSS
+
+
+ kernel-devel as a component of SUSE Linux Enterprise Server 15 SP3-LTSS
+
+
+ kernel-macros as a component of SUSE Linux Enterprise Server 15 SP3-LTSS
+
+
+ kernel-source as a component of SUSE Linux Enterprise Server 15 SP3-LTSS
+
+
+ kernel-default as a component of SUSE Linux Enterprise Server 15 SP4-LTSS
+
+
+ kernel-default-devel as a component of SUSE Linux Enterprise Server 15 SP4-LTSS
+
+
+ reiserfs-kmp-default as a component of SUSE Linux Enterprise Server 15 SP4-LTSS
+
+
+ kernel-devel as a component of SUSE Linux Enterprise Server 15 SP4-LTSS
+
+
+ kernel-macros as a component of SUSE Linux Enterprise Server 15 SP4-LTSS
+
+
+ kernel-source as a component of SUSE Linux Enterprise Server 15 SP4-LTSS
+
+
+ kernel-default as a component of SUSE Linux Enterprise Server 15-LTSS
+
+
+ kernel-default-base as a component of SUSE Linux Enterprise Server 15-LTSS
+
+
+ kernel-default-devel as a component of SUSE Linux Enterprise Server 15-LTSS
+
+
+ kernel-default-man as a component of SUSE Linux Enterprise Server 15-LTSS
+
+
+ reiserfs-kmp-default as a component of SUSE Linux Enterprise Server 15-LTSS
+
+
+ kernel-devel as a component of SUSE Linux Enterprise Server 15-LTSS
+
+
+ kernel-macros as a component of SUSE Linux Enterprise Server 15-LTSS
+
+
+ kernel-source as a component of SUSE Linux Enterprise Server 15-LTSS
+
+
+ kernel-default as a component of SUSE Linux Enterprise Server Teradata 12 SP3
+
+
+ kernel-source as a component of SUSE Linux Enterprise Server Teradata 12 SP3
+
+
+ kernel-default as a component of SUSE Linux Enterprise Server Teradata 12 SP3-LTSS
+
+
+ kernel-source as a component of SUSE Linux Enterprise Server Teradata 12 SP3-LTSS
+
+
+ kernel-default as a component of SUSE Linux Enterprise Server Teradata 15 SP4
+
+
+ kernel-source as a component of SUSE Linux Enterprise Server Teradata 15 SP4
+
+
+ kernel-default as a component of SUSE Linux Enterprise Server for SAP Applications 12 SP5
+
+
+ kernel-source as a component of SUSE Linux Enterprise Server for SAP Applications 12 SP5
+
+
+ kernel-source-azure as a component of SUSE Linux Enterprise Server for SAP Applications 12 SP5
+
+
+ kernel-default as a component of SUSE Linux Enterprise Server for SAP Applications 15 SP2
+
+
+ kernel-default-devel as a component of SUSE Linux Enterprise Server for SAP Applications 15 SP2
+
+
+ reiserfs-kmp-default as a component of SUSE Linux Enterprise Server for SAP Applications 15 SP2
+
+
+ kernel-devel as a component of SUSE Linux Enterprise Server for SAP Applications 15 SP2
+
+
+ kernel-macros as a component of SUSE Linux Enterprise Server for SAP Applications 15 SP2
+
+
+ kernel-source as a component of SUSE Linux Enterprise Server for SAP Applications 15 SP2
+
+
+ kernel-default as a component of SUSE Linux Enterprise Server for SAP Applications 15 SP3
+
+
+ kernel-default-devel as a component of SUSE Linux Enterprise Server for SAP Applications 15 SP3
+
+
+ reiserfs-kmp-default as a component of SUSE Linux Enterprise Server for SAP Applications 15 SP3
+
+
+ kernel-devel as a component of SUSE Linux Enterprise Server for SAP Applications 15 SP3
+
+
+ kernel-macros as a component of SUSE Linux Enterprise Server for SAP Applications 15 SP3
+
+
+ kernel-source as a component of SUSE Linux Enterprise Server for SAP Applications 15 SP3
+
+
+ kernel-default as a component of SUSE Linux Enterprise Server for SAP Applications 15 SP4
+
+
+ kernel-default-devel as a component of SUSE Linux Enterprise Server for SAP Applications 15 SP4
+
+
+ reiserfs-kmp-default as a component of SUSE Linux Enterprise Server for SAP Applications 15 SP4
+
+
+ kernel-devel as a component of SUSE Linux Enterprise Server for SAP Applications 15 SP4
+
+
+ kernel-macros as a component of SUSE Linux Enterprise Server for SAP Applications 15 SP4
+
+
+ kernel-source as a component of SUSE Linux Enterprise Server for SAP Applications 15 SP4
+
+
+ kernel-default as a component of SUSE Linux Enterprise Software Development Kit 12 SP5
+
+
+ kernel-source as a component of SUSE Linux Enterprise Software Development Kit 12 SP5
+
+
+ kernel-default-extra as a component of SUSE Linux Enterprise Workstation Extension 12 SP5
+
+
+ kernel-default as a component of SUSE Linux Enterprise Workstation Extension 12 SP5
+
+
+ kernel-source as a component of SUSE Linux Enterprise Workstation Extension 12 SP5
+
+
+ kernel-default as a component of SUSE Manager Proxy 4.3
+
+
+ kernel-default-devel as a component of SUSE Manager Proxy 4.3
+
+
+ kernel-devel as a component of SUSE Manager Proxy 4.3
+
+
+ kernel-macros as a component of SUSE Manager Proxy 4.3
+
+
+ kernel-source as a component of SUSE Manager Proxy 4.3
+
+
+ kernel-default as a component of SUSE Manager Retail Branch Server 4.3
+
+
+ kernel-default-devel as a component of SUSE Manager Retail Branch Server 4.3
+
+
+ kernel-devel as a component of SUSE Manager Retail Branch Server 4.3
+
+
+ kernel-macros as a component of SUSE Manager Retail Branch Server 4.3
+
+
+ kernel-source as a component of SUSE Manager Retail Branch Server 4.3
+
+
+ kernel-default as a component of SUSE Manager Server 4.3
+
+
+ kernel-default-devel as a component of SUSE Manager Server 4.3
+
+
+ kernel-devel as a component of SUSE Manager Server 4.3
+
+
+ kernel-macros as a component of SUSE Manager Server 4.3
+
+
+ kernel-source as a component of SUSE Manager Server 4.3
+
+
+ kernel-devel-rt as a component of SUSE Real Time Module 15 SP5
+
+
+ kernel-source-rt as a component of SUSE Real Time Module 15 SP5
+
+
+ cluster-md-kmp-default as a component of openSUSE Leap 15.5
+
+
+ dlm-kmp-default as a component of openSUSE Leap 15.5
+
+
+ gfs2-kmp-default as a component of openSUSE Leap 15.5
+
+
+ kernel-default as a component of openSUSE Leap 15.5
+
+
+ kernel-default-devel as a component of openSUSE Leap 15.5
+
+
+ kernel-default-extra as a component of openSUSE Leap 15.5
+
+
+ kernel-default-livepatch as a component of openSUSE Leap 15.5
+
+
+ kernel-default-livepatch-devel as a component of openSUSE Leap 15.5
+
+
+ kernel-default-optional as a component of openSUSE Leap 15.5
+
+
+ kernel-default-vdso as a component of openSUSE Leap 15.5
+
+
+ kselftests-kmp-default as a component of openSUSE Leap 15.5
+
+
+ ocfs2-kmp-default as a component of openSUSE Leap 15.5
+
+
+ reiserfs-kmp-default as a component of openSUSE Leap 15.5
+
+
+ kernel-devel as a component of openSUSE Leap 15.5
+
+
+ kernel-macros as a component of openSUSE Leap 15.5
+
+
+ kernel-source as a component of openSUSE Leap 15.5
+
+
+ kernel-source-vanilla as a component of openSUSE Leap 15.5
+
+
+ cluster-md-kmp-default as a component of openSUSE Leap 15.6
+
+
+ dlm-kmp-default as a component of openSUSE Leap 15.6
+
+
+ gfs2-kmp-default as a component of openSUSE Leap 15.6
+
+
+ kernel-default as a component of openSUSE Leap 15.6
+
+
+ kernel-default-devel as a component of openSUSE Leap 15.6
+
+
+ kernel-default-extra as a component of openSUSE Leap 15.6
+
+
+ kernel-default-livepatch as a component of openSUSE Leap 15.6
+
+
+ kernel-default-livepatch-devel as a component of openSUSE Leap 15.6
+
+
+ kernel-default-optional as a component of openSUSE Leap 15.6
+
+
+ kernel-default-vdso as a component of openSUSE Leap 15.6
+
+
+ kselftests-kmp-default as a component of openSUSE Leap 15.6
+
+
+ ocfs2-kmp-default as a component of openSUSE Leap 15.6
+
+
+ reiserfs-kmp-default as a component of openSUSE Leap 15.6
+
+
+ kernel-devel as a component of openSUSE Leap 15.6
+
+
+ kernel-macros as a component of openSUSE Leap 15.6
+
+
+ kernel-source as a component of openSUSE Leap 15.6
+
+
+ kernel-source-vanilla as a component of openSUSE Leap 15.6
+
+
In the Linux kernel, the following vulnerability has been resolved:
@@ -103,7 +1267,16 @@
This patch adds restriction for tail call to prevent such bypasses.
CVE-2024-50063
-
+
+
+ SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-default
+ SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-default-base
+ SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-default-devel
+ SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-source
+ SUSE Linux Enterprise Server 11 SP4 LTSS:kernel-default
+ SUSE Linux Enterprise Server 11 SP4 LTSS:kernel-source
+
+
moderate
skipping CVE-2024-50062 as CVE page is older than CVRF-CVE file.
--- /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2024-50060.xml 2024-10-24 01:10:17.400062000 +0200
+++ /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2024-50060.xml.new 2024-10-29 01:10:30.361213000 +0100
@@ -14,13 +14,13 @@
1
- 2
- 2024-10-23T23:10:17Z
+ 3
+ 2024-10-29T00:10:29Z
current
2024-10-21T23:11:07Z
- 2024-10-23T23:10:17Z
+ 2024-10-29T00:10:29Z
cve-database/bin/generate-cvrf-cve.pl
2020-12-27T01:00:00Z
@@ -75,5 +75,11 @@
moderate
+
+
+ 5.5
+ CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
+
+
skipping CVE-2024-50058 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-50057 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-50056 as CVE page is older than CVRF-CVE file.
--- /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2024-50055.xml 2024-10-26 01:10:18.367061000 +0200
+++ /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2024-50055.xml.new 2024-10-29 01:10:31.672171000 +0100
@@ -14,13 +14,13 @@
1
- 4
- 2024-10-25T23:10:18Z
+ 5
+ 2024-10-29T00:10:31Z
current
2024-10-21T23:11:10Z
- 2024-10-25T23:10:18Z
+ 2024-10-29T00:10:31Z
cve-database/bin/generate-cvrf-cve.pl
2020-12-27T01:00:00Z
@@ -44,6 +44,14 @@
+
+
+ SUSE Linux Enterprise Module for Basesystem 15 SP5
+
+
+ SUSE Linux Enterprise Module for Development Tools 15 SP5
+
+
SUSE Linux Enterprise Module for Basesystem 15 SP6
@@ -52,6 +60,47 @@
SUSE Linux Enterprise Module for Development Tools 15 SP6
+
+
+ SUSE Linux Enterprise High Availability Extension 12 SP5
+
+
+
+
+ SUSE Linux Enterprise High Performance Computing 12 SP5
+
+
+
+
+ SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS
+
+
+
+
+ SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS
+
+
+
+
+ SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS
+
+
+
+
+ SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS
+
+
+
+
+ SUSE Linux Enterprise Module for Basesystem 15 SP5
+
+
+ SUSE Linux Enterprise Module for Development Tools 15 SP5
+
+
+ SUSE Linux Enterprise Module for Public Cloud 15 SP5
+
+
SUSE Linux Enterprise Module for Basesystem 15 SP6
@@ -63,16 +112,148 @@
SUSE Linux Enterprise Module for Public Cloud 15 SP6
+
+
+ SUSE Linux Enterprise Live Patching 12 SP5
+
+
+
+
+ SUSE Linux Enterprise Live Patching 15 SP2
+
+
+
+
+ SUSE Linux Enterprise Live Patching 15 SP3
+
+
+
+
+ SUSE Linux Enterprise Live Patching 15 SP4
+
+
+
+
+ SUSE Linux Enterprise Live Patching 15 SP5
+
+
SUSE Linux Enterprise Live Patching 15 SP6
+
+
+ SUSE Linux Enterprise Micro 5.0
+
+
+
+
+ SUSE Linux Enterprise Micro 5.1
+
+
+
+
+ SUSE Linux Enterprise Micro 5.2
+
+
+
+
+ SUSE Linux Enterprise Micro 5.3
+
+
+
+
+ SUSE Linux Enterprise Micro 5.4
+
+
+
+
+ SUSE Linux Enterprise Micro 5.5
+
+
SUSE Linux Enterprise Micro 6.0
+
+
+ SUSE Linux Enterprise Real Time 12 SP5
+
+
+
+
+ SUSE Real Time Module 15 SP5
+
+
+
+
+ SUSE Linux Enterprise Server 11 SP4 LTSS
+
+
+
+
+ SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE
+
+
+
+
+ SUSE Linux Enterprise Server 12 SP2-LTSS
+
+
+
+
+ SUSE Linux Enterprise Server 12 SP4-LTSS
+
+
+
+
+ SUSE Linux Enterprise Server 12 SP5
+
+
+ SUSE Linux Enterprise Software Development Kit 12 SP5
+
+
+ SUSE Linux Enterprise Workstation Extension 12 SP5
+
+
+
+
+ SUSE Linux Enterprise Server 12 SP5-LTSS
+
+
+
+
+ SUSE Linux Enterprise Server 15 SP1-LTSS
+
+
+
+
+ SUSE Linux Enterprise Server 15 SP2-LTSS
+
+
+
+
+ SUSE Linux Enterprise Server 15 SP3-LTSS
+
+
+
+
+ SUSE Linux Enterprise Server 15 SP4-LTSS
+
+
+
+
+ SUSE Linux Enterprise Module for Basesystem 15 SP5
+
+
+ SUSE Linux Enterprise Module for Development Tools 15 SP5
+
+
+ SUSE Linux Enterprise Module for Public Cloud 15 SP5
+
+
SUSE Linux Enterprise Module for Basesystem 15 SP6
@@ -84,6 +265,58 @@
SUSE Linux Enterprise Module for Public Cloud 15 SP6
+
+
+ SUSE Linux Enterprise Server Teradata 12 SP3
+
+
+
+
+ SUSE Linux Enterprise Server Teradata 12 SP3-LTSS
+
+
+
+
+ SUSE Linux Enterprise Server Teradata 15 SP4
+
+
+
+
+ SUSE Linux Enterprise Server for SAP Applications 12 SP5
+
+
+ SUSE Linux Enterprise Software Development Kit 12 SP5
+
+
+ SUSE Linux Enterprise Workstation Extension 12 SP5
+
+
+
+
+ SUSE Linux Enterprise Server for SAP Applications 15 SP2
+
+
+
+
+ SUSE Linux Enterprise Server for SAP Applications 15 SP3
+
+
+
+
+ SUSE Linux Enterprise Server for SAP Applications 15 SP4
+
+
+
+
+ SUSE Linux Enterprise Module for Basesystem 15 SP5
+
+
+ SUSE Linux Enterprise Module for Development Tools 15 SP5
+
+
+ SUSE Linux Enterprise Module for Public Cloud 15 SP5
+
+
SUSE Linux Enterprise Module for Basesystem 15 SP6
@@ -95,18 +328,73 @@
SUSE Linux Enterprise Module for Public Cloud 15 SP6
+
+
+ SUSE Manager Proxy 4.3
+
+
+
+
+ SUSE Manager Retail Branch Server 4.3
+
+
+
+
+ SUSE Manager Server 4.3
+
+
+
+
+ openSUSE Leap 15.5
+
+
+
+
+ openSUSE Leap 15.6
+
+
+
+ cluster-md-kmp-default
+
+
+ dlm-kmp-default
+
+
+ gfs2-kmp-default
+
kernel-default
+
+ kernel-default-base
+
kernel-default-devel
+
+ kernel-default-extra
+
+
+ kernel-default-kgraft
+
+
+ kernel-default-kgraft-devel
+
kernel-default-livepatch
kernel-default-livepatch-devel
+
+ kernel-default-man
+
+
+ kernel-default-optional
+
+
+ kernel-default-vdso
+
kernel-devel
@@ -119,6 +407,9 @@
kernel-macros
+
+ kernel-rt
+
kernel-source
@@ -128,6 +419,174 @@
kernel-source-rt
+
+ kernel-source-vanilla
+
+
+ kselftests-kmp-default
+
+
+ ocfs2-kmp-default
+
+
+ reiserfs-kmp-default
+
+
+ cluster-md-kmp-default as a component of SUSE Linux Enterprise High Availability Extension 12 SP5
+
+
+ dlm-kmp-default as a component of SUSE Linux Enterprise High Availability Extension 12 SP5
+
+
+ gfs2-kmp-default as a component of SUSE Linux Enterprise High Availability Extension 12 SP5
+
+
+ ocfs2-kmp-default as a component of SUSE Linux Enterprise High Availability Extension 12 SP5
+
+
+ kernel-default as a component of SUSE Linux Enterprise High Availability Extension 12 SP5
+
+
+ kernel-source as a component of SUSE Linux Enterprise High Availability Extension 12 SP5
+
+
+ kernel-default as a component of SUSE Linux Enterprise High Performance Computing 12 SP5
+
+
+ kernel-source as a component of SUSE Linux Enterprise High Performance Computing 12 SP5
+
+
+ kernel-source-azure as a component of SUSE Linux Enterprise High Performance Computing 12 SP5
+
+
+ kernel-default as a component of SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS
+
+
+ kernel-default-devel as a component of SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS
+
+
+ kernel-devel as a component of SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS
+
+
+ kernel-macros as a component of SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS
+
+
+ kernel-source as a component of SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS
+
+
+ kernel-default as a component of SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS
+
+
+ kernel-default-devel as a component of SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS
+
+
+ reiserfs-kmp-default as a component of SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS
+
+
+ kernel-devel as a component of SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS
+
+
+ kernel-macros as a component of SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS
+
+
+ kernel-source as a component of SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS
+
+
+ kernel-default as a component of SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS
+
+
+ kernel-default-devel as a component of SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS
+
+
+ reiserfs-kmp-default as a component of SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS
+
+
+ kernel-devel as a component of SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS
+
+
+ kernel-macros as a component of SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS
+
+
+ kernel-source as a component of SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS
+
+
+ kernel-default as a component of SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS
+
+
+ kernel-default-devel as a component of SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS
+
+
+ reiserfs-kmp-default as a component of SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS
+
+
+ kernel-devel as a component of SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS
+
+
+ kernel-macros as a component of SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS
+
+
+ kernel-source as a component of SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS
+
+
+ kernel-default-kgraft as a component of SUSE Linux Enterprise Live Patching 12 SP5
+
+
+ kernel-default-kgraft-devel as a component of SUSE Linux Enterprise Live Patching 12 SP5
+
+
+ kernel-default as a component of SUSE Linux Enterprise Live Patching 12 SP5
+
+
+ kernel-source as a component of SUSE Linux Enterprise Live Patching 12 SP5
+
+
+ kernel-default-livepatch as a component of SUSE Linux Enterprise Live Patching 15 SP2
+
+
+ kernel-default-livepatch-devel as a component of SUSE Linux Enterprise Live Patching 15 SP2
+
+
+ kernel-default as a component of SUSE Linux Enterprise Live Patching 15 SP2
+
+
+ kernel-source as a component of SUSE Linux Enterprise Live Patching 15 SP2
+
+
+ kernel-default-livepatch as a component of SUSE Linux Enterprise Live Patching 15 SP3
+
+
+ kernel-default-livepatch-devel as a component of SUSE Linux Enterprise Live Patching 15 SP3
+
+
+ kernel-default as a component of SUSE Linux Enterprise Live Patching 15 SP3
+
+
+ kernel-source as a component of SUSE Linux Enterprise Live Patching 15 SP3
+
+
+ kernel-default-livepatch as a component of SUSE Linux Enterprise Live Patching 15 SP4
+
+
+ kernel-default-livepatch-devel as a component of SUSE Linux Enterprise Live Patching 15 SP4
+
+
+ kernel-default as a component of SUSE Linux Enterprise Live Patching 15 SP4
+
+
+ kernel-source as a component of SUSE Linux Enterprise Live Patching 15 SP4
+
+
+ kernel-default-livepatch as a component of SUSE Linux Enterprise Live Patching 15 SP5
+
+
+ kernel-default-livepatch-devel as a component of SUSE Linux Enterprise Live Patching 15 SP5
+
+
+ kernel-default as a component of SUSE Linux Enterprise Live Patching 15 SP5
+
+
+ kernel-source as a component of SUSE Linux Enterprise Live Patching 15 SP5
+
kernel-default-livepatch as a component of SUSE Linux Enterprise Live Patching 15 SP6
@@ -140,6 +599,66 @@
kernel-source as a component of SUSE Linux Enterprise Live Patching 15 SP6
+
+ kernel-default as a component of SUSE Linux Enterprise Micro 5.0
+
+
+ kernel-default as a component of SUSE Linux Enterprise Micro 5.1
+
+
+ kernel-rt as a component of SUSE Linux Enterprise Micro 5.1
+
+
+ kernel-source as a component of SUSE Linux Enterprise Micro 5.1
+
+
+ kernel-source-rt as a component of SUSE Linux Enterprise Micro 5.1
+
+
+ kernel-default as a component of SUSE Linux Enterprise Micro 5.2
+
+
+ kernel-rt as a component of SUSE Linux Enterprise Micro 5.2
+
+
+ kernel-source as a component of SUSE Linux Enterprise Micro 5.2
+
+
+ kernel-source-rt as a component of SUSE Linux Enterprise Micro 5.2
+
+
+ kernel-default as a component of SUSE Linux Enterprise Micro 5.3
+
+
+ kernel-rt as a component of SUSE Linux Enterprise Micro 5.3
+
+
+ kernel-source as a component of SUSE Linux Enterprise Micro 5.3
+
+
+ kernel-source-rt as a component of SUSE Linux Enterprise Micro 5.3
+
+
+ kernel-default as a component of SUSE Linux Enterprise Micro 5.4
+
+
+ kernel-rt as a component of SUSE Linux Enterprise Micro 5.4
+
+
+ kernel-source as a component of SUSE Linux Enterprise Micro 5.4
+
+
+ kernel-source-rt as a component of SUSE Linux Enterprise Micro 5.4
+
+
+ kernel-default as a component of SUSE Linux Enterprise Micro 5.5
+
+
+ kernel-source as a component of SUSE Linux Enterprise Micro 5.5
+
+
+ kernel-source-rt as a component of SUSE Linux Enterprise Micro 5.5
+
kernel-default as a component of SUSE Linux Enterprise Micro 6.0
@@ -158,6 +677,21 @@
kernel-source-rt as a component of SUSE Linux Enterprise Micro 6.0
+
+ kernel-default as a component of SUSE Linux Enterprise Module for Basesystem 15 SP5
+
+
+ kernel-default-devel as a component of SUSE Linux Enterprise Module for Basesystem 15 SP5
+
+
+ kernel-devel as a component of SUSE Linux Enterprise Module for Basesystem 15 SP5
+
+
+ kernel-macros as a component of SUSE Linux Enterprise Module for Basesystem 15 SP5
+
+
+ kernel-source as a component of SUSE Linux Enterprise Module for Basesystem 15 SP5
+
kernel-default as a component of SUSE Linux Enterprise Module for Basesystem 15 SP6
@@ -173,18 +707,477 @@
kernel-source as a component of SUSE Linux Enterprise Module for Basesystem 15 SP6
+
+ kernel-default as a component of SUSE Linux Enterprise Module for Development Tools 15 SP5
+
+
+ kernel-source as a component of SUSE Linux Enterprise Module for Development Tools 15 SP5
+
kernel-default as a component of SUSE Linux Enterprise Module for Development Tools 15 SP6
kernel-source as a component of SUSE Linux Enterprise Module for Development Tools 15 SP6
+
+ kernel-devel-azure as a component of SUSE Linux Enterprise Module for Public Cloud 15 SP5
+
+
+ kernel-source-azure as a component of SUSE Linux Enterprise Module for Public Cloud 15 SP5
+
kernel-devel-azure as a component of SUSE Linux Enterprise Module for Public Cloud 15 SP6
kernel-source-azure as a component of SUSE Linux Enterprise Module for Public Cloud 15 SP6
+
+ kernel-devel-rt as a component of SUSE Linux Enterprise Real Time 12 SP5
+
+
+ kernel-source-rt as a component of SUSE Linux Enterprise Real Time 12 SP5
+
+
+ kernel-default as a component of SUSE Linux Enterprise Server 11 SP4 LTSS
+
+
+ kernel-source as a component of SUSE Linux Enterprise Server 11 SP4 LTSS
+
+
+ kernel-default as a component of SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE
+
+
+ kernel-default-base as a component of SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE
+
+
+ kernel-default-devel as a component of SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE
+
+
+ kernel-source as a component of SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE
+
+
+ kernel-default as a component of SUSE Linux Enterprise Server 12 SP2-LTSS
+
+
+ kernel-default-base as a component of SUSE Linux Enterprise Server 12 SP2-LTSS
+
+
+ kernel-default-devel as a component of SUSE Linux Enterprise Server 12 SP2-LTSS
+
+
+ kernel-default-man as a component of SUSE Linux Enterprise Server 12 SP2-LTSS
+
+
+ kernel-devel as a component of SUSE Linux Enterprise Server 12 SP2-LTSS
+
+
+ kernel-macros as a component of SUSE Linux Enterprise Server 12 SP2-LTSS
+
+
+ kernel-source as a component of SUSE Linux Enterprise Server 12 SP2-LTSS
+
+
+ kernel-default as a component of SUSE Linux Enterprise Server 12 SP4-LTSS
+
+
+ kernel-default-base as a component of SUSE Linux Enterprise Server 12 SP4-LTSS
+
+
+ kernel-default-devel as a component of SUSE Linux Enterprise Server 12 SP4-LTSS
+
+
+ kernel-default-man as a component of SUSE Linux Enterprise Server 12 SP4-LTSS
+
+
+ kernel-devel as a component of SUSE Linux Enterprise Server 12 SP4-LTSS
+
+
+ kernel-macros as a component of SUSE Linux Enterprise Server 12 SP4-LTSS
+
+
+ kernel-source as a component of SUSE Linux Enterprise Server 12 SP4-LTSS
+
+
+ kernel-default as a component of SUSE Linux Enterprise Server 12 SP5
+
+
+ kernel-default-base as a component of SUSE Linux Enterprise Server 12 SP5
+
+
+ kernel-default-devel as a component of SUSE Linux Enterprise Server 12 SP5
+
+
+ kernel-default-man as a component of SUSE Linux Enterprise Server 12 SP5
+
+
+ kernel-devel as a component of SUSE Linux Enterprise Server 12 SP5
+
+
+ kernel-macros as a component of SUSE Linux Enterprise Server 12 SP5
+
+
+ kernel-source as a component of SUSE Linux Enterprise Server 12 SP5
+
+
+ kernel-devel-azure as a component of SUSE Linux Enterprise Server 12 SP5
+
+
+ kernel-source-azure as a component of SUSE Linux Enterprise Server 12 SP5
+
+
+ kernel-default as a component of SUSE Linux Enterprise Server 12 SP5-LTSS
+
+
+ kernel-default-base as a component of SUSE Linux Enterprise Server 12 SP5-LTSS
+
+
+ kernel-default-devel as a component of SUSE Linux Enterprise Server 12 SP5-LTSS
+
+
+ kernel-default-man as a component of SUSE Linux Enterprise Server 12 SP5-LTSS
+
+
+ kernel-devel as a component of SUSE Linux Enterprise Server 12 SP5-LTSS
+
+
+ kernel-macros as a component of SUSE Linux Enterprise Server 12 SP5-LTSS
+
+
+ kernel-source as a component of SUSE Linux Enterprise Server 12 SP5-LTSS
+
+
+ kernel-devel-azure as a component of SUSE Linux Enterprise Server 12 SP5-LTSS
+
+
+ kernel-source-azure as a component of SUSE Linux Enterprise Server 12 SP5-LTSS
+
+
+ kernel-default as a component of SUSE Linux Enterprise Server 15 SP1-LTSS
+
+
+ kernel-default-base as a component of SUSE Linux Enterprise Server 15 SP1-LTSS
+
+
+ kernel-default-devel as a component of SUSE Linux Enterprise Server 15 SP1-LTSS
+
+
+ kernel-default-man as a component of SUSE Linux Enterprise Server 15 SP1-LTSS
+
+
+ reiserfs-kmp-default as a component of SUSE Linux Enterprise Server 15 SP1-LTSS
+
+
+ kernel-devel as a component of SUSE Linux Enterprise Server 15 SP1-LTSS
+
+
+ kernel-macros as a component of SUSE Linux Enterprise Server 15 SP1-LTSS
+
+
+ kernel-source as a component of SUSE Linux Enterprise Server 15 SP1-LTSS
+
+
+ kernel-default as a component of SUSE Linux Enterprise Server 15 SP2-LTSS
+
+
+ kernel-default-devel as a component of SUSE Linux Enterprise Server 15 SP2-LTSS
+
+
+ reiserfs-kmp-default as a component of SUSE Linux Enterprise Server 15 SP2-LTSS
+
+
+ kernel-devel as a component of SUSE Linux Enterprise Server 15 SP2-LTSS
+
+
+ kernel-macros as a component of SUSE Linux Enterprise Server 15 SP2-LTSS
+
+
+ kernel-source as a component of SUSE Linux Enterprise Server 15 SP2-LTSS
+
+
+ kernel-default as a component of SUSE Linux Enterprise Server 15 SP3-LTSS
+
+
+ kernel-default-devel as a component of SUSE Linux Enterprise Server 15 SP3-LTSS
+
+
+ reiserfs-kmp-default as a component of SUSE Linux Enterprise Server 15 SP3-LTSS
+
+
+ kernel-devel as a component of SUSE Linux Enterprise Server 15 SP3-LTSS
+
+
+ kernel-macros as a component of SUSE Linux Enterprise Server 15 SP3-LTSS
+
+
+ kernel-source as a component of SUSE Linux Enterprise Server 15 SP3-LTSS
+
+
+ kernel-default as a component of SUSE Linux Enterprise Server 15 SP4-LTSS
+
+
+ kernel-default-devel as a component of SUSE Linux Enterprise Server 15 SP4-LTSS
+
+
+ reiserfs-kmp-default as a component of SUSE Linux Enterprise Server 15 SP4-LTSS
+
+
+ kernel-devel as a component of SUSE Linux Enterprise Server 15 SP4-LTSS
+
+
+ kernel-macros as a component of SUSE Linux Enterprise Server 15 SP4-LTSS
+
+
+ kernel-source as a component of SUSE Linux Enterprise Server 15 SP4-LTSS
+
+
+ kernel-default as a component of SUSE Linux Enterprise Server Teradata 12 SP3
+
+
+ kernel-source as a component of SUSE Linux Enterprise Server Teradata 12 SP3
+
+
+ kernel-default as a component of SUSE Linux Enterprise Server Teradata 12 SP3-LTSS
+
+
+ kernel-source as a component of SUSE Linux Enterprise Server Teradata 12 SP3-LTSS
+
+
+ kernel-default as a component of SUSE Linux Enterprise Server Teradata 15 SP4
+
+
+ kernel-source as a component of SUSE Linux Enterprise Server Teradata 15 SP4
+
+
+ kernel-default as a component of SUSE Linux Enterprise Server for SAP Applications 12 SP5
+
+
+ kernel-source as a component of SUSE Linux Enterprise Server for SAP Applications 12 SP5
+
+
+ kernel-source-azure as a component of SUSE Linux Enterprise Server for SAP Applications 12 SP5
+
+
+ kernel-default as a component of SUSE Linux Enterprise Server for SAP Applications 15 SP2
+
+
+ kernel-default-devel as a component of SUSE Linux Enterprise Server for SAP Applications 15 SP2
+
+
+ reiserfs-kmp-default as a component of SUSE Linux Enterprise Server for SAP Applications 15 SP2
+
+
+ kernel-devel as a component of SUSE Linux Enterprise Server for SAP Applications 15 SP2
+
+
+ kernel-macros as a component of SUSE Linux Enterprise Server for SAP Applications 15 SP2
+
+
+ kernel-source as a component of SUSE Linux Enterprise Server for SAP Applications 15 SP2
+
+
+ kernel-default as a component of SUSE Linux Enterprise Server for SAP Applications 15 SP3
+
+
+ kernel-default-devel as a component of SUSE Linux Enterprise Server for SAP Applications 15 SP3
+
+
+ reiserfs-kmp-default as a component of SUSE Linux Enterprise Server for SAP Applications 15 SP3
+
+
+ kernel-devel as a component of SUSE Linux Enterprise Server for SAP Applications 15 SP3
+
+
+ kernel-macros as a component of SUSE Linux Enterprise Server for SAP Applications 15 SP3
+
+
+ kernel-source as a component of SUSE Linux Enterprise Server for SAP Applications 15 SP3
+
+
+ kernel-default as a component of SUSE Linux Enterprise Server for SAP Applications 15 SP4
+
+
+ kernel-default-devel as a component of SUSE Linux Enterprise Server for SAP Applications 15 SP4
+
+
+ reiserfs-kmp-default as a component of SUSE Linux Enterprise Server for SAP Applications 15 SP4
+
+
+ kernel-devel as a component of SUSE Linux Enterprise Server for SAP Applications 15 SP4
+
+
+ kernel-macros as a component of SUSE Linux Enterprise Server for SAP Applications 15 SP4
+
+
+ kernel-source as a component of SUSE Linux Enterprise Server for SAP Applications 15 SP4
+
+
+ kernel-default as a component of SUSE Linux Enterprise Software Development Kit 12 SP5
+
+
+ kernel-source as a component of SUSE Linux Enterprise Software Development Kit 12 SP5
+
+
+ kernel-default-extra as a component of SUSE Linux Enterprise Workstation Extension 12 SP5
+
+
+ kernel-default as a component of SUSE Linux Enterprise Workstation Extension 12 SP5
+
+
+ kernel-source as a component of SUSE Linux Enterprise Workstation Extension 12 SP5
+
+
+ kernel-default as a component of SUSE Manager Proxy 4.3
+
+
+ kernel-default-devel as a component of SUSE Manager Proxy 4.3
+
+
+ kernel-devel as a component of SUSE Manager Proxy 4.3
+
+
+ kernel-macros as a component of SUSE Manager Proxy 4.3
+
+
+ kernel-source as a component of SUSE Manager Proxy 4.3
+
+
+ kernel-default as a component of SUSE Manager Retail Branch Server 4.3
+
+
+ kernel-default-devel as a component of SUSE Manager Retail Branch Server 4.3
+
+
+ kernel-devel as a component of SUSE Manager Retail Branch Server 4.3
+
+
+ kernel-macros as a component of SUSE Manager Retail Branch Server 4.3
+
+
+ kernel-source as a component of SUSE Manager Retail Branch Server 4.3
+
+
+ kernel-default as a component of SUSE Manager Server 4.3
+
+
+ kernel-default-devel as a component of SUSE Manager Server 4.3
+
+
+ kernel-devel as a component of SUSE Manager Server 4.3
+
+
+ kernel-macros as a component of SUSE Manager Server 4.3
+
+
+ kernel-source as a component of SUSE Manager Server 4.3
+
+
+ kernel-devel-rt as a component of SUSE Real Time Module 15 SP5
+
+
+ kernel-source-rt as a component of SUSE Real Time Module 15 SP5
+
+
+ cluster-md-kmp-default as a component of openSUSE Leap 15.5
+
+
+ dlm-kmp-default as a component of openSUSE Leap 15.5
+
+
+ gfs2-kmp-default as a component of openSUSE Leap 15.5
+
+
+ kernel-default as a component of openSUSE Leap 15.5
+
+
+ kernel-default-devel as a component of openSUSE Leap 15.5
+
+
+ kernel-default-extra as a component of openSUSE Leap 15.5
+
+
+ kernel-default-livepatch as a component of openSUSE Leap 15.5
+
+
+ kernel-default-livepatch-devel as a component of openSUSE Leap 15.5
+
+
+ kernel-default-optional as a component of openSUSE Leap 15.5
+
+
+ kernel-default-vdso as a component of openSUSE Leap 15.5
+
+
+ kselftests-kmp-default as a component of openSUSE Leap 15.5
+
+
+ ocfs2-kmp-default as a component of openSUSE Leap 15.5
+
+
+ reiserfs-kmp-default as a component of openSUSE Leap 15.5
+
+
+ kernel-devel as a component of openSUSE Leap 15.5
+
+
+ kernel-macros as a component of openSUSE Leap 15.5
+
+
+ kernel-source as a component of openSUSE Leap 15.5
+
+
+ kernel-source-vanilla as a component of openSUSE Leap 15.5
+
+
+ cluster-md-kmp-default as a component of openSUSE Leap 15.6
+
+
+ dlm-kmp-default as a component of openSUSE Leap 15.6
+
+
+ gfs2-kmp-default as a component of openSUSE Leap 15.6
+
+
+ kernel-default as a component of openSUSE Leap 15.6
+
+
+ kernel-default-devel as a component of openSUSE Leap 15.6
+
+
+ kernel-default-extra as a component of openSUSE Leap 15.6
+
+
+ kernel-default-livepatch as a component of openSUSE Leap 15.6
+
+
+ kernel-default-livepatch-devel as a component of openSUSE Leap 15.6
+
+
+ kernel-default-optional as a component of openSUSE Leap 15.6
+
+
+ kernel-default-vdso as a component of openSUSE Leap 15.6
+
+
+ kselftests-kmp-default as a component of openSUSE Leap 15.6
+
+
+ ocfs2-kmp-default as a component of openSUSE Leap 15.6
+
+
+ reiserfs-kmp-default as a component of openSUSE Leap 15.6
+
+
+ kernel-devel as a component of openSUSE Leap 15.6
+
+
+ kernel-macros as a component of openSUSE Leap 15.6
+
+
+ kernel-source as a component of openSUSE Leap 15.6
+
+
+ kernel-source-vanilla as a component of openSUSE Leap 15.6
+
skipping CVE-2024-50049 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-50048 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-50035 as CVE page is older than CVRF-CVE file.
--- /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2024-50016.xml 2024-10-24 01:10:23.264393000 +0200
+++ /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2024-50016.xml.new 2024-10-29 01:10:53.718042000 +0100
@@ -14,13 +14,13 @@
1
- 2
- 2024-10-23T23:10:23Z
+ 3
+ 2024-10-29T00:10:53Z
current
2024-10-21T23:11:25Z
- 2024-10-23T23:10:23Z
+ 2024-10-29T00:10:53Z
cve-database/bin/generate-cvrf-cve.pl
2020-12-27T01:00:00Z
@@ -69,5 +69,11 @@
moderate
+
+
+ 5.5
+ CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
+
+
--- /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2024-50014.xml 2024-10-24 01:10:24.296219000 +0200
+++ /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2024-50014.xml.new 2024-10-29 01:10:55.108911000 +0100
@@ -14,13 +14,13 @@
1
- 2
- 2024-10-23T23:10:24Z
+ 3
+ 2024-10-29T00:10:54Z
current
2024-10-21T23:11:26Z
- 2024-10-23T23:10:24Z
+ 2024-10-29T00:10:54Z
cve-database/bin/generate-cvrf-cve.pl
2020-12-27T01:00:00Z
@@ -78,7 +78,1230 @@
SUSE Security Ratings
-
+
+
+
+ SUSE Linux Enterprise Module for Basesystem 15 SP5
+
+
+ SUSE Linux Enterprise Module for Development Tools 15 SP5
+
+
+
+
+ SUSE Linux Enterprise Module for Basesystem 15 SP6
+
+
+ SUSE Linux Enterprise Module for Development Tools 15 SP6
+
+
+
+
+ SUSE Linux Enterprise High Availability Extension 12 SP5
+
+
+
+
+ SUSE Linux Enterprise Module for Public Cloud 12
+
+
+
+
+ SUSE Linux Enterprise High Performance Computing 12 SP5
+
+
+
+
+ SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS
+
+
+
+
+ SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS
+
+
+
+
+ SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS
+
+
+
+
+ SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS
+
+
+
+
+ SUSE Linux Enterprise Module for Basesystem 15 SP5
+
+
+ SUSE Linux Enterprise Module for Development Tools 15 SP5
+
+
+ SUSE Linux Enterprise Module for Public Cloud 15 SP5
+
+
+
+
+ SUSE Linux Enterprise Module for Basesystem 15 SP6
+
+
+ SUSE Linux Enterprise Module for Development Tools 15 SP6
+
+
+ SUSE Linux Enterprise Module for Public Cloud 15 SP6
+
+
+
+
+ SUSE Linux Enterprise Live Patching 12 SP5
+
+
+
+
+ SUSE Linux Enterprise Live Patching 15 SP2
+
+
+
+
+ SUSE Linux Enterprise Live Patching 15 SP3
+
+
+
+
+ SUSE Linux Enterprise Live Patching 15 SP4
+
+
+
+
+ SUSE Linux Enterprise Live Patching 15 SP5
+
+
+
+
+ SUSE Linux Enterprise Live Patching 15 SP6
+
+
+
+
+ SUSE Linux Enterprise Micro 5.0
+
+
+
+
+ SUSE Linux Enterprise Micro 5.1
+
+
+
+
+ SUSE Linux Enterprise Micro 5.2
+
+
+
+
+ SUSE Linux Enterprise Micro 5.3
+
+
+
+
+ SUSE Linux Enterprise Micro 5.4
+
+
+
+
+ SUSE Linux Enterprise Micro 5.5
+
+
+
+
+ SUSE Linux Enterprise Micro 6.0
+
+
+
+
+ SUSE Linux Enterprise Real Time 12 SP5
+
+
+
+
+ SUSE Real Time Module 15 SP5
+
+
+
+
+ SUSE Linux Enterprise Server 11 SP4 LTSS
+
+
+
+
+ SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE
+
+
+
+
+ SUSE Linux Enterprise Module for Public Cloud 12
+
+
+
+
+ SUSE Linux Enterprise Server 12 SP2-LTSS
+
+
+
+
+ SUSE Linux Enterprise Module for Public Cloud 12
+
+
+
+
+ SUSE Linux Enterprise Module for Public Cloud 12
+
+
+
+
+ SUSE Linux Enterprise Server 12 SP4-LTSS
+
+
+
+
+ SUSE Linux Enterprise Module for Public Cloud 12
+
+
+ SUSE Linux Enterprise Server 12 SP5
+
+
+ SUSE Linux Enterprise Software Development Kit 12 SP5
+
+
+ SUSE Linux Enterprise Workstation Extension 12 SP5
+
+
+
+
+ SUSE Linux Enterprise Server 12 SP5-LTSS
+
+
+
+
+ SUSE Linux Enterprise Server 15 SP1-LTSS
+
+
+
+
+ SUSE Linux Enterprise Server 15 SP2-LTSS
+
+
+
+
+ SUSE Linux Enterprise Server 15 SP3-LTSS
+
+
+
+
+ SUSE Linux Enterprise Server 15 SP4-LTSS
+
+
+
+
+ SUSE Linux Enterprise Module for Basesystem 15 SP5
+
+
+ SUSE Linux Enterprise Module for Development Tools 15 SP5
+
+
+ SUSE Linux Enterprise Module for Public Cloud 15 SP5
+
+
+
+
+ SUSE Linux Enterprise Module for Basesystem 15 SP6
+
+
+ SUSE Linux Enterprise Module for Development Tools 15 SP6
+
+
+ SUSE Linux Enterprise Module for Public Cloud 15 SP6
+
+
+
+
+ SUSE Linux Enterprise Server 15-LTSS
+
+
+
+
+ SUSE Linux Enterprise Server Teradata 12 SP3
+
+
+
+
+ SUSE Linux Enterprise Server Teradata 12 SP3-LTSS
+
+
+
+
+ SUSE Linux Enterprise Server Teradata 15 SP4
+
+
+
+
+ SUSE Linux Enterprise Module for Public Cloud 12
+
+
+
+
+ SUSE Linux Enterprise Module for Public Cloud 12
+
+
+
+
+ SUSE Linux Enterprise Module for Public Cloud 12
+
+
+
+
+ SUSE Linux Enterprise Module for Public Cloud 12
+
+
+ SUSE Linux Enterprise Server for SAP Applications 12 SP5
+
+
+ SUSE Linux Enterprise Software Development Kit 12 SP5
+
+
+ SUSE Linux Enterprise Workstation Extension 12 SP5
+
+
+
+
+ SUSE Linux Enterprise Server for SAP Applications 15 SP2
+
+
+
+
+ SUSE Linux Enterprise Server for SAP Applications 15 SP3
+
+
+
+
+ SUSE Linux Enterprise Server for SAP Applications 15 SP4
+
+
+
+
+ SUSE Linux Enterprise Module for Basesystem 15 SP5
+
+
+ SUSE Linux Enterprise Module for Development Tools 15 SP5
+
+
+ SUSE Linux Enterprise Module for Public Cloud 15 SP5
+
+
+
+
+ SUSE Linux Enterprise Module for Basesystem 15 SP6
+
+
+ SUSE Linux Enterprise Module for Development Tools 15 SP6
+
+
+ SUSE Linux Enterprise Module for Public Cloud 15 SP6
+
+
+
+
+ SUSE Manager Proxy 4.3
+
+
+
+
+ SUSE Manager Retail Branch Server 4.3
+
+
+
+
+ SUSE Manager Server 4.3
+
+
+
+
+ openSUSE Leap 15.5
+
+
+
+
+ openSUSE Leap 15.6
+
+
+
+ cluster-md-kmp-default
+
+
+ dlm-kmp-default
+
+
+ gfs2-kmp-default
+
+
+ kernel-default
+
+
+ kernel-default-base
+
+
+ kernel-default-devel
+
+
+ kernel-default-extra
+
+
+ kernel-default-kgraft
+
+
+ kernel-default-kgraft-devel
+
+
+ kernel-default-livepatch
+
+
+ kernel-default-livepatch-devel
+
+
+ kernel-default-man
+
+
+ kernel-default-optional
+
+
+ kernel-default-vdso
+
+
+ kernel-devel
+
+
+ kernel-devel-azure
+
+
+ kernel-devel-rt
+
+
+ kernel-macros
+
+
+ kernel-rt
+
+
+ kernel-source
+
+
+ kernel-source-azure
+
+
+ kernel-source-rt
+
+
+ kernel-source-vanilla
+
+
+ kselftests-kmp-default
+
+
+ ocfs2-kmp-default
+
+
+ reiserfs-kmp-default
+
+
+ cluster-md-kmp-default as a component of SUSE Linux Enterprise High Availability Extension 12 SP5
+
+
+ dlm-kmp-default as a component of SUSE Linux Enterprise High Availability Extension 12 SP5
+
+
+ gfs2-kmp-default as a component of SUSE Linux Enterprise High Availability Extension 12 SP5
+
+
+ ocfs2-kmp-default as a component of SUSE Linux Enterprise High Availability Extension 12 SP5
+
+
+ kernel-default as a component of SUSE Linux Enterprise High Availability Extension 12 SP5
+
+
+ kernel-source as a component of SUSE Linux Enterprise High Availability Extension 12 SP5
+
+
+ kernel-default as a component of SUSE Linux Enterprise High Performance Computing 12 SP5
+
+
+ kernel-source as a component of SUSE Linux Enterprise High Performance Computing 12 SP5
+
+
+ kernel-source-azure as a component of SUSE Linux Enterprise High Performance Computing 12 SP5
+
+
+ kernel-default as a component of SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS
+
+
+ kernel-default-devel as a component of SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS
+
+
+ kernel-devel as a component of SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS
+
+
+ kernel-macros as a component of SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS
+
+
+ kernel-source as a component of SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS
+
+
+ kernel-default as a component of SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS
+
+
+ kernel-default-devel as a component of SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS
+
+
+ reiserfs-kmp-default as a component of SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS
+
+
+ kernel-devel as a component of SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS
+
+
+ kernel-macros as a component of SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS
+
+
+ kernel-source as a component of SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS
+
+
+ kernel-default as a component of SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS
+
+
+ kernel-default-devel as a component of SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS
+
+
+ reiserfs-kmp-default as a component of SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS
+
+
+ kernel-devel as a component of SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS
+
+
+ kernel-macros as a component of SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS
+
+
+ kernel-source as a component of SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS
+
+
+ kernel-default as a component of SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS
+
+
+ kernel-default-devel as a component of SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS
+
+
+ reiserfs-kmp-default as a component of SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS
+
+
+ kernel-devel as a component of SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS
+
+
+ kernel-macros as a component of SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS
+
+
+ kernel-source as a component of SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS
+
+
+ kernel-default-kgraft as a component of SUSE Linux Enterprise Live Patching 12 SP5
+
+
+ kernel-default-kgraft-devel as a component of SUSE Linux Enterprise Live Patching 12 SP5
+
+
+ kernel-default as a component of SUSE Linux Enterprise Live Patching 12 SP5
+
+
+ kernel-source as a component of SUSE Linux Enterprise Live Patching 12 SP5
+
+
+ kernel-default-livepatch as a component of SUSE Linux Enterprise Live Patching 15 SP2
+
+
+ kernel-default-livepatch-devel as a component of SUSE Linux Enterprise Live Patching 15 SP2
+
+
+ kernel-default as a component of SUSE Linux Enterprise Live Patching 15 SP2
+
+
+ kernel-source as a component of SUSE Linux Enterprise Live Patching 15 SP2
+
+
+ kernel-default-livepatch as a component of SUSE Linux Enterprise Live Patching 15 SP3
+
+
+ kernel-default-livepatch-devel as a component of SUSE Linux Enterprise Live Patching 15 SP3
+
+
+ kernel-default as a component of SUSE Linux Enterprise Live Patching 15 SP3
+
+
+ kernel-source as a component of SUSE Linux Enterprise Live Patching 15 SP3
+
+
+ kernel-default-livepatch as a component of SUSE Linux Enterprise Live Patching 15 SP4
+
+
+ kernel-default-livepatch-devel as a component of SUSE Linux Enterprise Live Patching 15 SP4
+
+
+ kernel-default as a component of SUSE Linux Enterprise Live Patching 15 SP4
+
+
+ kernel-source as a component of SUSE Linux Enterprise Live Patching 15 SP4
+
+
+ kernel-default-livepatch as a component of SUSE Linux Enterprise Live Patching 15 SP5
+
+
+ kernel-default-livepatch-devel as a component of SUSE Linux Enterprise Live Patching 15 SP5
+
+
+ kernel-default as a component of SUSE Linux Enterprise Live Patching 15 SP5
+
+
+ kernel-source as a component of SUSE Linux Enterprise Live Patching 15 SP5
+
+
+ kernel-default-livepatch as a component of SUSE Linux Enterprise Live Patching 15 SP6
+
+
+ kernel-default-livepatch-devel as a component of SUSE Linux Enterprise Live Patching 15 SP6
+
+
+ kernel-default as a component of SUSE Linux Enterprise Live Patching 15 SP6
+
+
+ kernel-source as a component of SUSE Linux Enterprise Live Patching 15 SP6
+
+
+ kernel-default as a component of SUSE Linux Enterprise Micro 5.0
+
+
+ kernel-default as a component of SUSE Linux Enterprise Micro 5.1
+
+
+ kernel-rt as a component of SUSE Linux Enterprise Micro 5.1
+
+
+ kernel-source as a component of SUSE Linux Enterprise Micro 5.1
+
+
+ kernel-source-rt as a component of SUSE Linux Enterprise Micro 5.1
+
+
+ kernel-default as a component of SUSE Linux Enterprise Micro 5.2
+
+
+ kernel-rt as a component of SUSE Linux Enterprise Micro 5.2
+
+
+ kernel-source as a component of SUSE Linux Enterprise Micro 5.2
+
+
+ kernel-source-rt as a component of SUSE Linux Enterprise Micro 5.2
+
+
+ kernel-default as a component of SUSE Linux Enterprise Micro 5.3
+
+
+ kernel-rt as a component of SUSE Linux Enterprise Micro 5.3
+
+
+ kernel-source as a component of SUSE Linux Enterprise Micro 5.3
+
+
+ kernel-source-rt as a component of SUSE Linux Enterprise Micro 5.3
+
+
+ kernel-default as a component of SUSE Linux Enterprise Micro 5.4
+
+
+ kernel-rt as a component of SUSE Linux Enterprise Micro 5.4
+
+
+ kernel-source as a component of SUSE Linux Enterprise Micro 5.4
+
+
+ kernel-source-rt as a component of SUSE Linux Enterprise Micro 5.4
+
+
+ kernel-default as a component of SUSE Linux Enterprise Micro 5.5
+
+
+ kernel-source as a component of SUSE Linux Enterprise Micro 5.5
+
+
+ kernel-source-rt as a component of SUSE Linux Enterprise Micro 5.5
+
+
+ kernel-default as a component of SUSE Linux Enterprise Micro 6.0
+
+
+ kernel-devel as a component of SUSE Linux Enterprise Micro 6.0
+
+
+ kernel-macros as a component of SUSE Linux Enterprise Micro 6.0
+
+
+ kernel-source as a component of SUSE Linux Enterprise Micro 6.0
+
+
+ kernel-devel-rt as a component of SUSE Linux Enterprise Micro 6.0
+
+
+ kernel-source-rt as a component of SUSE Linux Enterprise Micro 6.0
+
+
+ kernel-default as a component of SUSE Linux Enterprise Module for Basesystem 15 SP5
+
+
+ kernel-default-devel as a component of SUSE Linux Enterprise Module for Basesystem 15 SP5
+
+
+ kernel-devel as a component of SUSE Linux Enterprise Module for Basesystem 15 SP5
+
+
+ kernel-macros as a component of SUSE Linux Enterprise Module for Basesystem 15 SP5
+
+
+ kernel-source as a component of SUSE Linux Enterprise Module for Basesystem 15 SP5
+
+
+ kernel-default as a component of SUSE Linux Enterprise Module for Basesystem 15 SP6
+
+
+ kernel-default-devel as a component of SUSE Linux Enterprise Module for Basesystem 15 SP6
+
+
+ kernel-devel as a component of SUSE Linux Enterprise Module for Basesystem 15 SP6
+
+
+ kernel-macros as a component of SUSE Linux Enterprise Module for Basesystem 15 SP6
+
+
+ kernel-source as a component of SUSE Linux Enterprise Module for Basesystem 15 SP6
+
+
+ kernel-default as a component of SUSE Linux Enterprise Module for Development Tools 15 SP5
+
+
+ kernel-source as a component of SUSE Linux Enterprise Module for Development Tools 15 SP5
+
+
+ kernel-default as a component of SUSE Linux Enterprise Module for Development Tools 15 SP6
+
+
+ kernel-source as a component of SUSE Linux Enterprise Module for Development Tools 15 SP6
+
+
+ kernel-default as a component of SUSE Linux Enterprise Module for Public Cloud 12
+
+
+ kernel-source as a component of SUSE Linux Enterprise Module for Public Cloud 12
+
+
+ kernel-devel-azure as a component of SUSE Linux Enterprise Module for Public Cloud 15 SP5
+
+
+ kernel-source-azure as a component of SUSE Linux Enterprise Module for Public Cloud 15 SP5
+
+
+ kernel-devel-azure as a component of SUSE Linux Enterprise Module for Public Cloud 15 SP6
+
+
+ kernel-source-azure as a component of SUSE Linux Enterprise Module for Public Cloud 15 SP6
+
+
+ kernel-devel-rt as a component of SUSE Linux Enterprise Real Time 12 SP5
+
+
+ kernel-source-rt as a component of SUSE Linux Enterprise Real Time 12 SP5
+
+
+ kernel-default as a component of SUSE Linux Enterprise Server 11 SP4 LTSS
+
+
+ kernel-source as a component of SUSE Linux Enterprise Server 11 SP4 LTSS
+
+
+ kernel-default as a component of SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE
+
+
+ kernel-default-base as a component of SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE
+
+
+ kernel-default-devel as a component of SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE
+
+
+ kernel-source as a component of SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE
+
+
+ kernel-default as a component of SUSE Linux Enterprise Server 12 SP2-LTSS
+
+
+ kernel-default-base as a component of SUSE Linux Enterprise Server 12 SP2-LTSS
+
+
+ kernel-default-devel as a component of SUSE Linux Enterprise Server 12 SP2-LTSS
+
+
+ kernel-default-man as a component of SUSE Linux Enterprise Server 12 SP2-LTSS
+
+
+ kernel-devel as a component of SUSE Linux Enterprise Server 12 SP2-LTSS
+
+
+ kernel-macros as a component of SUSE Linux Enterprise Server 12 SP2-LTSS
+
+
+ kernel-source as a component of SUSE Linux Enterprise Server 12 SP2-LTSS
+
+
+ kernel-default as a component of SUSE Linux Enterprise Server 12 SP4-LTSS
+
+
+ kernel-default-base as a component of SUSE Linux Enterprise Server 12 SP4-LTSS
+
+
+ kernel-default-devel as a component of SUSE Linux Enterprise Server 12 SP4-LTSS
+
+
+ kernel-default-man as a component of SUSE Linux Enterprise Server 12 SP4-LTSS
+
+
+ kernel-devel as a component of SUSE Linux Enterprise Server 12 SP4-LTSS
+
+
+ kernel-macros as a component of SUSE Linux Enterprise Server 12 SP4-LTSS
+
+
+ kernel-source as a component of SUSE Linux Enterprise Server 12 SP4-LTSS
+
+
+ kernel-default as a component of SUSE Linux Enterprise Server 12 SP5
+
+
+ kernel-default-base as a component of SUSE Linux Enterprise Server 12 SP5
+
+
+ kernel-default-devel as a component of SUSE Linux Enterprise Server 12 SP5
+
+
+ kernel-default-man as a component of SUSE Linux Enterprise Server 12 SP5
+
+
+ kernel-devel as a component of SUSE Linux Enterprise Server 12 SP5
+
+
+ kernel-macros as a component of SUSE Linux Enterprise Server 12 SP5
+
+
+ kernel-source as a component of SUSE Linux Enterprise Server 12 SP5
+
+
+ kernel-devel-azure as a component of SUSE Linux Enterprise Server 12 SP5
+
+
+ kernel-source-azure as a component of SUSE Linux Enterprise Server 12 SP5
+
+
+ kernel-default as a component of SUSE Linux Enterprise Server 12 SP5-LTSS
+
+
+ kernel-default-base as a component of SUSE Linux Enterprise Server 12 SP5-LTSS
+
+
+ kernel-default-devel as a component of SUSE Linux Enterprise Server 12 SP5-LTSS
+
+
+ kernel-default-man as a component of SUSE Linux Enterprise Server 12 SP5-LTSS
+
+
+ kernel-devel as a component of SUSE Linux Enterprise Server 12 SP5-LTSS
+
+
+ kernel-macros as a component of SUSE Linux Enterprise Server 12 SP5-LTSS
+
+
+ kernel-source as a component of SUSE Linux Enterprise Server 12 SP5-LTSS
+
+
+ kernel-devel-azure as a component of SUSE Linux Enterprise Server 12 SP5-LTSS
+
+
+ kernel-source-azure as a component of SUSE Linux Enterprise Server 12 SP5-LTSS
+
+
+ kernel-default as a component of SUSE Linux Enterprise Server 15 SP1-LTSS
+
+
+ kernel-default-base as a component of SUSE Linux Enterprise Server 15 SP1-LTSS
+
+
+ kernel-default-devel as a component of SUSE Linux Enterprise Server 15 SP1-LTSS
+
+
+ kernel-default-man as a component of SUSE Linux Enterprise Server 15 SP1-LTSS
+
+
+ reiserfs-kmp-default as a component of SUSE Linux Enterprise Server 15 SP1-LTSS
+
+
+ kernel-devel as a component of SUSE Linux Enterprise Server 15 SP1-LTSS
+
+
+ kernel-macros as a component of SUSE Linux Enterprise Server 15 SP1-LTSS
+
+
+ kernel-source as a component of SUSE Linux Enterprise Server 15 SP1-LTSS
+
+
+ kernel-default as a component of SUSE Linux Enterprise Server 15 SP2-LTSS
+
+
+ kernel-default-devel as a component of SUSE Linux Enterprise Server 15 SP2-LTSS
+
+
+ reiserfs-kmp-default as a component of SUSE Linux Enterprise Server 15 SP2-LTSS
+
+
+ kernel-devel as a component of SUSE Linux Enterprise Server 15 SP2-LTSS
+
+
+ kernel-macros as a component of SUSE Linux Enterprise Server 15 SP2-LTSS
+
+
+ kernel-source as a component of SUSE Linux Enterprise Server 15 SP2-LTSS
+
+
+ kernel-default as a component of SUSE Linux Enterprise Server 15 SP3-LTSS
+
+
+ kernel-default-devel as a component of SUSE Linux Enterprise Server 15 SP3-LTSS
+
+
+ reiserfs-kmp-default as a component of SUSE Linux Enterprise Server 15 SP3-LTSS
+
+
+ kernel-devel as a component of SUSE Linux Enterprise Server 15 SP3-LTSS
+
+
+ kernel-macros as a component of SUSE Linux Enterprise Server 15 SP3-LTSS
+
+
+ kernel-source as a component of SUSE Linux Enterprise Server 15 SP3-LTSS
+
+
+ kernel-default as a component of SUSE Linux Enterprise Server 15 SP4-LTSS
+
+
+ kernel-default-devel as a component of SUSE Linux Enterprise Server 15 SP4-LTSS
+
+
+ reiserfs-kmp-default as a component of SUSE Linux Enterprise Server 15 SP4-LTSS
+
+
+ kernel-devel as a component of SUSE Linux Enterprise Server 15 SP4-LTSS
+
+
+ kernel-macros as a component of SUSE Linux Enterprise Server 15 SP4-LTSS
+
+
+ kernel-source as a component of SUSE Linux Enterprise Server 15 SP4-LTSS
+
+
+ kernel-default as a component of SUSE Linux Enterprise Server 15-LTSS
+
+
+ kernel-default-base as a component of SUSE Linux Enterprise Server 15-LTSS
+
+
+ kernel-default-devel as a component of SUSE Linux Enterprise Server 15-LTSS
+
+
+ kernel-default-man as a component of SUSE Linux Enterprise Server 15-LTSS
+
+
+ reiserfs-kmp-default as a component of SUSE Linux Enterprise Server 15-LTSS
+
+
+ kernel-devel as a component of SUSE Linux Enterprise Server 15-LTSS
+
+
+ kernel-macros as a component of SUSE Linux Enterprise Server 15-LTSS
+
+
+ kernel-source as a component of SUSE Linux Enterprise Server 15-LTSS
+
+
+ kernel-default as a component of SUSE Linux Enterprise Server Teradata 12 SP3
+
+
+ kernel-source as a component of SUSE Linux Enterprise Server Teradata 12 SP3
+
+
+ kernel-default as a component of SUSE Linux Enterprise Server Teradata 12 SP3-LTSS
+
+
+ kernel-source as a component of SUSE Linux Enterprise Server Teradata 12 SP3-LTSS
+
+
+ kernel-default as a component of SUSE Linux Enterprise Server Teradata 15 SP4
+
+
+ kernel-source as a component of SUSE Linux Enterprise Server Teradata 15 SP4
+
+
+ kernel-default as a component of SUSE Linux Enterprise Server for SAP Applications 12 SP5
+
+
+ kernel-source as a component of SUSE Linux Enterprise Server for SAP Applications 12 SP5
+
+
+ kernel-source-azure as a component of SUSE Linux Enterprise Server for SAP Applications 12 SP5
+
+
+ kernel-default as a component of SUSE Linux Enterprise Server for SAP Applications 15 SP2
+
+
+ kernel-default-devel as a component of SUSE Linux Enterprise Server for SAP Applications 15 SP2
+
+
+ reiserfs-kmp-default as a component of SUSE Linux Enterprise Server for SAP Applications 15 SP2
+
+
+ kernel-devel as a component of SUSE Linux Enterprise Server for SAP Applications 15 SP2
+
+
+ kernel-macros as a component of SUSE Linux Enterprise Server for SAP Applications 15 SP2
+
+
+ kernel-source as a component of SUSE Linux Enterprise Server for SAP Applications 15 SP2
+
+
+ kernel-default as a component of SUSE Linux Enterprise Server for SAP Applications 15 SP3
+
+
+ kernel-default-devel as a component of SUSE Linux Enterprise Server for SAP Applications 15 SP3
+
+
+ reiserfs-kmp-default as a component of SUSE Linux Enterprise Server for SAP Applications 15 SP3
+
+
+ kernel-devel as a component of SUSE Linux Enterprise Server for SAP Applications 15 SP3
+
+
+ kernel-macros as a component of SUSE Linux Enterprise Server for SAP Applications 15 SP3
+
+
+ kernel-source as a component of SUSE Linux Enterprise Server for SAP Applications 15 SP3
+
+
+ kernel-default as a component of SUSE Linux Enterprise Server for SAP Applications 15 SP4
+
+
+ kernel-default-devel as a component of SUSE Linux Enterprise Server for SAP Applications 15 SP4
+
+
+ reiserfs-kmp-default as a component of SUSE Linux Enterprise Server for SAP Applications 15 SP4
+
+
+ kernel-devel as a component of SUSE Linux Enterprise Server for SAP Applications 15 SP4
+
+
+ kernel-macros as a component of SUSE Linux Enterprise Server for SAP Applications 15 SP4
+
+
+ kernel-source as a component of SUSE Linux Enterprise Server for SAP Applications 15 SP4
+
+
+ kernel-default as a component of SUSE Linux Enterprise Software Development Kit 12 SP5
+
+
+ kernel-source as a component of SUSE Linux Enterprise Software Development Kit 12 SP5
+
+
+ kernel-default-extra as a component of SUSE Linux Enterprise Workstation Extension 12 SP5
+
+
+ kernel-default as a component of SUSE Linux Enterprise Workstation Extension 12 SP5
+
+
+ kernel-source as a component of SUSE Linux Enterprise Workstation Extension 12 SP5
+
+
+ kernel-default as a component of SUSE Manager Proxy 4.3
+
+
+ kernel-default-devel as a component of SUSE Manager Proxy 4.3
+
+
+ kernel-devel as a component of SUSE Manager Proxy 4.3
+
+
+ kernel-macros as a component of SUSE Manager Proxy 4.3
+
+
+ kernel-source as a component of SUSE Manager Proxy 4.3
+
+
+ kernel-default as a component of SUSE Manager Retail Branch Server 4.3
+
+
+ kernel-default-devel as a component of SUSE Manager Retail Branch Server 4.3
+
+
+ kernel-devel as a component of SUSE Manager Retail Branch Server 4.3
+
+
+ kernel-macros as a component of SUSE Manager Retail Branch Server 4.3
+
+
+ kernel-source as a component of SUSE Manager Retail Branch Server 4.3
+
+
+ kernel-default as a component of SUSE Manager Server 4.3
+
+
+ kernel-default-devel as a component of SUSE Manager Server 4.3
+
+
+ kernel-devel as a component of SUSE Manager Server 4.3
+
+
+ kernel-macros as a component of SUSE Manager Server 4.3
+
+
+ kernel-source as a component of SUSE Manager Server 4.3
+
+
+ kernel-devel-rt as a component of SUSE Real Time Module 15 SP5
+
+
+ kernel-source-rt as a component of SUSE Real Time Module 15 SP5
+
+
+ cluster-md-kmp-default as a component of openSUSE Leap 15.5
+
+
+ dlm-kmp-default as a component of openSUSE Leap 15.5
+
+
+ gfs2-kmp-default as a component of openSUSE Leap 15.5
+
+
+ kernel-default as a component of openSUSE Leap 15.5
+
+
+ kernel-default-devel as a component of openSUSE Leap 15.5
+
+
+ kernel-default-extra as a component of openSUSE Leap 15.5
+
+
+ kernel-default-livepatch as a component of openSUSE Leap 15.5
+
+
+ kernel-default-livepatch-devel as a component of openSUSE Leap 15.5
+
+
+ kernel-default-optional as a component of openSUSE Leap 15.5
+
+
+ kernel-default-vdso as a component of openSUSE Leap 15.5
+
+
+ kselftests-kmp-default as a component of openSUSE Leap 15.5
+
+
+ ocfs2-kmp-default as a component of openSUSE Leap 15.5
+
+
+ reiserfs-kmp-default as a component of openSUSE Leap 15.5
+
+
+ kernel-devel as a component of openSUSE Leap 15.5
+
+
+ kernel-macros as a component of openSUSE Leap 15.5
+
+
+ kernel-source as a component of openSUSE Leap 15.5
+
+
+ kernel-source-vanilla as a component of openSUSE Leap 15.5
+
+
+ kernel-devel-rt as a component of openSUSE Leap 15.5
+
+
+ kernel-source-rt as a component of openSUSE Leap 15.5
+
+
+ cluster-md-kmp-default as a component of openSUSE Leap 15.6
+
+
+ dlm-kmp-default as a component of openSUSE Leap 15.6
+
+
+ gfs2-kmp-default as a component of openSUSE Leap 15.6
+
+
+ kernel-default as a component of openSUSE Leap 15.6
+
+
+ kernel-default-devel as a component of openSUSE Leap 15.6
+
+
+ kernel-default-extra as a component of openSUSE Leap 15.6
+
+
+ kernel-default-livepatch as a component of openSUSE Leap 15.6
+
+
+ kernel-default-livepatch-devel as a component of openSUSE Leap 15.6
+
+
+ kernel-default-optional as a component of openSUSE Leap 15.6
+
+
+ kernel-default-vdso as a component of openSUSE Leap 15.6
+
+
+ kselftests-kmp-default as a component of openSUSE Leap 15.6
+
+
+ ocfs2-kmp-default as a component of openSUSE Leap 15.6
+
+
+ reiserfs-kmp-default as a component of openSUSE Leap 15.6
+
+
+ kernel-devel as a component of openSUSE Leap 15.6
+
+
+ kernel-macros as a component of openSUSE Leap 15.6
+
+
+ kernel-source as a component of openSUSE Leap 15.6
+
+
+ kernel-source-vanilla as a component of openSUSE Leap 15.6
+
+
+ kernel-devel-rt as a component of openSUSE Leap 15.6
+
+
+ kernel-source-rt as a component of openSUSE Leap 15.6
+
+
In the Linux kernel, the following vulnerability has been resolved:
@@ -125,11 +1348,176 @@
earlier point in __ext4_fill_super() fixes this splat.
CVE-2024-50014
-
+
+
+ SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default
+ SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default
+ SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default
+ SUSE Linux Enterprise High Availability Extension 12 SP5:kernel-default
+ SUSE Linux Enterprise High Availability Extension 12 SP5:kernel-source
+ SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default
+ SUSE Linux Enterprise High Performance Computing 12 SP5:kernel-default
+ SUSE Linux Enterprise High Performance Computing 12 SP5:kernel-source
+ SUSE Linux Enterprise High Performance Computing 12 SP5:kernel-source-azure
+ SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default
+ SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel
+ SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-devel
+ SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-macros
+ SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-source
+ SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default
+ SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel
+ SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-devel
+ SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-macros
+ SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-source
+ SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default
+ SUSE Linux Enterprise Live Patching 12 SP5:kernel-default
+ SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft
+ SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel
+ SUSE Linux Enterprise Live Patching 12 SP5:kernel-source
+ SUSE Linux Enterprise Live Patching 15 SP2:kernel-default
+ SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch
+ SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel
+ SUSE Linux Enterprise Live Patching 15 SP2:kernel-source
+ SUSE Linux Enterprise Live Patching 15 SP3:kernel-default
+ SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch
+ SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel
+ SUSE Linux Enterprise Live Patching 15 SP3:kernel-source
+ SUSE Linux Enterprise Micro 5.0:kernel-default
+ SUSE Linux Enterprise Micro 5.1:kernel-default
+ SUSE Linux Enterprise Micro 5.1:kernel-rt
+ SUSE Linux Enterprise Micro 5.1:kernel-source
+ SUSE Linux Enterprise Micro 5.1:kernel-source-rt
+ SUSE Linux Enterprise Micro 5.2:kernel-default
+ SUSE Linux Enterprise Micro 5.2:kernel-rt
+ SUSE Linux Enterprise Micro 5.2:kernel-source
+ SUSE Linux Enterprise Micro 5.2:kernel-source-rt
+ SUSE Linux Enterprise Module for Public Cloud 12:kernel-default
+ SUSE Linux Enterprise Module for Public Cloud 12:kernel-source
+ SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt
+ SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt
+ SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-default
+ SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-default-base
+ SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-default-devel
+ SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-source
+ SUSE Linux Enterprise Server 11 SP4 LTSS:kernel-default
+ SUSE Linux Enterprise Server 11 SP4 LTSS:kernel-source
+ SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default
+ SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base
+ SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel
+ SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man
+ SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel
+ SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros
+ SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source
+ SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default
+ SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base
+ SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel
+ SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-man
+ SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-devel
+ SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-macros
+ SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-source
+ SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default
+ SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base
+ SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel
+ SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man
+ SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel
+ SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-azure
+ SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros
+ SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source
+ SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-azure
+ SUSE Linux Enterprise Server 12 SP5:kernel-default
+ SUSE Linux Enterprise Server 12 SP5:kernel-default-base
+ SUSE Linux Enterprise Server 12 SP5:kernel-default-devel
+ SUSE Linux Enterprise Server 12 SP5:kernel-default-man
+ SUSE Linux Enterprise Server 12 SP5:kernel-devel
+ SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure
+ SUSE Linux Enterprise Server 12 SP5:kernel-macros
+ SUSE Linux Enterprise Server 12 SP5:kernel-source
+ SUSE Linux Enterprise Server 12 SP5:kernel-source-azure
+ SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default
+ SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base
+ SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel
+ SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-man
+ SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-devel
+ SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-macros
+ SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-source
+ SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default
+ SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default
+ SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel
+ SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-devel
+ SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-macros
+ SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-source
+ SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default
+ SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default
+ SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel
+ SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-devel
+ SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-macros
+ SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-source
+ SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default
+ SUSE Linux Enterprise Server 15-LTSS:kernel-default
+ SUSE Linux Enterprise Server 15-LTSS:kernel-default-base
+ SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel
+ SUSE Linux Enterprise Server 15-LTSS:kernel-default-man
+ SUSE Linux Enterprise Server 15-LTSS:kernel-devel
+ SUSE Linux Enterprise Server 15-LTSS:kernel-macros
+ SUSE Linux Enterprise Server 15-LTSS:kernel-source
+ SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default
+ SUSE Linux Enterprise Server Teradata 12 SP3-LTSS:kernel-default
+ SUSE Linux Enterprise Server Teradata 12 SP3-LTSS:kernel-source
+ SUSE Linux Enterprise Server Teradata 12 SP3:kernel-default
+ SUSE Linux Enterprise Server Teradata 12 SP3:kernel-source
+ SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default
+ SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source
+ SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure
+ SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default
+ SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel
+ SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-devel
+ SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-macros
+ SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-source
+ SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default
+ SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default
+ SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel
+ SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-devel
+ SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-macros
+ SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-source
+ SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default
+ SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-default
+ SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-source
+ SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default
+ SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra
+ SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-source
+ openSUSE Leap 15.5:kernel-devel-rt
+ openSUSE Leap 15.5:kernel-source-rt
+ openSUSE Leap 15.6:cluster-md-kmp-default
+ openSUSE Leap 15.6:dlm-kmp-default
+ openSUSE Leap 15.6:gfs2-kmp-default
+ openSUSE Leap 15.6:kernel-default
+ openSUSE Leap 15.6:kernel-default-devel
+ openSUSE Leap 15.6:kernel-default-extra
+ openSUSE Leap 15.6:kernel-default-livepatch
+ openSUSE Leap 15.6:kernel-default-livepatch-devel
+ openSUSE Leap 15.6:kernel-default-optional
+ openSUSE Leap 15.6:kernel-default-vdso
+ openSUSE Leap 15.6:kernel-devel
+ openSUSE Leap 15.6:kernel-devel-rt
+ openSUSE Leap 15.6:kernel-macros
+ openSUSE Leap 15.6:kernel-source
+ openSUSE Leap 15.6:kernel-source-rt
+ openSUSE Leap 15.6:kernel-source-vanilla
+ openSUSE Leap 15.6:kselftests-kmp-default
+ openSUSE Leap 15.6:ocfs2-kmp-default
+ openSUSE Leap 15.6:reiserfs-kmp-default
+
+
moderate
+
+
+ 5.5
+ CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
+
+
skipping CVE-2024-50012 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-50011 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-50010 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-50009 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-50008 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-50007 as CVE page is older than CVRF-CVE file.
--- /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2024-50006.xml 2024-10-24 01:10:28.438127000 +0200
+++ /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2024-50006.xml.new 2024-10-29 01:10:56.565847000 +0100
@@ -14,13 +14,13 @@
1
- 2
- 2024-10-23T23:10:28Z
+ 3
+ 2024-10-29T00:10:56Z
current
2024-10-21T23:11:29Z
- 2024-10-23T23:10:28Z
+ 2024-10-29T00:10:56Z
cve-database/bin/generate-cvrf-cve.pl
2020-12-27T01:00:00Z
@@ -57,7 +57,1230 @@
SUSE Security Ratings
-
+
+
+
+ SUSE Linux Enterprise Module for Basesystem 15 SP5
+
+
+ SUSE Linux Enterprise Module for Development Tools 15 SP5
+
+
+
+
+ SUSE Linux Enterprise Module for Basesystem 15 SP6
+
+
+ SUSE Linux Enterprise Module for Development Tools 15 SP6
+
+
+
+
+ SUSE Linux Enterprise High Availability Extension 12 SP5
+
+
+
+
+ SUSE Linux Enterprise Module for Public Cloud 12
+
+
+
+
+ SUSE Linux Enterprise High Performance Computing 12 SP5
+
+
+
+
+ SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS
+
+
+
+
+ SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS
+
+
+
+
+ SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS
+
+
+
+
+ SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS
+
+
+
+
+ SUSE Linux Enterprise Module for Basesystem 15 SP5
+
+
+ SUSE Linux Enterprise Module for Development Tools 15 SP5
+
+
+ SUSE Linux Enterprise Module for Public Cloud 15 SP5
+
+
+
+
+ SUSE Linux Enterprise Module for Basesystem 15 SP6
+
+
+ SUSE Linux Enterprise Module for Development Tools 15 SP6
+
+
+ SUSE Linux Enterprise Module for Public Cloud 15 SP6
+
+
+
+
+ SUSE Linux Enterprise Live Patching 12 SP5
+
+
+
+
+ SUSE Linux Enterprise Live Patching 15 SP2
+
+
+
+
+ SUSE Linux Enterprise Live Patching 15 SP3
+
+
+
+
+ SUSE Linux Enterprise Live Patching 15 SP4
+
+
+
+
+ SUSE Linux Enterprise Live Patching 15 SP5
+
+
+
+
+ SUSE Linux Enterprise Live Patching 15 SP6
+
+
+
+
+ SUSE Linux Enterprise Micro 5.0
+
+
+
+
+ SUSE Linux Enterprise Micro 5.1
+
+
+
+
+ SUSE Linux Enterprise Micro 5.2
+
+
+
+
+ SUSE Linux Enterprise Micro 5.3
+
+
+
+
+ SUSE Linux Enterprise Micro 5.4
+
+
+
+
+ SUSE Linux Enterprise Micro 5.5
+
+
+
+
+ SUSE Linux Enterprise Micro 6.0
+
+
+
+
+ SUSE Linux Enterprise Real Time 12 SP5
+
+
+
+
+ SUSE Real Time Module 15 SP5
+
+
+
+
+ SUSE Linux Enterprise Server 11 SP4 LTSS
+
+
+
+
+ SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE
+
+
+
+
+ SUSE Linux Enterprise Module for Public Cloud 12
+
+
+
+
+ SUSE Linux Enterprise Server 12 SP2-LTSS
+
+
+
+
+ SUSE Linux Enterprise Module for Public Cloud 12
+
+
+
+
+ SUSE Linux Enterprise Module for Public Cloud 12
+
+
+
+
+ SUSE Linux Enterprise Server 12 SP4-LTSS
+
+
+
+
+ SUSE Linux Enterprise Module for Public Cloud 12
+
+
+ SUSE Linux Enterprise Server 12 SP5
+
+
+ SUSE Linux Enterprise Software Development Kit 12 SP5
+
+
+ SUSE Linux Enterprise Workstation Extension 12 SP5
+
+
+
+
+ SUSE Linux Enterprise Server 12 SP5-LTSS
+
+
+
+
+ SUSE Linux Enterprise Server 15 SP1-LTSS
+
+
+
+
+ SUSE Linux Enterprise Server 15 SP2-LTSS
+
+
+
+
+ SUSE Linux Enterprise Server 15 SP3-LTSS
+
+
+
+
+ SUSE Linux Enterprise Server 15 SP4-LTSS
+
+
+
+
+ SUSE Linux Enterprise Module for Basesystem 15 SP5
+
+
+ SUSE Linux Enterprise Module for Development Tools 15 SP5
+
+
+ SUSE Linux Enterprise Module for Public Cloud 15 SP5
+
+
+
+
+ SUSE Linux Enterprise Module for Basesystem 15 SP6
+
+
+ SUSE Linux Enterprise Module for Development Tools 15 SP6
+
+
+ SUSE Linux Enterprise Module for Public Cloud 15 SP6
+
+
+
+
+ SUSE Linux Enterprise Server 15-LTSS
+
+
+
+
+ SUSE Linux Enterprise Server Teradata 12 SP3
+
+
+
+
+ SUSE Linux Enterprise Server Teradata 12 SP3-LTSS
+
+
+
+
+ SUSE Linux Enterprise Server Teradata 15 SP4
+
+
+
+
+ SUSE Linux Enterprise Module for Public Cloud 12
+
+
+
+
+ SUSE Linux Enterprise Module for Public Cloud 12
+
+
+
+
+ SUSE Linux Enterprise Module for Public Cloud 12
+
+
+
+
+ SUSE Linux Enterprise Module for Public Cloud 12
+
+
+ SUSE Linux Enterprise Server for SAP Applications 12 SP5
+
+
+ SUSE Linux Enterprise Software Development Kit 12 SP5
+
+
+ SUSE Linux Enterprise Workstation Extension 12 SP5
+
+
+
+
+ SUSE Linux Enterprise Server for SAP Applications 15 SP2
+
+
+
+
+ SUSE Linux Enterprise Server for SAP Applications 15 SP3
+
+
+
+
+ SUSE Linux Enterprise Server for SAP Applications 15 SP4
+
+
+
+
+ SUSE Linux Enterprise Module for Basesystem 15 SP5
+
+
+ SUSE Linux Enterprise Module for Development Tools 15 SP5
+
+
+ SUSE Linux Enterprise Module for Public Cloud 15 SP5
+
+
+
+
+ SUSE Linux Enterprise Module for Basesystem 15 SP6
+
+
+ SUSE Linux Enterprise Module for Development Tools 15 SP6
+
+
+ SUSE Linux Enterprise Module for Public Cloud 15 SP6
+
+
+
+
+ SUSE Manager Proxy 4.3
+
+
+
+
+ SUSE Manager Retail Branch Server 4.3
+
+
+
+
+ SUSE Manager Server 4.3
+
+
+
+
+ openSUSE Leap 15.5
+
+
+
+
+ openSUSE Leap 15.6
+
+
+
+ cluster-md-kmp-default
+
+
+ dlm-kmp-default
+
+
+ gfs2-kmp-default
+
+
+ kernel-default
+
+
+ kernel-default-base
+
+
+ kernel-default-devel
+
+
+ kernel-default-extra
+
+
+ kernel-default-kgraft
+
+
+ kernel-default-kgraft-devel
+
+
+ kernel-default-livepatch
+
+
+ kernel-default-livepatch-devel
+
+
+ kernel-default-man
+
+
+ kernel-default-optional
+
+
+ kernel-default-vdso
+
+
+ kernel-devel
+
+
+ kernel-devel-azure
+
+
+ kernel-devel-rt
+
+
+ kernel-macros
+
+
+ kernel-rt
+
+
+ kernel-source
+
+
+ kernel-source-azure
+
+
+ kernel-source-rt
+
+
+ kernel-source-vanilla
+
+
+ kselftests-kmp-default
+
+
+ ocfs2-kmp-default
+
+
+ reiserfs-kmp-default
+
+
+ cluster-md-kmp-default as a component of SUSE Linux Enterprise High Availability Extension 12 SP5
+
+
+ dlm-kmp-default as a component of SUSE Linux Enterprise High Availability Extension 12 SP5
+
+
+ gfs2-kmp-default as a component of SUSE Linux Enterprise High Availability Extension 12 SP5
+
+
+ ocfs2-kmp-default as a component of SUSE Linux Enterprise High Availability Extension 12 SP5
+
+
+ kernel-default as a component of SUSE Linux Enterprise High Availability Extension 12 SP5
+
+
+ kernel-source as a component of SUSE Linux Enterprise High Availability Extension 12 SP5
+
+
+ kernel-default as a component of SUSE Linux Enterprise High Performance Computing 12 SP5
+
+
+ kernel-source as a component of SUSE Linux Enterprise High Performance Computing 12 SP5
+
+
+ kernel-source-azure as a component of SUSE Linux Enterprise High Performance Computing 12 SP5
+
+
+ kernel-default as a component of SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS
+
+
+ kernel-default-devel as a component of SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS
+
+
+ kernel-devel as a component of SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS
+
+
+ kernel-macros as a component of SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS
+
+
+ kernel-source as a component of SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS
+
+
+ kernel-default as a component of SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS
+
+
+ kernel-default-devel as a component of SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS
+
+
+ reiserfs-kmp-default as a component of SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS
+
+
+ kernel-devel as a component of SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS
+
+
+ kernel-macros as a component of SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS
+
+
+ kernel-source as a component of SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS
+
+
+ kernel-default as a component of SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS
+
+
+ kernel-default-devel as a component of SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS
+
+
+ reiserfs-kmp-default as a component of SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS
+
+
+ kernel-devel as a component of SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS
+
+
+ kernel-macros as a component of SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS
+
+
+ kernel-source as a component of SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS
+
+
+ kernel-default as a component of SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS
+
+
+ kernel-default-devel as a component of SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS
+
+
+ reiserfs-kmp-default as a component of SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS
+
+
+ kernel-devel as a component of SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS
+
+
+ kernel-macros as a component of SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS
+
+
+ kernel-source as a component of SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS
+
+
+ kernel-default-kgraft as a component of SUSE Linux Enterprise Live Patching 12 SP5
+
+
+ kernel-default-kgraft-devel as a component of SUSE Linux Enterprise Live Patching 12 SP5
+
+
+ kernel-default as a component of SUSE Linux Enterprise Live Patching 12 SP5
+
+
+ kernel-source as a component of SUSE Linux Enterprise Live Patching 12 SP5
+
+
+ kernel-default-livepatch as a component of SUSE Linux Enterprise Live Patching 15 SP2
+
+
+ kernel-default-livepatch-devel as a component of SUSE Linux Enterprise Live Patching 15 SP2
+
+
+ kernel-default as a component of SUSE Linux Enterprise Live Patching 15 SP2
+
+
+ kernel-source as a component of SUSE Linux Enterprise Live Patching 15 SP2
+
+
+ kernel-default-livepatch as a component of SUSE Linux Enterprise Live Patching 15 SP3
+
+
+ kernel-default-livepatch-devel as a component of SUSE Linux Enterprise Live Patching 15 SP3
+
+
+ kernel-default as a component of SUSE Linux Enterprise Live Patching 15 SP3
+
+
+ kernel-source as a component of SUSE Linux Enterprise Live Patching 15 SP3
+
+
+ kernel-default-livepatch as a component of SUSE Linux Enterprise Live Patching 15 SP4
+
+
+ kernel-default-livepatch-devel as a component of SUSE Linux Enterprise Live Patching 15 SP4
+
+
+ kernel-default as a component of SUSE Linux Enterprise Live Patching 15 SP4
+
+
+ kernel-source as a component of SUSE Linux Enterprise Live Patching 15 SP4
+
+
+ kernel-default-livepatch as a component of SUSE Linux Enterprise Live Patching 15 SP5
+
+
+ kernel-default-livepatch-devel as a component of SUSE Linux Enterprise Live Patching 15 SP5
+
+
+ kernel-default as a component of SUSE Linux Enterprise Live Patching 15 SP5
+
+
+ kernel-source as a component of SUSE Linux Enterprise Live Patching 15 SP5
+
+
+ kernel-default-livepatch as a component of SUSE Linux Enterprise Live Patching 15 SP6
+
+
+ kernel-default-livepatch-devel as a component of SUSE Linux Enterprise Live Patching 15 SP6
+
+
+ kernel-default as a component of SUSE Linux Enterprise Live Patching 15 SP6
+
+
+ kernel-source as a component of SUSE Linux Enterprise Live Patching 15 SP6
+
+
+ kernel-default as a component of SUSE Linux Enterprise Micro 5.0
+
+
+ kernel-default as a component of SUSE Linux Enterprise Micro 5.1
+
+
+ kernel-rt as a component of SUSE Linux Enterprise Micro 5.1
+
+
+ kernel-source as a component of SUSE Linux Enterprise Micro 5.1
+
+
+ kernel-source-rt as a component of SUSE Linux Enterprise Micro 5.1
+
+
+ kernel-default as a component of SUSE Linux Enterprise Micro 5.2
+
+
+ kernel-rt as a component of SUSE Linux Enterprise Micro 5.2
+
+
+ kernel-source as a component of SUSE Linux Enterprise Micro 5.2
+
+
+ kernel-source-rt as a component of SUSE Linux Enterprise Micro 5.2
+
+
+ kernel-default as a component of SUSE Linux Enterprise Micro 5.3
+
+
+ kernel-rt as a component of SUSE Linux Enterprise Micro 5.3
+
+
+ kernel-source as a component of SUSE Linux Enterprise Micro 5.3
+
+
+ kernel-source-rt as a component of SUSE Linux Enterprise Micro 5.3
+
+
+ kernel-default as a component of SUSE Linux Enterprise Micro 5.4
+
+
+ kernel-rt as a component of SUSE Linux Enterprise Micro 5.4
+
+
+ kernel-source as a component of SUSE Linux Enterprise Micro 5.4
+
+
+ kernel-source-rt as a component of SUSE Linux Enterprise Micro 5.4
+
+
+ kernel-default as a component of SUSE Linux Enterprise Micro 5.5
+
+
+ kernel-source as a component of SUSE Linux Enterprise Micro 5.5
+
+
+ kernel-source-rt as a component of SUSE Linux Enterprise Micro 5.5
+
+
+ kernel-default as a component of SUSE Linux Enterprise Micro 6.0
+
+
+ kernel-devel as a component of SUSE Linux Enterprise Micro 6.0
+
+
+ kernel-macros as a component of SUSE Linux Enterprise Micro 6.0
+
+
+ kernel-source as a component of SUSE Linux Enterprise Micro 6.0
+
+
+ kernel-devel-rt as a component of SUSE Linux Enterprise Micro 6.0
+
+
+ kernel-source-rt as a component of SUSE Linux Enterprise Micro 6.0
+
+
+ kernel-default as a component of SUSE Linux Enterprise Module for Basesystem 15 SP5
+
+
+ kernel-default-devel as a component of SUSE Linux Enterprise Module for Basesystem 15 SP5
+
+
+ kernel-devel as a component of SUSE Linux Enterprise Module for Basesystem 15 SP5
+
+
+ kernel-macros as a component of SUSE Linux Enterprise Module for Basesystem 15 SP5
+
+
+ kernel-source as a component of SUSE Linux Enterprise Module for Basesystem 15 SP5
+
+
+ kernel-default as a component of SUSE Linux Enterprise Module for Basesystem 15 SP6
+
+
+ kernel-default-devel as a component of SUSE Linux Enterprise Module for Basesystem 15 SP6
+
+
+ kernel-devel as a component of SUSE Linux Enterprise Module for Basesystem 15 SP6
+
+
+ kernel-macros as a component of SUSE Linux Enterprise Module for Basesystem 15 SP6
+
+
+ kernel-source as a component of SUSE Linux Enterprise Module for Basesystem 15 SP6
+
+
+ kernel-default as a component of SUSE Linux Enterprise Module for Development Tools 15 SP5
+
+
+ kernel-source as a component of SUSE Linux Enterprise Module for Development Tools 15 SP5
+
+
+ kernel-default as a component of SUSE Linux Enterprise Module for Development Tools 15 SP6
+
+
+ kernel-source as a component of SUSE Linux Enterprise Module for Development Tools 15 SP6
+
+
+ kernel-default as a component of SUSE Linux Enterprise Module for Public Cloud 12
+
+
+ kernel-source as a component of SUSE Linux Enterprise Module for Public Cloud 12
+
+
+ kernel-devel-azure as a component of SUSE Linux Enterprise Module for Public Cloud 15 SP5
+
+
+ kernel-source-azure as a component of SUSE Linux Enterprise Module for Public Cloud 15 SP5
+
+
+ kernel-devel-azure as a component of SUSE Linux Enterprise Module for Public Cloud 15 SP6
+
+
+ kernel-source-azure as a component of SUSE Linux Enterprise Module for Public Cloud 15 SP6
+
+
+ kernel-devel-rt as a component of SUSE Linux Enterprise Real Time 12 SP5
+
+
+ kernel-source-rt as a component of SUSE Linux Enterprise Real Time 12 SP5
+
+
+ kernel-default as a component of SUSE Linux Enterprise Server 11 SP4 LTSS
+
+
+ kernel-source as a component of SUSE Linux Enterprise Server 11 SP4 LTSS
+
+
+ kernel-default as a component of SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE
+
+
+ kernel-default-base as a component of SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE
+
+
+ kernel-default-devel as a component of SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE
+
+
+ kernel-source as a component of SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE
+
+
+ kernel-default as a component of SUSE Linux Enterprise Server 12 SP2-LTSS
+
+
+ kernel-default-base as a component of SUSE Linux Enterprise Server 12 SP2-LTSS
+
+
+ kernel-default-devel as a component of SUSE Linux Enterprise Server 12 SP2-LTSS
+
+
+ kernel-default-man as a component of SUSE Linux Enterprise Server 12 SP2-LTSS
+
+
+ kernel-devel as a component of SUSE Linux Enterprise Server 12 SP2-LTSS
+
+
+ kernel-macros as a component of SUSE Linux Enterprise Server 12 SP2-LTSS
+
+
+ kernel-source as a component of SUSE Linux Enterprise Server 12 SP2-LTSS
+
+
+ kernel-default as a component of SUSE Linux Enterprise Server 12 SP4-LTSS
+
+
+ kernel-default-base as a component of SUSE Linux Enterprise Server 12 SP4-LTSS
+
+
+ kernel-default-devel as a component of SUSE Linux Enterprise Server 12 SP4-LTSS
+
+
+ kernel-default-man as a component of SUSE Linux Enterprise Server 12 SP4-LTSS
+
+
+ kernel-devel as a component of SUSE Linux Enterprise Server 12 SP4-LTSS
+
+
+ kernel-macros as a component of SUSE Linux Enterprise Server 12 SP4-LTSS
+
+
+ kernel-source as a component of SUSE Linux Enterprise Server 12 SP4-LTSS
+
+
+ kernel-default as a component of SUSE Linux Enterprise Server 12 SP5
+
+
+ kernel-default-base as a component of SUSE Linux Enterprise Server 12 SP5
+
+
+ kernel-default-devel as a component of SUSE Linux Enterprise Server 12 SP5
+
+
+ kernel-default-man as a component of SUSE Linux Enterprise Server 12 SP5
+
+
+ kernel-devel as a component of SUSE Linux Enterprise Server 12 SP5
+
+
+ kernel-macros as a component of SUSE Linux Enterprise Server 12 SP5
+
+
+ kernel-source as a component of SUSE Linux Enterprise Server 12 SP5
+
+
+ kernel-devel-azure as a component of SUSE Linux Enterprise Server 12 SP5
+
+
+ kernel-source-azure as a component of SUSE Linux Enterprise Server 12 SP5
+
+
+ kernel-default as a component of SUSE Linux Enterprise Server 12 SP5-LTSS
+
+
+ kernel-default-base as a component of SUSE Linux Enterprise Server 12 SP5-LTSS
+
+
+ kernel-default-devel as a component of SUSE Linux Enterprise Server 12 SP5-LTSS
+
+
+ kernel-default-man as a component of SUSE Linux Enterprise Server 12 SP5-LTSS
+
+
+ kernel-devel as a component of SUSE Linux Enterprise Server 12 SP5-LTSS
+
+
+ kernel-macros as a component of SUSE Linux Enterprise Server 12 SP5-LTSS
+
+
+ kernel-source as a component of SUSE Linux Enterprise Server 12 SP5-LTSS
+
+
+ kernel-devel-azure as a component of SUSE Linux Enterprise Server 12 SP5-LTSS
+
+
+ kernel-source-azure as a component of SUSE Linux Enterprise Server 12 SP5-LTSS
+
+
+ kernel-default as a component of SUSE Linux Enterprise Server 15 SP1-LTSS
+
+
+ kernel-default-base as a component of SUSE Linux Enterprise Server 15 SP1-LTSS
+
+
+ kernel-default-devel as a component of SUSE Linux Enterprise Server 15 SP1-LTSS
+
+
+ kernel-default-man as a component of SUSE Linux Enterprise Server 15 SP1-LTSS
+
+
+ reiserfs-kmp-default as a component of SUSE Linux Enterprise Server 15 SP1-LTSS
+
+
+ kernel-devel as a component of SUSE Linux Enterprise Server 15 SP1-LTSS
+
+
+ kernel-macros as a component of SUSE Linux Enterprise Server 15 SP1-LTSS
+
+
+ kernel-source as a component of SUSE Linux Enterprise Server 15 SP1-LTSS
+
+
+ kernel-default as a component of SUSE Linux Enterprise Server 15 SP2-LTSS
+
+
+ kernel-default-devel as a component of SUSE Linux Enterprise Server 15 SP2-LTSS
+
+
+ reiserfs-kmp-default as a component of SUSE Linux Enterprise Server 15 SP2-LTSS
+
+
+ kernel-devel as a component of SUSE Linux Enterprise Server 15 SP2-LTSS
+
+
+ kernel-macros as a component of SUSE Linux Enterprise Server 15 SP2-LTSS
+
+
+ kernel-source as a component of SUSE Linux Enterprise Server 15 SP2-LTSS
+
+
+ kernel-default as a component of SUSE Linux Enterprise Server 15 SP3-LTSS
+
+
+ kernel-default-devel as a component of SUSE Linux Enterprise Server 15 SP3-LTSS
+
+
+ reiserfs-kmp-default as a component of SUSE Linux Enterprise Server 15 SP3-LTSS
+
+
+ kernel-devel as a component of SUSE Linux Enterprise Server 15 SP3-LTSS
+
+
+ kernel-macros as a component of SUSE Linux Enterprise Server 15 SP3-LTSS
+
+
+ kernel-source as a component of SUSE Linux Enterprise Server 15 SP3-LTSS
+
+
+ kernel-default as a component of SUSE Linux Enterprise Server 15 SP4-LTSS
+
+
+ kernel-default-devel as a component of SUSE Linux Enterprise Server 15 SP4-LTSS
+
+
+ reiserfs-kmp-default as a component of SUSE Linux Enterprise Server 15 SP4-LTSS
+
+
+ kernel-devel as a component of SUSE Linux Enterprise Server 15 SP4-LTSS
+
+
+ kernel-macros as a component of SUSE Linux Enterprise Server 15 SP4-LTSS
+
+
+ kernel-source as a component of SUSE Linux Enterprise Server 15 SP4-LTSS
+
+
+ kernel-default as a component of SUSE Linux Enterprise Server 15-LTSS
+
+
+ kernel-default-base as a component of SUSE Linux Enterprise Server 15-LTSS
+
+
+ kernel-default-devel as a component of SUSE Linux Enterprise Server 15-LTSS
+
+
+ kernel-default-man as a component of SUSE Linux Enterprise Server 15-LTSS
+
+
+ reiserfs-kmp-default as a component of SUSE Linux Enterprise Server 15-LTSS
+
+
+ kernel-devel as a component of SUSE Linux Enterprise Server 15-LTSS
+
+
+ kernel-macros as a component of SUSE Linux Enterprise Server 15-LTSS
+
+
+ kernel-source as a component of SUSE Linux Enterprise Server 15-LTSS
+
+
+ kernel-default as a component of SUSE Linux Enterprise Server Teradata 12 SP3
+
+
+ kernel-source as a component of SUSE Linux Enterprise Server Teradata 12 SP3
+
+
+ kernel-default as a component of SUSE Linux Enterprise Server Teradata 12 SP3-LTSS
+
+
+ kernel-source as a component of SUSE Linux Enterprise Server Teradata 12 SP3-LTSS
+
+
+ kernel-default as a component of SUSE Linux Enterprise Server Teradata 15 SP4
+
+
+ kernel-source as a component of SUSE Linux Enterprise Server Teradata 15 SP4
+
+
+ kernel-default as a component of SUSE Linux Enterprise Server for SAP Applications 12 SP5
+
+
+ kernel-source as a component of SUSE Linux Enterprise Server for SAP Applications 12 SP5
+
+
+ kernel-source-azure as a component of SUSE Linux Enterprise Server for SAP Applications 12 SP5
+
+
+ kernel-default as a component of SUSE Linux Enterprise Server for SAP Applications 15 SP2
+
+
+ kernel-default-devel as a component of SUSE Linux Enterprise Server for SAP Applications 15 SP2
+
+
+ reiserfs-kmp-default as a component of SUSE Linux Enterprise Server for SAP Applications 15 SP2
+
+
+ kernel-devel as a component of SUSE Linux Enterprise Server for SAP Applications 15 SP2
+
+
+ kernel-macros as a component of SUSE Linux Enterprise Server for SAP Applications 15 SP2
+
+
+ kernel-source as a component of SUSE Linux Enterprise Server for SAP Applications 15 SP2
+
+
+ kernel-default as a component of SUSE Linux Enterprise Server for SAP Applications 15 SP3
+
+
+ kernel-default-devel as a component of SUSE Linux Enterprise Server for SAP Applications 15 SP3
+
+
+ reiserfs-kmp-default as a component of SUSE Linux Enterprise Server for SAP Applications 15 SP3
+
+
+ kernel-devel as a component of SUSE Linux Enterprise Server for SAP Applications 15 SP3
+
+
+ kernel-macros as a component of SUSE Linux Enterprise Server for SAP Applications 15 SP3
+
+
+ kernel-source as a component of SUSE Linux Enterprise Server for SAP Applications 15 SP3
+
+
+ kernel-default as a component of SUSE Linux Enterprise Server for SAP Applications 15 SP4
+
+
+ kernel-default-devel as a component of SUSE Linux Enterprise Server for SAP Applications 15 SP4
+
+
+ reiserfs-kmp-default as a component of SUSE Linux Enterprise Server for SAP Applications 15 SP4
+
+
+ kernel-devel as a component of SUSE Linux Enterprise Server for SAP Applications 15 SP4
+
+
+ kernel-macros as a component of SUSE Linux Enterprise Server for SAP Applications 15 SP4
+
+
+ kernel-source as a component of SUSE Linux Enterprise Server for SAP Applications 15 SP4
+
+
+ kernel-default as a component of SUSE Linux Enterprise Software Development Kit 12 SP5
+
+
+ kernel-source as a component of SUSE Linux Enterprise Software Development Kit 12 SP5
+
+
+ kernel-default-extra as a component of SUSE Linux Enterprise Workstation Extension 12 SP5
+
+
+ kernel-default as a component of SUSE Linux Enterprise Workstation Extension 12 SP5
+
+
+ kernel-source as a component of SUSE Linux Enterprise Workstation Extension 12 SP5
+
+
+ kernel-default as a component of SUSE Manager Proxy 4.3
+
+
+ kernel-default-devel as a component of SUSE Manager Proxy 4.3
+
+
+ kernel-devel as a component of SUSE Manager Proxy 4.3
+
+
+ kernel-macros as a component of SUSE Manager Proxy 4.3
+
+
+ kernel-source as a component of SUSE Manager Proxy 4.3
+
+
+ kernel-default as a component of SUSE Manager Retail Branch Server 4.3
+
+
+ kernel-default-devel as a component of SUSE Manager Retail Branch Server 4.3
+
+
+ kernel-devel as a component of SUSE Manager Retail Branch Server 4.3
+
+
+ kernel-macros as a component of SUSE Manager Retail Branch Server 4.3
+
+
+ kernel-source as a component of SUSE Manager Retail Branch Server 4.3
+
+
+ kernel-default as a component of SUSE Manager Server 4.3
+
+
+ kernel-default-devel as a component of SUSE Manager Server 4.3
+
+
+ kernel-devel as a component of SUSE Manager Server 4.3
+
+
+ kernel-macros as a component of SUSE Manager Server 4.3
+
+
+ kernel-source as a component of SUSE Manager Server 4.3
+
+
+ kernel-devel-rt as a component of SUSE Real Time Module 15 SP5
+
+
+ kernel-source-rt as a component of SUSE Real Time Module 15 SP5
+
+
+ cluster-md-kmp-default as a component of openSUSE Leap 15.5
+
+
+ dlm-kmp-default as a component of openSUSE Leap 15.5
+
+
+ gfs2-kmp-default as a component of openSUSE Leap 15.5
+
+
+ kernel-default as a component of openSUSE Leap 15.5
+
+
+ kernel-default-devel as a component of openSUSE Leap 15.5
+
+
+ kernel-default-extra as a component of openSUSE Leap 15.5
+
+
+ kernel-default-livepatch as a component of openSUSE Leap 15.5
+
+
+ kernel-default-livepatch-devel as a component of openSUSE Leap 15.5
+
+
+ kernel-default-optional as a component of openSUSE Leap 15.5
+
+
+ kernel-default-vdso as a component of openSUSE Leap 15.5
+
+
+ kselftests-kmp-default as a component of openSUSE Leap 15.5
+
+
+ ocfs2-kmp-default as a component of openSUSE Leap 15.5
+
+
+ reiserfs-kmp-default as a component of openSUSE Leap 15.5
+
+
+ kernel-devel as a component of openSUSE Leap 15.5
+
+
+ kernel-macros as a component of openSUSE Leap 15.5
+
+
+ kernel-source as a component of openSUSE Leap 15.5
+
+
+ kernel-source-vanilla as a component of openSUSE Leap 15.5
+
+
+ kernel-devel-rt as a component of openSUSE Leap 15.5
+
+
+ kernel-source-rt as a component of openSUSE Leap 15.5
+
+
+ cluster-md-kmp-default as a component of openSUSE Leap 15.6
+
+
+ dlm-kmp-default as a component of openSUSE Leap 15.6
+
+
+ gfs2-kmp-default as a component of openSUSE Leap 15.6
+
+
+ kernel-default as a component of openSUSE Leap 15.6
+
+
+ kernel-default-devel as a component of openSUSE Leap 15.6
+
+
+ kernel-default-extra as a component of openSUSE Leap 15.6
+
+
+ kernel-default-livepatch as a component of openSUSE Leap 15.6
+
+
+ kernel-default-livepatch-devel as a component of openSUSE Leap 15.6
+
+
+ kernel-default-optional as a component of openSUSE Leap 15.6
+
+
+ kernel-default-vdso as a component of openSUSE Leap 15.6
+
+
+ kselftests-kmp-default as a component of openSUSE Leap 15.6
+
+
+ ocfs2-kmp-default as a component of openSUSE Leap 15.6
+
+
+ reiserfs-kmp-default as a component of openSUSE Leap 15.6
+
+
+ kernel-devel as a component of openSUSE Leap 15.6
+
+
+ kernel-macros as a component of openSUSE Leap 15.6
+
+
+ kernel-source as a component of openSUSE Leap 15.6
+
+
+ kernel-source-vanilla as a component of openSUSE Leap 15.6
+
+
+ kernel-devel-rt as a component of openSUSE Leap 15.6
+
+
+ kernel-source-rt as a component of openSUSE Leap 15.6
+
+
In the Linux kernel, the following vulnerability has been resolved:
@@ -83,11 +1306,26 @@
Rule: add
CVE-2024-50006
-
+
+
+ SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-default
+ SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-default-base
+ SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-default-devel
+ SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-source
+ SUSE Linux Enterprise Server 11 SP4 LTSS:kernel-default
+ SUSE Linux Enterprise Server 11 SP4 LTSS:kernel-source
+
+
moderate
+
+
+ 4.7
+ CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
+
+
skipping CVE-2024-50005 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-50003 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-50002 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-49999 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-49998 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-49997 as CVE page is older than CVRF-CVE file.
Use of uninitialized value $mtime in numeric lt (<) at bin/generate-cvrf-cve.pl line 162.
Use of uninitialized value $mtime in numeric lt (<) at bin/generate-cvrf-cve.pl line 162.
Use of uninitialized value $mtime in numeric lt (<) at bin/generate-cvrf-cve.pl line 162.
Use of uninitialized value $mtime in numeric lt (<) at bin/generate-cvrf-cve.pl line 162.
Use of uninitialized value $mtime in numeric lt (<) at bin/generate-cvrf-cve.pl line 162.
skipping CVE-2024-49984 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-49983 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-49980 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-49979 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-49978 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-49974 as CVE page is older than CVRF-CVE file.
Use of uninitialized value $mtime in numeric lt (<) at bin/generate-cvrf-cve.pl line 162.
skipping CVE-2024-49965 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-49964 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-49963 as CVE page is older than CVRF-CVE file.
--- /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2024-49960.xml 2024-10-26 01:10:35.989124000 +0200
+++ /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2024-49960.xml.new 2024-10-29 01:11:09.848240000 +0100
@@ -14,13 +14,13 @@
1
- 1
- 2024-10-25T23:10:35Z
+ 2
+ 2024-10-29T00:11:09Z
current
2024-10-25T23:10:35Z
- 2024-10-25T23:10:35Z
+ 2024-10-29T00:11:09Z
cve-database/bin/generate-cvrf-cve.pl
2020-12-27T01:00:00Z
@@ -75,11 +75,6 @@
SUSE Linux Enterprise High Availability Extension 12 SP5
-
-
- SUSE Linux Enterprise Module for Public Cloud 12
-
-
SUSE Linux Enterprise High Performance Computing 12 SP5
@@ -212,35 +207,17 @@
SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE
-
-
- SUSE Linux Enterprise Module for Public Cloud 12
-
-
SUSE Linux Enterprise Server 12 SP2-LTSS
-
-
- SUSE Linux Enterprise Module for Public Cloud 12
-
-
-
-
- SUSE Linux Enterprise Module for Public Cloud 12
-
-
SUSE Linux Enterprise Server 12 SP4-LTSS
-
- SUSE Linux Enterprise Module for Public Cloud 12
-
SUSE Linux Enterprise Server 12 SP5
@@ -318,25 +295,7 @@
SUSE Linux Enterprise Server Teradata 15 SP4
-
-
- SUSE Linux Enterprise Module for Public Cloud 12
-
-
-
-
- SUSE Linux Enterprise Module for Public Cloud 12
-
-
-
-
- SUSE Linux Enterprise Module for Public Cloud 12
-
-
-
- SUSE Linux Enterprise Module for Public Cloud 12
-
SUSE Linux Enterprise Server for SAP Applications 12 SP5
@@ -775,12 +734,6 @@
kernel-source as a component of SUSE Linux Enterprise Module for Development Tools 15 SP6
-
- kernel-default as a component of SUSE Linux Enterprise Module for Public Cloud 12
-
-
- kernel-source as a component of SUSE Linux Enterprise Module for Public Cloud 12
-
kernel-devel-azure as a component of SUSE Linux Enterprise Module for Public Cloud 15 SP5
skipping CVE-2024-49956 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-49954 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-49951 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-49950 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-49948 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-49947 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-49945 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-49944 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-49943 as CVE page is older than CVRF-CVE file.
Use of uninitialized value $mtime in numeric lt (<) at bin/generate-cvrf-cve.pl line 162.
Use of uninitialized value $mtime in numeric lt (<) at bin/generate-cvrf-cve.pl line 162.
skipping CVE-2024-49934 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-49933 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-49932 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-49927 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-49924 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-49923 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-49922 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-49921 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-49914 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-49912 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-49911 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-49910 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-49909 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-49908 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-49907 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-49906 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-49905 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-49904 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-49903 as CVE page is older than CVRF-CVE file.
--- /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2024-49902.xml 2024-10-26 01:10:51.232326000 +0200
+++ /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2024-49902.xml.new 2024-10-29 01:11:27.431258000 +0100
@@ -14,13 +14,13 @@
1
- 1
- 2024-10-25T23:10:50Z
+ 2
+ 2024-10-29T00:11:26Z
current
2024-10-25T23:10:50Z
- 2024-10-25T23:10:50Z
+ 2024-10-29T00:11:26Z
cve-database/bin/generate-cvrf-cve.pl
2020-12-27T01:00:00Z
@@ -1293,10 +1293,45 @@
SUSE Linux Enterprise High Performance Computing 12 SP5:kernel-default
SUSE Linux Enterprise High Performance Computing 12 SP5:kernel-source
SUSE Linux Enterprise High Performance Computing 12 SP5:kernel-source-azure
+ SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default
+ SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel
+ SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-devel
+ SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-macros
+ SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-source
+ SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default
+ SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel
+ SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-devel
+ SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-macros
+ SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-source
+ SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default
+ SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default
+ SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel
+ SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-devel
+ SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-macros
+ SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-source
+ SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default
+ SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default
+ SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel
+ SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-devel
+ SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-macros
+ SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-source
+ SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default
SUSE Linux Enterprise Live Patching 12 SP5:kernel-default
SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft
SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel
SUSE Linux Enterprise Live Patching 12 SP5:kernel-source
+ SUSE Linux Enterprise Live Patching 15 SP2:kernel-default
+ SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch
+ SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel
+ SUSE Linux Enterprise Live Patching 15 SP2:kernel-source
+ SUSE Linux Enterprise Live Patching 15 SP3:kernel-default
+ SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch
+ SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel
+ SUSE Linux Enterprise Live Patching 15 SP3:kernel-source
+ SUSE Linux Enterprise Live Patching 15 SP4:kernel-default
+ SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch
+ SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel
+ SUSE Linux Enterprise Live Patching 15 SP4:kernel-source
SUSE Linux Enterprise Live Patching 15 SP5:kernel-default
SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch
SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel
@@ -1305,8 +1340,26 @@
SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch
SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel
SUSE Linux Enterprise Live Patching 15 SP6:kernel-source
+ SUSE Linux Enterprise Micro 5.0:kernel-default
+ SUSE Linux Enterprise Micro 5.1:kernel-default
+ SUSE Linux Enterprise Micro 5.1:kernel-rt
+ SUSE Linux Enterprise Micro 5.1:kernel-source
+ SUSE Linux Enterprise Micro 5.1:kernel-source-rt
+ SUSE Linux Enterprise Micro 5.2:kernel-default
+ SUSE Linux Enterprise Micro 5.2:kernel-rt
+ SUSE Linux Enterprise Micro 5.2:kernel-source
+ SUSE Linux Enterprise Micro 5.2:kernel-source-rt
+ SUSE Linux Enterprise Micro 5.3:kernel-default
+ SUSE Linux Enterprise Micro 5.3:kernel-rt
+ SUSE Linux Enterprise Micro 5.3:kernel-source
+ SUSE Linux Enterprise Micro 5.3:kernel-source-rt
+ SUSE Linux Enterprise Micro 5.4:kernel-default
+ SUSE Linux Enterprise Micro 5.4:kernel-rt
+ SUSE Linux Enterprise Micro 5.4:kernel-source
+ SUSE Linux Enterprise Micro 5.4:kernel-source-rt
SUSE Linux Enterprise Micro 5.5:kernel-default
SUSE Linux Enterprise Micro 5.5:kernel-source
+ SUSE Linux Enterprise Micro 5.5:kernel-source-rt
SUSE Linux Enterprise Micro 6.0:kernel-default
SUSE Linux Enterprise Micro 6.0:kernel-devel
SUSE Linux Enterprise Micro 6.0:kernel-devel-rt
@@ -1335,6 +1388,12 @@
SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-source-azure
SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt
SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt
+ SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-default
+ SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-default-base
+ SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-default-devel
+ SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-source
+ SUSE Linux Enterprise Server 11 SP4 LTSS:kernel-default
+ SUSE Linux Enterprise Server 11 SP4 LTSS:kernel-source
SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default
SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base
SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel
@@ -1367,18 +1426,89 @@
SUSE Linux Enterprise Server 12 SP5:kernel-macros
SUSE Linux Enterprise Server 12 SP5:kernel-source
SUSE Linux Enterprise Server 12 SP5:kernel-source-azure
+ SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default
+ SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base
+ SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel
+ SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-man
+ SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-devel
+ SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-macros
+ SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-source
+ SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default
+ SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default
+ SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel
+ SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-devel
+ SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-macros
+ SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-source
+ SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default
+ SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default
+ SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel
+ SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-devel
+ SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-macros
+ SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-source
+ SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default
+ SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default
+ SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel
+ SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-devel
+ SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-macros
+ SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-source
+ SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default
+ SUSE Linux Enterprise Server 15-LTSS:kernel-default
+ SUSE Linux Enterprise Server 15-LTSS:kernel-default-base
+ SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel
+ SUSE Linux Enterprise Server 15-LTSS:kernel-default-man
+ SUSE Linux Enterprise Server 15-LTSS:kernel-devel
+ SUSE Linux Enterprise Server 15-LTSS:kernel-macros
+ SUSE Linux Enterprise Server 15-LTSS:kernel-source
+ SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default
SUSE Linux Enterprise Server Teradata 12 SP3-LTSS:kernel-default
SUSE Linux Enterprise Server Teradata 12 SP3-LTSS:kernel-source
SUSE Linux Enterprise Server Teradata 12 SP3:kernel-default
SUSE Linux Enterprise Server Teradata 12 SP3:kernel-source
+ SUSE Linux Enterprise Server Teradata 15 SP4:kernel-default
+ SUSE Linux Enterprise Server Teradata 15 SP4:kernel-source
SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default
SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source
SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure
+ SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default
+ SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel
+ SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-devel
+ SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-macros
+ SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-source
+ SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default
+ SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default
+ SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel
+ SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-devel
+ SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-macros
+ SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-source
+ SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default
+ SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default
+ SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel
+ SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-devel
+ SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-macros
+ SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-source
+ SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default
SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-default
SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-source
SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default
SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra
SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-source
+ SUSE Manager Proxy 4.3:kernel-default
+ SUSE Manager Proxy 4.3:kernel-default-devel
+ SUSE Manager Proxy 4.3:kernel-devel
+ SUSE Manager Proxy 4.3:kernel-macros
+ SUSE Manager Proxy 4.3:kernel-source
+ SUSE Manager Retail Branch Server 4.3:kernel-default
+ SUSE Manager Retail Branch Server 4.3:kernel-default-devel
+ SUSE Manager Retail Branch Server 4.3:kernel-devel
+ SUSE Manager Retail Branch Server 4.3:kernel-macros
+ SUSE Manager Retail Branch Server 4.3:kernel-source
+ SUSE Manager Server 4.3:kernel-default
+ SUSE Manager Server 4.3:kernel-default-devel
+ SUSE Manager Server 4.3:kernel-devel
+ SUSE Manager Server 4.3:kernel-macros
+ SUSE Manager Server 4.3:kernel-source
+ SUSE Real Time Module 15 SP5:kernel-devel-rt
+ SUSE Real Time Module 15 SP5:kernel-source-rt
openSUSE Leap 15.5:cluster-md-kmp-default
openSUSE Leap 15.5:dlm-kmp-default
openSUSE Leap 15.5:gfs2-kmp-default
@@ -1390,12 +1520,33 @@
openSUSE Leap 15.5:kernel-default-optional
openSUSE Leap 15.5:kernel-default-vdso
openSUSE Leap 15.5:kernel-devel
+ openSUSE Leap 15.5:kernel-devel-rt
openSUSE Leap 15.5:kernel-macros
openSUSE Leap 15.5:kernel-source
+ openSUSE Leap 15.5:kernel-source-rt
openSUSE Leap 15.5:kernel-source-vanilla
openSUSE Leap 15.5:kselftests-kmp-default
openSUSE Leap 15.5:ocfs2-kmp-default
openSUSE Leap 15.5:reiserfs-kmp-default
+ openSUSE Leap 15.6:cluster-md-kmp-default
+ openSUSE Leap 15.6:dlm-kmp-default
+ openSUSE Leap 15.6:gfs2-kmp-default
+ openSUSE Leap 15.6:kernel-default
+ openSUSE Leap 15.6:kernel-default-devel
+ openSUSE Leap 15.6:kernel-default-extra
+ openSUSE Leap 15.6:kernel-default-livepatch
+ openSUSE Leap 15.6:kernel-default-livepatch-devel
+ openSUSE Leap 15.6:kernel-default-optional
+ openSUSE Leap 15.6:kernel-default-vdso
+ openSUSE Leap 15.6:kernel-devel
+ openSUSE Leap 15.6:kernel-devel-rt
+ openSUSE Leap 15.6:kernel-macros
+ openSUSE Leap 15.6:kernel-source
+ openSUSE Leap 15.6:kernel-source-rt
+ openSUSE Leap 15.6:kernel-source-vanilla
+ openSUSE Leap 15.6:kselftests-kmp-default
+ openSUSE Leap 15.6:ocfs2-kmp-default
+ openSUSE Leap 15.6:reiserfs-kmp-default
skipping CVE-2024-49900 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-49899 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-49897 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-49894 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-49893 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-49888 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-49887 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-49885 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-49879 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-49878 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-49877 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-49876 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-49871 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-49870 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-49868 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-49866 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-49865 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-49863 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-49861 as CVE page is older than CVRF-CVE file.
--- /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2024-49860.xml 2024-10-22 01:11:32.752702000 +0200
+++ /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2024-49860.xml.new 2024-10-29 01:11:39.497221000 +0100
@@ -14,13 +14,13 @@
1
- 1
- 2024-10-21T23:11:32Z
+ 2
+ 2024-10-29T00:11:39Z
current
2024-10-21T23:11:32Z
- 2024-10-21T23:11:32Z
+ 2024-10-29T00:11:39Z
cve-database/bin/generate-cvrf-cve.pl
2020-12-27T01:00:00Z
@@ -59,11 +59,6 @@
SUSE Linux Enterprise High Availability Extension 12 SP5
-
-
- SUSE Linux Enterprise Module for Public Cloud 12
-
-
SUSE Linux Enterprise High Performance Computing 12 SP5
@@ -196,35 +191,17 @@
SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE
-
-
- SUSE Linux Enterprise Module for Public Cloud 12
-
-
SUSE Linux Enterprise Server 12 SP2-LTSS
-
-
- SUSE Linux Enterprise Module for Public Cloud 12
-
-
-
-
- SUSE Linux Enterprise Module for Public Cloud 12
-
-
SUSE Linux Enterprise Server 12 SP4-LTSS
-
- SUSE Linux Enterprise Module for Public Cloud 12
-
SUSE Linux Enterprise Server 12 SP5
@@ -302,25 +279,7 @@
SUSE Linux Enterprise Server Teradata 15 SP4
-
-
- SUSE Linux Enterprise Module for Public Cloud 12
-
-
-
-
- SUSE Linux Enterprise Module for Public Cloud 12
-
-
-
-
- SUSE Linux Enterprise Module for Public Cloud 12
-
-
-
- SUSE Linux Enterprise Module for Public Cloud 12
-
SUSE Linux Enterprise Server for SAP Applications 12 SP5
@@ -759,12 +718,6 @@
kernel-source as a component of SUSE Linux Enterprise Module for Development Tools 15 SP6
-
- kernel-default as a component of SUSE Linux Enterprise Module for Public Cloud 12
-
-
- kernel-source as a component of SUSE Linux Enterprise Module for Public Cloud 12
-
kernel-devel-azure as a component of SUSE Linux Enterprise Module for Public Cloud 15 SP5
skipping CVE-2024-49859 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-49858 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-49857 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-49856 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-49854 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-49853 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-49852 as CVE page is older than CVRF-CVE file.
Use of uninitialized value $mtime in numeric lt (<) at bin/generate-cvrf-cve.pl line 162.
Use of uninitialized value $mtime in numeric lt (<) at bin/generate-cvrf-cve.pl line 162.
Use of uninitialized value $mtime in numeric lt (<) at bin/generate-cvrf-cve.pl line 162.
skipping CVE-2024-49195 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-48958 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-48957 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-48949 as CVE page is older than CVRF-CVE file.
--- /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2024-48948.xml 2024-10-24 01:10:55.534056000 +0200
+++ /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2024-48948.xml.new 2024-10-29 01:11:43.119955000 +0100
@@ -14,13 +14,13 @@
1
- 2
- 2024-10-23T23:10:55Z
+ 3
+ 2024-10-29T00:11:42Z
current
2024-10-15T23:10:24Z
- 2024-10-23T23:10:55Z
+ 2024-10-29T00:11:42Z
cve-database/bin/generate-cvrf-cve.pl
2020-12-27T01:00:00Z
@@ -247,6 +247,11 @@
openSUSE Leap 15.6
+
+
+ openSUSE Tumbleweed
+
+
cockpit
@@ -421,12 +426,30 @@
pgadmin4-web-uwsgi-8.5-150600.3.6.1
+
+ python310-pytest-html-4.1.1-3.1
+
+
+ python311-pytest-html-4.1.1-3.1
+
+
+ python312-pytest-html-4.1.1-3.1
+
system-user-pgadmin
system-user-pgadmin-8.5-150600.3.6.1
+
+ python310-pytest-html-4.1.1-3.1 as a component of openSUSE Tumbleweed
+
+
+ python311-pytest-html-4.1.1-3.1 as a component of openSUSE Tumbleweed
+
+
+ python312-pytest-html-4.1.1-3.1 as a component of openSUSE Tumbleweed
+
pgadmin4-8.5-150600.3.6.1 as a component of SUSE Linux Enterprise Module for Python 3 15 SP6
@@ -1349,6 +1372,11 @@
CVE-2024-48948
+
+ openSUSE Tumbleweed:python310-pytest-html-4.1.1-3.1
+ openSUSE Tumbleweed:python311-pytest-html-4.1.1-3.1
+ openSUSE Tumbleweed:python312-pytest-html-4.1.1-3.1
+
SUSE Linux Enterprise Module for Python 3 15 SP6:pgadmin4-8.5-150600.3.6.1
SUSE Linux Enterprise Module for Python 3 15 SP6:pgadmin4-doc-8.5-150600.3.6.1
skipping CVE-2024-48426 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-48425 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-48424 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-48423 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-48208 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-47875 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-47874 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-47871 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-47869 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-47868 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-47850 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-47814 as CVE page is older than CVRF-CVE file.
--- /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2024-47757.xml 2024-10-24 01:11:00.286808000 +0200
+++ /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2024-47757.xml.new 2024-10-29 01:11:46.330224000 +0100
@@ -14,13 +14,13 @@
1
- 3
- 2024-10-23T23:10:59Z
+ 4
+ 2024-10-29T00:11:45Z
current
2024-10-21T23:11:45Z
- 2024-10-23T23:10:59Z
+ 2024-10-29T00:11:45Z
cve-database/bin/generate-cvrf-cve.pl
2020-12-27T01:00:00Z
@@ -71,11 +71,6 @@
SUSE Linux Enterprise High Availability Extension 12 SP5
-
-
- SUSE Linux Enterprise Module for Public Cloud 12
-
-
SUSE Linux Enterprise High Performance Computing 12 SP5
@@ -208,35 +203,17 @@
SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE
-
-
- SUSE Linux Enterprise Module for Public Cloud 12
-
-
SUSE Linux Enterprise Server 12 SP2-LTSS
-
-
- SUSE Linux Enterprise Module for Public Cloud 12
-
-
-
-
- SUSE Linux Enterprise Module for Public Cloud 12
-
-
SUSE Linux Enterprise Server 12 SP4-LTSS
-
- SUSE Linux Enterprise Module for Public Cloud 12
-
SUSE Linux Enterprise Server 12 SP5
@@ -314,25 +291,7 @@
SUSE Linux Enterprise Server Teradata 15 SP4
-
-
- SUSE Linux Enterprise Module for Public Cloud 12
-
-
-
-
- SUSE Linux Enterprise Module for Public Cloud 12
-
-
-
-
- SUSE Linux Enterprise Module for Public Cloud 12
-
-
-
- SUSE Linux Enterprise Module for Public Cloud 12
-
SUSE Linux Enterprise Server for SAP Applications 12 SP5
@@ -771,12 +730,6 @@
kernel-source as a component of SUSE Linux Enterprise Module for Development Tools 15 SP6
-
- kernel-default as a component of SUSE Linux Enterprise Module for Public Cloud 12
-
-
- kernel-source as a component of SUSE Linux Enterprise Module for Public Cloud 12
-
kernel-devel-azure as a component of SUSE Linux Enterprise Module for Public Cloud 15 SP5
skipping CVE-2024-47754 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-47752 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-47749 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-47748 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-47746 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-47743 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-47734 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-47731 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-47725 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-47669 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-47611 as CVE page is older than CVRF-CVE file.
No V5 entry found for CVE-2024-47516 / /home/securitybot/prod/cve-database/cvelistV5/cves/2024/47xxxx/CVE-2024-47516.json:No such file or directory
No V5 entry found for CVE-2024-47515 / /home/securitybot/prod/cve-database/cvelistV5/cves/2024/47xxxx/CVE-2024-47515.json:No such file or directory
skipping CVE-2024-47220 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-47177 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-47176 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-47175 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-47168 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-47167 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-47166 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-47165 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-47164 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-47084 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-47076 as CVE page is older than CVRF-CVE file.
No V5 entry found for CVE-2024-46956 / /home/securitybot/prod/cve-database/cvelistV5/cves/2024/46xxxx/CVE-2024-46956.json:No such file or directory
--- /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2024-46956.xml 2024-10-25 01:12:00.560008000 +0200
+++ /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2024-46956.xml.new 2024-10-29 01:12:25.709205000 +0100
@@ -14,13 +14,13 @@
1
- 2
- 2024-10-24T23:12:00Z
+ 3
+ 2024-10-29T00:12:25Z
current
2024-10-23T23:11:29Z
- 2024-10-24T23:12:00Z
+ 2024-10-29T00:12:25Z
cve-database/bin/generate-cvrf-cve.pl
2020-12-27T01:00:00Z
@@ -497,8 +497,14 @@
- low
+ important
+
+
+ 7.8
+ CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
+
+
No V5 entry found for CVE-2024-46955 / /home/securitybot/prod/cve-database/cvelistV5/cves/2024/46xxxx/CVE-2024-46955.json:No such file or directory
--- /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2024-46955.xml 2024-10-25 01:12:01.259935000 +0200
+++ /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2024-46955.xml.new 2024-10-29 01:12:26.697154000 +0100
@@ -14,13 +14,13 @@
1
- 2
- 2024-10-24T23:12:00Z
+ 3
+ 2024-10-29T00:12:26Z
current
2024-10-23T23:11:29Z
- 2024-10-24T23:12:00Z
+ 2024-10-29T00:12:26Z
cve-database/bin/generate-cvrf-cve.pl
2020-12-27T01:00:00Z
@@ -500,8 +500,14 @@
- low
+ moderate
+
+
+ 5.5
+ CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
+
+
No V5 entry found for CVE-2024-46954 / /home/securitybot/prod/cve-database/cvelistV5/cves/2024/46xxxx/CVE-2024-46954.json:No such file or directory
No V5 entry found for CVE-2024-46953 / /home/securitybot/prod/cve-database/cvelistV5/cves/2024/46xxxx/CVE-2024-46953.json:No such file or directory
--- /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2024-46953.xml 2024-10-25 01:12:02.616856000 +0200
+++ /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2024-46953.xml.new 2024-10-29 01:12:27.774074000 +0100
@@ -14,13 +14,13 @@
1
- 2
- 2024-10-24T23:12:02Z
+ 3
+ 2024-10-29T00:12:27Z
current
2024-10-23T23:11:30Z
- 2024-10-24T23:12:02Z
+ 2024-10-29T00:12:27Z
cve-database/bin/generate-cvrf-cve.pl
2020-12-27T01:00:00Z
@@ -497,8 +497,14 @@
- low
+ important
+
+
+ 7.8
+ CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
+
+
No V5 entry found for CVE-2024-46952 / /home/securitybot/prod/cve-database/cvelistV5/cves/2024/46xxxx/CVE-2024-46952.json:No such file or directory
--- /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2024-46952.xml 2024-10-25 01:12:03.303313000 +0200
+++ /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2024-46952.xml.new 2024-10-29 01:12:28.397027000 +0100
@@ -14,13 +14,13 @@
1
- 2
- 2024-10-24T23:12:02Z
+ 3
+ 2024-10-29T00:12:28Z
current
2024-10-23T23:11:30Z
- 2024-10-24T23:12:02Z
+ 2024-10-29T00:12:28Z
cve-database/bin/generate-cvrf-cve.pl
2020-12-27T01:00:00Z
@@ -575,8 +575,14 @@
- low
+ important
+
+
+ 7.8
+ CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
+
+
No V5 entry found for CVE-2024-46951 / /home/securitybot/prod/cve-database/cvelistV5/cves/2024/46xxxx/CVE-2024-46951.json:No such file or directory
--- /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2024-46951.xml 2024-10-25 01:12:03.976276000 +0200
+++ /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2024-46951.xml.new 2024-10-29 01:12:29.169988000 +0100
@@ -14,13 +14,13 @@
1
- 2
- 2024-10-24T23:12:03Z
+ 3
+ 2024-10-29T00:12:28Z
current
2024-10-23T23:11:31Z
- 2024-10-24T23:12:03Z
+ 2024-10-29T00:12:28Z
cve-database/bin/generate-cvrf-cve.pl
2020-12-27T01:00:00Z
@@ -500,8 +500,14 @@
- low
+ important
+
+
+ 7.8
+ CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
+
+
skipping CVE-2024-46869 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-46868 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-46867 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-46866 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-46865 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-46864 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-46863 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-46862 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-46860 as CVE page is older than CVRF-CVE file.
--- /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2024-46859.xml 2024-10-16 01:10:51.649646000 +0200
+++ /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2024-46859.xml.new 2024-10-29 01:12:31.488940000 +0100
@@ -14,13 +14,13 @@
1
- 9
- 2024-10-15T23:10:51Z
+ 10
+ 2024-10-29T00:12:30Z
current
2024-09-27T23:10:26Z
- 2024-10-15T23:10:51Z
+ 2024-10-29T00:12:30Z
cve-database/bin/generate-cvrf-cve.pl
2020-12-27T01:00:00Z
@@ -68,6 +68,21 @@
+
+
+ Image SLES12-SP5-GCE-BYOS
+
+
+
+
+ Image SLES12-SP5-GCE-SAP-BYOS
+
+
+
+
+ Image SLES12-SP5-GCE-SAP-On-Demand
+
+
SUSE Linux Enterprise Module for Basesystem 15 SP5
@@ -372,6 +387,253 @@
openSUSE Leap 15.6
+
+
+ SLES 15 SP1 CHOST Images for Amazon EC2 suse-sles-15-sp1-chost-byos-v20210304-hvm-ssd-x86_64
+ SLES 15 SP1 CHOST Images for Amazon EC2 suse-sles-15-sp1-chost-byos-v20220127-hvm-ssd-x86_64
+ SLES 15 SP1 CHOST Images for Amazon EC2 suse-sles-15-sp1-chost-byos-v20220715-hvm-ssd-x86_64
+
+
+ SLES 15 SP2 CHOST Images for Amazon EC2 suse-sles-15-sp2-chost-byos-v20210610-hvm-ssd-x86_64
+ SLES 15 SP2 CHOST Images for Amazon EC2 suse-sles-15-sp2-chost-byos-v20210722-hvm-ssd-x86_64
+ SLES 15 SP2 CHOST Images for Amazon EC2 suse-sles-15-sp2-chost-byos-v20210913-hvm-ssd-x86_64
+ SLES 15 SP2 CHOST Images for Amazon EC2 suse-sles-15-sp2-chost-byos-v20211025-hvm-ssd-x86_64
+ SLES 15 SP2 CHOST Images for Amazon EC2 suse-sles-15-sp2-chost-byos-v20220126-hvm-ssd-x86_64
+ SLES 15 SP2 CHOST Images for Amazon EC2 suse-sles-15-sp2-chost-byos-v20220718-hvm-ssd-x86_64
+
+
+ SLES 15 SP3 CHOST Images for Amazon EC2 suse-sles-15-sp3-chost-byos-v20210729-hvm-ssd-x86_64
+ SLES 15 SP3 CHOST Images for Amazon EC2 suse-sles-15-sp3-chost-byos-v20210827-hvm-ssd-x86_64
+ SLES 15 SP3 CHOST Images for Amazon EC2 suse-sles-15-sp3-chost-byos-v20210927-hvm-ssd-x86_64
+ SLES 15 SP3 CHOST Images for Amazon EC2 suse-sles-15-sp3-chost-byos-v20211004-hvm-ssd-x86_64
+ SLES 15 SP3 CHOST Images for Amazon EC2 suse-sles-15-sp3-chost-byos-v20211101-hvm-ssd-x86_64
+ SLES 15 SP3 CHOST Images for Amazon EC2 suse-sles-15-sp3-chost-byos-v20211202-hvm-ssd-x86_64
+ SLES 15 SP3 CHOST Images for Amazon EC2 suse-sles-15-sp3-chost-byos-v20220103-hvm-ssd-x86_64
+ SLES 15 SP3 CHOST Images for Amazon EC2 suse-sles-15-sp3-chost-byos-v20220126-hvm-ssd-x86_64
+ SLES 15 SP3 CHOST Images for Amazon EC2 suse-sles-15-sp3-chost-byos-v20220222-hvm-ssd-x86_64
+ SLES 15 SP3 CHOST Images for Amazon EC2 suse-sles-15-sp3-chost-byos-v20220310-hvm-ssd-x86_64
+ SLES 15 SP3 CHOST Images for Amazon EC2 suse-sles-15-sp3-chost-byos-v20220411-hvm-ssd-x86_64
+ SLES 15 SP3 CHOST Images for Amazon EC2 suse-sles-15-sp3-chost-byos-v20220510-hvm-ssd-x86_64
+ SLES 15 SP3 CHOST Images for Amazon EC2 suse-sles-15-sp3-chost-byos-v20220608-hvm-ssd-x86_64
+ SLES 15 SP3 CHOST Images for Amazon EC2 suse-sles-15-sp3-chost-byos-v20220708-hvm-ssd-x86_64
+ SLES 15 SP3 CHOST Images for Amazon EC2 suse-sles-15-sp3-chost-byos-v20220718-hvm-ssd-x86_64
+ SLES 15 SP3 CHOST Images for Amazon EC2 suse-sles-15-sp3-chost-byos-v20220818-hvm-ssd-x86_64
+ SLES 15 SP3 CHOST Images for Amazon EC2 suse-sles-15-sp3-chost-byos-v20220916-hvm-ssd-x86_64
+ SLES 15 SP3 CHOST Images for Amazon EC2 suse-sles-15-sp3-chost-byos-v20220921-hvm-ssd-x86_64
+ SLES 15 SP3 CHOST Images for Amazon EC2 suse-sles-15-sp3-chost-byos-v20221019-hvm-ssd-x86_64
+ SLES 15 SP3 CHOST Images for Amazon EC2 suse-sles-15-sp3-chost-byos-v20221119-hvm-ssd-x86_64
+ SLES 15 SP3 CHOST Images for Amazon EC2 suse-sles-15-sp3-chost-byos-v20221215-hvm-ssd-x86_64
+ SLES 15 SP3 CHOST Images for Amazon EC2 suse-sles-15-sp3-chost-byos-v20230313-hvm-ssd-x86_64
+ SLES 15 SP3 CHOST Images for Amazon EC2 suse-sles-15-sp3-chost-byos-v20230613-hvm-ssd-x86_64
+ SLES 15 SP3 CHOST Images for Amazon EC2 suse-sles-15-sp3-chost-byos-v20240807-hvm-ssd-x86_64
+ SLES 15 SP3 CHOST Images for Amazon EC2 suse-sles-15-sp3-chost-byos-v20240912-hvm-ssd-x86_64
+
+
+ SLES 15 SP4 CHOST Images for Amazon EC2 suse-sles-15-sp4-chost-byos-v20220718-hvm-ssd-x86_64
+ SLES 15 SP4 CHOST Images for Amazon EC2 suse-sles-15-sp4-chost-byos-v20220721-hvm-ssd-x86_64
+ SLES 15 SP4 CHOST Images for Amazon EC2 suse-sles-15-sp4-chost-byos-v20220819-hvm-ssd-x86_64
+ SLES 15 SP4 CHOST Images for Amazon EC2 suse-sles-15-sp4-chost-byos-v20220916-hvm-ssd-x86_64
+ SLES 15 SP4 CHOST Images for Amazon EC2 suse-sles-15-sp4-chost-byos-v20220923-hvm-ssd-x86_64
+ SLES 15 SP4 CHOST Images for Amazon EC2 suse-sles-15-sp4-chost-byos-v20221018-hvm-ssd-x86_64
+ SLES 15 SP4 CHOST Images for Amazon EC2 suse-sles-15-sp4-chost-byos-v20221118-hvm-ssd-x86_64
+ SLES 15 SP4 CHOST Images for Amazon EC2 suse-sles-15-sp4-chost-byos-v20221215-hvm-ssd-x86_64
+ SLES 15 SP4 CHOST Images for Amazon EC2 suse-sles-15-sp4-chost-byos-v20230111-hvm-ssd-x86_64
+ SLES 15 SP4 CHOST Images for Amazon EC2 suse-sles-15-sp4-chost-byos-v20230210-hvm-ssd-x86_64
+ SLES 15 SP4 CHOST Images for Amazon EC2 suse-sles-15-sp4-chost-byos-v20230310-hvm-ssd-x86_64
+ SLES 15 SP4 CHOST Images for Amazon EC2 suse-sles-15-sp4-chost-byos-v20230410-hvm-ssd-x86_64
+ SLES 15 SP4 CHOST Images for Amazon EC2 suse-sles-15-sp4-chost-byos-v20230510-hvm-ssd-x86_64
+ SLES 15 SP4 CHOST Images for Amazon EC2 suse-sles-15-sp4-chost-byos-v20230606-hvm-ssd-x86_64
+ SLES 15 SP4 CHOST Images for Amazon EC2 suse-sles-15-sp4-chost-byos-v20230704-hvm-ssd-x86_64
+ SLES 15 SP4 CHOST Images for Amazon EC2 suse-sles-15-sp4-chost-byos-v20230803-hvm-ssd-x86_64
+ SLES 15 SP4 CHOST Images for Amazon EC2 suse-sles-15-sp4-chost-byos-v20230901-hvm-ssd-x86_64
+ SLES 15 SP4 CHOST Images for Amazon EC2 suse-sles-15-sp4-chost-byos-v20230928-hvm-ssd-x86_64
+ SLES 15 SP4 CHOST Images for Amazon EC2 suse-sles-15-sp4-chost-byos-v20231027-hvm-ssd-x86_64
+ SLES 15 SP4 CHOST Images for Amazon EC2 suse-sles-15-sp4-chost-byos-v20231127-hvm-ssd-x86_64
+ SLES 15 SP4 CHOST Images for Amazon EC2 suse-sles-15-sp4-chost-byos-v20231212-hvm-ssd-x86_64
+ SLES 15 SP4 CHOST Images for Amazon EC2 suse-sles-15-sp4-chost-byos-v20240312-hvm-ssd-x86_64
+ SLES 15 SP4 CHOST Images for Amazon EC2 suse-sles-15-sp4-chost-byos-v20240612-hvm-ssd-x86_64
+ SLES 15 SP4 CHOST Images for Amazon EC2 suse-sles-15-sp4-chost-byos-v20240809-hvm-ssd-x86_64
+ SLES 15 SP4 CHOST Images for Amazon EC2 suse-sles-15-sp4-chost-byos-v20240912-hvm-ssd-x86_64
+
+
+ SLES 15 SP1 CHOST Images for Google sles-15-sp1-chost-byos-v20210202
+ SLES 15 SP1 CHOST Images for Google sles-15-sp1-chost-byos-v20210304
+ SLES 15 SP1 CHOST Images for Google sles-15-sp1-chost-byos-v20220127
+ SLES 15 SP1 CHOST Images for Google sles-15-sp1-chost-byos-v20220715-x86-64
+
+
+ SLES 15 SP2 CHOST Images for Google sles-15-sp2-chost-byos-v20210202
+ SLES 15 SP2 CHOST Images for Google sles-15-sp2-chost-byos-v20210304
+ SLES 15 SP2 CHOST Images for Google sles-15-sp2-chost-byos-v20210405
+ SLES 15 SP2 CHOST Images for Google sles-15-sp2-chost-byos-v20210506
+ SLES 15 SP2 CHOST Images for Google sles-15-sp2-chost-byos-v20210610
+ SLES 15 SP2 CHOST Images for Google sles-15-sp2-chost-byos-v20210722
+ SLES 15 SP2 CHOST Images for Google sles-15-sp2-chost-byos-v20210913
+ SLES 15 SP2 CHOST Images for Google sles-15-sp2-chost-byos-v20211025
+ SLES 15 SP2 CHOST Images for Google sles-15-sp2-chost-byos-v20220126
+ SLES 15 SP2 CHOST Images for Google sles-15-sp2-chost-byos-v20220718-x86-64
+
+
+ SLES 15 SP3 CHOST Images for Google sles-15-sp3-chost-byos-v20210729
+ SLES 15 SP3 CHOST Images for Google sles-15-sp3-chost-byos-v20210827
+ SLES 15 SP3 CHOST Images for Google sles-15-sp3-chost-byos-v20210927
+ SLES 15 SP3 CHOST Images for Google sles-15-sp3-chost-byos-v20211004
+ SLES 15 SP3 CHOST Images for Google sles-15-sp3-chost-byos-v20211101
+ SLES 15 SP3 CHOST Images for Google sles-15-sp3-chost-byos-v20211202
+ SLES 15 SP3 CHOST Images for Google sles-15-sp3-chost-byos-v20220103
+ SLES 15 SP3 CHOST Images for Google sles-15-sp3-chost-byos-v20220126
+ SLES 15 SP3 CHOST Images for Google sles-15-sp3-chost-byos-v20220222
+ SLES 15 SP3 CHOST Images for Google sles-15-sp3-chost-byos-v20220310
+ SLES 15 SP3 CHOST Images for Google sles-15-sp3-chost-byos-v20220411-x86-64
+ SLES 15 SP3 CHOST Images for Google sles-15-sp3-chost-byos-v20220510-x86-64
+ SLES 15 SP3 CHOST Images for Google sles-15-sp3-chost-byos-v20220608-x86-64
+ SLES 15 SP3 CHOST Images for Google sles-15-sp3-chost-byos-v20220708-x86-64
+ SLES 15 SP3 CHOST Images for Google sles-15-sp3-chost-byos-v20220718-x86-64
+ SLES 15 SP3 CHOST Images for Google sles-15-sp3-chost-byos-v20220818-x86-64
+ SLES 15 SP3 CHOST Images for Google sles-15-sp3-chost-byos-v20220916-x86-64
+ SLES 15 SP3 CHOST Images for Google sles-15-sp3-chost-byos-v20221019-x86-64
+ SLES 15 SP3 CHOST Images for Google sles-15-sp3-chost-byos-v20221118-x86-64
+ SLES 15 SP3 CHOST Images for Google sles-15-sp3-chost-byos-v20221215-x86-64
+ SLES 15 SP3 CHOST Images for Google sles-15-sp3-chost-byos-v20230313-x86-64
+ SLES 15 SP3 CHOST Images for Google sles-15-sp3-chost-byos-v20230613-x86-64
+ SLES 15 SP3 CHOST Images for Google sles-15-sp3-chost-byos-v20240807-x86-64
+ SLES 15 SP3 CHOST Images for Google sles-15-sp3-chost-byos-v20240912-x86-64
+
+
+ SLES 15 SP4 CHOST Images for Google sles-15-sp4-chost-byos-v20220718-x86-64
+ SLES 15 SP4 CHOST Images for Google sles-15-sp4-chost-byos-v20220721-x86-64
+ SLES 15 SP4 CHOST Images for Google sles-15-sp4-chost-byos-v20220818-x86-64
+ SLES 15 SP4 CHOST Images for Google sles-15-sp4-chost-byos-v20220916-x86-64
+ SLES 15 SP4 CHOST Images for Google sles-15-sp4-chost-byos-v20221018-x86-64
+ SLES 15 SP4 CHOST Images for Google sles-15-sp4-chost-byos-v20221118-x86-64
+ SLES 15 SP4 CHOST Images for Google sles-15-sp4-chost-byos-v20221215-arm64
+ SLES 15 SP4 CHOST Images for Google sles-15-sp4-chost-byos-v20221215-x86-64
+ SLES 15 SP4 CHOST Images for Google sles-15-sp4-chost-byos-v20230111-arm64
+ SLES 15 SP4 CHOST Images for Google sles-15-sp4-chost-byos-v20230111-x86-64
+ SLES 15 SP4 CHOST Images for Google sles-15-sp4-chost-byos-v20230210-arm64
+ SLES 15 SP4 CHOST Images for Google sles-15-sp4-chost-byos-v20230210-x86-64
+ SLES 15 SP4 CHOST Images for Google sles-15-sp4-chost-byos-v20230310-arm64
+ SLES 15 SP4 CHOST Images for Google sles-15-sp4-chost-byos-v20230310-x86-64
+ SLES 15 SP4 CHOST Images for Google sles-15-sp4-chost-byos-v20230410-arm64
+ SLES 15 SP4 CHOST Images for Google sles-15-sp4-chost-byos-v20230410-x86-64
+ SLES 15 SP4 CHOST Images for Google sles-15-sp4-chost-byos-v20230510-arm64
+ SLES 15 SP4 CHOST Images for Google sles-15-sp4-chost-byos-v20230510-x86-64
+ SLES 15 SP4 CHOST Images for Google sles-15-sp4-chost-byos-v20230606-arm64
+ SLES 15 SP4 CHOST Images for Google sles-15-sp4-chost-byos-v20230606-x86-64
+ SLES 15 SP4 CHOST Images for Google sles-15-sp4-chost-byos-v20230704-arm64
+ SLES 15 SP4 CHOST Images for Google sles-15-sp4-chost-byos-v20230704-x86-64
+ SLES 15 SP4 CHOST Images for Google sles-15-sp4-chost-byos-v20230804-arm64
+ SLES 15 SP4 CHOST Images for Google sles-15-sp4-chost-byos-v20230804-x86-64
+ SLES 15 SP4 CHOST Images for Google sles-15-sp4-chost-byos-v20230901-arm64
+ SLES 15 SP4 CHOST Images for Google sles-15-sp4-chost-byos-v20230901-x86-64
+ SLES 15 SP4 CHOST Images for Google sles-15-sp4-chost-byos-v20230928-arm64
+ SLES 15 SP4 CHOST Images for Google sles-15-sp4-chost-byos-v20230928-x86-64
+ SLES 15 SP4 CHOST Images for Google sles-15-sp4-chost-byos-v20231027-arm64
+ SLES 15 SP4 CHOST Images for Google sles-15-sp4-chost-byos-v20231027-x86-64
+ SLES 15 SP4 CHOST Images for Google sles-15-sp4-chost-byos-v20231127-arm64
+ SLES 15 SP4 CHOST Images for Google sles-15-sp4-chost-byos-v20231127-x86-64
+ SLES 15 SP4 CHOST Images for Google sles-15-sp4-chost-byos-v20231212-arm64
+ SLES 15 SP4 CHOST Images for Google sles-15-sp4-chost-byos-v20231212-x86-64
+ SLES 15 SP4 CHOST Images for Google sles-15-sp4-chost-byos-v20240312-arm64
+ SLES 15 SP4 CHOST Images for Google sles-15-sp4-chost-byos-v20240312-x86-64
+ SLES 15 SP4 CHOST Images for Google sles-15-sp4-chost-byos-v20240612-arm64
+ SLES 15 SP4 CHOST Images for Google sles-15-sp4-chost-byos-v20240612-x86-64
+ SLES 15 SP4 CHOST Images for Google sles-15-sp4-chost-byos-v20240809-arm64
+ SLES 15 SP4 CHOST Images for Google sles-15-sp4-chost-byos-v20240809-x86-64
+ SLES 15 SP4 CHOST Images for Google sles-15-sp4-chost-byos-v20240912-arm64
+ SLES 15 SP4 CHOST Images for Google sles-15-sp4-chost-byos-v20240912-x86-64
+
+
+ SLES 15 SP1 CHOST Images for Microsoft Azure suse-sles-15-sp1-chost-byos-v20210202
+ SLES 15 SP1 CHOST Images for Microsoft Azure suse-sles-15-sp1-chost-byos-v20210304
+ SLES 15 SP1 CHOST Images for Microsoft Azure suse-sles-15-sp1-chost-byos-v20220127
+ SLES 15 SP1 CHOST Images for Microsoft Azure suse-sles-15-sp1-chost-byos-v20220715-x86_64
+
+
+ SLES 15 SP2 CHOST Images for Microsoft Azure suse-sles-15-sp2-chost-byos-v20210202
+ SLES 15 SP2 CHOST Images for Microsoft Azure suse-sles-15-sp2-chost-byos-v20210304
+ SLES 15 SP2 CHOST Images for Microsoft Azure suse-sles-15-sp2-chost-byos-v20210405
+ SLES 15 SP2 CHOST Images for Microsoft Azure suse-sles-15-sp2-chost-byos-v20210506
+ SLES 15 SP2 CHOST Images for Microsoft Azure suse-sles-15-sp2-chost-byos-v20210610
+ SLES 15 SP2 CHOST Images for Microsoft Azure suse-sles-15-sp2-chost-byos-v20210722
+ SLES 15 SP2 CHOST Images for Microsoft Azure suse-sles-15-sp2-chost-byos-v20210913
+ SLES 15 SP2 CHOST Images for Microsoft Azure suse-sles-15-sp2-chost-byos-v20211025
+ SLES 15 SP2 CHOST Images for Microsoft Azure suse-sles-15-sp2-chost-byos-v20220126
+ SLES 15 SP2 CHOST Images for Microsoft Azure suse-sles-15-sp2-chost-byos-v20220718-x86_64
+
+
+ SLES 15 SP3 CHOST Images for Microsoft Azure suse-sles-15-sp3-chost-byos-v20210729
+ SLES 15 SP3 CHOST Images for Microsoft Azure suse-sles-15-sp3-chost-byos-v20210827
+ SLES 15 SP3 CHOST Images for Microsoft Azure suse-sles-15-sp3-chost-byos-v20210927
+ SLES 15 SP3 CHOST Images for Microsoft Azure suse-sles-15-sp3-chost-byos-v20211004
+ SLES 15 SP3 CHOST Images for Microsoft Azure suse-sles-15-sp3-chost-byos-v20211101
+ SLES 15 SP3 CHOST Images for Microsoft Azure suse-sles-15-sp3-chost-byos-v20211202
+ SLES 15 SP3 CHOST Images for Microsoft Azure suse-sles-15-sp3-chost-byos-v20220103
+ SLES 15 SP3 CHOST Images for Microsoft Azure suse-sles-15-sp3-chost-byos-v20220126
+ SLES 15 SP3 CHOST Images for Microsoft Azure suse-sles-15-sp3-chost-byos-v20220222
+ SLES 15 SP3 CHOST Images for Microsoft Azure suse-sles-15-sp3-chost-byos-v20220310
+ SLES 15 SP3 CHOST Images for Microsoft Azure suse-sles-15-sp3-chost-byos-v20220411-x86_64
+ SLES 15 SP3 CHOST Images for Microsoft Azure suse-sles-15-sp3-chost-byos-v20220510-x86_64
+ SLES 15 SP3 CHOST Images for Microsoft Azure suse-sles-15-sp3-chost-byos-v20220609-x86_64
+ SLES 15 SP3 CHOST Images for Microsoft Azure suse-sles-15-sp3-chost-byos-v20220708-x86_64
+ SLES 15 SP3 CHOST Images for Microsoft Azure suse-sles-15-sp3-chost-byos-v20220718-x86_64
+ SLES 15 SP3 CHOST Images for Microsoft Azure suse-sles-15-sp3-chost-byos-v20220818-x86_64
+ SLES 15 SP3 CHOST Images for Microsoft Azure suse-sles-15-sp3-chost-byos-v20220916-x86_64
+ SLES 15 SP3 CHOST Images for Microsoft Azure suse-sles-15-sp3-chost-byos-v20220921-x86_64
+ SLES 15 SP3 CHOST Images for Microsoft Azure suse-sles-15-sp3-chost-byos-v20221019-x86_64
+ SLES 15 SP3 CHOST Images for Microsoft Azure suse-sles-15-sp3-chost-byos-v20221119-x86_64
+ SLES 15 SP3 CHOST Images for Microsoft Azure suse-sles-15-sp3-chost-byos-v20221215-x86_64
+ SLES 15 SP3 CHOST Images for Microsoft Azure suse-sles-15-sp3-chost-byos-v20230313-x86_64
+ SLES 15 SP3 CHOST Images for Microsoft Azure suse-sles-15-sp3-chost-byos-v20230613-x86_64
+ SLES 15 SP3 CHOST Images for Microsoft Azure suse-sles-15-sp3-chost-byos-v20240807-x86_64
+ SLES 15 SP3 CHOST Images for Microsoft Azure suse-sles-15-sp3-chost-byos-v20240912-x86_64
+
+
+ SLES 15 SP4 CHOST Images for Microsoft Azure suse-sles-15-sp4-chost-byos-v20220718-x86_64
+ SLES 15 SP4 CHOST Images for Microsoft Azure suse-sles-15-sp4-chost-byos-v20220721-x86_64
+ SLES 15 SP4 CHOST Images for Microsoft Azure suse-sles-15-sp4-chost-byos-v20220819-x86_64
+ SLES 15 SP4 CHOST Images for Microsoft Azure suse-sles-15-sp4-chost-byos-v20220916-x86_64
+ SLES 15 SP4 CHOST Images for Microsoft Azure suse-sles-15-sp4-chost-byos-v20220923-x86_64
+ SLES 15 SP4 CHOST Images for Microsoft Azure suse-sles-15-sp4-chost-byos-v20221018-x86_64
+ SLES 15 SP4 CHOST Images for Microsoft Azure suse-sles-15-sp4-chost-byos-v20221118-x86_64
+ SLES 15 SP4 CHOST Images for Microsoft Azure suse-sles-15-sp4-chost-byos-v20221215-arm64
+ SLES 15 SP4 CHOST Images for Microsoft Azure suse-sles-15-sp4-chost-byos-v20221215-x86_64
+ SLES 15 SP4 CHOST Images for Microsoft Azure suse-sles-15-sp4-chost-byos-v20230111-arm64
+ SLES 15 SP4 CHOST Images for Microsoft Azure suse-sles-15-sp4-chost-byos-v20230111-x86_64
+ SLES 15 SP4 CHOST Images for Microsoft Azure suse-sles-15-sp4-chost-byos-v20230210-arm64
+ SLES 15 SP4 CHOST Images for Microsoft Azure suse-sles-15-sp4-chost-byos-v20230210-x86_64
+ SLES 15 SP4 CHOST Images for Microsoft Azure suse-sles-15-sp4-chost-byos-v20230310-arm64
+ SLES 15 SP4 CHOST Images for Microsoft Azure suse-sles-15-sp4-chost-byos-v20230310-x86_64
+ SLES 15 SP4 CHOST Images for Microsoft Azure suse-sles-15-sp4-chost-byos-v20230410-arm64
+ SLES 15 SP4 CHOST Images for Microsoft Azure suse-sles-15-sp4-chost-byos-v20230410-x86_64
+ SLES 15 SP4 CHOST Images for Microsoft Azure suse-sles-15-sp4-chost-byos-v20230510-arm64
+ SLES 15 SP4 CHOST Images for Microsoft Azure suse-sles-15-sp4-chost-byos-v20230510-x86_64
+ SLES 15 SP4 CHOST Images for Microsoft Azure suse-sles-15-sp4-chost-byos-v20230606-arm64
+ SLES 15 SP4 CHOST Images for Microsoft Azure suse-sles-15-sp4-chost-byos-v20230606-x86_64
+ SLES 15 SP4 CHOST Images for Microsoft Azure suse-sles-15-sp4-chost-byos-v20230704-arm64
+ SLES 15 SP4 CHOST Images for Microsoft Azure suse-sles-15-sp4-chost-byos-v20230704-x86_64
+ SLES 15 SP4 CHOST Images for Microsoft Azure suse-sles-15-sp4-chost-byos-v20230803-arm64
+ SLES 15 SP4 CHOST Images for Microsoft Azure suse-sles-15-sp4-chost-byos-v20230803-x86_64
+ SLES 15 SP4 CHOST Images for Microsoft Azure suse-sles-15-sp4-chost-byos-v20230901-arm64
+ SLES 15 SP4 CHOST Images for Microsoft Azure suse-sles-15-sp4-chost-byos-v20230901-x86_64
+ SLES 15 SP4 CHOST Images for Microsoft Azure suse-sles-15-sp4-chost-byos-v20230928-arm64
+ SLES 15 SP4 CHOST Images for Microsoft Azure suse-sles-15-sp4-chost-byos-v20230928-x86_64
+ SLES 15 SP4 CHOST Images for Microsoft Azure suse-sles-15-sp4-chost-byos-v20231027-arm64
+ SLES 15 SP4 CHOST Images for Microsoft Azure suse-sles-15-sp4-chost-byos-v20231027-x86_64
+ SLES 15 SP4 CHOST Images for Microsoft Azure suse-sles-15-sp4-chost-byos-v20231127-arm64
+ SLES 15 SP4 CHOST Images for Microsoft Azure suse-sles-15-sp4-chost-byos-v20231127-x86_64
+ SLES 15 SP4 CHOST Images for Microsoft Azure suse-sles-15-sp4-chost-byos-v20231212-arm64
+ SLES 15 SP4 CHOST Images for Microsoft Azure suse-sles-15-sp4-chost-byos-v20231212-x86_64
+ SLES 15 SP4 CHOST Images for Microsoft Azure suse-sles-15-sp4-chost-byos-v20240312-arm64
+ SLES 15 SP4 CHOST Images for Microsoft Azure suse-sles-15-sp4-chost-byos-v20240312-x86_64
+ SLES 15 SP4 CHOST Images for Microsoft Azure suse-sles-15-sp4-chost-byos-v20240612-arm64
+ SLES 15 SP4 CHOST Images for Microsoft Azure suse-sles-15-sp4-chost-byos-v20240612-x86_64
+ SLES 15 SP4 CHOST Images for Microsoft Azure suse-sles-15-sp4-chost-byos-v20240809-arm64
+ SLES 15 SP4 CHOST Images for Microsoft Azure suse-sles-15-sp4-chost-byos-v20240809-x86_64
+ SLES 15 SP4 CHOST Images for Microsoft Azure suse-sles-15-sp4-chost-byos-v20240912-arm64
+ SLES 15 SP4 CHOST Images for Microsoft Azure suse-sles-15-sp4-chost-byos-v20240912-x86_64
+
+
cluster-md-kmp-default
@@ -552,6 +814,39 @@
reiserfs-kmp-default
+
+ kernel-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-BYOS
+
+
+ cluster-md-kmp-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ dlm-kmp-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ gfs2-kmp-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ kernel-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ ocfs2-kmp-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ cluster-md-kmp-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
+
+ dlm-kmp-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
+
+ gfs2-kmp-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
+
+ kernel-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
+
+ ocfs2-kmp-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
cluster-md-kmp-default-4.12.14-122.231.1 as a component of SUSE Linux Enterprise High Availability Extension 12 SP5
@@ -1406,6 +1701,17 @@
CVE-2024-46859
+ Image SLES12-SP5-GCE-BYOS:kernel-default-4.12.14-122.231.1
+ Image SLES12-SP5-GCE-SAP-BYOS:cluster-md-kmp-default-4.12.14-122.231.1
+ Image SLES12-SP5-GCE-SAP-BYOS:dlm-kmp-default-4.12.14-122.231.1
+ Image SLES12-SP5-GCE-SAP-BYOS:gfs2-kmp-default-4.12.14-122.231.1
+ Image SLES12-SP5-GCE-SAP-BYOS:kernel-default-4.12.14-122.231.1
+ Image SLES12-SP5-GCE-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.231.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:cluster-md-kmp-default-4.12.14-122.231.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:dlm-kmp-default-4.12.14-122.231.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:gfs2-kmp-default-4.12.14-122.231.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:kernel-default-4.12.14-122.231.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:ocfs2-kmp-default-4.12.14-122.231.1
SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.231.1
SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.231.1
SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.231.1
@@ -1544,6 +1850,229 @@
openSUSE Leap 15.6:ocfs2-kmp-default
openSUSE Leap 15.6:reiserfs-kmp-default
+
+ chost:amazon/suse-sles-15-sp1-chost-byos-v20210304-hvm-ssd-x86_64
+ chost:amazon/suse-sles-15-sp1-chost-byos-v20220127-hvm-ssd-x86_64
+ chost:amazon/suse-sles-15-sp1-chost-byos-v20220715-hvm-ssd-x86_64
+ chost:amazon/suse-sles-15-sp2-chost-byos-v20210610-hvm-ssd-x86_64
+ chost:amazon/suse-sles-15-sp2-chost-byos-v20210722-hvm-ssd-x86_64
+ chost:amazon/suse-sles-15-sp2-chost-byos-v20210913-hvm-ssd-x86_64
+ chost:amazon/suse-sles-15-sp2-chost-byos-v20211025-hvm-ssd-x86_64
+ chost:amazon/suse-sles-15-sp2-chost-byos-v20220126-hvm-ssd-x86_64
+ chost:amazon/suse-sles-15-sp2-chost-byos-v20220718-hvm-ssd-x86_64
+ chost:amazon/suse-sles-15-sp3-chost-byos-v20210729-hvm-ssd-x86_64
+ chost:amazon/suse-sles-15-sp3-chost-byos-v20210827-hvm-ssd-x86_64
+ chost:amazon/suse-sles-15-sp3-chost-byos-v20210927-hvm-ssd-x86_64
+ chost:amazon/suse-sles-15-sp3-chost-byos-v20211004-hvm-ssd-x86_64
+ chost:amazon/suse-sles-15-sp3-chost-byos-v20211101-hvm-ssd-x86_64
+ chost:amazon/suse-sles-15-sp3-chost-byos-v20211202-hvm-ssd-x86_64
+ chost:amazon/suse-sles-15-sp3-chost-byos-v20220103-hvm-ssd-x86_64
+ chost:amazon/suse-sles-15-sp3-chost-byos-v20220126-hvm-ssd-x86_64
+ chost:amazon/suse-sles-15-sp3-chost-byos-v20220222-hvm-ssd-x86_64
+ chost:amazon/suse-sles-15-sp3-chost-byos-v20220310-hvm-ssd-x86_64
+ chost:amazon/suse-sles-15-sp3-chost-byos-v20220411-hvm-ssd-x86_64
+ chost:amazon/suse-sles-15-sp3-chost-byos-v20220510-hvm-ssd-x86_64
+ chost:amazon/suse-sles-15-sp3-chost-byos-v20220608-hvm-ssd-x86_64
+ chost:amazon/suse-sles-15-sp3-chost-byos-v20220708-hvm-ssd-x86_64
+ chost:amazon/suse-sles-15-sp3-chost-byos-v20220718-hvm-ssd-x86_64
+ chost:amazon/suse-sles-15-sp3-chost-byos-v20220818-hvm-ssd-x86_64
+ chost:amazon/suse-sles-15-sp3-chost-byos-v20220916-hvm-ssd-x86_64
+ chost:amazon/suse-sles-15-sp3-chost-byos-v20220921-hvm-ssd-x86_64
+ chost:amazon/suse-sles-15-sp3-chost-byos-v20221019-hvm-ssd-x86_64
+ chost:amazon/suse-sles-15-sp3-chost-byos-v20221119-hvm-ssd-x86_64
+ chost:amazon/suse-sles-15-sp3-chost-byos-v20221215-hvm-ssd-x86_64
+ chost:amazon/suse-sles-15-sp3-chost-byos-v20230313-hvm-ssd-x86_64
+ chost:amazon/suse-sles-15-sp3-chost-byos-v20230613-hvm-ssd-x86_64
+ chost:amazon/suse-sles-15-sp3-chost-byos-v20240807-hvm-ssd-x86_64
+ chost:amazon/suse-sles-15-sp3-chost-byos-v20240912-hvm-ssd-x86_64
+ chost:amazon/suse-sles-15-sp4-chost-byos-v20220718-hvm-ssd-x86_64
+ chost:amazon/suse-sles-15-sp4-chost-byos-v20220721-hvm-ssd-x86_64
+ chost:amazon/suse-sles-15-sp4-chost-byos-v20220819-hvm-ssd-x86_64
+ chost:amazon/suse-sles-15-sp4-chost-byos-v20220916-hvm-ssd-x86_64
+ chost:amazon/suse-sles-15-sp4-chost-byos-v20220923-hvm-ssd-x86_64
+ chost:amazon/suse-sles-15-sp4-chost-byos-v20221018-hvm-ssd-x86_64
+ chost:amazon/suse-sles-15-sp4-chost-byos-v20221118-hvm-ssd-x86_64
+ chost:amazon/suse-sles-15-sp4-chost-byos-v20221215-hvm-ssd-x86_64
+ chost:amazon/suse-sles-15-sp4-chost-byos-v20230111-hvm-ssd-x86_64
+ chost:amazon/suse-sles-15-sp4-chost-byos-v20230210-hvm-ssd-x86_64
+ chost:amazon/suse-sles-15-sp4-chost-byos-v20230310-hvm-ssd-x86_64
+ chost:amazon/suse-sles-15-sp4-chost-byos-v20230410-hvm-ssd-x86_64
+ chost:amazon/suse-sles-15-sp4-chost-byos-v20230510-hvm-ssd-x86_64
+ chost:amazon/suse-sles-15-sp4-chost-byos-v20230606-hvm-ssd-x86_64
+ chost:amazon/suse-sles-15-sp4-chost-byos-v20230704-hvm-ssd-x86_64
+ chost:amazon/suse-sles-15-sp4-chost-byos-v20230803-hvm-ssd-x86_64
+ chost:amazon/suse-sles-15-sp4-chost-byos-v20230901-hvm-ssd-x86_64
+ chost:amazon/suse-sles-15-sp4-chost-byos-v20230928-hvm-ssd-x86_64
+ chost:amazon/suse-sles-15-sp4-chost-byos-v20231027-hvm-ssd-x86_64
+ chost:amazon/suse-sles-15-sp4-chost-byos-v20231127-hvm-ssd-x86_64
+ chost:amazon/suse-sles-15-sp4-chost-byos-v20231212-hvm-ssd-x86_64
+ chost:amazon/suse-sles-15-sp4-chost-byos-v20240312-hvm-ssd-x86_64
+ chost:amazon/suse-sles-15-sp4-chost-byos-v20240612-hvm-ssd-x86_64
+ chost:amazon/suse-sles-15-sp4-chost-byos-v20240809-hvm-ssd-x86_64
+ chost:amazon/suse-sles-15-sp4-chost-byos-v20240912-hvm-ssd-x86_64
+ chost:google/sles-15-sp1-chost-byos-v20210202
+ chost:google/sles-15-sp1-chost-byos-v20210304
+ chost:google/sles-15-sp1-chost-byos-v20220127
+ chost:google/sles-15-sp1-chost-byos-v20220715-x86-64
+ chost:google/sles-15-sp2-chost-byos-v20210202
+ chost:google/sles-15-sp2-chost-byos-v20210304
+ chost:google/sles-15-sp2-chost-byos-v20210405
+ chost:google/sles-15-sp2-chost-byos-v20210506
+ chost:google/sles-15-sp2-chost-byos-v20210610
+ chost:google/sles-15-sp2-chost-byos-v20210722
+ chost:google/sles-15-sp2-chost-byos-v20210913
+ chost:google/sles-15-sp2-chost-byos-v20211025
+ chost:google/sles-15-sp2-chost-byos-v20220126
+ chost:google/sles-15-sp2-chost-byos-v20220718-x86-64
+ chost:google/sles-15-sp3-chost-byos-v20210729
+ chost:google/sles-15-sp3-chost-byos-v20210827
+ chost:google/sles-15-sp3-chost-byos-v20210927
+ chost:google/sles-15-sp3-chost-byos-v20211004
+ chost:google/sles-15-sp3-chost-byos-v20211101
+ chost:google/sles-15-sp3-chost-byos-v20211202
+ chost:google/sles-15-sp3-chost-byos-v20220103
+ chost:google/sles-15-sp3-chost-byos-v20220126
+ chost:google/sles-15-sp3-chost-byos-v20220222
+ chost:google/sles-15-sp3-chost-byos-v20220310
+ chost:google/sles-15-sp3-chost-byos-v20220411-x86-64
+ chost:google/sles-15-sp3-chost-byos-v20220510-x86-64
+ chost:google/sles-15-sp3-chost-byos-v20220608-x86-64
+ chost:google/sles-15-sp3-chost-byos-v20220708-x86-64
+ chost:google/sles-15-sp3-chost-byos-v20220718-x86-64
+ chost:google/sles-15-sp3-chost-byos-v20220818-x86-64
+ chost:google/sles-15-sp3-chost-byos-v20220916-x86-64
+ chost:google/sles-15-sp3-chost-byos-v20221019-x86-64
+ chost:google/sles-15-sp3-chost-byos-v20221118-x86-64
+ chost:google/sles-15-sp3-chost-byos-v20221215-x86-64
+ chost:google/sles-15-sp3-chost-byos-v20230313-x86-64
+ chost:google/sles-15-sp3-chost-byos-v20230613-x86-64
+ chost:google/sles-15-sp3-chost-byos-v20240807-x86-64
+ chost:google/sles-15-sp3-chost-byos-v20240912-x86-64
+ chost:google/sles-15-sp4-chost-byos-v20220718-x86-64
+ chost:google/sles-15-sp4-chost-byos-v20220721-x86-64
+ chost:google/sles-15-sp4-chost-byos-v20220818-x86-64
+ chost:google/sles-15-sp4-chost-byos-v20220916-x86-64
+ chost:google/sles-15-sp4-chost-byos-v20221018-x86-64
+ chost:google/sles-15-sp4-chost-byos-v20221118-x86-64
+ chost:google/sles-15-sp4-chost-byos-v20221215-arm64
+ chost:google/sles-15-sp4-chost-byos-v20221215-x86-64
+ chost:google/sles-15-sp4-chost-byos-v20230111-arm64
+ chost:google/sles-15-sp4-chost-byos-v20230111-x86-64
+ chost:google/sles-15-sp4-chost-byos-v20230210-arm64
+ chost:google/sles-15-sp4-chost-byos-v20230210-x86-64
+ chost:google/sles-15-sp4-chost-byos-v20230310-arm64
+ chost:google/sles-15-sp4-chost-byos-v20230310-x86-64
+ chost:google/sles-15-sp4-chost-byos-v20230410-arm64
+ chost:google/sles-15-sp4-chost-byos-v20230410-x86-64
+ chost:google/sles-15-sp4-chost-byos-v20230510-arm64
+ chost:google/sles-15-sp4-chost-byos-v20230510-x86-64
+ chost:google/sles-15-sp4-chost-byos-v20230606-arm64
+ chost:google/sles-15-sp4-chost-byos-v20230606-x86-64
+ chost:google/sles-15-sp4-chost-byos-v20230704-arm64
+ chost:google/sles-15-sp4-chost-byos-v20230704-x86-64
+ chost:google/sles-15-sp4-chost-byos-v20230804-arm64
+ chost:google/sles-15-sp4-chost-byos-v20230804-x86-64
+ chost:google/sles-15-sp4-chost-byos-v20230901-arm64
+ chost:google/sles-15-sp4-chost-byos-v20230901-x86-64
+ chost:google/sles-15-sp4-chost-byos-v20230928-arm64
+ chost:google/sles-15-sp4-chost-byos-v20230928-x86-64
+ chost:google/sles-15-sp4-chost-byos-v20231027-arm64
+ chost:google/sles-15-sp4-chost-byos-v20231027-x86-64
+ chost:google/sles-15-sp4-chost-byos-v20231127-arm64
+ chost:google/sles-15-sp4-chost-byos-v20231127-x86-64
+ chost:google/sles-15-sp4-chost-byos-v20231212-arm64
+ chost:google/sles-15-sp4-chost-byos-v20231212-x86-64
+ chost:google/sles-15-sp4-chost-byos-v20240312-arm64
+ chost:google/sles-15-sp4-chost-byos-v20240312-x86-64
+ chost:google/sles-15-sp4-chost-byos-v20240612-arm64
+ chost:google/sles-15-sp4-chost-byos-v20240612-x86-64
+ chost:google/sles-15-sp4-chost-byos-v20240809-arm64
+ chost:google/sles-15-sp4-chost-byos-v20240809-x86-64
+ chost:google/sles-15-sp4-chost-byos-v20240912-arm64
+ chost:google/sles-15-sp4-chost-byos-v20240912-x86-64
+ chost:microsoft/suse-sles-15-sp1-chost-byos-v20210202
+ chost:microsoft/suse-sles-15-sp1-chost-byos-v20210304
+ chost:microsoft/suse-sles-15-sp1-chost-byos-v20220127
+ chost:microsoft/suse-sles-15-sp1-chost-byos-v20220715-x86_64
+ chost:microsoft/suse-sles-15-sp2-chost-byos-v20210202
+ chost:microsoft/suse-sles-15-sp2-chost-byos-v20210304
+ chost:microsoft/suse-sles-15-sp2-chost-byos-v20210405
+ chost:microsoft/suse-sles-15-sp2-chost-byos-v20210506
+ chost:microsoft/suse-sles-15-sp2-chost-byos-v20210610
+ chost:microsoft/suse-sles-15-sp2-chost-byos-v20210722
+ chost:microsoft/suse-sles-15-sp2-chost-byos-v20210913
+ chost:microsoft/suse-sles-15-sp2-chost-byos-v20211025
+ chost:microsoft/suse-sles-15-sp2-chost-byos-v20220126
+ chost:microsoft/suse-sles-15-sp2-chost-byos-v20220718-x86_64
+ chost:microsoft/suse-sles-15-sp3-chost-byos-v20210729
+ chost:microsoft/suse-sles-15-sp3-chost-byos-v20210827
+ chost:microsoft/suse-sles-15-sp3-chost-byos-v20210927
+ chost:microsoft/suse-sles-15-sp3-chost-byos-v20211004
+ chost:microsoft/suse-sles-15-sp3-chost-byos-v20211101
+ chost:microsoft/suse-sles-15-sp3-chost-byos-v20211202
+ chost:microsoft/suse-sles-15-sp3-chost-byos-v20220103
+ chost:microsoft/suse-sles-15-sp3-chost-byos-v20220126
+ chost:microsoft/suse-sles-15-sp3-chost-byos-v20220222
+ chost:microsoft/suse-sles-15-sp3-chost-byos-v20220310
+ chost:microsoft/suse-sles-15-sp3-chost-byos-v20220411-x86_64
+ chost:microsoft/suse-sles-15-sp3-chost-byos-v20220510-x86_64
+ chost:microsoft/suse-sles-15-sp3-chost-byos-v20220609-x86_64
+ chost:microsoft/suse-sles-15-sp3-chost-byos-v20220708-x86_64
+ chost:microsoft/suse-sles-15-sp3-chost-byos-v20220718-x86_64
+ chost:microsoft/suse-sles-15-sp3-chost-byos-v20220818-x86_64
+ chost:microsoft/suse-sles-15-sp3-chost-byos-v20220916-x86_64
+ chost:microsoft/suse-sles-15-sp3-chost-byos-v20220921-x86_64
+ chost:microsoft/suse-sles-15-sp3-chost-byos-v20221019-x86_64
+ chost:microsoft/suse-sles-15-sp3-chost-byos-v20221119-x86_64
+ chost:microsoft/suse-sles-15-sp3-chost-byos-v20221215-x86_64
+ chost:microsoft/suse-sles-15-sp3-chost-byos-v20230313-x86_64
+ chost:microsoft/suse-sles-15-sp3-chost-byos-v20230613-x86_64
+ chost:microsoft/suse-sles-15-sp3-chost-byos-v20240807-x86_64
+ chost:microsoft/suse-sles-15-sp3-chost-byos-v20240912-x86_64
+ chost:microsoft/suse-sles-15-sp4-chost-byos-v20220718-x86_64
+ chost:microsoft/suse-sles-15-sp4-chost-byos-v20220721-x86_64
+ chost:microsoft/suse-sles-15-sp4-chost-byos-v20220819-x86_64
+ chost:microsoft/suse-sles-15-sp4-chost-byos-v20220916-x86_64
+ chost:microsoft/suse-sles-15-sp4-chost-byos-v20220923-x86_64
+ chost:microsoft/suse-sles-15-sp4-chost-byos-v20221018-x86_64
+ chost:microsoft/suse-sles-15-sp4-chost-byos-v20221118-x86_64
+ chost:microsoft/suse-sles-15-sp4-chost-byos-v20221215-arm64
+ chost:microsoft/suse-sles-15-sp4-chost-byos-v20221215-x86_64
+ chost:microsoft/suse-sles-15-sp4-chost-byos-v20230111-arm64
+ chost:microsoft/suse-sles-15-sp4-chost-byos-v20230111-x86_64
+ chost:microsoft/suse-sles-15-sp4-chost-byos-v20230210-arm64
+ chost:microsoft/suse-sles-15-sp4-chost-byos-v20230210-x86_64
+ chost:microsoft/suse-sles-15-sp4-chost-byos-v20230310-arm64
+ chost:microsoft/suse-sles-15-sp4-chost-byos-v20230310-x86_64
+ chost:microsoft/suse-sles-15-sp4-chost-byos-v20230410-arm64
+ chost:microsoft/suse-sles-15-sp4-chost-byos-v20230410-x86_64
+ chost:microsoft/suse-sles-15-sp4-chost-byos-v20230510-arm64
+ chost:microsoft/suse-sles-15-sp4-chost-byos-v20230510-x86_64
+ chost:microsoft/suse-sles-15-sp4-chost-byos-v20230606-arm64
+ chost:microsoft/suse-sles-15-sp4-chost-byos-v20230606-x86_64
+ chost:microsoft/suse-sles-15-sp4-chost-byos-v20230704-arm64
+ chost:microsoft/suse-sles-15-sp4-chost-byos-v20230704-x86_64
+ chost:microsoft/suse-sles-15-sp4-chost-byos-v20230803-arm64
+ chost:microsoft/suse-sles-15-sp4-chost-byos-v20230803-x86_64
+ chost:microsoft/suse-sles-15-sp4-chost-byos-v20230901-arm64
+ chost:microsoft/suse-sles-15-sp4-chost-byos-v20230901-x86_64
+ chost:microsoft/suse-sles-15-sp4-chost-byos-v20230928-arm64
+ chost:microsoft/suse-sles-15-sp4-chost-byos-v20230928-x86_64
+ chost:microsoft/suse-sles-15-sp4-chost-byos-v20231027-arm64
+ chost:microsoft/suse-sles-15-sp4-chost-byos-v20231027-x86_64
+ chost:microsoft/suse-sles-15-sp4-chost-byos-v20231127-arm64
+ chost:microsoft/suse-sles-15-sp4-chost-byos-v20231127-x86_64
+ chost:microsoft/suse-sles-15-sp4-chost-byos-v20231212-arm64
+ chost:microsoft/suse-sles-15-sp4-chost-byos-v20231212-x86_64
+ chost:microsoft/suse-sles-15-sp4-chost-byos-v20240312-arm64
+ chost:microsoft/suse-sles-15-sp4-chost-byos-v20240312-x86_64
+ chost:microsoft/suse-sles-15-sp4-chost-byos-v20240612-arm64
+ chost:microsoft/suse-sles-15-sp4-chost-byos-v20240612-x86_64
+ chost:microsoft/suse-sles-15-sp4-chost-byos-v20240809-arm64
+ chost:microsoft/suse-sles-15-sp4-chost-byos-v20240809-x86_64
+ chost:microsoft/suse-sles-15-sp4-chost-byos-v20240912-arm64
+ chost:microsoft/suse-sles-15-sp4-chost-byos-v20240912-x86_64
+
skipping CVE-2024-46858 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-46857 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-46856 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-46855 as CVE page is older than CVRF-CVE file.
--- /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2024-46854.xml 2024-10-16 01:10:56.290912000 +0200
+++ /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2024-46854.xml.new 2024-10-29 01:12:32.105898000 +0100
@@ -14,13 +14,13 @@
1
- 9
- 2024-10-15T23:10:55Z
+ 10
+ 2024-10-29T00:12:31Z
current
2024-09-27T23:10:28Z
- 2024-10-15T23:10:55Z
+ 2024-10-29T00:12:31Z
cve-database/bin/generate-cvrf-cve.pl
2020-12-27T01:00:00Z
@@ -63,6 +63,21 @@
+
+
+ Image SLES12-SP5-GCE-BYOS
+
+
+
+
+ Image SLES12-SP5-GCE-SAP-BYOS
+
+
+
+
+ Image SLES12-SP5-GCE-SAP-On-Demand
+
+
SUSE Linux Enterprise Module for Basesystem 15 SP5
@@ -367,6 +382,253 @@
openSUSE Leap 15.6
+
+
+ SLES 15 SP1 CHOST Images for Amazon EC2 suse-sles-15-sp1-chost-byos-v20210304-hvm-ssd-x86_64
+ SLES 15 SP1 CHOST Images for Amazon EC2 suse-sles-15-sp1-chost-byos-v20220127-hvm-ssd-x86_64
+ SLES 15 SP1 CHOST Images for Amazon EC2 suse-sles-15-sp1-chost-byos-v20220715-hvm-ssd-x86_64
+
+
+ SLES 15 SP2 CHOST Images for Amazon EC2 suse-sles-15-sp2-chost-byos-v20210610-hvm-ssd-x86_64
+ SLES 15 SP2 CHOST Images for Amazon EC2 suse-sles-15-sp2-chost-byos-v20210722-hvm-ssd-x86_64
+ SLES 15 SP2 CHOST Images for Amazon EC2 suse-sles-15-sp2-chost-byos-v20210913-hvm-ssd-x86_64
+ SLES 15 SP2 CHOST Images for Amazon EC2 suse-sles-15-sp2-chost-byos-v20211025-hvm-ssd-x86_64
+ SLES 15 SP2 CHOST Images for Amazon EC2 suse-sles-15-sp2-chost-byos-v20220126-hvm-ssd-x86_64
+ SLES 15 SP2 CHOST Images for Amazon EC2 suse-sles-15-sp2-chost-byos-v20220718-hvm-ssd-x86_64
+
+
+ SLES 15 SP3 CHOST Images for Amazon EC2 suse-sles-15-sp3-chost-byos-v20210729-hvm-ssd-x86_64
+ SLES 15 SP3 CHOST Images for Amazon EC2 suse-sles-15-sp3-chost-byos-v20210827-hvm-ssd-x86_64
+ SLES 15 SP3 CHOST Images for Amazon EC2 suse-sles-15-sp3-chost-byos-v20210927-hvm-ssd-x86_64
+ SLES 15 SP3 CHOST Images for Amazon EC2 suse-sles-15-sp3-chost-byos-v20211004-hvm-ssd-x86_64
+ SLES 15 SP3 CHOST Images for Amazon EC2 suse-sles-15-sp3-chost-byos-v20211101-hvm-ssd-x86_64
+ SLES 15 SP3 CHOST Images for Amazon EC2 suse-sles-15-sp3-chost-byos-v20211202-hvm-ssd-x86_64
+ SLES 15 SP3 CHOST Images for Amazon EC2 suse-sles-15-sp3-chost-byos-v20220103-hvm-ssd-x86_64
+ SLES 15 SP3 CHOST Images for Amazon EC2 suse-sles-15-sp3-chost-byos-v20220126-hvm-ssd-x86_64
+ SLES 15 SP3 CHOST Images for Amazon EC2 suse-sles-15-sp3-chost-byos-v20220222-hvm-ssd-x86_64
+ SLES 15 SP3 CHOST Images for Amazon EC2 suse-sles-15-sp3-chost-byos-v20220310-hvm-ssd-x86_64
+ SLES 15 SP3 CHOST Images for Amazon EC2 suse-sles-15-sp3-chost-byos-v20220411-hvm-ssd-x86_64
+ SLES 15 SP3 CHOST Images for Amazon EC2 suse-sles-15-sp3-chost-byos-v20220510-hvm-ssd-x86_64
+ SLES 15 SP3 CHOST Images for Amazon EC2 suse-sles-15-sp3-chost-byos-v20220608-hvm-ssd-x86_64
+ SLES 15 SP3 CHOST Images for Amazon EC2 suse-sles-15-sp3-chost-byos-v20220708-hvm-ssd-x86_64
+ SLES 15 SP3 CHOST Images for Amazon EC2 suse-sles-15-sp3-chost-byos-v20220718-hvm-ssd-x86_64
+ SLES 15 SP3 CHOST Images for Amazon EC2 suse-sles-15-sp3-chost-byos-v20220818-hvm-ssd-x86_64
+ SLES 15 SP3 CHOST Images for Amazon EC2 suse-sles-15-sp3-chost-byos-v20220916-hvm-ssd-x86_64
+ SLES 15 SP3 CHOST Images for Amazon EC2 suse-sles-15-sp3-chost-byos-v20220921-hvm-ssd-x86_64
+ SLES 15 SP3 CHOST Images for Amazon EC2 suse-sles-15-sp3-chost-byos-v20221019-hvm-ssd-x86_64
+ SLES 15 SP3 CHOST Images for Amazon EC2 suse-sles-15-sp3-chost-byos-v20221119-hvm-ssd-x86_64
+ SLES 15 SP3 CHOST Images for Amazon EC2 suse-sles-15-sp3-chost-byos-v20221215-hvm-ssd-x86_64
+ SLES 15 SP3 CHOST Images for Amazon EC2 suse-sles-15-sp3-chost-byos-v20230313-hvm-ssd-x86_64
+ SLES 15 SP3 CHOST Images for Amazon EC2 suse-sles-15-sp3-chost-byos-v20230613-hvm-ssd-x86_64
+ SLES 15 SP3 CHOST Images for Amazon EC2 suse-sles-15-sp3-chost-byos-v20240807-hvm-ssd-x86_64
+ SLES 15 SP3 CHOST Images for Amazon EC2 suse-sles-15-sp3-chost-byos-v20240912-hvm-ssd-x86_64
+
+
+ SLES 15 SP4 CHOST Images for Amazon EC2 suse-sles-15-sp4-chost-byos-v20220718-hvm-ssd-x86_64
+ SLES 15 SP4 CHOST Images for Amazon EC2 suse-sles-15-sp4-chost-byos-v20220721-hvm-ssd-x86_64
+ SLES 15 SP4 CHOST Images for Amazon EC2 suse-sles-15-sp4-chost-byos-v20220819-hvm-ssd-x86_64
+ SLES 15 SP4 CHOST Images for Amazon EC2 suse-sles-15-sp4-chost-byos-v20220916-hvm-ssd-x86_64
+ SLES 15 SP4 CHOST Images for Amazon EC2 suse-sles-15-sp4-chost-byos-v20220923-hvm-ssd-x86_64
+ SLES 15 SP4 CHOST Images for Amazon EC2 suse-sles-15-sp4-chost-byos-v20221018-hvm-ssd-x86_64
+ SLES 15 SP4 CHOST Images for Amazon EC2 suse-sles-15-sp4-chost-byos-v20221118-hvm-ssd-x86_64
+ SLES 15 SP4 CHOST Images for Amazon EC2 suse-sles-15-sp4-chost-byos-v20221215-hvm-ssd-x86_64
+ SLES 15 SP4 CHOST Images for Amazon EC2 suse-sles-15-sp4-chost-byos-v20230111-hvm-ssd-x86_64
+ SLES 15 SP4 CHOST Images for Amazon EC2 suse-sles-15-sp4-chost-byos-v20230210-hvm-ssd-x86_64
+ SLES 15 SP4 CHOST Images for Amazon EC2 suse-sles-15-sp4-chost-byos-v20230310-hvm-ssd-x86_64
+ SLES 15 SP4 CHOST Images for Amazon EC2 suse-sles-15-sp4-chost-byos-v20230410-hvm-ssd-x86_64
+ SLES 15 SP4 CHOST Images for Amazon EC2 suse-sles-15-sp4-chost-byos-v20230510-hvm-ssd-x86_64
+ SLES 15 SP4 CHOST Images for Amazon EC2 suse-sles-15-sp4-chost-byos-v20230606-hvm-ssd-x86_64
+ SLES 15 SP4 CHOST Images for Amazon EC2 suse-sles-15-sp4-chost-byos-v20230704-hvm-ssd-x86_64
+ SLES 15 SP4 CHOST Images for Amazon EC2 suse-sles-15-sp4-chost-byos-v20230803-hvm-ssd-x86_64
+ SLES 15 SP4 CHOST Images for Amazon EC2 suse-sles-15-sp4-chost-byos-v20230901-hvm-ssd-x86_64
+ SLES 15 SP4 CHOST Images for Amazon EC2 suse-sles-15-sp4-chost-byos-v20230928-hvm-ssd-x86_64
+ SLES 15 SP4 CHOST Images for Amazon EC2 suse-sles-15-sp4-chost-byos-v20231027-hvm-ssd-x86_64
+ SLES 15 SP4 CHOST Images for Amazon EC2 suse-sles-15-sp4-chost-byos-v20231127-hvm-ssd-x86_64
+ SLES 15 SP4 CHOST Images for Amazon EC2 suse-sles-15-sp4-chost-byos-v20231212-hvm-ssd-x86_64
+ SLES 15 SP4 CHOST Images for Amazon EC2 suse-sles-15-sp4-chost-byos-v20240312-hvm-ssd-x86_64
+ SLES 15 SP4 CHOST Images for Amazon EC2 suse-sles-15-sp4-chost-byos-v20240612-hvm-ssd-x86_64
+ SLES 15 SP4 CHOST Images for Amazon EC2 suse-sles-15-sp4-chost-byos-v20240809-hvm-ssd-x86_64
+ SLES 15 SP4 CHOST Images for Amazon EC2 suse-sles-15-sp4-chost-byos-v20240912-hvm-ssd-x86_64
+
+
+ SLES 15 SP1 CHOST Images for Google sles-15-sp1-chost-byos-v20210202
+ SLES 15 SP1 CHOST Images for Google sles-15-sp1-chost-byos-v20210304
+ SLES 15 SP1 CHOST Images for Google sles-15-sp1-chost-byos-v20220127
+ SLES 15 SP1 CHOST Images for Google sles-15-sp1-chost-byos-v20220715-x86-64
+
+
+ SLES 15 SP2 CHOST Images for Google sles-15-sp2-chost-byos-v20210202
+ SLES 15 SP2 CHOST Images for Google sles-15-sp2-chost-byos-v20210304
+ SLES 15 SP2 CHOST Images for Google sles-15-sp2-chost-byos-v20210405
+ SLES 15 SP2 CHOST Images for Google sles-15-sp2-chost-byos-v20210506
+ SLES 15 SP2 CHOST Images for Google sles-15-sp2-chost-byos-v20210610
+ SLES 15 SP2 CHOST Images for Google sles-15-sp2-chost-byos-v20210722
+ SLES 15 SP2 CHOST Images for Google sles-15-sp2-chost-byos-v20210913
+ SLES 15 SP2 CHOST Images for Google sles-15-sp2-chost-byos-v20211025
+ SLES 15 SP2 CHOST Images for Google sles-15-sp2-chost-byos-v20220126
+ SLES 15 SP2 CHOST Images for Google sles-15-sp2-chost-byos-v20220718-x86-64
+
+
+ SLES 15 SP3 CHOST Images for Google sles-15-sp3-chost-byos-v20210729
+ SLES 15 SP3 CHOST Images for Google sles-15-sp3-chost-byos-v20210827
+ SLES 15 SP3 CHOST Images for Google sles-15-sp3-chost-byos-v20210927
+ SLES 15 SP3 CHOST Images for Google sles-15-sp3-chost-byos-v20211004
+ SLES 15 SP3 CHOST Images for Google sles-15-sp3-chost-byos-v20211101
+ SLES 15 SP3 CHOST Images for Google sles-15-sp3-chost-byos-v20211202
+ SLES 15 SP3 CHOST Images for Google sles-15-sp3-chost-byos-v20220103
+ SLES 15 SP3 CHOST Images for Google sles-15-sp3-chost-byos-v20220126
+ SLES 15 SP3 CHOST Images for Google sles-15-sp3-chost-byos-v20220222
+ SLES 15 SP3 CHOST Images for Google sles-15-sp3-chost-byos-v20220310
+ SLES 15 SP3 CHOST Images for Google sles-15-sp3-chost-byos-v20220411-x86-64
+ SLES 15 SP3 CHOST Images for Google sles-15-sp3-chost-byos-v20220510-x86-64
+ SLES 15 SP3 CHOST Images for Google sles-15-sp3-chost-byos-v20220608-x86-64
+ SLES 15 SP3 CHOST Images for Google sles-15-sp3-chost-byos-v20220708-x86-64
+ SLES 15 SP3 CHOST Images for Google sles-15-sp3-chost-byos-v20220718-x86-64
+ SLES 15 SP3 CHOST Images for Google sles-15-sp3-chost-byos-v20220818-x86-64
+ SLES 15 SP3 CHOST Images for Google sles-15-sp3-chost-byos-v20220916-x86-64
+ SLES 15 SP3 CHOST Images for Google sles-15-sp3-chost-byos-v20221019-x86-64
+ SLES 15 SP3 CHOST Images for Google sles-15-sp3-chost-byos-v20221118-x86-64
+ SLES 15 SP3 CHOST Images for Google sles-15-sp3-chost-byos-v20221215-x86-64
+ SLES 15 SP3 CHOST Images for Google sles-15-sp3-chost-byos-v20230313-x86-64
+ SLES 15 SP3 CHOST Images for Google sles-15-sp3-chost-byos-v20230613-x86-64
+ SLES 15 SP3 CHOST Images for Google sles-15-sp3-chost-byos-v20240807-x86-64
+ SLES 15 SP3 CHOST Images for Google sles-15-sp3-chost-byos-v20240912-x86-64
+
+
+ SLES 15 SP4 CHOST Images for Google sles-15-sp4-chost-byos-v20220718-x86-64
+ SLES 15 SP4 CHOST Images for Google sles-15-sp4-chost-byos-v20220721-x86-64
+ SLES 15 SP4 CHOST Images for Google sles-15-sp4-chost-byos-v20220818-x86-64
+ SLES 15 SP4 CHOST Images for Google sles-15-sp4-chost-byos-v20220916-x86-64
+ SLES 15 SP4 CHOST Images for Google sles-15-sp4-chost-byos-v20221018-x86-64
+ SLES 15 SP4 CHOST Images for Google sles-15-sp4-chost-byos-v20221118-x86-64
+ SLES 15 SP4 CHOST Images for Google sles-15-sp4-chost-byos-v20221215-arm64
+ SLES 15 SP4 CHOST Images for Google sles-15-sp4-chost-byos-v20221215-x86-64
+ SLES 15 SP4 CHOST Images for Google sles-15-sp4-chost-byos-v20230111-arm64
+ SLES 15 SP4 CHOST Images for Google sles-15-sp4-chost-byos-v20230111-x86-64
+ SLES 15 SP4 CHOST Images for Google sles-15-sp4-chost-byos-v20230210-arm64
+ SLES 15 SP4 CHOST Images for Google sles-15-sp4-chost-byos-v20230210-x86-64
+ SLES 15 SP4 CHOST Images for Google sles-15-sp4-chost-byos-v20230310-arm64
+ SLES 15 SP4 CHOST Images for Google sles-15-sp4-chost-byos-v20230310-x86-64
+ SLES 15 SP4 CHOST Images for Google sles-15-sp4-chost-byos-v20230410-arm64
+ SLES 15 SP4 CHOST Images for Google sles-15-sp4-chost-byos-v20230410-x86-64
+ SLES 15 SP4 CHOST Images for Google sles-15-sp4-chost-byos-v20230510-arm64
+ SLES 15 SP4 CHOST Images for Google sles-15-sp4-chost-byos-v20230510-x86-64
+ SLES 15 SP4 CHOST Images for Google sles-15-sp4-chost-byos-v20230606-arm64
+ SLES 15 SP4 CHOST Images for Google sles-15-sp4-chost-byos-v20230606-x86-64
+ SLES 15 SP4 CHOST Images for Google sles-15-sp4-chost-byos-v20230704-arm64
+ SLES 15 SP4 CHOST Images for Google sles-15-sp4-chost-byos-v20230704-x86-64
+ SLES 15 SP4 CHOST Images for Google sles-15-sp4-chost-byos-v20230804-arm64
+ SLES 15 SP4 CHOST Images for Google sles-15-sp4-chost-byos-v20230804-x86-64
+ SLES 15 SP4 CHOST Images for Google sles-15-sp4-chost-byos-v20230901-arm64
+ SLES 15 SP4 CHOST Images for Google sles-15-sp4-chost-byos-v20230901-x86-64
+ SLES 15 SP4 CHOST Images for Google sles-15-sp4-chost-byos-v20230928-arm64
+ SLES 15 SP4 CHOST Images for Google sles-15-sp4-chost-byos-v20230928-x86-64
+ SLES 15 SP4 CHOST Images for Google sles-15-sp4-chost-byos-v20231027-arm64
+ SLES 15 SP4 CHOST Images for Google sles-15-sp4-chost-byos-v20231027-x86-64
+ SLES 15 SP4 CHOST Images for Google sles-15-sp4-chost-byos-v20231127-arm64
+ SLES 15 SP4 CHOST Images for Google sles-15-sp4-chost-byos-v20231127-x86-64
+ SLES 15 SP4 CHOST Images for Google sles-15-sp4-chost-byos-v20231212-arm64
+ SLES 15 SP4 CHOST Images for Google sles-15-sp4-chost-byos-v20231212-x86-64
+ SLES 15 SP4 CHOST Images for Google sles-15-sp4-chost-byos-v20240312-arm64
+ SLES 15 SP4 CHOST Images for Google sles-15-sp4-chost-byos-v20240312-x86-64
+ SLES 15 SP4 CHOST Images for Google sles-15-sp4-chost-byos-v20240612-arm64
+ SLES 15 SP4 CHOST Images for Google sles-15-sp4-chost-byos-v20240612-x86-64
+ SLES 15 SP4 CHOST Images for Google sles-15-sp4-chost-byos-v20240809-arm64
+ SLES 15 SP4 CHOST Images for Google sles-15-sp4-chost-byos-v20240809-x86-64
+ SLES 15 SP4 CHOST Images for Google sles-15-sp4-chost-byos-v20240912-arm64
+ SLES 15 SP4 CHOST Images for Google sles-15-sp4-chost-byos-v20240912-x86-64
+
+
+ SLES 15 SP1 CHOST Images for Microsoft Azure suse-sles-15-sp1-chost-byos-v20210202
+ SLES 15 SP1 CHOST Images for Microsoft Azure suse-sles-15-sp1-chost-byos-v20210304
+ SLES 15 SP1 CHOST Images for Microsoft Azure suse-sles-15-sp1-chost-byos-v20220127
+ SLES 15 SP1 CHOST Images for Microsoft Azure suse-sles-15-sp1-chost-byos-v20220715-x86_64
+
+
+ SLES 15 SP2 CHOST Images for Microsoft Azure suse-sles-15-sp2-chost-byos-v20210202
+ SLES 15 SP2 CHOST Images for Microsoft Azure suse-sles-15-sp2-chost-byos-v20210304
+ SLES 15 SP2 CHOST Images for Microsoft Azure suse-sles-15-sp2-chost-byos-v20210405
+ SLES 15 SP2 CHOST Images for Microsoft Azure suse-sles-15-sp2-chost-byos-v20210506
+ SLES 15 SP2 CHOST Images for Microsoft Azure suse-sles-15-sp2-chost-byos-v20210610
+ SLES 15 SP2 CHOST Images for Microsoft Azure suse-sles-15-sp2-chost-byos-v20210722
+ SLES 15 SP2 CHOST Images for Microsoft Azure suse-sles-15-sp2-chost-byos-v20210913
+ SLES 15 SP2 CHOST Images for Microsoft Azure suse-sles-15-sp2-chost-byos-v20211025
+ SLES 15 SP2 CHOST Images for Microsoft Azure suse-sles-15-sp2-chost-byos-v20220126
+ SLES 15 SP2 CHOST Images for Microsoft Azure suse-sles-15-sp2-chost-byos-v20220718-x86_64
+
+
+ SLES 15 SP3 CHOST Images for Microsoft Azure suse-sles-15-sp3-chost-byos-v20210729
+ SLES 15 SP3 CHOST Images for Microsoft Azure suse-sles-15-sp3-chost-byos-v20210827
+ SLES 15 SP3 CHOST Images for Microsoft Azure suse-sles-15-sp3-chost-byos-v20210927
+ SLES 15 SP3 CHOST Images for Microsoft Azure suse-sles-15-sp3-chost-byos-v20211004
+ SLES 15 SP3 CHOST Images for Microsoft Azure suse-sles-15-sp3-chost-byos-v20211101
+ SLES 15 SP3 CHOST Images for Microsoft Azure suse-sles-15-sp3-chost-byos-v20211202
+ SLES 15 SP3 CHOST Images for Microsoft Azure suse-sles-15-sp3-chost-byos-v20220103
+ SLES 15 SP3 CHOST Images for Microsoft Azure suse-sles-15-sp3-chost-byos-v20220126
+ SLES 15 SP3 CHOST Images for Microsoft Azure suse-sles-15-sp3-chost-byos-v20220222
+ SLES 15 SP3 CHOST Images for Microsoft Azure suse-sles-15-sp3-chost-byos-v20220310
+ SLES 15 SP3 CHOST Images for Microsoft Azure suse-sles-15-sp3-chost-byos-v20220411-x86_64
+ SLES 15 SP3 CHOST Images for Microsoft Azure suse-sles-15-sp3-chost-byos-v20220510-x86_64
+ SLES 15 SP3 CHOST Images for Microsoft Azure suse-sles-15-sp3-chost-byos-v20220609-x86_64
+ SLES 15 SP3 CHOST Images for Microsoft Azure suse-sles-15-sp3-chost-byos-v20220708-x86_64
+ SLES 15 SP3 CHOST Images for Microsoft Azure suse-sles-15-sp3-chost-byos-v20220718-x86_64
+ SLES 15 SP3 CHOST Images for Microsoft Azure suse-sles-15-sp3-chost-byos-v20220818-x86_64
+ SLES 15 SP3 CHOST Images for Microsoft Azure suse-sles-15-sp3-chost-byos-v20220916-x86_64
+ SLES 15 SP3 CHOST Images for Microsoft Azure suse-sles-15-sp3-chost-byos-v20220921-x86_64
+ SLES 15 SP3 CHOST Images for Microsoft Azure suse-sles-15-sp3-chost-byos-v20221019-x86_64
+ SLES 15 SP3 CHOST Images for Microsoft Azure suse-sles-15-sp3-chost-byos-v20221119-x86_64
+ SLES 15 SP3 CHOST Images for Microsoft Azure suse-sles-15-sp3-chost-byos-v20221215-x86_64
+ SLES 15 SP3 CHOST Images for Microsoft Azure suse-sles-15-sp3-chost-byos-v20230313-x86_64
+ SLES 15 SP3 CHOST Images for Microsoft Azure suse-sles-15-sp3-chost-byos-v20230613-x86_64
+ SLES 15 SP3 CHOST Images for Microsoft Azure suse-sles-15-sp3-chost-byos-v20240807-x86_64
+ SLES 15 SP3 CHOST Images for Microsoft Azure suse-sles-15-sp3-chost-byos-v20240912-x86_64
+
+
+ SLES 15 SP4 CHOST Images for Microsoft Azure suse-sles-15-sp4-chost-byos-v20220718-x86_64
+ SLES 15 SP4 CHOST Images for Microsoft Azure suse-sles-15-sp4-chost-byos-v20220721-x86_64
+ SLES 15 SP4 CHOST Images for Microsoft Azure suse-sles-15-sp4-chost-byos-v20220819-x86_64
+ SLES 15 SP4 CHOST Images for Microsoft Azure suse-sles-15-sp4-chost-byos-v20220916-x86_64
+ SLES 15 SP4 CHOST Images for Microsoft Azure suse-sles-15-sp4-chost-byos-v20220923-x86_64
+ SLES 15 SP4 CHOST Images for Microsoft Azure suse-sles-15-sp4-chost-byos-v20221018-x86_64
+ SLES 15 SP4 CHOST Images for Microsoft Azure suse-sles-15-sp4-chost-byos-v20221118-x86_64
+ SLES 15 SP4 CHOST Images for Microsoft Azure suse-sles-15-sp4-chost-byos-v20221215-arm64
+ SLES 15 SP4 CHOST Images for Microsoft Azure suse-sles-15-sp4-chost-byos-v20221215-x86_64
+ SLES 15 SP4 CHOST Images for Microsoft Azure suse-sles-15-sp4-chost-byos-v20230111-arm64
+ SLES 15 SP4 CHOST Images for Microsoft Azure suse-sles-15-sp4-chost-byos-v20230111-x86_64
+ SLES 15 SP4 CHOST Images for Microsoft Azure suse-sles-15-sp4-chost-byos-v20230210-arm64
+ SLES 15 SP4 CHOST Images for Microsoft Azure suse-sles-15-sp4-chost-byos-v20230210-x86_64
+ SLES 15 SP4 CHOST Images for Microsoft Azure suse-sles-15-sp4-chost-byos-v20230310-arm64
+ SLES 15 SP4 CHOST Images for Microsoft Azure suse-sles-15-sp4-chost-byos-v20230310-x86_64
+ SLES 15 SP4 CHOST Images for Microsoft Azure suse-sles-15-sp4-chost-byos-v20230410-arm64
+ SLES 15 SP4 CHOST Images for Microsoft Azure suse-sles-15-sp4-chost-byos-v20230410-x86_64
+ SLES 15 SP4 CHOST Images for Microsoft Azure suse-sles-15-sp4-chost-byos-v20230510-arm64
+ SLES 15 SP4 CHOST Images for Microsoft Azure suse-sles-15-sp4-chost-byos-v20230510-x86_64
+ SLES 15 SP4 CHOST Images for Microsoft Azure suse-sles-15-sp4-chost-byos-v20230606-arm64
+ SLES 15 SP4 CHOST Images for Microsoft Azure suse-sles-15-sp4-chost-byos-v20230606-x86_64
+ SLES 15 SP4 CHOST Images for Microsoft Azure suse-sles-15-sp4-chost-byos-v20230704-arm64
+ SLES 15 SP4 CHOST Images for Microsoft Azure suse-sles-15-sp4-chost-byos-v20230704-x86_64
+ SLES 15 SP4 CHOST Images for Microsoft Azure suse-sles-15-sp4-chost-byos-v20230803-arm64
+ SLES 15 SP4 CHOST Images for Microsoft Azure suse-sles-15-sp4-chost-byos-v20230803-x86_64
+ SLES 15 SP4 CHOST Images for Microsoft Azure suse-sles-15-sp4-chost-byos-v20230901-arm64
+ SLES 15 SP4 CHOST Images for Microsoft Azure suse-sles-15-sp4-chost-byos-v20230901-x86_64
+ SLES 15 SP4 CHOST Images for Microsoft Azure suse-sles-15-sp4-chost-byos-v20230928-arm64
+ SLES 15 SP4 CHOST Images for Microsoft Azure suse-sles-15-sp4-chost-byos-v20230928-x86_64
+ SLES 15 SP4 CHOST Images for Microsoft Azure suse-sles-15-sp4-chost-byos-v20231027-arm64
+ SLES 15 SP4 CHOST Images for Microsoft Azure suse-sles-15-sp4-chost-byos-v20231027-x86_64
+ SLES 15 SP4 CHOST Images for Microsoft Azure suse-sles-15-sp4-chost-byos-v20231127-arm64
+ SLES 15 SP4 CHOST Images for Microsoft Azure suse-sles-15-sp4-chost-byos-v20231127-x86_64
+ SLES 15 SP4 CHOST Images for Microsoft Azure suse-sles-15-sp4-chost-byos-v20231212-arm64
+ SLES 15 SP4 CHOST Images for Microsoft Azure suse-sles-15-sp4-chost-byos-v20231212-x86_64
+ SLES 15 SP4 CHOST Images for Microsoft Azure suse-sles-15-sp4-chost-byos-v20240312-arm64
+ SLES 15 SP4 CHOST Images for Microsoft Azure suse-sles-15-sp4-chost-byos-v20240312-x86_64
+ SLES 15 SP4 CHOST Images for Microsoft Azure suse-sles-15-sp4-chost-byos-v20240612-arm64
+ SLES 15 SP4 CHOST Images for Microsoft Azure suse-sles-15-sp4-chost-byos-v20240612-x86_64
+ SLES 15 SP4 CHOST Images for Microsoft Azure suse-sles-15-sp4-chost-byos-v20240809-arm64
+ SLES 15 SP4 CHOST Images for Microsoft Azure suse-sles-15-sp4-chost-byos-v20240809-x86_64
+ SLES 15 SP4 CHOST Images for Microsoft Azure suse-sles-15-sp4-chost-byos-v20240912-arm64
+ SLES 15 SP4 CHOST Images for Microsoft Azure suse-sles-15-sp4-chost-byos-v20240912-x86_64
+
+
cluster-md-kmp-azure-5.14.21-150500.33.69.1
@@ -592,6 +854,39 @@
reiserfs-kmp-default
+
+ kernel-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-BYOS
+
+
+ cluster-md-kmp-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ dlm-kmp-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ gfs2-kmp-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ kernel-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ ocfs2-kmp-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ cluster-md-kmp-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
+
+ dlm-kmp-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
+
+ gfs2-kmp-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
+
+ kernel-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
+
+ ocfs2-kmp-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
cluster-md-kmp-default-4.12.14-122.231.1 as a component of SUSE Linux Enterprise High Availability Extension 12 SP5
@@ -1467,6 +1762,17 @@
CVE-2024-46854
+ Image SLES12-SP5-GCE-BYOS:kernel-default-4.12.14-122.231.1
+ Image SLES12-SP5-GCE-SAP-BYOS:cluster-md-kmp-default-4.12.14-122.231.1
+ Image SLES12-SP5-GCE-SAP-BYOS:dlm-kmp-default-4.12.14-122.231.1
+ Image SLES12-SP5-GCE-SAP-BYOS:gfs2-kmp-default-4.12.14-122.231.1
+ Image SLES12-SP5-GCE-SAP-BYOS:kernel-default-4.12.14-122.231.1
+ Image SLES12-SP5-GCE-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.231.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:cluster-md-kmp-default-4.12.14-122.231.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:dlm-kmp-default-4.12.14-122.231.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:gfs2-kmp-default-4.12.14-122.231.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:kernel-default-4.12.14-122.231.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:ocfs2-kmp-default-4.12.14-122.231.1
SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.231.1
SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.231.1
SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.231.1
@@ -1572,6 +1878,229 @@
SUSE Linux Enterprise Server Teradata 12 SP3:kernel-default
SUSE Linux Enterprise Server Teradata 12 SP3:kernel-source
+
+ chost:amazon/suse-sles-15-sp1-chost-byos-v20210304-hvm-ssd-x86_64
+ chost:amazon/suse-sles-15-sp1-chost-byos-v20220127-hvm-ssd-x86_64
+ chost:amazon/suse-sles-15-sp1-chost-byos-v20220715-hvm-ssd-x86_64
+ chost:amazon/suse-sles-15-sp2-chost-byos-v20210610-hvm-ssd-x86_64
+ chost:amazon/suse-sles-15-sp2-chost-byos-v20210722-hvm-ssd-x86_64
+ chost:amazon/suse-sles-15-sp2-chost-byos-v20210913-hvm-ssd-x86_64
+ chost:amazon/suse-sles-15-sp2-chost-byos-v20211025-hvm-ssd-x86_64
+ chost:amazon/suse-sles-15-sp2-chost-byos-v20220126-hvm-ssd-x86_64
+ chost:amazon/suse-sles-15-sp2-chost-byos-v20220718-hvm-ssd-x86_64
+ chost:amazon/suse-sles-15-sp3-chost-byos-v20210729-hvm-ssd-x86_64
+ chost:amazon/suse-sles-15-sp3-chost-byos-v20210827-hvm-ssd-x86_64
+ chost:amazon/suse-sles-15-sp3-chost-byos-v20210927-hvm-ssd-x86_64
+ chost:amazon/suse-sles-15-sp3-chost-byos-v20211004-hvm-ssd-x86_64
+ chost:amazon/suse-sles-15-sp3-chost-byos-v20211101-hvm-ssd-x86_64
+ chost:amazon/suse-sles-15-sp3-chost-byos-v20211202-hvm-ssd-x86_64
+ chost:amazon/suse-sles-15-sp3-chost-byos-v20220103-hvm-ssd-x86_64
+ chost:amazon/suse-sles-15-sp3-chost-byos-v20220126-hvm-ssd-x86_64
+ chost:amazon/suse-sles-15-sp3-chost-byos-v20220222-hvm-ssd-x86_64
+ chost:amazon/suse-sles-15-sp3-chost-byos-v20220310-hvm-ssd-x86_64
+ chost:amazon/suse-sles-15-sp3-chost-byos-v20220411-hvm-ssd-x86_64
+ chost:amazon/suse-sles-15-sp3-chost-byos-v20220510-hvm-ssd-x86_64
+ chost:amazon/suse-sles-15-sp3-chost-byos-v20220608-hvm-ssd-x86_64
+ chost:amazon/suse-sles-15-sp3-chost-byos-v20220708-hvm-ssd-x86_64
+ chost:amazon/suse-sles-15-sp3-chost-byos-v20220718-hvm-ssd-x86_64
+ chost:amazon/suse-sles-15-sp3-chost-byos-v20220818-hvm-ssd-x86_64
+ chost:amazon/suse-sles-15-sp3-chost-byos-v20220916-hvm-ssd-x86_64
+ chost:amazon/suse-sles-15-sp3-chost-byos-v20220921-hvm-ssd-x86_64
+ chost:amazon/suse-sles-15-sp3-chost-byos-v20221019-hvm-ssd-x86_64
+ chost:amazon/suse-sles-15-sp3-chost-byos-v20221119-hvm-ssd-x86_64
+ chost:amazon/suse-sles-15-sp3-chost-byos-v20221215-hvm-ssd-x86_64
+ chost:amazon/suse-sles-15-sp3-chost-byos-v20230313-hvm-ssd-x86_64
+ chost:amazon/suse-sles-15-sp3-chost-byos-v20230613-hvm-ssd-x86_64
+ chost:amazon/suse-sles-15-sp3-chost-byos-v20240807-hvm-ssd-x86_64
+ chost:amazon/suse-sles-15-sp3-chost-byos-v20240912-hvm-ssd-x86_64
+ chost:amazon/suse-sles-15-sp4-chost-byos-v20220718-hvm-ssd-x86_64
+ chost:amazon/suse-sles-15-sp4-chost-byos-v20220721-hvm-ssd-x86_64
+ chost:amazon/suse-sles-15-sp4-chost-byos-v20220819-hvm-ssd-x86_64
+ chost:amazon/suse-sles-15-sp4-chost-byos-v20220916-hvm-ssd-x86_64
+ chost:amazon/suse-sles-15-sp4-chost-byos-v20220923-hvm-ssd-x86_64
+ chost:amazon/suse-sles-15-sp4-chost-byos-v20221018-hvm-ssd-x86_64
+ chost:amazon/suse-sles-15-sp4-chost-byos-v20221118-hvm-ssd-x86_64
+ chost:amazon/suse-sles-15-sp4-chost-byos-v20221215-hvm-ssd-x86_64
+ chost:amazon/suse-sles-15-sp4-chost-byos-v20230111-hvm-ssd-x86_64
+ chost:amazon/suse-sles-15-sp4-chost-byos-v20230210-hvm-ssd-x86_64
+ chost:amazon/suse-sles-15-sp4-chost-byos-v20230310-hvm-ssd-x86_64
+ chost:amazon/suse-sles-15-sp4-chost-byos-v20230410-hvm-ssd-x86_64
+ chost:amazon/suse-sles-15-sp4-chost-byos-v20230510-hvm-ssd-x86_64
+ chost:amazon/suse-sles-15-sp4-chost-byos-v20230606-hvm-ssd-x86_64
+ chost:amazon/suse-sles-15-sp4-chost-byos-v20230704-hvm-ssd-x86_64
+ chost:amazon/suse-sles-15-sp4-chost-byos-v20230803-hvm-ssd-x86_64
+ chost:amazon/suse-sles-15-sp4-chost-byos-v20230901-hvm-ssd-x86_64
+ chost:amazon/suse-sles-15-sp4-chost-byos-v20230928-hvm-ssd-x86_64
+ chost:amazon/suse-sles-15-sp4-chost-byos-v20231027-hvm-ssd-x86_64
+ chost:amazon/suse-sles-15-sp4-chost-byos-v20231127-hvm-ssd-x86_64
+ chost:amazon/suse-sles-15-sp4-chost-byos-v20231212-hvm-ssd-x86_64
+ chost:amazon/suse-sles-15-sp4-chost-byos-v20240312-hvm-ssd-x86_64
+ chost:amazon/suse-sles-15-sp4-chost-byos-v20240612-hvm-ssd-x86_64
+ chost:amazon/suse-sles-15-sp4-chost-byos-v20240809-hvm-ssd-x86_64
+ chost:amazon/suse-sles-15-sp4-chost-byos-v20240912-hvm-ssd-x86_64
+ chost:google/sles-15-sp1-chost-byos-v20210202
+ chost:google/sles-15-sp1-chost-byos-v20210304
+ chost:google/sles-15-sp1-chost-byos-v20220127
+ chost:google/sles-15-sp1-chost-byos-v20220715-x86-64
+ chost:google/sles-15-sp2-chost-byos-v20210202
+ chost:google/sles-15-sp2-chost-byos-v20210304
+ chost:google/sles-15-sp2-chost-byos-v20210405
+ chost:google/sles-15-sp2-chost-byos-v20210506
+ chost:google/sles-15-sp2-chost-byos-v20210610
+ chost:google/sles-15-sp2-chost-byos-v20210722
+ chost:google/sles-15-sp2-chost-byos-v20210913
+ chost:google/sles-15-sp2-chost-byos-v20211025
+ chost:google/sles-15-sp2-chost-byos-v20220126
+ chost:google/sles-15-sp2-chost-byos-v20220718-x86-64
+ chost:google/sles-15-sp3-chost-byos-v20210729
+ chost:google/sles-15-sp3-chost-byos-v20210827
+ chost:google/sles-15-sp3-chost-byos-v20210927
+ chost:google/sles-15-sp3-chost-byos-v20211004
+ chost:google/sles-15-sp3-chost-byos-v20211101
+ chost:google/sles-15-sp3-chost-byos-v20211202
+ chost:google/sles-15-sp3-chost-byos-v20220103
+ chost:google/sles-15-sp3-chost-byos-v20220126
+ chost:google/sles-15-sp3-chost-byos-v20220222
+ chost:google/sles-15-sp3-chost-byos-v20220310
+ chost:google/sles-15-sp3-chost-byos-v20220411-x86-64
+ chost:google/sles-15-sp3-chost-byos-v20220510-x86-64
+ chost:google/sles-15-sp3-chost-byos-v20220608-x86-64
+ chost:google/sles-15-sp3-chost-byos-v20220708-x86-64
+ chost:google/sles-15-sp3-chost-byos-v20220718-x86-64
+ chost:google/sles-15-sp3-chost-byos-v20220818-x86-64
+ chost:google/sles-15-sp3-chost-byos-v20220916-x86-64
+ chost:google/sles-15-sp3-chost-byos-v20221019-x86-64
+ chost:google/sles-15-sp3-chost-byos-v20221118-x86-64
+ chost:google/sles-15-sp3-chost-byos-v20221215-x86-64
+ chost:google/sles-15-sp3-chost-byos-v20230313-x86-64
+ chost:google/sles-15-sp3-chost-byos-v20230613-x86-64
+ chost:google/sles-15-sp3-chost-byos-v20240807-x86-64
+ chost:google/sles-15-sp3-chost-byos-v20240912-x86-64
+ chost:google/sles-15-sp4-chost-byos-v20220718-x86-64
+ chost:google/sles-15-sp4-chost-byos-v20220721-x86-64
+ chost:google/sles-15-sp4-chost-byos-v20220818-x86-64
+ chost:google/sles-15-sp4-chost-byos-v20220916-x86-64
+ chost:google/sles-15-sp4-chost-byos-v20221018-x86-64
+ chost:google/sles-15-sp4-chost-byos-v20221118-x86-64
+ chost:google/sles-15-sp4-chost-byos-v20221215-arm64
+ chost:google/sles-15-sp4-chost-byos-v20221215-x86-64
+ chost:google/sles-15-sp4-chost-byos-v20230111-arm64
+ chost:google/sles-15-sp4-chost-byos-v20230111-x86-64
+ chost:google/sles-15-sp4-chost-byos-v20230210-arm64
+ chost:google/sles-15-sp4-chost-byos-v20230210-x86-64
+ chost:google/sles-15-sp4-chost-byos-v20230310-arm64
+ chost:google/sles-15-sp4-chost-byos-v20230310-x86-64
+ chost:google/sles-15-sp4-chost-byos-v20230410-arm64
+ chost:google/sles-15-sp4-chost-byos-v20230410-x86-64
+ chost:google/sles-15-sp4-chost-byos-v20230510-arm64
+ chost:google/sles-15-sp4-chost-byos-v20230510-x86-64
+ chost:google/sles-15-sp4-chost-byos-v20230606-arm64
+ chost:google/sles-15-sp4-chost-byos-v20230606-x86-64
+ chost:google/sles-15-sp4-chost-byos-v20230704-arm64
+ chost:google/sles-15-sp4-chost-byos-v20230704-x86-64
+ chost:google/sles-15-sp4-chost-byos-v20230804-arm64
+ chost:google/sles-15-sp4-chost-byos-v20230804-x86-64
+ chost:google/sles-15-sp4-chost-byos-v20230901-arm64
+ chost:google/sles-15-sp4-chost-byos-v20230901-x86-64
+ chost:google/sles-15-sp4-chost-byos-v20230928-arm64
+ chost:google/sles-15-sp4-chost-byos-v20230928-x86-64
+ chost:google/sles-15-sp4-chost-byos-v20231027-arm64
+ chost:google/sles-15-sp4-chost-byos-v20231027-x86-64
+ chost:google/sles-15-sp4-chost-byos-v20231127-arm64
+ chost:google/sles-15-sp4-chost-byos-v20231127-x86-64
+ chost:google/sles-15-sp4-chost-byos-v20231212-arm64
+ chost:google/sles-15-sp4-chost-byos-v20231212-x86-64
+ chost:google/sles-15-sp4-chost-byos-v20240312-arm64
+ chost:google/sles-15-sp4-chost-byos-v20240312-x86-64
+ chost:google/sles-15-sp4-chost-byos-v20240612-arm64
+ chost:google/sles-15-sp4-chost-byos-v20240612-x86-64
+ chost:google/sles-15-sp4-chost-byos-v20240809-arm64
+ chost:google/sles-15-sp4-chost-byos-v20240809-x86-64
+ chost:google/sles-15-sp4-chost-byos-v20240912-arm64
+ chost:google/sles-15-sp4-chost-byos-v20240912-x86-64
+ chost:microsoft/suse-sles-15-sp1-chost-byos-v20210202
+ chost:microsoft/suse-sles-15-sp1-chost-byos-v20210304
+ chost:microsoft/suse-sles-15-sp1-chost-byos-v20220127
+ chost:microsoft/suse-sles-15-sp1-chost-byos-v20220715-x86_64
+ chost:microsoft/suse-sles-15-sp2-chost-byos-v20210202
+ chost:microsoft/suse-sles-15-sp2-chost-byos-v20210304
+ chost:microsoft/suse-sles-15-sp2-chost-byos-v20210405
+ chost:microsoft/suse-sles-15-sp2-chost-byos-v20210506
+ chost:microsoft/suse-sles-15-sp2-chost-byos-v20210610
+ chost:microsoft/suse-sles-15-sp2-chost-byos-v20210722
+ chost:microsoft/suse-sles-15-sp2-chost-byos-v20210913
+ chost:microsoft/suse-sles-15-sp2-chost-byos-v20211025
+ chost:microsoft/suse-sles-15-sp2-chost-byos-v20220126
+ chost:microsoft/suse-sles-15-sp2-chost-byos-v20220718-x86_64
+ chost:microsoft/suse-sles-15-sp3-chost-byos-v20210729
+ chost:microsoft/suse-sles-15-sp3-chost-byos-v20210827
+ chost:microsoft/suse-sles-15-sp3-chost-byos-v20210927
+ chost:microsoft/suse-sles-15-sp3-chost-byos-v20211004
+ chost:microsoft/suse-sles-15-sp3-chost-byos-v20211101
+ chost:microsoft/suse-sles-15-sp3-chost-byos-v20211202
+ chost:microsoft/suse-sles-15-sp3-chost-byos-v20220103
+ chost:microsoft/suse-sles-15-sp3-chost-byos-v20220126
+ chost:microsoft/suse-sles-15-sp3-chost-byos-v20220222
+ chost:microsoft/suse-sles-15-sp3-chost-byos-v20220310
+ chost:microsoft/suse-sles-15-sp3-chost-byos-v20220411-x86_64
+ chost:microsoft/suse-sles-15-sp3-chost-byos-v20220510-x86_64
+ chost:microsoft/suse-sles-15-sp3-chost-byos-v20220609-x86_64
+ chost:microsoft/suse-sles-15-sp3-chost-byos-v20220708-x86_64
+ chost:microsoft/suse-sles-15-sp3-chost-byos-v20220718-x86_64
+ chost:microsoft/suse-sles-15-sp3-chost-byos-v20220818-x86_64
+ chost:microsoft/suse-sles-15-sp3-chost-byos-v20220916-x86_64
+ chost:microsoft/suse-sles-15-sp3-chost-byos-v20220921-x86_64
+ chost:microsoft/suse-sles-15-sp3-chost-byos-v20221019-x86_64
+ chost:microsoft/suse-sles-15-sp3-chost-byos-v20221119-x86_64
+ chost:microsoft/suse-sles-15-sp3-chost-byos-v20221215-x86_64
+ chost:microsoft/suse-sles-15-sp3-chost-byos-v20230313-x86_64
+ chost:microsoft/suse-sles-15-sp3-chost-byos-v20230613-x86_64
+ chost:microsoft/suse-sles-15-sp3-chost-byos-v20240807-x86_64
+ chost:microsoft/suse-sles-15-sp3-chost-byos-v20240912-x86_64
+ chost:microsoft/suse-sles-15-sp4-chost-byos-v20220718-x86_64
+ chost:microsoft/suse-sles-15-sp4-chost-byos-v20220721-x86_64
+ chost:microsoft/suse-sles-15-sp4-chost-byos-v20220819-x86_64
+ chost:microsoft/suse-sles-15-sp4-chost-byos-v20220916-x86_64
+ chost:microsoft/suse-sles-15-sp4-chost-byos-v20220923-x86_64
+ chost:microsoft/suse-sles-15-sp4-chost-byos-v20221018-x86_64
+ chost:microsoft/suse-sles-15-sp4-chost-byos-v20221118-x86_64
+ chost:microsoft/suse-sles-15-sp4-chost-byos-v20221215-arm64
+ chost:microsoft/suse-sles-15-sp4-chost-byos-v20221215-x86_64
+ chost:microsoft/suse-sles-15-sp4-chost-byos-v20230111-arm64
+ chost:microsoft/suse-sles-15-sp4-chost-byos-v20230111-x86_64
+ chost:microsoft/suse-sles-15-sp4-chost-byos-v20230210-arm64
+ chost:microsoft/suse-sles-15-sp4-chost-byos-v20230210-x86_64
+ chost:microsoft/suse-sles-15-sp4-chost-byos-v20230310-arm64
+ chost:microsoft/suse-sles-15-sp4-chost-byos-v20230310-x86_64
+ chost:microsoft/suse-sles-15-sp4-chost-byos-v20230410-arm64
+ chost:microsoft/suse-sles-15-sp4-chost-byos-v20230410-x86_64
+ chost:microsoft/suse-sles-15-sp4-chost-byos-v20230510-arm64
+ chost:microsoft/suse-sles-15-sp4-chost-byos-v20230510-x86_64
+ chost:microsoft/suse-sles-15-sp4-chost-byos-v20230606-arm64
+ chost:microsoft/suse-sles-15-sp4-chost-byos-v20230606-x86_64
+ chost:microsoft/suse-sles-15-sp4-chost-byos-v20230704-arm64
+ chost:microsoft/suse-sles-15-sp4-chost-byos-v20230704-x86_64
+ chost:microsoft/suse-sles-15-sp4-chost-byos-v20230803-arm64
+ chost:microsoft/suse-sles-15-sp4-chost-byos-v20230803-x86_64
+ chost:microsoft/suse-sles-15-sp4-chost-byos-v20230901-arm64
+ chost:microsoft/suse-sles-15-sp4-chost-byos-v20230901-x86_64
+ chost:microsoft/suse-sles-15-sp4-chost-byos-v20230928-arm64
+ chost:microsoft/suse-sles-15-sp4-chost-byos-v20230928-x86_64
+ chost:microsoft/suse-sles-15-sp4-chost-byos-v20231027-arm64
+ chost:microsoft/suse-sles-15-sp4-chost-byos-v20231027-x86_64
+ chost:microsoft/suse-sles-15-sp4-chost-byos-v20231127-arm64
+ chost:microsoft/suse-sles-15-sp4-chost-byos-v20231127-x86_64
+ chost:microsoft/suse-sles-15-sp4-chost-byos-v20231212-arm64
+ chost:microsoft/suse-sles-15-sp4-chost-byos-v20231212-x86_64
+ chost:microsoft/suse-sles-15-sp4-chost-byos-v20240312-arm64
+ chost:microsoft/suse-sles-15-sp4-chost-byos-v20240312-x86_64
+ chost:microsoft/suse-sles-15-sp4-chost-byos-v20240612-arm64
+ chost:microsoft/suse-sles-15-sp4-chost-byos-v20240612-x86_64
+ chost:microsoft/suse-sles-15-sp4-chost-byos-v20240809-arm64
+ chost:microsoft/suse-sles-15-sp4-chost-byos-v20240809-x86_64
+ chost:microsoft/suse-sles-15-sp4-chost-byos-v20240912-arm64
+ chost:microsoft/suse-sles-15-sp4-chost-byos-v20240912-x86_64
+
--- /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2024-46853.xml 2024-10-22 01:12:48.489747000 +0200
+++ /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2024-46853.xml.new 2024-10-29 01:12:33.113834000 +0100
@@ -14,13 +14,13 @@
1
- 8
- 2024-10-21T23:12:48Z
+ 9
+ 2024-10-29T00:12:32Z
current
2024-09-27T23:10:28Z
- 2024-10-21T23:12:48Z
+ 2024-10-29T00:12:32Z
cve-database/bin/generate-cvrf-cve.pl
2020-12-27T01:00:00Z
@@ -132,6 +132,21 @@
+
+
+ Image SLES12-SP5-GCE-BYOS
+
+
+
+
+ Image SLES12-SP5-GCE-SAP-BYOS
+
+
+
+
+ Image SLES12-SP5-GCE-SAP-On-Demand
+
+
SUSE Linux Enterprise Module for Basesystem 15 SP5
@@ -436,6 +451,253 @@
openSUSE Leap 15.6
+
+
+ SLES 15 SP1 CHOST Images for Amazon EC2 suse-sles-15-sp1-chost-byos-v20210304-hvm-ssd-x86_64
+ SLES 15 SP1 CHOST Images for Amazon EC2 suse-sles-15-sp1-chost-byos-v20220127-hvm-ssd-x86_64
+ SLES 15 SP1 CHOST Images for Amazon EC2 suse-sles-15-sp1-chost-byos-v20220715-hvm-ssd-x86_64
+
+
+ SLES 15 SP2 CHOST Images for Amazon EC2 suse-sles-15-sp2-chost-byos-v20210610-hvm-ssd-x86_64
+ SLES 15 SP2 CHOST Images for Amazon EC2 suse-sles-15-sp2-chost-byos-v20210722-hvm-ssd-x86_64
+ SLES 15 SP2 CHOST Images for Amazon EC2 suse-sles-15-sp2-chost-byos-v20210913-hvm-ssd-x86_64
+ SLES 15 SP2 CHOST Images for Amazon EC2 suse-sles-15-sp2-chost-byos-v20211025-hvm-ssd-x86_64
+ SLES 15 SP2 CHOST Images for Amazon EC2 suse-sles-15-sp2-chost-byos-v20220126-hvm-ssd-x86_64
+ SLES 15 SP2 CHOST Images for Amazon EC2 suse-sles-15-sp2-chost-byos-v20220718-hvm-ssd-x86_64
+
+
+ SLES 15 SP3 CHOST Images for Amazon EC2 suse-sles-15-sp3-chost-byos-v20210729-hvm-ssd-x86_64
+ SLES 15 SP3 CHOST Images for Amazon EC2 suse-sles-15-sp3-chost-byos-v20210827-hvm-ssd-x86_64
+ SLES 15 SP3 CHOST Images for Amazon EC2 suse-sles-15-sp3-chost-byos-v20210927-hvm-ssd-x86_64
+ SLES 15 SP3 CHOST Images for Amazon EC2 suse-sles-15-sp3-chost-byos-v20211004-hvm-ssd-x86_64
+ SLES 15 SP3 CHOST Images for Amazon EC2 suse-sles-15-sp3-chost-byos-v20211101-hvm-ssd-x86_64
+ SLES 15 SP3 CHOST Images for Amazon EC2 suse-sles-15-sp3-chost-byos-v20211202-hvm-ssd-x86_64
+ SLES 15 SP3 CHOST Images for Amazon EC2 suse-sles-15-sp3-chost-byos-v20220103-hvm-ssd-x86_64
+ SLES 15 SP3 CHOST Images for Amazon EC2 suse-sles-15-sp3-chost-byos-v20220126-hvm-ssd-x86_64
+ SLES 15 SP3 CHOST Images for Amazon EC2 suse-sles-15-sp3-chost-byos-v20220222-hvm-ssd-x86_64
+ SLES 15 SP3 CHOST Images for Amazon EC2 suse-sles-15-sp3-chost-byos-v20220310-hvm-ssd-x86_64
+ SLES 15 SP3 CHOST Images for Amazon EC2 suse-sles-15-sp3-chost-byos-v20220411-hvm-ssd-x86_64
+ SLES 15 SP3 CHOST Images for Amazon EC2 suse-sles-15-sp3-chost-byos-v20220510-hvm-ssd-x86_64
+ SLES 15 SP3 CHOST Images for Amazon EC2 suse-sles-15-sp3-chost-byos-v20220608-hvm-ssd-x86_64
+ SLES 15 SP3 CHOST Images for Amazon EC2 suse-sles-15-sp3-chost-byos-v20220708-hvm-ssd-x86_64
+ SLES 15 SP3 CHOST Images for Amazon EC2 suse-sles-15-sp3-chost-byos-v20220718-hvm-ssd-x86_64
+ SLES 15 SP3 CHOST Images for Amazon EC2 suse-sles-15-sp3-chost-byos-v20220818-hvm-ssd-x86_64
+ SLES 15 SP3 CHOST Images for Amazon EC2 suse-sles-15-sp3-chost-byos-v20220916-hvm-ssd-x86_64
+ SLES 15 SP3 CHOST Images for Amazon EC2 suse-sles-15-sp3-chost-byos-v20220921-hvm-ssd-x86_64
+ SLES 15 SP3 CHOST Images for Amazon EC2 suse-sles-15-sp3-chost-byos-v20221019-hvm-ssd-x86_64
+ SLES 15 SP3 CHOST Images for Amazon EC2 suse-sles-15-sp3-chost-byos-v20221119-hvm-ssd-x86_64
+ SLES 15 SP3 CHOST Images for Amazon EC2 suse-sles-15-sp3-chost-byos-v20221215-hvm-ssd-x86_64
+ SLES 15 SP3 CHOST Images for Amazon EC2 suse-sles-15-sp3-chost-byos-v20230313-hvm-ssd-x86_64
+ SLES 15 SP3 CHOST Images for Amazon EC2 suse-sles-15-sp3-chost-byos-v20230613-hvm-ssd-x86_64
+ SLES 15 SP3 CHOST Images for Amazon EC2 suse-sles-15-sp3-chost-byos-v20240807-hvm-ssd-x86_64
+ SLES 15 SP3 CHOST Images for Amazon EC2 suse-sles-15-sp3-chost-byos-v20240912-hvm-ssd-x86_64
+
+
+ SLES 15 SP4 CHOST Images for Amazon EC2 suse-sles-15-sp4-chost-byos-v20220718-hvm-ssd-x86_64
+ SLES 15 SP4 CHOST Images for Amazon EC2 suse-sles-15-sp4-chost-byos-v20220721-hvm-ssd-x86_64
+ SLES 15 SP4 CHOST Images for Amazon EC2 suse-sles-15-sp4-chost-byos-v20220819-hvm-ssd-x86_64
+ SLES 15 SP4 CHOST Images for Amazon EC2 suse-sles-15-sp4-chost-byos-v20220916-hvm-ssd-x86_64
+ SLES 15 SP4 CHOST Images for Amazon EC2 suse-sles-15-sp4-chost-byos-v20220923-hvm-ssd-x86_64
+ SLES 15 SP4 CHOST Images for Amazon EC2 suse-sles-15-sp4-chost-byos-v20221018-hvm-ssd-x86_64
+ SLES 15 SP4 CHOST Images for Amazon EC2 suse-sles-15-sp4-chost-byos-v20221118-hvm-ssd-x86_64
+ SLES 15 SP4 CHOST Images for Amazon EC2 suse-sles-15-sp4-chost-byos-v20221215-hvm-ssd-x86_64
+ SLES 15 SP4 CHOST Images for Amazon EC2 suse-sles-15-sp4-chost-byos-v20230111-hvm-ssd-x86_64
+ SLES 15 SP4 CHOST Images for Amazon EC2 suse-sles-15-sp4-chost-byos-v20230210-hvm-ssd-x86_64
+ SLES 15 SP4 CHOST Images for Amazon EC2 suse-sles-15-sp4-chost-byos-v20230310-hvm-ssd-x86_64
+ SLES 15 SP4 CHOST Images for Amazon EC2 suse-sles-15-sp4-chost-byos-v20230410-hvm-ssd-x86_64
+ SLES 15 SP4 CHOST Images for Amazon EC2 suse-sles-15-sp4-chost-byos-v20230510-hvm-ssd-x86_64
+ SLES 15 SP4 CHOST Images for Amazon EC2 suse-sles-15-sp4-chost-byos-v20230606-hvm-ssd-x86_64
+ SLES 15 SP4 CHOST Images for Amazon EC2 suse-sles-15-sp4-chost-byos-v20230704-hvm-ssd-x86_64
+ SLES 15 SP4 CHOST Images for Amazon EC2 suse-sles-15-sp4-chost-byos-v20230803-hvm-ssd-x86_64
+ SLES 15 SP4 CHOST Images for Amazon EC2 suse-sles-15-sp4-chost-byos-v20230901-hvm-ssd-x86_64
+ SLES 15 SP4 CHOST Images for Amazon EC2 suse-sles-15-sp4-chost-byos-v20230928-hvm-ssd-x86_64
+ SLES 15 SP4 CHOST Images for Amazon EC2 suse-sles-15-sp4-chost-byos-v20231027-hvm-ssd-x86_64
+ SLES 15 SP4 CHOST Images for Amazon EC2 suse-sles-15-sp4-chost-byos-v20231127-hvm-ssd-x86_64
+ SLES 15 SP4 CHOST Images for Amazon EC2 suse-sles-15-sp4-chost-byos-v20231212-hvm-ssd-x86_64
+ SLES 15 SP4 CHOST Images for Amazon EC2 suse-sles-15-sp4-chost-byos-v20240312-hvm-ssd-x86_64
+ SLES 15 SP4 CHOST Images for Amazon EC2 suse-sles-15-sp4-chost-byos-v20240612-hvm-ssd-x86_64
+ SLES 15 SP4 CHOST Images for Amazon EC2 suse-sles-15-sp4-chost-byos-v20240809-hvm-ssd-x86_64
+ SLES 15 SP4 CHOST Images for Amazon EC2 suse-sles-15-sp4-chost-byos-v20240912-hvm-ssd-x86_64
+
+
+ SLES 15 SP1 CHOST Images for Google sles-15-sp1-chost-byos-v20210202
+ SLES 15 SP1 CHOST Images for Google sles-15-sp1-chost-byos-v20210304
+ SLES 15 SP1 CHOST Images for Google sles-15-sp1-chost-byos-v20220127
+ SLES 15 SP1 CHOST Images for Google sles-15-sp1-chost-byos-v20220715-x86-64
+
+
+ SLES 15 SP2 CHOST Images for Google sles-15-sp2-chost-byos-v20210202
+ SLES 15 SP2 CHOST Images for Google sles-15-sp2-chost-byos-v20210304
+ SLES 15 SP2 CHOST Images for Google sles-15-sp2-chost-byos-v20210405
+ SLES 15 SP2 CHOST Images for Google sles-15-sp2-chost-byos-v20210506
+ SLES 15 SP2 CHOST Images for Google sles-15-sp2-chost-byos-v20210610
+ SLES 15 SP2 CHOST Images for Google sles-15-sp2-chost-byos-v20210722
+ SLES 15 SP2 CHOST Images for Google sles-15-sp2-chost-byos-v20210913
+ SLES 15 SP2 CHOST Images for Google sles-15-sp2-chost-byos-v20211025
+ SLES 15 SP2 CHOST Images for Google sles-15-sp2-chost-byos-v20220126
+ SLES 15 SP2 CHOST Images for Google sles-15-sp2-chost-byos-v20220718-x86-64
+
+
+ SLES 15 SP3 CHOST Images for Google sles-15-sp3-chost-byos-v20210729
+ SLES 15 SP3 CHOST Images for Google sles-15-sp3-chost-byos-v20210827
+ SLES 15 SP3 CHOST Images for Google sles-15-sp3-chost-byos-v20210927
+ SLES 15 SP3 CHOST Images for Google sles-15-sp3-chost-byos-v20211004
+ SLES 15 SP3 CHOST Images for Google sles-15-sp3-chost-byos-v20211101
+ SLES 15 SP3 CHOST Images for Google sles-15-sp3-chost-byos-v20211202
+ SLES 15 SP3 CHOST Images for Google sles-15-sp3-chost-byos-v20220103
+ SLES 15 SP3 CHOST Images for Google sles-15-sp3-chost-byos-v20220126
+ SLES 15 SP3 CHOST Images for Google sles-15-sp3-chost-byos-v20220222
+ SLES 15 SP3 CHOST Images for Google sles-15-sp3-chost-byos-v20220310
+ SLES 15 SP3 CHOST Images for Google sles-15-sp3-chost-byos-v20220411-x86-64
+ SLES 15 SP3 CHOST Images for Google sles-15-sp3-chost-byos-v20220510-x86-64
+ SLES 15 SP3 CHOST Images for Google sles-15-sp3-chost-byos-v20220608-x86-64
+ SLES 15 SP3 CHOST Images for Google sles-15-sp3-chost-byos-v20220708-x86-64
+ SLES 15 SP3 CHOST Images for Google sles-15-sp3-chost-byos-v20220718-x86-64
+ SLES 15 SP3 CHOST Images for Google sles-15-sp3-chost-byos-v20220818-x86-64
+ SLES 15 SP3 CHOST Images for Google sles-15-sp3-chost-byos-v20220916-x86-64
+ SLES 15 SP3 CHOST Images for Google sles-15-sp3-chost-byos-v20221019-x86-64
+ SLES 15 SP3 CHOST Images for Google sles-15-sp3-chost-byos-v20221118-x86-64
+ SLES 15 SP3 CHOST Images for Google sles-15-sp3-chost-byos-v20221215-x86-64
+ SLES 15 SP3 CHOST Images for Google sles-15-sp3-chost-byos-v20230313-x86-64
+ SLES 15 SP3 CHOST Images for Google sles-15-sp3-chost-byos-v20230613-x86-64
+ SLES 15 SP3 CHOST Images for Google sles-15-sp3-chost-byos-v20240807-x86-64
+ SLES 15 SP3 CHOST Images for Google sles-15-sp3-chost-byos-v20240912-x86-64
+
+
+ SLES 15 SP4 CHOST Images for Google sles-15-sp4-chost-byos-v20220718-x86-64
+ SLES 15 SP4 CHOST Images for Google sles-15-sp4-chost-byos-v20220721-x86-64
+ SLES 15 SP4 CHOST Images for Google sles-15-sp4-chost-byos-v20220818-x86-64
+ SLES 15 SP4 CHOST Images for Google sles-15-sp4-chost-byos-v20220916-x86-64
+ SLES 15 SP4 CHOST Images for Google sles-15-sp4-chost-byos-v20221018-x86-64
+ SLES 15 SP4 CHOST Images for Google sles-15-sp4-chost-byos-v20221118-x86-64
+ SLES 15 SP4 CHOST Images for Google sles-15-sp4-chost-byos-v20221215-arm64
+ SLES 15 SP4 CHOST Images for Google sles-15-sp4-chost-byos-v20221215-x86-64
+ SLES 15 SP4 CHOST Images for Google sles-15-sp4-chost-byos-v20230111-arm64
+ SLES 15 SP4 CHOST Images for Google sles-15-sp4-chost-byos-v20230111-x86-64
+ SLES 15 SP4 CHOST Images for Google sles-15-sp4-chost-byos-v20230210-arm64
+ SLES 15 SP4 CHOST Images for Google sles-15-sp4-chost-byos-v20230210-x86-64
+ SLES 15 SP4 CHOST Images for Google sles-15-sp4-chost-byos-v20230310-arm64
+ SLES 15 SP4 CHOST Images for Google sles-15-sp4-chost-byos-v20230310-x86-64
+ SLES 15 SP4 CHOST Images for Google sles-15-sp4-chost-byos-v20230410-arm64
+ SLES 15 SP4 CHOST Images for Google sles-15-sp4-chost-byos-v20230410-x86-64
+ SLES 15 SP4 CHOST Images for Google sles-15-sp4-chost-byos-v20230510-arm64
+ SLES 15 SP4 CHOST Images for Google sles-15-sp4-chost-byos-v20230510-x86-64
+ SLES 15 SP4 CHOST Images for Google sles-15-sp4-chost-byos-v20230606-arm64
+ SLES 15 SP4 CHOST Images for Google sles-15-sp4-chost-byos-v20230606-x86-64
+ SLES 15 SP4 CHOST Images for Google sles-15-sp4-chost-byos-v20230704-arm64
+ SLES 15 SP4 CHOST Images for Google sles-15-sp4-chost-byos-v20230704-x86-64
+ SLES 15 SP4 CHOST Images for Google sles-15-sp4-chost-byos-v20230804-arm64
+ SLES 15 SP4 CHOST Images for Google sles-15-sp4-chost-byos-v20230804-x86-64
+ SLES 15 SP4 CHOST Images for Google sles-15-sp4-chost-byos-v20230901-arm64
+ SLES 15 SP4 CHOST Images for Google sles-15-sp4-chost-byos-v20230901-x86-64
+ SLES 15 SP4 CHOST Images for Google sles-15-sp4-chost-byos-v20230928-arm64
+ SLES 15 SP4 CHOST Images for Google sles-15-sp4-chost-byos-v20230928-x86-64
+ SLES 15 SP4 CHOST Images for Google sles-15-sp4-chost-byos-v20231027-arm64
+ SLES 15 SP4 CHOST Images for Google sles-15-sp4-chost-byos-v20231027-x86-64
+ SLES 15 SP4 CHOST Images for Google sles-15-sp4-chost-byos-v20231127-arm64
+ SLES 15 SP4 CHOST Images for Google sles-15-sp4-chost-byos-v20231127-x86-64
+ SLES 15 SP4 CHOST Images for Google sles-15-sp4-chost-byos-v20231212-arm64
+ SLES 15 SP4 CHOST Images for Google sles-15-sp4-chost-byos-v20231212-x86-64
+ SLES 15 SP4 CHOST Images for Google sles-15-sp4-chost-byos-v20240312-arm64
+ SLES 15 SP4 CHOST Images for Google sles-15-sp4-chost-byos-v20240312-x86-64
+ SLES 15 SP4 CHOST Images for Google sles-15-sp4-chost-byos-v20240612-arm64
+ SLES 15 SP4 CHOST Images for Google sles-15-sp4-chost-byos-v20240612-x86-64
+ SLES 15 SP4 CHOST Images for Google sles-15-sp4-chost-byos-v20240809-arm64
+ SLES 15 SP4 CHOST Images for Google sles-15-sp4-chost-byos-v20240809-x86-64
+ SLES 15 SP4 CHOST Images for Google sles-15-sp4-chost-byos-v20240912-arm64
+ SLES 15 SP4 CHOST Images for Google sles-15-sp4-chost-byos-v20240912-x86-64
+
+
+ SLES 15 SP1 CHOST Images for Microsoft Azure suse-sles-15-sp1-chost-byos-v20210202
+ SLES 15 SP1 CHOST Images for Microsoft Azure suse-sles-15-sp1-chost-byos-v20210304
+ SLES 15 SP1 CHOST Images for Microsoft Azure suse-sles-15-sp1-chost-byos-v20220127
+ SLES 15 SP1 CHOST Images for Microsoft Azure suse-sles-15-sp1-chost-byos-v20220715-x86_64
+
+
+ SLES 15 SP2 CHOST Images for Microsoft Azure suse-sles-15-sp2-chost-byos-v20210202
+ SLES 15 SP2 CHOST Images for Microsoft Azure suse-sles-15-sp2-chost-byos-v20210304
+ SLES 15 SP2 CHOST Images for Microsoft Azure suse-sles-15-sp2-chost-byos-v20210405
+ SLES 15 SP2 CHOST Images for Microsoft Azure suse-sles-15-sp2-chost-byos-v20210506
+ SLES 15 SP2 CHOST Images for Microsoft Azure suse-sles-15-sp2-chost-byos-v20210610
+ SLES 15 SP2 CHOST Images for Microsoft Azure suse-sles-15-sp2-chost-byos-v20210722
+ SLES 15 SP2 CHOST Images for Microsoft Azure suse-sles-15-sp2-chost-byos-v20210913
+ SLES 15 SP2 CHOST Images for Microsoft Azure suse-sles-15-sp2-chost-byos-v20211025
+ SLES 15 SP2 CHOST Images for Microsoft Azure suse-sles-15-sp2-chost-byos-v20220126
+ SLES 15 SP2 CHOST Images for Microsoft Azure suse-sles-15-sp2-chost-byos-v20220718-x86_64
+
+
+ SLES 15 SP3 CHOST Images for Microsoft Azure suse-sles-15-sp3-chost-byos-v20210729
+ SLES 15 SP3 CHOST Images for Microsoft Azure suse-sles-15-sp3-chost-byos-v20210827
+ SLES 15 SP3 CHOST Images for Microsoft Azure suse-sles-15-sp3-chost-byos-v20210927
+ SLES 15 SP3 CHOST Images for Microsoft Azure suse-sles-15-sp3-chost-byos-v20211004
+ SLES 15 SP3 CHOST Images for Microsoft Azure suse-sles-15-sp3-chost-byos-v20211101
+ SLES 15 SP3 CHOST Images for Microsoft Azure suse-sles-15-sp3-chost-byos-v20211202
+ SLES 15 SP3 CHOST Images for Microsoft Azure suse-sles-15-sp3-chost-byos-v20220103
+ SLES 15 SP3 CHOST Images for Microsoft Azure suse-sles-15-sp3-chost-byos-v20220126
+ SLES 15 SP3 CHOST Images for Microsoft Azure suse-sles-15-sp3-chost-byos-v20220222
+ SLES 15 SP3 CHOST Images for Microsoft Azure suse-sles-15-sp3-chost-byos-v20220310
+ SLES 15 SP3 CHOST Images for Microsoft Azure suse-sles-15-sp3-chost-byos-v20220411-x86_64
+ SLES 15 SP3 CHOST Images for Microsoft Azure suse-sles-15-sp3-chost-byos-v20220510-x86_64
+ SLES 15 SP3 CHOST Images for Microsoft Azure suse-sles-15-sp3-chost-byos-v20220609-x86_64
+ SLES 15 SP3 CHOST Images for Microsoft Azure suse-sles-15-sp3-chost-byos-v20220708-x86_64
+ SLES 15 SP3 CHOST Images for Microsoft Azure suse-sles-15-sp3-chost-byos-v20220718-x86_64
+ SLES 15 SP3 CHOST Images for Microsoft Azure suse-sles-15-sp3-chost-byos-v20220818-x86_64
+ SLES 15 SP3 CHOST Images for Microsoft Azure suse-sles-15-sp3-chost-byos-v20220916-x86_64
+ SLES 15 SP3 CHOST Images for Microsoft Azure suse-sles-15-sp3-chost-byos-v20220921-x86_64
+ SLES 15 SP3 CHOST Images for Microsoft Azure suse-sles-15-sp3-chost-byos-v20221019-x86_64
+ SLES 15 SP3 CHOST Images for Microsoft Azure suse-sles-15-sp3-chost-byos-v20221119-x86_64
+ SLES 15 SP3 CHOST Images for Microsoft Azure suse-sles-15-sp3-chost-byos-v20221215-x86_64
+ SLES 15 SP3 CHOST Images for Microsoft Azure suse-sles-15-sp3-chost-byos-v20230313-x86_64
+ SLES 15 SP3 CHOST Images for Microsoft Azure suse-sles-15-sp3-chost-byos-v20230613-x86_64
+ SLES 15 SP3 CHOST Images for Microsoft Azure suse-sles-15-sp3-chost-byos-v20240807-x86_64
+ SLES 15 SP3 CHOST Images for Microsoft Azure suse-sles-15-sp3-chost-byos-v20240912-x86_64
+
+
+ SLES 15 SP4 CHOST Images for Microsoft Azure suse-sles-15-sp4-chost-byos-v20220718-x86_64
+ SLES 15 SP4 CHOST Images for Microsoft Azure suse-sles-15-sp4-chost-byos-v20220721-x86_64
+ SLES 15 SP4 CHOST Images for Microsoft Azure suse-sles-15-sp4-chost-byos-v20220819-x86_64
+ SLES 15 SP4 CHOST Images for Microsoft Azure suse-sles-15-sp4-chost-byos-v20220916-x86_64
+ SLES 15 SP4 CHOST Images for Microsoft Azure suse-sles-15-sp4-chost-byos-v20220923-x86_64
+ SLES 15 SP4 CHOST Images for Microsoft Azure suse-sles-15-sp4-chost-byos-v20221018-x86_64
+ SLES 15 SP4 CHOST Images for Microsoft Azure suse-sles-15-sp4-chost-byos-v20221118-x86_64
+ SLES 15 SP4 CHOST Images for Microsoft Azure suse-sles-15-sp4-chost-byos-v20221215-arm64
+ SLES 15 SP4 CHOST Images for Microsoft Azure suse-sles-15-sp4-chost-byos-v20221215-x86_64
+ SLES 15 SP4 CHOST Images for Microsoft Azure suse-sles-15-sp4-chost-byos-v20230111-arm64
+ SLES 15 SP4 CHOST Images for Microsoft Azure suse-sles-15-sp4-chost-byos-v20230111-x86_64
+ SLES 15 SP4 CHOST Images for Microsoft Azure suse-sles-15-sp4-chost-byos-v20230210-arm64
+ SLES 15 SP4 CHOST Images for Microsoft Azure suse-sles-15-sp4-chost-byos-v20230210-x86_64
+ SLES 15 SP4 CHOST Images for Microsoft Azure suse-sles-15-sp4-chost-byos-v20230310-arm64
+ SLES 15 SP4 CHOST Images for Microsoft Azure suse-sles-15-sp4-chost-byos-v20230310-x86_64
+ SLES 15 SP4 CHOST Images for Microsoft Azure suse-sles-15-sp4-chost-byos-v20230410-arm64
+ SLES 15 SP4 CHOST Images for Microsoft Azure suse-sles-15-sp4-chost-byos-v20230410-x86_64
+ SLES 15 SP4 CHOST Images for Microsoft Azure suse-sles-15-sp4-chost-byos-v20230510-arm64
+ SLES 15 SP4 CHOST Images for Microsoft Azure suse-sles-15-sp4-chost-byos-v20230510-x86_64
+ SLES 15 SP4 CHOST Images for Microsoft Azure suse-sles-15-sp4-chost-byos-v20230606-arm64
+ SLES 15 SP4 CHOST Images for Microsoft Azure suse-sles-15-sp4-chost-byos-v20230606-x86_64
+ SLES 15 SP4 CHOST Images for Microsoft Azure suse-sles-15-sp4-chost-byos-v20230704-arm64
+ SLES 15 SP4 CHOST Images for Microsoft Azure suse-sles-15-sp4-chost-byos-v20230704-x86_64
+ SLES 15 SP4 CHOST Images for Microsoft Azure suse-sles-15-sp4-chost-byos-v20230803-arm64
+ SLES 15 SP4 CHOST Images for Microsoft Azure suse-sles-15-sp4-chost-byos-v20230803-x86_64
+ SLES 15 SP4 CHOST Images for Microsoft Azure suse-sles-15-sp4-chost-byos-v20230901-arm64
+ SLES 15 SP4 CHOST Images for Microsoft Azure suse-sles-15-sp4-chost-byos-v20230901-x86_64
+ SLES 15 SP4 CHOST Images for Microsoft Azure suse-sles-15-sp4-chost-byos-v20230928-arm64
+ SLES 15 SP4 CHOST Images for Microsoft Azure suse-sles-15-sp4-chost-byos-v20230928-x86_64
+ SLES 15 SP4 CHOST Images for Microsoft Azure suse-sles-15-sp4-chost-byos-v20231027-arm64
+ SLES 15 SP4 CHOST Images for Microsoft Azure suse-sles-15-sp4-chost-byos-v20231027-x86_64
+ SLES 15 SP4 CHOST Images for Microsoft Azure suse-sles-15-sp4-chost-byos-v20231127-arm64
+ SLES 15 SP4 CHOST Images for Microsoft Azure suse-sles-15-sp4-chost-byos-v20231127-x86_64
+ SLES 15 SP4 CHOST Images for Microsoft Azure suse-sles-15-sp4-chost-byos-v20231212-arm64
+ SLES 15 SP4 CHOST Images for Microsoft Azure suse-sles-15-sp4-chost-byos-v20231212-x86_64
+ SLES 15 SP4 CHOST Images for Microsoft Azure suse-sles-15-sp4-chost-byos-v20240312-arm64
+ SLES 15 SP4 CHOST Images for Microsoft Azure suse-sles-15-sp4-chost-byos-v20240312-x86_64
+ SLES 15 SP4 CHOST Images for Microsoft Azure suse-sles-15-sp4-chost-byos-v20240612-arm64
+ SLES 15 SP4 CHOST Images for Microsoft Azure suse-sles-15-sp4-chost-byos-v20240612-x86_64
+ SLES 15 SP4 CHOST Images for Microsoft Azure suse-sles-15-sp4-chost-byos-v20240809-arm64
+ SLES 15 SP4 CHOST Images for Microsoft Azure suse-sles-15-sp4-chost-byos-v20240809-x86_64
+ SLES 15 SP4 CHOST Images for Microsoft Azure suse-sles-15-sp4-chost-byos-v20240912-arm64
+ SLES 15 SP4 CHOST Images for Microsoft Azure suse-sles-15-sp4-chost-byos-v20240912-x86_64
+
+
cluster-md-kmp-default
@@ -616,6 +878,39 @@
reiserfs-kmp-default
+
+ kernel-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-BYOS
+
+
+ cluster-md-kmp-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ dlm-kmp-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ gfs2-kmp-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ kernel-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ ocfs2-kmp-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ cluster-md-kmp-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
+
+ dlm-kmp-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
+
+ gfs2-kmp-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
+
+ kernel-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
+
+ ocfs2-kmp-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
cluster-md-kmp-default-4.12.14-122.231.1 as a component of SUSE Linux Enterprise High Availability Extension 12 SP5
@@ -1528,6 +1823,17 @@
CVE-2024-46853
+ Image SLES12-SP5-GCE-BYOS:kernel-default-4.12.14-122.231.1
+ Image SLES12-SP5-GCE-SAP-BYOS:cluster-md-kmp-default-4.12.14-122.231.1
+ Image SLES12-SP5-GCE-SAP-BYOS:dlm-kmp-default-4.12.14-122.231.1
+ Image SLES12-SP5-GCE-SAP-BYOS:gfs2-kmp-default-4.12.14-122.231.1
+ Image SLES12-SP5-GCE-SAP-BYOS:kernel-default-4.12.14-122.231.1
+ Image SLES12-SP5-GCE-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.231.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:cluster-md-kmp-default-4.12.14-122.231.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:dlm-kmp-default-4.12.14-122.231.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:gfs2-kmp-default-4.12.14-122.231.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:kernel-default-4.12.14-122.231.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:ocfs2-kmp-default-4.12.14-122.231.1
SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.231.1
SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.231.1
SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.231.1
@@ -1666,6 +1972,229 @@
openSUSE Leap 15.6:ocfs2-kmp-default
openSUSE Leap 15.6:reiserfs-kmp-default
+
+ chost:amazon/suse-sles-15-sp1-chost-byos-v20210304-hvm-ssd-x86_64
+ chost:amazon/suse-sles-15-sp1-chost-byos-v20220127-hvm-ssd-x86_64
+ chost:amazon/suse-sles-15-sp1-chost-byos-v20220715-hvm-ssd-x86_64
+ chost:amazon/suse-sles-15-sp2-chost-byos-v20210610-hvm-ssd-x86_64
+ chost:amazon/suse-sles-15-sp2-chost-byos-v20210722-hvm-ssd-x86_64
+ chost:amazon/suse-sles-15-sp2-chost-byos-v20210913-hvm-ssd-x86_64
+ chost:amazon/suse-sles-15-sp2-chost-byos-v20211025-hvm-ssd-x86_64
+ chost:amazon/suse-sles-15-sp2-chost-byos-v20220126-hvm-ssd-x86_64
+ chost:amazon/suse-sles-15-sp2-chost-byos-v20220718-hvm-ssd-x86_64
+ chost:amazon/suse-sles-15-sp3-chost-byos-v20210729-hvm-ssd-x86_64
+ chost:amazon/suse-sles-15-sp3-chost-byos-v20210827-hvm-ssd-x86_64
+ chost:amazon/suse-sles-15-sp3-chost-byos-v20210927-hvm-ssd-x86_64
+ chost:amazon/suse-sles-15-sp3-chost-byos-v20211004-hvm-ssd-x86_64
+ chost:amazon/suse-sles-15-sp3-chost-byos-v20211101-hvm-ssd-x86_64
+ chost:amazon/suse-sles-15-sp3-chost-byos-v20211202-hvm-ssd-x86_64
+ chost:amazon/suse-sles-15-sp3-chost-byos-v20220103-hvm-ssd-x86_64
+ chost:amazon/suse-sles-15-sp3-chost-byos-v20220126-hvm-ssd-x86_64
+ chost:amazon/suse-sles-15-sp3-chost-byos-v20220222-hvm-ssd-x86_64
+ chost:amazon/suse-sles-15-sp3-chost-byos-v20220310-hvm-ssd-x86_64
+ chost:amazon/suse-sles-15-sp3-chost-byos-v20220411-hvm-ssd-x86_64
+ chost:amazon/suse-sles-15-sp3-chost-byos-v20220510-hvm-ssd-x86_64
+ chost:amazon/suse-sles-15-sp3-chost-byos-v20220608-hvm-ssd-x86_64
+ chost:amazon/suse-sles-15-sp3-chost-byos-v20220708-hvm-ssd-x86_64
+ chost:amazon/suse-sles-15-sp3-chost-byos-v20220718-hvm-ssd-x86_64
+ chost:amazon/suse-sles-15-sp3-chost-byos-v20220818-hvm-ssd-x86_64
+ chost:amazon/suse-sles-15-sp3-chost-byos-v20220916-hvm-ssd-x86_64
+ chost:amazon/suse-sles-15-sp3-chost-byos-v20220921-hvm-ssd-x86_64
+ chost:amazon/suse-sles-15-sp3-chost-byos-v20221019-hvm-ssd-x86_64
+ chost:amazon/suse-sles-15-sp3-chost-byos-v20221119-hvm-ssd-x86_64
+ chost:amazon/suse-sles-15-sp3-chost-byos-v20221215-hvm-ssd-x86_64
+ chost:amazon/suse-sles-15-sp3-chost-byos-v20230313-hvm-ssd-x86_64
+ chost:amazon/suse-sles-15-sp3-chost-byos-v20230613-hvm-ssd-x86_64
+ chost:amazon/suse-sles-15-sp3-chost-byos-v20240807-hvm-ssd-x86_64
+ chost:amazon/suse-sles-15-sp3-chost-byos-v20240912-hvm-ssd-x86_64
+ chost:amazon/suse-sles-15-sp4-chost-byos-v20220718-hvm-ssd-x86_64
+ chost:amazon/suse-sles-15-sp4-chost-byos-v20220721-hvm-ssd-x86_64
+ chost:amazon/suse-sles-15-sp4-chost-byos-v20220819-hvm-ssd-x86_64
+ chost:amazon/suse-sles-15-sp4-chost-byos-v20220916-hvm-ssd-x86_64
+ chost:amazon/suse-sles-15-sp4-chost-byos-v20220923-hvm-ssd-x86_64
+ chost:amazon/suse-sles-15-sp4-chost-byos-v20221018-hvm-ssd-x86_64
+ chost:amazon/suse-sles-15-sp4-chost-byos-v20221118-hvm-ssd-x86_64
+ chost:amazon/suse-sles-15-sp4-chost-byos-v20221215-hvm-ssd-x86_64
+ chost:amazon/suse-sles-15-sp4-chost-byos-v20230111-hvm-ssd-x86_64
+ chost:amazon/suse-sles-15-sp4-chost-byos-v20230210-hvm-ssd-x86_64
+ chost:amazon/suse-sles-15-sp4-chost-byos-v20230310-hvm-ssd-x86_64
+ chost:amazon/suse-sles-15-sp4-chost-byos-v20230410-hvm-ssd-x86_64
+ chost:amazon/suse-sles-15-sp4-chost-byos-v20230510-hvm-ssd-x86_64
+ chost:amazon/suse-sles-15-sp4-chost-byos-v20230606-hvm-ssd-x86_64
+ chost:amazon/suse-sles-15-sp4-chost-byos-v20230704-hvm-ssd-x86_64
+ chost:amazon/suse-sles-15-sp4-chost-byos-v20230803-hvm-ssd-x86_64
+ chost:amazon/suse-sles-15-sp4-chost-byos-v20230901-hvm-ssd-x86_64
+ chost:amazon/suse-sles-15-sp4-chost-byos-v20230928-hvm-ssd-x86_64
+ chost:amazon/suse-sles-15-sp4-chost-byos-v20231027-hvm-ssd-x86_64
+ chost:amazon/suse-sles-15-sp4-chost-byos-v20231127-hvm-ssd-x86_64
+ chost:amazon/suse-sles-15-sp4-chost-byos-v20231212-hvm-ssd-x86_64
+ chost:amazon/suse-sles-15-sp4-chost-byos-v20240312-hvm-ssd-x86_64
+ chost:amazon/suse-sles-15-sp4-chost-byos-v20240612-hvm-ssd-x86_64
+ chost:amazon/suse-sles-15-sp4-chost-byos-v20240809-hvm-ssd-x86_64
+ chost:amazon/suse-sles-15-sp4-chost-byos-v20240912-hvm-ssd-x86_64
+ chost:google/sles-15-sp1-chost-byos-v20210202
+ chost:google/sles-15-sp1-chost-byos-v20210304
+ chost:google/sles-15-sp1-chost-byos-v20220127
+ chost:google/sles-15-sp1-chost-byos-v20220715-x86-64
+ chost:google/sles-15-sp2-chost-byos-v20210202
+ chost:google/sles-15-sp2-chost-byos-v20210304
+ chost:google/sles-15-sp2-chost-byos-v20210405
+ chost:google/sles-15-sp2-chost-byos-v20210506
+ chost:google/sles-15-sp2-chost-byos-v20210610
+ chost:google/sles-15-sp2-chost-byos-v20210722
+ chost:google/sles-15-sp2-chost-byos-v20210913
+ chost:google/sles-15-sp2-chost-byos-v20211025
+ chost:google/sles-15-sp2-chost-byos-v20220126
+ chost:google/sles-15-sp2-chost-byos-v20220718-x86-64
+ chost:google/sles-15-sp3-chost-byos-v20210729
+ chost:google/sles-15-sp3-chost-byos-v20210827
+ chost:google/sles-15-sp3-chost-byos-v20210927
+ chost:google/sles-15-sp3-chost-byos-v20211004
+ chost:google/sles-15-sp3-chost-byos-v20211101
+ chost:google/sles-15-sp3-chost-byos-v20211202
+ chost:google/sles-15-sp3-chost-byos-v20220103
+ chost:google/sles-15-sp3-chost-byos-v20220126
+ chost:google/sles-15-sp3-chost-byos-v20220222
+ chost:google/sles-15-sp3-chost-byos-v20220310
+ chost:google/sles-15-sp3-chost-byos-v20220411-x86-64
+ chost:google/sles-15-sp3-chost-byos-v20220510-x86-64
+ chost:google/sles-15-sp3-chost-byos-v20220608-x86-64
+ chost:google/sles-15-sp3-chost-byos-v20220708-x86-64
+ chost:google/sles-15-sp3-chost-byos-v20220718-x86-64
+ chost:google/sles-15-sp3-chost-byos-v20220818-x86-64
+ chost:google/sles-15-sp3-chost-byos-v20220916-x86-64
+ chost:google/sles-15-sp3-chost-byos-v20221019-x86-64
+ chost:google/sles-15-sp3-chost-byos-v20221118-x86-64
+ chost:google/sles-15-sp3-chost-byos-v20221215-x86-64
+ chost:google/sles-15-sp3-chost-byos-v20230313-x86-64
+ chost:google/sles-15-sp3-chost-byos-v20230613-x86-64
+ chost:google/sles-15-sp3-chost-byos-v20240807-x86-64
+ chost:google/sles-15-sp3-chost-byos-v20240912-x86-64
+ chost:google/sles-15-sp4-chost-byos-v20220718-x86-64
+ chost:google/sles-15-sp4-chost-byos-v20220721-x86-64
+ chost:google/sles-15-sp4-chost-byos-v20220818-x86-64
+ chost:google/sles-15-sp4-chost-byos-v20220916-x86-64
+ chost:google/sles-15-sp4-chost-byos-v20221018-x86-64
+ chost:google/sles-15-sp4-chost-byos-v20221118-x86-64
+ chost:google/sles-15-sp4-chost-byos-v20221215-arm64
+ chost:google/sles-15-sp4-chost-byos-v20221215-x86-64
+ chost:google/sles-15-sp4-chost-byos-v20230111-arm64
+ chost:google/sles-15-sp4-chost-byos-v20230111-x86-64
+ chost:google/sles-15-sp4-chost-byos-v20230210-arm64
+ chost:google/sles-15-sp4-chost-byos-v20230210-x86-64
+ chost:google/sles-15-sp4-chost-byos-v20230310-arm64
+ chost:google/sles-15-sp4-chost-byos-v20230310-x86-64
+ chost:google/sles-15-sp4-chost-byos-v20230410-arm64
+ chost:google/sles-15-sp4-chost-byos-v20230410-x86-64
+ chost:google/sles-15-sp4-chost-byos-v20230510-arm64
+ chost:google/sles-15-sp4-chost-byos-v20230510-x86-64
+ chost:google/sles-15-sp4-chost-byos-v20230606-arm64
+ chost:google/sles-15-sp4-chost-byos-v20230606-x86-64
+ chost:google/sles-15-sp4-chost-byos-v20230704-arm64
+ chost:google/sles-15-sp4-chost-byos-v20230704-x86-64
+ chost:google/sles-15-sp4-chost-byos-v20230804-arm64
+ chost:google/sles-15-sp4-chost-byos-v20230804-x86-64
+ chost:google/sles-15-sp4-chost-byos-v20230901-arm64
+ chost:google/sles-15-sp4-chost-byos-v20230901-x86-64
+ chost:google/sles-15-sp4-chost-byos-v20230928-arm64
+ chost:google/sles-15-sp4-chost-byos-v20230928-x86-64
+ chost:google/sles-15-sp4-chost-byos-v20231027-arm64
+ chost:google/sles-15-sp4-chost-byos-v20231027-x86-64
+ chost:google/sles-15-sp4-chost-byos-v20231127-arm64
+ chost:google/sles-15-sp4-chost-byos-v20231127-x86-64
+ chost:google/sles-15-sp4-chost-byos-v20231212-arm64
+ chost:google/sles-15-sp4-chost-byos-v20231212-x86-64
+ chost:google/sles-15-sp4-chost-byos-v20240312-arm64
+ chost:google/sles-15-sp4-chost-byos-v20240312-x86-64
+ chost:google/sles-15-sp4-chost-byos-v20240612-arm64
+ chost:google/sles-15-sp4-chost-byos-v20240612-x86-64
+ chost:google/sles-15-sp4-chost-byos-v20240809-arm64
+ chost:google/sles-15-sp4-chost-byos-v20240809-x86-64
+ chost:google/sles-15-sp4-chost-byos-v20240912-arm64
+ chost:google/sles-15-sp4-chost-byos-v20240912-x86-64
+ chost:microsoft/suse-sles-15-sp1-chost-byos-v20210202
+ chost:microsoft/suse-sles-15-sp1-chost-byos-v20210304
+ chost:microsoft/suse-sles-15-sp1-chost-byos-v20220127
+ chost:microsoft/suse-sles-15-sp1-chost-byos-v20220715-x86_64
+ chost:microsoft/suse-sles-15-sp2-chost-byos-v20210202
+ chost:microsoft/suse-sles-15-sp2-chost-byos-v20210304
+ chost:microsoft/suse-sles-15-sp2-chost-byos-v20210405
+ chost:microsoft/suse-sles-15-sp2-chost-byos-v20210506
+ chost:microsoft/suse-sles-15-sp2-chost-byos-v20210610
+ chost:microsoft/suse-sles-15-sp2-chost-byos-v20210722
+ chost:microsoft/suse-sles-15-sp2-chost-byos-v20210913
+ chost:microsoft/suse-sles-15-sp2-chost-byos-v20211025
+ chost:microsoft/suse-sles-15-sp2-chost-byos-v20220126
+ chost:microsoft/suse-sles-15-sp2-chost-byos-v20220718-x86_64
+ chost:microsoft/suse-sles-15-sp3-chost-byos-v20210729
+ chost:microsoft/suse-sles-15-sp3-chost-byos-v20210827
+ chost:microsoft/suse-sles-15-sp3-chost-byos-v20210927
+ chost:microsoft/suse-sles-15-sp3-chost-byos-v20211004
+ chost:microsoft/suse-sles-15-sp3-chost-byos-v20211101
+ chost:microsoft/suse-sles-15-sp3-chost-byos-v20211202
+ chost:microsoft/suse-sles-15-sp3-chost-byos-v20220103
+ chost:microsoft/suse-sles-15-sp3-chost-byos-v20220126
+ chost:microsoft/suse-sles-15-sp3-chost-byos-v20220222
+ chost:microsoft/suse-sles-15-sp3-chost-byos-v20220310
+ chost:microsoft/suse-sles-15-sp3-chost-byos-v20220411-x86_64
+ chost:microsoft/suse-sles-15-sp3-chost-byos-v20220510-x86_64
+ chost:microsoft/suse-sles-15-sp3-chost-byos-v20220609-x86_64
+ chost:microsoft/suse-sles-15-sp3-chost-byos-v20220708-x86_64
+ chost:microsoft/suse-sles-15-sp3-chost-byos-v20220718-x86_64
+ chost:microsoft/suse-sles-15-sp3-chost-byos-v20220818-x86_64
+ chost:microsoft/suse-sles-15-sp3-chost-byos-v20220916-x86_64
+ chost:microsoft/suse-sles-15-sp3-chost-byos-v20220921-x86_64
+ chost:microsoft/suse-sles-15-sp3-chost-byos-v20221019-x86_64
+ chost:microsoft/suse-sles-15-sp3-chost-byos-v20221119-x86_64
+ chost:microsoft/suse-sles-15-sp3-chost-byos-v20221215-x86_64
+ chost:microsoft/suse-sles-15-sp3-chost-byos-v20230313-x86_64
+ chost:microsoft/suse-sles-15-sp3-chost-byos-v20230613-x86_64
+ chost:microsoft/suse-sles-15-sp3-chost-byos-v20240807-x86_64
+ chost:microsoft/suse-sles-15-sp3-chost-byos-v20240912-x86_64
+ chost:microsoft/suse-sles-15-sp4-chost-byos-v20220718-x86_64
+ chost:microsoft/suse-sles-15-sp4-chost-byos-v20220721-x86_64
+ chost:microsoft/suse-sles-15-sp4-chost-byos-v20220819-x86_64
+ chost:microsoft/suse-sles-15-sp4-chost-byos-v20220916-x86_64
+ chost:microsoft/suse-sles-15-sp4-chost-byos-v20220923-x86_64
+ chost:microsoft/suse-sles-15-sp4-chost-byos-v20221018-x86_64
+ chost:microsoft/suse-sles-15-sp4-chost-byos-v20221118-x86_64
+ chost:microsoft/suse-sles-15-sp4-chost-byos-v20221215-arm64
+ chost:microsoft/suse-sles-15-sp4-chost-byos-v20221215-x86_64
+ chost:microsoft/suse-sles-15-sp4-chost-byos-v20230111-arm64
+ chost:microsoft/suse-sles-15-sp4-chost-byos-v20230111-x86_64
+ chost:microsoft/suse-sles-15-sp4-chost-byos-v20230210-arm64
+ chost:microsoft/suse-sles-15-sp4-chost-byos-v20230210-x86_64
+ chost:microsoft/suse-sles-15-sp4-chost-byos-v20230310-arm64
+ chost:microsoft/suse-sles-15-sp4-chost-byos-v20230310-x86_64
+ chost:microsoft/suse-sles-15-sp4-chost-byos-v20230410-arm64
+ chost:microsoft/suse-sles-15-sp4-chost-byos-v20230410-x86_64
+ chost:microsoft/suse-sles-15-sp4-chost-byos-v20230510-arm64
+ chost:microsoft/suse-sles-15-sp4-chost-byos-v20230510-x86_64
+ chost:microsoft/suse-sles-15-sp4-chost-byos-v20230606-arm64
+ chost:microsoft/suse-sles-15-sp4-chost-byos-v20230606-x86_64
+ chost:microsoft/suse-sles-15-sp4-chost-byos-v20230704-arm64
+ chost:microsoft/suse-sles-15-sp4-chost-byos-v20230704-x86_64
+ chost:microsoft/suse-sles-15-sp4-chost-byos-v20230803-arm64
+ chost:microsoft/suse-sles-15-sp4-chost-byos-v20230803-x86_64
+ chost:microsoft/suse-sles-15-sp4-chost-byos-v20230901-arm64
+ chost:microsoft/suse-sles-15-sp4-chost-byos-v20230901-x86_64
+ chost:microsoft/suse-sles-15-sp4-chost-byos-v20230928-arm64
+ chost:microsoft/suse-sles-15-sp4-chost-byos-v20230928-x86_64
+ chost:microsoft/suse-sles-15-sp4-chost-byos-v20231027-arm64
+ chost:microsoft/suse-sles-15-sp4-chost-byos-v20231027-x86_64
+ chost:microsoft/suse-sles-15-sp4-chost-byos-v20231127-arm64
+ chost:microsoft/suse-sles-15-sp4-chost-byos-v20231127-x86_64
+ chost:microsoft/suse-sles-15-sp4-chost-byos-v20231212-arm64
+ chost:microsoft/suse-sles-15-sp4-chost-byos-v20231212-x86_64
+ chost:microsoft/suse-sles-15-sp4-chost-byos-v20240312-arm64
+ chost:microsoft/suse-sles-15-sp4-chost-byos-v20240312-x86_64
+ chost:microsoft/suse-sles-15-sp4-chost-byos-v20240612-arm64
+ chost:microsoft/suse-sles-15-sp4-chost-byos-v20240612-x86_64
+ chost:microsoft/suse-sles-15-sp4-chost-byos-v20240809-arm64
+ chost:microsoft/suse-sles-15-sp4-chost-byos-v20240809-x86_64
+ chost:microsoft/suse-sles-15-sp4-chost-byos-v20240912-arm64
+ chost:microsoft/suse-sles-15-sp4-chost-byos-v20240912-x86_64
+
skipping CVE-2024-46852 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-46851 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-46850 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-46849 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-46848 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-46847 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-46846 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-46845 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-46844 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-46843 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-46842 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-46841 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-46840 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-46839 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-46838 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-46837 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-46836 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-46835 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-46834 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-46833 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-46832 as CVE page is older than CVRF-CVE file.
--- /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2024-46831.xml 2024-10-19 01:11:41.236926000 +0200
+++ /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2024-46831.xml.new 2024-10-29 01:12:33.825242000 +0100
@@ -14,13 +14,13 @@
1
- 6
- 2024-10-18T23:11:40Z
+ 7
+ 2024-10-29T00:12:33Z
current
2024-09-27T23:10:35Z
- 2024-10-18T23:11:40Z
+ 2024-10-29T00:12:33Z
cve-database/bin/generate-cvrf-cve.pl
2020-12-27T01:00:00Z
@@ -835,24 +835,9 @@
kernel-default as a component of SUSE Linux Enterprise Server for SAP Applications 12 SP5
-
- kernel-default-base as a component of SUSE Linux Enterprise Server for SAP Applications 12 SP5
-
-
- kernel-default-devel as a component of SUSE Linux Enterprise Server for SAP Applications 12 SP5
-
-
- kernel-devel as a component of SUSE Linux Enterprise Server for SAP Applications 12 SP5
-
-
- kernel-macros as a component of SUSE Linux Enterprise Server for SAP Applications 12 SP5
-
kernel-source as a component of SUSE Linux Enterprise Server for SAP Applications 12 SP5
-
- kernel-devel-azure as a component of SUSE Linux Enterprise Server for SAP Applications 12 SP5
-
kernel-source-azure as a component of SUSE Linux Enterprise Server for SAP Applications 12 SP5
@@ -1251,11 +1236,6 @@
SUSE Linux Enterprise Server Teradata 15 SP4:kernel-source
SUSE Linux Enterprise Server Teradata 15 SP4:kernel-source-azure
SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default
- SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base
- SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel
- SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel
- SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure
- SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros
SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source
SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure
SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default
--- /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2024-46830.xml 2024-10-22 01:13:07.188759000 +0200
+++ /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2024-46830.xml.new 2024-10-29 01:12:35.186314000 +0100
@@ -14,13 +14,13 @@
1
- 12
- 2024-10-21T23:13:06Z
+ 13
+ 2024-10-29T00:12:34Z
current
2024-09-27T23:10:35Z
- 2024-10-21T23:13:06Z
+ 2024-10-29T00:12:34Z
cve-database/bin/generate-cvrf-cve.pl
2020-12-27T01:00:00Z
@@ -191,16 +191,6 @@
SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS
-
-
- SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS
-
-
-
-
- SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS
-
-
SUSE Linux Enterprise Module for Basesystem 15 SP5
@@ -241,11 +231,6 @@
SUSE Linux Enterprise Live Patching 15 SP3
-
-
- SUSE Linux Enterprise Live Patching 15 SP4
-
-
SUSE Linux Enterprise Live Patching 15 SP5
@@ -271,16 +256,6 @@
SUSE Linux Enterprise Micro 5.2
-
-
- SUSE Linux Enterprise Micro 5.3
-
-
-
-
- SUSE Linux Enterprise Micro 5.4
-
-
SUSE Linux Enterprise Micro 5.5
@@ -347,11 +322,6 @@
SUSE Linux Enterprise Server 15 SP3-LTSS
-
-
- SUSE Linux Enterprise Server 15 SP4-LTSS
-
-
SUSE Linux Enterprise Module for Basesystem 15 SP5
@@ -395,11 +365,6 @@
SUSE Linux Enterprise Server Teradata 12 SP3-LTSS
-
-
- SUSE Linux Enterprise Server Teradata 15 SP4
-
-
SUSE Linux Enterprise Server for SAP Applications 12 SP5
@@ -421,11 +386,6 @@
SUSE Linux Enterprise Server for SAP Applications 15 SP3
-
-
- SUSE Linux Enterprise Server for SAP Applications 15 SP4
-
-
SUSE Linux Enterprise Module for Basesystem 15 SP5
@@ -454,21 +414,6 @@
SUSE Linux Enterprise Module for Public Cloud 15 SP6
-
-
- SUSE Manager Proxy 4.3
-
-
-
-
- SUSE Manager Retail Branch Server 4.3
-
-
-
-
- SUSE Manager Server 4.3
-
-
openSUSE Leap 15.5
@@ -1664,42 +1609,6 @@
kernel-source as a component of SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS
-
- kernel-default as a component of SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS
-
-
- kernel-default-devel as a component of SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS
-
-
- reiserfs-kmp-default as a component of SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS
-
-
- kernel-devel as a component of SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS
-
-
- kernel-macros as a component of SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS
-
-
- kernel-source as a component of SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS
-
-
- kernel-default as a component of SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS
-
-
- kernel-default-devel as a component of SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS
-
-
- reiserfs-kmp-default as a component of SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS
-
-
- kernel-devel as a component of SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS
-
-
- kernel-macros as a component of SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS
-
-
- kernel-source as a component of SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS
-
kernel-default-kgraft as a component of SUSE Linux Enterprise Live Patching 12 SP5
@@ -1736,18 +1645,6 @@
kernel-source as a component of SUSE Linux Enterprise Live Patching 15 SP3
-
- kernel-default-livepatch as a component of SUSE Linux Enterprise Live Patching 15 SP4
-
-
- kernel-default-livepatch-devel as a component of SUSE Linux Enterprise Live Patching 15 SP4
-
-
- kernel-default as a component of SUSE Linux Enterprise Live Patching 15 SP4
-
-
- kernel-source as a component of SUSE Linux Enterprise Live Patching 15 SP4
-
kernel-default-livepatch as a component of SUSE Linux Enterprise Live Patching 15 SP6
@@ -1787,30 +1684,6 @@
kernel-source-rt as a component of SUSE Linux Enterprise Micro 5.2
-
- kernel-default as a component of SUSE Linux Enterprise Micro 5.3
-
-
- kernel-rt as a component of SUSE Linux Enterprise Micro 5.3
-
-
- kernel-source as a component of SUSE Linux Enterprise Micro 5.3
-
-
- kernel-source-rt as a component of SUSE Linux Enterprise Micro 5.3
-
-
- kernel-default as a component of SUSE Linux Enterprise Micro 5.4
-
-
- kernel-rt as a component of SUSE Linux Enterprise Micro 5.4
-
-
- kernel-source as a component of SUSE Linux Enterprise Micro 5.4
-
-
- kernel-source-rt as a component of SUSE Linux Enterprise Micro 5.4
-
kernel-default as a component of SUSE Linux Enterprise Micro 5.5
@@ -2015,24 +1888,6 @@
kernel-source as a component of SUSE Linux Enterprise Server 15 SP3-LTSS
-
- kernel-default as a component of SUSE Linux Enterprise Server 15 SP4-LTSS
-
-
- kernel-default-devel as a component of SUSE Linux Enterprise Server 15 SP4-LTSS
-
-
- reiserfs-kmp-default as a component of SUSE Linux Enterprise Server 15 SP4-LTSS
-
-
- kernel-devel as a component of SUSE Linux Enterprise Server 15 SP4-LTSS
-
-
- kernel-macros as a component of SUSE Linux Enterprise Server 15 SP4-LTSS
-
-
- kernel-source as a component of SUSE Linux Enterprise Server 15 SP4-LTSS
-
kernel-default as a component of SUSE Linux Enterprise Server 15-LTSS
@@ -2069,12 +1924,6 @@
kernel-source as a component of SUSE Linux Enterprise Server Teradata 12 SP3-LTSS
-
- kernel-default as a component of SUSE Linux Enterprise Server Teradata 15 SP4
-
-
- kernel-source as a component of SUSE Linux Enterprise Server Teradata 15 SP4
-
kernel-default as a component of SUSE Linux Enterprise Server for SAP Applications 12 SP5
@@ -2120,24 +1969,6 @@
kernel-source as a component of SUSE Linux Enterprise Server for SAP Applications 15 SP3
-
- kernel-default as a component of SUSE Linux Enterprise Server for SAP Applications 15 SP4
-
-
- kernel-default-devel as a component of SUSE Linux Enterprise Server for SAP Applications 15 SP4
-
-
- reiserfs-kmp-default as a component of SUSE Linux Enterprise Server for SAP Applications 15 SP4
-
-
- kernel-devel as a component of SUSE Linux Enterprise Server for SAP Applications 15 SP4
-
-
- kernel-macros as a component of SUSE Linux Enterprise Server for SAP Applications 15 SP4
-
-
- kernel-source as a component of SUSE Linux Enterprise Server for SAP Applications 15 SP4
-
kernel-default as a component of SUSE Linux Enterprise Software Development Kit 12 SP5
@@ -2153,51 +1984,6 @@
kernel-source as a component of SUSE Linux Enterprise Workstation Extension 12 SP5
-
- kernel-default as a component of SUSE Manager Proxy 4.3
-
-
- kernel-default-devel as a component of SUSE Manager Proxy 4.3
-
-
- kernel-devel as a component of SUSE Manager Proxy 4.3
-
-
- kernel-macros as a component of SUSE Manager Proxy 4.3
-
-
- kernel-source as a component of SUSE Manager Proxy 4.3
-
-
- kernel-default as a component of SUSE Manager Retail Branch Server 4.3
-
-
- kernel-default-devel as a component of SUSE Manager Retail Branch Server 4.3
-
-
- kernel-devel as a component of SUSE Manager Retail Branch Server 4.3
-
-
- kernel-macros as a component of SUSE Manager Retail Branch Server 4.3
-
-
- kernel-source as a component of SUSE Manager Retail Branch Server 4.3
-
-
- kernel-default as a component of SUSE Manager Server 4.3
-
-
- kernel-default-devel as a component of SUSE Manager Server 4.3
-
-
- kernel-devel as a component of SUSE Manager Server 4.3
-
-
- kernel-macros as a component of SUSE Manager Server 4.3
-
-
- kernel-source as a component of SUSE Manager Server 4.3
-
cluster-md-kmp-default as a component of openSUSE Leap 15.6
notsure where SUSE Linux Enterprise Module for Confidential Computing Technical Preview 15 SP6 is contained?
no cpe found for SUSE Linux Enterprise Module for Confidential Computing Technical Preview 15 SP6 in CVE-2024-46822
skipping CVE-2024-46829 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-46828 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-46827 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-46826 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-46825 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-46824 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-46823 as CVE page is older than CVRF-CVE file.
--- /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2024-46822.xml 2024-10-16 01:11:17.399849000 +0200
+++ /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2024-46822.xml.new 2024-10-29 01:12:36.595131000 +0100
@@ -14,13 +14,13 @@
1
- 12
- 2024-10-15T23:11:16Z
+ 13
+ 2024-10-29T00:12:35Z
current
2024-09-27T23:10:38Z
- 2024-10-15T23:11:16Z
+ 2024-10-29T00:12:35Z
cve-database/bin/generate-cvrf-cve.pl
2020-12-27T01:00:00Z
@@ -116,6 +116,21 @@
Container suse/sle-micro/rt-5.5:2.0.4-4.5.211
+
+
+ Image SLES12-SP5-GCE-BYOS
+
+
+
+
+ Image SLES12-SP5-GCE-SAP-BYOS
+
+
+
+
+ Image SLES12-SP5-GCE-SAP-On-Demand
+
+
Image SLES15-SP5-CHOST-BYOS-Aliyun
@@ -1583,6 +1598,39 @@
kernel-rt-5.14.21-150500.13.73.1 as a component of Container suse/sle-micro/rt-5.5:2.0.4-4.5.211
+
+ kernel-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-BYOS
+
+
+ cluster-md-kmp-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ dlm-kmp-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ gfs2-kmp-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ kernel-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ ocfs2-kmp-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ cluster-md-kmp-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
+
+ dlm-kmp-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
+
+ gfs2-kmp-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
+
+ kernel-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
+
+ ocfs2-kmp-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
kernel-default-5.14.21-150500.55.83.1 as a component of Image SLES15-SP5-CHOST-BYOS-Aliyun
@@ -3136,6 +3184,17 @@
Container suse/hpc/warewulf4-x86_64/sle-hpc-node:15.6.17.5.49:kernel-default-6.4.0-150600.23.25.1
Container suse/sle-micro/kvm-5.5:2.0.4-3.5.197:kernel-default-base-5.14.21-150500.55.83.1.150500.6.37.1
Container suse/sle-micro/rt-5.5:2.0.4-4.5.211:kernel-rt-5.14.21-150500.13.73.1
+ Image SLES12-SP5-GCE-BYOS:kernel-default-4.12.14-122.231.1
+ Image SLES12-SP5-GCE-SAP-BYOS:cluster-md-kmp-default-4.12.14-122.231.1
+ Image SLES12-SP5-GCE-SAP-BYOS:dlm-kmp-default-4.12.14-122.231.1
+ Image SLES12-SP5-GCE-SAP-BYOS:gfs2-kmp-default-4.12.14-122.231.1
+ Image SLES12-SP5-GCE-SAP-BYOS:kernel-default-4.12.14-122.231.1
+ Image SLES12-SP5-GCE-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.231.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:cluster-md-kmp-default-4.12.14-122.231.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:dlm-kmp-default-4.12.14-122.231.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:gfs2-kmp-default-4.12.14-122.231.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:kernel-default-4.12.14-122.231.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:ocfs2-kmp-default-4.12.14-122.231.1
Image SLES15-SP5-CHOST-BYOS-Aliyun:kernel-default-5.14.21-150500.55.83.1
Image SLES15-SP5-CHOST-BYOS-Azure:kernel-default-5.14.21-150500.55.83.1
Image SLES15-SP5-CHOST-BYOS-EC2:kernel-default-5.14.21-150500.55.83.1
--- /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2024-46821.xml 2024-10-22 01:13:14.292938000 +0200
+++ /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2024-46821.xml.new 2024-10-29 01:12:37.847143000 +0100
@@ -14,13 +14,13 @@
1
- 9
- 2024-10-21T23:13:13Z
+ 10
+ 2024-10-29T00:12:36Z
current
2024-09-27T23:10:38Z
- 2024-10-21T23:13:13Z
+ 2024-10-29T00:12:36Z
cve-database/bin/generate-cvrf-cve.pl
2020-12-27T01:00:00Z
@@ -76,21 +76,6 @@
SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS
-
-
- SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS
-
-
-
-
- SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS
-
-
-
-
- SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS
-
-
SUSE Linux Enterprise Module for Basesystem 15 SP5
@@ -123,16 +108,6 @@
SUSE Linux Enterprise Live Patching 15 SP2
-
-
- SUSE Linux Enterprise Live Patching 15 SP3
-
-
-
-
- SUSE Linux Enterprise Live Patching 15 SP4
-
-
SUSE Linux Enterprise Live Patching 15 SP5
@@ -148,26 +123,6 @@
SUSE Linux Enterprise Micro 5.0
-
-
- SUSE Linux Enterprise Micro 5.1
-
-
-
-
- SUSE Linux Enterprise Micro 5.2
-
-
-
-
- SUSE Linux Enterprise Micro 5.3
-
-
-
-
- SUSE Linux Enterprise Micro 5.4
-
-
SUSE Linux Enterprise Micro 5.5
@@ -229,16 +184,6 @@
SUSE Linux Enterprise Server 15 SP2-LTSS
-
-
- SUSE Linux Enterprise Server 15 SP3-LTSS
-
-
-
-
- SUSE Linux Enterprise Server 15 SP4-LTSS
-
-
SUSE Linux Enterprise Module for Basesystem 15 SP5
@@ -276,11 +221,6 @@
SUSE Linux Enterprise Server Teradata 12 SP3-LTSS
-
-
- SUSE Linux Enterprise Server Teradata 15 SP4
-
-
SUSE Linux Enterprise Server for SAP Applications 12 SP5
@@ -297,16 +237,6 @@
SUSE Linux Enterprise Server for SAP Applications 15 SP2
-
-
- SUSE Linux Enterprise Server for SAP Applications 15 SP3
-
-
-
-
- SUSE Linux Enterprise Server for SAP Applications 15 SP4
-
-
SUSE Linux Enterprise Module for Basesystem 15 SP5
@@ -329,21 +259,6 @@
SUSE Linux Enterprise Module for Public Cloud 15 SP6
-
-
- SUSE Manager Proxy 4.3
-
-
-
-
- SUSE Manager Retail Branch Server 4.3
-
-
-
-
- SUSE Manager Server 4.3
-
-
openSUSE Leap 15.5
@@ -408,9 +323,6 @@
kernel-macros
-
- kernel-rt
-
kernel-source
@@ -474,60 +386,6 @@
kernel-source as a component of SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS
-
- kernel-default as a component of SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS
-
-
- kernel-default-devel as a component of SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS
-
-
- reiserfs-kmp-default as a component of SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS
-
-
- kernel-devel as a component of SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS
-
-
- kernel-macros as a component of SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS
-
-
- kernel-source as a component of SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS
-
-
- kernel-default as a component of SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS
-
-
- kernel-default-devel as a component of SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS
-
-
- reiserfs-kmp-default as a component of SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS
-
-
- kernel-devel as a component of SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS
-
-
- kernel-macros as a component of SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS
-
-
- kernel-source as a component of SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS
-
-
- kernel-default as a component of SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS
-
-
- kernel-default-devel as a component of SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS
-
-
- reiserfs-kmp-default as a component of SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS
-
-
- kernel-devel as a component of SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS
-
-
- kernel-macros as a component of SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS
-
-
- kernel-source as a component of SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS
-
kernel-default-kgraft as a component of SUSE Linux Enterprise Live Patching 12 SP5
@@ -552,30 +410,6 @@
kernel-source as a component of SUSE Linux Enterprise Live Patching 15 SP2
-
- kernel-default-livepatch as a component of SUSE Linux Enterprise Live Patching 15 SP3
-
-
- kernel-default-livepatch-devel as a component of SUSE Linux Enterprise Live Patching 15 SP3
-
-
- kernel-default as a component of SUSE Linux Enterprise Live Patching 15 SP3
-
-
- kernel-source as a component of SUSE Linux Enterprise Live Patching 15 SP3
-
-
- kernel-default-livepatch as a component of SUSE Linux Enterprise Live Patching 15 SP4
-
-
- kernel-default-livepatch-devel as a component of SUSE Linux Enterprise Live Patching 15 SP4
-
-
- kernel-default as a component of SUSE Linux Enterprise Live Patching 15 SP4
-
-
- kernel-source as a component of SUSE Linux Enterprise Live Patching 15 SP4
-
kernel-default-livepatch as a component of SUSE Linux Enterprise Live Patching 15 SP5
@@ -603,54 +437,6 @@
kernel-default as a component of SUSE Linux Enterprise Micro 5.0
-
- kernel-default as a component of SUSE Linux Enterprise Micro 5.1
-
-
- kernel-rt as a component of SUSE Linux Enterprise Micro 5.1
-
-
- kernel-source as a component of SUSE Linux Enterprise Micro 5.1
-
-
- kernel-source-rt as a component of SUSE Linux Enterprise Micro 5.1
-
-
- kernel-default as a component of SUSE Linux Enterprise Micro 5.2
-
-
- kernel-rt as a component of SUSE Linux Enterprise Micro 5.2
-
-
- kernel-source as a component of SUSE Linux Enterprise Micro 5.2
-
-
- kernel-source-rt as a component of SUSE Linux Enterprise Micro 5.2
-
-
- kernel-default as a component of SUSE Linux Enterprise Micro 5.3
-
-
- kernel-rt as a component of SUSE Linux Enterprise Micro 5.3
-
-
- kernel-source as a component of SUSE Linux Enterprise Micro 5.3
-
-
- kernel-source-rt as a component of SUSE Linux Enterprise Micro 5.3
-
-
- kernel-default as a component of SUSE Linux Enterprise Micro 5.4
-
-
- kernel-rt as a component of SUSE Linux Enterprise Micro 5.4
-
-
- kernel-source as a component of SUSE Linux Enterprise Micro 5.4
-
-
- kernel-source-rt as a component of SUSE Linux Enterprise Micro 5.4
-
kernel-default as a component of SUSE Linux Enterprise Micro 5.5
@@ -867,42 +653,6 @@
kernel-source as a component of SUSE Linux Enterprise Server 15 SP2-LTSS
-
- kernel-default as a component of SUSE Linux Enterprise Server 15 SP3-LTSS
-
-
- kernel-default-devel as a component of SUSE Linux Enterprise Server 15 SP3-LTSS
-
-
- reiserfs-kmp-default as a component of SUSE Linux Enterprise Server 15 SP3-LTSS
-
-
- kernel-devel as a component of SUSE Linux Enterprise Server 15 SP3-LTSS
-
-
- kernel-macros as a component of SUSE Linux Enterprise Server 15 SP3-LTSS
-
-
- kernel-source as a component of SUSE Linux Enterprise Server 15 SP3-LTSS
-
-
- kernel-default as a component of SUSE Linux Enterprise Server 15 SP4-LTSS
-
-
- kernel-default-devel as a component of SUSE Linux Enterprise Server 15 SP4-LTSS
-
-
- reiserfs-kmp-default as a component of SUSE Linux Enterprise Server 15 SP4-LTSS
-
-
- kernel-devel as a component of SUSE Linux Enterprise Server 15 SP4-LTSS
-
-
- kernel-macros as a component of SUSE Linux Enterprise Server 15 SP4-LTSS
-
-
- kernel-source as a component of SUSE Linux Enterprise Server 15 SP4-LTSS
-
kernel-default as a component of SUSE Linux Enterprise Server 15-LTSS
@@ -939,12 +689,6 @@
kernel-source as a component of SUSE Linux Enterprise Server Teradata 12 SP3-LTSS
-
- kernel-default as a component of SUSE Linux Enterprise Server Teradata 15 SP4
-
-
- kernel-source as a component of SUSE Linux Enterprise Server Teradata 15 SP4
-
kernel-default as a component of SUSE Linux Enterprise Server for SAP Applications 12 SP5
@@ -972,42 +716,6 @@
kernel-source as a component of SUSE Linux Enterprise Server for SAP Applications 15 SP2
-
- kernel-default as a component of SUSE Linux Enterprise Server for SAP Applications 15 SP3
-
-
- kernel-default-devel as a component of SUSE Linux Enterprise Server for SAP Applications 15 SP3
-
-
- reiserfs-kmp-default as a component of SUSE Linux Enterprise Server for SAP Applications 15 SP3
-
-
- kernel-devel as a component of SUSE Linux Enterprise Server for SAP Applications 15 SP3
-
-
- kernel-macros as a component of SUSE Linux Enterprise Server for SAP Applications 15 SP3
-
-
- kernel-source as a component of SUSE Linux Enterprise Server for SAP Applications 15 SP3
-
-
- kernel-default as a component of SUSE Linux Enterprise Server for SAP Applications 15 SP4
-
-
- kernel-default-devel as a component of SUSE Linux Enterprise Server for SAP Applications 15 SP4
-
-
- reiserfs-kmp-default as a component of SUSE Linux Enterprise Server for SAP Applications 15 SP4
-
-
- kernel-devel as a component of SUSE Linux Enterprise Server for SAP Applications 15 SP4
-
-
- kernel-macros as a component of SUSE Linux Enterprise Server for SAP Applications 15 SP4
-
-
- kernel-source as a component of SUSE Linux Enterprise Server for SAP Applications 15 SP4
-
kernel-default as a component of SUSE Linux Enterprise Software Development Kit 12 SP5
@@ -1023,51 +731,6 @@
kernel-source as a component of SUSE Linux Enterprise Workstation Extension 12 SP5
-
- kernel-default as a component of SUSE Manager Proxy 4.3
-
-
- kernel-default-devel as a component of SUSE Manager Proxy 4.3
-
-
- kernel-devel as a component of SUSE Manager Proxy 4.3
-
-
- kernel-macros as a component of SUSE Manager Proxy 4.3
-
-
- kernel-source as a component of SUSE Manager Proxy 4.3
-
-
- kernel-default as a component of SUSE Manager Retail Branch Server 4.3
-
-
- kernel-default-devel as a component of SUSE Manager Retail Branch Server 4.3
-
-
- kernel-devel as a component of SUSE Manager Retail Branch Server 4.3
-
-
- kernel-macros as a component of SUSE Manager Retail Branch Server 4.3
-
-
- kernel-source as a component of SUSE Manager Retail Branch Server 4.3
-
-
- kernel-default as a component of SUSE Manager Server 4.3
-
-
- kernel-default-devel as a component of SUSE Manager Server 4.3
-
-
- kernel-devel as a component of SUSE Manager Server 4.3
-
-
- kernel-macros as a component of SUSE Manager Server 4.3
-
-
- kernel-source as a component of SUSE Manager Server 4.3
-
kernel-devel-rt as a component of SUSE Real Time Module 15 SP5
skipping CVE-2024-46820 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-46819 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-46818 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-46817 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-46816 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-46815 as CVE page is older than CVRF-CVE file.
--- /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2024-46812.xml 2024-10-22 01:13:21.694008000 +0200
+++ /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2024-46812.xml.new 2024-10-29 01:12:39.390022000 +0100
@@ -14,13 +14,13 @@
1
- 9
- 2024-10-21T23:13:21Z
+ 10
+ 2024-10-29T00:12:39Z
current
2024-09-27T23:10:40Z
- 2024-10-21T23:13:21Z
+ 2024-10-29T00:12:39Z
cve-database/bin/generate-cvrf-cve.pl
2020-12-27T01:00:00Z
@@ -77,21 +77,6 @@
SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS
-
-
- SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS
-
-
-
-
- SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS
-
-
-
-
- SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS
-
-
SUSE Linux Enterprise Module for Basesystem 15 SP5
@@ -124,16 +109,6 @@
SUSE Linux Enterprise Live Patching 15 SP2
-
-
- SUSE Linux Enterprise Live Patching 15 SP3
-
-
-
-
- SUSE Linux Enterprise Live Patching 15 SP4
-
-
SUSE Linux Enterprise Live Patching 15 SP5
@@ -149,26 +124,6 @@
SUSE Linux Enterprise Micro 5.0
-
-
- SUSE Linux Enterprise Micro 5.1
-
-
-
-
- SUSE Linux Enterprise Micro 5.2
-
-
-
-
- SUSE Linux Enterprise Micro 5.3
-
-
-
-
- SUSE Linux Enterprise Micro 5.4
-
-
SUSE Linux Enterprise Micro 5.5
@@ -230,16 +185,6 @@
SUSE Linux Enterprise Server 15 SP2-LTSS
-
-
- SUSE Linux Enterprise Server 15 SP3-LTSS
-
-
-
-
- SUSE Linux Enterprise Server 15 SP4-LTSS
-
-
SUSE Linux Enterprise Module for Basesystem 15 SP5
@@ -277,11 +222,6 @@
SUSE Linux Enterprise Server Teradata 12 SP3-LTSS
-
-
- SUSE Linux Enterprise Server Teradata 15 SP4
-
-
SUSE Linux Enterprise Server for SAP Applications 12 SP5
@@ -298,16 +238,6 @@
SUSE Linux Enterprise Server for SAP Applications 15 SP2
-
-
- SUSE Linux Enterprise Server for SAP Applications 15 SP3
-
-
-
-
- SUSE Linux Enterprise Server for SAP Applications 15 SP4
-
-
SUSE Linux Enterprise Module for Basesystem 15 SP5
@@ -330,21 +260,6 @@
SUSE Linux Enterprise Module for Public Cloud 15 SP6
-
-
- SUSE Manager Proxy 4.3
-
-
-
-
- SUSE Manager Retail Branch Server 4.3
-
-
-
-
- SUSE Manager Server 4.3
-
-
openSUSE Leap 15.5
@@ -409,9 +324,6 @@
kernel-macros
-
- kernel-rt
-
kernel-source
@@ -475,60 +387,6 @@
kernel-source as a component of SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS
-
- kernel-default as a component of SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS
-
-
- kernel-default-devel as a component of SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS
-
-
- reiserfs-kmp-default as a component of SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS
-
-
- kernel-devel as a component of SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS
-
-
- kernel-macros as a component of SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS
-
-
- kernel-source as a component of SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS
-
-
- kernel-default as a component of SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS
-
-
- kernel-default-devel as a component of SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS
-
-
- reiserfs-kmp-default as a component of SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS
-
-
- kernel-devel as a component of SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS
-
-
- kernel-macros as a component of SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS
-
-
- kernel-source as a component of SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS
-
-
- kernel-default as a component of SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS
-
-
- kernel-default-devel as a component of SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS
-
-
- reiserfs-kmp-default as a component of SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS
-
-
- kernel-devel as a component of SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS
-
-
- kernel-macros as a component of SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS
-
-
- kernel-source as a component of SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS
-
kernel-default-kgraft as a component of SUSE Linux Enterprise Live Patching 12 SP5
@@ -553,30 +411,6 @@
kernel-source as a component of SUSE Linux Enterprise Live Patching 15 SP2
-
- kernel-default-livepatch as a component of SUSE Linux Enterprise Live Patching 15 SP3
-
-
- kernel-default-livepatch-devel as a component of SUSE Linux Enterprise Live Patching 15 SP3
-
-
- kernel-default as a component of SUSE Linux Enterprise Live Patching 15 SP3
-
-
- kernel-source as a component of SUSE Linux Enterprise Live Patching 15 SP3
-
-
- kernel-default-livepatch as a component of SUSE Linux Enterprise Live Patching 15 SP4
-
-
- kernel-default-livepatch-devel as a component of SUSE Linux Enterprise Live Patching 15 SP4
-
-
- kernel-default as a component of SUSE Linux Enterprise Live Patching 15 SP4
-
-
- kernel-source as a component of SUSE Linux Enterprise Live Patching 15 SP4
-
kernel-default-livepatch as a component of SUSE Linux Enterprise Live Patching 15 SP5
@@ -604,54 +438,6 @@
kernel-default as a component of SUSE Linux Enterprise Micro 5.0
-
- kernel-default as a component of SUSE Linux Enterprise Micro 5.1
-
-
- kernel-rt as a component of SUSE Linux Enterprise Micro 5.1
-
-
- kernel-source as a component of SUSE Linux Enterprise Micro 5.1
-
-
- kernel-source-rt as a component of SUSE Linux Enterprise Micro 5.1
-
-
- kernel-default as a component of SUSE Linux Enterprise Micro 5.2
-
-
- kernel-rt as a component of SUSE Linux Enterprise Micro 5.2
-
-
- kernel-source as a component of SUSE Linux Enterprise Micro 5.2
-
-
- kernel-source-rt as a component of SUSE Linux Enterprise Micro 5.2
-
-
- kernel-default as a component of SUSE Linux Enterprise Micro 5.3
-
-
- kernel-rt as a component of SUSE Linux Enterprise Micro 5.3
-
-
- kernel-source as a component of SUSE Linux Enterprise Micro 5.3
-
-
- kernel-source-rt as a component of SUSE Linux Enterprise Micro 5.3
-
-
- kernel-default as a component of SUSE Linux Enterprise Micro 5.4
-
-
- kernel-rt as a component of SUSE Linux Enterprise Micro 5.4
-
-
- kernel-source as a component of SUSE Linux Enterprise Micro 5.4
-
-
- kernel-source-rt as a component of SUSE Linux Enterprise Micro 5.4
-
kernel-default as a component of SUSE Linux Enterprise Micro 5.5
@@ -868,42 +654,6 @@
kernel-source as a component of SUSE Linux Enterprise Server 15 SP2-LTSS
-
- kernel-default as a component of SUSE Linux Enterprise Server 15 SP3-LTSS
-
-
- kernel-default-devel as a component of SUSE Linux Enterprise Server 15 SP3-LTSS
-
-
- reiserfs-kmp-default as a component of SUSE Linux Enterprise Server 15 SP3-LTSS
-
-
- kernel-devel as a component of SUSE Linux Enterprise Server 15 SP3-LTSS
-
-
- kernel-macros as a component of SUSE Linux Enterprise Server 15 SP3-LTSS
-
-
- kernel-source as a component of SUSE Linux Enterprise Server 15 SP3-LTSS
-
-
- kernel-default as a component of SUSE Linux Enterprise Server 15 SP4-LTSS
-
-
- kernel-default-devel as a component of SUSE Linux Enterprise Server 15 SP4-LTSS
-
-
- reiserfs-kmp-default as a component of SUSE Linux Enterprise Server 15 SP4-LTSS
-
-
- kernel-devel as a component of SUSE Linux Enterprise Server 15 SP4-LTSS
-
-
- kernel-macros as a component of SUSE Linux Enterprise Server 15 SP4-LTSS
-
-
- kernel-source as a component of SUSE Linux Enterprise Server 15 SP4-LTSS
-
kernel-default as a component of SUSE Linux Enterprise Server 15-LTSS
@@ -940,12 +690,6 @@
kernel-source as a component of SUSE Linux Enterprise Server Teradata 12 SP3-LTSS
-
- kernel-default as a component of SUSE Linux Enterprise Server Teradata 15 SP4
-
-
- kernel-source as a component of SUSE Linux Enterprise Server Teradata 15 SP4
-
kernel-default as a component of SUSE Linux Enterprise Server for SAP Applications 12 SP5
@@ -973,42 +717,6 @@
kernel-source as a component of SUSE Linux Enterprise Server for SAP Applications 15 SP2
-
- kernel-default as a component of SUSE Linux Enterprise Server for SAP Applications 15 SP3
-
-
- kernel-default-devel as a component of SUSE Linux Enterprise Server for SAP Applications 15 SP3
-
-
- reiserfs-kmp-default as a component of SUSE Linux Enterprise Server for SAP Applications 15 SP3
-
-
- kernel-devel as a component of SUSE Linux Enterprise Server for SAP Applications 15 SP3
-
-
- kernel-macros as a component of SUSE Linux Enterprise Server for SAP Applications 15 SP3
-
-
- kernel-source as a component of SUSE Linux Enterprise Server for SAP Applications 15 SP3
-
-
- kernel-default as a component of SUSE Linux Enterprise Server for SAP Applications 15 SP4
-
-
- kernel-default-devel as a component of SUSE Linux Enterprise Server for SAP Applications 15 SP4
-
-
- reiserfs-kmp-default as a component of SUSE Linux Enterprise Server for SAP Applications 15 SP4
-
-
- kernel-devel as a component of SUSE Linux Enterprise Server for SAP Applications 15 SP4
-
-
- kernel-macros as a component of SUSE Linux Enterprise Server for SAP Applications 15 SP4
-
-
- kernel-source as a component of SUSE Linux Enterprise Server for SAP Applications 15 SP4
-
kernel-default as a component of SUSE Linux Enterprise Software Development Kit 12 SP5
@@ -1024,51 +732,6 @@
kernel-source as a component of SUSE Linux Enterprise Workstation Extension 12 SP5
-
- kernel-default as a component of SUSE Manager Proxy 4.3
-
-
- kernel-default-devel as a component of SUSE Manager Proxy 4.3
-
-
- kernel-devel as a component of SUSE Manager Proxy 4.3
-
-
- kernel-macros as a component of SUSE Manager Proxy 4.3
-
-
- kernel-source as a component of SUSE Manager Proxy 4.3
-
-
- kernel-default as a component of SUSE Manager Retail Branch Server 4.3
-
-
- kernel-default-devel as a component of SUSE Manager Retail Branch Server 4.3
-
-
- kernel-devel as a component of SUSE Manager Retail Branch Server 4.3
-
-
- kernel-macros as a component of SUSE Manager Retail Branch Server 4.3
-
-
- kernel-source as a component of SUSE Manager Retail Branch Server 4.3
-
-
- kernel-default as a component of SUSE Manager Server 4.3
-
-
- kernel-default-devel as a component of SUSE Manager Server 4.3
-
-
- kernel-devel as a component of SUSE Manager Server 4.3
-
-
- kernel-macros as a component of SUSE Manager Server 4.3
-
-
- kernel-source as a component of SUSE Manager Server 4.3
-
kernel-devel-rt as a component of SUSE Real Time Module 15 SP5
skipping CVE-2024-46810 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-46809 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-46808 as CVE page is older than CVRF-CVE file.
--- /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2024-46807.xml 2024-10-22 01:13:25.947862000 +0200
+++ /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2024-46807.xml.new 2024-10-29 01:12:40.600887000 +0100
@@ -14,13 +14,13 @@
1
- 9
- 2024-10-21T23:13:25Z
+ 10
+ 2024-10-29T00:12:40Z
current
2024-09-27T23:10:42Z
- 2024-10-21T23:13:25Z
+ 2024-10-29T00:12:40Z
cve-database/bin/generate-cvrf-cve.pl
2020-12-27T01:00:00Z
@@ -78,16 +78,6 @@
SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS
-
-
- SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS
-
-
-
-
- SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS
-
-
SUSE Linux Enterprise Module for Basesystem 15 SP5
@@ -125,11 +115,6 @@
SUSE Linux Enterprise Live Patching 15 SP3
-
-
- SUSE Linux Enterprise Live Patching 15 SP4
-
-
SUSE Linux Enterprise Live Patching 15 SP5
@@ -155,16 +140,6 @@
SUSE Linux Enterprise Micro 5.2
-
-
- SUSE Linux Enterprise Micro 5.3
-
-
-
-
- SUSE Linux Enterprise Micro 5.4
-
-
SUSE Linux Enterprise Micro 5.5
@@ -231,11 +206,6 @@
SUSE Linux Enterprise Server 15 SP3-LTSS
-
-
- SUSE Linux Enterprise Server 15 SP4-LTSS
-
-
SUSE Linux Enterprise Module for Basesystem 15 SP5
@@ -273,11 +243,6 @@
SUSE Linux Enterprise Server Teradata 12 SP3-LTSS
-
-
- SUSE Linux Enterprise Server Teradata 15 SP4
-
-
SUSE Linux Enterprise Server for SAP Applications 12 SP5
@@ -299,11 +264,6 @@
SUSE Linux Enterprise Server for SAP Applications 15 SP3
-
-
- SUSE Linux Enterprise Server for SAP Applications 15 SP4
-
-
SUSE Linux Enterprise Module for Basesystem 15 SP5
@@ -326,21 +286,6 @@
SUSE Linux Enterprise Module for Public Cloud 15 SP6
-
-
- SUSE Manager Proxy 4.3
-
-
-
-
- SUSE Manager Retail Branch Server 4.3
-
-
-
-
- SUSE Manager Server 4.3
-
-
openSUSE Leap 15.5
@@ -489,42 +434,6 @@
kernel-source as a component of SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS
-
- kernel-default as a component of SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS
-
-
- kernel-default-devel as a component of SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS
-
-
- reiserfs-kmp-default as a component of SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS
-
-
- kernel-devel as a component of SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS
-
-
- kernel-macros as a component of SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS
-
-
- kernel-source as a component of SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS
-
-
- kernel-default as a component of SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS
-
-
- kernel-default-devel as a component of SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS
-
-
- reiserfs-kmp-default as a component of SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS
-
-
- kernel-devel as a component of SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS
-
-
- kernel-macros as a component of SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS
-
-
- kernel-source as a component of SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS
-
kernel-default-kgraft as a component of SUSE Linux Enterprise Live Patching 12 SP5
@@ -561,18 +470,6 @@
kernel-source as a component of SUSE Linux Enterprise Live Patching 15 SP3
-
- kernel-default-livepatch as a component of SUSE Linux Enterprise Live Patching 15 SP4
-
-
- kernel-default-livepatch-devel as a component of SUSE Linux Enterprise Live Patching 15 SP4
-
-
- kernel-default as a component of SUSE Linux Enterprise Live Patching 15 SP4
-
-
- kernel-source as a component of SUSE Linux Enterprise Live Patching 15 SP4
-
kernel-default-livepatch as a component of SUSE Linux Enterprise Live Patching 15 SP5
@@ -624,30 +521,6 @@
kernel-source-rt as a component of SUSE Linux Enterprise Micro 5.2
-
- kernel-default as a component of SUSE Linux Enterprise Micro 5.3
-
-
- kernel-rt as a component of SUSE Linux Enterprise Micro 5.3
-
-
- kernel-source as a component of SUSE Linux Enterprise Micro 5.3
-
-
- kernel-source-rt as a component of SUSE Linux Enterprise Micro 5.3
-
-
- kernel-default as a component of SUSE Linux Enterprise Micro 5.4
-
-
- kernel-rt as a component of SUSE Linux Enterprise Micro 5.4
-
-
- kernel-source as a component of SUSE Linux Enterprise Micro 5.4
-
-
- kernel-source-rt as a component of SUSE Linux Enterprise Micro 5.4
-
kernel-default as a component of SUSE Linux Enterprise Micro 5.5
@@ -882,24 +755,6 @@
kernel-source as a component of SUSE Linux Enterprise Server 15 SP3-LTSS
-
- kernel-default as a component of SUSE Linux Enterprise Server 15 SP4-LTSS
-
-
- kernel-default-devel as a component of SUSE Linux Enterprise Server 15 SP4-LTSS
-
-
- reiserfs-kmp-default as a component of SUSE Linux Enterprise Server 15 SP4-LTSS
-
-
- kernel-devel as a component of SUSE Linux Enterprise Server 15 SP4-LTSS
-
-
- kernel-macros as a component of SUSE Linux Enterprise Server 15 SP4-LTSS
-
-
- kernel-source as a component of SUSE Linux Enterprise Server 15 SP4-LTSS
-
kernel-default as a component of SUSE Linux Enterprise Server 15-LTSS
@@ -936,12 +791,6 @@
kernel-source as a component of SUSE Linux Enterprise Server Teradata 12 SP3-LTSS
-
- kernel-default as a component of SUSE Linux Enterprise Server Teradata 15 SP4
-
-
- kernel-source as a component of SUSE Linux Enterprise Server Teradata 15 SP4
-
kernel-default as a component of SUSE Linux Enterprise Server for SAP Applications 12 SP5
@@ -987,24 +836,6 @@
kernel-source as a component of SUSE Linux Enterprise Server for SAP Applications 15 SP3
-
- kernel-default as a component of SUSE Linux Enterprise Server for SAP Applications 15 SP4
-
-
- kernel-default-devel as a component of SUSE Linux Enterprise Server for SAP Applications 15 SP4
-
-
- reiserfs-kmp-default as a component of SUSE Linux Enterprise Server for SAP Applications 15 SP4
-
-
- kernel-devel as a component of SUSE Linux Enterprise Server for SAP Applications 15 SP4
-
-
- kernel-macros as a component of SUSE Linux Enterprise Server for SAP Applications 15 SP4
-
-
- kernel-source as a component of SUSE Linux Enterprise Server for SAP Applications 15 SP4
-
kernel-default as a component of SUSE Linux Enterprise Software Development Kit 12 SP5
@@ -1020,51 +851,6 @@
kernel-source as a component of SUSE Linux Enterprise Workstation Extension 12 SP5
-
- kernel-default as a component of SUSE Manager Proxy 4.3
-
-
- kernel-default-devel as a component of SUSE Manager Proxy 4.3
-
-
- kernel-devel as a component of SUSE Manager Proxy 4.3
-
-
- kernel-macros as a component of SUSE Manager Proxy 4.3
-
-
- kernel-source as a component of SUSE Manager Proxy 4.3
-
-
- kernel-default as a component of SUSE Manager Retail Branch Server 4.3
-
-
- kernel-default-devel as a component of SUSE Manager Retail Branch Server 4.3
-
-
- kernel-devel as a component of SUSE Manager Retail Branch Server 4.3
-
-
- kernel-macros as a component of SUSE Manager Retail Branch Server 4.3
-
-
- kernel-source as a component of SUSE Manager Retail Branch Server 4.3
-
-
- kernel-default as a component of SUSE Manager Server 4.3
-
-
- kernel-default-devel as a component of SUSE Manager Server 4.3
-
-
- kernel-devel as a component of SUSE Manager Server 4.3
-
-
- kernel-macros as a component of SUSE Manager Server 4.3
-
-
- kernel-source as a component of SUSE Manager Server 4.3
-
kernel-devel-rt as a component of SUSE Real Time Module 15 SP5
skipping CVE-2024-46806 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-46805 as CVE page is older than CVRF-CVE file.
--- /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2024-46804.xml 2024-10-22 01:13:28.640160000 +0200
+++ /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2024-46804.xml.new 2024-10-29 01:12:41.331860000 +0100
@@ -14,13 +14,13 @@
1
- 9
- 2024-10-21T23:13:28Z
+ 10
+ 2024-10-29T00:12:40Z
current
2024-09-27T23:10:43Z
- 2024-10-21T23:13:28Z
+ 2024-10-29T00:12:40Z
cve-database/bin/generate-cvrf-cve.pl
2020-12-27T01:00:00Z
@@ -83,16 +83,6 @@
SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS
-
-
- SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS
-
-
-
-
- SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS
-
-
SUSE Linux Enterprise Module for Basesystem 15 SP5
@@ -130,11 +120,6 @@
SUSE Linux Enterprise Live Patching 15 SP3
-
-
- SUSE Linux Enterprise Live Patching 15 SP4
-
-
SUSE Linux Enterprise Live Patching 15 SP5
@@ -160,16 +145,6 @@
SUSE Linux Enterprise Micro 5.2
-
-
- SUSE Linux Enterprise Micro 5.3
-
-
-
-
- SUSE Linux Enterprise Micro 5.4
-
-
SUSE Linux Enterprise Micro 5.5
@@ -236,11 +211,6 @@
SUSE Linux Enterprise Server 15 SP3-LTSS
-
-
- SUSE Linux Enterprise Server 15 SP4-LTSS
-
-
SUSE Linux Enterprise Module for Basesystem 15 SP5
@@ -278,11 +248,6 @@
SUSE Linux Enterprise Server Teradata 12 SP3-LTSS
-
-
- SUSE Linux Enterprise Server Teradata 15 SP4
-
-
SUSE Linux Enterprise Server for SAP Applications 12 SP5
@@ -304,11 +269,6 @@
SUSE Linux Enterprise Server for SAP Applications 15 SP3
-
-
- SUSE Linux Enterprise Server for SAP Applications 15 SP4
-
-
SUSE Linux Enterprise Module for Basesystem 15 SP5
@@ -331,21 +291,6 @@
SUSE Linux Enterprise Module for Public Cloud 15 SP6
-
-
- SUSE Manager Proxy 4.3
-
-
-
-
- SUSE Manager Retail Branch Server 4.3
-
-
-
-
- SUSE Manager Server 4.3
-
-
openSUSE Leap 15.5
@@ -494,42 +439,6 @@
kernel-source as a component of SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS
-
- kernel-default as a component of SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS
-
-
- kernel-default-devel as a component of SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS
-
-
- reiserfs-kmp-default as a component of SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS
-
-
- kernel-devel as a component of SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS
-
-
- kernel-macros as a component of SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS
-
-
- kernel-source as a component of SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS
-
-
- kernel-default as a component of SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS
-
-
- kernel-default-devel as a component of SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS
-
-
- reiserfs-kmp-default as a component of SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS
-
-
- kernel-devel as a component of SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS
-
-
- kernel-macros as a component of SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS
-
-
- kernel-source as a component of SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS
-
kernel-default-kgraft as a component of SUSE Linux Enterprise Live Patching 12 SP5
@@ -566,18 +475,6 @@
kernel-source as a component of SUSE Linux Enterprise Live Patching 15 SP3
-
- kernel-default-livepatch as a component of SUSE Linux Enterprise Live Patching 15 SP4
-
-
- kernel-default-livepatch-devel as a component of SUSE Linux Enterprise Live Patching 15 SP4
-
-
- kernel-default as a component of SUSE Linux Enterprise Live Patching 15 SP4
-
-
- kernel-source as a component of SUSE Linux Enterprise Live Patching 15 SP4
-
kernel-default-livepatch as a component of SUSE Linux Enterprise Live Patching 15 SP5
@@ -629,30 +526,6 @@
kernel-source-rt as a component of SUSE Linux Enterprise Micro 5.2
-
- kernel-default as a component of SUSE Linux Enterprise Micro 5.3
-
-
- kernel-rt as a component of SUSE Linux Enterprise Micro 5.3
-
-
- kernel-source as a component of SUSE Linux Enterprise Micro 5.3
-
-
- kernel-source-rt as a component of SUSE Linux Enterprise Micro 5.3
-
-
- kernel-default as a component of SUSE Linux Enterprise Micro 5.4
-
-
- kernel-rt as a component of SUSE Linux Enterprise Micro 5.4
-
-
- kernel-source as a component of SUSE Linux Enterprise Micro 5.4
-
-
- kernel-source-rt as a component of SUSE Linux Enterprise Micro 5.4
-
kernel-default as a component of SUSE Linux Enterprise Micro 5.5
@@ -887,24 +760,6 @@
kernel-source as a component of SUSE Linux Enterprise Server 15 SP3-LTSS
-
- kernel-default as a component of SUSE Linux Enterprise Server 15 SP4-LTSS
-
-
- kernel-default-devel as a component of SUSE Linux Enterprise Server 15 SP4-LTSS
-
-
- reiserfs-kmp-default as a component of SUSE Linux Enterprise Server 15 SP4-LTSS
-
-
- kernel-devel as a component of SUSE Linux Enterprise Server 15 SP4-LTSS
-
-
- kernel-macros as a component of SUSE Linux Enterprise Server 15 SP4-LTSS
-
-
- kernel-source as a component of SUSE Linux Enterprise Server 15 SP4-LTSS
-
kernel-default as a component of SUSE Linux Enterprise Server 15-LTSS
@@ -941,12 +796,6 @@
kernel-source as a component of SUSE Linux Enterprise Server Teradata 12 SP3-LTSS
-
- kernel-default as a component of SUSE Linux Enterprise Server Teradata 15 SP4
-
-
- kernel-source as a component of SUSE Linux Enterprise Server Teradata 15 SP4
-
kernel-default as a component of SUSE Linux Enterprise Server for SAP Applications 12 SP5
@@ -992,24 +841,6 @@
kernel-source as a component of SUSE Linux Enterprise Server for SAP Applications 15 SP3
-
- kernel-default as a component of SUSE Linux Enterprise Server for SAP Applications 15 SP4
-
-
- kernel-default-devel as a component of SUSE Linux Enterprise Server for SAP Applications 15 SP4
-
-
- reiserfs-kmp-default as a component of SUSE Linux Enterprise Server for SAP Applications 15 SP4
-
-
- kernel-devel as a component of SUSE Linux Enterprise Server for SAP Applications 15 SP4
-
-
- kernel-macros as a component of SUSE Linux Enterprise Server for SAP Applications 15 SP4
-
-
- kernel-source as a component of SUSE Linux Enterprise Server for SAP Applications 15 SP4
-
kernel-default as a component of SUSE Linux Enterprise Software Development Kit 12 SP5
@@ -1025,51 +856,6 @@
kernel-source as a component of SUSE Linux Enterprise Workstation Extension 12 SP5
-
- kernel-default as a component of SUSE Manager Proxy 4.3
-
-
- kernel-default-devel as a component of SUSE Manager Proxy 4.3
-
-
- kernel-devel as a component of SUSE Manager Proxy 4.3
-
-
- kernel-macros as a component of SUSE Manager Proxy 4.3
-
-
- kernel-source as a component of SUSE Manager Proxy 4.3
-
-
- kernel-default as a component of SUSE Manager Retail Branch Server 4.3
-
-
- kernel-default-devel as a component of SUSE Manager Retail Branch Server 4.3
-
-
- kernel-devel as a component of SUSE Manager Retail Branch Server 4.3
-
-
- kernel-macros as a component of SUSE Manager Retail Branch Server 4.3
-
-
- kernel-source as a component of SUSE Manager Retail Branch Server 4.3
-
-
- kernel-default as a component of SUSE Manager Server 4.3
-
-
- kernel-default-devel as a component of SUSE Manager Server 4.3
-
-
- kernel-devel as a component of SUSE Manager Server 4.3
-
-
- kernel-macros as a component of SUSE Manager Server 4.3
-
-
- kernel-source as a component of SUSE Manager Server 4.3
-
kernel-devel-rt as a component of SUSE Real Time Module 15 SP5
skipping CVE-2024-46803 as CVE page is older than CVRF-CVE file.
no cpe found for SUSE Linux Enterprise Module for Confidential Computing Technical Preview 15 SP6 in CVE-2024-46787
skipping CVE-2024-46801 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-46800 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-46799 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-46798 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-46797 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-46796 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-46795 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-46794 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-46793 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-46792 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-46791 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-46790 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-46789 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-46788 as CVE page is older than CVRF-CVE file.
--- /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2024-46787.xml 2024-10-16 01:11:38.617700000 +0200
+++ /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2024-46787.xml.new 2024-10-29 01:12:42.564821000 +0100
@@ -14,13 +14,13 @@
1
- 12
- 2024-10-15T23:11:38Z
+ 13
+ 2024-10-29T00:12:41Z
current
2024-09-18T23:10:06Z
- 2024-10-15T23:11:38Z
+ 2024-10-29T00:12:41Z
cve-database/bin/generate-cvrf-cve.pl
2020-12-27T01:00:00Z
@@ -185,6 +185,21 @@
Container suse/sle-micro/rt-5.5:2.0.4-4.5.211
+
+
+ Image SLES12-SP5-GCE-BYOS
+
+
+
+
+ Image SLES12-SP5-GCE-SAP-BYOS
+
+
+
+
+ Image SLES12-SP5-GCE-SAP-On-Demand
+
+
Image SLES15-SP5-CHOST-BYOS-Aliyun
@@ -1624,6 +1639,39 @@
kernel-rt-5.14.21-150500.13.73.1 as a component of Container suse/sle-micro/rt-5.5:2.0.4-4.5.211
+
+ kernel-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-BYOS
+
+
+ cluster-md-kmp-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ dlm-kmp-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ gfs2-kmp-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ kernel-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ ocfs2-kmp-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ cluster-md-kmp-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
+
+ dlm-kmp-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
+
+ gfs2-kmp-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
+
+ kernel-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
+
+ ocfs2-kmp-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
kernel-default-5.14.21-150500.55.83.1 as a component of Image SLES15-SP5-CHOST-BYOS-Aliyun
@@ -3192,6 +3240,17 @@
Container suse/hpc/warewulf4-x86_64/sle-hpc-node:15.6.17.5.49:kernel-default-6.4.0-150600.23.25.1
Container suse/sle-micro/kvm-5.5:2.0.4-3.5.197:kernel-default-base-5.14.21-150500.55.83.1.150500.6.37.1
Container suse/sle-micro/rt-5.5:2.0.4-4.5.211:kernel-rt-5.14.21-150500.13.73.1
+ Image SLES12-SP5-GCE-BYOS:kernel-default-4.12.14-122.231.1
+ Image SLES12-SP5-GCE-SAP-BYOS:cluster-md-kmp-default-4.12.14-122.231.1
+ Image SLES12-SP5-GCE-SAP-BYOS:dlm-kmp-default-4.12.14-122.231.1
+ Image SLES12-SP5-GCE-SAP-BYOS:gfs2-kmp-default-4.12.14-122.231.1
+ Image SLES12-SP5-GCE-SAP-BYOS:kernel-default-4.12.14-122.231.1
+ Image SLES12-SP5-GCE-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.231.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:cluster-md-kmp-default-4.12.14-122.231.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:dlm-kmp-default-4.12.14-122.231.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:gfs2-kmp-default-4.12.14-122.231.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:kernel-default-4.12.14-122.231.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:ocfs2-kmp-default-4.12.14-122.231.1
Image SLES15-SP5-CHOST-BYOS-Aliyun:kernel-default-5.14.21-150500.55.83.1
Image SLES15-SP5-CHOST-BYOS-Azure:kernel-default-5.14.21-150500.55.83.1
Image SLES15-SP5-CHOST-BYOS-EC2:kernel-default-5.14.21-150500.55.83.1
no cpe found for SUSE Linux Enterprise Module for Confidential Computing Technical Preview 15 SP6 in CVE-2024-46784
skipping CVE-2024-46786 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-46785 as CVE page is older than CVRF-CVE file.
--- /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2024-46784.xml 2024-10-22 01:13:45.829742000 +0200
+++ /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2024-46784.xml.new 2024-10-29 01:12:43.509251000 +0100
@@ -14,13 +14,13 @@
1
- 11
- 2024-10-21T23:13:45Z
+ 12
+ 2024-10-29T00:12:42Z
current
2024-09-18T23:10:06Z
- 2024-10-21T23:13:45Z
+ 2024-10-29T00:12:42Z
cve-database/bin/generate-cvrf-cve.pl
2020-12-27T01:00:00Z
@@ -127,6 +127,21 @@
Container suse/sle-micro/rt-5.5:2.0.4-4.5.211
+
+
+ Image SLES12-SP5-GCE-BYOS
+
+
+
+
+ Image SLES12-SP5-GCE-SAP-BYOS
+
+
+
+
+ Image SLES12-SP5-GCE-SAP-On-Demand
+
+
Image SLES15-SP5-CHOST-BYOS-Aliyun
@@ -1594,6 +1609,39 @@
kernel-rt-5.14.21-150500.13.73.1 as a component of Container suse/sle-micro/rt-5.5:2.0.4-4.5.211
+
+ kernel-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-BYOS
+
+
+ cluster-md-kmp-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ dlm-kmp-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ gfs2-kmp-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ kernel-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ ocfs2-kmp-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ cluster-md-kmp-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
+
+ dlm-kmp-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
+
+ gfs2-kmp-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
+
+ kernel-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
+
+ ocfs2-kmp-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
kernel-default-5.14.21-150500.55.83.1 as a component of Image SLES15-SP5-CHOST-BYOS-Aliyun
@@ -3164,6 +3212,17 @@
Container suse/hpc/warewulf4-x86_64/sle-hpc-node:15.6.17.5.49:kernel-default-6.4.0-150600.23.25.1
Container suse/sle-micro/kvm-5.5:2.0.4-3.5.197:kernel-default-base-5.14.21-150500.55.83.1.150500.6.37.1
Container suse/sle-micro/rt-5.5:2.0.4-4.5.211:kernel-rt-5.14.21-150500.13.73.1
+ Image SLES12-SP5-GCE-BYOS:kernel-default-4.12.14-122.231.1
+ Image SLES12-SP5-GCE-SAP-BYOS:cluster-md-kmp-default-4.12.14-122.231.1
+ Image SLES12-SP5-GCE-SAP-BYOS:dlm-kmp-default-4.12.14-122.231.1
+ Image SLES12-SP5-GCE-SAP-BYOS:gfs2-kmp-default-4.12.14-122.231.1
+ Image SLES12-SP5-GCE-SAP-BYOS:kernel-default-4.12.14-122.231.1
+ Image SLES12-SP5-GCE-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.231.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:cluster-md-kmp-default-4.12.14-122.231.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:dlm-kmp-default-4.12.14-122.231.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:gfs2-kmp-default-4.12.14-122.231.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:kernel-default-4.12.14-122.231.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:ocfs2-kmp-default-4.12.14-122.231.1
Image SLES15-SP5-CHOST-BYOS-Aliyun:kernel-default-5.14.21-150500.55.83.1
Image SLES15-SP5-CHOST-BYOS-Azure:kernel-default-5.14.21-150500.55.83.1
Image SLES15-SP5-CHOST-BYOS-EC2:kernel-default-5.14.21-150500.55.83.1
no cpe found for SUSE Linux Enterprise Module for Confidential Computing Technical Preview 15 SP6 in CVE-2024-46783
--- /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2024-46783.xml 2024-10-16 01:11:41.862533000 +0200
+++ /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2024-46783.xml.new 2024-10-29 01:12:44.278241000 +0100
@@ -14,13 +14,13 @@
1
- 12
- 2024-10-15T23:11:41Z
+ 13
+ 2024-10-29T00:12:43Z
current
2024-09-18T23:10:07Z
- 2024-10-15T23:11:41Z
+ 2024-10-29T00:12:43Z
cve-database/bin/generate-cvrf-cve.pl
2020-12-27T01:00:00Z
@@ -163,6 +163,21 @@
Container suse/sle-micro/rt-5.5:2.0.4-4.5.211
+
+
+ Image SLES12-SP5-GCE-BYOS
+
+
+
+
+ Image SLES12-SP5-GCE-SAP-BYOS
+
+
+
+
+ Image SLES12-SP5-GCE-SAP-On-Demand
+
+
Image SLES15-SP5-CHOST-BYOS-Aliyun
@@ -1602,6 +1617,39 @@
kernel-rt-5.14.21-150500.13.73.1 as a component of Container suse/sle-micro/rt-5.5:2.0.4-4.5.211
+
+ kernel-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-BYOS
+
+
+ cluster-md-kmp-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ dlm-kmp-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ gfs2-kmp-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ kernel-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ ocfs2-kmp-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ cluster-md-kmp-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
+
+ dlm-kmp-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
+
+ gfs2-kmp-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
+
+ kernel-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
+
+ ocfs2-kmp-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
kernel-default-5.14.21-150500.55.83.1 as a component of Image SLES15-SP5-CHOST-BYOS-Aliyun
@@ -3148,6 +3196,17 @@
Container suse/hpc/warewulf4-x86_64/sle-hpc-node:15.6.17.5.49:kernel-default-6.4.0-150600.23.25.1
Container suse/sle-micro/kvm-5.5:2.0.4-3.5.197:kernel-default-base-5.14.21-150500.55.83.1.150500.6.37.1
Container suse/sle-micro/rt-5.5:2.0.4-4.5.211:kernel-rt-5.14.21-150500.13.73.1
+ Image SLES12-SP5-GCE-BYOS:kernel-default-4.12.14-122.231.1
+ Image SLES12-SP5-GCE-SAP-BYOS:cluster-md-kmp-default-4.12.14-122.231.1
+ Image SLES12-SP5-GCE-SAP-BYOS:dlm-kmp-default-4.12.14-122.231.1
+ Image SLES12-SP5-GCE-SAP-BYOS:gfs2-kmp-default-4.12.14-122.231.1
+ Image SLES12-SP5-GCE-SAP-BYOS:kernel-default-4.12.14-122.231.1
+ Image SLES12-SP5-GCE-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.231.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:cluster-md-kmp-default-4.12.14-122.231.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:dlm-kmp-default-4.12.14-122.231.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:gfs2-kmp-default-4.12.14-122.231.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:kernel-default-4.12.14-122.231.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:ocfs2-kmp-default-4.12.14-122.231.1
Image SLES15-SP5-CHOST-BYOS-Aliyun:kernel-default-5.14.21-150500.55.83.1
Image SLES15-SP5-CHOST-BYOS-Azure:kernel-default-5.14.21-150500.55.83.1
Image SLES15-SP5-CHOST-BYOS-EC2:kernel-default-5.14.21-150500.55.83.1
skipping CVE-2024-46782 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-46781 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-46780 as CVE page is older than CVRF-CVE file.
no cpe found for SUSE Linux Enterprise Module for Confidential Computing Technical Preview 15 SP6 in CVE-2024-46778
no cpe found for SUSE Linux Enterprise Module for Confidential Computing Technical Preview 15 SP6 in CVE-2024-46774
no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2024-46774
skipping CVE-2024-46777 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-46776 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-46775 as CVE page is older than CVRF-CVE file.
--- /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2024-46774.xml 2024-10-20 01:11:03.083794000 +0200
+++ /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2024-46774.xml.new 2024-10-29 01:12:46.367163000 +0100
@@ -14,13 +14,13 @@
1
- 12
- 2024-10-19T23:11:02Z
+ 13
+ 2024-10-29T00:12:45Z
current
2024-09-18T23:10:10Z
- 2024-10-19T23:11:02Z
+ 2024-10-29T00:12:45Z
cve-database/bin/generate-cvrf-cve.pl
2020-12-27T01:00:00Z
@@ -152,6 +152,21 @@
Container suse/sle-micro/rt-5.5:2.0.4-4.5.211
+
+
+ Image SLES12-SP5-GCE-BYOS
+
+
+
+
+ Image SLES12-SP5-GCE-SAP-BYOS
+
+
+
+
+ Image SLES12-SP5-GCE-SAP-On-Demand
+
+
Image SLES15-SP4-SAP-Azure-LI-BYOS
@@ -1860,6 +1875,39 @@
kernel-rt-5.14.21-150500.13.73.1 as a component of Container suse/sle-micro/rt-5.5:2.0.4-4.5.211
+
+ kernel-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-BYOS
+
+
+ cluster-md-kmp-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ dlm-kmp-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ gfs2-kmp-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ kernel-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ ocfs2-kmp-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ cluster-md-kmp-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
+
+ dlm-kmp-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
+
+ gfs2-kmp-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
+
+ kernel-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
+
+ ocfs2-kmp-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
cluster-md-kmp-default-5.14.21-150400.24.136.1 as a component of Image SLES15-SP4-SAP-Azure-LI-BYOS
@@ -3774,18 +3822,6 @@
kernel-default as a component of SUSE Linux Enterprise Server for SAP Applications 12 SP5
-
- kernel-default-base as a component of SUSE Linux Enterprise Server for SAP Applications 12 SP5
-
-
- kernel-default-devel as a component of SUSE Linux Enterprise Server for SAP Applications 12 SP5
-
-
- kernel-devel as a component of SUSE Linux Enterprise Server for SAP Applications 12 SP5
-
-
- kernel-macros as a component of SUSE Linux Enterprise Server for SAP Applications 12 SP5
-
kernel-source as a component of SUSE Linux Enterprise Server for SAP Applications 12 SP5
@@ -3831,6 +3867,17 @@
Container suse/sle-micro-rancher/5.4:latest:kernel-default-5.14.21-150400.24.136.1
Container suse/sle-micro/kvm-5.5:2.0.4-3.5.197:kernel-default-base-5.14.21-150500.55.83.1.150500.6.37.1
Container suse/sle-micro/rt-5.5:2.0.4-4.5.211:kernel-rt-5.14.21-150500.13.73.1
+ Image SLES12-SP5-GCE-BYOS:kernel-default-4.12.14-122.231.1
+ Image SLES12-SP5-GCE-SAP-BYOS:cluster-md-kmp-default-4.12.14-122.231.1
+ Image SLES12-SP5-GCE-SAP-BYOS:dlm-kmp-default-4.12.14-122.231.1
+ Image SLES12-SP5-GCE-SAP-BYOS:gfs2-kmp-default-4.12.14-122.231.1
+ Image SLES12-SP5-GCE-SAP-BYOS:kernel-default-4.12.14-122.231.1
+ Image SLES12-SP5-GCE-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.231.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:cluster-md-kmp-default-4.12.14-122.231.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:dlm-kmp-default-4.12.14-122.231.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:gfs2-kmp-default-4.12.14-122.231.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:kernel-default-4.12.14-122.231.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:ocfs2-kmp-default-4.12.14-122.231.1
Image SLES15-SP4-SAP-Azure-LI-BYOS:cluster-md-kmp-default-5.14.21-150400.24.136.1
Image SLES15-SP4-SAP-Azure-LI-BYOS:dlm-kmp-default-5.14.21-150400.24.136.1
Image SLES15-SP4-SAP-Azure-LI-BYOS:gfs2-kmp-default-5.14.21-150400.24.136.1
@@ -4430,10 +4477,6 @@
SUSE Linux Enterprise Micro 6.0:kernel-source
SUSE Linux Enterprise Micro 6.0:kernel-source-rt
SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default
- SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base
- SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel
- SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel
- SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros
SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source
SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-default
SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-source
no cpe found for SUSE Linux Enterprise Module for Confidential Computing Technical Preview 15 SP6 in CVE-2024-46773
no cpe found for SUSE Linux Enterprise Module for Confidential Computing Technical Preview 15 SP6 in CVE-2024-46772
skipping CVE-2024-46771 as CVE page is older than CVRF-CVE file.
--- /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2024-46770.xml 2024-10-16 01:11:48.772656000 +0200
+++ /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2024-46770.xml.new 2024-10-29 01:12:48.675996000 +0100
@@ -14,13 +14,13 @@
1
- 7
- 2024-10-15T23:11:48Z
+ 8
+ 2024-10-29T00:12:48Z
current
2024-09-18T23:10:11Z
- 2024-10-15T23:11:48Z
+ 2024-10-29T00:12:48Z
cve-database/bin/generate-cvrf-cve.pl
2020-12-27T01:00:00Z
@@ -107,6 +107,21 @@
+
+
+ Image SLES12-SP5-GCE-BYOS
+
+
+
+
+ Image SLES12-SP5-GCE-SAP-BYOS
+
+
+
+
+ Image SLES12-SP5-GCE-SAP-On-Demand
+
+
SUSE Linux Enterprise Module for Basesystem 15 SP5
@@ -411,6 +426,253 @@
openSUSE Leap 15.6
+
+
+ SLES 15 SP1 CHOST Images for Amazon EC2 suse-sles-15-sp1-chost-byos-v20210304-hvm-ssd-x86_64
+ SLES 15 SP1 CHOST Images for Amazon EC2 suse-sles-15-sp1-chost-byos-v20220127-hvm-ssd-x86_64
+ SLES 15 SP1 CHOST Images for Amazon EC2 suse-sles-15-sp1-chost-byos-v20220715-hvm-ssd-x86_64
+
+
+ SLES 15 SP2 CHOST Images for Amazon EC2 suse-sles-15-sp2-chost-byos-v20210610-hvm-ssd-x86_64
+ SLES 15 SP2 CHOST Images for Amazon EC2 suse-sles-15-sp2-chost-byos-v20210722-hvm-ssd-x86_64
+ SLES 15 SP2 CHOST Images for Amazon EC2 suse-sles-15-sp2-chost-byos-v20210913-hvm-ssd-x86_64
+ SLES 15 SP2 CHOST Images for Amazon EC2 suse-sles-15-sp2-chost-byos-v20211025-hvm-ssd-x86_64
+ SLES 15 SP2 CHOST Images for Amazon EC2 suse-sles-15-sp2-chost-byos-v20220126-hvm-ssd-x86_64
+ SLES 15 SP2 CHOST Images for Amazon EC2 suse-sles-15-sp2-chost-byos-v20220718-hvm-ssd-x86_64
+
+
+ SLES 15 SP3 CHOST Images for Amazon EC2 suse-sles-15-sp3-chost-byos-v20210729-hvm-ssd-x86_64
+ SLES 15 SP3 CHOST Images for Amazon EC2 suse-sles-15-sp3-chost-byos-v20210827-hvm-ssd-x86_64
+ SLES 15 SP3 CHOST Images for Amazon EC2 suse-sles-15-sp3-chost-byos-v20210927-hvm-ssd-x86_64
+ SLES 15 SP3 CHOST Images for Amazon EC2 suse-sles-15-sp3-chost-byos-v20211004-hvm-ssd-x86_64
+ SLES 15 SP3 CHOST Images for Amazon EC2 suse-sles-15-sp3-chost-byos-v20211101-hvm-ssd-x86_64
+ SLES 15 SP3 CHOST Images for Amazon EC2 suse-sles-15-sp3-chost-byos-v20211202-hvm-ssd-x86_64
+ SLES 15 SP3 CHOST Images for Amazon EC2 suse-sles-15-sp3-chost-byos-v20220103-hvm-ssd-x86_64
+ SLES 15 SP3 CHOST Images for Amazon EC2 suse-sles-15-sp3-chost-byos-v20220126-hvm-ssd-x86_64
+ SLES 15 SP3 CHOST Images for Amazon EC2 suse-sles-15-sp3-chost-byos-v20220222-hvm-ssd-x86_64
+ SLES 15 SP3 CHOST Images for Amazon EC2 suse-sles-15-sp3-chost-byos-v20220310-hvm-ssd-x86_64
+ SLES 15 SP3 CHOST Images for Amazon EC2 suse-sles-15-sp3-chost-byos-v20220411-hvm-ssd-x86_64
+ SLES 15 SP3 CHOST Images for Amazon EC2 suse-sles-15-sp3-chost-byos-v20220510-hvm-ssd-x86_64
+ SLES 15 SP3 CHOST Images for Amazon EC2 suse-sles-15-sp3-chost-byos-v20220608-hvm-ssd-x86_64
+ SLES 15 SP3 CHOST Images for Amazon EC2 suse-sles-15-sp3-chost-byos-v20220708-hvm-ssd-x86_64
+ SLES 15 SP3 CHOST Images for Amazon EC2 suse-sles-15-sp3-chost-byos-v20220718-hvm-ssd-x86_64
+ SLES 15 SP3 CHOST Images for Amazon EC2 suse-sles-15-sp3-chost-byos-v20220818-hvm-ssd-x86_64
+ SLES 15 SP3 CHOST Images for Amazon EC2 suse-sles-15-sp3-chost-byos-v20220916-hvm-ssd-x86_64
+ SLES 15 SP3 CHOST Images for Amazon EC2 suse-sles-15-sp3-chost-byos-v20220921-hvm-ssd-x86_64
+ SLES 15 SP3 CHOST Images for Amazon EC2 suse-sles-15-sp3-chost-byos-v20221019-hvm-ssd-x86_64
+ SLES 15 SP3 CHOST Images for Amazon EC2 suse-sles-15-sp3-chost-byos-v20221119-hvm-ssd-x86_64
+ SLES 15 SP3 CHOST Images for Amazon EC2 suse-sles-15-sp3-chost-byos-v20221215-hvm-ssd-x86_64
+ SLES 15 SP3 CHOST Images for Amazon EC2 suse-sles-15-sp3-chost-byos-v20230313-hvm-ssd-x86_64
+ SLES 15 SP3 CHOST Images for Amazon EC2 suse-sles-15-sp3-chost-byos-v20230613-hvm-ssd-x86_64
+ SLES 15 SP3 CHOST Images for Amazon EC2 suse-sles-15-sp3-chost-byos-v20240807-hvm-ssd-x86_64
+ SLES 15 SP3 CHOST Images for Amazon EC2 suse-sles-15-sp3-chost-byos-v20240912-hvm-ssd-x86_64
+
+
+ SLES 15 SP4 CHOST Images for Amazon EC2 suse-sles-15-sp4-chost-byos-v20220718-hvm-ssd-x86_64
+ SLES 15 SP4 CHOST Images for Amazon EC2 suse-sles-15-sp4-chost-byos-v20220721-hvm-ssd-x86_64
+ SLES 15 SP4 CHOST Images for Amazon EC2 suse-sles-15-sp4-chost-byos-v20220819-hvm-ssd-x86_64
+ SLES 15 SP4 CHOST Images for Amazon EC2 suse-sles-15-sp4-chost-byos-v20220916-hvm-ssd-x86_64
+ SLES 15 SP4 CHOST Images for Amazon EC2 suse-sles-15-sp4-chost-byos-v20220923-hvm-ssd-x86_64
+ SLES 15 SP4 CHOST Images for Amazon EC2 suse-sles-15-sp4-chost-byos-v20221018-hvm-ssd-x86_64
+ SLES 15 SP4 CHOST Images for Amazon EC2 suse-sles-15-sp4-chost-byos-v20221118-hvm-ssd-x86_64
+ SLES 15 SP4 CHOST Images for Amazon EC2 suse-sles-15-sp4-chost-byos-v20221215-hvm-ssd-x86_64
+ SLES 15 SP4 CHOST Images for Amazon EC2 suse-sles-15-sp4-chost-byos-v20230111-hvm-ssd-x86_64
+ SLES 15 SP4 CHOST Images for Amazon EC2 suse-sles-15-sp4-chost-byos-v20230210-hvm-ssd-x86_64
+ SLES 15 SP4 CHOST Images for Amazon EC2 suse-sles-15-sp4-chost-byos-v20230310-hvm-ssd-x86_64
+ SLES 15 SP4 CHOST Images for Amazon EC2 suse-sles-15-sp4-chost-byos-v20230410-hvm-ssd-x86_64
+ SLES 15 SP4 CHOST Images for Amazon EC2 suse-sles-15-sp4-chost-byos-v20230510-hvm-ssd-x86_64
+ SLES 15 SP4 CHOST Images for Amazon EC2 suse-sles-15-sp4-chost-byos-v20230606-hvm-ssd-x86_64
+ SLES 15 SP4 CHOST Images for Amazon EC2 suse-sles-15-sp4-chost-byos-v20230704-hvm-ssd-x86_64
+ SLES 15 SP4 CHOST Images for Amazon EC2 suse-sles-15-sp4-chost-byos-v20230803-hvm-ssd-x86_64
+ SLES 15 SP4 CHOST Images for Amazon EC2 suse-sles-15-sp4-chost-byos-v20230901-hvm-ssd-x86_64
+ SLES 15 SP4 CHOST Images for Amazon EC2 suse-sles-15-sp4-chost-byos-v20230928-hvm-ssd-x86_64
+ SLES 15 SP4 CHOST Images for Amazon EC2 suse-sles-15-sp4-chost-byos-v20231027-hvm-ssd-x86_64
+ SLES 15 SP4 CHOST Images for Amazon EC2 suse-sles-15-sp4-chost-byos-v20231127-hvm-ssd-x86_64
+ SLES 15 SP4 CHOST Images for Amazon EC2 suse-sles-15-sp4-chost-byos-v20231212-hvm-ssd-x86_64
+ SLES 15 SP4 CHOST Images for Amazon EC2 suse-sles-15-sp4-chost-byos-v20240312-hvm-ssd-x86_64
+ SLES 15 SP4 CHOST Images for Amazon EC2 suse-sles-15-sp4-chost-byos-v20240612-hvm-ssd-x86_64
+ SLES 15 SP4 CHOST Images for Amazon EC2 suse-sles-15-sp4-chost-byos-v20240809-hvm-ssd-x86_64
+ SLES 15 SP4 CHOST Images for Amazon EC2 suse-sles-15-sp4-chost-byos-v20240912-hvm-ssd-x86_64
+
+
+ SLES 15 SP1 CHOST Images for Google sles-15-sp1-chost-byos-v20210202
+ SLES 15 SP1 CHOST Images for Google sles-15-sp1-chost-byos-v20210304
+ SLES 15 SP1 CHOST Images for Google sles-15-sp1-chost-byos-v20220127
+ SLES 15 SP1 CHOST Images for Google sles-15-sp1-chost-byos-v20220715-x86-64
+
+
+ SLES 15 SP2 CHOST Images for Google sles-15-sp2-chost-byos-v20210202
+ SLES 15 SP2 CHOST Images for Google sles-15-sp2-chost-byos-v20210304
+ SLES 15 SP2 CHOST Images for Google sles-15-sp2-chost-byos-v20210405
+ SLES 15 SP2 CHOST Images for Google sles-15-sp2-chost-byos-v20210506
+ SLES 15 SP2 CHOST Images for Google sles-15-sp2-chost-byos-v20210610
+ SLES 15 SP2 CHOST Images for Google sles-15-sp2-chost-byos-v20210722
+ SLES 15 SP2 CHOST Images for Google sles-15-sp2-chost-byos-v20210913
+ SLES 15 SP2 CHOST Images for Google sles-15-sp2-chost-byos-v20211025
+ SLES 15 SP2 CHOST Images for Google sles-15-sp2-chost-byos-v20220126
+ SLES 15 SP2 CHOST Images for Google sles-15-sp2-chost-byos-v20220718-x86-64
+
+
+ SLES 15 SP3 CHOST Images for Google sles-15-sp3-chost-byos-v20210729
+ SLES 15 SP3 CHOST Images for Google sles-15-sp3-chost-byos-v20210827
+ SLES 15 SP3 CHOST Images for Google sles-15-sp3-chost-byos-v20210927
+ SLES 15 SP3 CHOST Images for Google sles-15-sp3-chost-byos-v20211004
+ SLES 15 SP3 CHOST Images for Google sles-15-sp3-chost-byos-v20211101
+ SLES 15 SP3 CHOST Images for Google sles-15-sp3-chost-byos-v20211202
+ SLES 15 SP3 CHOST Images for Google sles-15-sp3-chost-byos-v20220103
+ SLES 15 SP3 CHOST Images for Google sles-15-sp3-chost-byos-v20220126
+ SLES 15 SP3 CHOST Images for Google sles-15-sp3-chost-byos-v20220222
+ SLES 15 SP3 CHOST Images for Google sles-15-sp3-chost-byos-v20220310
+ SLES 15 SP3 CHOST Images for Google sles-15-sp3-chost-byos-v20220411-x86-64
+ SLES 15 SP3 CHOST Images for Google sles-15-sp3-chost-byos-v20220510-x86-64
+ SLES 15 SP3 CHOST Images for Google sles-15-sp3-chost-byos-v20220608-x86-64
+ SLES 15 SP3 CHOST Images for Google sles-15-sp3-chost-byos-v20220708-x86-64
+ SLES 15 SP3 CHOST Images for Google sles-15-sp3-chost-byos-v20220718-x86-64
+ SLES 15 SP3 CHOST Images for Google sles-15-sp3-chost-byos-v20220818-x86-64
+ SLES 15 SP3 CHOST Images for Google sles-15-sp3-chost-byos-v20220916-x86-64
+ SLES 15 SP3 CHOST Images for Google sles-15-sp3-chost-byos-v20221019-x86-64
+ SLES 15 SP3 CHOST Images for Google sles-15-sp3-chost-byos-v20221118-x86-64
+ SLES 15 SP3 CHOST Images for Google sles-15-sp3-chost-byos-v20221215-x86-64
+ SLES 15 SP3 CHOST Images for Google sles-15-sp3-chost-byos-v20230313-x86-64
+ SLES 15 SP3 CHOST Images for Google sles-15-sp3-chost-byos-v20230613-x86-64
+ SLES 15 SP3 CHOST Images for Google sles-15-sp3-chost-byos-v20240807-x86-64
+ SLES 15 SP3 CHOST Images for Google sles-15-sp3-chost-byos-v20240912-x86-64
+
+
+ SLES 15 SP4 CHOST Images for Google sles-15-sp4-chost-byos-v20220718-x86-64
+ SLES 15 SP4 CHOST Images for Google sles-15-sp4-chost-byos-v20220721-x86-64
+ SLES 15 SP4 CHOST Images for Google sles-15-sp4-chost-byos-v20220818-x86-64
+ SLES 15 SP4 CHOST Images for Google sles-15-sp4-chost-byos-v20220916-x86-64
+ SLES 15 SP4 CHOST Images for Google sles-15-sp4-chost-byos-v20221018-x86-64
+ SLES 15 SP4 CHOST Images for Google sles-15-sp4-chost-byos-v20221118-x86-64
+ SLES 15 SP4 CHOST Images for Google sles-15-sp4-chost-byos-v20221215-arm64
+ SLES 15 SP4 CHOST Images for Google sles-15-sp4-chost-byos-v20221215-x86-64
+ SLES 15 SP4 CHOST Images for Google sles-15-sp4-chost-byos-v20230111-arm64
+ SLES 15 SP4 CHOST Images for Google sles-15-sp4-chost-byos-v20230111-x86-64
+ SLES 15 SP4 CHOST Images for Google sles-15-sp4-chost-byos-v20230210-arm64
+ SLES 15 SP4 CHOST Images for Google sles-15-sp4-chost-byos-v20230210-x86-64
+ SLES 15 SP4 CHOST Images for Google sles-15-sp4-chost-byos-v20230310-arm64
+ SLES 15 SP4 CHOST Images for Google sles-15-sp4-chost-byos-v20230310-x86-64
+ SLES 15 SP4 CHOST Images for Google sles-15-sp4-chost-byos-v20230410-arm64
+ SLES 15 SP4 CHOST Images for Google sles-15-sp4-chost-byos-v20230410-x86-64
+ SLES 15 SP4 CHOST Images for Google sles-15-sp4-chost-byos-v20230510-arm64
+ SLES 15 SP4 CHOST Images for Google sles-15-sp4-chost-byos-v20230510-x86-64
+ SLES 15 SP4 CHOST Images for Google sles-15-sp4-chost-byos-v20230606-arm64
+ SLES 15 SP4 CHOST Images for Google sles-15-sp4-chost-byos-v20230606-x86-64
+ SLES 15 SP4 CHOST Images for Google sles-15-sp4-chost-byos-v20230704-arm64
+ SLES 15 SP4 CHOST Images for Google sles-15-sp4-chost-byos-v20230704-x86-64
+ SLES 15 SP4 CHOST Images for Google sles-15-sp4-chost-byos-v20230804-arm64
+ SLES 15 SP4 CHOST Images for Google sles-15-sp4-chost-byos-v20230804-x86-64
+ SLES 15 SP4 CHOST Images for Google sles-15-sp4-chost-byos-v20230901-arm64
+ SLES 15 SP4 CHOST Images for Google sles-15-sp4-chost-byos-v20230901-x86-64
+ SLES 15 SP4 CHOST Images for Google sles-15-sp4-chost-byos-v20230928-arm64
+ SLES 15 SP4 CHOST Images for Google sles-15-sp4-chost-byos-v20230928-x86-64
+ SLES 15 SP4 CHOST Images for Google sles-15-sp4-chost-byos-v20231027-arm64
+ SLES 15 SP4 CHOST Images for Google sles-15-sp4-chost-byos-v20231027-x86-64
+ SLES 15 SP4 CHOST Images for Google sles-15-sp4-chost-byos-v20231127-arm64
+ SLES 15 SP4 CHOST Images for Google sles-15-sp4-chost-byos-v20231127-x86-64
+ SLES 15 SP4 CHOST Images for Google sles-15-sp4-chost-byos-v20231212-arm64
+ SLES 15 SP4 CHOST Images for Google sles-15-sp4-chost-byos-v20231212-x86-64
+ SLES 15 SP4 CHOST Images for Google sles-15-sp4-chost-byos-v20240312-arm64
+ SLES 15 SP4 CHOST Images for Google sles-15-sp4-chost-byos-v20240312-x86-64
+ SLES 15 SP4 CHOST Images for Google sles-15-sp4-chost-byos-v20240612-arm64
+ SLES 15 SP4 CHOST Images for Google sles-15-sp4-chost-byos-v20240612-x86-64
+ SLES 15 SP4 CHOST Images for Google sles-15-sp4-chost-byos-v20240809-arm64
+ SLES 15 SP4 CHOST Images for Google sles-15-sp4-chost-byos-v20240809-x86-64
+ SLES 15 SP4 CHOST Images for Google sles-15-sp4-chost-byos-v20240912-arm64
+ SLES 15 SP4 CHOST Images for Google sles-15-sp4-chost-byos-v20240912-x86-64
+
+
+ SLES 15 SP1 CHOST Images for Microsoft Azure suse-sles-15-sp1-chost-byos-v20210202
+ SLES 15 SP1 CHOST Images for Microsoft Azure suse-sles-15-sp1-chost-byos-v20210304
+ SLES 15 SP1 CHOST Images for Microsoft Azure suse-sles-15-sp1-chost-byos-v20220127
+ SLES 15 SP1 CHOST Images for Microsoft Azure suse-sles-15-sp1-chost-byos-v20220715-x86_64
+
+
+ SLES 15 SP2 CHOST Images for Microsoft Azure suse-sles-15-sp2-chost-byos-v20210202
+ SLES 15 SP2 CHOST Images for Microsoft Azure suse-sles-15-sp2-chost-byos-v20210304
+ SLES 15 SP2 CHOST Images for Microsoft Azure suse-sles-15-sp2-chost-byos-v20210405
+ SLES 15 SP2 CHOST Images for Microsoft Azure suse-sles-15-sp2-chost-byos-v20210506
+ SLES 15 SP2 CHOST Images for Microsoft Azure suse-sles-15-sp2-chost-byos-v20210610
+ SLES 15 SP2 CHOST Images for Microsoft Azure suse-sles-15-sp2-chost-byos-v20210722
+ SLES 15 SP2 CHOST Images for Microsoft Azure suse-sles-15-sp2-chost-byos-v20210913
+ SLES 15 SP2 CHOST Images for Microsoft Azure suse-sles-15-sp2-chost-byos-v20211025
+ SLES 15 SP2 CHOST Images for Microsoft Azure suse-sles-15-sp2-chost-byos-v20220126
+ SLES 15 SP2 CHOST Images for Microsoft Azure suse-sles-15-sp2-chost-byos-v20220718-x86_64
+
+
+ SLES 15 SP3 CHOST Images for Microsoft Azure suse-sles-15-sp3-chost-byos-v20210729
+ SLES 15 SP3 CHOST Images for Microsoft Azure suse-sles-15-sp3-chost-byos-v20210827
+ SLES 15 SP3 CHOST Images for Microsoft Azure suse-sles-15-sp3-chost-byos-v20210927
+ SLES 15 SP3 CHOST Images for Microsoft Azure suse-sles-15-sp3-chost-byos-v20211004
+ SLES 15 SP3 CHOST Images for Microsoft Azure suse-sles-15-sp3-chost-byos-v20211101
+ SLES 15 SP3 CHOST Images for Microsoft Azure suse-sles-15-sp3-chost-byos-v20211202
+ SLES 15 SP3 CHOST Images for Microsoft Azure suse-sles-15-sp3-chost-byos-v20220103
+ SLES 15 SP3 CHOST Images for Microsoft Azure suse-sles-15-sp3-chost-byos-v20220126
+ SLES 15 SP3 CHOST Images for Microsoft Azure suse-sles-15-sp3-chost-byos-v20220222
+ SLES 15 SP3 CHOST Images for Microsoft Azure suse-sles-15-sp3-chost-byos-v20220310
+ SLES 15 SP3 CHOST Images for Microsoft Azure suse-sles-15-sp3-chost-byos-v20220411-x86_64
+ SLES 15 SP3 CHOST Images for Microsoft Azure suse-sles-15-sp3-chost-byos-v20220510-x86_64
+ SLES 15 SP3 CHOST Images for Microsoft Azure suse-sles-15-sp3-chost-byos-v20220609-x86_64
+ SLES 15 SP3 CHOST Images for Microsoft Azure suse-sles-15-sp3-chost-byos-v20220708-x86_64
+ SLES 15 SP3 CHOST Images for Microsoft Azure suse-sles-15-sp3-chost-byos-v20220718-x86_64
+ SLES 15 SP3 CHOST Images for Microsoft Azure suse-sles-15-sp3-chost-byos-v20220818-x86_64
+ SLES 15 SP3 CHOST Images for Microsoft Azure suse-sles-15-sp3-chost-byos-v20220916-x86_64
+ SLES 15 SP3 CHOST Images for Microsoft Azure suse-sles-15-sp3-chost-byos-v20220921-x86_64
+ SLES 15 SP3 CHOST Images for Microsoft Azure suse-sles-15-sp3-chost-byos-v20221019-x86_64
+ SLES 15 SP3 CHOST Images for Microsoft Azure suse-sles-15-sp3-chost-byos-v20221119-x86_64
+ SLES 15 SP3 CHOST Images for Microsoft Azure suse-sles-15-sp3-chost-byos-v20221215-x86_64
+ SLES 15 SP3 CHOST Images for Microsoft Azure suse-sles-15-sp3-chost-byos-v20230313-x86_64
+ SLES 15 SP3 CHOST Images for Microsoft Azure suse-sles-15-sp3-chost-byos-v20230613-x86_64
+ SLES 15 SP3 CHOST Images for Microsoft Azure suse-sles-15-sp3-chost-byos-v20240807-x86_64
+ SLES 15 SP3 CHOST Images for Microsoft Azure suse-sles-15-sp3-chost-byos-v20240912-x86_64
+
+
+ SLES 15 SP4 CHOST Images for Microsoft Azure suse-sles-15-sp4-chost-byos-v20220718-x86_64
+ SLES 15 SP4 CHOST Images for Microsoft Azure suse-sles-15-sp4-chost-byos-v20220721-x86_64
+ SLES 15 SP4 CHOST Images for Microsoft Azure suse-sles-15-sp4-chost-byos-v20220819-x86_64
+ SLES 15 SP4 CHOST Images for Microsoft Azure suse-sles-15-sp4-chost-byos-v20220916-x86_64
+ SLES 15 SP4 CHOST Images for Microsoft Azure suse-sles-15-sp4-chost-byos-v20220923-x86_64
+ SLES 15 SP4 CHOST Images for Microsoft Azure suse-sles-15-sp4-chost-byos-v20221018-x86_64
+ SLES 15 SP4 CHOST Images for Microsoft Azure suse-sles-15-sp4-chost-byos-v20221118-x86_64
+ SLES 15 SP4 CHOST Images for Microsoft Azure suse-sles-15-sp4-chost-byos-v20221215-arm64
+ SLES 15 SP4 CHOST Images for Microsoft Azure suse-sles-15-sp4-chost-byos-v20221215-x86_64
+ SLES 15 SP4 CHOST Images for Microsoft Azure suse-sles-15-sp4-chost-byos-v20230111-arm64
+ SLES 15 SP4 CHOST Images for Microsoft Azure suse-sles-15-sp4-chost-byos-v20230111-x86_64
+ SLES 15 SP4 CHOST Images for Microsoft Azure suse-sles-15-sp4-chost-byos-v20230210-arm64
+ SLES 15 SP4 CHOST Images for Microsoft Azure suse-sles-15-sp4-chost-byos-v20230210-x86_64
+ SLES 15 SP4 CHOST Images for Microsoft Azure suse-sles-15-sp4-chost-byos-v20230310-arm64
+ SLES 15 SP4 CHOST Images for Microsoft Azure suse-sles-15-sp4-chost-byos-v20230310-x86_64
+ SLES 15 SP4 CHOST Images for Microsoft Azure suse-sles-15-sp4-chost-byos-v20230410-arm64
+ SLES 15 SP4 CHOST Images for Microsoft Azure suse-sles-15-sp4-chost-byos-v20230410-x86_64
+ SLES 15 SP4 CHOST Images for Microsoft Azure suse-sles-15-sp4-chost-byos-v20230510-arm64
+ SLES 15 SP4 CHOST Images for Microsoft Azure suse-sles-15-sp4-chost-byos-v20230510-x86_64
+ SLES 15 SP4 CHOST Images for Microsoft Azure suse-sles-15-sp4-chost-byos-v20230606-arm64
+ SLES 15 SP4 CHOST Images for Microsoft Azure suse-sles-15-sp4-chost-byos-v20230606-x86_64
+ SLES 15 SP4 CHOST Images for Microsoft Azure suse-sles-15-sp4-chost-byos-v20230704-arm64
+ SLES 15 SP4 CHOST Images for Microsoft Azure suse-sles-15-sp4-chost-byos-v20230704-x86_64
+ SLES 15 SP4 CHOST Images for Microsoft Azure suse-sles-15-sp4-chost-byos-v20230803-arm64
+ SLES 15 SP4 CHOST Images for Microsoft Azure suse-sles-15-sp4-chost-byos-v20230803-x86_64
+ SLES 15 SP4 CHOST Images for Microsoft Azure suse-sles-15-sp4-chost-byos-v20230901-arm64
+ SLES 15 SP4 CHOST Images for Microsoft Azure suse-sles-15-sp4-chost-byos-v20230901-x86_64
+ SLES 15 SP4 CHOST Images for Microsoft Azure suse-sles-15-sp4-chost-byos-v20230928-arm64
+ SLES 15 SP4 CHOST Images for Microsoft Azure suse-sles-15-sp4-chost-byos-v20230928-x86_64
+ SLES 15 SP4 CHOST Images for Microsoft Azure suse-sles-15-sp4-chost-byos-v20231027-arm64
+ SLES 15 SP4 CHOST Images for Microsoft Azure suse-sles-15-sp4-chost-byos-v20231027-x86_64
+ SLES 15 SP4 CHOST Images for Microsoft Azure suse-sles-15-sp4-chost-byos-v20231127-arm64
+ SLES 15 SP4 CHOST Images for Microsoft Azure suse-sles-15-sp4-chost-byos-v20231127-x86_64
+ SLES 15 SP4 CHOST Images for Microsoft Azure suse-sles-15-sp4-chost-byos-v20231212-arm64
+ SLES 15 SP4 CHOST Images for Microsoft Azure suse-sles-15-sp4-chost-byos-v20231212-x86_64
+ SLES 15 SP4 CHOST Images for Microsoft Azure suse-sles-15-sp4-chost-byos-v20240312-arm64
+ SLES 15 SP4 CHOST Images for Microsoft Azure suse-sles-15-sp4-chost-byos-v20240312-x86_64
+ SLES 15 SP4 CHOST Images for Microsoft Azure suse-sles-15-sp4-chost-byos-v20240612-arm64
+ SLES 15 SP4 CHOST Images for Microsoft Azure suse-sles-15-sp4-chost-byos-v20240612-x86_64
+ SLES 15 SP4 CHOST Images for Microsoft Azure suse-sles-15-sp4-chost-byos-v20240809-arm64
+ SLES 15 SP4 CHOST Images for Microsoft Azure suse-sles-15-sp4-chost-byos-v20240809-x86_64
+ SLES 15 SP4 CHOST Images for Microsoft Azure suse-sles-15-sp4-chost-byos-v20240912-arm64
+ SLES 15 SP4 CHOST Images for Microsoft Azure suse-sles-15-sp4-chost-byos-v20240912-x86_64
+
+
cluster-md-kmp-azure-5.14.21-150500.33.69.1
@@ -636,6 +898,39 @@
reiserfs-kmp-default
+
+ kernel-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-BYOS
+
+
+ cluster-md-kmp-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ dlm-kmp-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ gfs2-kmp-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ kernel-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ ocfs2-kmp-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ cluster-md-kmp-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
+
+ dlm-kmp-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
+
+ gfs2-kmp-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
+
+ kernel-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
+
+ ocfs2-kmp-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
cluster-md-kmp-default-4.12.14-122.231.1 as a component of SUSE Linux Enterprise High Availability Extension 12 SP5
@@ -1555,6 +1850,17 @@
CVE-2024-46770
+ Image SLES12-SP5-GCE-BYOS:kernel-default-4.12.14-122.231.1
+ Image SLES12-SP5-GCE-SAP-BYOS:cluster-md-kmp-default-4.12.14-122.231.1
+ Image SLES12-SP5-GCE-SAP-BYOS:dlm-kmp-default-4.12.14-122.231.1
+ Image SLES12-SP5-GCE-SAP-BYOS:gfs2-kmp-default-4.12.14-122.231.1
+ Image SLES12-SP5-GCE-SAP-BYOS:kernel-default-4.12.14-122.231.1
+ Image SLES12-SP5-GCE-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.231.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:cluster-md-kmp-default-4.12.14-122.231.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:dlm-kmp-default-4.12.14-122.231.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:gfs2-kmp-default-4.12.14-122.231.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:kernel-default-4.12.14-122.231.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:ocfs2-kmp-default-4.12.14-122.231.1
SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.231.1
SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.231.1
SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.231.1
@@ -1660,6 +1966,229 @@
SUSE Linux Enterprise Server Teradata 12 SP3:kernel-default
SUSE Linux Enterprise Server Teradata 12 SP3:kernel-source
+
+ chost:amazon/suse-sles-15-sp1-chost-byos-v20210304-hvm-ssd-x86_64
+ chost:amazon/suse-sles-15-sp1-chost-byos-v20220127-hvm-ssd-x86_64
+ chost:amazon/suse-sles-15-sp1-chost-byos-v20220715-hvm-ssd-x86_64
+ chost:amazon/suse-sles-15-sp2-chost-byos-v20210610-hvm-ssd-x86_64
+ chost:amazon/suse-sles-15-sp2-chost-byos-v20210722-hvm-ssd-x86_64
+ chost:amazon/suse-sles-15-sp2-chost-byos-v20210913-hvm-ssd-x86_64
+ chost:amazon/suse-sles-15-sp2-chost-byos-v20211025-hvm-ssd-x86_64
+ chost:amazon/suse-sles-15-sp2-chost-byos-v20220126-hvm-ssd-x86_64
+ chost:amazon/suse-sles-15-sp2-chost-byos-v20220718-hvm-ssd-x86_64
+ chost:amazon/suse-sles-15-sp3-chost-byos-v20210729-hvm-ssd-x86_64
+ chost:amazon/suse-sles-15-sp3-chost-byos-v20210827-hvm-ssd-x86_64
+ chost:amazon/suse-sles-15-sp3-chost-byos-v20210927-hvm-ssd-x86_64
+ chost:amazon/suse-sles-15-sp3-chost-byos-v20211004-hvm-ssd-x86_64
+ chost:amazon/suse-sles-15-sp3-chost-byos-v20211101-hvm-ssd-x86_64
+ chost:amazon/suse-sles-15-sp3-chost-byos-v20211202-hvm-ssd-x86_64
+ chost:amazon/suse-sles-15-sp3-chost-byos-v20220103-hvm-ssd-x86_64
+ chost:amazon/suse-sles-15-sp3-chost-byos-v20220126-hvm-ssd-x86_64
+ chost:amazon/suse-sles-15-sp3-chost-byos-v20220222-hvm-ssd-x86_64
+ chost:amazon/suse-sles-15-sp3-chost-byos-v20220310-hvm-ssd-x86_64
+ chost:amazon/suse-sles-15-sp3-chost-byos-v20220411-hvm-ssd-x86_64
+ chost:amazon/suse-sles-15-sp3-chost-byos-v20220510-hvm-ssd-x86_64
+ chost:amazon/suse-sles-15-sp3-chost-byos-v20220608-hvm-ssd-x86_64
+ chost:amazon/suse-sles-15-sp3-chost-byos-v20220708-hvm-ssd-x86_64
+ chost:amazon/suse-sles-15-sp3-chost-byos-v20220718-hvm-ssd-x86_64
+ chost:amazon/suse-sles-15-sp3-chost-byos-v20220818-hvm-ssd-x86_64
+ chost:amazon/suse-sles-15-sp3-chost-byos-v20220916-hvm-ssd-x86_64
+ chost:amazon/suse-sles-15-sp3-chost-byos-v20220921-hvm-ssd-x86_64
+ chost:amazon/suse-sles-15-sp3-chost-byos-v20221019-hvm-ssd-x86_64
+ chost:amazon/suse-sles-15-sp3-chost-byos-v20221119-hvm-ssd-x86_64
+ chost:amazon/suse-sles-15-sp3-chost-byos-v20221215-hvm-ssd-x86_64
+ chost:amazon/suse-sles-15-sp3-chost-byos-v20230313-hvm-ssd-x86_64
+ chost:amazon/suse-sles-15-sp3-chost-byos-v20230613-hvm-ssd-x86_64
+ chost:amazon/suse-sles-15-sp3-chost-byos-v20240807-hvm-ssd-x86_64
+ chost:amazon/suse-sles-15-sp3-chost-byos-v20240912-hvm-ssd-x86_64
+ chost:amazon/suse-sles-15-sp4-chost-byos-v20220718-hvm-ssd-x86_64
+ chost:amazon/suse-sles-15-sp4-chost-byos-v20220721-hvm-ssd-x86_64
+ chost:amazon/suse-sles-15-sp4-chost-byos-v20220819-hvm-ssd-x86_64
+ chost:amazon/suse-sles-15-sp4-chost-byos-v20220916-hvm-ssd-x86_64
+ chost:amazon/suse-sles-15-sp4-chost-byos-v20220923-hvm-ssd-x86_64
+ chost:amazon/suse-sles-15-sp4-chost-byos-v20221018-hvm-ssd-x86_64
+ chost:amazon/suse-sles-15-sp4-chost-byos-v20221118-hvm-ssd-x86_64
+ chost:amazon/suse-sles-15-sp4-chost-byos-v20221215-hvm-ssd-x86_64
+ chost:amazon/suse-sles-15-sp4-chost-byos-v20230111-hvm-ssd-x86_64
+ chost:amazon/suse-sles-15-sp4-chost-byos-v20230210-hvm-ssd-x86_64
+ chost:amazon/suse-sles-15-sp4-chost-byos-v20230310-hvm-ssd-x86_64
+ chost:amazon/suse-sles-15-sp4-chost-byos-v20230410-hvm-ssd-x86_64
+ chost:amazon/suse-sles-15-sp4-chost-byos-v20230510-hvm-ssd-x86_64
+ chost:amazon/suse-sles-15-sp4-chost-byos-v20230606-hvm-ssd-x86_64
+ chost:amazon/suse-sles-15-sp4-chost-byos-v20230704-hvm-ssd-x86_64
+ chost:amazon/suse-sles-15-sp4-chost-byos-v20230803-hvm-ssd-x86_64
+ chost:amazon/suse-sles-15-sp4-chost-byos-v20230901-hvm-ssd-x86_64
+ chost:amazon/suse-sles-15-sp4-chost-byos-v20230928-hvm-ssd-x86_64
+ chost:amazon/suse-sles-15-sp4-chost-byos-v20231027-hvm-ssd-x86_64
+ chost:amazon/suse-sles-15-sp4-chost-byos-v20231127-hvm-ssd-x86_64
+ chost:amazon/suse-sles-15-sp4-chost-byos-v20231212-hvm-ssd-x86_64
+ chost:amazon/suse-sles-15-sp4-chost-byos-v20240312-hvm-ssd-x86_64
+ chost:amazon/suse-sles-15-sp4-chost-byos-v20240612-hvm-ssd-x86_64
+ chost:amazon/suse-sles-15-sp4-chost-byos-v20240809-hvm-ssd-x86_64
+ chost:amazon/suse-sles-15-sp4-chost-byos-v20240912-hvm-ssd-x86_64
+ chost:google/sles-15-sp1-chost-byos-v20210202
+ chost:google/sles-15-sp1-chost-byos-v20210304
+ chost:google/sles-15-sp1-chost-byos-v20220127
+ chost:google/sles-15-sp1-chost-byos-v20220715-x86-64
+ chost:google/sles-15-sp2-chost-byos-v20210202
+ chost:google/sles-15-sp2-chost-byos-v20210304
+ chost:google/sles-15-sp2-chost-byos-v20210405
+ chost:google/sles-15-sp2-chost-byos-v20210506
+ chost:google/sles-15-sp2-chost-byos-v20210610
+ chost:google/sles-15-sp2-chost-byos-v20210722
+ chost:google/sles-15-sp2-chost-byos-v20210913
+ chost:google/sles-15-sp2-chost-byos-v20211025
+ chost:google/sles-15-sp2-chost-byos-v20220126
+ chost:google/sles-15-sp2-chost-byos-v20220718-x86-64
+ chost:google/sles-15-sp3-chost-byos-v20210729
+ chost:google/sles-15-sp3-chost-byos-v20210827
+ chost:google/sles-15-sp3-chost-byos-v20210927
+ chost:google/sles-15-sp3-chost-byos-v20211004
+ chost:google/sles-15-sp3-chost-byos-v20211101
+ chost:google/sles-15-sp3-chost-byos-v20211202
+ chost:google/sles-15-sp3-chost-byos-v20220103
+ chost:google/sles-15-sp3-chost-byos-v20220126
+ chost:google/sles-15-sp3-chost-byos-v20220222
+ chost:google/sles-15-sp3-chost-byos-v20220310
+ chost:google/sles-15-sp3-chost-byos-v20220411-x86-64
+ chost:google/sles-15-sp3-chost-byos-v20220510-x86-64
+ chost:google/sles-15-sp3-chost-byos-v20220608-x86-64
+ chost:google/sles-15-sp3-chost-byos-v20220708-x86-64
+ chost:google/sles-15-sp3-chost-byos-v20220718-x86-64
+ chost:google/sles-15-sp3-chost-byos-v20220818-x86-64
+ chost:google/sles-15-sp3-chost-byos-v20220916-x86-64
+ chost:google/sles-15-sp3-chost-byos-v20221019-x86-64
+ chost:google/sles-15-sp3-chost-byos-v20221118-x86-64
+ chost:google/sles-15-sp3-chost-byos-v20221215-x86-64
+ chost:google/sles-15-sp3-chost-byos-v20230313-x86-64
+ chost:google/sles-15-sp3-chost-byos-v20230613-x86-64
+ chost:google/sles-15-sp3-chost-byos-v20240807-x86-64
+ chost:google/sles-15-sp3-chost-byos-v20240912-x86-64
+ chost:google/sles-15-sp4-chost-byos-v20220718-x86-64
+ chost:google/sles-15-sp4-chost-byos-v20220721-x86-64
+ chost:google/sles-15-sp4-chost-byos-v20220818-x86-64
+ chost:google/sles-15-sp4-chost-byos-v20220916-x86-64
+ chost:google/sles-15-sp4-chost-byos-v20221018-x86-64
+ chost:google/sles-15-sp4-chost-byos-v20221118-x86-64
+ chost:google/sles-15-sp4-chost-byos-v20221215-arm64
+ chost:google/sles-15-sp4-chost-byos-v20221215-x86-64
+ chost:google/sles-15-sp4-chost-byos-v20230111-arm64
+ chost:google/sles-15-sp4-chost-byos-v20230111-x86-64
+ chost:google/sles-15-sp4-chost-byos-v20230210-arm64
+ chost:google/sles-15-sp4-chost-byos-v20230210-x86-64
+ chost:google/sles-15-sp4-chost-byos-v20230310-arm64
+ chost:google/sles-15-sp4-chost-byos-v20230310-x86-64
+ chost:google/sles-15-sp4-chost-byos-v20230410-arm64
+ chost:google/sles-15-sp4-chost-byos-v20230410-x86-64
+ chost:google/sles-15-sp4-chost-byos-v20230510-arm64
+ chost:google/sles-15-sp4-chost-byos-v20230510-x86-64
+ chost:google/sles-15-sp4-chost-byos-v20230606-arm64
+ chost:google/sles-15-sp4-chost-byos-v20230606-x86-64
+ chost:google/sles-15-sp4-chost-byos-v20230704-arm64
+ chost:google/sles-15-sp4-chost-byos-v20230704-x86-64
+ chost:google/sles-15-sp4-chost-byos-v20230804-arm64
+ chost:google/sles-15-sp4-chost-byos-v20230804-x86-64
+ chost:google/sles-15-sp4-chost-byos-v20230901-arm64
+ chost:google/sles-15-sp4-chost-byos-v20230901-x86-64
+ chost:google/sles-15-sp4-chost-byos-v20230928-arm64
+ chost:google/sles-15-sp4-chost-byos-v20230928-x86-64
+ chost:google/sles-15-sp4-chost-byos-v20231027-arm64
+ chost:google/sles-15-sp4-chost-byos-v20231027-x86-64
+ chost:google/sles-15-sp4-chost-byos-v20231127-arm64
+ chost:google/sles-15-sp4-chost-byos-v20231127-x86-64
+ chost:google/sles-15-sp4-chost-byos-v20231212-arm64
+ chost:google/sles-15-sp4-chost-byos-v20231212-x86-64
+ chost:google/sles-15-sp4-chost-byos-v20240312-arm64
+ chost:google/sles-15-sp4-chost-byos-v20240312-x86-64
+ chost:google/sles-15-sp4-chost-byos-v20240612-arm64
+ chost:google/sles-15-sp4-chost-byos-v20240612-x86-64
+ chost:google/sles-15-sp4-chost-byos-v20240809-arm64
+ chost:google/sles-15-sp4-chost-byos-v20240809-x86-64
+ chost:google/sles-15-sp4-chost-byos-v20240912-arm64
+ chost:google/sles-15-sp4-chost-byos-v20240912-x86-64
+ chost:microsoft/suse-sles-15-sp1-chost-byos-v20210202
+ chost:microsoft/suse-sles-15-sp1-chost-byos-v20210304
+ chost:microsoft/suse-sles-15-sp1-chost-byos-v20220127
+ chost:microsoft/suse-sles-15-sp1-chost-byos-v20220715-x86_64
+ chost:microsoft/suse-sles-15-sp2-chost-byos-v20210202
+ chost:microsoft/suse-sles-15-sp2-chost-byos-v20210304
+ chost:microsoft/suse-sles-15-sp2-chost-byos-v20210405
+ chost:microsoft/suse-sles-15-sp2-chost-byos-v20210506
+ chost:microsoft/suse-sles-15-sp2-chost-byos-v20210610
+ chost:microsoft/suse-sles-15-sp2-chost-byos-v20210722
+ chost:microsoft/suse-sles-15-sp2-chost-byos-v20210913
+ chost:microsoft/suse-sles-15-sp2-chost-byos-v20211025
+ chost:microsoft/suse-sles-15-sp2-chost-byos-v20220126
+ chost:microsoft/suse-sles-15-sp2-chost-byos-v20220718-x86_64
+ chost:microsoft/suse-sles-15-sp3-chost-byos-v20210729
+ chost:microsoft/suse-sles-15-sp3-chost-byos-v20210827
+ chost:microsoft/suse-sles-15-sp3-chost-byos-v20210927
+ chost:microsoft/suse-sles-15-sp3-chost-byos-v20211004
+ chost:microsoft/suse-sles-15-sp3-chost-byos-v20211101
+ chost:microsoft/suse-sles-15-sp3-chost-byos-v20211202
+ chost:microsoft/suse-sles-15-sp3-chost-byos-v20220103
+ chost:microsoft/suse-sles-15-sp3-chost-byos-v20220126
+ chost:microsoft/suse-sles-15-sp3-chost-byos-v20220222
+ chost:microsoft/suse-sles-15-sp3-chost-byos-v20220310
+ chost:microsoft/suse-sles-15-sp3-chost-byos-v20220411-x86_64
+ chost:microsoft/suse-sles-15-sp3-chost-byos-v20220510-x86_64
+ chost:microsoft/suse-sles-15-sp3-chost-byos-v20220609-x86_64
+ chost:microsoft/suse-sles-15-sp3-chost-byos-v20220708-x86_64
+ chost:microsoft/suse-sles-15-sp3-chost-byos-v20220718-x86_64
+ chost:microsoft/suse-sles-15-sp3-chost-byos-v20220818-x86_64
+ chost:microsoft/suse-sles-15-sp3-chost-byos-v20220916-x86_64
+ chost:microsoft/suse-sles-15-sp3-chost-byos-v20220921-x86_64
+ chost:microsoft/suse-sles-15-sp3-chost-byos-v20221019-x86_64
+ chost:microsoft/suse-sles-15-sp3-chost-byos-v20221119-x86_64
+ chost:microsoft/suse-sles-15-sp3-chost-byos-v20221215-x86_64
+ chost:microsoft/suse-sles-15-sp3-chost-byos-v20230313-x86_64
+ chost:microsoft/suse-sles-15-sp3-chost-byos-v20230613-x86_64
+ chost:microsoft/suse-sles-15-sp3-chost-byos-v20240807-x86_64
+ chost:microsoft/suse-sles-15-sp3-chost-byos-v20240912-x86_64
+ chost:microsoft/suse-sles-15-sp4-chost-byos-v20220718-x86_64
+ chost:microsoft/suse-sles-15-sp4-chost-byos-v20220721-x86_64
+ chost:microsoft/suse-sles-15-sp4-chost-byos-v20220819-x86_64
+ chost:microsoft/suse-sles-15-sp4-chost-byos-v20220916-x86_64
+ chost:microsoft/suse-sles-15-sp4-chost-byos-v20220923-x86_64
+ chost:microsoft/suse-sles-15-sp4-chost-byos-v20221018-x86_64
+ chost:microsoft/suse-sles-15-sp4-chost-byos-v20221118-x86_64
+ chost:microsoft/suse-sles-15-sp4-chost-byos-v20221215-arm64
+ chost:microsoft/suse-sles-15-sp4-chost-byos-v20221215-x86_64
+ chost:microsoft/suse-sles-15-sp4-chost-byos-v20230111-arm64
+ chost:microsoft/suse-sles-15-sp4-chost-byos-v20230111-x86_64
+ chost:microsoft/suse-sles-15-sp4-chost-byos-v20230210-arm64
+ chost:microsoft/suse-sles-15-sp4-chost-byos-v20230210-x86_64
+ chost:microsoft/suse-sles-15-sp4-chost-byos-v20230310-arm64
+ chost:microsoft/suse-sles-15-sp4-chost-byos-v20230310-x86_64
+ chost:microsoft/suse-sles-15-sp4-chost-byos-v20230410-arm64
+ chost:microsoft/suse-sles-15-sp4-chost-byos-v20230410-x86_64
+ chost:microsoft/suse-sles-15-sp4-chost-byos-v20230510-arm64
+ chost:microsoft/suse-sles-15-sp4-chost-byos-v20230510-x86_64
+ chost:microsoft/suse-sles-15-sp4-chost-byos-v20230606-arm64
+ chost:microsoft/suse-sles-15-sp4-chost-byos-v20230606-x86_64
+ chost:microsoft/suse-sles-15-sp4-chost-byos-v20230704-arm64
+ chost:microsoft/suse-sles-15-sp4-chost-byos-v20230704-x86_64
+ chost:microsoft/suse-sles-15-sp4-chost-byos-v20230803-arm64
+ chost:microsoft/suse-sles-15-sp4-chost-byos-v20230803-x86_64
+ chost:microsoft/suse-sles-15-sp4-chost-byos-v20230901-arm64
+ chost:microsoft/suse-sles-15-sp4-chost-byos-v20230901-x86_64
+ chost:microsoft/suse-sles-15-sp4-chost-byos-v20230928-arm64
+ chost:microsoft/suse-sles-15-sp4-chost-byos-v20230928-x86_64
+ chost:microsoft/suse-sles-15-sp4-chost-byos-v20231027-arm64
+ chost:microsoft/suse-sles-15-sp4-chost-byos-v20231027-x86_64
+ chost:microsoft/suse-sles-15-sp4-chost-byos-v20231127-arm64
+ chost:microsoft/suse-sles-15-sp4-chost-byos-v20231127-x86_64
+ chost:microsoft/suse-sles-15-sp4-chost-byos-v20231212-arm64
+ chost:microsoft/suse-sles-15-sp4-chost-byos-v20231212-x86_64
+ chost:microsoft/suse-sles-15-sp4-chost-byos-v20240312-arm64
+ chost:microsoft/suse-sles-15-sp4-chost-byos-v20240312-x86_64
+ chost:microsoft/suse-sles-15-sp4-chost-byos-v20240612-arm64
+ chost:microsoft/suse-sles-15-sp4-chost-byos-v20240612-x86_64
+ chost:microsoft/suse-sles-15-sp4-chost-byos-v20240809-arm64
+ chost:microsoft/suse-sles-15-sp4-chost-byos-v20240809-x86_64
+ chost:microsoft/suse-sles-15-sp4-chost-byos-v20240912-arm64
+ chost:microsoft/suse-sles-15-sp4-chost-byos-v20240912-x86_64
+
skipping CVE-2024-46768 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-46767 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-46766 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-46765 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-46764 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-46763 as CVE page is older than CVRF-CVE file.
no cpe found for SUSE Linux Enterprise Module for Confidential Computing Technical Preview 15 SP6 in CVE-2024-46761
--- /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2024-46761.xml 2024-10-17 01:11:00.653897000 +0200
+++ /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2024-46761.xml.new 2024-10-29 01:12:50.202917000 +0100
@@ -14,13 +14,13 @@
1
- 12
- 2024-10-16T23:11:00Z
+ 13
+ 2024-10-29T00:12:49Z
current
2024-09-18T23:10:13Z
- 2024-10-16T23:11:00Z
+ 2024-10-29T00:12:49Z
cve-database/bin/generate-cvrf-cve.pl
2020-12-27T01:00:00Z
@@ -118,6 +118,21 @@
Container suse/sle-micro/rt-5.5:2.0.4-4.5.211
+
+
+ Image SLES12-SP5-GCE-BYOS
+
+
+
+
+ Image SLES12-SP5-GCE-SAP-BYOS
+
+
+
+
+ Image SLES12-SP5-GCE-SAP-On-Demand
+
+
Image SLES15-SP5-CHOST-BYOS-Aliyun
@@ -1565,6 +1580,39 @@
kernel-rt-5.14.21-150500.13.73.1 as a component of Container suse/sle-micro/rt-5.5:2.0.4-4.5.211
+
+ kernel-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-BYOS
+
+
+ cluster-md-kmp-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ dlm-kmp-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ gfs2-kmp-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ kernel-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ ocfs2-kmp-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ cluster-md-kmp-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
+
+ dlm-kmp-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
+
+ gfs2-kmp-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
+
+ kernel-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
+
+ ocfs2-kmp-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
kernel-default-5.14.21-150500.55.83.1 as a component of Image SLES15-SP5-CHOST-BYOS-Aliyun
@@ -3042,6 +3090,17 @@
Container suse/hpc/warewulf4-x86_64/sle-hpc-node:15.6.17.5.49:kernel-default-6.4.0-150600.23.25.1
Container suse/sle-micro/kvm-5.5:2.0.4-3.5.197:kernel-default-base-5.14.21-150500.55.83.1.150500.6.37.1
Container suse/sle-micro/rt-5.5:2.0.4-4.5.211:kernel-rt-5.14.21-150500.13.73.1
+ Image SLES12-SP5-GCE-BYOS:kernel-default-4.12.14-122.231.1
+ Image SLES12-SP5-GCE-SAP-BYOS:cluster-md-kmp-default-4.12.14-122.231.1
+ Image SLES12-SP5-GCE-SAP-BYOS:dlm-kmp-default-4.12.14-122.231.1
+ Image SLES12-SP5-GCE-SAP-BYOS:gfs2-kmp-default-4.12.14-122.231.1
+ Image SLES12-SP5-GCE-SAP-BYOS:kernel-default-4.12.14-122.231.1
+ Image SLES12-SP5-GCE-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.231.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:cluster-md-kmp-default-4.12.14-122.231.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:dlm-kmp-default-4.12.14-122.231.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:gfs2-kmp-default-4.12.14-122.231.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:kernel-default-4.12.14-122.231.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:ocfs2-kmp-default-4.12.14-122.231.1
Image SLES15-SP5-CHOST-BYOS-Aliyun:kernel-default-5.14.21-150500.55.83.1
Image SLES15-SP5-CHOST-BYOS-Azure:kernel-default-5.14.21-150500.55.83.1
Image SLES15-SP5-CHOST-BYOS-EC2:kernel-default-5.14.21-150500.55.83.1
no cpe found for SUSE Linux Enterprise Module for Confidential Computing Technical Preview 15 SP6 in CVE-2024-46759
skipping CVE-2024-46760 as CVE page is older than CVRF-CVE file.
--- /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2024-46759.xml 2024-10-22 01:14:05.267799000 +0200
+++ /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2024-46759.xml.new 2024-10-29 01:12:51.059867000 +0100
@@ -14,13 +14,13 @@
1
- 11
- 2024-10-21T23:14:04Z
+ 12
+ 2024-10-29T00:12:50Z
current
2024-09-18T23:10:14Z
- 2024-10-21T23:14:04Z
+ 2024-10-29T00:12:50Z
cve-database/bin/generate-cvrf-cve.pl
2020-12-27T01:00:00Z
@@ -109,6 +109,21 @@
Container suse/sle-micro/rt-5.5:2.0.4-4.5.211
+
+
+ Image SLES12-SP5-GCE-BYOS
+
+
+
+
+ Image SLES12-SP5-GCE-SAP-BYOS
+
+
+
+
+ Image SLES12-SP5-GCE-SAP-On-Demand
+
+
Image SLES15-SP5-CHOST-BYOS-Aliyun
@@ -1405,6 +1420,39 @@
kernel-rt-5.14.21-150500.13.73.1 as a component of Container suse/sle-micro/rt-5.5:2.0.4-4.5.211
+
+ kernel-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-BYOS
+
+
+ cluster-md-kmp-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ dlm-kmp-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ gfs2-kmp-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ kernel-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ ocfs2-kmp-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ cluster-md-kmp-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
+
+ dlm-kmp-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
+
+ gfs2-kmp-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
+
+ kernel-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
+
+ ocfs2-kmp-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
kernel-default-5.14.21-150500.55.83.1 as a component of Image SLES15-SP5-CHOST-BYOS-Aliyun
@@ -2522,6 +2570,17 @@
Container suse/hpc/warewulf4-x86_64/sle-hpc-node:15.6.17.5.49:kernel-default-6.4.0-150600.23.25.1
Container suse/sle-micro/kvm-5.5:2.0.4-3.5.197:kernel-default-base-5.14.21-150500.55.83.1.150500.6.37.1
Container suse/sle-micro/rt-5.5:2.0.4-4.5.211:kernel-rt-5.14.21-150500.13.73.1
+ Image SLES12-SP5-GCE-BYOS:kernel-default-4.12.14-122.231.1
+ Image SLES12-SP5-GCE-SAP-BYOS:cluster-md-kmp-default-4.12.14-122.231.1
+ Image SLES12-SP5-GCE-SAP-BYOS:dlm-kmp-default-4.12.14-122.231.1
+ Image SLES12-SP5-GCE-SAP-BYOS:gfs2-kmp-default-4.12.14-122.231.1
+ Image SLES12-SP5-GCE-SAP-BYOS:kernel-default-4.12.14-122.231.1
+ Image SLES12-SP5-GCE-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.231.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:cluster-md-kmp-default-4.12.14-122.231.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:dlm-kmp-default-4.12.14-122.231.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:gfs2-kmp-default-4.12.14-122.231.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:kernel-default-4.12.14-122.231.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:ocfs2-kmp-default-4.12.14-122.231.1
Image SLES15-SP5-CHOST-BYOS-Aliyun:kernel-default-5.14.21-150500.55.83.1
Image SLES15-SP5-CHOST-BYOS-Azure:kernel-default-5.14.21-150500.55.83.1
Image SLES15-SP5-CHOST-BYOS-EC2:kernel-default-5.14.21-150500.55.83.1
no cpe found for SUSE Linux Enterprise Module for Confidential Computing Technical Preview 15 SP6 in CVE-2024-46753
skipping CVE-2024-46758 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-46757 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-46756 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-46755 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-46754 as CVE page is older than CVRF-CVE file.
--- /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2024-46753.xml 2024-10-16 01:11:56.266813000 +0200
+++ /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2024-46753.xml.new 2024-10-29 01:12:52.141800000 +0100
@@ -14,13 +14,13 @@
1
- 11
- 2024-10-15T23:11:55Z
+ 12
+ 2024-10-29T00:12:51Z
current
2024-09-18T23:10:15Z
- 2024-10-15T23:11:55Z
+ 2024-10-29T00:12:51Z
cve-database/bin/generate-cvrf-cve.pl
2020-12-27T01:00:00Z
@@ -108,6 +108,21 @@
Container suse/sle-micro/rt-5.5:2.0.4-4.5.211
+
+
+ Image SLES12-SP5-GCE-BYOS
+
+
+
+
+ Image SLES12-SP5-GCE-SAP-BYOS
+
+
+
+
+ Image SLES12-SP5-GCE-SAP-On-Demand
+
+
Image SLES15-SP5-CHOST-BYOS-Aliyun
@@ -1572,6 +1587,39 @@
kernel-rt-5.14.21-150500.13.73.1 as a component of Container suse/sle-micro/rt-5.5:2.0.4-4.5.211
+
+ kernel-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-BYOS
+
+
+ cluster-md-kmp-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ dlm-kmp-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ gfs2-kmp-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ kernel-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ ocfs2-kmp-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ cluster-md-kmp-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
+
+ dlm-kmp-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
+
+ gfs2-kmp-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
+
+ kernel-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
+
+ ocfs2-kmp-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
kernel-default-5.14.21-150500.55.83.1 as a component of Image SLES15-SP5-CHOST-BYOS-Aliyun
@@ -3093,6 +3141,17 @@
Container suse/hpc/warewulf4-x86_64/sle-hpc-node:15.6.17.5.49:kernel-default-6.4.0-150600.23.25.1
Container suse/sle-micro/kvm-5.5:2.0.4-3.5.197:kernel-default-base-5.14.21-150500.55.83.1.150500.6.37.1
Container suse/sle-micro/rt-5.5:2.0.4-4.5.211:kernel-rt-5.14.21-150500.13.73.1
+ Image SLES12-SP5-GCE-BYOS:kernel-default-4.12.14-122.231.1
+ Image SLES12-SP5-GCE-SAP-BYOS:cluster-md-kmp-default-4.12.14-122.231.1
+ Image SLES12-SP5-GCE-SAP-BYOS:dlm-kmp-default-4.12.14-122.231.1
+ Image SLES12-SP5-GCE-SAP-BYOS:gfs2-kmp-default-4.12.14-122.231.1
+ Image SLES12-SP5-GCE-SAP-BYOS:kernel-default-4.12.14-122.231.1
+ Image SLES12-SP5-GCE-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.231.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:cluster-md-kmp-default-4.12.14-122.231.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:dlm-kmp-default-4.12.14-122.231.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:gfs2-kmp-default-4.12.14-122.231.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:kernel-default-4.12.14-122.231.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:ocfs2-kmp-default-4.12.14-122.231.1
Image SLES15-SP5-CHOST-BYOS-Aliyun:kernel-default-5.14.21-150500.55.83.1
Image SLES15-SP5-CHOST-BYOS-Azure:kernel-default-5.14.21-150500.55.83.1
Image SLES15-SP5-CHOST-BYOS-EC2:kernel-default-5.14.21-150500.55.83.1
no cpe found for SUSE Linux Enterprise Module for Confidential Computing Technical Preview 15 SP6 in CVE-2024-46750
skipping CVE-2024-46752 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-46751 as CVE page is older than CVRF-CVE file.
--- /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2024-46750.xml 2024-10-17 01:11:04.282672000 +0200
+++ /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2024-46750.xml.new 2024-10-29 01:12:52.838771000 +0100
@@ -14,13 +14,13 @@
1
- 11
- 2024-10-16T23:11:03Z
+ 12
+ 2024-10-29T00:12:52Z
current
2024-09-18T23:10:16Z
- 2024-10-16T23:11:03Z
+ 2024-10-29T00:12:52Z
cve-database/bin/generate-cvrf-cve.pl
2020-12-27T01:00:00Z
@@ -140,6 +140,21 @@
Container suse/sle-micro/rt-5.5:2.0.4-4.5.211
+
+
+ Image SLES12-SP5-GCE-BYOS
+
+
+
+
+ Image SLES12-SP5-GCE-SAP-BYOS
+
+
+
+
+ Image SLES12-SP5-GCE-SAP-On-Demand
+
+
Image SLES15-SP5-CHOST-BYOS-Aliyun
@@ -1604,6 +1619,39 @@
kernel-rt-5.14.21-150500.13.73.1 as a component of Container suse/sle-micro/rt-5.5:2.0.4-4.5.211
+
+ kernel-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-BYOS
+
+
+ cluster-md-kmp-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ dlm-kmp-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ gfs2-kmp-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ kernel-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ ocfs2-kmp-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ cluster-md-kmp-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
+
+ dlm-kmp-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
+
+ gfs2-kmp-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
+
+ kernel-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
+
+ ocfs2-kmp-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
kernel-default-5.14.21-150500.55.83.1 as a component of Image SLES15-SP5-CHOST-BYOS-Aliyun
@@ -3157,6 +3205,17 @@
Container suse/hpc/warewulf4-x86_64/sle-hpc-node:15.6.17.5.49:kernel-default-6.4.0-150600.23.25.1
Container suse/sle-micro/kvm-5.5:2.0.4-3.5.197:kernel-default-base-5.14.21-150500.55.83.1.150500.6.37.1
Container suse/sle-micro/rt-5.5:2.0.4-4.5.211:kernel-rt-5.14.21-150500.13.73.1
+ Image SLES12-SP5-GCE-BYOS:kernel-default-4.12.14-122.231.1
+ Image SLES12-SP5-GCE-SAP-BYOS:cluster-md-kmp-default-4.12.14-122.231.1
+ Image SLES12-SP5-GCE-SAP-BYOS:dlm-kmp-default-4.12.14-122.231.1
+ Image SLES12-SP5-GCE-SAP-BYOS:gfs2-kmp-default-4.12.14-122.231.1
+ Image SLES12-SP5-GCE-SAP-BYOS:kernel-default-4.12.14-122.231.1
+ Image SLES12-SP5-GCE-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.231.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:cluster-md-kmp-default-4.12.14-122.231.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:dlm-kmp-default-4.12.14-122.231.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:gfs2-kmp-default-4.12.14-122.231.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:kernel-default-4.12.14-122.231.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:ocfs2-kmp-default-4.12.14-122.231.1
Image SLES15-SP5-CHOST-BYOS-Aliyun:kernel-default-5.14.21-150500.55.83.1
Image SLES15-SP5-CHOST-BYOS-Azure:kernel-default-5.14.21-150500.55.83.1
Image SLES15-SP5-CHOST-BYOS-EC2:kernel-default-5.14.21-150500.55.83.1
no cpe found for SUSE Linux Enterprise Module for Confidential Computing Technical Preview 15 SP6 in CVE-2024-46747
skipping CVE-2024-46749 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-46748 as CVE page is older than CVRF-CVE file.
no cpe found for SUSE Linux Enterprise Module for Confidential Computing Technical Preview 15 SP6 in CVE-2024-46746
no cpe found for SUSE Linux Enterprise Module for Confidential Computing Technical Preview 15 SP6 in CVE-2024-46745
--- /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2024-46745.xml 2024-10-22 01:14:20.405934000 +0200
+++ /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2024-46745.xml.new 2024-10-29 01:12:54.567171000 +0100
@@ -14,13 +14,13 @@
1
- 12
- 2024-10-21T23:14:19Z
+ 13
+ 2024-10-29T00:12:54Z
current
2024-09-18T23:10:17Z
- 2024-10-21T23:14:19Z
+ 2024-10-29T00:12:54Z
cve-database/bin/generate-cvrf-cve.pl
2020-12-27T01:00:00Z
@@ -116,6 +116,21 @@
Container suse/sle-micro/rt-5.5:2.0.4-4.5.211
+
+
+ Image SLES12-SP5-GCE-BYOS
+
+
+
+
+ Image SLES12-SP5-GCE-SAP-BYOS
+
+
+
+
+ Image SLES12-SP5-GCE-SAP-On-Demand
+
+
Image SLES15-SP5-CHOST-BYOS-Aliyun
@@ -1555,6 +1570,39 @@
kernel-rt-5.14.21-150500.13.73.1 as a component of Container suse/sle-micro/rt-5.5:2.0.4-4.5.211
+
+ kernel-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-BYOS
+
+
+ cluster-md-kmp-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ dlm-kmp-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ gfs2-kmp-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ kernel-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ ocfs2-kmp-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ cluster-md-kmp-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
+
+ dlm-kmp-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
+
+ gfs2-kmp-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
+
+ kernel-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
+
+ ocfs2-kmp-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
kernel-default-5.14.21-150500.55.83.1 as a component of Image SLES15-SP5-CHOST-BYOS-Aliyun
@@ -3060,6 +3108,17 @@
Container suse/hpc/warewulf4-x86_64/sle-hpc-node:15.6.17.5.49:kernel-default-6.4.0-150600.23.25.1
Container suse/sle-micro/kvm-5.5:2.0.4-3.5.197:kernel-default-base-5.14.21-150500.55.83.1.150500.6.37.1
Container suse/sle-micro/rt-5.5:2.0.4-4.5.211:kernel-rt-5.14.21-150500.13.73.1
+ Image SLES12-SP5-GCE-BYOS:kernel-default-4.12.14-122.231.1
+ Image SLES12-SP5-GCE-SAP-BYOS:cluster-md-kmp-default-4.12.14-122.231.1
+ Image SLES12-SP5-GCE-SAP-BYOS:dlm-kmp-default-4.12.14-122.231.1
+ Image SLES12-SP5-GCE-SAP-BYOS:gfs2-kmp-default-4.12.14-122.231.1
+ Image SLES12-SP5-GCE-SAP-BYOS:kernel-default-4.12.14-122.231.1
+ Image SLES12-SP5-GCE-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.231.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:cluster-md-kmp-default-4.12.14-122.231.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:dlm-kmp-default-4.12.14-122.231.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:gfs2-kmp-default-4.12.14-122.231.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:kernel-default-4.12.14-122.231.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:ocfs2-kmp-default-4.12.14-122.231.1
Image SLES15-SP5-CHOST-BYOS-Aliyun:kernel-default-5.14.21-150500.55.83.1
Image SLES15-SP5-CHOST-BYOS-Azure:kernel-default-5.14.21-150500.55.83.1
Image SLES15-SP5-CHOST-BYOS-EC2:kernel-default-5.14.21-150500.55.83.1
no cpe found for SUSE Linux Enterprise Module for Confidential Computing Technical Preview 15 SP6 in CVE-2024-46744
--- /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2024-46744.xml 2024-10-25 01:12:12.118884000 +0200
+++ /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2024-46744.xml.new 2024-10-29 01:12:55.262146000 +0100
@@ -14,13 +14,13 @@
1
- 13
- 2024-10-24T23:12:11Z
+ 14
+ 2024-10-29T00:12:54Z
current
2024-09-18T23:10:18Z
- 2024-10-24T23:12:11Z
+ 2024-10-29T00:12:54Z
cve-database/bin/generate-cvrf-cve.pl
2020-12-27T01:00:00Z
@@ -132,6 +132,21 @@
Container suse/sle-micro/rt-5.5:2.0.4-4.5.211
+
+
+ Image SLES12-SP5-GCE-BYOS
+
+
+
+
+ Image SLES12-SP5-GCE-SAP-BYOS
+
+
+
+
+ Image SLES12-SP5-GCE-SAP-On-Demand
+
+
Image SLES15-SP5-CHOST-BYOS-Aliyun
@@ -1566,6 +1581,39 @@
kernel-rt-5.14.21-150500.13.73.1 as a component of Container suse/sle-micro/rt-5.5:2.0.4-4.5.211
+
+ kernel-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-BYOS
+
+
+ cluster-md-kmp-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ dlm-kmp-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ gfs2-kmp-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ kernel-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ ocfs2-kmp-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ cluster-md-kmp-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
+
+ dlm-kmp-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
+
+ gfs2-kmp-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
+
+ kernel-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
+
+ ocfs2-kmp-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
kernel-default-5.14.21-150500.55.83.1 as a component of Image SLES15-SP5-CHOST-BYOS-Aliyun
@@ -3075,6 +3123,17 @@
Container suse/hpc/warewulf4-x86_64/sle-hpc-node:15.6.17.5.49:kernel-default-6.4.0-150600.23.25.1
Container suse/sle-micro/kvm-5.5:2.0.4-3.5.197:kernel-default-base-5.14.21-150500.55.83.1.150500.6.37.1
Container suse/sle-micro/rt-5.5:2.0.4-4.5.211:kernel-rt-5.14.21-150500.13.73.1
+ Image SLES12-SP5-GCE-BYOS:kernel-default-4.12.14-122.231.1
+ Image SLES12-SP5-GCE-SAP-BYOS:cluster-md-kmp-default-4.12.14-122.231.1
+ Image SLES12-SP5-GCE-SAP-BYOS:dlm-kmp-default-4.12.14-122.231.1
+ Image SLES12-SP5-GCE-SAP-BYOS:gfs2-kmp-default-4.12.14-122.231.1
+ Image SLES12-SP5-GCE-SAP-BYOS:kernel-default-4.12.14-122.231.1
+ Image SLES12-SP5-GCE-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.231.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:cluster-md-kmp-default-4.12.14-122.231.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:dlm-kmp-default-4.12.14-122.231.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:gfs2-kmp-default-4.12.14-122.231.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:kernel-default-4.12.14-122.231.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:ocfs2-kmp-default-4.12.14-122.231.1
Image SLES15-SP5-CHOST-BYOS-Aliyun:kernel-default-5.14.21-150500.55.83.1
Image SLES15-SP5-CHOST-BYOS-Azure:kernel-default-5.14.21-150500.55.83.1
Image SLES15-SP5-CHOST-BYOS-EC2:kernel-default-5.14.21-150500.55.83.1
no cpe found for SUSE Linux Enterprise Module for Confidential Computing Technical Preview 15 SP6 in CVE-2024-46743
--- /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2024-46743.xml 2024-10-16 01:12:00.276578000 +0200
+++ /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2024-46743.xml.new 2024-10-29 01:12:55.961133000 +0100
@@ -14,13 +14,13 @@
1
- 12
- 2024-10-15T23:11:59Z
+ 13
+ 2024-10-29T00:12:55Z
current
2024-09-18T23:10:18Z
- 2024-10-15T23:11:59Z
+ 2024-10-29T00:12:55Z
cve-database/bin/generate-cvrf-cve.pl
2020-12-27T01:00:00Z
@@ -170,6 +170,21 @@
Container suse/sle-micro/rt-5.5:2.0.4-4.5.211
+
+
+ Image SLES12-SP5-GCE-BYOS
+
+
+
+
+ Image SLES12-SP5-GCE-SAP-BYOS
+
+
+
+
+ Image SLES12-SP5-GCE-SAP-On-Demand
+
+
Image SLES15-SP5-CHOST-BYOS-Aliyun
@@ -1549,6 +1564,39 @@
kernel-rt-5.14.21-150500.13.73.1 as a component of Container suse/sle-micro/rt-5.5:2.0.4-4.5.211
+
+ kernel-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-BYOS
+
+
+ cluster-md-kmp-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ dlm-kmp-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ gfs2-kmp-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ kernel-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ ocfs2-kmp-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ cluster-md-kmp-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
+
+ dlm-kmp-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
+
+ gfs2-kmp-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
+
+ kernel-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
+
+ ocfs2-kmp-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
kernel-default-5.14.21-150500.55.83.1 as a component of Image SLES15-SP5-CHOST-BYOS-Aliyun
@@ -2907,6 +2955,17 @@
Container suse/hpc/warewulf4-x86_64/sle-hpc-node:15.6.17.5.49:kernel-default-6.4.0-150600.23.25.1
Container suse/sle-micro/kvm-5.5:2.0.4-3.5.197:kernel-default-base-5.14.21-150500.55.83.1.150500.6.37.1
Container suse/sle-micro/rt-5.5:2.0.4-4.5.211:kernel-rt-5.14.21-150500.13.73.1
+ Image SLES12-SP5-GCE-BYOS:kernel-default-4.12.14-122.231.1
+ Image SLES12-SP5-GCE-SAP-BYOS:cluster-md-kmp-default-4.12.14-122.231.1
+ Image SLES12-SP5-GCE-SAP-BYOS:dlm-kmp-default-4.12.14-122.231.1
+ Image SLES12-SP5-GCE-SAP-BYOS:gfs2-kmp-default-4.12.14-122.231.1
+ Image SLES12-SP5-GCE-SAP-BYOS:kernel-default-4.12.14-122.231.1
+ Image SLES12-SP5-GCE-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.231.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:cluster-md-kmp-default-4.12.14-122.231.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:dlm-kmp-default-4.12.14-122.231.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:gfs2-kmp-default-4.12.14-122.231.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:kernel-default-4.12.14-122.231.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:ocfs2-kmp-default-4.12.14-122.231.1
Image SLES15-SP5-CHOST-BYOS-Aliyun:kernel-default-5.14.21-150500.55.83.1
Image SLES15-SP5-CHOST-BYOS-Azure:kernel-default-5.14.21-150500.55.83.1
Image SLES15-SP5-CHOST-BYOS-EC2:kernel-default-5.14.21-150500.55.83.1
no cpe found for SUSE Linux Enterprise Module for Confidential Computing Technical Preview 15 SP6 in CVE-2024-46739
skipping CVE-2024-46742 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-46741 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-46740 as CVE page is older than CVRF-CVE file.
--- /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2024-46739.xml 2024-10-22 01:14:27.280081000 +0200
+++ /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2024-46739.xml.new 2024-10-29 01:12:56.564107000 +0100
@@ -14,13 +14,13 @@
1
- 10
- 2024-10-21T23:14:26Z
+ 11
+ 2024-10-29T00:12:56Z
current
2024-09-18T23:10:19Z
- 2024-10-21T23:14:26Z
+ 2024-10-29T00:12:56Z
cve-database/bin/generate-cvrf-cve.pl
2020-12-27T01:00:00Z
@@ -112,6 +112,21 @@
Container suse/sle-micro/rt-5.5:2.0.4-4.5.211
+
+
+ Image SLES12-SP5-GCE-BYOS
+
+
+
+
+ Image SLES12-SP5-GCE-SAP-BYOS
+
+
+
+
+ Image SLES12-SP5-GCE-SAP-On-Demand
+
+
Image SLES15-SP5-CHOST-BYOS-Aliyun
@@ -1576,6 +1591,39 @@
kernel-rt-5.14.21-150500.13.73.1 as a component of Container suse/sle-micro/rt-5.5:2.0.4-4.5.211
+
+ kernel-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-BYOS
+
+
+ cluster-md-kmp-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ dlm-kmp-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ gfs2-kmp-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ kernel-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ ocfs2-kmp-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ cluster-md-kmp-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
+
+ dlm-kmp-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
+
+ gfs2-kmp-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
+
+ kernel-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
+
+ ocfs2-kmp-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
kernel-default-5.14.21-150500.55.83.1 as a component of Image SLES15-SP5-CHOST-BYOS-Aliyun
@@ -3107,6 +3155,17 @@
Container suse/hpc/warewulf4-x86_64/sle-hpc-node:15.6.17.5.49:kernel-default-6.4.0-150600.23.25.1
Container suse/sle-micro/kvm-5.5:2.0.4-3.5.197:kernel-default-base-5.14.21-150500.55.83.1.150500.6.37.1
Container suse/sle-micro/rt-5.5:2.0.4-4.5.211:kernel-rt-5.14.21-150500.13.73.1
+ Image SLES12-SP5-GCE-BYOS:kernel-default-4.12.14-122.231.1
+ Image SLES12-SP5-GCE-SAP-BYOS:cluster-md-kmp-default-4.12.14-122.231.1
+ Image SLES12-SP5-GCE-SAP-BYOS:dlm-kmp-default-4.12.14-122.231.1
+ Image SLES12-SP5-GCE-SAP-BYOS:gfs2-kmp-default-4.12.14-122.231.1
+ Image SLES12-SP5-GCE-SAP-BYOS:kernel-default-4.12.14-122.231.1
+ Image SLES12-SP5-GCE-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.231.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:cluster-md-kmp-default-4.12.14-122.231.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:dlm-kmp-default-4.12.14-122.231.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:gfs2-kmp-default-4.12.14-122.231.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:kernel-default-4.12.14-122.231.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:ocfs2-kmp-default-4.12.14-122.231.1
Image SLES15-SP5-CHOST-BYOS-Aliyun:kernel-default-5.14.21-150500.55.83.1
Image SLES15-SP5-CHOST-BYOS-Azure:kernel-default-5.14.21-150500.55.83.1
Image SLES15-SP5-CHOST-BYOS-EC2:kernel-default-5.14.21-150500.55.83.1
no cpe found for SUSE Linux Enterprise Module for Confidential Computing Technical Preview 15 SP6 in CVE-2024-46738
--- /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2024-46738.xml 2024-10-16 01:12:02.063474000 +0200
+++ /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2024-46738.xml.new 2024-10-29 01:12:57.282078000 +0100
@@ -14,13 +14,13 @@
1
- 10
- 2024-10-15T23:12:01Z
+ 11
+ 2024-10-29T00:12:56Z
current
2024-09-18T23:10:19Z
- 2024-10-15T23:12:01Z
+ 2024-10-29T00:12:56Z
cve-database/bin/generate-cvrf-cve.pl
2020-12-27T01:00:00Z
@@ -149,6 +149,21 @@
Container suse/sle-micro/rt-5.5:2.0.4-4.5.211
+
+
+ Image SLES12-SP5-GCE-BYOS
+
+
+
+
+ Image SLES12-SP5-GCE-SAP-BYOS
+
+
+
+
+ Image SLES12-SP5-GCE-SAP-On-Demand
+
+
Image SLES15-SP5-CHOST-BYOS-Aliyun
@@ -1613,6 +1628,39 @@
kernel-rt-5.14.21-150500.13.73.1 as a component of Container suse/sle-micro/rt-5.5:2.0.4-4.5.211
+
+ kernel-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-BYOS
+
+
+ cluster-md-kmp-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ dlm-kmp-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ gfs2-kmp-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ kernel-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ ocfs2-kmp-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ cluster-md-kmp-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
+
+ dlm-kmp-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
+
+ gfs2-kmp-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
+
+ kernel-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
+
+ ocfs2-kmp-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
kernel-default-5.14.21-150500.55.83.1 as a component of Image SLES15-SP5-CHOST-BYOS-Aliyun
@@ -3175,6 +3223,17 @@
Container suse/hpc/warewulf4-x86_64/sle-hpc-node:15.6.17.5.49:kernel-default-6.4.0-150600.23.25.1
Container suse/sle-micro/kvm-5.5:2.0.4-3.5.197:kernel-default-base-5.14.21-150500.55.83.1.150500.6.37.1
Container suse/sle-micro/rt-5.5:2.0.4-4.5.211:kernel-rt-5.14.21-150500.13.73.1
+ Image SLES12-SP5-GCE-BYOS:kernel-default-4.12.14-122.231.1
+ Image SLES12-SP5-GCE-SAP-BYOS:cluster-md-kmp-default-4.12.14-122.231.1
+ Image SLES12-SP5-GCE-SAP-BYOS:dlm-kmp-default-4.12.14-122.231.1
+ Image SLES12-SP5-GCE-SAP-BYOS:gfs2-kmp-default-4.12.14-122.231.1
+ Image SLES12-SP5-GCE-SAP-BYOS:kernel-default-4.12.14-122.231.1
+ Image SLES12-SP5-GCE-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.231.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:cluster-md-kmp-default-4.12.14-122.231.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:dlm-kmp-default-4.12.14-122.231.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:gfs2-kmp-default-4.12.14-122.231.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:kernel-default-4.12.14-122.231.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:ocfs2-kmp-default-4.12.14-122.231.1
Image SLES15-SP5-CHOST-BYOS-Aliyun:kernel-default-5.14.21-150500.55.83.1
Image SLES15-SP5-CHOST-BYOS-Azure:kernel-default-5.14.21-150500.55.83.1
Image SLES15-SP5-CHOST-BYOS-EC2:kernel-default-5.14.21-150500.55.83.1
no cpe found for SUSE Linux Enterprise Module for Confidential Computing Technical Preview 15 SP6 in CVE-2024-46737
--- /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2024-46737.xml 2024-10-16 01:12:02.704919000 +0200
+++ /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2024-46737.xml.new 2024-10-29 01:12:58.105994000 +0100
@@ -14,13 +14,13 @@
1
- 10
- 2024-10-15T23:12:02Z
+ 11
+ 2024-10-29T00:12:57Z
current
2024-09-18T23:10:19Z
- 2024-10-15T23:12:02Z
+ 2024-10-29T00:12:57Z
cve-database/bin/generate-cvrf-cve.pl
2020-12-27T01:00:00Z
@@ -116,6 +116,21 @@
Container suse/sle-micro/rt-5.5:2.0.4-4.5.211
+
+
+ Image SLES12-SP5-GCE-BYOS
+
+
+
+
+ Image SLES12-SP5-GCE-SAP-BYOS
+
+
+
+
+ Image SLES12-SP5-GCE-SAP-On-Demand
+
+
Image SLES15-SP5-CHOST-BYOS-Aliyun
@@ -1580,6 +1595,39 @@
kernel-rt-5.14.21-150500.13.73.1 as a component of Container suse/sle-micro/rt-5.5:2.0.4-4.5.211
+
+ kernel-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-BYOS
+
+
+ cluster-md-kmp-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ dlm-kmp-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ gfs2-kmp-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ kernel-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ ocfs2-kmp-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ cluster-md-kmp-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
+
+ dlm-kmp-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
+
+ gfs2-kmp-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
+
+ kernel-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
+
+ ocfs2-kmp-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
kernel-default-5.14.21-150500.55.83.1 as a component of Image SLES15-SP5-CHOST-BYOS-Aliyun
@@ -3109,6 +3157,17 @@
Container suse/hpc/warewulf4-x86_64/sle-hpc-node:15.6.17.5.49:kernel-default-6.4.0-150600.23.25.1
Container suse/sle-micro/kvm-5.5:2.0.4-3.5.197:kernel-default-base-5.14.21-150500.55.83.1.150500.6.37.1
Container suse/sle-micro/rt-5.5:2.0.4-4.5.211:kernel-rt-5.14.21-150500.13.73.1
+ Image SLES12-SP5-GCE-BYOS:kernel-default-4.12.14-122.231.1
+ Image SLES12-SP5-GCE-SAP-BYOS:cluster-md-kmp-default-4.12.14-122.231.1
+ Image SLES12-SP5-GCE-SAP-BYOS:dlm-kmp-default-4.12.14-122.231.1
+ Image SLES12-SP5-GCE-SAP-BYOS:gfs2-kmp-default-4.12.14-122.231.1
+ Image SLES12-SP5-GCE-SAP-BYOS:kernel-default-4.12.14-122.231.1
+ Image SLES12-SP5-GCE-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.231.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:cluster-md-kmp-default-4.12.14-122.231.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:dlm-kmp-default-4.12.14-122.231.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:gfs2-kmp-default-4.12.14-122.231.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:kernel-default-4.12.14-122.231.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:ocfs2-kmp-default-4.12.14-122.231.1
Image SLES15-SP5-CHOST-BYOS-Aliyun:kernel-default-5.14.21-150500.55.83.1
Image SLES15-SP5-CHOST-BYOS-Azure:kernel-default-5.14.21-150500.55.83.1
Image SLES15-SP5-CHOST-BYOS-EC2:kernel-default-5.14.21-150500.55.83.1
skipping CVE-2024-46736 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-46735 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-46734 as CVE page is older than CVRF-CVE file.
no cpe found for SUSE Linux Enterprise Module for Confidential Computing Technical Preview 15 SP6 in CVE-2024-46731
skipping CVE-2024-46732 as CVE page is older than CVRF-CVE file.
--- /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2024-46731.xml 2024-10-22 01:14:34.117744000 +0200
+++ /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2024-46731.xml.new 2024-10-29 01:12:59.046957000 +0100
@@ -14,13 +14,13 @@
1
- 11
- 2024-10-21T23:14:33Z
+ 12
+ 2024-10-29T00:12:58Z
current
2024-09-18T23:10:21Z
- 2024-10-21T23:14:33Z
+ 2024-10-29T00:12:58Z
cve-database/bin/generate-cvrf-cve.pl
2020-12-27T01:00:00Z
@@ -108,6 +108,21 @@
Container suse/sle-micro/rt-5.5:2.0.4-4.5.211
+
+
+ Image SLES12-SP5-GCE-BYOS
+
+
+
+
+ Image SLES12-SP5-GCE-SAP-BYOS
+
+
+
+
+ Image SLES12-SP5-GCE-SAP-On-Demand
+
+
Image SLES15-SP5-CHOST-BYOS-Aliyun
@@ -1575,6 +1590,39 @@
kernel-rt-5.14.21-150500.13.73.1 as a component of Container suse/sle-micro/rt-5.5:2.0.4-4.5.211
+
+ kernel-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-BYOS
+
+
+ cluster-md-kmp-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ dlm-kmp-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ gfs2-kmp-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ kernel-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ ocfs2-kmp-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ cluster-md-kmp-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
+
+ dlm-kmp-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
+
+ gfs2-kmp-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
+
+ kernel-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
+
+ ocfs2-kmp-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
kernel-default-5.14.21-150500.55.83.1 as a component of Image SLES15-SP5-CHOST-BYOS-Aliyun
@@ -3126,6 +3174,17 @@
Container suse/hpc/warewulf4-x86_64/sle-hpc-node:15.6.17.5.49:kernel-default-6.4.0-150600.23.25.1
Container suse/sle-micro/kvm-5.5:2.0.4-3.5.197:kernel-default-base-5.14.21-150500.55.83.1.150500.6.37.1
Container suse/sle-micro/rt-5.5:2.0.4-4.5.211:kernel-rt-5.14.21-150500.13.73.1
+ Image SLES12-SP5-GCE-BYOS:kernel-default-4.12.14-122.231.1
+ Image SLES12-SP5-GCE-SAP-BYOS:cluster-md-kmp-default-4.12.14-122.231.1
+ Image SLES12-SP5-GCE-SAP-BYOS:dlm-kmp-default-4.12.14-122.231.1
+ Image SLES12-SP5-GCE-SAP-BYOS:gfs2-kmp-default-4.12.14-122.231.1
+ Image SLES12-SP5-GCE-SAP-BYOS:kernel-default-4.12.14-122.231.1
+ Image SLES12-SP5-GCE-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.231.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:cluster-md-kmp-default-4.12.14-122.231.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:dlm-kmp-default-4.12.14-122.231.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:gfs2-kmp-default-4.12.14-122.231.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:kernel-default-4.12.14-122.231.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:ocfs2-kmp-default-4.12.14-122.231.1
Image SLES15-SP5-CHOST-BYOS-Aliyun:kernel-default-5.14.21-150500.55.83.1
Image SLES15-SP5-CHOST-BYOS-Azure:kernel-default-5.14.21-150500.55.83.1
Image SLES15-SP5-CHOST-BYOS-EC2:kernel-default-5.14.21-150500.55.83.1
notsure where SUSE Linux Enterprise Module for Confidential Computing 15 SP6 is contained?
no cpe found for SUSE Linux Enterprise Module for Confidential Computing Technical Preview 15 SP6 in CVE-2024-46727
skipping CVE-2024-46730 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-46729 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-46728 as CVE page is older than CVRF-CVE file.
no cpe found for SUSE Linux Enterprise Module for Confidential Computing Technical Preview 15 SP6 in CVE-2024-46723
skipping CVE-2024-46726 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-46725 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-46724 as CVE page is older than CVRF-CVE file.
--- /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2024-46723.xml 2024-10-16 01:12:09.474589000 +0200
+++ /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2024-46723.xml.new 2024-10-29 01:13:00.617874000 +0100
@@ -14,13 +14,13 @@
1
- 11
- 2024-10-15T23:12:08Z
+ 12
+ 2024-10-29T00:13:00Z
current
2024-09-18T23:10:24Z
- 2024-10-15T23:12:08Z
+ 2024-10-29T00:13:00Z
cve-database/bin/generate-cvrf-cve.pl
2020-12-27T01:00:00Z
@@ -107,6 +107,21 @@
Container suse/sle-micro/rt-5.5:2.0.4-4.5.211
+
+
+ Image SLES12-SP5-GCE-BYOS
+
+
+
+
+ Image SLES12-SP5-GCE-SAP-BYOS
+
+
+
+
+ Image SLES12-SP5-GCE-SAP-On-Demand
+
+
Image SLES15-SP5-CHOST-BYOS-Aliyun
@@ -1574,6 +1589,39 @@
kernel-rt-5.14.21-150500.13.73.1 as a component of Container suse/sle-micro/rt-5.5:2.0.4-4.5.211
+
+ kernel-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-BYOS
+
+
+ cluster-md-kmp-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ dlm-kmp-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ gfs2-kmp-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ kernel-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ ocfs2-kmp-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ cluster-md-kmp-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
+
+ dlm-kmp-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
+
+ gfs2-kmp-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
+
+ kernel-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
+
+ ocfs2-kmp-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
kernel-default-5.14.21-150500.55.83.1 as a component of Image SLES15-SP5-CHOST-BYOS-Aliyun
@@ -3118,6 +3166,17 @@
Container suse/hpc/warewulf4-x86_64/sle-hpc-node:15.6.17.5.49:kernel-default-6.4.0-150600.23.25.1
Container suse/sle-micro/kvm-5.5:2.0.4-3.5.197:kernel-default-base-5.14.21-150500.55.83.1.150500.6.37.1
Container suse/sle-micro/rt-5.5:2.0.4-4.5.211:kernel-rt-5.14.21-150500.13.73.1
+ Image SLES12-SP5-GCE-BYOS:kernel-default-4.12.14-122.231.1
+ Image SLES12-SP5-GCE-SAP-BYOS:cluster-md-kmp-default-4.12.14-122.231.1
+ Image SLES12-SP5-GCE-SAP-BYOS:dlm-kmp-default-4.12.14-122.231.1
+ Image SLES12-SP5-GCE-SAP-BYOS:gfs2-kmp-default-4.12.14-122.231.1
+ Image SLES12-SP5-GCE-SAP-BYOS:kernel-default-4.12.14-122.231.1
+ Image SLES12-SP5-GCE-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.231.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:cluster-md-kmp-default-4.12.14-122.231.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:dlm-kmp-default-4.12.14-122.231.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:gfs2-kmp-default-4.12.14-122.231.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:kernel-default-4.12.14-122.231.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:ocfs2-kmp-default-4.12.14-122.231.1
Image SLES15-SP5-CHOST-BYOS-Aliyun:kernel-default-5.14.21-150500.55.83.1
Image SLES15-SP5-CHOST-BYOS-Azure:kernel-default-5.14.21-150500.55.83.1
Image SLES15-SP5-CHOST-BYOS-EC2:kernel-default-5.14.21-150500.55.83.1
no cpe found for SUSE Linux Enterprise Module for Confidential Computing Technical Preview 15 SP6 in CVE-2024-46722
--- /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2024-46722.xml 2024-10-16 01:12:10.384547000 +0200
+++ /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2024-46722.xml.new 2024-10-29 01:13:01.438820000 +0100
@@ -14,13 +14,13 @@
1
- 11
- 2024-10-15T23:12:09Z
+ 12
+ 2024-10-29T00:13:00Z
current
2024-09-18T23:10:25Z
- 2024-10-15T23:12:09Z
+ 2024-10-29T00:13:00Z
cve-database/bin/generate-cvrf-cve.pl
2020-12-27T01:00:00Z
@@ -107,6 +107,21 @@
Container suse/sle-micro/rt-5.5:2.0.4-4.5.211
+
+
+ Image SLES12-SP5-GCE-BYOS
+
+
+
+
+ Image SLES12-SP5-GCE-SAP-BYOS
+
+
+
+
+ Image SLES12-SP5-GCE-SAP-On-Demand
+
+
Image SLES15-SP5-CHOST-BYOS-Aliyun
@@ -1574,6 +1589,39 @@
kernel-rt-5.14.21-150500.13.73.1 as a component of Container suse/sle-micro/rt-5.5:2.0.4-4.5.211
+
+ kernel-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-BYOS
+
+
+ cluster-md-kmp-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ dlm-kmp-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ gfs2-kmp-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ kernel-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ ocfs2-kmp-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ cluster-md-kmp-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
+
+ dlm-kmp-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
+
+ gfs2-kmp-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
+
+ kernel-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
+
+ ocfs2-kmp-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
kernel-default-5.14.21-150500.55.83.1 as a component of Image SLES15-SP5-CHOST-BYOS-Aliyun
@@ -3118,6 +3166,17 @@
Container suse/hpc/warewulf4-x86_64/sle-hpc-node:15.6.17.5.49:kernel-default-6.4.0-150600.23.25.1
Container suse/sle-micro/kvm-5.5:2.0.4-3.5.197:kernel-default-base-5.14.21-150500.55.83.1.150500.6.37.1
Container suse/sle-micro/rt-5.5:2.0.4-4.5.211:kernel-rt-5.14.21-150500.13.73.1
+ Image SLES12-SP5-GCE-BYOS:kernel-default-4.12.14-122.231.1
+ Image SLES12-SP5-GCE-SAP-BYOS:cluster-md-kmp-default-4.12.14-122.231.1
+ Image SLES12-SP5-GCE-SAP-BYOS:dlm-kmp-default-4.12.14-122.231.1
+ Image SLES12-SP5-GCE-SAP-BYOS:gfs2-kmp-default-4.12.14-122.231.1
+ Image SLES12-SP5-GCE-SAP-BYOS:kernel-default-4.12.14-122.231.1
+ Image SLES12-SP5-GCE-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.231.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:cluster-md-kmp-default-4.12.14-122.231.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:dlm-kmp-default-4.12.14-122.231.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:gfs2-kmp-default-4.12.14-122.231.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:kernel-default-4.12.14-122.231.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:ocfs2-kmp-default-4.12.14-122.231.1
Image SLES15-SP5-CHOST-BYOS-Aliyun:kernel-default-5.14.21-150500.55.83.1
Image SLES15-SP5-CHOST-BYOS-Azure:kernel-default-5.14.21-150500.55.83.1
Image SLES15-SP5-CHOST-BYOS-EC2:kernel-default-5.14.21-150500.55.83.1
--- /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2024-46721.xml 2024-10-16 01:12:11.179472000 +0200
+++ /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2024-46721.xml.new 2024-10-29 01:13:02.366877000 +0100
@@ -14,13 +14,13 @@
1
- 10
- 2024-10-15T23:12:10Z
+ 11
+ 2024-10-29T00:13:01Z
current
2024-09-18T23:10:25Z
- 2024-10-15T23:12:10Z
+ 2024-10-29T00:13:01Z
cve-database/bin/generate-cvrf-cve.pl
2020-12-27T01:00:00Z
@@ -149,6 +149,21 @@
Container suse/sle-micro/rt-5.5:2.0.4-4.5.211
+
+
+ Image SLES12-SP5-GCE-BYOS
+
+
+
+
+ Image SLES12-SP5-GCE-SAP-BYOS
+
+
+
+
+ Image SLES12-SP5-GCE-SAP-On-Demand
+
+
Image SLES15-SP5-CHOST-BYOS-Aliyun
@@ -1268,6 +1283,39 @@
kernel-rt-5.14.21-150500.13.73.1 as a component of Container suse/sle-micro/rt-5.5:2.0.4-4.5.211
+
+ kernel-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-BYOS
+
+
+ cluster-md-kmp-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ dlm-kmp-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ gfs2-kmp-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ kernel-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ ocfs2-kmp-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ cluster-md-kmp-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
+
+ dlm-kmp-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
+
+ gfs2-kmp-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
+
+ kernel-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
+
+ ocfs2-kmp-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
kernel-default-5.14.21-150500.55.83.1 as a component of Image SLES15-SP5-CHOST-BYOS-Aliyun
@@ -2524,6 +2572,17 @@
Container bci/bci-sle15-kernel-module-devel:15.5.26.7:kernel-syms-5.14.21-150500.55.83.1
Container suse/sle-micro/kvm-5.5:2.0.4-3.5.197:kernel-default-base-5.14.21-150500.55.83.1.150500.6.37.1
Container suse/sle-micro/rt-5.5:2.0.4-4.5.211:kernel-rt-5.14.21-150500.13.73.1
+ Image SLES12-SP5-GCE-BYOS:kernel-default-4.12.14-122.231.1
+ Image SLES12-SP5-GCE-SAP-BYOS:cluster-md-kmp-default-4.12.14-122.231.1
+ Image SLES12-SP5-GCE-SAP-BYOS:dlm-kmp-default-4.12.14-122.231.1
+ Image SLES12-SP5-GCE-SAP-BYOS:gfs2-kmp-default-4.12.14-122.231.1
+ Image SLES12-SP5-GCE-SAP-BYOS:kernel-default-4.12.14-122.231.1
+ Image SLES12-SP5-GCE-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.231.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:cluster-md-kmp-default-4.12.14-122.231.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:dlm-kmp-default-4.12.14-122.231.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:gfs2-kmp-default-4.12.14-122.231.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:kernel-default-4.12.14-122.231.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:ocfs2-kmp-default-4.12.14-122.231.1
Image SLES15-SP5-CHOST-BYOS-Aliyun:kernel-default-5.14.21-150500.55.83.1
Image SLES15-SP5-CHOST-BYOS-Azure:kernel-default-5.14.21-150500.55.83.1
Image SLES15-SP5-CHOST-BYOS-EC2:kernel-default-5.14.21-150500.55.83.1
no cpe found for SUSE Linux Enterprise Module for Confidential Computing Technical Preview 15 SP6 in CVE-2024-46720
no cpe found for SUSE Linux Enterprise Module for Confidential Computing Technical Preview 15 SP6 in CVE-2024-46717
skipping CVE-2024-46719 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-46718 as CVE page is older than CVRF-CVE file.
no cpe found for SUSE Linux Enterprise Module for Confidential Computing Technical Preview 15 SP6 in CVE-2024-46715
skipping CVE-2024-46716 as CVE page is older than CVRF-CVE file.
--- /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2024-46715.xml 2024-10-16 01:12:15.167768000 +0200
+++ /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2024-46715.xml.new 2024-10-29 01:13:04.298176000 +0100
@@ -14,13 +14,13 @@
1
- 10
- 2024-10-15T23:12:14Z
+ 11
+ 2024-10-29T00:13:03Z
current
2024-09-18T23:10:26Z
- 2024-10-15T23:12:14Z
+ 2024-10-29T00:13:03Z
cve-database/bin/generate-cvrf-cve.pl
2020-12-27T01:00:00Z
@@ -125,6 +125,21 @@
Container suse/sle-micro/rt-5.5:2.0.4-4.5.211
+
+
+ Image SLES12-SP5-GCE-BYOS
+
+
+
+
+ Image SLES12-SP5-GCE-SAP-BYOS
+
+
+
+
+ Image SLES12-SP5-GCE-SAP-On-Demand
+
+
Image SLES15-SP5-CHOST-BYOS-Aliyun
@@ -1592,6 +1607,39 @@
kernel-rt-5.14.21-150500.13.73.1 as a component of Container suse/sle-micro/rt-5.5:2.0.4-4.5.211
+
+ kernel-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-BYOS
+
+
+ cluster-md-kmp-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ dlm-kmp-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ gfs2-kmp-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ kernel-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ ocfs2-kmp-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ cluster-md-kmp-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
+
+ dlm-kmp-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
+
+ gfs2-kmp-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
+
+ kernel-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
+
+ ocfs2-kmp-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
kernel-default-5.14.21-150500.55.83.1 as a component of Image SLES15-SP5-CHOST-BYOS-Aliyun
@@ -3154,6 +3202,17 @@
Container suse/hpc/warewulf4-x86_64/sle-hpc-node:15.6.17.5.49:kernel-default-6.4.0-150600.23.25.1
Container suse/sle-micro/kvm-5.5:2.0.4-3.5.197:kernel-default-base-5.14.21-150500.55.83.1.150500.6.37.1
Container suse/sle-micro/rt-5.5:2.0.4-4.5.211:kernel-rt-5.14.21-150500.13.73.1
+ Image SLES12-SP5-GCE-BYOS:kernel-default-4.12.14-122.231.1
+ Image SLES12-SP5-GCE-SAP-BYOS:cluster-md-kmp-default-4.12.14-122.231.1
+ Image SLES12-SP5-GCE-SAP-BYOS:dlm-kmp-default-4.12.14-122.231.1
+ Image SLES12-SP5-GCE-SAP-BYOS:gfs2-kmp-default-4.12.14-122.231.1
+ Image SLES12-SP5-GCE-SAP-BYOS:kernel-default-4.12.14-122.231.1
+ Image SLES12-SP5-GCE-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.231.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:cluster-md-kmp-default-4.12.14-122.231.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:dlm-kmp-default-4.12.14-122.231.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:gfs2-kmp-default-4.12.14-122.231.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:kernel-default-4.12.14-122.231.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:ocfs2-kmp-default-4.12.14-122.231.1
Image SLES15-SP5-CHOST-BYOS-Aliyun:kernel-default-5.14.21-150500.55.83.1
Image SLES15-SP5-CHOST-BYOS-Azure:kernel-default-5.14.21-150500.55.83.1
Image SLES15-SP5-CHOST-BYOS-EC2:kernel-default-5.14.21-150500.55.83.1
no cpe found for SUSE Linux Enterprise Module for Confidential Computing Technical Preview 15 SP6 in CVE-2024-46714
no cpe found for SUSE Linux Enterprise Module for Confidential Computing Technical Preview 15 SP6 in CVE-2024-46711
skipping CVE-2024-46713 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-46712 as CVE page is older than CVRF-CVE file.
no cpe found for SUSE Linux Enterprise Module for Confidential Computing Technical Preview 15 SP6 in CVE-2024-46707
skipping CVE-2024-46710 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-46709 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-46708 as CVE page is older than CVRF-CVE file.
--- /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2024-46707.xml 2024-10-16 01:12:19.777502000 +0200
+++ /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2024-46707.xml.new 2024-10-29 01:13:06.200080000 +0100
@@ -14,13 +14,13 @@
1
- 10
- 2024-10-15T23:12:19Z
+ 11
+ 2024-10-29T00:13:05Z
current
2024-09-16T23:10:14Z
- 2024-10-15T23:12:19Z
+ 2024-10-29T00:13:05Z
cve-database/bin/generate-cvrf-cve.pl
2020-12-27T01:00:00Z
@@ -115,6 +115,21 @@
Container suse/sle-micro/rt-5.5:2.0.4-4.5.211
+
+
+ Image SLES12-SP5-GCE-BYOS
+
+
+
+
+ Image SLES12-SP5-GCE-SAP-BYOS
+
+
+
+
+ Image SLES12-SP5-GCE-SAP-On-Demand
+
+
Image SLES15-SP5-CHOST-BYOS-Aliyun
@@ -1582,6 +1597,39 @@
kernel-rt-5.14.21-150500.13.73.1 as a component of Container suse/sle-micro/rt-5.5:2.0.4-4.5.211
+
+ kernel-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-BYOS
+
+
+ cluster-md-kmp-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ dlm-kmp-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ gfs2-kmp-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ kernel-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ ocfs2-kmp-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ cluster-md-kmp-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
+
+ dlm-kmp-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
+
+ gfs2-kmp-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
+
+ kernel-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
+
+ ocfs2-kmp-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
kernel-default-5.14.21-150500.55.83.1 as a component of Image SLES15-SP5-CHOST-BYOS-Aliyun
@@ -3134,6 +3182,17 @@
Container suse/hpc/warewulf4-x86_64/sle-hpc-node:15.6.17.5.49:kernel-default-6.4.0-150600.23.25.1
Container suse/sle-micro/kvm-5.5:2.0.4-3.5.197:kernel-default-base-5.14.21-150500.55.83.1.150500.6.37.1
Container suse/sle-micro/rt-5.5:2.0.4-4.5.211:kernel-rt-5.14.21-150500.13.73.1
+ Image SLES12-SP5-GCE-BYOS:kernel-default-4.12.14-122.231.1
+ Image SLES12-SP5-GCE-SAP-BYOS:cluster-md-kmp-default-4.12.14-122.231.1
+ Image SLES12-SP5-GCE-SAP-BYOS:dlm-kmp-default-4.12.14-122.231.1
+ Image SLES12-SP5-GCE-SAP-BYOS:gfs2-kmp-default-4.12.14-122.231.1
+ Image SLES12-SP5-GCE-SAP-BYOS:kernel-default-4.12.14-122.231.1
+ Image SLES12-SP5-GCE-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.231.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:cluster-md-kmp-default-4.12.14-122.231.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:dlm-kmp-default-4.12.14-122.231.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:gfs2-kmp-default-4.12.14-122.231.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:kernel-default-4.12.14-122.231.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:ocfs2-kmp-default-4.12.14-122.231.1
Image SLES15-SP5-CHOST-BYOS-Aliyun:kernel-default-5.14.21-150500.55.83.1
Image SLES15-SP5-CHOST-BYOS-Azure:kernel-default-5.14.21-150500.55.83.1
Image SLES15-SP5-CHOST-BYOS-EC2:kernel-default-5.14.21-150500.55.83.1
no cpe found for SUSE Linux Enterprise Module for Confidential Computing Technical Preview 15 SP6 in CVE-2024-46702
skipping CVE-2024-46706 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-46705 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-46704 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-46703 as CVE page is older than CVRF-CVE file.
--- /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2024-46702.xml 2024-10-16 01:12:21.765925000 +0200
+++ /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2024-46702.xml.new 2024-10-29 01:13:07.127008000 +0100
@@ -14,13 +14,13 @@
1
- 10
- 2024-10-15T23:12:21Z
+ 11
+ 2024-10-29T00:13:06Z
current
2024-09-16T23:10:16Z
- 2024-10-15T23:12:21Z
+ 2024-10-29T00:13:06Z
cve-database/bin/generate-cvrf-cve.pl
2020-12-27T01:00:00Z
@@ -118,6 +118,21 @@
Container suse/sle-micro/rt-5.5:2.0.4-4.5.211
+
+
+ Image SLES12-SP5-GCE-BYOS
+
+
+
+
+ Image SLES12-SP5-GCE-SAP-BYOS
+
+
+
+
+ Image SLES12-SP5-GCE-SAP-On-Demand
+
+
Image SLES15-SP5-CHOST-BYOS-Aliyun
@@ -1582,6 +1597,39 @@
kernel-rt-5.14.21-150500.13.73.1 as a component of Container suse/sle-micro/rt-5.5:2.0.4-4.5.211
+
+ kernel-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-BYOS
+
+
+ cluster-md-kmp-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ dlm-kmp-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ gfs2-kmp-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ kernel-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ ocfs2-kmp-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ cluster-md-kmp-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
+
+ dlm-kmp-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
+
+ gfs2-kmp-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
+
+ kernel-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
+
+ ocfs2-kmp-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
kernel-default-5.14.21-150500.55.83.1 as a component of Image SLES15-SP5-CHOST-BYOS-Aliyun
@@ -3113,6 +3161,17 @@
Container suse/hpc/warewulf4-x86_64/sle-hpc-node:15.6.17.5.49:kernel-default-6.4.0-150600.23.25.1
Container suse/sle-micro/kvm-5.5:2.0.4-3.5.197:kernel-default-base-5.14.21-150500.55.83.1.150500.6.37.1
Container suse/sle-micro/rt-5.5:2.0.4-4.5.211:kernel-rt-5.14.21-150500.13.73.1
+ Image SLES12-SP5-GCE-BYOS:kernel-default-4.12.14-122.231.1
+ Image SLES12-SP5-GCE-SAP-BYOS:cluster-md-kmp-default-4.12.14-122.231.1
+ Image SLES12-SP5-GCE-SAP-BYOS:dlm-kmp-default-4.12.14-122.231.1
+ Image SLES12-SP5-GCE-SAP-BYOS:gfs2-kmp-default-4.12.14-122.231.1
+ Image SLES12-SP5-GCE-SAP-BYOS:kernel-default-4.12.14-122.231.1
+ Image SLES12-SP5-GCE-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.231.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:cluster-md-kmp-default-4.12.14-122.231.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:dlm-kmp-default-4.12.14-122.231.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:gfs2-kmp-default-4.12.14-122.231.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:kernel-default-4.12.14-122.231.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:ocfs2-kmp-default-4.12.14-122.231.1
Image SLES15-SP5-CHOST-BYOS-Aliyun:kernel-default-5.14.21-150500.55.83.1
Image SLES15-SP5-CHOST-BYOS-Azure:kernel-default-5.14.21-150500.55.83.1
Image SLES15-SP5-CHOST-BYOS-EC2:kernel-default-5.14.21-150500.55.83.1
no cpe found for SUSE Linux Enterprise Module for Confidential Computing Technical Preview 15 SP6 in CVE-2024-46695
skipping CVE-2024-46701 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-46700 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-46699 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-46698 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-46697 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-46696 as CVE page is older than CVRF-CVE file.
no cpe found for SUSE Linux Enterprise Module for Confidential Computing Technical Preview 15 SP6 in CVE-2024-46686
skipping CVE-2024-46694 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-46693 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-46692 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-46691 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-46690 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-46689 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-46688 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-46687 as CVE page is older than CVRF-CVE file.
--- /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2024-46686.xml 2024-10-16 01:12:30.614460000 +0200
+++ /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2024-46686.xml.new 2024-10-29 01:13:08.280941000 +0100
@@ -14,13 +14,13 @@
1
- 10
- 2024-10-15T23:12:30Z
+ 11
+ 2024-10-29T00:13:07Z
current
2024-09-13T23:10:02Z
- 2024-10-15T23:12:30Z
+ 2024-10-29T00:13:07Z
cve-database/bin/generate-cvrf-cve.pl
2020-12-27T01:00:00Z
@@ -108,6 +108,21 @@
Container suse/sle-micro/rt-5.5:2.0.4-4.5.211
+
+
+ Image SLES12-SP5-GCE-BYOS
+
+
+
+
+ Image SLES12-SP5-GCE-SAP-BYOS
+
+
+
+
+ Image SLES12-SP5-GCE-SAP-On-Demand
+
+
Image SLES15-SP5-CHOST-BYOS-Aliyun
@@ -1575,6 +1590,39 @@
kernel-rt-5.14.21-150500.13.73.1 as a component of Container suse/sle-micro/rt-5.5:2.0.4-4.5.211
+
+ kernel-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-BYOS
+
+
+ cluster-md-kmp-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ dlm-kmp-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ gfs2-kmp-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ kernel-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ ocfs2-kmp-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ cluster-md-kmp-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
+
+ dlm-kmp-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
+
+ gfs2-kmp-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
+
+ kernel-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
+
+ ocfs2-kmp-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
kernel-default-5.14.21-150500.55.83.1 as a component of Image SLES15-SP5-CHOST-BYOS-Aliyun
@@ -3120,6 +3168,17 @@
Container suse/hpc/warewulf4-x86_64/sle-hpc-node:15.6.17.5.49:kernel-default-6.4.0-150600.23.25.1
Container suse/sle-micro/kvm-5.5:2.0.4-3.5.197:kernel-default-base-5.14.21-150500.55.83.1.150500.6.37.1
Container suse/sle-micro/rt-5.5:2.0.4-4.5.211:kernel-rt-5.14.21-150500.13.73.1
+ Image SLES12-SP5-GCE-BYOS:kernel-default-4.12.14-122.231.1
+ Image SLES12-SP5-GCE-SAP-BYOS:cluster-md-kmp-default-4.12.14-122.231.1
+ Image SLES12-SP5-GCE-SAP-BYOS:dlm-kmp-default-4.12.14-122.231.1
+ Image SLES12-SP5-GCE-SAP-BYOS:gfs2-kmp-default-4.12.14-122.231.1
+ Image SLES12-SP5-GCE-SAP-BYOS:kernel-default-4.12.14-122.231.1
+ Image SLES12-SP5-GCE-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.231.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:cluster-md-kmp-default-4.12.14-122.231.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:dlm-kmp-default-4.12.14-122.231.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:gfs2-kmp-default-4.12.14-122.231.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:kernel-default-4.12.14-122.231.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:ocfs2-kmp-default-4.12.14-122.231.1
Image SLES15-SP5-CHOST-BYOS-Aliyun:kernel-default-5.14.21-150500.55.83.1
Image SLES15-SP5-CHOST-BYOS-Azure:kernel-default-5.14.21-150500.55.83.1
Image SLES15-SP5-CHOST-BYOS-EC2:kernel-default-5.14.21-150500.55.83.1
no cpe found for SUSE Linux Enterprise Module for Confidential Computing Technical Preview 15 SP6 in CVE-2024-46685
--- /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2024-46685.xml 2024-10-16 01:12:31.342950000 +0200
+++ /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2024-46685.xml.new 2024-10-29 01:13:08.971924000 +0100
@@ -14,13 +14,13 @@
1
- 10
- 2024-10-15T23:12:30Z
+ 11
+ 2024-10-29T00:13:08Z
current
2024-09-13T23:10:02Z
- 2024-10-15T23:12:30Z
+ 2024-10-29T00:13:08Z
cve-database/bin/generate-cvrf-cve.pl
2020-12-27T01:00:00Z
@@ -111,6 +111,21 @@
Container suse/sle-micro/rt-5.5:2.0.4-4.5.211
+
+
+ Image SLES12-SP5-GCE-BYOS
+
+
+
+
+ Image SLES12-SP5-GCE-SAP-BYOS
+
+
+
+
+ Image SLES12-SP5-GCE-SAP-On-Demand
+
+
Image SLES15-SP5-CHOST-BYOS-Aliyun
@@ -1578,6 +1593,39 @@
kernel-rt-5.14.21-150500.13.73.1 as a component of Container suse/sle-micro/rt-5.5:2.0.4-4.5.211
+
+ kernel-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-BYOS
+
+
+ cluster-md-kmp-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ dlm-kmp-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ gfs2-kmp-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ kernel-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ ocfs2-kmp-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ cluster-md-kmp-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
+
+ dlm-kmp-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
+
+ gfs2-kmp-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
+
+ kernel-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
+
+ ocfs2-kmp-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
kernel-default-5.14.21-150500.55.83.1 as a component of Image SLES15-SP5-CHOST-BYOS-Aliyun
@@ -3126,6 +3174,17 @@
Container suse/hpc/warewulf4-x86_64/sle-hpc-node:15.6.17.5.49:kernel-default-6.4.0-150600.23.25.1
Container suse/sle-micro/kvm-5.5:2.0.4-3.5.197:kernel-default-base-5.14.21-150500.55.83.1.150500.6.37.1
Container suse/sle-micro/rt-5.5:2.0.4-4.5.211:kernel-rt-5.14.21-150500.13.73.1
+ Image SLES12-SP5-GCE-BYOS:kernel-default-4.12.14-122.231.1
+ Image SLES12-SP5-GCE-SAP-BYOS:cluster-md-kmp-default-4.12.14-122.231.1
+ Image SLES12-SP5-GCE-SAP-BYOS:dlm-kmp-default-4.12.14-122.231.1
+ Image SLES12-SP5-GCE-SAP-BYOS:gfs2-kmp-default-4.12.14-122.231.1
+ Image SLES12-SP5-GCE-SAP-BYOS:kernel-default-4.12.14-122.231.1
+ Image SLES12-SP5-GCE-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.231.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:cluster-md-kmp-default-4.12.14-122.231.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:dlm-kmp-default-4.12.14-122.231.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:gfs2-kmp-default-4.12.14-122.231.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:kernel-default-4.12.14-122.231.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:ocfs2-kmp-default-4.12.14-122.231.1
Image SLES15-SP5-CHOST-BYOS-Aliyun:kernel-default-5.14.21-150500.55.83.1
Image SLES15-SP5-CHOST-BYOS-Azure:kernel-default-5.14.21-150500.55.83.1
Image SLES15-SP5-CHOST-BYOS-EC2:kernel-default-5.14.21-150500.55.83.1
no cpe found for SUSE Linux Enterprise Module for Confidential Computing Technical Preview 15 SP6 in CVE-2024-46679
skipping CVE-2024-46684 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-46683 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-46682 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-46681 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-46680 as CVE page is older than CVRF-CVE file.
--- /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2024-46679.xml 2024-10-16 01:12:34.297837000 +0200
+++ /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2024-46679.xml.new 2024-10-29 01:13:10.056850000 +0100
@@ -14,13 +14,13 @@
1
- 10
- 2024-10-15T23:12:33Z
+ 11
+ 2024-10-29T00:13:09Z
current
2024-09-13T23:10:04Z
- 2024-10-15T23:12:33Z
+ 2024-10-29T00:13:09Z
cve-database/bin/generate-cvrf-cve.pl
2020-12-27T01:00:00Z
@@ -134,6 +134,21 @@
Container suse/sle-micro/rt-5.5:2.0.4-4.5.211
+
+
+ Image SLES12-SP5-GCE-BYOS
+
+
+
+
+ Image SLES12-SP5-GCE-SAP-BYOS
+
+
+
+
+ Image SLES12-SP5-GCE-SAP-On-Demand
+
+
Image SLES15-SP5-CHOST-BYOS-Aliyun
@@ -1598,6 +1613,39 @@
kernel-rt-5.14.21-150500.13.73.1 as a component of Container suse/sle-micro/rt-5.5:2.0.4-4.5.211
+
+ kernel-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-BYOS
+
+
+ cluster-md-kmp-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ dlm-kmp-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ gfs2-kmp-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ kernel-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ ocfs2-kmp-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ cluster-md-kmp-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
+
+ dlm-kmp-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
+
+ gfs2-kmp-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
+
+ kernel-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
+
+ ocfs2-kmp-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
kernel-default-5.14.21-150500.55.83.1 as a component of Image SLES15-SP5-CHOST-BYOS-Aliyun
@@ -3145,6 +3193,17 @@
Container suse/hpc/warewulf4-x86_64/sle-hpc-node:15.6.17.5.49:kernel-default-6.4.0-150600.23.25.1
Container suse/sle-micro/kvm-5.5:2.0.4-3.5.197:kernel-default-base-5.14.21-150500.55.83.1.150500.6.37.1
Container suse/sle-micro/rt-5.5:2.0.4-4.5.211:kernel-rt-5.14.21-150500.13.73.1
+ Image SLES12-SP5-GCE-BYOS:kernel-default-4.12.14-122.231.1
+ Image SLES12-SP5-GCE-SAP-BYOS:cluster-md-kmp-default-4.12.14-122.231.1
+ Image SLES12-SP5-GCE-SAP-BYOS:dlm-kmp-default-4.12.14-122.231.1
+ Image SLES12-SP5-GCE-SAP-BYOS:gfs2-kmp-default-4.12.14-122.231.1
+ Image SLES12-SP5-GCE-SAP-BYOS:kernel-default-4.12.14-122.231.1
+ Image SLES12-SP5-GCE-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.231.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:cluster-md-kmp-default-4.12.14-122.231.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:dlm-kmp-default-4.12.14-122.231.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:gfs2-kmp-default-4.12.14-122.231.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:kernel-default-4.12.14-122.231.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:ocfs2-kmp-default-4.12.14-122.231.1
Image SLES15-SP5-CHOST-BYOS-Aliyun:kernel-default-5.14.21-150500.55.83.1
Image SLES15-SP5-CHOST-BYOS-Azure:kernel-default-5.14.21-150500.55.83.1
Image SLES15-SP5-CHOST-BYOS-EC2:kernel-default-5.14.21-150500.55.83.1
no cpe found for SUSE Linux Enterprise Module for Confidential Computing Technical Preview 15 SP6 in CVE-2024-46677
--- /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2024-46677.xml 2024-10-16 01:12:35.816789000 +0200
+++ /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2024-46677.xml.new 2024-10-29 01:13:11.598765000 +0100
@@ -14,13 +14,13 @@
1
- 10
- 2024-10-15T23:12:35Z
+ 11
+ 2024-10-29T00:13:10Z
current
2024-09-13T23:10:04Z
- 2024-10-15T23:12:35Z
+ 2024-10-29T00:13:10Z
cve-database/bin/generate-cvrf-cve.pl
2020-12-27T01:00:00Z
@@ -114,6 +114,21 @@
Container suse/sle-micro/rt-5.5:2.0.4-4.5.211
+
+
+ Image SLES12-SP5-GCE-BYOS
+
+
+
+
+ Image SLES12-SP5-GCE-SAP-BYOS
+
+
+
+
+ Image SLES12-SP5-GCE-SAP-On-Demand
+
+
Image SLES15-SP5-CHOST-BYOS-Aliyun
@@ -1578,6 +1593,39 @@
kernel-rt-5.14.21-150500.13.73.1 as a component of Container suse/sle-micro/rt-5.5:2.0.4-4.5.211
+
+ kernel-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-BYOS
+
+
+ cluster-md-kmp-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ dlm-kmp-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ gfs2-kmp-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ kernel-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ ocfs2-kmp-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ cluster-md-kmp-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
+
+ dlm-kmp-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
+
+ gfs2-kmp-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
+
+ kernel-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
+
+ ocfs2-kmp-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
kernel-default-5.14.21-150500.55.83.1 as a component of Image SLES15-SP5-CHOST-BYOS-Aliyun
@@ -3105,6 +3153,17 @@
Container suse/hpc/warewulf4-x86_64/sle-hpc-node:15.6.17.5.49:kernel-default-6.4.0-150600.23.25.1
Container suse/sle-micro/kvm-5.5:2.0.4-3.5.197:kernel-default-base-5.14.21-150500.55.83.1.150500.6.37.1
Container suse/sle-micro/rt-5.5:2.0.4-4.5.211:kernel-rt-5.14.21-150500.13.73.1
+ Image SLES12-SP5-GCE-BYOS:kernel-default-4.12.14-122.231.1
+ Image SLES12-SP5-GCE-SAP-BYOS:cluster-md-kmp-default-4.12.14-122.231.1
+ Image SLES12-SP5-GCE-SAP-BYOS:dlm-kmp-default-4.12.14-122.231.1
+ Image SLES12-SP5-GCE-SAP-BYOS:gfs2-kmp-default-4.12.14-122.231.1
+ Image SLES12-SP5-GCE-SAP-BYOS:kernel-default-4.12.14-122.231.1
+ Image SLES12-SP5-GCE-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.231.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:cluster-md-kmp-default-4.12.14-122.231.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:dlm-kmp-default-4.12.14-122.231.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:gfs2-kmp-default-4.12.14-122.231.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:kernel-default-4.12.14-122.231.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:ocfs2-kmp-default-4.12.14-122.231.1
Image SLES15-SP5-CHOST-BYOS-Aliyun:kernel-default-5.14.21-150500.55.83.1
Image SLES15-SP5-CHOST-BYOS-Azure:kernel-default-5.14.21-150500.55.83.1
Image SLES15-SP5-CHOST-BYOS-EC2:kernel-default-5.14.21-150500.55.83.1
no cpe found for SUSE Linux Enterprise Module for Confidential Computing Technical Preview 15 SP6 in CVE-2024-46676
--- /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2024-46676.xml 2024-10-16 01:12:36.808638000 +0200
+++ /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2024-46676.xml.new 2024-10-29 01:13:12.604232000 +0100
@@ -14,13 +14,13 @@
1
- 10
- 2024-10-15T23:12:36Z
+ 11
+ 2024-10-29T00:13:12Z
current
2024-09-13T23:10:05Z
- 2024-10-15T23:12:36Z
+ 2024-10-29T00:13:12Z
cve-database/bin/generate-cvrf-cve.pl
2020-12-27T01:00:00Z
@@ -129,6 +129,21 @@
Container suse/sle-micro/rt-5.5:2.0.4-4.5.211
+
+
+ Image SLES12-SP5-GCE-BYOS
+
+
+
+
+ Image SLES12-SP5-GCE-SAP-BYOS
+
+
+
+
+ Image SLES12-SP5-GCE-SAP-On-Demand
+
+
Image SLES15-SP5-CHOST-BYOS-Aliyun
@@ -1593,6 +1608,39 @@
kernel-rt-5.14.21-150500.13.73.1 as a component of Container suse/sle-micro/rt-5.5:2.0.4-4.5.211
+
+ kernel-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-BYOS
+
+
+ cluster-md-kmp-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ dlm-kmp-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ gfs2-kmp-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ kernel-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ ocfs2-kmp-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ cluster-md-kmp-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
+
+ dlm-kmp-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
+
+ gfs2-kmp-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
+
+ kernel-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
+
+ ocfs2-kmp-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
kernel-default-5.14.21-150500.55.83.1 as a component of Image SLES15-SP5-CHOST-BYOS-Aliyun
@@ -3135,6 +3183,17 @@
Container suse/hpc/warewulf4-x86_64/sle-hpc-node:15.6.17.5.49:kernel-default-6.4.0-150600.23.25.1
Container suse/sle-micro/kvm-5.5:2.0.4-3.5.197:kernel-default-base-5.14.21-150500.55.83.1.150500.6.37.1
Container suse/sle-micro/rt-5.5:2.0.4-4.5.211:kernel-rt-5.14.21-150500.13.73.1
+ Image SLES12-SP5-GCE-BYOS:kernel-default-4.12.14-122.231.1
+ Image SLES12-SP5-GCE-SAP-BYOS:cluster-md-kmp-default-4.12.14-122.231.1
+ Image SLES12-SP5-GCE-SAP-BYOS:dlm-kmp-default-4.12.14-122.231.1
+ Image SLES12-SP5-GCE-SAP-BYOS:gfs2-kmp-default-4.12.14-122.231.1
+ Image SLES12-SP5-GCE-SAP-BYOS:kernel-default-4.12.14-122.231.1
+ Image SLES12-SP5-GCE-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.231.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:cluster-md-kmp-default-4.12.14-122.231.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:dlm-kmp-default-4.12.14-122.231.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:gfs2-kmp-default-4.12.14-122.231.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:kernel-default-4.12.14-122.231.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:ocfs2-kmp-default-4.12.14-122.231.1
Image SLES15-SP5-CHOST-BYOS-Aliyun:kernel-default-5.14.21-150500.55.83.1
Image SLES15-SP5-CHOST-BYOS-Azure:kernel-default-5.14.21-150500.55.83.1
Image SLES15-SP5-CHOST-BYOS-EC2:kernel-default-5.14.21-150500.55.83.1
no cpe found for SUSE Linux Enterprise Module for Confidential Computing Technical Preview 15 SP6 in CVE-2024-46675
--- /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2024-46675.xml 2024-10-16 01:12:37.610689000 +0200
+++ /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2024-46675.xml.new 2024-10-29 01:13:13.459182000 +0100
@@ -14,13 +14,13 @@
1
- 10
- 2024-10-15T23:12:37Z
+ 11
+ 2024-10-29T00:13:12Z
current
2024-09-13T23:10:05Z
- 2024-10-15T23:12:37Z
+ 2024-10-29T00:13:12Z
cve-database/bin/generate-cvrf-cve.pl
2020-12-27T01:00:00Z
@@ -122,6 +122,21 @@
Container suse/sle-micro/rt-5.5:2.0.4-4.5.211
+
+
+ Image SLES12-SP5-GCE-BYOS
+
+
+
+
+ Image SLES12-SP5-GCE-SAP-BYOS
+
+
+
+
+ Image SLES12-SP5-GCE-SAP-On-Demand
+
+
Image SLES15-SP5-CHOST-BYOS-Aliyun
@@ -1586,6 +1601,39 @@
kernel-rt-5.14.21-150500.13.73.1 as a component of Container suse/sle-micro/rt-5.5:2.0.4-4.5.211
+
+ kernel-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-BYOS
+
+
+ cluster-md-kmp-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ dlm-kmp-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ gfs2-kmp-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ kernel-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ ocfs2-kmp-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ cluster-md-kmp-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
+
+ dlm-kmp-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
+
+ gfs2-kmp-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
+
+ kernel-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
+
+ ocfs2-kmp-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
kernel-default-5.14.21-150500.55.83.1 as a component of Image SLES15-SP5-CHOST-BYOS-Aliyun
@@ -3121,6 +3169,17 @@
Container suse/hpc/warewulf4-x86_64/sle-hpc-node:15.6.17.5.49:kernel-default-6.4.0-150600.23.25.1
Container suse/sle-micro/kvm-5.5:2.0.4-3.5.197:kernel-default-base-5.14.21-150500.55.83.1.150500.6.37.1
Container suse/sle-micro/rt-5.5:2.0.4-4.5.211:kernel-rt-5.14.21-150500.13.73.1
+ Image SLES12-SP5-GCE-BYOS:kernel-default-4.12.14-122.231.1
+ Image SLES12-SP5-GCE-SAP-BYOS:cluster-md-kmp-default-4.12.14-122.231.1
+ Image SLES12-SP5-GCE-SAP-BYOS:dlm-kmp-default-4.12.14-122.231.1
+ Image SLES12-SP5-GCE-SAP-BYOS:gfs2-kmp-default-4.12.14-122.231.1
+ Image SLES12-SP5-GCE-SAP-BYOS:kernel-default-4.12.14-122.231.1
+ Image SLES12-SP5-GCE-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.231.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:cluster-md-kmp-default-4.12.14-122.231.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:dlm-kmp-default-4.12.14-122.231.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:gfs2-kmp-default-4.12.14-122.231.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:kernel-default-4.12.14-122.231.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:ocfs2-kmp-default-4.12.14-122.231.1
Image SLES15-SP5-CHOST-BYOS-Aliyun:kernel-default-5.14.21-150500.55.83.1
Image SLES15-SP5-CHOST-BYOS-Azure:kernel-default-5.14.21-150500.55.83.1
Image SLES15-SP5-CHOST-BYOS-EC2:kernel-default-5.14.21-150500.55.83.1
no cpe found for SUSE Linux Enterprise Module for Confidential Computing Technical Preview 15 SP6 in CVE-2024-46673
skipping CVE-2024-46674 as CVE page is older than CVRF-CVE file.
--- /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2024-46673.xml 2024-10-16 01:12:39.181494000 +0200
+++ /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2024-46673.xml.new 2024-10-29 01:13:14.326143000 +0100
@@ -14,13 +14,13 @@
1
- 10
- 2024-10-15T23:12:38Z
+ 11
+ 2024-10-29T00:13:13Z
current
2024-09-13T23:10:06Z
- 2024-10-15T23:12:38Z
+ 2024-10-29T00:13:13Z
cve-database/bin/generate-cvrf-cve.pl
2020-12-27T01:00:00Z
@@ -116,6 +116,21 @@
Container suse/sle-micro/rt-5.5:2.0.4-4.5.211
+
+
+ Image SLES12-SP5-GCE-BYOS
+
+
+
+
+ Image SLES12-SP5-GCE-SAP-BYOS
+
+
+
+
+ Image SLES12-SP5-GCE-SAP-On-Demand
+
+
Image SLES15-SP5-CHOST-BYOS-Aliyun
@@ -1583,6 +1598,39 @@
kernel-rt-5.14.21-150500.13.73.1 as a component of Container suse/sle-micro/rt-5.5:2.0.4-4.5.211
+
+ kernel-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-BYOS
+
+
+ cluster-md-kmp-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ dlm-kmp-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ gfs2-kmp-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ kernel-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ ocfs2-kmp-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ cluster-md-kmp-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
+
+ dlm-kmp-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
+
+ gfs2-kmp-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
+
+ kernel-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
+
+ ocfs2-kmp-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
kernel-default-5.14.21-150500.55.83.1 as a component of Image SLES15-SP5-CHOST-BYOS-Aliyun
@@ -3136,6 +3184,17 @@
Container suse/hpc/warewulf4-x86_64/sle-hpc-node:15.6.17.5.49:kernel-default-6.4.0-150600.23.25.1
Container suse/sle-micro/kvm-5.5:2.0.4-3.5.197:kernel-default-base-5.14.21-150500.55.83.1.150500.6.37.1
Container suse/sle-micro/rt-5.5:2.0.4-4.5.211:kernel-rt-5.14.21-150500.13.73.1
+ Image SLES12-SP5-GCE-BYOS:kernel-default-4.12.14-122.231.1
+ Image SLES12-SP5-GCE-SAP-BYOS:cluster-md-kmp-default-4.12.14-122.231.1
+ Image SLES12-SP5-GCE-SAP-BYOS:dlm-kmp-default-4.12.14-122.231.1
+ Image SLES12-SP5-GCE-SAP-BYOS:gfs2-kmp-default-4.12.14-122.231.1
+ Image SLES12-SP5-GCE-SAP-BYOS:kernel-default-4.12.14-122.231.1
+ Image SLES12-SP5-GCE-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.231.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:cluster-md-kmp-default-4.12.14-122.231.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:dlm-kmp-default-4.12.14-122.231.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:gfs2-kmp-default-4.12.14-122.231.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:kernel-default-4.12.14-122.231.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:ocfs2-kmp-default-4.12.14-122.231.1
Image SLES15-SP5-CHOST-BYOS-Aliyun:kernel-default-5.14.21-150500.55.83.1
Image SLES15-SP5-CHOST-BYOS-Azure:kernel-default-5.14.21-150500.55.83.1
Image SLES15-SP5-CHOST-BYOS-EC2:kernel-default-5.14.21-150500.55.83.1
skipping CVE-2024-46672 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-46478 as CVE page is older than CVRF-CVE file.
CVE-2024-45817: no packages for Image SLES15-SP6-CHOST-BYOS-SAP-CCloud, but entry?
CVE-2024-45817: no packages for Image SLES15-SP5-CHOST-BYOS-EC2, but entry?
CVE-2024-45817: no packages for Image SLES15-SP6-SAP-Azure-VLI-BYOS-Production, but entry?
CVE-2024-45817: no packages for SUSE Linux Enterprise Micro 5.5, but entry?
CVE-2024-45817: no packages for SUSE Linux Enterprise Module for Basesystem 15 SP5, but entry?
CVE-2024-45817: no packages for SUSE Linux Enterprise Micro 5.2, but entry?
CVE-2024-45817: no packages for Image SLES15-SP6-SAP-Azure-VLI-BYOS, but entry?
CVE-2024-45817: no packages for Image SLES15-SP4-SAP-Azure-VLI-BYOS, but entry?
CVE-2024-45817: no packages for SUSE Linux Enterprise Micro 5.4, but entry?
CVE-2024-45817: no packages for Image SLES15-SP4-SAP-Azure-LI-BYOS, but entry?
CVE-2024-45817: no packages for Image SLES15-SP6-SAP-Azure-LI-BYOS, but entry?
CVE-2024-45817: no packages for Image SLES15-SP4-SAP-Azure-LI-BYOS-Production, but entry?
CVE-2024-45817: no packages for SUSE Linux Enterprise Software Development Kit 12 SP5, but entry?
CVE-2024-45817: no packages for SUSE Linux Enterprise Micro 5.1, but entry?
CVE-2024-45817: no packages for Image SLES15-SP5-SAP-Azure-VLI-BYOS-Production, but entry?
CVE-2024-45817: no packages for openSUSE Leap Micro 5.5, but entry?
CVE-2024-45817: no packages for Image SLES15-SP5-CHOST-BYOS-Azure, but entry?
CVE-2024-45817: no packages for Image SLES15-SP4-SAP-Azure-VLI-BYOS-Production, but entry?
CVE-2024-45817: no packages for Image SLES15-SP6-CHOST-BYOS-Aliyun, but entry?
CVE-2024-45817: no packages for Image SLES15-SP5-CHOST-BYOS-GCE, but entry?
CVE-2024-45817: no packages for Image SLES15-SP6-CHOST-BYOS, but entry?
CVE-2024-45817: no packages for Image SLES15-SP6-CHOST-BYOS-GCE, but entry?
CVE-2024-45817: no packages for Image SLES15-SP6-CHOST-BYOS-GDC, but entry?
CVE-2024-45817: no packages for Image SLES15-SP5-SAP-Azure-LI-BYOS, but entry?
CVE-2024-45817: no packages for Image SLES15-SP5-CHOST-BYOS-GDC, but entry?
CVE-2024-45817: no packages for SUSE Linux Enterprise Micro 5.3, but entry?
CVE-2024-45817: no packages for Image SLES15-SP5-SAP-Azure-LI-BYOS-Production, but entry?
CVE-2024-45817: no packages for Image SLES15-SP6-SAP-Azure-LI-BYOS-Production, but entry?
CVE-2024-45817: no packages for SUSE Linux Enterprise Module for Basesystem 15 SP6, but entry?
CVE-2024-45817: no packages for Image SLES15-SP6-CHOST-BYOS-Azure, but entry?
CVE-2024-45817: no packages for Image SLES15-SP5-CHOST-BYOS-Aliyun, but entry?
CVE-2024-45817: no packages for Image SLES15-SP5-CHOST-BYOS-SAP-CCloud, but entry?
CVE-2024-45817: no packages for Image SLES15-SP5-SAP-Azure-VLI-BYOS, but entry?
CVE-2024-45817: no packages for Image SLES15-SP6-CHOST-BYOS-EC2, but entry?
no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2024-45817
CVE-2024-45817: no packages for Image SLES15-SP4-SAP-Azure-LI-BYOS, but entry?
CVE-2024-45817: no packages for Image SLES15-SP4-SAP-Azure-LI-BYOS-Production, but entry?
CVE-2024-45817: no packages for Image SLES15-SP4-SAP-Azure-VLI-BYOS, but entry?
CVE-2024-45817: no packages for Image SLES15-SP4-SAP-Azure-VLI-BYOS-Production, but entry?
CVE-2024-45817: no packages for Image SLES15-SP5-CHOST-BYOS-Aliyun, but entry?
CVE-2024-45817: no packages for Image SLES15-SP5-CHOST-BYOS-Azure, but entry?
CVE-2024-45817: no packages for Image SLES15-SP5-CHOST-BYOS-EC2, but entry?
CVE-2024-45817: no packages for Image SLES15-SP5-CHOST-BYOS-GCE, but entry?
CVE-2024-45817: no packages for Image SLES15-SP5-CHOST-BYOS-GDC, but entry?
CVE-2024-45817: no packages for Image SLES15-SP5-CHOST-BYOS-SAP-CCloud, but entry?
CVE-2024-45817: no packages for Image SLES15-SP5-SAP-Azure-LI-BYOS, but entry?
CVE-2024-45817: no packages for Image SLES15-SP5-SAP-Azure-LI-BYOS-Production, but entry?
CVE-2024-45817: no packages for Image SLES15-SP5-SAP-Azure-VLI-BYOS, but entry?
CVE-2024-45817: no packages for Image SLES15-SP5-SAP-Azure-VLI-BYOS-Production, but entry?
CVE-2024-45817: no packages for Image SLES15-SP6-CHOST-BYOS, but entry?
CVE-2024-45817: no packages for Image SLES15-SP6-CHOST-BYOS-Aliyun, but entry?
CVE-2024-45817: no packages for Image SLES15-SP6-CHOST-BYOS-Azure, but entry?
CVE-2024-45817: no packages for Image SLES15-SP6-CHOST-BYOS-EC2, but entry?
CVE-2024-45817: no packages for Image SLES15-SP6-CHOST-BYOS-GCE, but entry?
CVE-2024-45817: no packages for Image SLES15-SP6-CHOST-BYOS-GDC, but entry?
CVE-2024-45817: no packages for Image SLES15-SP6-CHOST-BYOS-SAP-CCloud, but entry?
CVE-2024-45817: no packages for Image SLES15-SP6-SAP-Azure-LI-BYOS, but entry?
CVE-2024-45817: no packages for Image SLES15-SP6-SAP-Azure-LI-BYOS-Production, but entry?
CVE-2024-45817: no packages for Image SLES15-SP6-SAP-Azure-VLI-BYOS, but entry?
CVE-2024-45817: no packages for Image SLES15-SP6-SAP-Azure-VLI-BYOS-Production, but entry?
CVE-2024-45817: no packages for SUSE Linux Enterprise Micro 5.1, but entry?
CVE-2024-45817: no packages for SUSE Linux Enterprise Micro 5.2, but entry?
CVE-2024-45817: no packages for SUSE Linux Enterprise Micro 5.3, but entry?
CVE-2024-45817: no packages for SUSE Linux Enterprise Micro 5.4, but entry?
CVE-2024-45817: no packages for SUSE Linux Enterprise Micro 5.5, but entry?
CVE-2024-45817: no packages for SUSE Linux Enterprise Module for Basesystem 15 SP5, but entry?
CVE-2024-45817: no packages for SUSE Linux Enterprise Module for Basesystem 15 SP6, but entry?
CVE-2024-45817: no packages for SUSE Linux Enterprise Software Development Kit 12 SP5, but entry?
CVE-2024-45817: no packages for openSUSE Leap Micro 5.5, but entry?
CVE-2024-45817: no packages for Image SLES15-SP4-SAP-Azure-LI-BYOS, but entry?
CVE-2024-45817: no packages for Image SLES15-SP4-SAP-Azure-LI-BYOS-Production, but entry?
CVE-2024-45817: no packages for Image SLES15-SP4-SAP-Azure-VLI-BYOS, but entry?
CVE-2024-45817: no packages for Image SLES15-SP4-SAP-Azure-VLI-BYOS-Production, but entry?
CVE-2024-45817: no packages for Image SLES15-SP5-CHOST-BYOS-Aliyun, but entry?
CVE-2024-45817: no packages for Image SLES15-SP5-CHOST-BYOS-Azure, but entry?
CVE-2024-45817: no packages for Image SLES15-SP5-CHOST-BYOS-EC2, but entry?
CVE-2024-45817: no packages for Image SLES15-SP5-CHOST-BYOS-GCE, but entry?
CVE-2024-45817: no packages for Image SLES15-SP5-CHOST-BYOS-GDC, but entry?
CVE-2024-45817: no packages for Image SLES15-SP5-CHOST-BYOS-SAP-CCloud, but entry?
CVE-2024-45817: no packages for Image SLES15-SP5-SAP-Azure-LI-BYOS, but entry?
CVE-2024-45817: no packages for Image SLES15-SP5-SAP-Azure-LI-BYOS-Production, but entry?
CVE-2024-45817: no packages for Image SLES15-SP5-SAP-Azure-VLI-BYOS, but entry?
CVE-2024-45817: no packages for Image SLES15-SP5-SAP-Azure-VLI-BYOS-Production, but entry?
CVE-2024-45817: no packages for Image SLES15-SP6-CHOST-BYOS, but entry?
CVE-2024-45817: no packages for Image SLES15-SP6-CHOST-BYOS-Aliyun, but entry?
CVE-2024-45817: no packages for Image SLES15-SP6-CHOST-BYOS-Azure, but entry?
CVE-2024-45817: no packages for Image SLES15-SP6-CHOST-BYOS-EC2, but entry?
CVE-2024-45817: no packages for Image SLES15-SP6-CHOST-BYOS-GCE, but entry?
CVE-2024-45817: no packages for Image SLES15-SP6-CHOST-BYOS-GDC, but entry?
CVE-2024-45817: no packages for Image SLES15-SP6-CHOST-BYOS-SAP-CCloud, but entry?
CVE-2024-45817: no packages for Image SLES15-SP6-SAP-Azure-LI-BYOS, but entry?
CVE-2024-45817: no packages for Image SLES15-SP6-SAP-Azure-LI-BYOS-Production, but entry?
CVE-2024-45817: no packages for Image SLES15-SP6-SAP-Azure-VLI-BYOS, but entry?
CVE-2024-45817: no packages for Image SLES15-SP6-SAP-Azure-VLI-BYOS-Production, but entry?
CVE-2024-45817: no packages for SUSE Linux Enterprise Micro 5.1, but entry?
CVE-2024-45817: no packages for SUSE Linux Enterprise Micro 5.2, but entry?
CVE-2024-45817: no packages for SUSE Linux Enterprise Micro 5.3, but entry?
CVE-2024-45817: no packages for SUSE Linux Enterprise Micro 5.4, but entry?
CVE-2024-45817: no packages for SUSE Linux Enterprise Micro 5.5, but entry?
CVE-2024-45817: no packages for SUSE Linux Enterprise Module for Basesystem 15 SP5, but entry?
CVE-2024-45817: no packages for SUSE Linux Enterprise Module for Basesystem 15 SP6, but entry?
CVE-2024-45817: no packages for SUSE Linux Enterprise Software Development Kit 12 SP5, but entry?
CVE-2024-45817: no packages for openSUSE Leap Micro 5.5, but entry?
skipping CVE-2024-46292 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-45993 as CVE page is older than CVRF-CVE file.
Use of uninitialized value $mtime in numeric lt (<) at bin/generate-cvrf-cve.pl line 162.
skipping CVE-2024-45770 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-45769 as CVE page is older than CVRF-CVE file.
no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2024-45620
no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2024-45619
no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2024-45618
no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2024-45617
no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2024-45616
no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2024-45615
no cpe found for SUSE Package Hub 15 SP5 in CVE-2024-45508
no cpe found for SUSE Package Hub 15 SP6 in CVE-2024-45508
skipping CVE-2024-45614 as CVE page is older than CVRF-CVE file.
notsure where SUSE Liberty Linux 9 is contained?
notsure where SUSE Liberty Linux 8 is contained?
no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2024-45492
--- /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2024-45492.xml 2024-10-20 01:11:55.680024000 +0200
+++ /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2024-45492.xml.new 2024-10-29 01:13:24.556095000 +0100
@@ -14,13 +14,13 @@
1
- 29
- 2024-10-19T23:11:55Z
+ 30
+ 2024-10-29T00:13:23Z
current
2024-08-30T23:09:41Z
- 2024-10-19T23:11:55Z
+ 2024-10-29T00:13:23Z
cve-database/bin/generate-cvrf-cve.pl
2020-12-27T01:00:00Z
@@ -438,6 +438,21 @@
Image SLES12-SP5-EC2-BYOS
+
+
+ Image SLES12-SP5-GCE-BYOS
+
+
+
+
+ Image SLES12-SP5-GCE-SAP-BYOS
+
+
+
+
+ Image SLES12-SP5-GCE-SAP-On-Demand
+
+
Image SLES15-SP4-CHOST-BYOS
@@ -1732,6 +1747,24 @@
libexpat1-2.1.0-21.37.1 as a component of Image SLES12-SP5-EC2-BYOS
+
+ expat-2.1.0-21.37.1 as a component of Image SLES12-SP5-GCE-BYOS
+
+
+ libexpat1-2.1.0-21.37.1 as a component of Image SLES12-SP5-GCE-BYOS
+
+
+ expat-2.1.0-21.37.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ libexpat1-2.1.0-21.37.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ expat-2.1.0-21.37.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
+
+ libexpat1-2.1.0-21.37.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
libexpat1-2.4.4-150400.3.22.1 as a component of Image SLES15-SP4-CHOST-BYOS
@@ -2473,12 +2506,6 @@
expat as a component of SUSE Linux Enterprise Server for SAP Applications 12 SP5
-
- libexpat1 as a component of SUSE Linux Enterprise Server for SAP Applications 12 SP5
-
-
- libexpat1-32bit as a component of SUSE Linux Enterprise Server for SAP Applications 12 SP5
-
expat as a component of SUSE Linux Enterprise Server for SAP Applications 15 SP2
@@ -2633,6 +2660,12 @@
Image SLES12-SP5-Azure-SAP-BYOS:libexpat1-2.1.0-21.37.1
Image SLES12-SP5-EC2-BYOS:expat-2.1.0-21.37.1
Image SLES12-SP5-EC2-BYOS:libexpat1-2.1.0-21.37.1
+ Image SLES12-SP5-GCE-BYOS:expat-2.1.0-21.37.1
+ Image SLES12-SP5-GCE-BYOS:libexpat1-2.1.0-21.37.1
+ Image SLES12-SP5-GCE-SAP-BYOS:expat-2.1.0-21.37.1
+ Image SLES12-SP5-GCE-SAP-BYOS:libexpat1-2.1.0-21.37.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:expat-2.1.0-21.37.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:libexpat1-2.1.0-21.37.1
Image SLES15-SP4-CHOST-BYOS:libexpat1-2.4.4-150400.3.22.1
Image SLES15-SP4-CHOST-BYOS-Aliyun:libexpat1-2.4.4-150400.3.22.1
Image SLES15-SP4-CHOST-BYOS-Azure:libexpat1-2.4.4-150400.3.22.1
no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2024-45491
--- /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2024-45491.xml 2024-10-20 01:11:56.251968000 +0200
+++ /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2024-45491.xml.new 2024-10-29 01:13:25.618048000 +0100
@@ -14,13 +14,13 @@
1
- 29
- 2024-10-19T23:11:55Z
+ 30
+ 2024-10-29T00:13:24Z
current
2024-08-30T23:09:42Z
- 2024-10-19T23:11:55Z
+ 2024-10-29T00:13:24Z
cve-database/bin/generate-cvrf-cve.pl
2020-12-27T01:00:00Z
@@ -438,6 +438,21 @@
Image SLES12-SP5-EC2-BYOS
+
+
+ Image SLES12-SP5-GCE-BYOS
+
+
+
+
+ Image SLES12-SP5-GCE-SAP-BYOS
+
+
+
+
+ Image SLES12-SP5-GCE-SAP-On-Demand
+
+
Image SLES15-SP4-CHOST-BYOS
@@ -1732,6 +1747,24 @@
libexpat1-2.1.0-21.37.1 as a component of Image SLES12-SP5-EC2-BYOS
+
+ expat-2.1.0-21.37.1 as a component of Image SLES12-SP5-GCE-BYOS
+
+
+ libexpat1-2.1.0-21.37.1 as a component of Image SLES12-SP5-GCE-BYOS
+
+
+ expat-2.1.0-21.37.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ libexpat1-2.1.0-21.37.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ expat-2.1.0-21.37.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
+
+ libexpat1-2.1.0-21.37.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
libexpat1-2.4.4-150400.3.22.1 as a component of Image SLES15-SP4-CHOST-BYOS
@@ -2473,12 +2506,6 @@
expat as a component of SUSE Linux Enterprise Server for SAP Applications 12 SP5
-
- libexpat1 as a component of SUSE Linux Enterprise Server for SAP Applications 12 SP5
-
-
- libexpat1-32bit as a component of SUSE Linux Enterprise Server for SAP Applications 12 SP5
-
expat as a component of SUSE Linux Enterprise Server for SAP Applications 15 SP2
@@ -2633,6 +2660,12 @@
Image SLES12-SP5-Azure-SAP-BYOS:libexpat1-2.1.0-21.37.1
Image SLES12-SP5-EC2-BYOS:expat-2.1.0-21.37.1
Image SLES12-SP5-EC2-BYOS:libexpat1-2.1.0-21.37.1
+ Image SLES12-SP5-GCE-BYOS:expat-2.1.0-21.37.1
+ Image SLES12-SP5-GCE-BYOS:libexpat1-2.1.0-21.37.1
+ Image SLES12-SP5-GCE-SAP-BYOS:expat-2.1.0-21.37.1
+ Image SLES12-SP5-GCE-SAP-BYOS:libexpat1-2.1.0-21.37.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:expat-2.1.0-21.37.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:libexpat1-2.1.0-21.37.1
Image SLES15-SP4-CHOST-BYOS:libexpat1-2.4.4-150400.3.22.1
Image SLES15-SP4-CHOST-BYOS-Aliyun:libexpat1-2.4.4-150400.3.22.1
Image SLES15-SP4-CHOST-BYOS-Azure:libexpat1-2.4.4-150400.3.22.1
no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2024-45490
--- /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2024-45490.xml 2024-10-20 01:11:56.804983000 +0200
+++ /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2024-45490.xml.new 2024-10-29 01:13:26.429993000 +0100
@@ -14,13 +14,13 @@
1
- 29
- 2024-10-19T23:11:56Z
+ 30
+ 2024-10-29T00:13:25Z
current
2024-08-30T23:09:42Z
- 2024-10-19T23:11:56Z
+ 2024-10-29T00:13:25Z
cve-database/bin/generate-cvrf-cve.pl
2020-12-27T01:00:00Z
@@ -438,6 +438,21 @@
Image SLES12-SP5-EC2-BYOS
+
+
+ Image SLES12-SP5-GCE-BYOS
+
+
+
+
+ Image SLES12-SP5-GCE-SAP-BYOS
+
+
+
+
+ Image SLES12-SP5-GCE-SAP-On-Demand
+
+
Image SLES15-SP4-CHOST-BYOS
@@ -1732,6 +1747,24 @@
libexpat1-2.1.0-21.37.1 as a component of Image SLES12-SP5-EC2-BYOS
+
+ expat-2.1.0-21.37.1 as a component of Image SLES12-SP5-GCE-BYOS
+
+
+ libexpat1-2.1.0-21.37.1 as a component of Image SLES12-SP5-GCE-BYOS
+
+
+ expat-2.1.0-21.37.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ libexpat1-2.1.0-21.37.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ expat-2.1.0-21.37.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
+
+ libexpat1-2.1.0-21.37.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
libexpat1-2.4.4-150400.3.22.1 as a component of Image SLES15-SP4-CHOST-BYOS
@@ -2473,12 +2506,6 @@
expat as a component of SUSE Linux Enterprise Server for SAP Applications 12 SP5
-
- libexpat1 as a component of SUSE Linux Enterprise Server for SAP Applications 12 SP5
-
-
- libexpat1-32bit as a component of SUSE Linux Enterprise Server for SAP Applications 12 SP5
-
expat as a component of SUSE Linux Enterprise Server for SAP Applications 15 SP2
@@ -2633,6 +2660,12 @@
Image SLES12-SP5-Azure-SAP-BYOS:libexpat1-2.1.0-21.37.1
Image SLES12-SP5-EC2-BYOS:expat-2.1.0-21.37.1
Image SLES12-SP5-EC2-BYOS:libexpat1-2.1.0-21.37.1
+ Image SLES12-SP5-GCE-BYOS:expat-2.1.0-21.37.1
+ Image SLES12-SP5-GCE-BYOS:libexpat1-2.1.0-21.37.1
+ Image SLES12-SP5-GCE-SAP-BYOS:expat-2.1.0-21.37.1
+ Image SLES12-SP5-GCE-SAP-BYOS:libexpat1-2.1.0-21.37.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:expat-2.1.0-21.37.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:libexpat1-2.1.0-21.37.1
Image SLES15-SP4-CHOST-BYOS:libexpat1-2.4.4-150400.3.22.1
Image SLES15-SP4-CHOST-BYOS-Aliyun:libexpat1-2.4.4-150400.3.22.1
Image SLES15-SP4-CHOST-BYOS-Azure:libexpat1-2.4.4-150400.3.22.1
skipping CVE-2024-45405 as CVE page is older than CVRF-CVE file.
no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2024-45310
skipping CVE-2024-45306 as CVE page is older than CVRF-CVE file.
CVE-2024-45231: no packages for SUSE Package Hub 15 SP5, but entry?
CVE-2024-45231: no packages for SUSE Package Hub 15 SP5, but entry?
CVE-2024-45231: no packages for SUSE Package Hub 15 SP5, but entry?
CVE-2024-45230: no packages for SUSE Package Hub 15 SP5, but entry?
CVE-2024-45230: no packages for SUSE Package Hub 15 SP5, but entry?
CVE-2024-45230: no packages for SUSE Package Hub 15 SP5, but entry?
no cpe found for SUSE Linux Enterprise Module for Confidential Computing Technical Preview 15 SP6 in CVE-2024-45026
skipping CVE-2024-45030 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-45029 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-45028 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-45027 as CVE page is older than CVRF-CVE file.
no cpe found for SUSE Linux Enterprise Module for Confidential Computing Technical Preview 15 SP6 in CVE-2024-45020
skipping CVE-2024-45025 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-45024 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-45023 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-45022 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-45021 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-45019 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-45018 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-45017 as CVE page is older than CVRF-CVE file.
no cpe found for SUSE Linux Enterprise Module for Confidential Computing Technical Preview 15 SP6 in CVE-2024-45013
skipping CVE-2024-45015 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-45014 as CVE page is older than CVRF-CVE file.
no cpe found for SUSE Linux Enterprise Module for Confidential Computing Technical Preview 15 SP6 in CVE-2024-45008
skipping CVE-2024-45012 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-45011 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-45010 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-45009 as CVE page is older than CVRF-CVE file.
--- /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2024-45008.xml 2024-10-14 01:11:37.531365000 +0200
+++ /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2024-45008.xml.new 2024-10-29 01:13:34.889061000 +0100
@@ -14,13 +14,13 @@
1
- 10
- 2024-10-13T23:11:37Z
+ 11
+ 2024-10-29T00:13:34Z
current
2024-09-04T23:10:08Z
- 2024-10-13T23:11:37Z
+ 2024-10-29T00:13:34Z
cve-database/bin/generate-cvrf-cve.pl
2020-12-27T01:00:00Z
@@ -110,6 +110,21 @@
Container suse/sle-micro/rt-5.5:2.0.4-4.5.211
+
+
+ Image SLES12-SP5-GCE-BYOS
+
+
+
+
+ Image SLES12-SP5-GCE-SAP-BYOS
+
+
+
+
+ Image SLES12-SP5-GCE-SAP-On-Demand
+
+
Image SLES15-SP5-CHOST-BYOS-Aliyun
@@ -1406,6 +1421,39 @@
kernel-rt-5.14.21-150500.13.73.1 as a component of Container suse/sle-micro/rt-5.5:2.0.4-4.5.211
+
+ kernel-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-BYOS
+
+
+ cluster-md-kmp-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ dlm-kmp-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ gfs2-kmp-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ kernel-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ ocfs2-kmp-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ cluster-md-kmp-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
+
+ dlm-kmp-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
+
+ gfs2-kmp-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
+
+ kernel-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
+
+ ocfs2-kmp-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
kernel-default-5.14.21-150500.55.83.1 as a component of Image SLES15-SP5-CHOST-BYOS-Aliyun
@@ -2506,6 +2554,17 @@
Container suse/hpc/warewulf4-x86_64/sle-hpc-node:15.6.17.5.49:kernel-default-6.4.0-150600.23.25.1
Container suse/sle-micro/kvm-5.5:2.0.4-3.5.197:kernel-default-base-5.14.21-150500.55.83.1.150500.6.37.1
Container suse/sle-micro/rt-5.5:2.0.4-4.5.211:kernel-rt-5.14.21-150500.13.73.1
+ Image SLES12-SP5-GCE-BYOS:kernel-default-4.12.14-122.231.1
+ Image SLES12-SP5-GCE-SAP-BYOS:cluster-md-kmp-default-4.12.14-122.231.1
+ Image SLES12-SP5-GCE-SAP-BYOS:dlm-kmp-default-4.12.14-122.231.1
+ Image SLES12-SP5-GCE-SAP-BYOS:gfs2-kmp-default-4.12.14-122.231.1
+ Image SLES12-SP5-GCE-SAP-BYOS:kernel-default-4.12.14-122.231.1
+ Image SLES12-SP5-GCE-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.231.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:cluster-md-kmp-default-4.12.14-122.231.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:dlm-kmp-default-4.12.14-122.231.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:gfs2-kmp-default-4.12.14-122.231.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:kernel-default-4.12.14-122.231.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:ocfs2-kmp-default-4.12.14-122.231.1
Image SLES15-SP5-CHOST-BYOS-Aliyun:kernel-default-5.14.21-150500.55.83.1
Image SLES15-SP5-CHOST-BYOS-Azure:kernel-default-5.14.21-150500.55.83.1
Image SLES15-SP5-CHOST-BYOS-EC2:kernel-default-5.14.21-150500.55.83.1
no cpe found for SUSE Linux Enterprise Module for Confidential Computing Technical Preview 15 SP6 in CVE-2024-44999
skipping CVE-2024-45007 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-45006 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-45005 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-45004 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-45003 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-45002 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-45001 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-45000 as CVE page is older than CVRF-CVE file.
--- /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2024-44999.xml 2024-10-16 01:13:02.964771000 +0200
+++ /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2024-44999.xml.new 2024-10-29 01:13:35.706023000 +0100
@@ -14,13 +14,13 @@
1
- 11
- 2024-10-15T23:13:02Z
+ 12
+ 2024-10-29T00:13:35Z
current
2024-09-04T23:10:11Z
- 2024-10-15T23:13:02Z
+ 2024-10-29T00:13:35Z
cve-database/bin/generate-cvrf-cve.pl
2020-12-27T01:00:00Z
@@ -165,6 +165,21 @@
Container suse/sle-micro/rt-5.5:2.0.4-4.5.211
+
+
+ Image SLES12-SP5-GCE-BYOS
+
+
+
+
+ Image SLES12-SP5-GCE-SAP-BYOS
+
+
+
+
+ Image SLES12-SP5-GCE-SAP-On-Demand
+
+
Image SLES15-SP5-CHOST-BYOS-Aliyun
@@ -1632,6 +1647,39 @@
kernel-rt-5.14.21-150500.13.73.1 as a component of Container suse/sle-micro/rt-5.5:2.0.4-4.5.211
+
+ kernel-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-BYOS
+
+
+ cluster-md-kmp-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ dlm-kmp-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ gfs2-kmp-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ kernel-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ ocfs2-kmp-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ cluster-md-kmp-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
+
+ dlm-kmp-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
+
+ gfs2-kmp-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
+
+ kernel-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
+
+ ocfs2-kmp-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
kernel-default-5.14.21-150500.55.83.1 as a component of Image SLES15-SP5-CHOST-BYOS-Aliyun
@@ -3234,6 +3282,17 @@
Container suse/hpc/warewulf4-x86_64/sle-hpc-node:15.6.17.5.49:kernel-default-6.4.0-150600.23.25.1
Container suse/sle-micro/kvm-5.5:2.0.4-3.5.197:kernel-default-base-5.14.21-150500.55.83.1.150500.6.37.1
Container suse/sle-micro/rt-5.5:2.0.4-4.5.211:kernel-rt-5.14.21-150500.13.73.1
+ Image SLES12-SP5-GCE-BYOS:kernel-default-4.12.14-122.231.1
+ Image SLES12-SP5-GCE-SAP-BYOS:cluster-md-kmp-default-4.12.14-122.231.1
+ Image SLES12-SP5-GCE-SAP-BYOS:dlm-kmp-default-4.12.14-122.231.1
+ Image SLES12-SP5-GCE-SAP-BYOS:gfs2-kmp-default-4.12.14-122.231.1
+ Image SLES12-SP5-GCE-SAP-BYOS:kernel-default-4.12.14-122.231.1
+ Image SLES12-SP5-GCE-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.231.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:cluster-md-kmp-default-4.12.14-122.231.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:dlm-kmp-default-4.12.14-122.231.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:gfs2-kmp-default-4.12.14-122.231.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:kernel-default-4.12.14-122.231.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:ocfs2-kmp-default-4.12.14-122.231.1
Image SLES15-SP5-CHOST-BYOS-Aliyun:kernel-default-5.14.21-150500.55.83.1
Image SLES15-SP5-CHOST-BYOS-Azure:kernel-default-5.14.21-150500.55.83.1
Image SLES15-SP5-CHOST-BYOS-EC2:kernel-default-5.14.21-150500.55.83.1
--- /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2024-44998.xml 2024-10-16 01:13:04.015689000 +0200
+++ /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2024-44998.xml.new 2024-10-29 01:13:36.453044000 +0100
@@ -14,13 +14,13 @@
1
- 13
- 2024-10-15T23:13:03Z
+ 14
+ 2024-10-29T00:13:35Z
current
2024-09-04T23:10:11Z
- 2024-10-15T23:13:03Z
+ 2024-10-29T00:13:35Z
cve-database/bin/generate-cvrf-cve.pl
2020-12-27T01:00:00Z
@@ -104,6 +104,21 @@
Container suse/sle-micro/rt-5.5:2.0.4-4.5.211
+
+
+ Image SLES12-SP5-GCE-BYOS
+
+
+
+
+ Image SLES12-SP5-GCE-SAP-BYOS
+
+
+
+
+ Image SLES12-SP5-GCE-SAP-On-Demand
+
+
Image SLES15-SP5-CHOST-BYOS-Aliyun
@@ -1542,6 +1557,39 @@
kernel-rt-5.14.21-150500.13.73.1 as a component of Container suse/sle-micro/rt-5.5:2.0.4-4.5.211
+
+ kernel-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-BYOS
+
+
+ cluster-md-kmp-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ dlm-kmp-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ gfs2-kmp-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ kernel-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ ocfs2-kmp-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ cluster-md-kmp-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
+
+ dlm-kmp-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
+
+ gfs2-kmp-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
+
+ kernel-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
+
+ ocfs2-kmp-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
kernel-default-5.14.21-150500.55.83.1 as a component of Image SLES15-SP5-CHOST-BYOS-Aliyun
@@ -3063,6 +3111,17 @@
Container suse/hpc/warewulf4-x86_64/sle-hpc-node:15.6.17.5.49:kernel-default-6.4.0-150600.23.25.1
Container suse/sle-micro/kvm-5.5:2.0.4-3.5.197:kernel-default-base-5.14.21-150500.55.83.1.150500.6.37.1
Container suse/sle-micro/rt-5.5:2.0.4-4.5.211:kernel-rt-5.14.21-150500.13.73.1
+ Image SLES12-SP5-GCE-BYOS:kernel-default-4.12.14-122.231.1
+ Image SLES12-SP5-GCE-SAP-BYOS:cluster-md-kmp-default-4.12.14-122.231.1
+ Image SLES12-SP5-GCE-SAP-BYOS:dlm-kmp-default-4.12.14-122.231.1
+ Image SLES12-SP5-GCE-SAP-BYOS:gfs2-kmp-default-4.12.14-122.231.1
+ Image SLES12-SP5-GCE-SAP-BYOS:kernel-default-4.12.14-122.231.1
+ Image SLES12-SP5-GCE-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.231.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:cluster-md-kmp-default-4.12.14-122.231.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:dlm-kmp-default-4.12.14-122.231.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:gfs2-kmp-default-4.12.14-122.231.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:kernel-default-4.12.14-122.231.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:ocfs2-kmp-default-4.12.14-122.231.1
Image SLES15-SP5-CHOST-BYOS-Aliyun:kernel-default-5.14.21-150500.55.83.1
Image SLES15-SP5-CHOST-BYOS-Azure:kernel-default-5.14.21-150500.55.83.1
Image SLES15-SP5-CHOST-BYOS-EC2:kernel-default-5.14.21-150500.55.83.1
no cpe found for SUSE Linux Enterprise Module for Confidential Computing Technical Preview 15 SP6 in CVE-2024-44987
skipping CVE-2024-44997 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-44996 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-44995 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-44994 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-44993 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-44992 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-44991 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-44990 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-44989 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-44988 as CVE page is older than CVRF-CVE file.
--- /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2024-44987.xml 2024-10-17 01:11:46.596958000 +0200
+++ /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2024-44987.xml.new 2024-10-29 01:13:37.418118000 +0100
@@ -14,13 +14,13 @@
1
- 13
- 2024-10-16T23:11:46Z
+ 14
+ 2024-10-29T00:13:36Z
current
2024-09-04T23:10:14Z
- 2024-10-16T23:11:46Z
+ 2024-10-29T00:13:36Z
cve-database/bin/generate-cvrf-cve.pl
2020-12-27T01:00:00Z
@@ -190,6 +190,21 @@
Container suse/sle-micro/rt-5.5:2.0.4-4.5.211
+
+
+ Image SLES12-SP5-GCE-BYOS
+
+
+
+
+ Image SLES12-SP5-GCE-SAP-BYOS
+
+
+
+
+ Image SLES12-SP5-GCE-SAP-On-Demand
+
+
Image SLES15-SP5-CHOST-BYOS-Aliyun
@@ -1657,6 +1672,39 @@
kernel-rt-5.14.21-150500.13.73.1 as a component of Container suse/sle-micro/rt-5.5:2.0.4-4.5.211
+
+ kernel-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-BYOS
+
+
+ cluster-md-kmp-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ dlm-kmp-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ gfs2-kmp-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ kernel-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ ocfs2-kmp-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ cluster-md-kmp-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
+
+ dlm-kmp-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
+
+ gfs2-kmp-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
+
+ kernel-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
+
+ ocfs2-kmp-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
kernel-default-5.14.21-150500.55.83.1 as a component of Image SLES15-SP5-CHOST-BYOS-Aliyun
@@ -3284,6 +3332,17 @@
Container suse/hpc/warewulf4-x86_64/sle-hpc-node:15.6.17.5.49:kernel-default-6.4.0-150600.23.25.1
Container suse/sle-micro/kvm-5.5:2.0.4-3.5.197:kernel-default-base-5.14.21-150500.55.83.1.150500.6.37.1
Container suse/sle-micro/rt-5.5:2.0.4-4.5.211:kernel-rt-5.14.21-150500.13.73.1
+ Image SLES12-SP5-GCE-BYOS:kernel-default-4.12.14-122.231.1
+ Image SLES12-SP5-GCE-SAP-BYOS:cluster-md-kmp-default-4.12.14-122.231.1
+ Image SLES12-SP5-GCE-SAP-BYOS:dlm-kmp-default-4.12.14-122.231.1
+ Image SLES12-SP5-GCE-SAP-BYOS:gfs2-kmp-default-4.12.14-122.231.1
+ Image SLES12-SP5-GCE-SAP-BYOS:kernel-default-4.12.14-122.231.1
+ Image SLES12-SP5-GCE-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.231.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:cluster-md-kmp-default-4.12.14-122.231.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:dlm-kmp-default-4.12.14-122.231.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:gfs2-kmp-default-4.12.14-122.231.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:kernel-default-4.12.14-122.231.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:ocfs2-kmp-default-4.12.14-122.231.1
Image SLES15-SP5-CHOST-BYOS-Aliyun:kernel-default-5.14.21-150500.55.83.1
Image SLES15-SP5-CHOST-BYOS-Azure:kernel-default-5.14.21-150500.55.83.1
Image SLES15-SP5-CHOST-BYOS-EC2:kernel-default-5.14.21-150500.55.83.1
no cpe found for SUSE Linux Enterprise Module for Confidential Computing Technical Preview 15 SP6 in CVE-2024-44982
skipping CVE-2024-44986 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-44985 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-44984 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-44983 as CVE page is older than CVRF-CVE file.
--- /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2024-44982.xml 2024-10-16 01:13:15.321592000 +0200
+++ /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2024-44982.xml.new 2024-10-29 01:13:38.358885000 +0100
@@ -14,13 +14,13 @@
1
- 11
- 2024-10-15T23:13:14Z
+ 12
+ 2024-10-29T00:13:37Z
current
2024-09-04T23:10:16Z
- 2024-10-15T23:13:14Z
+ 2024-10-29T00:13:37Z
cve-database/bin/generate-cvrf-cve.pl
2020-12-27T01:00:00Z
@@ -140,6 +140,21 @@
Container suse/sle-micro/rt-5.5:2.0.4-4.5.211
+
+
+ Image SLES12-SP5-GCE-BYOS
+
+
+
+
+ Image SLES12-SP5-GCE-SAP-BYOS
+
+
+
+
+ Image SLES12-SP5-GCE-SAP-On-Demand
+
+
Image SLES15-SP5-CHOST-BYOS-Aliyun
@@ -1607,6 +1622,39 @@
kernel-rt-5.14.21-150500.13.73.1 as a component of Container suse/sle-micro/rt-5.5:2.0.4-4.5.211
+
+ kernel-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-BYOS
+
+
+ cluster-md-kmp-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ dlm-kmp-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ gfs2-kmp-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ kernel-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ ocfs2-kmp-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ cluster-md-kmp-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
+
+ dlm-kmp-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
+
+ gfs2-kmp-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
+
+ kernel-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
+
+ ocfs2-kmp-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
kernel-default-5.14.21-150500.55.83.1 as a component of Image SLES15-SP5-CHOST-BYOS-Aliyun
@@ -3184,6 +3232,17 @@
Container suse/hpc/warewulf4-x86_64/sle-hpc-node:15.6.17.5.49:kernel-default-6.4.0-150600.23.25.1
Container suse/sle-micro/kvm-5.5:2.0.4-3.5.197:kernel-default-base-5.14.21-150500.55.83.1.150500.6.37.1
Container suse/sle-micro/rt-5.5:2.0.4-4.5.211:kernel-rt-5.14.21-150500.13.73.1
+ Image SLES12-SP5-GCE-BYOS:kernel-default-4.12.14-122.231.1
+ Image SLES12-SP5-GCE-SAP-BYOS:cluster-md-kmp-default-4.12.14-122.231.1
+ Image SLES12-SP5-GCE-SAP-BYOS:dlm-kmp-default-4.12.14-122.231.1
+ Image SLES12-SP5-GCE-SAP-BYOS:gfs2-kmp-default-4.12.14-122.231.1
+ Image SLES12-SP5-GCE-SAP-BYOS:kernel-default-4.12.14-122.231.1
+ Image SLES12-SP5-GCE-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.231.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:cluster-md-kmp-default-4.12.14-122.231.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:dlm-kmp-default-4.12.14-122.231.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:gfs2-kmp-default-4.12.14-122.231.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:kernel-default-4.12.14-122.231.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:ocfs2-kmp-default-4.12.14-122.231.1
Image SLES15-SP5-CHOST-BYOS-Aliyun:kernel-default-5.14.21-150500.55.83.1
Image SLES15-SP5-CHOST-BYOS-Azure:kernel-default-5.14.21-150500.55.83.1
Image SLES15-SP5-CHOST-BYOS-EC2:kernel-default-5.14.21-150500.55.83.1
no cpe found for SUSE Linux Enterprise Module for Confidential Computing Technical Preview 15 SP6 in CVE-2024-44972
skipping CVE-2024-44981 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-44980 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-44979 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-44978 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-44977 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-44976 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-44975 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-44974 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-44973 as CVE page is older than CVRF-CVE file.
no cpe found for SUSE Linux Enterprise Module for Confidential Computing Technical Preview 15 SP6 in CVE-2024-44969
skipping CVE-2024-44971 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-44970 as CVE page is older than CVRF-CVE file.
--- /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2024-44969.xml 2024-10-22 01:16:31.992049000 +0200
+++ /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2024-44969.xml.new 2024-10-29 01:13:39.812811000 +0100
@@ -14,13 +14,13 @@
1
- 11
- 2024-10-21T23:16:31Z
+ 12
+ 2024-10-29T00:13:39Z
current
2024-09-04T23:10:19Z
- 2024-10-21T23:16:31Z
+ 2024-10-29T00:13:39Z
cve-database/bin/generate-cvrf-cve.pl
2020-12-27T01:00:00Z
@@ -116,6 +116,21 @@
Container suse/sle-micro/rt-5.5:2.0.4-4.5.211
+
+
+ Image SLES12-SP5-GCE-BYOS
+
+
+
+
+ Image SLES12-SP5-GCE-SAP-BYOS
+
+
+
+
+ Image SLES12-SP5-GCE-SAP-On-Demand
+
+
Image SLES15-SP5-CHOST-BYOS-Aliyun
@@ -1583,6 +1598,39 @@
kernel-rt-5.14.21-150500.13.73.1 as a component of Container suse/sle-micro/rt-5.5:2.0.4-4.5.211
+
+ kernel-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-BYOS
+
+
+ cluster-md-kmp-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ dlm-kmp-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ gfs2-kmp-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ kernel-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ ocfs2-kmp-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ cluster-md-kmp-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
+
+ dlm-kmp-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
+
+ gfs2-kmp-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
+
+ kernel-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
+
+ ocfs2-kmp-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
kernel-default-5.14.21-150500.55.83.1 as a component of Image SLES15-SP5-CHOST-BYOS-Aliyun
@@ -3142,6 +3190,17 @@
Container suse/hpc/warewulf4-x86_64/sle-hpc-node:15.6.17.5.49:kernel-default-6.4.0-150600.23.25.1
Container suse/sle-micro/kvm-5.5:2.0.4-3.5.197:kernel-default-base-5.14.21-150500.55.83.1.150500.6.37.1
Container suse/sle-micro/rt-5.5:2.0.4-4.5.211:kernel-rt-5.14.21-150500.13.73.1
+ Image SLES12-SP5-GCE-BYOS:kernel-default-4.12.14-122.231.1
+ Image SLES12-SP5-GCE-SAP-BYOS:cluster-md-kmp-default-4.12.14-122.231.1
+ Image SLES12-SP5-GCE-SAP-BYOS:dlm-kmp-default-4.12.14-122.231.1
+ Image SLES12-SP5-GCE-SAP-BYOS:gfs2-kmp-default-4.12.14-122.231.1
+ Image SLES12-SP5-GCE-SAP-BYOS:kernel-default-4.12.14-122.231.1
+ Image SLES12-SP5-GCE-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.231.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:cluster-md-kmp-default-4.12.14-122.231.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:dlm-kmp-default-4.12.14-122.231.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:gfs2-kmp-default-4.12.14-122.231.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:kernel-default-4.12.14-122.231.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:ocfs2-kmp-default-4.12.14-122.231.1
Image SLES15-SP5-CHOST-BYOS-Aliyun:kernel-default-5.14.21-150500.55.83.1
Image SLES15-SP5-CHOST-BYOS-Azure:kernel-default-5.14.21-150500.55.83.1
Image SLES15-SP5-CHOST-BYOS-EC2:kernel-default-5.14.21-150500.55.83.1
no cpe found for SUSE Linux Enterprise Module for Confidential Computing Technical Preview 15 SP6 in CVE-2024-44960
skipping CVE-2024-44968 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-44967 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-44966 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-44965 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-44964 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-44963 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-44962 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-44961 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-44959 as CVE page is older than CVRF-CVE file.
no cpe found for SUSE Linux Enterprise Module for Confidential Computing Technical Preview 15 SP6 in CVE-2024-44954
skipping CVE-2024-44957 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-44956 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-44955 as CVE page is older than CVRF-CVE file.
--- /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2024-44954.xml 2024-10-16 01:13:27.167478000 +0200
+++ /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2024-44954.xml.new 2024-10-29 01:13:41.525220000 +0100
@@ -14,13 +14,13 @@
1
- 11
- 2024-10-15T23:13:26Z
+ 12
+ 2024-10-29T00:13:41Z
current
2024-09-04T23:10:23Z
- 2024-10-15T23:13:26Z
+ 2024-10-29T00:13:41Z
cve-database/bin/generate-cvrf-cve.pl
2020-12-27T01:00:00Z
@@ -113,6 +113,21 @@
Container suse/sle-micro/rt-5.5:2.0.4-4.5.211
+
+
+ Image SLES12-SP5-GCE-BYOS
+
+
+
+
+ Image SLES12-SP5-GCE-SAP-BYOS
+
+
+
+
+ Image SLES12-SP5-GCE-SAP-On-Demand
+
+
Image SLES15-SP5-CHOST-BYOS-Aliyun
@@ -1580,6 +1595,39 @@
kernel-rt-5.14.21-150500.13.73.1 as a component of Container suse/sle-micro/rt-5.5:2.0.4-4.5.211
+
+ kernel-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-BYOS
+
+
+ cluster-md-kmp-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ dlm-kmp-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ gfs2-kmp-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ kernel-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ ocfs2-kmp-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ cluster-md-kmp-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
+
+ dlm-kmp-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
+
+ gfs2-kmp-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
+
+ kernel-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
+
+ ocfs2-kmp-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
kernel-default-5.14.21-150500.55.83.1 as a component of Image SLES15-SP5-CHOST-BYOS-Aliyun
@@ -3130,6 +3178,17 @@
Container suse/hpc/warewulf4-x86_64/sle-hpc-node:15.6.17.5.49:kernel-default-6.4.0-150600.23.25.1
Container suse/sle-micro/kvm-5.5:2.0.4-3.5.197:kernel-default-base-5.14.21-150500.55.83.1.150500.6.37.1
Container suse/sle-micro/rt-5.5:2.0.4-4.5.211:kernel-rt-5.14.21-150500.13.73.1
+ Image SLES12-SP5-GCE-BYOS:kernel-default-4.12.14-122.231.1
+ Image SLES12-SP5-GCE-SAP-BYOS:cluster-md-kmp-default-4.12.14-122.231.1
+ Image SLES12-SP5-GCE-SAP-BYOS:dlm-kmp-default-4.12.14-122.231.1
+ Image SLES12-SP5-GCE-SAP-BYOS:gfs2-kmp-default-4.12.14-122.231.1
+ Image SLES12-SP5-GCE-SAP-BYOS:kernel-default-4.12.14-122.231.1
+ Image SLES12-SP5-GCE-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.231.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:cluster-md-kmp-default-4.12.14-122.231.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:dlm-kmp-default-4.12.14-122.231.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:gfs2-kmp-default-4.12.14-122.231.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:kernel-default-4.12.14-122.231.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:ocfs2-kmp-default-4.12.14-122.231.1
Image SLES15-SP5-CHOST-BYOS-Aliyun:kernel-default-5.14.21-150500.55.83.1
Image SLES15-SP5-CHOST-BYOS-Azure:kernel-default-5.14.21-150500.55.83.1
Image SLES15-SP5-CHOST-BYOS-EC2:kernel-default-5.14.21-150500.55.83.1
no cpe found for SUSE Linux Enterprise Module for Confidential Computing Technical Preview 15 SP6 in CVE-2024-44952
skipping CVE-2024-44953 as CVE page is older than CVRF-CVE file.
--- /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2024-44952.xml 2024-10-16 01:13:28.148457000 +0200
+++ /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2024-44952.xml.new 2024-10-29 01:13:42.271340000 +0100
@@ -14,13 +14,13 @@
1
- 11
- 2024-10-15T23:13:27Z
+ 12
+ 2024-10-29T00:13:41Z
current
2024-09-04T23:10:25Z
- 2024-10-15T23:13:27Z
+ 2024-10-29T00:13:41Z
cve-database/bin/generate-cvrf-cve.pl
2020-12-27T01:00:00Z
@@ -169,6 +169,21 @@
Container suse/sle-micro/rt-5.5:2.0.4-4.5.211
+
+
+ Image SLES12-SP5-GCE-BYOS
+
+
+
+
+ Image SLES12-SP5-GCE-SAP-BYOS
+
+
+
+
+ Image SLES12-SP5-GCE-SAP-On-Demand
+
+
Image SLES15-SP5-CHOST-BYOS-Aliyun
@@ -1636,6 +1651,39 @@
kernel-rt-5.14.21-150500.13.73.1 as a component of Container suse/sle-micro/rt-5.5:2.0.4-4.5.211
+
+ kernel-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-BYOS
+
+
+ cluster-md-kmp-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ dlm-kmp-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ gfs2-kmp-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ kernel-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ ocfs2-kmp-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ cluster-md-kmp-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
+
+ dlm-kmp-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
+
+ gfs2-kmp-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
+
+ kernel-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
+
+ ocfs2-kmp-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
kernel-default-5.14.21-150500.55.83.1 as a component of Image SLES15-SP5-CHOST-BYOS-Aliyun
@@ -3242,6 +3290,17 @@
Container suse/hpc/warewulf4-x86_64/sle-hpc-node:15.6.17.5.49:kernel-default-6.4.0-150600.23.25.1
Container suse/sle-micro/kvm-5.5:2.0.4-3.5.197:kernel-default-base-5.14.21-150500.55.83.1.150500.6.37.1
Container suse/sle-micro/rt-5.5:2.0.4-4.5.211:kernel-rt-5.14.21-150500.13.73.1
+ Image SLES12-SP5-GCE-BYOS:kernel-default-4.12.14-122.231.1
+ Image SLES12-SP5-GCE-SAP-BYOS:cluster-md-kmp-default-4.12.14-122.231.1
+ Image SLES12-SP5-GCE-SAP-BYOS:dlm-kmp-default-4.12.14-122.231.1
+ Image SLES12-SP5-GCE-SAP-BYOS:gfs2-kmp-default-4.12.14-122.231.1
+ Image SLES12-SP5-GCE-SAP-BYOS:kernel-default-4.12.14-122.231.1
+ Image SLES12-SP5-GCE-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.231.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:cluster-md-kmp-default-4.12.14-122.231.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:dlm-kmp-default-4.12.14-122.231.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:gfs2-kmp-default-4.12.14-122.231.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:kernel-default-4.12.14-122.231.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:ocfs2-kmp-default-4.12.14-122.231.1
Image SLES15-SP5-CHOST-BYOS-Aliyun:kernel-default-5.14.21-150500.55.83.1
Image SLES15-SP5-CHOST-BYOS-Azure:kernel-default-5.14.21-150500.55.83.1
Image SLES15-SP5-CHOST-BYOS-EC2:kernel-default-5.14.21-150500.55.83.1
skipping CVE-2024-44951 as CVE page is older than CVRF-CVE file.
--- /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2024-44950.xml 2024-10-16 01:13:29.362924000 +0200
+++ /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2024-44950.xml.new 2024-10-29 01:13:42.951269000 +0100
@@ -14,13 +14,13 @@
1
- 11
- 2024-10-15T23:13:28Z
+ 12
+ 2024-10-29T00:13:42Z
current
2024-09-04T23:10:25Z
- 2024-10-15T23:13:28Z
+ 2024-10-29T00:13:42Z
cve-database/bin/generate-cvrf-cve.pl
2020-12-27T01:00:00Z
@@ -120,6 +120,21 @@
Container suse/sle-micro/rt-5.5:2.0.4-4.5.211
+
+
+ Image SLES12-SP5-GCE-BYOS
+
+
+
+
+ Image SLES12-SP5-GCE-SAP-BYOS
+
+
+
+
+ Image SLES12-SP5-GCE-SAP-On-Demand
+
+
Image SLES15-SP5-CHOST-BYOS-Aliyun
@@ -1558,6 +1573,39 @@
kernel-rt-5.14.21-150500.13.73.1 as a component of Container suse/sle-micro/rt-5.5:2.0.4-4.5.211
+
+ kernel-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-BYOS
+
+
+ cluster-md-kmp-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ dlm-kmp-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ gfs2-kmp-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ kernel-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ ocfs2-kmp-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ cluster-md-kmp-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
+
+ dlm-kmp-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
+
+ gfs2-kmp-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
+
+ kernel-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
+
+ ocfs2-kmp-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
kernel-default-5.14.21-150500.55.83.1 as a component of Image SLES15-SP5-CHOST-BYOS-Aliyun
@@ -3095,6 +3143,17 @@
Container suse/hpc/warewulf4-x86_64/sle-hpc-node:15.6.17.5.49:kernel-default-6.4.0-150600.23.25.1
Container suse/sle-micro/kvm-5.5:2.0.4-3.5.197:kernel-default-base-5.14.21-150500.55.83.1.150500.6.37.1
Container suse/sle-micro/rt-5.5:2.0.4-4.5.211:kernel-rt-5.14.21-150500.13.73.1
+ Image SLES12-SP5-GCE-BYOS:kernel-default-4.12.14-122.231.1
+ Image SLES12-SP5-GCE-SAP-BYOS:cluster-md-kmp-default-4.12.14-122.231.1
+ Image SLES12-SP5-GCE-SAP-BYOS:dlm-kmp-default-4.12.14-122.231.1
+ Image SLES12-SP5-GCE-SAP-BYOS:gfs2-kmp-default-4.12.14-122.231.1
+ Image SLES12-SP5-GCE-SAP-BYOS:kernel-default-4.12.14-122.231.1
+ Image SLES12-SP5-GCE-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.231.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:cluster-md-kmp-default-4.12.14-122.231.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:dlm-kmp-default-4.12.14-122.231.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:gfs2-kmp-default-4.12.14-122.231.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:kernel-default-4.12.14-122.231.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:ocfs2-kmp-default-4.12.14-122.231.1
Image SLES15-SP5-CHOST-BYOS-Aliyun:kernel-default-5.14.21-150500.55.83.1
Image SLES15-SP5-CHOST-BYOS-Azure:kernel-default-5.14.21-150500.55.83.1
Image SLES15-SP5-CHOST-BYOS-EC2:kernel-default-5.14.21-150500.55.83.1
no cpe found for SUSE Linux Enterprise Module for Confidential Computing Technical Preview 15 SP6 in CVE-2024-44948
skipping CVE-2024-44949 as CVE page is older than CVRF-CVE file.
--- /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2024-44948.xml 2024-10-16 01:13:30.328832000 +0200
+++ /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2024-44948.xml.new 2024-10-29 01:13:43.606131000 +0100
@@ -14,13 +14,13 @@
1
- 11
- 2024-10-15T23:13:29Z
+ 12
+ 2024-10-29T00:13:43Z
current
2024-09-04T23:10:26Z
- 2024-10-15T23:13:29Z
+ 2024-10-29T00:13:43Z
cve-database/bin/generate-cvrf-cve.pl
2020-12-27T01:00:00Z
@@ -119,6 +119,21 @@
Container suse/sle-micro/rt-5.5:2.0.4-4.5.211
+
+
+ Image SLES12-SP5-GCE-BYOS
+
+
+
+
+ Image SLES12-SP5-GCE-SAP-BYOS
+
+
+
+
+ Image SLES12-SP5-GCE-SAP-On-Demand
+
+
Image SLES15-SP5-CHOST-BYOS-Aliyun
@@ -1586,6 +1601,39 @@
kernel-rt-5.14.21-150500.13.73.1 as a component of Container suse/sle-micro/rt-5.5:2.0.4-4.5.211
+
+ kernel-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-BYOS
+
+
+ cluster-md-kmp-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ dlm-kmp-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ gfs2-kmp-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ kernel-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ ocfs2-kmp-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ cluster-md-kmp-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
+
+ dlm-kmp-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
+
+ gfs2-kmp-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
+
+ kernel-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
+
+ ocfs2-kmp-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
kernel-default-5.14.21-150500.55.83.1 as a component of Image SLES15-SP5-CHOST-BYOS-Aliyun
@@ -3142,6 +3190,17 @@
Container suse/hpc/warewulf4-x86_64/sle-hpc-node:15.6.17.5.49:kernel-default-6.4.0-150600.23.25.1
Container suse/sle-micro/kvm-5.5:2.0.4-3.5.197:kernel-default-base-5.14.21-150500.55.83.1.150500.6.37.1
Container suse/sle-micro/rt-5.5:2.0.4-4.5.211:kernel-rt-5.14.21-150500.13.73.1
+ Image SLES12-SP5-GCE-BYOS:kernel-default-4.12.14-122.231.1
+ Image SLES12-SP5-GCE-SAP-BYOS:cluster-md-kmp-default-4.12.14-122.231.1
+ Image SLES12-SP5-GCE-SAP-BYOS:dlm-kmp-default-4.12.14-122.231.1
+ Image SLES12-SP5-GCE-SAP-BYOS:gfs2-kmp-default-4.12.14-122.231.1
+ Image SLES12-SP5-GCE-SAP-BYOS:kernel-default-4.12.14-122.231.1
+ Image SLES12-SP5-GCE-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.231.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:cluster-md-kmp-default-4.12.14-122.231.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:dlm-kmp-default-4.12.14-122.231.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:gfs2-kmp-default-4.12.14-122.231.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:kernel-default-4.12.14-122.231.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:ocfs2-kmp-default-4.12.14-122.231.1
Image SLES15-SP5-CHOST-BYOS-Aliyun:kernel-default-5.14.21-150500.55.83.1
Image SLES15-SP5-CHOST-BYOS-Azure:kernel-default-5.14.21-150500.55.83.1
Image SLES15-SP5-CHOST-BYOS-EC2:kernel-default-5.14.21-150500.55.83.1
no cpe found for SUSE Linux Enterprise Module for Confidential Computing Technical Preview 15 SP6 in CVE-2024-44947
no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2024-44947
--- /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2024-44947.xml 2024-10-20 01:12:39.435734000 +0200
+++ /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2024-44947.xml.new 2024-10-29 01:13:44.345093000 +0100
@@ -14,13 +14,13 @@
1
- 29
- 2024-10-19T23:12:38Z
+ 30
+ 2024-10-29T00:13:43Z
current
2024-09-02T23:09:53Z
- 2024-10-19T23:12:38Z
+ 2024-10-29T00:13:43Z
cve-database/bin/generate-cvrf-cve.pl
2020-12-27T01:00:00Z
@@ -158,6 +158,21 @@
Container suse/sle-micro/rt-5.5:2.0.4-4.5.160
+
+
+ Image SLES12-SP5-GCE-BYOS
+
+
+
+
+ Image SLES12-SP5-GCE-SAP-BYOS
+
+
+
+
+ Image SLES12-SP5-GCE-SAP-On-Demand
+
+
Image SLES15-SP4-SAP-Azure-LI-BYOS
@@ -1943,6 +1958,39 @@
kernel-rt-5.14.21-150500.13.67.3 as a component of Container suse/sle-micro/rt-5.5:2.0.4-4.5.160
+
+ kernel-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-BYOS
+
+
+ cluster-md-kmp-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ dlm-kmp-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ gfs2-kmp-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ kernel-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ ocfs2-kmp-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ cluster-md-kmp-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
+
+ dlm-kmp-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
+
+ gfs2-kmp-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
+
+ kernel-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
+
+ ocfs2-kmp-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
cluster-md-kmp-default-5.14.21-150400.24.133.2 as a component of Image SLES15-SP4-SAP-Azure-LI-BYOS
@@ -4033,6 +4081,17 @@
Container suse/sle-micro-rancher/5.4:latest:kernel-default-5.14.21-150400.24.133.2
Container suse/sle-micro/kvm-5.5:2.0.4-3.5.184:kernel-default-base-5.14.21-150500.55.80.2.150500.6.35.6
Container suse/sle-micro/rt-5.5:2.0.4-4.5.160:kernel-rt-5.14.21-150500.13.67.3
+ Image SLES12-SP5-GCE-BYOS:kernel-default-4.12.14-122.231.1
+ Image SLES12-SP5-GCE-SAP-BYOS:cluster-md-kmp-default-4.12.14-122.231.1
+ Image SLES12-SP5-GCE-SAP-BYOS:dlm-kmp-default-4.12.14-122.231.1
+ Image SLES12-SP5-GCE-SAP-BYOS:gfs2-kmp-default-4.12.14-122.231.1
+ Image SLES12-SP5-GCE-SAP-BYOS:kernel-default-4.12.14-122.231.1
+ Image SLES12-SP5-GCE-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.231.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:cluster-md-kmp-default-4.12.14-122.231.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:dlm-kmp-default-4.12.14-122.231.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:gfs2-kmp-default-4.12.14-122.231.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:kernel-default-4.12.14-122.231.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:ocfs2-kmp-default-4.12.14-122.231.1
Image SLES15-SP4-SAP-Azure-LI-BYOS:cluster-md-kmp-default-5.14.21-150400.24.133.2
Image SLES15-SP4-SAP-Azure-LI-BYOS:dlm-kmp-default-5.14.21-150400.24.133.2
Image SLES15-SP4-SAP-Azure-LI-BYOS:gfs2-kmp-default-5.14.21-150400.24.133.2
no cpe found for SUSE Linux Enterprise Module for Confidential Computing Technical Preview 15 SP6 in CVE-2024-44946
no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2024-44946
--- /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2024-44946.xml 2024-10-20 01:12:40.139710000 +0200
+++ /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2024-44946.xml.new 2024-10-29 01:13:45.130082000 +0100
@@ -14,13 +14,13 @@
1
- 12
- 2024-10-19T23:12:39Z
+ 13
+ 2024-10-29T00:13:44Z
current
2024-08-31T23:09:48Z
- 2024-10-19T23:12:39Z
+ 2024-10-29T00:13:44Z
cve-database/bin/generate-cvrf-cve.pl
2020-12-27T01:00:00Z
@@ -225,6 +225,21 @@
Container suse/sle-micro/rt-5.5:2.0.4-4.5.211
+
+
+ Image SLES12-SP5-GCE-BYOS
+
+
+
+
+ Image SLES12-SP5-GCE-SAP-BYOS
+
+
+
+
+ Image SLES12-SP5-GCE-SAP-On-Demand
+
+
Image SLES15-SP4-SAP-Azure-LI-BYOS
@@ -1933,6 +1948,39 @@
kernel-rt-5.14.21-150500.13.73.1 as a component of Container suse/sle-micro/rt-5.5:2.0.4-4.5.211
+
+ kernel-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-BYOS
+
+
+ cluster-md-kmp-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ dlm-kmp-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ gfs2-kmp-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ kernel-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ ocfs2-kmp-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ cluster-md-kmp-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
+
+ dlm-kmp-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
+
+ gfs2-kmp-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
+
+ kernel-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
+
+ ocfs2-kmp-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
cluster-md-kmp-default-5.14.21-150400.24.136.1 as a component of Image SLES15-SP4-SAP-Azure-LI-BYOS
@@ -3953,6 +4001,17 @@
Container suse/sle-micro-rancher/5.4:latest:kernel-default-5.14.21-150400.24.136.1
Container suse/sle-micro/kvm-5.5:2.0.4-3.5.197:kernel-default-base-5.14.21-150500.55.83.1.150500.6.37.1
Container suse/sle-micro/rt-5.5:2.0.4-4.5.211:kernel-rt-5.14.21-150500.13.73.1
+ Image SLES12-SP5-GCE-BYOS:kernel-default-4.12.14-122.231.1
+ Image SLES12-SP5-GCE-SAP-BYOS:cluster-md-kmp-default-4.12.14-122.231.1
+ Image SLES12-SP5-GCE-SAP-BYOS:dlm-kmp-default-4.12.14-122.231.1
+ Image SLES12-SP5-GCE-SAP-BYOS:gfs2-kmp-default-4.12.14-122.231.1
+ Image SLES12-SP5-GCE-SAP-BYOS:kernel-default-4.12.14-122.231.1
+ Image SLES12-SP5-GCE-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.231.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:cluster-md-kmp-default-4.12.14-122.231.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:dlm-kmp-default-4.12.14-122.231.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:gfs2-kmp-default-4.12.14-122.231.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:kernel-default-4.12.14-122.231.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:ocfs2-kmp-default-4.12.14-122.231.1
Image SLES15-SP4-SAP-Azure-LI-BYOS:cluster-md-kmp-default-5.14.21-150400.24.136.1
Image SLES15-SP4-SAP-Azure-LI-BYOS:dlm-kmp-default-5.14.21-150400.24.136.1
Image SLES15-SP4-SAP-Azure-LI-BYOS:gfs2-kmp-default-5.14.21-150400.24.136.1
skipping CVE-2024-44945 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-44944 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-44943 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-44942 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-44941 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-44940 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-44939 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-44938 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-44937 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-44936 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-44935 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-44934 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-44933 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-44932 as CVE page is older than CVRF-CVE file.
Use of uninitialized value $mtime in numeric lt (<) at bin/generate-cvrf-cve.pl line 162.
no cpe found for SUSE Linux Enterprise Server 12 SP5 LTSS Extended Security in CVE-2024-44187
no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2024-44187
no cpe found for SUSE Linux Enterprise Module for Confidential Computing Technical Preview 15 SP6 in CVE-2024-43914
skipping CVE-2024-44070 as CVE page is older than CVRF-CVE file.
--- /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2024-43914.xml 2024-10-16 01:13:41.367797000 +0200
+++ /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2024-43914.xml.new 2024-10-29 01:13:47.625917000 +0100
@@ -14,13 +14,13 @@
1
- 11
- 2024-10-15T23:13:40Z
+ 12
+ 2024-10-29T00:13:47Z
current
2024-08-26T23:09:52Z
- 2024-10-15T23:13:40Z
+ 2024-10-29T00:13:47Z
cve-database/bin/generate-cvrf-cve.pl
2020-12-27T01:00:00Z
@@ -138,6 +138,21 @@
Container suse/sle-micro/rt-5.5:2.0.4-4.5.211
+
+
+ Image SLES12-SP5-GCE-BYOS
+
+
+
+
+ Image SLES12-SP5-GCE-SAP-BYOS
+
+
+
+
+ Image SLES12-SP5-GCE-SAP-On-Demand
+
+
Image SLES15-SP5-CHOST-BYOS-Aliyun
@@ -1542,6 +1557,39 @@
kernel-rt-5.14.21-150500.13.73.1 as a component of Container suse/sle-micro/rt-5.5:2.0.4-4.5.211
+
+ kernel-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-BYOS
+
+
+ cluster-md-kmp-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ dlm-kmp-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ gfs2-kmp-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ kernel-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ ocfs2-kmp-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ cluster-md-kmp-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
+
+ dlm-kmp-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
+
+ gfs2-kmp-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
+
+ kernel-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
+
+ ocfs2-kmp-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
kernel-default-5.14.21-150500.55.83.1 as a component of Image SLES15-SP5-CHOST-BYOS-Aliyun
@@ -2925,6 +2973,17 @@
Container suse/hpc/warewulf4-x86_64/sle-hpc-node:15.6.17.5.49:kernel-default-6.4.0-150600.23.25.1
Container suse/sle-micro/kvm-5.5:2.0.4-3.5.197:kernel-default-base-5.14.21-150500.55.83.1.150500.6.37.1
Container suse/sle-micro/rt-5.5:2.0.4-4.5.211:kernel-rt-5.14.21-150500.13.73.1
+ Image SLES12-SP5-GCE-BYOS:kernel-default-4.12.14-122.231.1
+ Image SLES12-SP5-GCE-SAP-BYOS:cluster-md-kmp-default-4.12.14-122.231.1
+ Image SLES12-SP5-GCE-SAP-BYOS:dlm-kmp-default-4.12.14-122.231.1
+ Image SLES12-SP5-GCE-SAP-BYOS:gfs2-kmp-default-4.12.14-122.231.1
+ Image SLES12-SP5-GCE-SAP-BYOS:kernel-default-4.12.14-122.231.1
+ Image SLES12-SP5-GCE-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.231.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:cluster-md-kmp-default-4.12.14-122.231.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:dlm-kmp-default-4.12.14-122.231.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:gfs2-kmp-default-4.12.14-122.231.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:kernel-default-4.12.14-122.231.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:ocfs2-kmp-default-4.12.14-122.231.1
Image SLES15-SP5-CHOST-BYOS-Aliyun:kernel-default-5.14.21-150500.55.83.1
Image SLES15-SP5-CHOST-BYOS-Azure:kernel-default-5.14.21-150500.55.83.1
Image SLES15-SP5-CHOST-BYOS-EC2:kernel-default-5.14.21-150500.55.83.1
skipping CVE-2024-43913 as CVE page is older than CVRF-CVE file.
--- /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2024-43912.xml 2024-10-16 01:13:42.714664000 +0200
+++ /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2024-43912.xml.new 2024-10-29 01:13:49.597840000 +0100
@@ -14,13 +14,13 @@
1
- 18
- 2024-10-15T23:13:42Z
+ 19
+ 2024-10-29T00:13:48Z
current
2024-08-27T23:10:04Z
- 2024-10-15T23:13:42Z
+ 2024-10-29T00:13:48Z
cve-database/bin/generate-cvrf-cve.pl
2020-12-27T01:00:00Z
@@ -105,6 +105,21 @@
Container suse/sle-micro/rt-5.5:2.0.4-4.5.211
+
+
+ Image SLES12-SP5-GCE-BYOS
+
+
+
+
+ Image SLES12-SP5-GCE-SAP-BYOS
+
+
+
+
+ Image SLES12-SP5-GCE-SAP-On-Demand
+
+
Image SLES15-SP5-CHOST-BYOS-Aliyun
@@ -1535,6 +1550,39 @@
kernel-rt-5.14.21-150500.13.73.1 as a component of Container suse/sle-micro/rt-5.5:2.0.4-4.5.211
+
+ kernel-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-BYOS
+
+
+ cluster-md-kmp-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ dlm-kmp-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ gfs2-kmp-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ kernel-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ ocfs2-kmp-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ cluster-md-kmp-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
+
+ dlm-kmp-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
+
+ gfs2-kmp-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
+
+ kernel-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
+
+ ocfs2-kmp-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
kernel-default-5.14.21-150500.55.83.1 as a component of Image SLES15-SP5-CHOST-BYOS-Aliyun
@@ -2946,6 +2994,17 @@
Container suse/hpc/warewulf4-x86_64/sle-hpc-node:15.6.17.5.37:kernel-default-6.4.0-150600.23.22.1
Container suse/sle-micro/kvm-5.5:2.0.4-3.5.197:kernel-default-base-5.14.21-150500.55.83.1.150500.6.37.1
Container suse/sle-micro/rt-5.5:2.0.4-4.5.211:kernel-rt-5.14.21-150500.13.73.1
+ Image SLES12-SP5-GCE-BYOS:kernel-default-4.12.14-122.231.1
+ Image SLES12-SP5-GCE-SAP-BYOS:cluster-md-kmp-default-4.12.14-122.231.1
+ Image SLES12-SP5-GCE-SAP-BYOS:dlm-kmp-default-4.12.14-122.231.1
+ Image SLES12-SP5-GCE-SAP-BYOS:gfs2-kmp-default-4.12.14-122.231.1
+ Image SLES12-SP5-GCE-SAP-BYOS:kernel-default-4.12.14-122.231.1
+ Image SLES12-SP5-GCE-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.231.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:cluster-md-kmp-default-4.12.14-122.231.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:dlm-kmp-default-4.12.14-122.231.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:gfs2-kmp-default-4.12.14-122.231.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:kernel-default-4.12.14-122.231.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:ocfs2-kmp-default-4.12.14-122.231.1
Image SLES15-SP5-CHOST-BYOS-Aliyun:kernel-default-5.14.21-150500.55.83.1
Image SLES15-SP5-CHOST-BYOS-Azure:kernel-default-5.14.21-150500.55.83.1
Image SLES15-SP5-CHOST-BYOS-EC2:kernel-default-5.14.21-150500.55.83.1
skipping CVE-2024-43911 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-43910 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-43909 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-43908 as CVE page is older than CVRF-CVE file.
--- /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2024-43907.xml 2024-10-22 01:17:05.975765000 +0200
+++ /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2024-43907.xml.new 2024-10-29 01:13:52.143260000 +0100
@@ -14,13 +14,13 @@
1
- 24
- 2024-10-21T23:17:05Z
+ 25
+ 2024-10-29T00:13:50Z
current
2024-08-26T23:09:53Z
- 2024-10-21T23:17:05Z
+ 2024-10-29T00:13:50Z
cve-database/bin/generate-cvrf-cve.pl
2020-12-27T01:00:00Z
@@ -109,6 +109,21 @@
Image SLES12-SP5-Azure-SAP-BYOS
+
+
+ Image SLES12-SP5-GCE-BYOS
+
+
+
+
+ Image SLES12-SP5-GCE-SAP-BYOS
+
+
+
+
+ Image SLES12-SP5-GCE-SAP-On-Demand
+
+
Image SLES15-SP5-Azure-Basic
@@ -1573,6 +1588,39 @@
ocfs2-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-Azure-SAP-BYOS
+
+ kernel-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-BYOS
+
+
+ cluster-md-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ dlm-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ gfs2-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ kernel-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ ocfs2-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ cluster-md-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
+
+ dlm-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
+
+ gfs2-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
+
+ kernel-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
+
+ ocfs2-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
kernel-azure-5.14.21-150500.33.66.1 as a component of Image SLES15-SP5-Azure-Basic
@@ -3021,6 +3069,17 @@
Image SLES12-SP5-Azure-SAP-BYOS:gfs2-kmp-default-4.12.14-122.228.1
Image SLES12-SP5-Azure-SAP-BYOS:kernel-default-4.12.14-122.228.1
Image SLES12-SP5-Azure-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.228.1
+ Image SLES12-SP5-GCE-BYOS:kernel-default-4.12.14-122.228.1
+ Image SLES12-SP5-GCE-SAP-BYOS:cluster-md-kmp-default-4.12.14-122.228.1
+ Image SLES12-SP5-GCE-SAP-BYOS:dlm-kmp-default-4.12.14-122.228.1
+ Image SLES12-SP5-GCE-SAP-BYOS:gfs2-kmp-default-4.12.14-122.228.1
+ Image SLES12-SP5-GCE-SAP-BYOS:kernel-default-4.12.14-122.228.1
+ Image SLES12-SP5-GCE-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.228.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:cluster-md-kmp-default-4.12.14-122.228.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:dlm-kmp-default-4.12.14-122.228.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:gfs2-kmp-default-4.12.14-122.228.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:kernel-default-4.12.14-122.228.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:ocfs2-kmp-default-4.12.14-122.228.1
Image SLES15-SP5-Azure-Basic:kernel-azure-5.14.21-150500.33.66.1
Image SLES15-SP5-Azure-Standard:kernel-azure-5.14.21-150500.33.66.1
Image SLES15-SP5-CHOST-BYOS-Aliyun:kernel-default-5.14.21-150500.55.80.2
skipping CVE-2024-43906 as CVE page is older than CVRF-CVE file.
--- /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2024-43905.xml 2024-10-22 01:17:08.119144000 +0200
+++ /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2024-43905.xml.new 2024-10-29 01:13:52.854113000 +0100
@@ -14,13 +14,13 @@
1
- 24
- 2024-10-21T23:17:07Z
+ 25
+ 2024-10-29T00:13:52Z
current
2024-08-26T23:09:54Z
- 2024-10-21T23:17:07Z
+ 2024-10-29T00:13:52Z
cve-database/bin/generate-cvrf-cve.pl
2020-12-27T01:00:00Z
@@ -108,6 +108,21 @@
Image SLES12-SP5-Azure-SAP-BYOS
+
+
+ Image SLES12-SP5-GCE-BYOS
+
+
+
+
+ Image SLES12-SP5-GCE-SAP-BYOS
+
+
+
+
+ Image SLES12-SP5-GCE-SAP-On-Demand
+
+
Image SLES15-SP5-Azure-Basic
@@ -1572,6 +1587,39 @@
ocfs2-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-Azure-SAP-BYOS
+
+ kernel-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-BYOS
+
+
+ cluster-md-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ dlm-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ gfs2-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ kernel-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ ocfs2-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ cluster-md-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
+
+ dlm-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
+
+ gfs2-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
+
+ kernel-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
+
+ ocfs2-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
kernel-azure-5.14.21-150500.33.66.1 as a component of Image SLES15-SP5-Azure-Basic
@@ -3019,6 +3067,17 @@
Image SLES12-SP5-Azure-SAP-BYOS:gfs2-kmp-default-4.12.14-122.228.1
Image SLES12-SP5-Azure-SAP-BYOS:kernel-default-4.12.14-122.228.1
Image SLES12-SP5-Azure-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.228.1
+ Image SLES12-SP5-GCE-BYOS:kernel-default-4.12.14-122.228.1
+ Image SLES12-SP5-GCE-SAP-BYOS:cluster-md-kmp-default-4.12.14-122.228.1
+ Image SLES12-SP5-GCE-SAP-BYOS:dlm-kmp-default-4.12.14-122.228.1
+ Image SLES12-SP5-GCE-SAP-BYOS:gfs2-kmp-default-4.12.14-122.228.1
+ Image SLES12-SP5-GCE-SAP-BYOS:kernel-default-4.12.14-122.228.1
+ Image SLES12-SP5-GCE-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.228.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:cluster-md-kmp-default-4.12.14-122.228.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:dlm-kmp-default-4.12.14-122.228.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:gfs2-kmp-default-4.12.14-122.228.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:kernel-default-4.12.14-122.228.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:ocfs2-kmp-default-4.12.14-122.228.1
Image SLES15-SP5-Azure-Basic:kernel-azure-5.14.21-150500.33.66.1
Image SLES15-SP5-Azure-Standard:kernel-azure-5.14.21-150500.33.66.1
Image SLES15-SP5-CHOST-BYOS-Aliyun:kernel-default-5.14.21-150500.55.80.2
no cpe found for SUSE Linux Enterprise Module for Confidential Computing Technical Preview 15 SP6 in CVE-2024-43904
skipping CVE-2024-43903 as CVE page is older than CVRF-CVE file.
--- /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2024-43902.xml 2024-10-22 01:17:10.483012000 +0200
+++ /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2024-43902.xml.new 2024-10-29 01:13:54.387073000 +0100
@@ -14,13 +14,13 @@
1
- 23
- 2024-10-21T23:17:10Z
+ 24
+ 2024-10-29T00:13:53Z
current
2024-08-26T23:09:55Z
- 2024-10-21T23:17:10Z
+ 2024-10-29T00:13:53Z
cve-database/bin/generate-cvrf-cve.pl
2020-12-27T01:00:00Z
@@ -110,6 +110,21 @@
Image SLES12-SP5-Azure-SAP-BYOS
+
+
+ Image SLES12-SP5-GCE-BYOS
+
+
+
+
+ Image SLES12-SP5-GCE-SAP-BYOS
+
+
+
+
+ Image SLES12-SP5-GCE-SAP-On-Demand
+
+
Image SLES15-SP5-Azure-Basic
@@ -1574,6 +1589,39 @@
ocfs2-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-Azure-SAP-BYOS
+
+ kernel-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-BYOS
+
+
+ cluster-md-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ dlm-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ gfs2-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ kernel-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ ocfs2-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ cluster-md-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
+
+ dlm-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
+
+ gfs2-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
+
+ kernel-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
+
+ ocfs2-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
kernel-azure-5.14.21-150500.33.66.1 as a component of Image SLES15-SP5-Azure-Basic
@@ -3023,6 +3071,17 @@
Image SLES12-SP5-Azure-SAP-BYOS:gfs2-kmp-default-4.12.14-122.228.1
Image SLES12-SP5-Azure-SAP-BYOS:kernel-default-4.12.14-122.228.1
Image SLES12-SP5-Azure-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.228.1
+ Image SLES12-SP5-GCE-BYOS:kernel-default-4.12.14-122.228.1
+ Image SLES12-SP5-GCE-SAP-BYOS:cluster-md-kmp-default-4.12.14-122.228.1
+ Image SLES12-SP5-GCE-SAP-BYOS:dlm-kmp-default-4.12.14-122.228.1
+ Image SLES12-SP5-GCE-SAP-BYOS:gfs2-kmp-default-4.12.14-122.228.1
+ Image SLES12-SP5-GCE-SAP-BYOS:kernel-default-4.12.14-122.228.1
+ Image SLES12-SP5-GCE-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.228.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:cluster-md-kmp-default-4.12.14-122.228.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:dlm-kmp-default-4.12.14-122.228.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:gfs2-kmp-default-4.12.14-122.228.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:kernel-default-4.12.14-122.228.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:ocfs2-kmp-default-4.12.14-122.228.1
Image SLES15-SP5-Azure-Basic:kernel-azure-5.14.21-150500.33.66.1
Image SLES15-SP5-Azure-Standard:kernel-azure-5.14.21-150500.33.66.1
Image SLES15-SP5-CHOST-BYOS-Aliyun:kernel-default-5.14.21-150500.55.80.2
skipping CVE-2024-43901 as CVE page is older than CVRF-CVE file.
--- /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2024-43900.xml 2024-10-16 01:13:48.146940000 +0200
+++ /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2024-43900.xml.new 2024-10-29 01:13:55.390030000 +0100
@@ -14,13 +14,13 @@
1
- 27
- 2024-10-15T23:13:47Z
+ 28
+ 2024-10-29T00:13:54Z
current
2024-08-26T23:09:56Z
- 2024-10-15T23:13:47Z
+ 2024-10-29T00:13:54Z
cve-database/bin/generate-cvrf-cve.pl
2020-12-27T01:00:00Z
@@ -194,6 +194,21 @@
Image SLES12-SP5-Azure-SAP-BYOS
+
+
+ Image SLES12-SP5-GCE-BYOS
+
+
+
+
+ Image SLES12-SP5-GCE-SAP-BYOS
+
+
+
+
+ Image SLES12-SP5-GCE-SAP-On-Demand
+
+
Image SLES15-SP5-Azure-Basic
@@ -1732,6 +1747,39 @@
ocfs2-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-Azure-SAP-BYOS
+
+ kernel-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-BYOS
+
+
+ cluster-md-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ dlm-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ gfs2-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ kernel-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ ocfs2-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ cluster-md-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
+
+ dlm-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
+
+ gfs2-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
+
+ kernel-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
+
+ ocfs2-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
kernel-azure-5.14.21-150500.33.66.1 as a component of Image SLES15-SP5-Azure-Basic
@@ -3460,6 +3508,17 @@
Image SLES12-SP5-Azure-SAP-BYOS:gfs2-kmp-default-4.12.14-122.228.1
Image SLES12-SP5-Azure-SAP-BYOS:kernel-default-4.12.14-122.228.1
Image SLES12-SP5-Azure-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.228.1
+ Image SLES12-SP5-GCE-BYOS:kernel-default-4.12.14-122.228.1
+ Image SLES12-SP5-GCE-SAP-BYOS:cluster-md-kmp-default-4.12.14-122.228.1
+ Image SLES12-SP5-GCE-SAP-BYOS:dlm-kmp-default-4.12.14-122.228.1
+ Image SLES12-SP5-GCE-SAP-BYOS:gfs2-kmp-default-4.12.14-122.228.1
+ Image SLES12-SP5-GCE-SAP-BYOS:kernel-default-4.12.14-122.228.1
+ Image SLES12-SP5-GCE-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.228.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:cluster-md-kmp-default-4.12.14-122.228.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:dlm-kmp-default-4.12.14-122.228.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:gfs2-kmp-default-4.12.14-122.228.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:kernel-default-4.12.14-122.228.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:ocfs2-kmp-default-4.12.14-122.228.1
Image SLES15-SP5-Azure-Basic:kernel-azure-5.14.21-150500.33.66.1
Image SLES15-SP5-Azure-Standard:kernel-azure-5.14.21-150500.33.66.1
Image SLES15-SP5-CHOST-BYOS-Aliyun:kernel-default-5.14.21-150500.55.80.2
skipping CVE-2024-43899 as CVE page is older than CVRF-CVE file.
--- /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2024-43898.xml 2024-10-22 01:17:13.458916000 +0200
+++ /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2024-43898.xml.new 2024-10-29 01:13:56.402944000 +0100
@@ -14,13 +14,13 @@
1
- 11
- 2024-10-21T23:17:12Z
+ 12
+ 2024-10-29T00:13:55Z
current
2024-08-26T23:09:57Z
- 2024-10-21T23:17:12Z
+ 2024-10-29T00:13:55Z
cve-database/bin/generate-cvrf-cve.pl
2020-12-27T01:00:00Z
@@ -99,6 +99,21 @@
Container suse/sle-micro/rt-5.5:2.0.4-4.5.211
+
+
+ Image SLES12-SP5-GCE-BYOS
+
+
+
+
+ Image SLES12-SP5-GCE-SAP-BYOS
+
+
+
+
+ Image SLES12-SP5-GCE-SAP-On-Demand
+
+
Image SLES15-SP5-CHOST-BYOS-Aliyun
@@ -1514,6 +1529,39 @@
kernel-rt-5.14.21-150500.13.73.1 as a component of Container suse/sle-micro/rt-5.5:2.0.4-4.5.211
+
+ kernel-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-BYOS
+
+
+ cluster-md-kmp-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ dlm-kmp-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ gfs2-kmp-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ kernel-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ ocfs2-kmp-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ cluster-md-kmp-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
+
+ dlm-kmp-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
+
+ gfs2-kmp-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
+
+ kernel-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
+
+ ocfs2-kmp-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
kernel-default-5.14.21-150500.55.83.1 as a component of Image SLES15-SP5-CHOST-BYOS-Aliyun
@@ -2958,6 +3006,17 @@
Container suse/hpc/warewulf4-x86_64/sle-hpc-node:15.6.17.5.49:kernel-default-6.4.0-150600.23.25.1
Container suse/sle-micro/kvm-5.5:2.0.4-3.5.197:kernel-default-base-5.14.21-150500.55.83.1.150500.6.37.1
Container suse/sle-micro/rt-5.5:2.0.4-4.5.211:kernel-rt-5.14.21-150500.13.73.1
+ Image SLES12-SP5-GCE-BYOS:kernel-default-4.12.14-122.231.1
+ Image SLES12-SP5-GCE-SAP-BYOS:cluster-md-kmp-default-4.12.14-122.231.1
+ Image SLES12-SP5-GCE-SAP-BYOS:dlm-kmp-default-4.12.14-122.231.1
+ Image SLES12-SP5-GCE-SAP-BYOS:gfs2-kmp-default-4.12.14-122.231.1
+ Image SLES12-SP5-GCE-SAP-BYOS:kernel-default-4.12.14-122.231.1
+ Image SLES12-SP5-GCE-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.231.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:cluster-md-kmp-default-4.12.14-122.231.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:dlm-kmp-default-4.12.14-122.231.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:gfs2-kmp-default-4.12.14-122.231.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:kernel-default-4.12.14-122.231.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:ocfs2-kmp-default-4.12.14-122.231.1
Image SLES15-SP5-CHOST-BYOS-Aliyun:kernel-default-5.14.21-150500.55.83.1
Image SLES15-SP5-CHOST-BYOS-Azure:kernel-default-5.14.21-150500.55.83.1
Image SLES15-SP5-CHOST-BYOS-EC2:kernel-default-5.14.21-150500.55.83.1
skipping CVE-2024-43897 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-43896 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-43895 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-43894 as CVE page is older than CVRF-CVE file.
--- /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2024-43893.xml 2024-10-16 01:13:50.584762000 +0200
+++ /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2024-43893.xml.new 2024-10-29 01:13:57.255874000 +0100
@@ -14,13 +14,13 @@
1
- 26
- 2024-10-15T23:13:50Z
+ 27
+ 2024-10-29T00:13:56Z
current
2024-08-26T23:09:58Z
- 2024-10-15T23:13:50Z
+ 2024-10-29T00:13:56Z
cve-database/bin/generate-cvrf-cve.pl
2020-12-27T01:00:00Z
@@ -139,6 +139,21 @@
Image SLES12-SP5-Azure-SAP-BYOS
+
+
+ Image SLES12-SP5-GCE-BYOS
+
+
+
+
+ Image SLES12-SP5-GCE-SAP-BYOS
+
+
+
+
+ Image SLES12-SP5-GCE-SAP-On-Demand
+
+
Image SLES15-SP5-Azure-Basic
@@ -1619,6 +1634,39 @@
ocfs2-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-Azure-SAP-BYOS
+
+ kernel-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-BYOS
+
+
+ cluster-md-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ dlm-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ gfs2-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ kernel-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ ocfs2-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ cluster-md-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
+
+ dlm-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
+
+ gfs2-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
+
+ kernel-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
+
+ ocfs2-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
kernel-azure-5.14.21-150500.33.66.1 as a component of Image SLES15-SP5-Azure-Basic
@@ -3121,6 +3169,17 @@
Image SLES12-SP5-Azure-SAP-BYOS:gfs2-kmp-default-4.12.14-122.228.1
Image SLES12-SP5-Azure-SAP-BYOS:kernel-default-4.12.14-122.228.1
Image SLES12-SP5-Azure-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.228.1
+ Image SLES12-SP5-GCE-BYOS:kernel-default-4.12.14-122.228.1
+ Image SLES12-SP5-GCE-SAP-BYOS:cluster-md-kmp-default-4.12.14-122.228.1
+ Image SLES12-SP5-GCE-SAP-BYOS:dlm-kmp-default-4.12.14-122.228.1
+ Image SLES12-SP5-GCE-SAP-BYOS:gfs2-kmp-default-4.12.14-122.228.1
+ Image SLES12-SP5-GCE-SAP-BYOS:kernel-default-4.12.14-122.228.1
+ Image SLES12-SP5-GCE-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.228.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:cluster-md-kmp-default-4.12.14-122.228.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:dlm-kmp-default-4.12.14-122.228.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:gfs2-kmp-default-4.12.14-122.228.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:kernel-default-4.12.14-122.228.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:ocfs2-kmp-default-4.12.14-122.228.1
Image SLES15-SP5-Azure-Basic:kernel-azure-5.14.21-150500.33.66.1
Image SLES15-SP5-Azure-Standard:kernel-azure-5.14.21-150500.33.66.1
Image SLES15-SP5-CHOST-BYOS-Aliyun:kernel-default-5.14.21-150500.55.80.2
--- /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2024-43892.xml 2024-10-22 01:17:18.673091000 +0200
+++ /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2024-43892.xml.new 2024-10-29 01:13:58.087938000 +0100
@@ -14,13 +14,13 @@
1
- 24
- 2024-10-21T23:17:18Z
+ 25
+ 2024-10-29T00:13:57Z
current
2024-08-26T23:09:59Z
- 2024-10-21T23:17:18Z
+ 2024-10-29T00:13:57Z
cve-database/bin/generate-cvrf-cve.pl
2020-12-27T01:00:00Z
@@ -136,6 +136,21 @@
Image SLES12-SP5-Azure-SAP-BYOS
+
+
+ Image SLES12-SP5-GCE-BYOS
+
+
+
+
+ Image SLES12-SP5-GCE-SAP-BYOS
+
+
+
+
+ Image SLES12-SP5-GCE-SAP-On-Demand
+
+
Image SLES15-SP5-Azure-Basic
@@ -1600,6 +1615,39 @@
ocfs2-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-Azure-SAP-BYOS
+
+ kernel-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-BYOS
+
+
+ cluster-md-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ dlm-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ gfs2-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ kernel-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ ocfs2-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ cluster-md-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
+
+ dlm-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
+
+ gfs2-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
+
+ kernel-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
+
+ ocfs2-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
kernel-azure-5.14.21-150500.33.66.1 as a component of Image SLES15-SP5-Azure-Basic
@@ -3075,6 +3123,17 @@
Image SLES12-SP5-Azure-SAP-BYOS:gfs2-kmp-default-4.12.14-122.228.1
Image SLES12-SP5-Azure-SAP-BYOS:kernel-default-4.12.14-122.228.1
Image SLES12-SP5-Azure-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.228.1
+ Image SLES12-SP5-GCE-BYOS:kernel-default-4.12.14-122.228.1
+ Image SLES12-SP5-GCE-SAP-BYOS:cluster-md-kmp-default-4.12.14-122.228.1
+ Image SLES12-SP5-GCE-SAP-BYOS:dlm-kmp-default-4.12.14-122.228.1
+ Image SLES12-SP5-GCE-SAP-BYOS:gfs2-kmp-default-4.12.14-122.228.1
+ Image SLES12-SP5-GCE-SAP-BYOS:kernel-default-4.12.14-122.228.1
+ Image SLES12-SP5-GCE-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.228.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:cluster-md-kmp-default-4.12.14-122.228.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:dlm-kmp-default-4.12.14-122.228.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:gfs2-kmp-default-4.12.14-122.228.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:kernel-default-4.12.14-122.228.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:ocfs2-kmp-default-4.12.14-122.228.1
Image SLES15-SP5-Azure-Basic:kernel-azure-5.14.21-150500.33.66.1
Image SLES15-SP5-Azure-Standard:kernel-azure-5.14.21-150500.33.66.1
Image SLES15-SP5-CHOST-BYOS-Aliyun:kernel-default-5.14.21-150500.55.80.2
no cpe found for SUSE Linux Enterprise Module for Confidential Computing Technical Preview 15 SP6 in CVE-2024-43890
skipping CVE-2024-43891 as CVE page is older than CVRF-CVE file.
--- /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2024-43890.xml 2024-10-16 01:13:51.798724000 +0200
+++ /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2024-43890.xml.new 2024-10-29 01:13:58.755833000 +0100
@@ -14,13 +14,13 @@
1
- 11
- 2024-10-15T23:13:51Z
+ 12
+ 2024-10-29T00:13:58Z
current
2024-08-26T23:09:59Z
- 2024-10-15T23:13:51Z
+ 2024-10-29T00:13:58Z
cve-database/bin/generate-cvrf-cve.pl
2020-12-27T01:00:00Z
@@ -119,6 +119,21 @@
Container suse/sle-micro/rt-5.5:2.0.4-4.5.211
+
+
+ Image SLES12-SP5-GCE-BYOS
+
+
+
+
+ Image SLES12-SP5-GCE-SAP-BYOS
+
+
+
+
+ Image SLES12-SP5-GCE-SAP-On-Demand
+
+
Image SLES15-SP5-CHOST-BYOS-Aliyun
@@ -1523,6 +1538,39 @@
kernel-rt-5.14.21-150500.13.73.1 as a component of Container suse/sle-micro/rt-5.5:2.0.4-4.5.211
+
+ kernel-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-BYOS
+
+
+ cluster-md-kmp-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ dlm-kmp-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ gfs2-kmp-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ kernel-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ ocfs2-kmp-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ cluster-md-kmp-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
+
+ dlm-kmp-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
+
+ gfs2-kmp-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
+
+ kernel-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
+
+ ocfs2-kmp-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
kernel-default-5.14.21-150500.55.83.1 as a component of Image SLES15-SP5-CHOST-BYOS-Aliyun
@@ -2887,6 +2935,17 @@
Container suse/hpc/warewulf4-x86_64/sle-hpc-node:15.6.17.5.49:kernel-default-6.4.0-150600.23.25.1
Container suse/sle-micro/kvm-5.5:2.0.4-3.5.197:kernel-default-base-5.14.21-150500.55.83.1.150500.6.37.1
Container suse/sle-micro/rt-5.5:2.0.4-4.5.211:kernel-rt-5.14.21-150500.13.73.1
+ Image SLES12-SP5-GCE-BYOS:kernel-default-4.12.14-122.231.1
+ Image SLES12-SP5-GCE-SAP-BYOS:cluster-md-kmp-default-4.12.14-122.231.1
+ Image SLES12-SP5-GCE-SAP-BYOS:dlm-kmp-default-4.12.14-122.231.1
+ Image SLES12-SP5-GCE-SAP-BYOS:gfs2-kmp-default-4.12.14-122.231.1
+ Image SLES12-SP5-GCE-SAP-BYOS:kernel-default-4.12.14-122.231.1
+ Image SLES12-SP5-GCE-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.231.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:cluster-md-kmp-default-4.12.14-122.231.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:dlm-kmp-default-4.12.14-122.231.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:gfs2-kmp-default-4.12.14-122.231.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:kernel-default-4.12.14-122.231.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:ocfs2-kmp-default-4.12.14-122.231.1
Image SLES15-SP5-CHOST-BYOS-Aliyun:kernel-default-5.14.21-150500.55.83.1
Image SLES15-SP5-CHOST-BYOS-Azure:kernel-default-5.14.21-150500.55.83.1
Image SLES15-SP5-CHOST-BYOS-EC2:kernel-default-5.14.21-150500.55.83.1
skipping CVE-2024-43889 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-43888 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-43887 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-43886 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-43885 as CVE page is older than CVRF-CVE file.
--- /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2024-43884.xml 2024-10-16 01:13:54.297557000 +0200
+++ /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2024-43884.xml.new 2024-10-29 01:13:59.665800000 +0100
@@ -14,13 +14,13 @@
1
- 26
- 2024-10-15T23:13:53Z
+ 27
+ 2024-10-29T00:13:59Z
current
2024-08-26T23:10:01Z
- 2024-10-15T23:13:53Z
+ 2024-10-29T00:13:59Z
cve-database/bin/generate-cvrf-cve.pl
2020-12-27T01:00:00Z
@@ -106,6 +106,21 @@
Container suse/sle-micro/rt-5.5:2.0.4-4.5.160
+
+
+ Image SLES12-SP5-GCE-BYOS
+
+
+
+
+ Image SLES12-SP5-GCE-SAP-BYOS
+
+
+
+
+ Image SLES12-SP5-GCE-SAP-On-Demand
+
+
Image SLES15-SP5-Azure-Basic
@@ -1571,6 +1586,39 @@
kernel-rt-5.14.21-150500.13.67.3 as a component of Container suse/sle-micro/rt-5.5:2.0.4-4.5.160
+
+ kernel-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-BYOS
+
+
+ cluster-md-kmp-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ dlm-kmp-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ gfs2-kmp-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ kernel-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ ocfs2-kmp-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ cluster-md-kmp-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
+
+ dlm-kmp-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
+
+ gfs2-kmp-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
+
+ kernel-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
+
+ ocfs2-kmp-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
kernel-azure-5.14.21-150500.33.66.1 as a component of Image SLES15-SP5-Azure-Basic
@@ -3046,6 +3094,17 @@
Container suse/hpc/warewulf4-x86_64/sle-hpc-node:15.6.17.5.37:kernel-default-6.4.0-150600.23.22.1
Container suse/sle-micro/kvm-5.5:2.0.4-3.5.184:kernel-default-base-5.14.21-150500.55.80.2.150500.6.35.6
Container suse/sle-micro/rt-5.5:2.0.4-4.5.160:kernel-rt-5.14.21-150500.13.67.3
+ Image SLES12-SP5-GCE-BYOS:kernel-default-4.12.14-122.231.1
+ Image SLES12-SP5-GCE-SAP-BYOS:cluster-md-kmp-default-4.12.14-122.231.1
+ Image SLES12-SP5-GCE-SAP-BYOS:dlm-kmp-default-4.12.14-122.231.1
+ Image SLES12-SP5-GCE-SAP-BYOS:gfs2-kmp-default-4.12.14-122.231.1
+ Image SLES12-SP5-GCE-SAP-BYOS:kernel-default-4.12.14-122.231.1
+ Image SLES12-SP5-GCE-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.231.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:cluster-md-kmp-default-4.12.14-122.231.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:dlm-kmp-default-4.12.14-122.231.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:gfs2-kmp-default-4.12.14-122.231.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:kernel-default-4.12.14-122.231.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:ocfs2-kmp-default-4.12.14-122.231.1
Image SLES15-SP5-Azure-Basic:kernel-azure-5.14.21-150500.33.66.1
Image SLES15-SP5-Azure-Standard:kernel-azure-5.14.21-150500.33.66.1
Image SLES15-SP5-CHOST-BYOS-Aliyun:kernel-default-5.14.21-150500.55.80.2
no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2024-43883
--- /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2024-43883.xml 2024-10-20 01:13:02.667053000 +0200
+++ /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2024-43883.xml.new 2024-10-29 01:14:00.524230000 +0100
@@ -14,13 +14,13 @@
1
- 28
- 2024-10-19T23:13:02Z
+ 29
+ 2024-10-29T00:13:59Z
current
2024-08-24T23:09:48Z
- 2024-10-19T23:13:02Z
+ 2024-10-29T00:13:59Z
cve-database/bin/generate-cvrf-cve.pl
2020-12-27T01:00:00Z
@@ -150,6 +150,21 @@
Image SLES12-SP5-Azure-SAP-BYOS
+
+
+ Image SLES12-SP5-GCE-BYOS
+
+
+
+
+ Image SLES12-SP5-GCE-SAP-BYOS
+
+
+
+
+ Image SLES12-SP5-GCE-SAP-On-Demand
+
+
Image SLES15-SP4-SAP-Azure-LI-BYOS
@@ -1976,6 +1991,39 @@
ocfs2-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-Azure-SAP-BYOS
+
+ kernel-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-BYOS
+
+
+ cluster-md-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ dlm-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ gfs2-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ kernel-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ ocfs2-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ cluster-md-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
+
+ dlm-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
+
+ gfs2-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
+
+ kernel-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
+
+ ocfs2-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
cluster-md-kmp-default-5.14.21-150400.24.133.2 as a component of Image SLES15-SP4-SAP-Azure-LI-BYOS
@@ -4110,6 +4158,17 @@
Image SLES12-SP5-Azure-SAP-BYOS:gfs2-kmp-default-4.12.14-122.228.1
Image SLES12-SP5-Azure-SAP-BYOS:kernel-default-4.12.14-122.228.1
Image SLES12-SP5-Azure-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.228.1
+ Image SLES12-SP5-GCE-BYOS:kernel-default-4.12.14-122.228.1
+ Image SLES12-SP5-GCE-SAP-BYOS:cluster-md-kmp-default-4.12.14-122.228.1
+ Image SLES12-SP5-GCE-SAP-BYOS:dlm-kmp-default-4.12.14-122.228.1
+ Image SLES12-SP5-GCE-SAP-BYOS:gfs2-kmp-default-4.12.14-122.228.1
+ Image SLES12-SP5-GCE-SAP-BYOS:kernel-default-4.12.14-122.228.1
+ Image SLES12-SP5-GCE-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.228.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:cluster-md-kmp-default-4.12.14-122.228.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:dlm-kmp-default-4.12.14-122.228.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:gfs2-kmp-default-4.12.14-122.228.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:kernel-default-4.12.14-122.228.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:ocfs2-kmp-default-4.12.14-122.228.1
Image SLES15-SP4-SAP-Azure-LI-BYOS:cluster-md-kmp-default-5.14.21-150400.24.133.2
Image SLES15-SP4-SAP-Azure-LI-BYOS:dlm-kmp-default-5.14.21-150400.24.133.2
Image SLES15-SP4-SAP-Azure-LI-BYOS:gfs2-kmp-default-5.14.21-150400.24.133.2
no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2024-43882
--- /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2024-43882.xml 2024-10-20 01:13:04.692889000 +0200
+++ /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2024-43882.xml.new 2024-10-29 01:14:01.581204000 +0100
@@ -14,13 +14,13 @@
1
- 30
- 2024-10-19T23:13:03Z
+ 31
+ 2024-10-29T00:14:00Z
current
2024-08-21T23:10:10Z
- 2024-10-19T23:13:03Z
+ 2024-10-29T00:14:00Z
cve-database/bin/generate-cvrf-cve.pl
2020-12-27T01:00:00Z
@@ -189,6 +189,21 @@
Image SLES12-SP5-Azure-SAP-BYOS
+
+
+ Image SLES12-SP5-GCE-BYOS
+
+
+
+
+ Image SLES12-SP5-GCE-SAP-BYOS
+
+
+
+
+ Image SLES12-SP5-GCE-SAP-On-Demand
+
+
Image SLES15-SP4-SAP-Azure-LI-BYOS
@@ -2020,6 +2035,39 @@
ocfs2-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-Azure-SAP-BYOS
+
+ kernel-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-BYOS
+
+
+ cluster-md-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ dlm-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ gfs2-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ kernel-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ ocfs2-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ cluster-md-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
+
+ dlm-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
+
+ gfs2-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
+
+ kernel-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
+
+ ocfs2-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
cluster-md-kmp-default-5.14.21-150400.24.133.2 as a component of Image SLES15-SP4-SAP-Azure-LI-BYOS
@@ -4172,6 +4220,17 @@
Image SLES12-SP5-Azure-SAP-BYOS:gfs2-kmp-default-4.12.14-122.228.1
Image SLES12-SP5-Azure-SAP-BYOS:kernel-default-4.12.14-122.228.1
Image SLES12-SP5-Azure-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.228.1
+ Image SLES12-SP5-GCE-BYOS:kernel-default-4.12.14-122.228.1
+ Image SLES12-SP5-GCE-SAP-BYOS:cluster-md-kmp-default-4.12.14-122.228.1
+ Image SLES12-SP5-GCE-SAP-BYOS:dlm-kmp-default-4.12.14-122.228.1
+ Image SLES12-SP5-GCE-SAP-BYOS:gfs2-kmp-default-4.12.14-122.228.1
+ Image SLES12-SP5-GCE-SAP-BYOS:kernel-default-4.12.14-122.228.1
+ Image SLES12-SP5-GCE-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.228.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:cluster-md-kmp-default-4.12.14-122.228.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:dlm-kmp-default-4.12.14-122.228.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:gfs2-kmp-default-4.12.14-122.228.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:kernel-default-4.12.14-122.228.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:ocfs2-kmp-default-4.12.14-122.228.1
Image SLES15-SP4-SAP-Azure-LI-BYOS:cluster-md-kmp-default-5.14.21-150400.24.133.2
Image SLES15-SP4-SAP-Azure-LI-BYOS:dlm-kmp-default-5.14.21-150400.24.133.2
Image SLES15-SP4-SAP-Azure-LI-BYOS:gfs2-kmp-default-5.14.21-150400.24.133.2
skipping CVE-2024-43881 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-43880 as CVE page is older than CVRF-CVE file.
--- /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2024-43879.xml 2024-10-14 01:12:23.019440000 +0200
+++ /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2024-43879.xml.new 2024-10-29 01:14:02.953087000 +0100
@@ -14,13 +14,13 @@
1
- 25
- 2024-10-13T23:12:22Z
+ 26
+ 2024-10-29T00:14:02Z
current
2024-08-21T23:10:13Z
- 2024-10-13T23:12:22Z
+ 2024-10-29T00:14:02Z
cve-database/bin/generate-cvrf-cve.pl
2020-12-27T01:00:00Z
@@ -114,6 +114,21 @@
Image SLES12-SP5-Azure-SAP-BYOS
+
+
+ Image SLES12-SP5-GCE-BYOS
+
+
+
+
+ Image SLES12-SP5-GCE-SAP-BYOS
+
+
+
+
+ Image SLES12-SP5-GCE-SAP-On-Demand
+
+
Image SLES15-SP5-Azure-Basic
@@ -1649,6 +1664,39 @@
ocfs2-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-Azure-SAP-BYOS
+
+ kernel-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-BYOS
+
+
+ cluster-md-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ dlm-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ gfs2-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ kernel-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ ocfs2-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ cluster-md-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
+
+ dlm-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
+
+ gfs2-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
+
+ kernel-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
+
+ ocfs2-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
kernel-azure-5.14.21-150500.33.66.1 as a component of Image SLES15-SP5-Azure-Basic
@@ -3273,6 +3321,17 @@
Image SLES12-SP5-Azure-SAP-BYOS:gfs2-kmp-default-4.12.14-122.228.1
Image SLES12-SP5-Azure-SAP-BYOS:kernel-default-4.12.14-122.228.1
Image SLES12-SP5-Azure-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.228.1
+ Image SLES12-SP5-GCE-BYOS:kernel-default-4.12.14-122.228.1
+ Image SLES12-SP5-GCE-SAP-BYOS:cluster-md-kmp-default-4.12.14-122.228.1
+ Image SLES12-SP5-GCE-SAP-BYOS:dlm-kmp-default-4.12.14-122.228.1
+ Image SLES12-SP5-GCE-SAP-BYOS:gfs2-kmp-default-4.12.14-122.228.1
+ Image SLES12-SP5-GCE-SAP-BYOS:kernel-default-4.12.14-122.228.1
+ Image SLES12-SP5-GCE-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.228.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:cluster-md-kmp-default-4.12.14-122.228.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:dlm-kmp-default-4.12.14-122.228.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:gfs2-kmp-default-4.12.14-122.228.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:kernel-default-4.12.14-122.228.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:ocfs2-kmp-default-4.12.14-122.228.1
Image SLES15-SP5-Azure-Basic:kernel-azure-5.14.21-150500.33.66.1
Image SLES15-SP5-Azure-Standard:kernel-azure-5.14.21-150500.33.66.1
Image SLES15-SP5-CHOST-BYOS-Aliyun:kernel-default-5.14.21-150500.55.80.2
skipping CVE-2024-43878 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-43877 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-43876 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-43875 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-43874 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-43873 as CVE page is older than CVRF-CVE file.
--- /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2024-43872.xml 2024-10-16 01:14:00.961695000 +0200
+++ /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2024-43872.xml.new 2024-10-29 01:14:03.945028000 +0100
@@ -14,13 +14,13 @@
1
- 27
- 2024-10-15T23:14:00Z
+ 28
+ 2024-10-29T00:14:03Z
current
2024-08-21T23:10:21Z
- 2024-10-15T23:14:00Z
+ 2024-10-29T00:14:03Z
cve-database/bin/generate-cvrf-cve.pl
2020-12-27T01:00:00Z
@@ -113,6 +113,21 @@
Image SLES12-SP5-Azure-SAP-BYOS
+
+
+ Image SLES12-SP5-GCE-BYOS
+
+
+
+
+ Image SLES12-SP5-GCE-SAP-BYOS
+
+
+
+
+ Image SLES12-SP5-GCE-SAP-On-Demand
+
+
Image SLES15-SP5-Azure-Basic
@@ -1651,6 +1666,39 @@
ocfs2-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-Azure-SAP-BYOS
+
+ kernel-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-BYOS
+
+
+ cluster-md-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ dlm-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ gfs2-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ kernel-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ ocfs2-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ cluster-md-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
+
+ dlm-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
+
+ gfs2-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
+
+ kernel-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
+
+ ocfs2-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
kernel-azure-5.14.21-150500.33.66.1 as a component of Image SLES15-SP5-Azure-Basic
@@ -3298,6 +3346,17 @@
Image SLES12-SP5-Azure-SAP-BYOS:gfs2-kmp-default-4.12.14-122.228.1
Image SLES12-SP5-Azure-SAP-BYOS:kernel-default-4.12.14-122.228.1
Image SLES12-SP5-Azure-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.228.1
+ Image SLES12-SP5-GCE-BYOS:kernel-default-4.12.14-122.228.1
+ Image SLES12-SP5-GCE-SAP-BYOS:cluster-md-kmp-default-4.12.14-122.228.1
+ Image SLES12-SP5-GCE-SAP-BYOS:dlm-kmp-default-4.12.14-122.228.1
+ Image SLES12-SP5-GCE-SAP-BYOS:gfs2-kmp-default-4.12.14-122.228.1
+ Image SLES12-SP5-GCE-SAP-BYOS:kernel-default-4.12.14-122.228.1
+ Image SLES12-SP5-GCE-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.228.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:cluster-md-kmp-default-4.12.14-122.228.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:dlm-kmp-default-4.12.14-122.228.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:gfs2-kmp-default-4.12.14-122.228.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:kernel-default-4.12.14-122.228.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:ocfs2-kmp-default-4.12.14-122.228.1
Image SLES15-SP5-Azure-Basic:kernel-azure-5.14.21-150500.33.66.1
Image SLES15-SP5-Azure-Standard:kernel-azure-5.14.21-150500.33.66.1
Image SLES15-SP5-CHOST-BYOS-Aliyun:kernel-default-5.14.21-150500.55.80.2
--- /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2024-43871.xml 2024-10-16 01:14:01.622682000 +0200
+++ /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2024-43871.xml.new 2024-10-29 01:14:04.559991000 +0100
@@ -14,13 +14,13 @@
1
- 27
- 2024-10-15T23:14:01Z
+ 28
+ 2024-10-29T00:14:04Z
current
2024-08-21T23:10:22Z
- 2024-10-15T23:14:01Z
+ 2024-10-29T00:14:04Z
cve-database/bin/generate-cvrf-cve.pl
2020-12-27T01:00:00Z
@@ -114,6 +114,21 @@
Image SLES12-SP5-Azure-SAP-BYOS
+
+
+ Image SLES12-SP5-GCE-BYOS
+
+
+
+
+ Image SLES12-SP5-GCE-SAP-BYOS
+
+
+
+
+ Image SLES12-SP5-GCE-SAP-On-Demand
+
+
Image SLES15-SP5-Azure-Basic
@@ -1717,6 +1732,39 @@
ocfs2-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-Azure-SAP-BYOS
+
+ kernel-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-BYOS
+
+
+ cluster-md-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ dlm-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ gfs2-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ kernel-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ ocfs2-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ cluster-md-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
+
+ dlm-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
+
+ gfs2-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
+
+ kernel-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
+
+ ocfs2-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
kernel-azure-5.14.21-150500.33.66.1 as a component of Image SLES15-SP5-Azure-Basic
@@ -3421,6 +3469,17 @@
Image SLES12-SP5-Azure-SAP-BYOS:gfs2-kmp-default-4.12.14-122.228.1
Image SLES12-SP5-Azure-SAP-BYOS:kernel-default-4.12.14-122.228.1
Image SLES12-SP5-Azure-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.228.1
+ Image SLES12-SP5-GCE-BYOS:kernel-default-4.12.14-122.228.1
+ Image SLES12-SP5-GCE-SAP-BYOS:cluster-md-kmp-default-4.12.14-122.228.1
+ Image SLES12-SP5-GCE-SAP-BYOS:dlm-kmp-default-4.12.14-122.228.1
+ Image SLES12-SP5-GCE-SAP-BYOS:gfs2-kmp-default-4.12.14-122.228.1
+ Image SLES12-SP5-GCE-SAP-BYOS:kernel-default-4.12.14-122.228.1
+ Image SLES12-SP5-GCE-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.228.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:cluster-md-kmp-default-4.12.14-122.228.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:dlm-kmp-default-4.12.14-122.228.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:gfs2-kmp-default-4.12.14-122.228.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:kernel-default-4.12.14-122.228.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:ocfs2-kmp-default-4.12.14-122.228.1
Image SLES15-SP5-Azure-Basic:kernel-azure-5.14.21-150500.33.66.1
Image SLES15-SP5-Azure-Standard:kernel-azure-5.14.21-150500.33.66.1
Image SLES15-SP5-CHOST-BYOS-Aliyun:kernel-default-5.14.21-150500.55.80.2
skipping CVE-2024-43870 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-43869 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-43868 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-43867 as CVE page is older than CVRF-CVE file.
--- /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2024-43866.xml 2024-10-16 01:14:06.740894000 +0200
+++ /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2024-43866.xml.new 2024-10-29 01:14:05.474947000 +0100
@@ -14,13 +14,13 @@
1
- 28
- 2024-10-15T23:14:06Z
+ 29
+ 2024-10-29T00:14:04Z
current
2024-08-21T23:10:25Z
- 2024-10-15T23:14:06Z
+ 2024-10-29T00:14:04Z
cve-database/bin/generate-cvrf-cve.pl
2020-12-27T01:00:00Z
@@ -112,6 +112,21 @@
Image SLES12-SP5-Azure-SAP-BYOS
+
+
+ Image SLES12-SP5-GCE-BYOS
+
+
+
+
+ Image SLES12-SP5-GCE-SAP-BYOS
+
+
+
+
+ Image SLES12-SP5-GCE-SAP-On-Demand
+
+
Image SLES15-SP5-Azure-Basic
@@ -1642,6 +1657,39 @@
ocfs2-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-Azure-SAP-BYOS
+
+ kernel-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-BYOS
+
+
+ cluster-md-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ dlm-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ gfs2-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ kernel-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ ocfs2-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ cluster-md-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
+
+ dlm-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
+
+ gfs2-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
+
+ kernel-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
+
+ ocfs2-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
kernel-azure-5.14.21-150500.33.66.1 as a component of Image SLES15-SP5-Azure-Basic
@@ -3270,6 +3318,17 @@
Image SLES12-SP5-Azure-SAP-BYOS:gfs2-kmp-default-4.12.14-122.228.1
Image SLES12-SP5-Azure-SAP-BYOS:kernel-default-4.12.14-122.228.1
Image SLES12-SP5-Azure-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.228.1
+ Image SLES12-SP5-GCE-BYOS:kernel-default-4.12.14-122.228.1
+ Image SLES12-SP5-GCE-SAP-BYOS:cluster-md-kmp-default-4.12.14-122.228.1
+ Image SLES12-SP5-GCE-SAP-BYOS:dlm-kmp-default-4.12.14-122.228.1
+ Image SLES12-SP5-GCE-SAP-BYOS:gfs2-kmp-default-4.12.14-122.228.1
+ Image SLES12-SP5-GCE-SAP-BYOS:kernel-default-4.12.14-122.228.1
+ Image SLES12-SP5-GCE-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.228.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:cluster-md-kmp-default-4.12.14-122.228.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:dlm-kmp-default-4.12.14-122.228.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:gfs2-kmp-default-4.12.14-122.228.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:kernel-default-4.12.14-122.228.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:ocfs2-kmp-default-4.12.14-122.228.1
Image SLES15-SP5-Azure-Basic:kernel-azure-5.14.21-150500.33.66.1
Image SLES15-SP5-Azure-Standard:kernel-azure-5.14.21-150500.33.66.1
Image SLES15-SP5-CHOST-BYOS-Aliyun:kernel-default-5.14.21-150500.55.80.2
skipping CVE-2024-43865 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-43864 as CVE page is older than CVRF-CVE file.
--- /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2024-43863.xml 2024-10-16 01:14:08.557812000 +0200
+++ /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2024-43863.xml.new 2024-10-29 01:14:06.117918000 +0100
@@ -14,13 +14,13 @@
1
- 27
- 2024-10-15T23:14:08Z
+ 28
+ 2024-10-29T00:14:05Z
current
2024-08-21T23:10:26Z
- 2024-10-15T23:14:08Z
+ 2024-10-29T00:14:05Z
cve-database/bin/generate-cvrf-cve.pl
2020-12-27T01:00:00Z
@@ -125,6 +125,21 @@
Image SLES12-SP5-Azure-SAP-BYOS
+
+
+ Image SLES12-SP5-GCE-BYOS
+
+
+
+
+ Image SLES12-SP5-GCE-SAP-BYOS
+
+
+
+
+ Image SLES12-SP5-GCE-SAP-On-Demand
+
+
Image SLES15-SP5-Azure-Basic
@@ -1663,6 +1678,39 @@
ocfs2-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-Azure-SAP-BYOS
+
+ kernel-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-BYOS
+
+
+ cluster-md-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ dlm-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ gfs2-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ kernel-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ ocfs2-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ cluster-md-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
+
+ dlm-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
+
+ gfs2-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
+
+ kernel-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
+
+ ocfs2-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
kernel-azure-5.14.21-150500.33.66.1 as a component of Image SLES15-SP5-Azure-Basic
@@ -3322,6 +3370,17 @@
Image SLES12-SP5-Azure-SAP-BYOS:gfs2-kmp-default-4.12.14-122.228.1
Image SLES12-SP5-Azure-SAP-BYOS:kernel-default-4.12.14-122.228.1
Image SLES12-SP5-Azure-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.228.1
+ Image SLES12-SP5-GCE-BYOS:kernel-default-4.12.14-122.228.1
+ Image SLES12-SP5-GCE-SAP-BYOS:cluster-md-kmp-default-4.12.14-122.228.1
+ Image SLES12-SP5-GCE-SAP-BYOS:dlm-kmp-default-4.12.14-122.228.1
+ Image SLES12-SP5-GCE-SAP-BYOS:gfs2-kmp-default-4.12.14-122.228.1
+ Image SLES12-SP5-GCE-SAP-BYOS:kernel-default-4.12.14-122.228.1
+ Image SLES12-SP5-GCE-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.228.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:cluster-md-kmp-default-4.12.14-122.228.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:dlm-kmp-default-4.12.14-122.228.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:gfs2-kmp-default-4.12.14-122.228.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:kernel-default-4.12.14-122.228.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:ocfs2-kmp-default-4.12.14-122.228.1
Image SLES15-SP5-Azure-Basic:kernel-azure-5.14.21-150500.33.66.1
Image SLES15-SP5-Azure-Standard:kernel-azure-5.14.21-150500.33.66.1
Image SLES15-SP5-CHOST-BYOS-Aliyun:kernel-default-5.14.21-150500.55.80.2
no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2024-43861
skipping CVE-2024-43862 as CVE page is older than CVRF-CVE file.
--- /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2024-43861.xml 2024-10-20 01:13:13.563924000 +0200
+++ /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2024-43861.xml.new 2024-10-29 01:14:07.408861000 +0100
@@ -14,13 +14,13 @@
1
- 28
- 2024-10-19T23:13:13Z
+ 29
+ 2024-10-29T00:14:06Z
current
2024-08-20T23:10:15Z
- 2024-10-19T23:13:13Z
+ 2024-10-29T00:14:06Z
cve-database/bin/generate-cvrf-cve.pl
2020-12-27T01:00:00Z
@@ -143,6 +143,21 @@
Image SLES12-SP5-Azure-SAP-BYOS
+
+
+ Image SLES12-SP5-GCE-BYOS
+
+
+
+
+ Image SLES12-SP5-GCE-SAP-BYOS
+
+
+
+
+ Image SLES12-SP5-GCE-SAP-On-Demand
+
+
Image SLES15-SP4-SAP-Azure-LI-BYOS
@@ -1916,6 +1931,39 @@
ocfs2-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-Azure-SAP-BYOS
+
+ kernel-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-BYOS
+
+
+ cluster-md-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ dlm-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ gfs2-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ kernel-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ ocfs2-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ cluster-md-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
+
+ dlm-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
+
+ gfs2-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
+
+ kernel-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
+
+ ocfs2-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
cluster-md-kmp-default-5.14.21-150400.24.133.2 as a component of Image SLES15-SP4-SAP-Azure-LI-BYOS
@@ -3921,6 +3969,17 @@
Image SLES12-SP5-Azure-SAP-BYOS:gfs2-kmp-default-4.12.14-122.228.1
Image SLES12-SP5-Azure-SAP-BYOS:kernel-default-4.12.14-122.228.1
Image SLES12-SP5-Azure-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.228.1
+ Image SLES12-SP5-GCE-BYOS:kernel-default-4.12.14-122.228.1
+ Image SLES12-SP5-GCE-SAP-BYOS:cluster-md-kmp-default-4.12.14-122.228.1
+ Image SLES12-SP5-GCE-SAP-BYOS:dlm-kmp-default-4.12.14-122.228.1
+ Image SLES12-SP5-GCE-SAP-BYOS:gfs2-kmp-default-4.12.14-122.228.1
+ Image SLES12-SP5-GCE-SAP-BYOS:kernel-default-4.12.14-122.228.1
+ Image SLES12-SP5-GCE-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.228.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:cluster-md-kmp-default-4.12.14-122.228.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:dlm-kmp-default-4.12.14-122.228.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:gfs2-kmp-default-4.12.14-122.228.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:kernel-default-4.12.14-122.228.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:ocfs2-kmp-default-4.12.14-122.228.1
Image SLES15-SP4-SAP-Azure-LI-BYOS:cluster-md-kmp-default-5.14.21-150400.24.133.2
Image SLES15-SP4-SAP-Azure-LI-BYOS:dlm-kmp-default-5.14.21-150400.24.133.2
Image SLES15-SP4-SAP-Azure-LI-BYOS:gfs2-kmp-default-5.14.21-150400.24.133.2
skipping CVE-2024-43860 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-43859 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-43858 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-43857 as CVE page is older than CVRF-CVE file.
--- /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2024-43856.xml 2024-10-16 01:14:12.539592000 +0200
+++ /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2024-43856.xml.new 2024-10-29 01:14:08.120837000 +0100
@@ -14,13 +14,13 @@
1
- 28
- 2024-10-15T23:14:12Z
+ 29
+ 2024-10-29T00:14:07Z
current
2024-08-17T23:09:36Z
- 2024-10-15T23:14:12Z
+ 2024-10-29T00:14:07Z
cve-database/bin/generate-cvrf-cve.pl
2020-12-27T01:00:00Z
@@ -123,6 +123,21 @@
Image SLES12-SP5-Azure-SAP-BYOS
+
+
+ Image SLES12-SP5-GCE-BYOS
+
+
+
+
+ Image SLES12-SP5-GCE-SAP-BYOS
+
+
+
+
+ Image SLES12-SP5-GCE-SAP-On-Demand
+
+
Image SLES15-SP5-Azure-Basic
@@ -1661,6 +1676,39 @@
ocfs2-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-Azure-SAP-BYOS
+
+ kernel-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-BYOS
+
+
+ cluster-md-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ dlm-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ gfs2-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ kernel-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ ocfs2-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ cluster-md-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
+
+ dlm-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
+
+ gfs2-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
+
+ kernel-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
+
+ ocfs2-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
kernel-azure-5.14.21-150500.33.66.1 as a component of Image SLES15-SP5-Azure-Basic
@@ -3318,6 +3366,17 @@
Image SLES12-SP5-Azure-SAP-BYOS:gfs2-kmp-default-4.12.14-122.228.1
Image SLES12-SP5-Azure-SAP-BYOS:kernel-default-4.12.14-122.228.1
Image SLES12-SP5-Azure-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.228.1
+ Image SLES12-SP5-GCE-BYOS:kernel-default-4.12.14-122.228.1
+ Image SLES12-SP5-GCE-SAP-BYOS:cluster-md-kmp-default-4.12.14-122.228.1
+ Image SLES12-SP5-GCE-SAP-BYOS:dlm-kmp-default-4.12.14-122.228.1
+ Image SLES12-SP5-GCE-SAP-BYOS:gfs2-kmp-default-4.12.14-122.228.1
+ Image SLES12-SP5-GCE-SAP-BYOS:kernel-default-4.12.14-122.228.1
+ Image SLES12-SP5-GCE-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.228.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:cluster-md-kmp-default-4.12.14-122.228.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:dlm-kmp-default-4.12.14-122.228.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:gfs2-kmp-default-4.12.14-122.228.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:kernel-default-4.12.14-122.228.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:ocfs2-kmp-default-4.12.14-122.228.1
Image SLES15-SP5-Azure-Basic:kernel-azure-5.14.21-150500.33.66.1
Image SLES15-SP5-Azure-Standard:kernel-azure-5.14.21-150500.33.66.1
Image SLES15-SP5-CHOST-BYOS-Aliyun:kernel-default-5.14.21-150500.55.80.2
skipping CVE-2024-43855 as CVE page is older than CVRF-CVE file.
--- /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2024-43854.xml 2024-10-16 01:14:14.100512000 +0200
+++ /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2024-43854.xml.new 2024-10-29 01:14:09.157864000 +0100
@@ -14,13 +14,13 @@
1
- 28
- 2024-10-15T23:14:13Z
+ 29
+ 2024-10-29T00:14:08Z
current
2024-08-17T23:09:36Z
- 2024-10-15T23:14:13Z
+ 2024-10-29T00:14:08Z
cve-database/bin/generate-cvrf-cve.pl
2020-12-27T01:00:00Z
@@ -113,6 +113,21 @@
Image SLES12-SP5-Azure-SAP-BYOS
+
+
+ Image SLES12-SP5-GCE-BYOS
+
+
+
+
+ Image SLES12-SP5-GCE-SAP-BYOS
+
+
+
+
+ Image SLES12-SP5-GCE-SAP-On-Demand
+
+
Image SLES15-SP5-Azure-Basic
@@ -1643,6 +1658,39 @@
ocfs2-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-Azure-SAP-BYOS
+
+ kernel-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-BYOS
+
+
+ cluster-md-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ dlm-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ gfs2-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ kernel-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ ocfs2-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ cluster-md-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
+
+ dlm-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
+
+ gfs2-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
+
+ kernel-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
+
+ ocfs2-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
kernel-azure-5.14.21-150500.33.66.1 as a component of Image SLES15-SP5-Azure-Basic
@@ -3272,6 +3320,17 @@
Image SLES12-SP5-Azure-SAP-BYOS:gfs2-kmp-default-4.12.14-122.228.1
Image SLES12-SP5-Azure-SAP-BYOS:kernel-default-4.12.14-122.228.1
Image SLES12-SP5-Azure-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.228.1
+ Image SLES12-SP5-GCE-BYOS:kernel-default-4.12.14-122.228.1
+ Image SLES12-SP5-GCE-SAP-BYOS:cluster-md-kmp-default-4.12.14-122.228.1
+ Image SLES12-SP5-GCE-SAP-BYOS:dlm-kmp-default-4.12.14-122.228.1
+ Image SLES12-SP5-GCE-SAP-BYOS:gfs2-kmp-default-4.12.14-122.228.1
+ Image SLES12-SP5-GCE-SAP-BYOS:kernel-default-4.12.14-122.228.1
+ Image SLES12-SP5-GCE-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.228.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:cluster-md-kmp-default-4.12.14-122.228.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:dlm-kmp-default-4.12.14-122.228.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:gfs2-kmp-default-4.12.14-122.228.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:kernel-default-4.12.14-122.228.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:ocfs2-kmp-default-4.12.14-122.228.1
Image SLES15-SP5-Azure-Basic:kernel-azure-5.14.21-150500.33.66.1
Image SLES15-SP5-Azure-Standard:kernel-azure-5.14.21-150500.33.66.1
Image SLES15-SP5-CHOST-BYOS-Aliyun:kernel-default-5.14.21-150500.55.80.2
no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2024-43853
--- /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2024-43853.xml 2024-10-20 01:13:16.750773000 +0200
+++ /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2024-43853.xml.new 2024-10-29 01:14:10.437188000 +0100
@@ -14,13 +14,13 @@
1
- 27
- 2024-10-19T23:13:16Z
+ 28
+ 2024-10-29T00:14:09Z
current
2024-08-17T23:09:37Z
- 2024-10-19T23:13:16Z
+ 2024-10-29T00:14:09Z
cve-database/bin/generate-cvrf-cve.pl
2020-12-27T01:00:00Z
@@ -169,6 +169,21 @@
Image SLES12-SP5-Azure-SAP-BYOS
+
+
+ Image SLES12-SP5-GCE-BYOS
+
+
+
+
+ Image SLES12-SP5-GCE-SAP-BYOS
+
+
+
+
+ Image SLES12-SP5-GCE-SAP-On-Demand
+
+
Image SLES15-SP4-SAP-Azure-LI-BYOS
@@ -1785,6 +1800,39 @@
ocfs2-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-Azure-SAP-BYOS
+
+ kernel-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-BYOS
+
+
+ cluster-md-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ dlm-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ gfs2-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ kernel-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ ocfs2-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ cluster-md-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
+
+ dlm-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
+
+ gfs2-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
+
+ kernel-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
+
+ ocfs2-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
cluster-md-kmp-default-5.14.21-150400.24.133.2 as a component of Image SLES15-SP4-SAP-Azure-LI-BYOS
@@ -3501,18 +3549,6 @@
kernel-default as a component of SUSE Linux Enterprise Server for SAP Applications 12 SP5
-
- kernel-default-base as a component of SUSE Linux Enterprise Server for SAP Applications 12 SP5
-
-
- kernel-default-devel as a component of SUSE Linux Enterprise Server for SAP Applications 12 SP5
-
-
- kernel-devel as a component of SUSE Linux Enterprise Server for SAP Applications 12 SP5
-
-
- kernel-macros as a component of SUSE Linux Enterprise Server for SAP Applications 12 SP5
-
kernel-source as a component of SUSE Linux Enterprise Server for SAP Applications 12 SP5
@@ -3625,6 +3661,17 @@
Image SLES12-SP5-Azure-SAP-BYOS:gfs2-kmp-default-4.12.14-122.228.1
Image SLES12-SP5-Azure-SAP-BYOS:kernel-default-4.12.14-122.228.1
Image SLES12-SP5-Azure-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.228.1
+ Image SLES12-SP5-GCE-BYOS:kernel-default-4.12.14-122.228.1
+ Image SLES12-SP5-GCE-SAP-BYOS:cluster-md-kmp-default-4.12.14-122.228.1
+ Image SLES12-SP5-GCE-SAP-BYOS:dlm-kmp-default-4.12.14-122.228.1
+ Image SLES12-SP5-GCE-SAP-BYOS:gfs2-kmp-default-4.12.14-122.228.1
+ Image SLES12-SP5-GCE-SAP-BYOS:kernel-default-4.12.14-122.228.1
+ Image SLES12-SP5-GCE-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.228.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:cluster-md-kmp-default-4.12.14-122.228.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:dlm-kmp-default-4.12.14-122.228.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:gfs2-kmp-default-4.12.14-122.228.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:kernel-default-4.12.14-122.228.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:ocfs2-kmp-default-4.12.14-122.228.1
Image SLES15-SP4-SAP-Azure-LI-BYOS:cluster-md-kmp-default-5.14.21-150400.24.133.2
Image SLES15-SP4-SAP-Azure-LI-BYOS:dlm-kmp-default-5.14.21-150400.24.133.2
Image SLES15-SP4-SAP-Azure-LI-BYOS:gfs2-kmp-default-5.14.21-150400.24.133.2
@@ -4150,10 +4197,6 @@
SUSE Linux Enterprise Server Teradata 12 SP3:kernel-default
SUSE Linux Enterprise Server Teradata 12 SP3:kernel-source
SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default
- SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base
- SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel
- SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel
- SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros
SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source
skipping CVE-2024-43852 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-43850 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-43843 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-43842 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-43841 as CVE page is older than CVRF-CVE file.
--- /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2024-43839.xml 2024-10-16 01:14:20.413768000 +0200
+++ /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2024-43839.xml.new 2024-10-29 01:14:15.909971000 +0100
@@ -14,13 +14,13 @@
1
- 29
- 2024-10-15T23:14:19Z
+ 30
+ 2024-10-29T00:14:14Z
current
2024-08-17T23:09:40Z
- 2024-10-15T23:14:19Z
+ 2024-10-29T00:14:14Z
cve-database/bin/generate-cvrf-cve.pl
2020-12-27T01:00:00Z
@@ -119,6 +119,21 @@
Image SLES12-SP5-Azure-SAP-BYOS
+
+
+ Image SLES12-SP5-GCE-BYOS
+
+
+
+
+ Image SLES12-SP5-GCE-SAP-BYOS
+
+
+
+
+ Image SLES12-SP5-GCE-SAP-On-Demand
+
+
Image SLES15-SP5-Azure-Basic
@@ -1649,6 +1664,39 @@
ocfs2-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-Azure-SAP-BYOS
+
+ kernel-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-BYOS
+
+
+ cluster-md-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ dlm-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ gfs2-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ kernel-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ ocfs2-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ cluster-md-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
+
+ dlm-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
+
+ gfs2-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
+
+ kernel-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
+
+ ocfs2-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
kernel-azure-5.14.21-150500.33.66.1 as a component of Image SLES15-SP5-Azure-Basic
@@ -3284,6 +3332,17 @@
Image SLES12-SP5-Azure-SAP-BYOS:gfs2-kmp-default-4.12.14-122.228.1
Image SLES12-SP5-Azure-SAP-BYOS:kernel-default-4.12.14-122.228.1
Image SLES12-SP5-Azure-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.228.1
+ Image SLES12-SP5-GCE-BYOS:kernel-default-4.12.14-122.228.1
+ Image SLES12-SP5-GCE-SAP-BYOS:cluster-md-kmp-default-4.12.14-122.228.1
+ Image SLES12-SP5-GCE-SAP-BYOS:dlm-kmp-default-4.12.14-122.228.1
+ Image SLES12-SP5-GCE-SAP-BYOS:gfs2-kmp-default-4.12.14-122.228.1
+ Image SLES12-SP5-GCE-SAP-BYOS:kernel-default-4.12.14-122.228.1
+ Image SLES12-SP5-GCE-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.228.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:cluster-md-kmp-default-4.12.14-122.228.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:dlm-kmp-default-4.12.14-122.228.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:gfs2-kmp-default-4.12.14-122.228.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:kernel-default-4.12.14-122.228.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:ocfs2-kmp-default-4.12.14-122.228.1
Image SLES15-SP5-Azure-Basic:kernel-azure-5.14.21-150500.33.66.1
Image SLES15-SP5-Azure-Standard:kernel-azure-5.14.21-150500.33.66.1
Image SLES15-SP5-CHOST-BYOS-Aliyun:kernel-default-5.14.21-150500.55.80.2
skipping CVE-2024-43838 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-43837 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-43836 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-43835 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-43834 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-43833 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-43832 as CVE page is older than CVRF-CVE file.
--- /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2024-43831.xml 2024-10-16 01:14:24.674450000 +0200
+++ /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2024-43831.xml.new 2024-10-29 01:14:16.875881000 +0100
@@ -14,13 +14,13 @@
1
- 30
- 2024-10-15T23:14:24Z
+ 31
+ 2024-10-29T00:14:16Z
current
2024-08-17T23:09:42Z
- 2024-10-15T23:14:24Z
+ 2024-10-29T00:14:16Z
cve-database/bin/generate-cvrf-cve.pl
2020-12-27T01:00:00Z
@@ -109,6 +109,21 @@
Image SLES12-SP5-Azure-SAP-BYOS
+
+
+ Image SLES12-SP5-GCE-BYOS
+
+
+
+
+ Image SLES12-SP5-GCE-SAP-BYOS
+
+
+
+
+ Image SLES12-SP5-GCE-SAP-On-Demand
+
+
Image SLES15-SP5-Azure-Basic
@@ -1639,6 +1654,39 @@
ocfs2-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-Azure-SAP-BYOS
+
+ kernel-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-BYOS
+
+
+ cluster-md-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ dlm-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ gfs2-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ kernel-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ ocfs2-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ cluster-md-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
+
+ dlm-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
+
+ gfs2-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
+
+ kernel-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
+
+ ocfs2-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
kernel-azure-5.14.21-150500.33.66.1 as a component of Image SLES15-SP5-Azure-Basic
@@ -3264,6 +3312,17 @@
Image SLES12-SP5-Azure-SAP-BYOS:gfs2-kmp-default-4.12.14-122.228.1
Image SLES12-SP5-Azure-SAP-BYOS:kernel-default-4.12.14-122.228.1
Image SLES12-SP5-Azure-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.228.1
+ Image SLES12-SP5-GCE-BYOS:kernel-default-4.12.14-122.228.1
+ Image SLES12-SP5-GCE-SAP-BYOS:cluster-md-kmp-default-4.12.14-122.228.1
+ Image SLES12-SP5-GCE-SAP-BYOS:dlm-kmp-default-4.12.14-122.228.1
+ Image SLES12-SP5-GCE-SAP-BYOS:gfs2-kmp-default-4.12.14-122.228.1
+ Image SLES12-SP5-GCE-SAP-BYOS:kernel-default-4.12.14-122.228.1
+ Image SLES12-SP5-GCE-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.228.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:cluster-md-kmp-default-4.12.14-122.228.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:dlm-kmp-default-4.12.14-122.228.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:gfs2-kmp-default-4.12.14-122.228.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:kernel-default-4.12.14-122.228.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:ocfs2-kmp-default-4.12.14-122.228.1
Image SLES15-SP5-Azure-Basic:kernel-azure-5.14.21-150500.33.66.1
Image SLES15-SP5-Azure-Standard:kernel-azure-5.14.21-150500.33.66.1
Image SLES15-SP5-CHOST-BYOS-Aliyun:kernel-default-5.14.21-150500.55.80.2
skipping CVE-2024-43830 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-43829 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-43828 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-43827 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-43826 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-43825 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-43824 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-43823 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-43822 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-43821 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-43820 as CVE page is older than CVRF-CVE file.
--- /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2024-43819.xml 2024-10-16 01:14:29.673709000 +0200
+++ /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2024-43819.xml.new 2024-10-29 01:14:18.159889000 +0100
@@ -14,13 +14,13 @@
1
- 29
- 2024-10-15T23:14:29Z
+ 30
+ 2024-10-29T00:14:17Z
current
2024-08-17T23:09:46Z
- 2024-10-15T23:14:29Z
+ 2024-10-29T00:14:17Z
cve-database/bin/generate-cvrf-cve.pl
2020-12-27T01:00:00Z
@@ -118,6 +118,21 @@
Image SLES12-SP5-Azure-SAP-BYOS
+
+
+ Image SLES12-SP5-GCE-BYOS
+
+
+
+
+ Image SLES12-SP5-GCE-SAP-BYOS
+
+
+
+
+ Image SLES12-SP5-GCE-SAP-On-Demand
+
+
Image SLES15-SP5-Azure-Basic
@@ -1656,6 +1671,39 @@
ocfs2-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-Azure-SAP-BYOS
+
+ kernel-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-BYOS
+
+
+ cluster-md-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ dlm-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ gfs2-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ kernel-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ ocfs2-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ cluster-md-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
+
+ dlm-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
+
+ gfs2-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
+
+ kernel-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
+
+ ocfs2-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
kernel-azure-5.14.21-150500.33.66.1 as a component of Image SLES15-SP5-Azure-Basic
@@ -3308,6 +3356,17 @@
Image SLES12-SP5-Azure-SAP-BYOS:gfs2-kmp-default-4.12.14-122.228.1
Image SLES12-SP5-Azure-SAP-BYOS:kernel-default-4.12.14-122.228.1
Image SLES12-SP5-Azure-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.228.1
+ Image SLES12-SP5-GCE-BYOS:kernel-default-4.12.14-122.228.1
+ Image SLES12-SP5-GCE-SAP-BYOS:cluster-md-kmp-default-4.12.14-122.228.1
+ Image SLES12-SP5-GCE-SAP-BYOS:dlm-kmp-default-4.12.14-122.228.1
+ Image SLES12-SP5-GCE-SAP-BYOS:gfs2-kmp-default-4.12.14-122.228.1
+ Image SLES12-SP5-GCE-SAP-BYOS:kernel-default-4.12.14-122.228.1
+ Image SLES12-SP5-GCE-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.228.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:cluster-md-kmp-default-4.12.14-122.228.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:dlm-kmp-default-4.12.14-122.228.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:gfs2-kmp-default-4.12.14-122.228.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:kernel-default-4.12.14-122.228.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:ocfs2-kmp-default-4.12.14-122.228.1
Image SLES15-SP5-Azure-Basic:kernel-azure-5.14.21-150500.33.66.1
Image SLES15-SP5-Azure-Standard:kernel-azure-5.14.21-150500.33.66.1
Image SLES15-SP5-CHOST-BYOS-Aliyun:kernel-default-5.14.21-150500.55.80.2
skipping CVE-2024-43818 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-43817 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-43816 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-43815 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-43806 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-43802 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-43790 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-43788 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-43398 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-43374 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-43363 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-43362 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-43357 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-43168 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-43167 as CVE page is older than CVRF-CVE file.
no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2024-42934
--- /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2024-42934.xml 2024-10-19 01:14:36.299764000 +0200
+++ /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2024-42934.xml.new 2024-10-29 01:14:24.588950000 +0100
@@ -14,13 +14,13 @@
1
- 10
- 2024-10-18T23:14:35Z
+ 11
+ 2024-10-29T00:14:23Z
current
2024-08-30T07:17:37Z
- 2024-10-18T23:14:35Z
+ 2024-10-29T00:14:23Z
cve-database/bin/generate-cvrf-cve.pl
2020-12-27T01:00:00Z
@@ -58,6 +58,16 @@
+
+
+ Image SLES12-SP5-GCE-SAP-BYOS
+
+
+
+
+ Image SLES12-SP5-GCE-SAP-On-Demand
+
+
SUSE Liberty Linux 9
@@ -239,6 +249,253 @@
openSUSE Tumbleweed
+
+
+ SLES 15 SP1 CHOST Images for Amazon EC2 suse-sles-15-sp1-chost-byos-v20210304-hvm-ssd-x86_64
+ SLES 15 SP1 CHOST Images for Amazon EC2 suse-sles-15-sp1-chost-byos-v20220127-hvm-ssd-x86_64
+ SLES 15 SP1 CHOST Images for Amazon EC2 suse-sles-15-sp1-chost-byos-v20220715-hvm-ssd-x86_64
+
+
+ SLES 15 SP2 CHOST Images for Amazon EC2 suse-sles-15-sp2-chost-byos-v20210610-hvm-ssd-x86_64
+ SLES 15 SP2 CHOST Images for Amazon EC2 suse-sles-15-sp2-chost-byos-v20210722-hvm-ssd-x86_64
+ SLES 15 SP2 CHOST Images for Amazon EC2 suse-sles-15-sp2-chost-byos-v20210913-hvm-ssd-x86_64
+ SLES 15 SP2 CHOST Images for Amazon EC2 suse-sles-15-sp2-chost-byos-v20211025-hvm-ssd-x86_64
+ SLES 15 SP2 CHOST Images for Amazon EC2 suse-sles-15-sp2-chost-byos-v20220126-hvm-ssd-x86_64
+ SLES 15 SP2 CHOST Images for Amazon EC2 suse-sles-15-sp2-chost-byos-v20220718-hvm-ssd-x86_64
+
+
+ SLES 15 SP3 CHOST Images for Amazon EC2 suse-sles-15-sp3-chost-byos-v20210729-hvm-ssd-x86_64
+ SLES 15 SP3 CHOST Images for Amazon EC2 suse-sles-15-sp3-chost-byos-v20210827-hvm-ssd-x86_64
+ SLES 15 SP3 CHOST Images for Amazon EC2 suse-sles-15-sp3-chost-byos-v20210927-hvm-ssd-x86_64
+ SLES 15 SP3 CHOST Images for Amazon EC2 suse-sles-15-sp3-chost-byos-v20211004-hvm-ssd-x86_64
+ SLES 15 SP3 CHOST Images for Amazon EC2 suse-sles-15-sp3-chost-byos-v20211101-hvm-ssd-x86_64
+ SLES 15 SP3 CHOST Images for Amazon EC2 suse-sles-15-sp3-chost-byos-v20211202-hvm-ssd-x86_64
+ SLES 15 SP3 CHOST Images for Amazon EC2 suse-sles-15-sp3-chost-byos-v20220103-hvm-ssd-x86_64
+ SLES 15 SP3 CHOST Images for Amazon EC2 suse-sles-15-sp3-chost-byos-v20220126-hvm-ssd-x86_64
+ SLES 15 SP3 CHOST Images for Amazon EC2 suse-sles-15-sp3-chost-byos-v20220222-hvm-ssd-x86_64
+ SLES 15 SP3 CHOST Images for Amazon EC2 suse-sles-15-sp3-chost-byos-v20220310-hvm-ssd-x86_64
+ SLES 15 SP3 CHOST Images for Amazon EC2 suse-sles-15-sp3-chost-byos-v20220411-hvm-ssd-x86_64
+ SLES 15 SP3 CHOST Images for Amazon EC2 suse-sles-15-sp3-chost-byos-v20220510-hvm-ssd-x86_64
+ SLES 15 SP3 CHOST Images for Amazon EC2 suse-sles-15-sp3-chost-byos-v20220608-hvm-ssd-x86_64
+ SLES 15 SP3 CHOST Images for Amazon EC2 suse-sles-15-sp3-chost-byos-v20220708-hvm-ssd-x86_64
+ SLES 15 SP3 CHOST Images for Amazon EC2 suse-sles-15-sp3-chost-byos-v20220718-hvm-ssd-x86_64
+ SLES 15 SP3 CHOST Images for Amazon EC2 suse-sles-15-sp3-chost-byos-v20220818-hvm-ssd-x86_64
+ SLES 15 SP3 CHOST Images for Amazon EC2 suse-sles-15-sp3-chost-byos-v20220916-hvm-ssd-x86_64
+ SLES 15 SP3 CHOST Images for Amazon EC2 suse-sles-15-sp3-chost-byos-v20220921-hvm-ssd-x86_64
+ SLES 15 SP3 CHOST Images for Amazon EC2 suse-sles-15-sp3-chost-byos-v20221019-hvm-ssd-x86_64
+ SLES 15 SP3 CHOST Images for Amazon EC2 suse-sles-15-sp3-chost-byos-v20221119-hvm-ssd-x86_64
+ SLES 15 SP3 CHOST Images for Amazon EC2 suse-sles-15-sp3-chost-byos-v20221215-hvm-ssd-x86_64
+ SLES 15 SP3 CHOST Images for Amazon EC2 suse-sles-15-sp3-chost-byos-v20230313-hvm-ssd-x86_64
+ SLES 15 SP3 CHOST Images for Amazon EC2 suse-sles-15-sp3-chost-byos-v20230613-hvm-ssd-x86_64
+ SLES 15 SP3 CHOST Images for Amazon EC2 suse-sles-15-sp3-chost-byos-v20240807-hvm-ssd-x86_64
+ SLES 15 SP3 CHOST Images for Amazon EC2 suse-sles-15-sp3-chost-byos-v20240912-hvm-ssd-x86_64
+
+
+ SLES 15 SP4 CHOST Images for Amazon EC2 suse-sles-15-sp4-chost-byos-v20220718-hvm-ssd-x86_64
+ SLES 15 SP4 CHOST Images for Amazon EC2 suse-sles-15-sp4-chost-byos-v20220721-hvm-ssd-x86_64
+ SLES 15 SP4 CHOST Images for Amazon EC2 suse-sles-15-sp4-chost-byos-v20220819-hvm-ssd-x86_64
+ SLES 15 SP4 CHOST Images for Amazon EC2 suse-sles-15-sp4-chost-byos-v20220916-hvm-ssd-x86_64
+ SLES 15 SP4 CHOST Images for Amazon EC2 suse-sles-15-sp4-chost-byos-v20220923-hvm-ssd-x86_64
+ SLES 15 SP4 CHOST Images for Amazon EC2 suse-sles-15-sp4-chost-byos-v20221018-hvm-ssd-x86_64
+ SLES 15 SP4 CHOST Images for Amazon EC2 suse-sles-15-sp4-chost-byos-v20221118-hvm-ssd-x86_64
+ SLES 15 SP4 CHOST Images for Amazon EC2 suse-sles-15-sp4-chost-byos-v20221215-hvm-ssd-x86_64
+ SLES 15 SP4 CHOST Images for Amazon EC2 suse-sles-15-sp4-chost-byos-v20230111-hvm-ssd-x86_64
+ SLES 15 SP4 CHOST Images for Amazon EC2 suse-sles-15-sp4-chost-byos-v20230210-hvm-ssd-x86_64
+ SLES 15 SP4 CHOST Images for Amazon EC2 suse-sles-15-sp4-chost-byos-v20230310-hvm-ssd-x86_64
+ SLES 15 SP4 CHOST Images for Amazon EC2 suse-sles-15-sp4-chost-byos-v20230410-hvm-ssd-x86_64
+ SLES 15 SP4 CHOST Images for Amazon EC2 suse-sles-15-sp4-chost-byos-v20230510-hvm-ssd-x86_64
+ SLES 15 SP4 CHOST Images for Amazon EC2 suse-sles-15-sp4-chost-byos-v20230606-hvm-ssd-x86_64
+ SLES 15 SP4 CHOST Images for Amazon EC2 suse-sles-15-sp4-chost-byos-v20230704-hvm-ssd-x86_64
+ SLES 15 SP4 CHOST Images for Amazon EC2 suse-sles-15-sp4-chost-byos-v20230803-hvm-ssd-x86_64
+ SLES 15 SP4 CHOST Images for Amazon EC2 suse-sles-15-sp4-chost-byos-v20230901-hvm-ssd-x86_64
+ SLES 15 SP4 CHOST Images for Amazon EC2 suse-sles-15-sp4-chost-byos-v20230928-hvm-ssd-x86_64
+ SLES 15 SP4 CHOST Images for Amazon EC2 suse-sles-15-sp4-chost-byos-v20231027-hvm-ssd-x86_64
+ SLES 15 SP4 CHOST Images for Amazon EC2 suse-sles-15-sp4-chost-byos-v20231127-hvm-ssd-x86_64
+ SLES 15 SP4 CHOST Images for Amazon EC2 suse-sles-15-sp4-chost-byos-v20231212-hvm-ssd-x86_64
+ SLES 15 SP4 CHOST Images for Amazon EC2 suse-sles-15-sp4-chost-byos-v20240312-hvm-ssd-x86_64
+ SLES 15 SP4 CHOST Images for Amazon EC2 suse-sles-15-sp4-chost-byos-v20240612-hvm-ssd-x86_64
+ SLES 15 SP4 CHOST Images for Amazon EC2 suse-sles-15-sp4-chost-byos-v20240809-hvm-ssd-x86_64
+ SLES 15 SP4 CHOST Images for Amazon EC2 suse-sles-15-sp4-chost-byos-v20240912-hvm-ssd-x86_64
+
+
+ SLES 15 SP1 CHOST Images for Google sles-15-sp1-chost-byos-v20210202
+ SLES 15 SP1 CHOST Images for Google sles-15-sp1-chost-byos-v20210304
+ SLES 15 SP1 CHOST Images for Google sles-15-sp1-chost-byos-v20220127
+ SLES 15 SP1 CHOST Images for Google sles-15-sp1-chost-byos-v20220715-x86-64
+
+
+ SLES 15 SP2 CHOST Images for Google sles-15-sp2-chost-byos-v20210202
+ SLES 15 SP2 CHOST Images for Google sles-15-sp2-chost-byos-v20210304
+ SLES 15 SP2 CHOST Images for Google sles-15-sp2-chost-byos-v20210405
+ SLES 15 SP2 CHOST Images for Google sles-15-sp2-chost-byos-v20210506
+ SLES 15 SP2 CHOST Images for Google sles-15-sp2-chost-byos-v20210610
+ SLES 15 SP2 CHOST Images for Google sles-15-sp2-chost-byos-v20210722
+ SLES 15 SP2 CHOST Images for Google sles-15-sp2-chost-byos-v20210913
+ SLES 15 SP2 CHOST Images for Google sles-15-sp2-chost-byos-v20211025
+ SLES 15 SP2 CHOST Images for Google sles-15-sp2-chost-byos-v20220126
+ SLES 15 SP2 CHOST Images for Google sles-15-sp2-chost-byos-v20220718-x86-64
+
+
+ SLES 15 SP3 CHOST Images for Google sles-15-sp3-chost-byos-v20210729
+ SLES 15 SP3 CHOST Images for Google sles-15-sp3-chost-byos-v20210827
+ SLES 15 SP3 CHOST Images for Google sles-15-sp3-chost-byos-v20210927
+ SLES 15 SP3 CHOST Images for Google sles-15-sp3-chost-byos-v20211004
+ SLES 15 SP3 CHOST Images for Google sles-15-sp3-chost-byos-v20211101
+ SLES 15 SP3 CHOST Images for Google sles-15-sp3-chost-byos-v20211202
+ SLES 15 SP3 CHOST Images for Google sles-15-sp3-chost-byos-v20220103
+ SLES 15 SP3 CHOST Images for Google sles-15-sp3-chost-byos-v20220126
+ SLES 15 SP3 CHOST Images for Google sles-15-sp3-chost-byos-v20220222
+ SLES 15 SP3 CHOST Images for Google sles-15-sp3-chost-byos-v20220310
+ SLES 15 SP3 CHOST Images for Google sles-15-sp3-chost-byos-v20220411-x86-64
+ SLES 15 SP3 CHOST Images for Google sles-15-sp3-chost-byos-v20220510-x86-64
+ SLES 15 SP3 CHOST Images for Google sles-15-sp3-chost-byos-v20220608-x86-64
+ SLES 15 SP3 CHOST Images for Google sles-15-sp3-chost-byos-v20220708-x86-64
+ SLES 15 SP3 CHOST Images for Google sles-15-sp3-chost-byos-v20220718-x86-64
+ SLES 15 SP3 CHOST Images for Google sles-15-sp3-chost-byos-v20220818-x86-64
+ SLES 15 SP3 CHOST Images for Google sles-15-sp3-chost-byos-v20220916-x86-64
+ SLES 15 SP3 CHOST Images for Google sles-15-sp3-chost-byos-v20221019-x86-64
+ SLES 15 SP3 CHOST Images for Google sles-15-sp3-chost-byos-v20221118-x86-64
+ SLES 15 SP3 CHOST Images for Google sles-15-sp3-chost-byos-v20221215-x86-64
+ SLES 15 SP3 CHOST Images for Google sles-15-sp3-chost-byos-v20230313-x86-64
+ SLES 15 SP3 CHOST Images for Google sles-15-sp3-chost-byos-v20230613-x86-64
+ SLES 15 SP3 CHOST Images for Google sles-15-sp3-chost-byos-v20240807-x86-64
+ SLES 15 SP3 CHOST Images for Google sles-15-sp3-chost-byos-v20240912-x86-64
+
+
+ SLES 15 SP4 CHOST Images for Google sles-15-sp4-chost-byos-v20220718-x86-64
+ SLES 15 SP4 CHOST Images for Google sles-15-sp4-chost-byos-v20220721-x86-64
+ SLES 15 SP4 CHOST Images for Google sles-15-sp4-chost-byos-v20220818-x86-64
+ SLES 15 SP4 CHOST Images for Google sles-15-sp4-chost-byos-v20220916-x86-64
+ SLES 15 SP4 CHOST Images for Google sles-15-sp4-chost-byos-v20221018-x86-64
+ SLES 15 SP4 CHOST Images for Google sles-15-sp4-chost-byos-v20221118-x86-64
+ SLES 15 SP4 CHOST Images for Google sles-15-sp4-chost-byos-v20221215-arm64
+ SLES 15 SP4 CHOST Images for Google sles-15-sp4-chost-byos-v20221215-x86-64
+ SLES 15 SP4 CHOST Images for Google sles-15-sp4-chost-byos-v20230111-arm64
+ SLES 15 SP4 CHOST Images for Google sles-15-sp4-chost-byos-v20230111-x86-64
+ SLES 15 SP4 CHOST Images for Google sles-15-sp4-chost-byos-v20230210-arm64
+ SLES 15 SP4 CHOST Images for Google sles-15-sp4-chost-byos-v20230210-x86-64
+ SLES 15 SP4 CHOST Images for Google sles-15-sp4-chost-byos-v20230310-arm64
+ SLES 15 SP4 CHOST Images for Google sles-15-sp4-chost-byos-v20230310-x86-64
+ SLES 15 SP4 CHOST Images for Google sles-15-sp4-chost-byos-v20230410-arm64
+ SLES 15 SP4 CHOST Images for Google sles-15-sp4-chost-byos-v20230410-x86-64
+ SLES 15 SP4 CHOST Images for Google sles-15-sp4-chost-byos-v20230510-arm64
+ SLES 15 SP4 CHOST Images for Google sles-15-sp4-chost-byos-v20230510-x86-64
+ SLES 15 SP4 CHOST Images for Google sles-15-sp4-chost-byos-v20230606-arm64
+ SLES 15 SP4 CHOST Images for Google sles-15-sp4-chost-byos-v20230606-x86-64
+ SLES 15 SP4 CHOST Images for Google sles-15-sp4-chost-byos-v20230704-arm64
+ SLES 15 SP4 CHOST Images for Google sles-15-sp4-chost-byos-v20230704-x86-64
+ SLES 15 SP4 CHOST Images for Google sles-15-sp4-chost-byos-v20230804-arm64
+ SLES 15 SP4 CHOST Images for Google sles-15-sp4-chost-byos-v20230804-x86-64
+ SLES 15 SP4 CHOST Images for Google sles-15-sp4-chost-byos-v20230901-arm64
+ SLES 15 SP4 CHOST Images for Google sles-15-sp4-chost-byos-v20230901-x86-64
+ SLES 15 SP4 CHOST Images for Google sles-15-sp4-chost-byos-v20230928-arm64
+ SLES 15 SP4 CHOST Images for Google sles-15-sp4-chost-byos-v20230928-x86-64
+ SLES 15 SP4 CHOST Images for Google sles-15-sp4-chost-byos-v20231027-arm64
+ SLES 15 SP4 CHOST Images for Google sles-15-sp4-chost-byos-v20231027-x86-64
+ SLES 15 SP4 CHOST Images for Google sles-15-sp4-chost-byos-v20231127-arm64
+ SLES 15 SP4 CHOST Images for Google sles-15-sp4-chost-byos-v20231127-x86-64
+ SLES 15 SP4 CHOST Images for Google sles-15-sp4-chost-byos-v20231212-arm64
+ SLES 15 SP4 CHOST Images for Google sles-15-sp4-chost-byos-v20231212-x86-64
+ SLES 15 SP4 CHOST Images for Google sles-15-sp4-chost-byos-v20240312-arm64
+ SLES 15 SP4 CHOST Images for Google sles-15-sp4-chost-byos-v20240312-x86-64
+ SLES 15 SP4 CHOST Images for Google sles-15-sp4-chost-byos-v20240612-arm64
+ SLES 15 SP4 CHOST Images for Google sles-15-sp4-chost-byos-v20240612-x86-64
+ SLES 15 SP4 CHOST Images for Google sles-15-sp4-chost-byos-v20240809-arm64
+ SLES 15 SP4 CHOST Images for Google sles-15-sp4-chost-byos-v20240809-x86-64
+ SLES 15 SP4 CHOST Images for Google sles-15-sp4-chost-byos-v20240912-arm64
+ SLES 15 SP4 CHOST Images for Google sles-15-sp4-chost-byos-v20240912-x86-64
+
+
+ SLES 15 SP1 CHOST Images for Microsoft Azure suse-sles-15-sp1-chost-byos-v20210202
+ SLES 15 SP1 CHOST Images for Microsoft Azure suse-sles-15-sp1-chost-byos-v20210304
+ SLES 15 SP1 CHOST Images for Microsoft Azure suse-sles-15-sp1-chost-byos-v20220127
+ SLES 15 SP1 CHOST Images for Microsoft Azure suse-sles-15-sp1-chost-byos-v20220715-x86_64
+
+
+ SLES 15 SP2 CHOST Images for Microsoft Azure suse-sles-15-sp2-chost-byos-v20210202
+ SLES 15 SP2 CHOST Images for Microsoft Azure suse-sles-15-sp2-chost-byos-v20210304
+ SLES 15 SP2 CHOST Images for Microsoft Azure suse-sles-15-sp2-chost-byos-v20210405
+ SLES 15 SP2 CHOST Images for Microsoft Azure suse-sles-15-sp2-chost-byos-v20210506
+ SLES 15 SP2 CHOST Images for Microsoft Azure suse-sles-15-sp2-chost-byos-v20210610
+ SLES 15 SP2 CHOST Images for Microsoft Azure suse-sles-15-sp2-chost-byos-v20210722
+ SLES 15 SP2 CHOST Images for Microsoft Azure suse-sles-15-sp2-chost-byos-v20210913
+ SLES 15 SP2 CHOST Images for Microsoft Azure suse-sles-15-sp2-chost-byos-v20211025
+ SLES 15 SP2 CHOST Images for Microsoft Azure suse-sles-15-sp2-chost-byos-v20220126
+ SLES 15 SP2 CHOST Images for Microsoft Azure suse-sles-15-sp2-chost-byos-v20220718-x86_64
+
+
+ SLES 15 SP3 CHOST Images for Microsoft Azure suse-sles-15-sp3-chost-byos-v20210729
+ SLES 15 SP3 CHOST Images for Microsoft Azure suse-sles-15-sp3-chost-byos-v20210827
+ SLES 15 SP3 CHOST Images for Microsoft Azure suse-sles-15-sp3-chost-byos-v20210927
+ SLES 15 SP3 CHOST Images for Microsoft Azure suse-sles-15-sp3-chost-byos-v20211004
+ SLES 15 SP3 CHOST Images for Microsoft Azure suse-sles-15-sp3-chost-byos-v20211101
+ SLES 15 SP3 CHOST Images for Microsoft Azure suse-sles-15-sp3-chost-byos-v20211202
+ SLES 15 SP3 CHOST Images for Microsoft Azure suse-sles-15-sp3-chost-byos-v20220103
+ SLES 15 SP3 CHOST Images for Microsoft Azure suse-sles-15-sp3-chost-byos-v20220126
+ SLES 15 SP3 CHOST Images for Microsoft Azure suse-sles-15-sp3-chost-byos-v20220222
+ SLES 15 SP3 CHOST Images for Microsoft Azure suse-sles-15-sp3-chost-byos-v20220310
+ SLES 15 SP3 CHOST Images for Microsoft Azure suse-sles-15-sp3-chost-byos-v20220411-x86_64
+ SLES 15 SP3 CHOST Images for Microsoft Azure suse-sles-15-sp3-chost-byos-v20220510-x86_64
+ SLES 15 SP3 CHOST Images for Microsoft Azure suse-sles-15-sp3-chost-byos-v20220609-x86_64
+ SLES 15 SP3 CHOST Images for Microsoft Azure suse-sles-15-sp3-chost-byos-v20220708-x86_64
+ SLES 15 SP3 CHOST Images for Microsoft Azure suse-sles-15-sp3-chost-byos-v20220718-x86_64
+ SLES 15 SP3 CHOST Images for Microsoft Azure suse-sles-15-sp3-chost-byos-v20220818-x86_64
+ SLES 15 SP3 CHOST Images for Microsoft Azure suse-sles-15-sp3-chost-byos-v20220916-x86_64
+ SLES 15 SP3 CHOST Images for Microsoft Azure suse-sles-15-sp3-chost-byos-v20220921-x86_64
+ SLES 15 SP3 CHOST Images for Microsoft Azure suse-sles-15-sp3-chost-byos-v20221019-x86_64
+ SLES 15 SP3 CHOST Images for Microsoft Azure suse-sles-15-sp3-chost-byos-v20221119-x86_64
+ SLES 15 SP3 CHOST Images for Microsoft Azure suse-sles-15-sp3-chost-byos-v20221215-x86_64
+ SLES 15 SP3 CHOST Images for Microsoft Azure suse-sles-15-sp3-chost-byos-v20230313-x86_64
+ SLES 15 SP3 CHOST Images for Microsoft Azure suse-sles-15-sp3-chost-byos-v20230613-x86_64
+ SLES 15 SP3 CHOST Images for Microsoft Azure suse-sles-15-sp3-chost-byos-v20240807-x86_64
+ SLES 15 SP3 CHOST Images for Microsoft Azure suse-sles-15-sp3-chost-byos-v20240912-x86_64
+
+
+ SLES 15 SP4 CHOST Images for Microsoft Azure suse-sles-15-sp4-chost-byos-v20220718-x86_64
+ SLES 15 SP4 CHOST Images for Microsoft Azure suse-sles-15-sp4-chost-byos-v20220721-x86_64
+ SLES 15 SP4 CHOST Images for Microsoft Azure suse-sles-15-sp4-chost-byos-v20220819-x86_64
+ SLES 15 SP4 CHOST Images for Microsoft Azure suse-sles-15-sp4-chost-byos-v20220916-x86_64
+ SLES 15 SP4 CHOST Images for Microsoft Azure suse-sles-15-sp4-chost-byos-v20220923-x86_64
+ SLES 15 SP4 CHOST Images for Microsoft Azure suse-sles-15-sp4-chost-byos-v20221018-x86_64
+ SLES 15 SP4 CHOST Images for Microsoft Azure suse-sles-15-sp4-chost-byos-v20221118-x86_64
+ SLES 15 SP4 CHOST Images for Microsoft Azure suse-sles-15-sp4-chost-byos-v20221215-arm64
+ SLES 15 SP4 CHOST Images for Microsoft Azure suse-sles-15-sp4-chost-byos-v20221215-x86_64
+ SLES 15 SP4 CHOST Images for Microsoft Azure suse-sles-15-sp4-chost-byos-v20230111-arm64
+ SLES 15 SP4 CHOST Images for Microsoft Azure suse-sles-15-sp4-chost-byos-v20230111-x86_64
+ SLES 15 SP4 CHOST Images for Microsoft Azure suse-sles-15-sp4-chost-byos-v20230210-arm64
+ SLES 15 SP4 CHOST Images for Microsoft Azure suse-sles-15-sp4-chost-byos-v20230210-x86_64
+ SLES 15 SP4 CHOST Images for Microsoft Azure suse-sles-15-sp4-chost-byos-v20230310-arm64
+ SLES 15 SP4 CHOST Images for Microsoft Azure suse-sles-15-sp4-chost-byos-v20230310-x86_64
+ SLES 15 SP4 CHOST Images for Microsoft Azure suse-sles-15-sp4-chost-byos-v20230410-arm64
+ SLES 15 SP4 CHOST Images for Microsoft Azure suse-sles-15-sp4-chost-byos-v20230410-x86_64
+ SLES 15 SP4 CHOST Images for Microsoft Azure suse-sles-15-sp4-chost-byos-v20230510-arm64
+ SLES 15 SP4 CHOST Images for Microsoft Azure suse-sles-15-sp4-chost-byos-v20230510-x86_64
+ SLES 15 SP4 CHOST Images for Microsoft Azure suse-sles-15-sp4-chost-byos-v20230606-arm64
+ SLES 15 SP4 CHOST Images for Microsoft Azure suse-sles-15-sp4-chost-byos-v20230606-x86_64
+ SLES 15 SP4 CHOST Images for Microsoft Azure suse-sles-15-sp4-chost-byos-v20230704-arm64
+ SLES 15 SP4 CHOST Images for Microsoft Azure suse-sles-15-sp4-chost-byos-v20230704-x86_64
+ SLES 15 SP4 CHOST Images for Microsoft Azure suse-sles-15-sp4-chost-byos-v20230803-arm64
+ SLES 15 SP4 CHOST Images for Microsoft Azure suse-sles-15-sp4-chost-byos-v20230803-x86_64
+ SLES 15 SP4 CHOST Images for Microsoft Azure suse-sles-15-sp4-chost-byos-v20230901-arm64
+ SLES 15 SP4 CHOST Images for Microsoft Azure suse-sles-15-sp4-chost-byos-v20230901-x86_64
+ SLES 15 SP4 CHOST Images for Microsoft Azure suse-sles-15-sp4-chost-byos-v20230928-arm64
+ SLES 15 SP4 CHOST Images for Microsoft Azure suse-sles-15-sp4-chost-byos-v20230928-x86_64
+ SLES 15 SP4 CHOST Images for Microsoft Azure suse-sles-15-sp4-chost-byos-v20231027-arm64
+ SLES 15 SP4 CHOST Images for Microsoft Azure suse-sles-15-sp4-chost-byos-v20231027-x86_64
+ SLES 15 SP4 CHOST Images for Microsoft Azure suse-sles-15-sp4-chost-byos-v20231127-arm64
+ SLES 15 SP4 CHOST Images for Microsoft Azure suse-sles-15-sp4-chost-byos-v20231127-x86_64
+ SLES 15 SP4 CHOST Images for Microsoft Azure suse-sles-15-sp4-chost-byos-v20231212-arm64
+ SLES 15 SP4 CHOST Images for Microsoft Azure suse-sles-15-sp4-chost-byos-v20231212-x86_64
+ SLES 15 SP4 CHOST Images for Microsoft Azure suse-sles-15-sp4-chost-byos-v20240312-arm64
+ SLES 15 SP4 CHOST Images for Microsoft Azure suse-sles-15-sp4-chost-byos-v20240312-x86_64
+ SLES 15 SP4 CHOST Images for Microsoft Azure suse-sles-15-sp4-chost-byos-v20240612-arm64
+ SLES 15 SP4 CHOST Images for Microsoft Azure suse-sles-15-sp4-chost-byos-v20240612-x86_64
+ SLES 15 SP4 CHOST Images for Microsoft Azure suse-sles-15-sp4-chost-byos-v20240809-arm64
+ SLES 15 SP4 CHOST Images for Microsoft Azure suse-sles-15-sp4-chost-byos-v20240809-x86_64
+ SLES 15 SP4 CHOST Images for Microsoft Azure suse-sles-15-sp4-chost-byos-v20240912-arm64
+ SLES 15 SP4 CHOST Images for Microsoft Azure suse-sles-15-sp4-chost-byos-v20240912-x86_64
+
+
OpenIPMI
@@ -311,6 +568,12 @@
libOpenIPMIui1-2.0.36.4+git.c114912-1.1
+
+ OpenIPMI-2.0.21-10.9.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ OpenIPMI-2.0.21-10.9.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
OpenIPMI-2.0.32-5.el9_4 as a component of SUSE Liberty Linux 9
@@ -494,9 +757,6 @@
OpenIPMI as a component of SUSE Linux Enterprise Server for SAP Applications 12 SP5
-
- OpenIPMI-python as a component of SUSE Linux Enterprise Server for SAP Applications 12 SP5
-
OpenIPMI as a component of SUSE Linux Enterprise Server for SAP Applications 15 SP2
@@ -553,6 +813,8 @@
CVE-2024-42934
+ Image SLES12-SP5-GCE-SAP-BYOS:OpenIPMI-2.0.21-10.9.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:OpenIPMI-2.0.21-10.9.1
SUSE Liberty Linux 9:OpenIPMI-2.0.32-5.el9_4
SUSE Liberty Linux 9:OpenIPMI-devel-2.0.32-5.el9_4
SUSE Liberty Linux 9:OpenIPMI-lanserv-2.0.32-5.el9_4
@@ -587,6 +849,229 @@
openSUSE Tumbleweed:libOpenIPMI0-2.0.36.4+git.c114912-1.1
openSUSE Tumbleweed:libOpenIPMIui1-2.0.36.4+git.c114912-1.1
+
+ chost:amazon/suse-sles-15-sp1-chost-byos-v20210304-hvm-ssd-x86_64
+ chost:amazon/suse-sles-15-sp1-chost-byos-v20220127-hvm-ssd-x86_64
+ chost:amazon/suse-sles-15-sp1-chost-byos-v20220715-hvm-ssd-x86_64
+ chost:amazon/suse-sles-15-sp2-chost-byos-v20210610-hvm-ssd-x86_64
+ chost:amazon/suse-sles-15-sp2-chost-byos-v20210722-hvm-ssd-x86_64
+ chost:amazon/suse-sles-15-sp2-chost-byos-v20210913-hvm-ssd-x86_64
+ chost:amazon/suse-sles-15-sp2-chost-byos-v20211025-hvm-ssd-x86_64
+ chost:amazon/suse-sles-15-sp2-chost-byos-v20220126-hvm-ssd-x86_64
+ chost:amazon/suse-sles-15-sp2-chost-byos-v20220718-hvm-ssd-x86_64
+ chost:amazon/suse-sles-15-sp3-chost-byos-v20210729-hvm-ssd-x86_64
+ chost:amazon/suse-sles-15-sp3-chost-byos-v20210827-hvm-ssd-x86_64
+ chost:amazon/suse-sles-15-sp3-chost-byos-v20210927-hvm-ssd-x86_64
+ chost:amazon/suse-sles-15-sp3-chost-byos-v20211004-hvm-ssd-x86_64
+ chost:amazon/suse-sles-15-sp3-chost-byos-v20211101-hvm-ssd-x86_64
+ chost:amazon/suse-sles-15-sp3-chost-byos-v20211202-hvm-ssd-x86_64
+ chost:amazon/suse-sles-15-sp3-chost-byos-v20220103-hvm-ssd-x86_64
+ chost:amazon/suse-sles-15-sp3-chost-byos-v20220126-hvm-ssd-x86_64
+ chost:amazon/suse-sles-15-sp3-chost-byos-v20220222-hvm-ssd-x86_64
+ chost:amazon/suse-sles-15-sp3-chost-byos-v20220310-hvm-ssd-x86_64
+ chost:amazon/suse-sles-15-sp3-chost-byos-v20220411-hvm-ssd-x86_64
+ chost:amazon/suse-sles-15-sp3-chost-byos-v20220510-hvm-ssd-x86_64
+ chost:amazon/suse-sles-15-sp3-chost-byos-v20220608-hvm-ssd-x86_64
+ chost:amazon/suse-sles-15-sp3-chost-byos-v20220708-hvm-ssd-x86_64
+ chost:amazon/suse-sles-15-sp3-chost-byos-v20220718-hvm-ssd-x86_64
+ chost:amazon/suse-sles-15-sp3-chost-byos-v20220818-hvm-ssd-x86_64
+ chost:amazon/suse-sles-15-sp3-chost-byos-v20220916-hvm-ssd-x86_64
+ chost:amazon/suse-sles-15-sp3-chost-byos-v20220921-hvm-ssd-x86_64
+ chost:amazon/suse-sles-15-sp3-chost-byos-v20221019-hvm-ssd-x86_64
+ chost:amazon/suse-sles-15-sp3-chost-byos-v20221119-hvm-ssd-x86_64
+ chost:amazon/suse-sles-15-sp3-chost-byos-v20221215-hvm-ssd-x86_64
+ chost:amazon/suse-sles-15-sp3-chost-byos-v20230313-hvm-ssd-x86_64
+ chost:amazon/suse-sles-15-sp3-chost-byos-v20230613-hvm-ssd-x86_64
+ chost:amazon/suse-sles-15-sp3-chost-byos-v20240807-hvm-ssd-x86_64
+ chost:amazon/suse-sles-15-sp3-chost-byos-v20240912-hvm-ssd-x86_64
+ chost:amazon/suse-sles-15-sp4-chost-byos-v20220718-hvm-ssd-x86_64
+ chost:amazon/suse-sles-15-sp4-chost-byos-v20220721-hvm-ssd-x86_64
+ chost:amazon/suse-sles-15-sp4-chost-byos-v20220819-hvm-ssd-x86_64
+ chost:amazon/suse-sles-15-sp4-chost-byos-v20220916-hvm-ssd-x86_64
+ chost:amazon/suse-sles-15-sp4-chost-byos-v20220923-hvm-ssd-x86_64
+ chost:amazon/suse-sles-15-sp4-chost-byos-v20221018-hvm-ssd-x86_64
+ chost:amazon/suse-sles-15-sp4-chost-byos-v20221118-hvm-ssd-x86_64
+ chost:amazon/suse-sles-15-sp4-chost-byos-v20221215-hvm-ssd-x86_64
+ chost:amazon/suse-sles-15-sp4-chost-byos-v20230111-hvm-ssd-x86_64
+ chost:amazon/suse-sles-15-sp4-chost-byos-v20230210-hvm-ssd-x86_64
+ chost:amazon/suse-sles-15-sp4-chost-byos-v20230310-hvm-ssd-x86_64
+ chost:amazon/suse-sles-15-sp4-chost-byos-v20230410-hvm-ssd-x86_64
+ chost:amazon/suse-sles-15-sp4-chost-byos-v20230510-hvm-ssd-x86_64
+ chost:amazon/suse-sles-15-sp4-chost-byos-v20230606-hvm-ssd-x86_64
+ chost:amazon/suse-sles-15-sp4-chost-byos-v20230704-hvm-ssd-x86_64
+ chost:amazon/suse-sles-15-sp4-chost-byos-v20230803-hvm-ssd-x86_64
+ chost:amazon/suse-sles-15-sp4-chost-byos-v20230901-hvm-ssd-x86_64
+ chost:amazon/suse-sles-15-sp4-chost-byos-v20230928-hvm-ssd-x86_64
+ chost:amazon/suse-sles-15-sp4-chost-byos-v20231027-hvm-ssd-x86_64
+ chost:amazon/suse-sles-15-sp4-chost-byos-v20231127-hvm-ssd-x86_64
+ chost:amazon/suse-sles-15-sp4-chost-byos-v20231212-hvm-ssd-x86_64
+ chost:amazon/suse-sles-15-sp4-chost-byos-v20240312-hvm-ssd-x86_64
+ chost:amazon/suse-sles-15-sp4-chost-byos-v20240612-hvm-ssd-x86_64
+ chost:amazon/suse-sles-15-sp4-chost-byos-v20240809-hvm-ssd-x86_64
+ chost:amazon/suse-sles-15-sp4-chost-byos-v20240912-hvm-ssd-x86_64
+ chost:google/sles-15-sp1-chost-byos-v20210202
+ chost:google/sles-15-sp1-chost-byos-v20210304
+ chost:google/sles-15-sp1-chost-byos-v20220127
+ chost:google/sles-15-sp1-chost-byos-v20220715-x86-64
+ chost:google/sles-15-sp2-chost-byos-v20210202
+ chost:google/sles-15-sp2-chost-byos-v20210304
+ chost:google/sles-15-sp2-chost-byos-v20210405
+ chost:google/sles-15-sp2-chost-byos-v20210506
+ chost:google/sles-15-sp2-chost-byos-v20210610
+ chost:google/sles-15-sp2-chost-byos-v20210722
+ chost:google/sles-15-sp2-chost-byos-v20210913
+ chost:google/sles-15-sp2-chost-byos-v20211025
+ chost:google/sles-15-sp2-chost-byos-v20220126
+ chost:google/sles-15-sp2-chost-byos-v20220718-x86-64
+ chost:google/sles-15-sp3-chost-byos-v20210729
+ chost:google/sles-15-sp3-chost-byos-v20210827
+ chost:google/sles-15-sp3-chost-byos-v20210927
+ chost:google/sles-15-sp3-chost-byos-v20211004
+ chost:google/sles-15-sp3-chost-byos-v20211101
+ chost:google/sles-15-sp3-chost-byos-v20211202
+ chost:google/sles-15-sp3-chost-byos-v20220103
+ chost:google/sles-15-sp3-chost-byos-v20220126
+ chost:google/sles-15-sp3-chost-byos-v20220222
+ chost:google/sles-15-sp3-chost-byos-v20220310
+ chost:google/sles-15-sp3-chost-byos-v20220411-x86-64
+ chost:google/sles-15-sp3-chost-byos-v20220510-x86-64
+ chost:google/sles-15-sp3-chost-byos-v20220608-x86-64
+ chost:google/sles-15-sp3-chost-byos-v20220708-x86-64
+ chost:google/sles-15-sp3-chost-byos-v20220718-x86-64
+ chost:google/sles-15-sp3-chost-byos-v20220818-x86-64
+ chost:google/sles-15-sp3-chost-byos-v20220916-x86-64
+ chost:google/sles-15-sp3-chost-byos-v20221019-x86-64
+ chost:google/sles-15-sp3-chost-byos-v20221118-x86-64
+ chost:google/sles-15-sp3-chost-byos-v20221215-x86-64
+ chost:google/sles-15-sp3-chost-byos-v20230313-x86-64
+ chost:google/sles-15-sp3-chost-byos-v20230613-x86-64
+ chost:google/sles-15-sp3-chost-byos-v20240807-x86-64
+ chost:google/sles-15-sp3-chost-byos-v20240912-x86-64
+ chost:google/sles-15-sp4-chost-byos-v20220718-x86-64
+ chost:google/sles-15-sp4-chost-byos-v20220721-x86-64
+ chost:google/sles-15-sp4-chost-byos-v20220818-x86-64
+ chost:google/sles-15-sp4-chost-byos-v20220916-x86-64
+ chost:google/sles-15-sp4-chost-byos-v20221018-x86-64
+ chost:google/sles-15-sp4-chost-byos-v20221118-x86-64
+ chost:google/sles-15-sp4-chost-byos-v20221215-arm64
+ chost:google/sles-15-sp4-chost-byos-v20221215-x86-64
+ chost:google/sles-15-sp4-chost-byos-v20230111-arm64
+ chost:google/sles-15-sp4-chost-byos-v20230111-x86-64
+ chost:google/sles-15-sp4-chost-byos-v20230210-arm64
+ chost:google/sles-15-sp4-chost-byos-v20230210-x86-64
+ chost:google/sles-15-sp4-chost-byos-v20230310-arm64
+ chost:google/sles-15-sp4-chost-byos-v20230310-x86-64
+ chost:google/sles-15-sp4-chost-byos-v20230410-arm64
+ chost:google/sles-15-sp4-chost-byos-v20230410-x86-64
+ chost:google/sles-15-sp4-chost-byos-v20230510-arm64
+ chost:google/sles-15-sp4-chost-byos-v20230510-x86-64
+ chost:google/sles-15-sp4-chost-byos-v20230606-arm64
+ chost:google/sles-15-sp4-chost-byos-v20230606-x86-64
+ chost:google/sles-15-sp4-chost-byos-v20230704-arm64
+ chost:google/sles-15-sp4-chost-byos-v20230704-x86-64
+ chost:google/sles-15-sp4-chost-byos-v20230804-arm64
+ chost:google/sles-15-sp4-chost-byos-v20230804-x86-64
+ chost:google/sles-15-sp4-chost-byos-v20230901-arm64
+ chost:google/sles-15-sp4-chost-byos-v20230901-x86-64
+ chost:google/sles-15-sp4-chost-byos-v20230928-arm64
+ chost:google/sles-15-sp4-chost-byos-v20230928-x86-64
+ chost:google/sles-15-sp4-chost-byos-v20231027-arm64
+ chost:google/sles-15-sp4-chost-byos-v20231027-x86-64
+ chost:google/sles-15-sp4-chost-byos-v20231127-arm64
+ chost:google/sles-15-sp4-chost-byos-v20231127-x86-64
+ chost:google/sles-15-sp4-chost-byos-v20231212-arm64
+ chost:google/sles-15-sp4-chost-byos-v20231212-x86-64
+ chost:google/sles-15-sp4-chost-byos-v20240312-arm64
+ chost:google/sles-15-sp4-chost-byos-v20240312-x86-64
+ chost:google/sles-15-sp4-chost-byos-v20240612-arm64
+ chost:google/sles-15-sp4-chost-byos-v20240612-x86-64
+ chost:google/sles-15-sp4-chost-byos-v20240809-arm64
+ chost:google/sles-15-sp4-chost-byos-v20240809-x86-64
+ chost:google/sles-15-sp4-chost-byos-v20240912-arm64
+ chost:google/sles-15-sp4-chost-byos-v20240912-x86-64
+ chost:microsoft/suse-sles-15-sp1-chost-byos-v20210202
+ chost:microsoft/suse-sles-15-sp1-chost-byos-v20210304
+ chost:microsoft/suse-sles-15-sp1-chost-byos-v20220127
+ chost:microsoft/suse-sles-15-sp1-chost-byos-v20220715-x86_64
+ chost:microsoft/suse-sles-15-sp2-chost-byos-v20210202
+ chost:microsoft/suse-sles-15-sp2-chost-byos-v20210304
+ chost:microsoft/suse-sles-15-sp2-chost-byos-v20210405
+ chost:microsoft/suse-sles-15-sp2-chost-byos-v20210506
+ chost:microsoft/suse-sles-15-sp2-chost-byos-v20210610
+ chost:microsoft/suse-sles-15-sp2-chost-byos-v20210722
+ chost:microsoft/suse-sles-15-sp2-chost-byos-v20210913
+ chost:microsoft/suse-sles-15-sp2-chost-byos-v20211025
+ chost:microsoft/suse-sles-15-sp2-chost-byos-v20220126
+ chost:microsoft/suse-sles-15-sp2-chost-byos-v20220718-x86_64
+ chost:microsoft/suse-sles-15-sp3-chost-byos-v20210729
+ chost:microsoft/suse-sles-15-sp3-chost-byos-v20210827
+ chost:microsoft/suse-sles-15-sp3-chost-byos-v20210927
+ chost:microsoft/suse-sles-15-sp3-chost-byos-v20211004
+ chost:microsoft/suse-sles-15-sp3-chost-byos-v20211101
+ chost:microsoft/suse-sles-15-sp3-chost-byos-v20211202
+ chost:microsoft/suse-sles-15-sp3-chost-byos-v20220103
+ chost:microsoft/suse-sles-15-sp3-chost-byos-v20220126
+ chost:microsoft/suse-sles-15-sp3-chost-byos-v20220222
+ chost:microsoft/suse-sles-15-sp3-chost-byos-v20220310
+ chost:microsoft/suse-sles-15-sp3-chost-byos-v20220411-x86_64
+ chost:microsoft/suse-sles-15-sp3-chost-byos-v20220510-x86_64
+ chost:microsoft/suse-sles-15-sp3-chost-byos-v20220609-x86_64
+ chost:microsoft/suse-sles-15-sp3-chost-byos-v20220708-x86_64
+ chost:microsoft/suse-sles-15-sp3-chost-byos-v20220718-x86_64
+ chost:microsoft/suse-sles-15-sp3-chost-byos-v20220818-x86_64
+ chost:microsoft/suse-sles-15-sp3-chost-byos-v20220916-x86_64
+ chost:microsoft/suse-sles-15-sp3-chost-byos-v20220921-x86_64
+ chost:microsoft/suse-sles-15-sp3-chost-byos-v20221019-x86_64
+ chost:microsoft/suse-sles-15-sp3-chost-byos-v20221119-x86_64
+ chost:microsoft/suse-sles-15-sp3-chost-byos-v20221215-x86_64
+ chost:microsoft/suse-sles-15-sp3-chost-byos-v20230313-x86_64
+ chost:microsoft/suse-sles-15-sp3-chost-byos-v20230613-x86_64
+ chost:microsoft/suse-sles-15-sp3-chost-byos-v20240807-x86_64
+ chost:microsoft/suse-sles-15-sp3-chost-byos-v20240912-x86_64
+ chost:microsoft/suse-sles-15-sp4-chost-byos-v20220718-x86_64
+ chost:microsoft/suse-sles-15-sp4-chost-byos-v20220721-x86_64
+ chost:microsoft/suse-sles-15-sp4-chost-byos-v20220819-x86_64
+ chost:microsoft/suse-sles-15-sp4-chost-byos-v20220916-x86_64
+ chost:microsoft/suse-sles-15-sp4-chost-byos-v20220923-x86_64
+ chost:microsoft/suse-sles-15-sp4-chost-byos-v20221018-x86_64
+ chost:microsoft/suse-sles-15-sp4-chost-byos-v20221118-x86_64
+ chost:microsoft/suse-sles-15-sp4-chost-byos-v20221215-arm64
+ chost:microsoft/suse-sles-15-sp4-chost-byos-v20221215-x86_64
+ chost:microsoft/suse-sles-15-sp4-chost-byos-v20230111-arm64
+ chost:microsoft/suse-sles-15-sp4-chost-byos-v20230111-x86_64
+ chost:microsoft/suse-sles-15-sp4-chost-byos-v20230210-arm64
+ chost:microsoft/suse-sles-15-sp4-chost-byos-v20230210-x86_64
+ chost:microsoft/suse-sles-15-sp4-chost-byos-v20230310-arm64
+ chost:microsoft/suse-sles-15-sp4-chost-byos-v20230310-x86_64
+ chost:microsoft/suse-sles-15-sp4-chost-byos-v20230410-arm64
+ chost:microsoft/suse-sles-15-sp4-chost-byos-v20230410-x86_64
+ chost:microsoft/suse-sles-15-sp4-chost-byos-v20230510-arm64
+ chost:microsoft/suse-sles-15-sp4-chost-byos-v20230510-x86_64
+ chost:microsoft/suse-sles-15-sp4-chost-byos-v20230606-arm64
+ chost:microsoft/suse-sles-15-sp4-chost-byos-v20230606-x86_64
+ chost:microsoft/suse-sles-15-sp4-chost-byos-v20230704-arm64
+ chost:microsoft/suse-sles-15-sp4-chost-byos-v20230704-x86_64
+ chost:microsoft/suse-sles-15-sp4-chost-byos-v20230803-arm64
+ chost:microsoft/suse-sles-15-sp4-chost-byos-v20230803-x86_64
+ chost:microsoft/suse-sles-15-sp4-chost-byos-v20230901-arm64
+ chost:microsoft/suse-sles-15-sp4-chost-byos-v20230901-x86_64
+ chost:microsoft/suse-sles-15-sp4-chost-byos-v20230928-arm64
+ chost:microsoft/suse-sles-15-sp4-chost-byos-v20230928-x86_64
+ chost:microsoft/suse-sles-15-sp4-chost-byos-v20231027-arm64
+ chost:microsoft/suse-sles-15-sp4-chost-byos-v20231027-x86_64
+ chost:microsoft/suse-sles-15-sp4-chost-byos-v20231127-arm64
+ chost:microsoft/suse-sles-15-sp4-chost-byos-v20231127-x86_64
+ chost:microsoft/suse-sles-15-sp4-chost-byos-v20231212-arm64
+ chost:microsoft/suse-sles-15-sp4-chost-byos-v20231212-x86_64
+ chost:microsoft/suse-sles-15-sp4-chost-byos-v20240312-arm64
+ chost:microsoft/suse-sles-15-sp4-chost-byos-v20240312-x86_64
+ chost:microsoft/suse-sles-15-sp4-chost-byos-v20240612-arm64
+ chost:microsoft/suse-sles-15-sp4-chost-byos-v20240612-x86_64
+ chost:microsoft/suse-sles-15-sp4-chost-byos-v20240809-arm64
+ chost:microsoft/suse-sles-15-sp4-chost-byos-v20240809-x86_64
+ chost:microsoft/suse-sles-15-sp4-chost-byos-v20240912-arm64
+ chost:microsoft/suse-sles-15-sp4-chost-byos-v20240912-x86_64
+
No V5 entry found for CVE-2024-42511 / /home/securitybot/prod/cve-database/cvelistV5/cves/2024/42xxxx/CVE-2024-42511.json:No such file or directory
skipping CVE-2024-42472 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-42415 as CVE page is older than CVRF-CVE file.
no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2024-42367
no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2024-42353
--- /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2024-42322.xml 2024-10-16 01:14:42.493530000 +0200
+++ /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2024-42322.xml.new 2024-10-29 01:14:27.795781000 +0100
@@ -14,13 +14,13 @@
1
- 29
- 2024-10-15T23:14:42Z
+ 30
+ 2024-10-29T00:14:27Z
current
2024-08-17T23:09:48Z
- 2024-10-15T23:14:42Z
+ 2024-10-29T00:14:27Z
cve-database/bin/generate-cvrf-cve.pl
2020-12-27T01:00:00Z
@@ -114,6 +114,21 @@
Image SLES12-SP5-Azure-SAP-BYOS
+
+
+ Image SLES12-SP5-GCE-BYOS
+
+
+
+
+ Image SLES12-SP5-GCE-SAP-BYOS
+
+
+
+
+ Image SLES12-SP5-GCE-SAP-On-Demand
+
+
Image SLES15-SP5-Azure-Basic
@@ -1709,6 +1724,39 @@
ocfs2-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-Azure-SAP-BYOS
+
+ kernel-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-BYOS
+
+
+ cluster-md-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ dlm-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ gfs2-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ kernel-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ ocfs2-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ cluster-md-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
+
+ dlm-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
+
+ gfs2-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
+
+ kernel-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
+
+ ocfs2-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
kernel-azure-5.14.21-150500.33.66.1 as a component of Image SLES15-SP5-Azure-Basic
@@ -3395,6 +3443,17 @@
Image SLES12-SP5-Azure-SAP-BYOS:gfs2-kmp-default-4.12.14-122.228.1
Image SLES12-SP5-Azure-SAP-BYOS:kernel-default-4.12.14-122.228.1
Image SLES12-SP5-Azure-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.228.1
+ Image SLES12-SP5-GCE-BYOS:kernel-default-4.12.14-122.228.1
+ Image SLES12-SP5-GCE-SAP-BYOS:cluster-md-kmp-default-4.12.14-122.228.1
+ Image SLES12-SP5-GCE-SAP-BYOS:dlm-kmp-default-4.12.14-122.228.1
+ Image SLES12-SP5-GCE-SAP-BYOS:gfs2-kmp-default-4.12.14-122.228.1
+ Image SLES12-SP5-GCE-SAP-BYOS:kernel-default-4.12.14-122.228.1
+ Image SLES12-SP5-GCE-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.228.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:cluster-md-kmp-default-4.12.14-122.228.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:dlm-kmp-default-4.12.14-122.228.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:gfs2-kmp-default-4.12.14-122.228.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:kernel-default-4.12.14-122.228.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:ocfs2-kmp-default-4.12.14-122.228.1
Image SLES15-SP5-Azure-Basic:kernel-azure-5.14.21-150500.33.66.1
Image SLES15-SP5-Azure-Standard:kernel-azure-5.14.21-150500.33.66.1
Image SLES15-SP5-CHOST-BYOS-Aliyun:kernel-default-5.14.21-150500.55.80.2
skipping CVE-2024-42321 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-42320 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-42319 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-42318 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-42317 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-42315 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-42314 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-42313 as CVE page is older than CVRF-CVE file.
--- /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2024-42312.xml 2024-10-16 01:14:46.956781000 +0200
+++ /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2024-42312.xml.new 2024-10-29 01:14:29.019398000 +0100
@@ -14,13 +14,13 @@
1
- 30
- 2024-10-15T23:14:46Z
+ 31
+ 2024-10-29T00:14:28Z
current
2024-08-17T23:09:50Z
- 2024-10-15T23:14:46Z
+ 2024-10-29T00:14:28Z
cve-database/bin/generate-cvrf-cve.pl
2020-12-27T01:00:00Z
@@ -115,6 +115,21 @@
Image SLES12-SP5-Azure-SAP-BYOS
+
+
+ Image SLES12-SP5-GCE-BYOS
+
+
+
+
+ Image SLES12-SP5-GCE-SAP-BYOS
+
+
+
+
+ Image SLES12-SP5-GCE-SAP-On-Demand
+
+
Image SLES15-SP5-Azure-Basic
@@ -1645,6 +1660,39 @@
ocfs2-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-Azure-SAP-BYOS
+
+ kernel-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-BYOS
+
+
+ cluster-md-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ dlm-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ gfs2-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ kernel-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ ocfs2-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ cluster-md-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
+
+ dlm-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
+
+ gfs2-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
+
+ kernel-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
+
+ ocfs2-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
kernel-azure-5.14.21-150500.33.66.1 as a component of Image SLES15-SP5-Azure-Basic
@@ -3276,6 +3324,17 @@
Image SLES12-SP5-Azure-SAP-BYOS:gfs2-kmp-default-4.12.14-122.228.1
Image SLES12-SP5-Azure-SAP-BYOS:kernel-default-4.12.14-122.228.1
Image SLES12-SP5-Azure-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.228.1
+ Image SLES12-SP5-GCE-BYOS:kernel-default-4.12.14-122.228.1
+ Image SLES12-SP5-GCE-SAP-BYOS:cluster-md-kmp-default-4.12.14-122.228.1
+ Image SLES12-SP5-GCE-SAP-BYOS:dlm-kmp-default-4.12.14-122.228.1
+ Image SLES12-SP5-GCE-SAP-BYOS:gfs2-kmp-default-4.12.14-122.228.1
+ Image SLES12-SP5-GCE-SAP-BYOS:kernel-default-4.12.14-122.228.1
+ Image SLES12-SP5-GCE-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.228.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:cluster-md-kmp-default-4.12.14-122.228.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:dlm-kmp-default-4.12.14-122.228.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:gfs2-kmp-default-4.12.14-122.228.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:kernel-default-4.12.14-122.228.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:ocfs2-kmp-default-4.12.14-122.228.1
Image SLES15-SP5-Azure-Basic:kernel-azure-5.14.21-150500.33.66.1
Image SLES15-SP5-Azure-Standard:kernel-azure-5.14.21-150500.33.66.1
Image SLES15-SP5-CHOST-BYOS-Aliyun:kernel-default-5.14.21-150500.55.80.2
skipping CVE-2024-42311 as CVE page is older than CVRF-CVE file.
--- /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2024-42310.xml 2024-10-16 01:14:48.809687000 +0200
+++ /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2024-42310.xml.new 2024-10-29 01:14:30.327187000 +0100
@@ -14,13 +14,13 @@
1
- 28
- 2024-10-15T23:14:48Z
+ 29
+ 2024-10-29T00:14:29Z
current
2024-08-17T23:09:51Z
- 2024-10-15T23:14:48Z
+ 2024-10-29T00:14:29Z
cve-database/bin/generate-cvrf-cve.pl
2020-12-27T01:00:00Z
@@ -110,6 +110,21 @@
Image SLES12-SP5-Azure-SAP-BYOS
+
+
+ Image SLES12-SP5-GCE-BYOS
+
+
+
+
+ Image SLES12-SP5-GCE-SAP-BYOS
+
+
+
+
+ Image SLES12-SP5-GCE-SAP-On-Demand
+
+
Image SLES15-SP5-Azure-Basic
@@ -1645,6 +1660,39 @@
ocfs2-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-Azure-SAP-BYOS
+
+ kernel-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-BYOS
+
+
+ cluster-md-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ dlm-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ gfs2-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ kernel-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ ocfs2-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ cluster-md-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
+
+ dlm-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
+
+ gfs2-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
+
+ kernel-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
+
+ ocfs2-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
kernel-azure-5.14.21-150500.33.66.1 as a component of Image SLES15-SP5-Azure-Basic
@@ -3265,6 +3313,17 @@
Image SLES12-SP5-Azure-SAP-BYOS:gfs2-kmp-default-4.12.14-122.228.1
Image SLES12-SP5-Azure-SAP-BYOS:kernel-default-4.12.14-122.228.1
Image SLES12-SP5-Azure-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.228.1
+ Image SLES12-SP5-GCE-BYOS:kernel-default-4.12.14-122.228.1
+ Image SLES12-SP5-GCE-SAP-BYOS:cluster-md-kmp-default-4.12.14-122.228.1
+ Image SLES12-SP5-GCE-SAP-BYOS:dlm-kmp-default-4.12.14-122.228.1
+ Image SLES12-SP5-GCE-SAP-BYOS:gfs2-kmp-default-4.12.14-122.228.1
+ Image SLES12-SP5-GCE-SAP-BYOS:kernel-default-4.12.14-122.228.1
+ Image SLES12-SP5-GCE-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.228.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:cluster-md-kmp-default-4.12.14-122.228.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:dlm-kmp-default-4.12.14-122.228.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:gfs2-kmp-default-4.12.14-122.228.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:kernel-default-4.12.14-122.228.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:ocfs2-kmp-default-4.12.14-122.228.1
Image SLES15-SP5-Azure-Basic:kernel-azure-5.14.21-150500.33.66.1
Image SLES15-SP5-Azure-Standard:kernel-azure-5.14.21-150500.33.66.1
Image SLES15-SP5-CHOST-BYOS-Aliyun:kernel-default-5.14.21-150500.55.80.2
--- /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2024-42309.xml 2024-10-16 01:14:49.734636000 +0200
+++ /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2024-42309.xml.new 2024-10-29 01:14:31.962064000 +0100
@@ -14,13 +14,13 @@
1
- 29
- 2024-10-15T23:14:49Z
+ 30
+ 2024-10-29T00:14:31Z
current
2024-08-17T23:09:51Z
- 2024-10-15T23:14:49Z
+ 2024-10-29T00:14:31Z
cve-database/bin/generate-cvrf-cve.pl
2020-12-27T01:00:00Z
@@ -110,6 +110,21 @@
Image SLES12-SP5-Azure-SAP-BYOS
+
+
+ Image SLES12-SP5-GCE-BYOS
+
+
+
+
+ Image SLES12-SP5-GCE-SAP-BYOS
+
+
+
+
+ Image SLES12-SP5-GCE-SAP-On-Demand
+
+
Image SLES15-SP5-Azure-Basic
@@ -1648,6 +1663,39 @@
ocfs2-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-Azure-SAP-BYOS
+
+ kernel-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-BYOS
+
+
+ cluster-md-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ dlm-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ gfs2-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ kernel-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ ocfs2-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ cluster-md-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
+
+ dlm-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
+
+ gfs2-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
+
+ kernel-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
+
+ ocfs2-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
kernel-azure-5.14.21-150500.33.66.1 as a component of Image SLES15-SP5-Azure-Basic
@@ -3292,6 +3340,17 @@
Image SLES12-SP5-Azure-SAP-BYOS:gfs2-kmp-default-4.12.14-122.228.1
Image SLES12-SP5-Azure-SAP-BYOS:kernel-default-4.12.14-122.228.1
Image SLES12-SP5-Azure-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.228.1
+ Image SLES12-SP5-GCE-BYOS:kernel-default-4.12.14-122.228.1
+ Image SLES12-SP5-GCE-SAP-BYOS:cluster-md-kmp-default-4.12.14-122.228.1
+ Image SLES12-SP5-GCE-SAP-BYOS:dlm-kmp-default-4.12.14-122.228.1
+ Image SLES12-SP5-GCE-SAP-BYOS:gfs2-kmp-default-4.12.14-122.228.1
+ Image SLES12-SP5-GCE-SAP-BYOS:kernel-default-4.12.14-122.228.1
+ Image SLES12-SP5-GCE-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.228.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:cluster-md-kmp-default-4.12.14-122.228.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:dlm-kmp-default-4.12.14-122.228.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:gfs2-kmp-default-4.12.14-122.228.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:kernel-default-4.12.14-122.228.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:ocfs2-kmp-default-4.12.14-122.228.1
Image SLES15-SP5-Azure-Basic:kernel-azure-5.14.21-150500.33.66.1
Image SLES15-SP5-Azure-Standard:kernel-azure-5.14.21-150500.33.66.1
Image SLES15-SP5-CHOST-BYOS-Aliyun:kernel-default-5.14.21-150500.55.80.2
skipping CVE-2024-42308 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-42307 as CVE page is older than CVRF-CVE file.
--- /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2024-42306.xml 2024-10-16 01:14:50.999609000 +0200
+++ /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2024-42306.xml.new 2024-10-29 01:14:32.760019000 +0100
@@ -14,13 +14,13 @@
1
- 12
- 2024-10-15T23:14:50Z
+ 13
+ 2024-10-29T00:14:32Z
current
2024-08-17T23:09:52Z
- 2024-10-15T23:14:50Z
+ 2024-10-29T00:14:32Z
cve-database/bin/generate-cvrf-cve.pl
2020-12-27T01:00:00Z
@@ -109,6 +109,21 @@
Container suse/sle-micro/rt-5.5:2.0.4-4.5.211
+
+
+ Image SLES12-SP5-GCE-BYOS
+
+
+
+
+ Image SLES12-SP5-GCE-SAP-BYOS
+
+
+
+
+ Image SLES12-SP5-GCE-SAP-On-Demand
+
+
Image SLES15-SP5-CHOST-BYOS-Aliyun
@@ -1542,6 +1557,39 @@
kernel-rt-5.14.21-150500.13.73.1 as a component of Container suse/sle-micro/rt-5.5:2.0.4-4.5.211
+
+ kernel-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-BYOS
+
+
+ cluster-md-kmp-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ dlm-kmp-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ gfs2-kmp-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ kernel-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ ocfs2-kmp-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ cluster-md-kmp-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
+
+ dlm-kmp-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
+
+ gfs2-kmp-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
+
+ kernel-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
+
+ ocfs2-kmp-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
kernel-default-5.14.21-150500.55.83.1 as a component of Image SLES15-SP5-CHOST-BYOS-Aliyun
@@ -3047,6 +3095,17 @@
Container suse/hpc/warewulf4-x86_64/sle-hpc-node:15.6.17.5.49:kernel-default-6.4.0-150600.23.25.1
Container suse/sle-micro/kvm-5.5:2.0.4-3.5.197:kernel-default-base-5.14.21-150500.55.83.1.150500.6.37.1
Container suse/sle-micro/rt-5.5:2.0.4-4.5.211:kernel-rt-5.14.21-150500.13.73.1
+ Image SLES12-SP5-GCE-BYOS:kernel-default-4.12.14-122.231.1
+ Image SLES12-SP5-GCE-SAP-BYOS:cluster-md-kmp-default-4.12.14-122.231.1
+ Image SLES12-SP5-GCE-SAP-BYOS:dlm-kmp-default-4.12.14-122.231.1
+ Image SLES12-SP5-GCE-SAP-BYOS:gfs2-kmp-default-4.12.14-122.231.1
+ Image SLES12-SP5-GCE-SAP-BYOS:kernel-default-4.12.14-122.231.1
+ Image SLES12-SP5-GCE-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.231.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:cluster-md-kmp-default-4.12.14-122.231.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:dlm-kmp-default-4.12.14-122.231.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:gfs2-kmp-default-4.12.14-122.231.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:kernel-default-4.12.14-122.231.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:ocfs2-kmp-default-4.12.14-122.231.1
Image SLES15-SP5-CHOST-BYOS-Aliyun:kernel-default-5.14.21-150500.55.83.1
Image SLES15-SP5-CHOST-BYOS-Azure:kernel-default-5.14.21-150500.55.83.1
Image SLES15-SP5-CHOST-BYOS-EC2:kernel-default-5.14.21-150500.55.83.1
--- /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2024-42305.xml 2024-10-16 01:14:51.804577000 +0200
+++ /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2024-42305.xml.new 2024-10-29 01:14:33.447066000 +0100
@@ -14,13 +14,13 @@
1
- 12
- 2024-10-15T23:14:51Z
+ 13
+ 2024-10-29T00:14:33Z
current
2024-08-17T23:09:52Z
- 2024-10-15T23:14:51Z
+ 2024-10-29T00:14:33Z
cve-database/bin/generate-cvrf-cve.pl
2020-12-27T01:00:00Z
@@ -152,6 +152,21 @@
Container suse/sle-micro/rt-5.5:2.0.4-4.5.211
+
+
+ Image SLES12-SP5-GCE-BYOS
+
+
+
+
+ Image SLES12-SP5-GCE-SAP-BYOS
+
+
+
+
+ Image SLES12-SP5-GCE-SAP-On-Demand
+
+
Image SLES15-SP5-CHOST-BYOS-Aliyun
@@ -1585,6 +1600,39 @@
kernel-rt-5.14.21-150500.13.73.1 as a component of Container suse/sle-micro/rt-5.5:2.0.4-4.5.211
+
+ kernel-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-BYOS
+
+
+ cluster-md-kmp-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ dlm-kmp-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ gfs2-kmp-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ kernel-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ ocfs2-kmp-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ cluster-md-kmp-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
+
+ dlm-kmp-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
+
+ gfs2-kmp-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
+
+ kernel-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
+
+ ocfs2-kmp-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
kernel-default-5.14.21-150500.55.83.1 as a component of Image SLES15-SP5-CHOST-BYOS-Aliyun
@@ -3133,6 +3181,17 @@
Container suse/hpc/warewulf4-x86_64/sle-hpc-node:15.6.17.5.49:kernel-default-6.4.0-150600.23.25.1
Container suse/sle-micro/kvm-5.5:2.0.4-3.5.197:kernel-default-base-5.14.21-150500.55.83.1.150500.6.37.1
Container suse/sle-micro/rt-5.5:2.0.4-4.5.211:kernel-rt-5.14.21-150500.13.73.1
+ Image SLES12-SP5-GCE-BYOS:kernel-default-4.12.14-122.231.1
+ Image SLES12-SP5-GCE-SAP-BYOS:cluster-md-kmp-default-4.12.14-122.231.1
+ Image SLES12-SP5-GCE-SAP-BYOS:dlm-kmp-default-4.12.14-122.231.1
+ Image SLES12-SP5-GCE-SAP-BYOS:gfs2-kmp-default-4.12.14-122.231.1
+ Image SLES12-SP5-GCE-SAP-BYOS:kernel-default-4.12.14-122.231.1
+ Image SLES12-SP5-GCE-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.231.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:cluster-md-kmp-default-4.12.14-122.231.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:dlm-kmp-default-4.12.14-122.231.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:gfs2-kmp-default-4.12.14-122.231.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:kernel-default-4.12.14-122.231.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:ocfs2-kmp-default-4.12.14-122.231.1
Image SLES15-SP5-CHOST-BYOS-Aliyun:kernel-default-5.14.21-150500.55.83.1
Image SLES15-SP5-CHOST-BYOS-Azure:kernel-default-5.14.21-150500.55.83.1
Image SLES15-SP5-CHOST-BYOS-EC2:kernel-default-5.14.21-150500.55.83.1
no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2024-42301
skipping CVE-2024-42304 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-42303 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-42302 as CVE page is older than CVRF-CVE file.
--- /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2024-42301.xml 2024-10-20 01:13:49.323049000 +0200
+++ /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2024-42301.xml.new 2024-10-29 01:14:34.171978000 +0100
@@ -14,13 +14,13 @@
1
- 31
- 2024-10-19T23:13:48Z
+ 32
+ 2024-10-29T00:14:33Z
current
2024-08-17T23:09:53Z
- 2024-10-19T23:13:48Z
+ 2024-10-29T00:14:33Z
cve-database/bin/generate-cvrf-cve.pl
2020-12-27T01:00:00Z
@@ -145,6 +145,21 @@
Image SLES12-SP5-Azure-SAP-BYOS
+
+
+ Image SLES12-SP5-GCE-BYOS
+
+
+
+
+ Image SLES12-SP5-GCE-SAP-BYOS
+
+
+
+
+ Image SLES12-SP5-GCE-SAP-On-Demand
+
+
Image SLES15-SP4-SAP-Azure-LI-BYOS
@@ -1780,6 +1795,39 @@
ocfs2-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-Azure-SAP-BYOS
+
+ kernel-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-BYOS
+
+
+ cluster-md-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ dlm-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ gfs2-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ kernel-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ ocfs2-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ cluster-md-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
+
+ dlm-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
+
+ gfs2-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
+
+ kernel-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
+
+ ocfs2-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
cluster-md-kmp-default-5.14.21-150400.24.136.1 as a component of Image SLES15-SP4-SAP-Azure-LI-BYOS
@@ -3632,6 +3680,17 @@
Image SLES12-SP5-Azure-SAP-BYOS:gfs2-kmp-default-4.12.14-122.228.1
Image SLES12-SP5-Azure-SAP-BYOS:kernel-default-4.12.14-122.228.1
Image SLES12-SP5-Azure-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.228.1
+ Image SLES12-SP5-GCE-BYOS:kernel-default-4.12.14-122.228.1
+ Image SLES12-SP5-GCE-SAP-BYOS:cluster-md-kmp-default-4.12.14-122.228.1
+ Image SLES12-SP5-GCE-SAP-BYOS:dlm-kmp-default-4.12.14-122.228.1
+ Image SLES12-SP5-GCE-SAP-BYOS:gfs2-kmp-default-4.12.14-122.228.1
+ Image SLES12-SP5-GCE-SAP-BYOS:kernel-default-4.12.14-122.228.1
+ Image SLES12-SP5-GCE-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.228.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:cluster-md-kmp-default-4.12.14-122.228.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:dlm-kmp-default-4.12.14-122.228.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:gfs2-kmp-default-4.12.14-122.228.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:kernel-default-4.12.14-122.228.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:ocfs2-kmp-default-4.12.14-122.228.1
Image SLES15-SP4-SAP-Azure-LI-BYOS:cluster-md-kmp-default-5.14.21-150400.24.136.1
Image SLES15-SP4-SAP-Azure-LI-BYOS:dlm-kmp-default-5.14.21-150400.24.136.1
Image SLES15-SP4-SAP-Azure-LI-BYOS:gfs2-kmp-default-5.14.21-150400.24.136.1
skipping CVE-2024-42300 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-42299 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-42298 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-42297 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-42296 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-42295 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-42294 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-42293 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-42292 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-42291 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-42290 as CVE page is older than CVRF-CVE file.
--- /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2024-42289.xml 2024-10-22 01:18:59.565795000 +0200
+++ /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2024-42289.xml.new 2024-10-29 01:14:34.914934000 +0100
@@ -14,13 +14,13 @@
1
- 25
- 2024-10-21T23:18:59Z
+ 26
+ 2024-10-29T00:14:34Z
current
2024-08-17T23:09:56Z
- 2024-10-21T23:18:59Z
+ 2024-10-29T00:14:34Z
cve-database/bin/generate-cvrf-cve.pl
2020-12-27T01:00:00Z
@@ -148,6 +148,21 @@
Image SLES12-SP5-Azure-SAP-BYOS
+
+
+ Image SLES12-SP5-GCE-BYOS
+
+
+
+
+ Image SLES12-SP5-GCE-SAP-BYOS
+
+
+
+
+ Image SLES12-SP5-GCE-SAP-On-Demand
+
+
Image SLES15-SP5-Azure-Basic
@@ -1612,6 +1627,39 @@
ocfs2-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-Azure-SAP-BYOS
+
+ kernel-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-BYOS
+
+
+ cluster-md-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ dlm-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ gfs2-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ kernel-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ ocfs2-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ cluster-md-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
+
+ dlm-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
+
+ gfs2-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
+
+ kernel-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
+
+ ocfs2-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
kernel-azure-5.14.21-150500.33.66.1 as a component of Image SLES15-SP5-Azure-Basic
@@ -3099,6 +3147,17 @@
Image SLES12-SP5-Azure-SAP-BYOS:gfs2-kmp-default-4.12.14-122.228.1
Image SLES12-SP5-Azure-SAP-BYOS:kernel-default-4.12.14-122.228.1
Image SLES12-SP5-Azure-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.228.1
+ Image SLES12-SP5-GCE-BYOS:kernel-default-4.12.14-122.228.1
+ Image SLES12-SP5-GCE-SAP-BYOS:cluster-md-kmp-default-4.12.14-122.228.1
+ Image SLES12-SP5-GCE-SAP-BYOS:dlm-kmp-default-4.12.14-122.228.1
+ Image SLES12-SP5-GCE-SAP-BYOS:gfs2-kmp-default-4.12.14-122.228.1
+ Image SLES12-SP5-GCE-SAP-BYOS:kernel-default-4.12.14-122.228.1
+ Image SLES12-SP5-GCE-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.228.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:cluster-md-kmp-default-4.12.14-122.228.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:dlm-kmp-default-4.12.14-122.228.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:gfs2-kmp-default-4.12.14-122.228.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:kernel-default-4.12.14-122.228.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:ocfs2-kmp-default-4.12.14-122.228.1
Image SLES15-SP5-Azure-Basic:kernel-azure-5.14.21-150500.33.66.1
Image SLES15-SP5-Azure-Standard:kernel-azure-5.14.21-150500.33.66.1
Image SLES15-SP5-CHOST-BYOS-Aliyun:kernel-default-5.14.21-150500.55.80.2
--- /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2024-42288.xml 2024-10-22 01:19:00.571763000 +0200
+++ /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2024-42288.xml.new 2024-10-29 01:14:35.822857000 +0100
@@ -14,13 +14,13 @@
1
- 26
- 2024-10-21T23:18:59Z
+ 27
+ 2024-10-29T00:14:35Z
current
2024-08-17T23:09:57Z
- 2024-10-21T23:18:59Z
+ 2024-10-29T00:14:35Z
cve-database/bin/generate-cvrf-cve.pl
2020-12-27T01:00:00Z
@@ -108,6 +108,21 @@
Image SLES12-SP5-Azure-SAP-BYOS
+
+
+ Image SLES12-SP5-GCE-BYOS
+
+
+
+
+ Image SLES12-SP5-GCE-SAP-BYOS
+
+
+
+
+ Image SLES12-SP5-GCE-SAP-On-Demand
+
+
Image SLES15-SP5-Azure-Basic
@@ -1572,6 +1587,39 @@
ocfs2-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-Azure-SAP-BYOS
+
+ kernel-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-BYOS
+
+
+ cluster-md-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ dlm-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ gfs2-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ kernel-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ ocfs2-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ cluster-md-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
+
+ dlm-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
+
+ gfs2-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
+
+ kernel-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
+
+ ocfs2-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
kernel-azure-5.14.21-150500.33.66.1 as a component of Image SLES15-SP5-Azure-Basic
@@ -3007,6 +3055,17 @@
Image SLES12-SP5-Azure-SAP-BYOS:gfs2-kmp-default-4.12.14-122.228.1
Image SLES12-SP5-Azure-SAP-BYOS:kernel-default-4.12.14-122.228.1
Image SLES12-SP5-Azure-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.228.1
+ Image SLES12-SP5-GCE-BYOS:kernel-default-4.12.14-122.228.1
+ Image SLES12-SP5-GCE-SAP-BYOS:cluster-md-kmp-default-4.12.14-122.228.1
+ Image SLES12-SP5-GCE-SAP-BYOS:dlm-kmp-default-4.12.14-122.228.1
+ Image SLES12-SP5-GCE-SAP-BYOS:gfs2-kmp-default-4.12.14-122.228.1
+ Image SLES12-SP5-GCE-SAP-BYOS:kernel-default-4.12.14-122.228.1
+ Image SLES12-SP5-GCE-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.228.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:cluster-md-kmp-default-4.12.14-122.228.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:dlm-kmp-default-4.12.14-122.228.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:gfs2-kmp-default-4.12.14-122.228.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:kernel-default-4.12.14-122.228.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:ocfs2-kmp-default-4.12.14-122.228.1
Image SLES15-SP5-Azure-Basic:kernel-azure-5.14.21-150500.33.66.1
Image SLES15-SP5-Azure-Standard:kernel-azure-5.14.21-150500.33.66.1
Image SLES15-SP5-CHOST-BYOS-Aliyun:kernel-default-5.14.21-150500.55.80.2
--- /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2024-42287.xml 2024-10-22 01:19:01.520711000 +0200
+++ /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2024-42287.xml.new 2024-10-29 01:14:36.578096000 +0100
@@ -14,13 +14,13 @@
1
- 25
- 2024-10-21T23:19:00Z
+ 26
+ 2024-10-29T00:14:36Z
current
2024-08-17T23:09:57Z
- 2024-10-21T23:19:00Z
+ 2024-10-29T00:14:36Z
cve-database/bin/generate-cvrf-cve.pl
2020-12-27T01:00:00Z
@@ -147,6 +147,21 @@
Image SLES12-SP5-Azure-SAP-BYOS
+
+
+ Image SLES12-SP5-GCE-BYOS
+
+
+
+
+ Image SLES12-SP5-GCE-SAP-BYOS
+
+
+
+
+ Image SLES12-SP5-GCE-SAP-On-Demand
+
+
Image SLES15-SP5-Azure-Basic
@@ -1614,6 +1629,39 @@
ocfs2-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-Azure-SAP-BYOS
+
+ kernel-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-BYOS
+
+
+ cluster-md-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ dlm-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ gfs2-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ kernel-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ ocfs2-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ cluster-md-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
+
+ dlm-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
+
+ gfs2-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
+
+ kernel-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
+
+ ocfs2-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
kernel-azure-5.14.21-150500.33.66.1 as a component of Image SLES15-SP5-Azure-Basic
@@ -3112,6 +3160,17 @@
Image SLES12-SP5-Azure-SAP-BYOS:gfs2-kmp-default-4.12.14-122.228.1
Image SLES12-SP5-Azure-SAP-BYOS:kernel-default-4.12.14-122.228.1
Image SLES12-SP5-Azure-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.228.1
+ Image SLES12-SP5-GCE-BYOS:kernel-default-4.12.14-122.228.1
+ Image SLES12-SP5-GCE-SAP-BYOS:cluster-md-kmp-default-4.12.14-122.228.1
+ Image SLES12-SP5-GCE-SAP-BYOS:dlm-kmp-default-4.12.14-122.228.1
+ Image SLES12-SP5-GCE-SAP-BYOS:gfs2-kmp-default-4.12.14-122.228.1
+ Image SLES12-SP5-GCE-SAP-BYOS:kernel-default-4.12.14-122.228.1
+ Image SLES12-SP5-GCE-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.228.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:cluster-md-kmp-default-4.12.14-122.228.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:dlm-kmp-default-4.12.14-122.228.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:gfs2-kmp-default-4.12.14-122.228.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:kernel-default-4.12.14-122.228.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:ocfs2-kmp-default-4.12.14-122.228.1
Image SLES15-SP5-Azure-Basic:kernel-azure-5.14.21-150500.33.66.1
Image SLES15-SP5-Azure-Standard:kernel-azure-5.14.21-150500.33.66.1
Image SLES15-SP5-CHOST-BYOS-Aliyun:kernel-default-5.14.21-150500.55.80.2
--- /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2024-42286.xml 2024-10-22 01:19:02.398161000 +0200
+++ /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2024-42286.xml.new 2024-10-29 01:14:37.301779000 +0100
@@ -14,13 +14,13 @@
1
- 25
- 2024-10-21T23:19:01Z
+ 26
+ 2024-10-29T00:14:36Z
current
2024-08-17T23:09:57Z
- 2024-10-21T23:19:01Z
+ 2024-10-29T00:14:36Z
cve-database/bin/generate-cvrf-cve.pl
2020-12-27T01:00:00Z
@@ -133,6 +133,21 @@
Image SLES12-SP5-Azure-SAP-BYOS
+
+
+ Image SLES12-SP5-GCE-BYOS
+
+
+
+
+ Image SLES12-SP5-GCE-SAP-BYOS
+
+
+
+
+ Image SLES12-SP5-GCE-SAP-On-Demand
+
+
Image SLES15-SP5-Azure-Basic
@@ -1597,6 +1612,39 @@
ocfs2-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-Azure-SAP-BYOS
+
+ kernel-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-BYOS
+
+
+ cluster-md-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ dlm-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ gfs2-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ kernel-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ ocfs2-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ cluster-md-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
+
+ dlm-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
+
+ gfs2-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
+
+ kernel-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
+
+ ocfs2-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
kernel-azure-5.14.21-150500.33.66.1 as a component of Image SLES15-SP5-Azure-Basic
@@ -3069,6 +3117,17 @@
Image SLES12-SP5-Azure-SAP-BYOS:gfs2-kmp-default-4.12.14-122.228.1
Image SLES12-SP5-Azure-SAP-BYOS:kernel-default-4.12.14-122.228.1
Image SLES12-SP5-Azure-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.228.1
+ Image SLES12-SP5-GCE-BYOS:kernel-default-4.12.14-122.228.1
+ Image SLES12-SP5-GCE-SAP-BYOS:cluster-md-kmp-default-4.12.14-122.228.1
+ Image SLES12-SP5-GCE-SAP-BYOS:dlm-kmp-default-4.12.14-122.228.1
+ Image SLES12-SP5-GCE-SAP-BYOS:gfs2-kmp-default-4.12.14-122.228.1
+ Image SLES12-SP5-GCE-SAP-BYOS:kernel-default-4.12.14-122.228.1
+ Image SLES12-SP5-GCE-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.228.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:cluster-md-kmp-default-4.12.14-122.228.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:dlm-kmp-default-4.12.14-122.228.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:gfs2-kmp-default-4.12.14-122.228.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:kernel-default-4.12.14-122.228.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:ocfs2-kmp-default-4.12.14-122.228.1
Image SLES15-SP5-Azure-Basic:kernel-azure-5.14.21-150500.33.66.1
Image SLES15-SP5-Azure-Standard:kernel-azure-5.14.21-150500.33.66.1
Image SLES15-SP5-CHOST-BYOS-Aliyun:kernel-default-5.14.21-150500.55.80.2
--- /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2024-42285.xml 2024-10-16 01:15:01.763497000 +0200
+++ /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2024-42285.xml.new 2024-10-29 01:14:38.045761000 +0100
@@ -14,13 +14,13 @@
1
- 28
- 2024-10-15T23:15:01Z
+ 29
+ 2024-10-29T00:14:37Z
current
2024-08-17T23:09:57Z
- 2024-10-15T23:15:01Z
+ 2024-10-29T00:14:37Z
cve-database/bin/generate-cvrf-cve.pl
2020-12-27T01:00:00Z
@@ -117,6 +117,21 @@
Image SLES12-SP5-Azure-SAP-BYOS
+
+
+ Image SLES12-SP5-GCE-BYOS
+
+
+
+
+ Image SLES12-SP5-GCE-SAP-BYOS
+
+
+
+
+ Image SLES12-SP5-GCE-SAP-On-Demand
+
+
Image SLES15-SP5-Azure-Basic
@@ -1655,6 +1670,39 @@
ocfs2-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-Azure-SAP-BYOS
+
+ kernel-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-BYOS
+
+
+ cluster-md-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ dlm-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ gfs2-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ kernel-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ ocfs2-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ cluster-md-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
+
+ dlm-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
+
+ gfs2-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
+
+ kernel-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
+
+ ocfs2-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
kernel-azure-5.14.21-150500.33.66.1 as a component of Image SLES15-SP5-Azure-Basic
@@ -3306,6 +3354,17 @@
Image SLES12-SP5-Azure-SAP-BYOS:gfs2-kmp-default-4.12.14-122.228.1
Image SLES12-SP5-Azure-SAP-BYOS:kernel-default-4.12.14-122.228.1
Image SLES12-SP5-Azure-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.228.1
+ Image SLES12-SP5-GCE-BYOS:kernel-default-4.12.14-122.228.1
+ Image SLES12-SP5-GCE-SAP-BYOS:cluster-md-kmp-default-4.12.14-122.228.1
+ Image SLES12-SP5-GCE-SAP-BYOS:dlm-kmp-default-4.12.14-122.228.1
+ Image SLES12-SP5-GCE-SAP-BYOS:gfs2-kmp-default-4.12.14-122.228.1
+ Image SLES12-SP5-GCE-SAP-BYOS:kernel-default-4.12.14-122.228.1
+ Image SLES12-SP5-GCE-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.228.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:cluster-md-kmp-default-4.12.14-122.228.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:dlm-kmp-default-4.12.14-122.228.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:gfs2-kmp-default-4.12.14-122.228.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:kernel-default-4.12.14-122.228.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:ocfs2-kmp-default-4.12.14-122.228.1
Image SLES15-SP5-Azure-Basic:kernel-azure-5.14.21-150500.33.66.1
Image SLES15-SP5-Azure-Standard:kernel-azure-5.14.21-150500.33.66.1
Image SLES15-SP5-CHOST-BYOS-Aliyun:kernel-default-5.14.21-150500.55.80.2
--- /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2024-42284.xml 2024-10-18 01:13:48.829631000 +0200
+++ /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2024-42284.xml.new 2024-10-29 01:14:38.715312000 +0100
@@ -14,13 +14,13 @@
1
- 30
- 2024-10-17T23:13:48Z
+ 31
+ 2024-10-29T00:14:38Z
current
2024-08-17T23:09:58Z
- 2024-10-17T23:13:48Z
+ 2024-10-29T00:14:38Z
cve-database/bin/generate-cvrf-cve.pl
2020-12-27T01:00:00Z
@@ -115,6 +115,21 @@
Image SLES12-SP5-Azure-SAP-BYOS
+
+
+ Image SLES12-SP5-GCE-BYOS
+
+
+
+
+ Image SLES12-SP5-GCE-SAP-BYOS
+
+
+
+
+ Image SLES12-SP5-GCE-SAP-On-Demand
+
+
Image SLES15-SP5-Azure-Basic
@@ -1737,6 +1752,39 @@
ocfs2-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-Azure-SAP-BYOS
+
+ kernel-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-BYOS
+
+
+ cluster-md-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ dlm-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ gfs2-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ kernel-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ ocfs2-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ cluster-md-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
+
+ dlm-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
+
+ gfs2-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
+
+ kernel-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
+
+ ocfs2-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
kernel-azure-5.14.21-150500.33.66.1 as a component of Image SLES15-SP5-Azure-Basic
@@ -3451,6 +3499,17 @@
Image SLES12-SP5-Azure-SAP-BYOS:gfs2-kmp-default-4.12.14-122.228.1
Image SLES12-SP5-Azure-SAP-BYOS:kernel-default-4.12.14-122.228.1
Image SLES12-SP5-Azure-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.228.1
+ Image SLES12-SP5-GCE-BYOS:kernel-default-4.12.14-122.228.1
+ Image SLES12-SP5-GCE-SAP-BYOS:cluster-md-kmp-default-4.12.14-122.228.1
+ Image SLES12-SP5-GCE-SAP-BYOS:dlm-kmp-default-4.12.14-122.228.1
+ Image SLES12-SP5-GCE-SAP-BYOS:gfs2-kmp-default-4.12.14-122.228.1
+ Image SLES12-SP5-GCE-SAP-BYOS:kernel-default-4.12.14-122.228.1
+ Image SLES12-SP5-GCE-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.228.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:cluster-md-kmp-default-4.12.14-122.228.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:dlm-kmp-default-4.12.14-122.228.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:gfs2-kmp-default-4.12.14-122.228.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:kernel-default-4.12.14-122.228.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:ocfs2-kmp-default-4.12.14-122.228.1
Image SLES15-SP5-Azure-Basic:kernel-azure-5.14.21-150500.33.66.1
Image SLES15-SP5-Azure-Standard:kernel-azure-5.14.21-150500.33.66.1
Image SLES15-SP5-CHOST-BYOS-Aliyun:kernel-default-5.14.21-150500.55.80.2
skipping CVE-2024-42283 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-42282 as CVE page is older than CVRF-CVE file.
--- /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2024-42281.xml 2024-10-16 01:15:04.962847000 +0200
+++ /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2024-42281.xml.new 2024-10-29 01:14:40.224156000 +0100
@@ -14,13 +14,13 @@
1
- 29
- 2024-10-15T23:15:04Z
+ 30
+ 2024-10-29T00:14:39Z
current
2024-08-17T23:09:58Z
- 2024-10-15T23:15:04Z
+ 2024-10-29T00:14:39Z
cve-database/bin/generate-cvrf-cve.pl
2020-12-27T01:00:00Z
@@ -109,6 +109,21 @@
Image SLES12-SP5-Azure-SAP-BYOS
+
+
+ Image SLES12-SP5-GCE-BYOS
+
+
+
+
+ Image SLES12-SP5-GCE-SAP-BYOS
+
+
+
+
+ Image SLES12-SP5-GCE-SAP-On-Demand
+
+
Image SLES15-SP5-Azure-Basic
@@ -1639,6 +1654,39 @@
ocfs2-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-Azure-SAP-BYOS
+
+ kernel-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-BYOS
+
+
+ cluster-md-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ dlm-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ gfs2-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ kernel-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ ocfs2-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ cluster-md-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
+
+ dlm-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
+
+ gfs2-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
+
+ kernel-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
+
+ ocfs2-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
kernel-azure-5.14.21-150500.33.66.1 as a component of Image SLES15-SP5-Azure-Basic
@@ -3264,6 +3312,17 @@
Image SLES12-SP5-Azure-SAP-BYOS:gfs2-kmp-default-4.12.14-122.228.1
Image SLES12-SP5-Azure-SAP-BYOS:kernel-default-4.12.14-122.228.1
Image SLES12-SP5-Azure-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.228.1
+ Image SLES12-SP5-GCE-BYOS:kernel-default-4.12.14-122.228.1
+ Image SLES12-SP5-GCE-SAP-BYOS:cluster-md-kmp-default-4.12.14-122.228.1
+ Image SLES12-SP5-GCE-SAP-BYOS:dlm-kmp-default-4.12.14-122.228.1
+ Image SLES12-SP5-GCE-SAP-BYOS:gfs2-kmp-default-4.12.14-122.228.1
+ Image SLES12-SP5-GCE-SAP-BYOS:kernel-default-4.12.14-122.228.1
+ Image SLES12-SP5-GCE-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.228.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:cluster-md-kmp-default-4.12.14-122.228.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:dlm-kmp-default-4.12.14-122.228.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:gfs2-kmp-default-4.12.14-122.228.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:kernel-default-4.12.14-122.228.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:ocfs2-kmp-default-4.12.14-122.228.1
Image SLES15-SP5-Azure-Basic:kernel-azure-5.14.21-150500.33.66.1
Image SLES15-SP5-Azure-Standard:kernel-azure-5.14.21-150500.33.66.1
Image SLES15-SP5-CHOST-BYOS-Aliyun:kernel-default-5.14.21-150500.55.80.2
--- /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2024-42280.xml 2024-10-16 01:15:05.787815000 +0200
+++ /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2024-42280.xml.new 2024-10-29 01:14:40.963213000 +0100
@@ -14,13 +14,13 @@
1
- 28
- 2024-10-15T23:15:05Z
+ 29
+ 2024-10-29T00:14:40Z
current
2024-08-17T23:09:59Z
- 2024-10-15T23:15:05Z
+ 2024-10-29T00:14:40Z
cve-database/bin/generate-cvrf-cve.pl
2020-12-27T01:00:00Z
@@ -108,6 +108,21 @@
Image SLES12-SP5-Azure-SAP-BYOS
+
+
+ Image SLES12-SP5-GCE-BYOS
+
+
+
+
+ Image SLES12-SP5-GCE-SAP-BYOS
+
+
+
+
+ Image SLES12-SP5-GCE-SAP-On-Demand
+
+
Image SLES15-SP5-Azure-Basic
@@ -1646,6 +1661,39 @@
ocfs2-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-Azure-SAP-BYOS
+
+ kernel-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-BYOS
+
+
+ cluster-md-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ dlm-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ gfs2-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ kernel-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ ocfs2-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ cluster-md-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
+
+ dlm-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
+
+ gfs2-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
+
+ kernel-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
+
+ ocfs2-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
kernel-azure-5.14.21-150500.33.66.1 as a component of Image SLES15-SP5-Azure-Basic
@@ -3288,6 +3336,17 @@
Image SLES12-SP5-Azure-SAP-BYOS:gfs2-kmp-default-4.12.14-122.228.1
Image SLES12-SP5-Azure-SAP-BYOS:kernel-default-4.12.14-122.228.1
Image SLES12-SP5-Azure-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.228.1
+ Image SLES12-SP5-GCE-BYOS:kernel-default-4.12.14-122.228.1
+ Image SLES12-SP5-GCE-SAP-BYOS:cluster-md-kmp-default-4.12.14-122.228.1
+ Image SLES12-SP5-GCE-SAP-BYOS:dlm-kmp-default-4.12.14-122.228.1
+ Image SLES12-SP5-GCE-SAP-BYOS:gfs2-kmp-default-4.12.14-122.228.1
+ Image SLES12-SP5-GCE-SAP-BYOS:kernel-default-4.12.14-122.228.1
+ Image SLES12-SP5-GCE-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.228.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:cluster-md-kmp-default-4.12.14-122.228.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:dlm-kmp-default-4.12.14-122.228.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:gfs2-kmp-default-4.12.14-122.228.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:kernel-default-4.12.14-122.228.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:ocfs2-kmp-default-4.12.14-122.228.1
Image SLES15-SP5-Azure-Basic:kernel-azure-5.14.21-150500.33.66.1
Image SLES15-SP5-Azure-Standard:kernel-azure-5.14.21-150500.33.66.1
Image SLES15-SP5-CHOST-BYOS-Aliyun:kernel-default-5.14.21-150500.55.80.2
no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2024-42271
skipping CVE-2024-42279 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-42278 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-42277 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-42276 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-42275 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-42274 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-42273 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-42272 as CVE page is older than CVRF-CVE file.
--- /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2024-42271.xml 2024-10-20 01:14:01.405933000 +0200
+++ /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2024-42271.xml.new 2024-10-29 01:14:41.891119000 +0100
@@ -14,13 +14,13 @@
1
- 29
- 2024-10-19T23:14:00Z
+ 30
+ 2024-10-29T00:14:41Z
current
2024-08-17T23:10:01Z
- 2024-10-19T23:14:00Z
+ 2024-10-29T00:14:41Z
cve-database/bin/generate-cvrf-cve.pl
2020-12-27T01:00:00Z
@@ -178,6 +178,21 @@
Image SLES12-SP5-Azure-SAP-BYOS
+
+
+ Image SLES12-SP5-GCE-BYOS
+
+
+
+
+ Image SLES12-SP5-GCE-SAP-BYOS
+
+
+
+
+ Image SLES12-SP5-GCE-SAP-On-Demand
+
+
Image SLES15-SP4-SAP-Azure-LI-BYOS
@@ -1978,6 +1993,39 @@
ocfs2-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-Azure-SAP-BYOS
+
+ kernel-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-BYOS
+
+
+ cluster-md-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ dlm-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ gfs2-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ kernel-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ ocfs2-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ cluster-md-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
+
+ dlm-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
+
+ gfs2-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
+
+ kernel-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
+
+ ocfs2-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
cluster-md-kmp-default-5.14.21-150400.24.133.2 as a component of Image SLES15-SP4-SAP-Azure-LI-BYOS
@@ -4111,6 +4159,17 @@
Image SLES12-SP5-Azure-SAP-BYOS:gfs2-kmp-default-4.12.14-122.228.1
Image SLES12-SP5-Azure-SAP-BYOS:kernel-default-4.12.14-122.228.1
Image SLES12-SP5-Azure-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.228.1
+ Image SLES12-SP5-GCE-BYOS:kernel-default-4.12.14-122.228.1
+ Image SLES12-SP5-GCE-SAP-BYOS:cluster-md-kmp-default-4.12.14-122.228.1
+ Image SLES12-SP5-GCE-SAP-BYOS:dlm-kmp-default-4.12.14-122.228.1
+ Image SLES12-SP5-GCE-SAP-BYOS:gfs2-kmp-default-4.12.14-122.228.1
+ Image SLES12-SP5-GCE-SAP-BYOS:kernel-default-4.12.14-122.228.1
+ Image SLES12-SP5-GCE-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.228.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:cluster-md-kmp-default-4.12.14-122.228.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:dlm-kmp-default-4.12.14-122.228.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:gfs2-kmp-default-4.12.14-122.228.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:kernel-default-4.12.14-122.228.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:ocfs2-kmp-default-4.12.14-122.228.1
Image SLES15-SP4-SAP-Azure-LI-BYOS:cluster-md-kmp-default-5.14.21-150400.24.133.2
Image SLES15-SP4-SAP-Azure-LI-BYOS:dlm-kmp-default-5.14.21-150400.24.133.2
Image SLES15-SP4-SAP-Azure-LI-BYOS:gfs2-kmp-default-5.14.21-150400.24.133.2
skipping CVE-2024-42270 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-42269 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-42267 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-42266 as CVE page is older than CVRF-CVE file.
--- /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2024-42265.xml 2024-10-22 01:19:18.402821000 +0200
+++ /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2024-42265.xml.new 2024-10-29 01:14:43.574967000 +0100
@@ -14,13 +14,13 @@
1
- 13
- 2024-10-21T23:19:17Z
+ 14
+ 2024-10-29T00:14:42Z
current
2024-08-17T23:10:02Z
- 2024-10-21T23:19:17Z
+ 2024-10-29T00:14:42Z
cve-database/bin/generate-cvrf-cve.pl
2020-12-27T01:00:00Z
@@ -113,6 +113,21 @@
Container suse/sle-micro/rt-5.5:2.0.4-4.5.211
+
+
+ Image SLES12-SP5-GCE-BYOS
+
+
+
+
+ Image SLES12-SP5-GCE-SAP-BYOS
+
+
+
+
+ Image SLES12-SP5-GCE-SAP-On-Demand
+
+
Image SLES15-SP5-CHOST-BYOS-Aliyun
@@ -1593,6 +1608,39 @@
kernel-rt-5.14.21-150500.13.73.1 as a component of Container suse/sle-micro/rt-5.5:2.0.4-4.5.211
+
+ kernel-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-BYOS
+
+
+ cluster-md-kmp-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ dlm-kmp-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ gfs2-kmp-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ kernel-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ ocfs2-kmp-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ cluster-md-kmp-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
+
+ dlm-kmp-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
+
+ gfs2-kmp-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
+
+ kernel-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
+
+ ocfs2-kmp-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
kernel-default-5.14.21-150500.55.83.1 as a component of Image SLES15-SP5-CHOST-BYOS-Aliyun
@@ -3107,6 +3155,17 @@
Container suse/hpc/warewulf4-x86_64/sle-hpc-node:15.6.17.5.49:kernel-default-6.4.0-150600.23.25.1
Container suse/sle-micro/kvm-5.5:2.0.4-3.5.197:kernel-default-base-5.14.21-150500.55.83.1.150500.6.37.1
Container suse/sle-micro/rt-5.5:2.0.4-4.5.211:kernel-rt-5.14.21-150500.13.73.1
+ Image SLES12-SP5-GCE-BYOS:kernel-default-4.12.14-122.231.1
+ Image SLES12-SP5-GCE-SAP-BYOS:cluster-md-kmp-default-4.12.14-122.231.1
+ Image SLES12-SP5-GCE-SAP-BYOS:dlm-kmp-default-4.12.14-122.231.1
+ Image SLES12-SP5-GCE-SAP-BYOS:gfs2-kmp-default-4.12.14-122.231.1
+ Image SLES12-SP5-GCE-SAP-BYOS:kernel-default-4.12.14-122.231.1
+ Image SLES12-SP5-GCE-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.231.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:cluster-md-kmp-default-4.12.14-122.231.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:dlm-kmp-default-4.12.14-122.231.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:gfs2-kmp-default-4.12.14-122.231.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:kernel-default-4.12.14-122.231.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:ocfs2-kmp-default-4.12.14-122.231.1
Image SLES15-SP5-CHOST-BYOS-Aliyun:kernel-default-5.14.21-150500.55.83.1
Image SLES15-SP5-CHOST-BYOS-Azure:kernel-default-5.14.21-150500.55.83.1
Image SLES15-SP5-CHOST-BYOS-EC2:kernel-default-5.14.21-150500.55.83.1
skipping CVE-2024-42264 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-42263 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-42262 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-42261 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-42260 as CVE page is older than CVRF-CVE file.
--- /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2024-42259.xml 2024-10-16 01:15:15.742807000 +0200
+++ /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2024-42259.xml.new 2024-10-29 01:14:44.206917000 +0100
@@ -14,13 +14,13 @@
1
- 22
- 2024-10-15T23:15:15Z
+ 23
+ 2024-10-29T00:14:43Z
current
2024-08-14T23:09:48Z
- 2024-10-15T23:15:15Z
+ 2024-10-29T00:14:43Z
cve-database/bin/generate-cvrf-cve.pl
2020-12-27T01:00:00Z
@@ -121,6 +121,21 @@
Image SLES12-SP5-Azure-SAP-BYOS
+
+
+ Image SLES12-SP5-GCE-BYOS
+
+
+
+
+ Image SLES12-SP5-GCE-SAP-BYOS
+
+
+
+
+ Image SLES12-SP5-GCE-SAP-On-Demand
+
+
Image SLES15-SP5-CHOST-BYOS-Aliyun
@@ -1624,6 +1639,39 @@
ocfs2-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-Azure-SAP-BYOS
+
+ kernel-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-BYOS
+
+
+ cluster-md-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ dlm-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ gfs2-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ kernel-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ ocfs2-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ cluster-md-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
+
+ dlm-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
+
+ gfs2-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
+
+ kernel-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
+
+ ocfs2-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
kernel-default-5.14.21-150500.55.83.1 as a component of Image SLES15-SP5-CHOST-BYOS-Aliyun
@@ -3216,6 +3264,17 @@
Image SLES12-SP5-Azure-SAP-BYOS:gfs2-kmp-default-4.12.14-122.228.1
Image SLES12-SP5-Azure-SAP-BYOS:kernel-default-4.12.14-122.228.1
Image SLES12-SP5-Azure-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.228.1
+ Image SLES12-SP5-GCE-BYOS:kernel-default-4.12.14-122.228.1
+ Image SLES12-SP5-GCE-SAP-BYOS:cluster-md-kmp-default-4.12.14-122.228.1
+ Image SLES12-SP5-GCE-SAP-BYOS:dlm-kmp-default-4.12.14-122.228.1
+ Image SLES12-SP5-GCE-SAP-BYOS:gfs2-kmp-default-4.12.14-122.228.1
+ Image SLES12-SP5-GCE-SAP-BYOS:kernel-default-4.12.14-122.228.1
+ Image SLES12-SP5-GCE-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.228.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:cluster-md-kmp-default-4.12.14-122.228.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:dlm-kmp-default-4.12.14-122.228.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:gfs2-kmp-default-4.12.14-122.228.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:kernel-default-4.12.14-122.228.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:ocfs2-kmp-default-4.12.14-122.228.1
Image SLES15-SP5-CHOST-BYOS-Aliyun:kernel-default-5.14.21-150500.55.83.1
Image SLES15-SP5-CHOST-BYOS-Azure:kernel-default-5.14.21-150500.55.83.1
Image SLES15-SP5-CHOST-BYOS-EC2:kernel-default-5.14.21-150500.55.83.1
skipping CVE-2024-42258 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-42257 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-42256 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-42255 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-42254 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-42252 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-42251 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-42250 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-42249 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-42248 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-42247 as CVE page is older than CVRF-CVE file.
--- /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2024-42246.xml 2024-10-16 01:15:22.910905000 +0200
+++ /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2024-42246.xml.new 2024-10-29 01:14:45.188892000 +0100
@@ -14,13 +14,13 @@
1
- 31
- 2024-10-15T23:15:22Z
+ 32
+ 2024-10-29T00:14:44Z
current
2024-08-07T23:10:15Z
- 2024-10-15T23:15:22Z
+ 2024-10-29T00:14:44Z
cve-database/bin/generate-cvrf-cve.pl
2020-12-27T01:00:00Z
@@ -130,6 +130,21 @@
Image SLES12-SP5-Azure-SAP-BYOS
+
+
+ Image SLES12-SP5-GCE-BYOS
+
+
+
+
+ Image SLES12-SP5-GCE-SAP-BYOS
+
+
+
+
+ Image SLES12-SP5-GCE-SAP-On-Demand
+
+
Image SLES15-SP5-Azure-Basic
@@ -1817,6 +1832,39 @@
ocfs2-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-Azure-SAP-BYOS
+
+ kernel-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-BYOS
+
+
+ cluster-md-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ dlm-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ gfs2-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ kernel-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ ocfs2-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ cluster-md-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
+
+ dlm-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
+
+ gfs2-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
+
+ kernel-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
+
+ ocfs2-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
kernel-azure-5.14.21-150500.33.66.1 as a component of Image SLES15-SP5-Azure-Basic
@@ -3602,6 +3650,17 @@
Image SLES12-SP5-Azure-SAP-BYOS:gfs2-kmp-default-4.12.14-122.228.1
Image SLES12-SP5-Azure-SAP-BYOS:kernel-default-4.12.14-122.228.1
Image SLES12-SP5-Azure-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.228.1
+ Image SLES12-SP5-GCE-BYOS:kernel-default-4.12.14-122.228.1
+ Image SLES12-SP5-GCE-SAP-BYOS:cluster-md-kmp-default-4.12.14-122.228.1
+ Image SLES12-SP5-GCE-SAP-BYOS:dlm-kmp-default-4.12.14-122.228.1
+ Image SLES12-SP5-GCE-SAP-BYOS:gfs2-kmp-default-4.12.14-122.228.1
+ Image SLES12-SP5-GCE-SAP-BYOS:kernel-default-4.12.14-122.228.1
+ Image SLES12-SP5-GCE-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.228.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:cluster-md-kmp-default-4.12.14-122.228.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:dlm-kmp-default-4.12.14-122.228.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:gfs2-kmp-default-4.12.14-122.228.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:kernel-default-4.12.14-122.228.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:ocfs2-kmp-default-4.12.14-122.228.1
Image SLES15-SP5-Azure-Basic:kernel-azure-5.14.21-150500.33.66.1
Image SLES15-SP5-Azure-Standard:kernel-azure-5.14.21-150500.33.66.1
Image SLES15-SP5-CHOST-BYOS-Aliyun:kernel-default-5.14.21-150500.55.80.2
skipping CVE-2024-42245 as CVE page is older than CVRF-CVE file.
--- /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2024-42244.xml 2024-10-16 01:15:24.564849000 +0200
+++ /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2024-42244.xml.new 2024-10-29 01:14:45.876863000 +0100
@@ -14,13 +14,13 @@
1
- 28
- 2024-10-15T23:15:24Z
+ 29
+ 2024-10-29T00:14:45Z
current
2024-08-07T23:10:15Z
- 2024-10-15T23:15:24Z
+ 2024-10-29T00:14:45Z
cve-database/bin/generate-cvrf-cve.pl
2020-12-27T01:00:00Z
@@ -124,6 +124,21 @@
Image SLES12-SP5-Azure-SAP-BYOS
+
+
+ Image SLES12-SP5-GCE-BYOS
+
+
+
+
+ Image SLES12-SP5-GCE-SAP-BYOS
+
+
+
+
+ Image SLES12-SP5-GCE-SAP-On-Demand
+
+
Image SLES15-SP5-Azure-Basic
@@ -1662,6 +1677,39 @@
ocfs2-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-Azure-SAP-BYOS
+
+ kernel-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-BYOS
+
+
+ cluster-md-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ dlm-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ gfs2-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ kernel-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ ocfs2-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ cluster-md-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
+
+ dlm-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
+
+ gfs2-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
+
+ kernel-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
+
+ ocfs2-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
kernel-azure-5.14.21-150500.33.66.1 as a component of Image SLES15-SP5-Azure-Basic
@@ -3320,6 +3368,17 @@
Image SLES12-SP5-Azure-SAP-BYOS:gfs2-kmp-default-4.12.14-122.228.1
Image SLES12-SP5-Azure-SAP-BYOS:kernel-default-4.12.14-122.228.1
Image SLES12-SP5-Azure-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.228.1
+ Image SLES12-SP5-GCE-BYOS:kernel-default-4.12.14-122.228.1
+ Image SLES12-SP5-GCE-SAP-BYOS:cluster-md-kmp-default-4.12.14-122.228.1
+ Image SLES12-SP5-GCE-SAP-BYOS:dlm-kmp-default-4.12.14-122.228.1
+ Image SLES12-SP5-GCE-SAP-BYOS:gfs2-kmp-default-4.12.14-122.228.1
+ Image SLES12-SP5-GCE-SAP-BYOS:kernel-default-4.12.14-122.228.1
+ Image SLES12-SP5-GCE-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.228.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:cluster-md-kmp-default-4.12.14-122.228.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:dlm-kmp-default-4.12.14-122.228.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:gfs2-kmp-default-4.12.14-122.228.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:kernel-default-4.12.14-122.228.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:ocfs2-kmp-default-4.12.14-122.228.1
Image SLES15-SP5-Azure-Basic:kernel-azure-5.14.21-150500.33.66.1
Image SLES15-SP5-Azure-Standard:kernel-azure-5.14.21-150500.33.66.1
Image SLES15-SP5-CHOST-BYOS-Aliyun:kernel-default-5.14.21-150500.55.80.2
skipping CVE-2024-42243 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-42242 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-42241 as CVE page is older than CVRF-CVE file.
--- /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2024-42240.xml 2024-10-22 01:19:37.181857000 +0200
+++ /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2024-42240.xml.new 2024-10-29 01:14:46.470826000 +0100
@@ -14,13 +14,13 @@
1
- 26
- 2024-10-21T23:19:36Z
+ 27
+ 2024-10-29T00:14:46Z
current
2024-08-07T23:10:16Z
- 2024-10-21T23:19:36Z
+ 2024-10-29T00:14:46Z
cve-database/bin/generate-cvrf-cve.pl
2020-12-27T01:00:00Z
@@ -159,6 +159,21 @@
Image SLES12-SP5-Azure-SAP-BYOS
+
+
+ Image SLES12-SP5-GCE-BYOS
+
+
+
+
+ Image SLES12-SP5-GCE-SAP-BYOS
+
+
+
+
+ Image SLES12-SP5-GCE-SAP-On-Demand
+
+
Image SLES15-SP5-Azure-Basic
@@ -1739,6 +1754,39 @@
ocfs2-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-Azure-SAP-BYOS
+
+ kernel-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-BYOS
+
+
+ cluster-md-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ dlm-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ gfs2-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ kernel-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ ocfs2-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ cluster-md-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
+
+ dlm-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
+
+ gfs2-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
+
+ kernel-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
+
+ ocfs2-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
kernel-azure-5.14.21-150500.33.66.1 as a component of Image SLES15-SP5-Azure-Basic
@@ -3443,6 +3491,17 @@
Image SLES12-SP5-Azure-SAP-BYOS:gfs2-kmp-default-4.12.14-122.228.1
Image SLES12-SP5-Azure-SAP-BYOS:kernel-default-4.12.14-122.228.1
Image SLES12-SP5-Azure-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.228.1
+ Image SLES12-SP5-GCE-BYOS:kernel-default-4.12.14-122.228.1
+ Image SLES12-SP5-GCE-SAP-BYOS:cluster-md-kmp-default-4.12.14-122.228.1
+ Image SLES12-SP5-GCE-SAP-BYOS:dlm-kmp-default-4.12.14-122.228.1
+ Image SLES12-SP5-GCE-SAP-BYOS:gfs2-kmp-default-4.12.14-122.228.1
+ Image SLES12-SP5-GCE-SAP-BYOS:kernel-default-4.12.14-122.228.1
+ Image SLES12-SP5-GCE-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.228.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:cluster-md-kmp-default-4.12.14-122.228.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:dlm-kmp-default-4.12.14-122.228.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:gfs2-kmp-default-4.12.14-122.228.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:kernel-default-4.12.14-122.228.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:ocfs2-kmp-default-4.12.14-122.228.1
Image SLES15-SP5-Azure-Basic:kernel-azure-5.14.21-150500.33.66.1
Image SLES15-SP5-Azure-Standard:kernel-azure-5.14.21-150500.33.66.1
Image SLES15-SP5-CHOST-BYOS-Aliyun:kernel-default-5.14.21-150500.55.80.2
skipping CVE-2024-42239 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-42238 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-42237 as CVE page is older than CVRF-CVE file.
--- /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2024-42236.xml 2024-10-16 01:15:31.340465000 +0200
+++ /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2024-42236.xml.new 2024-10-29 01:14:47.147777000 +0100
@@ -14,13 +14,13 @@
1
- 28
- 2024-10-15T23:15:30Z
+ 29
+ 2024-10-29T00:14:46Z
current
2024-08-07T23:10:18Z
- 2024-10-15T23:15:30Z
+ 2024-10-29T00:14:46Z
cve-database/bin/generate-cvrf-cve.pl
2020-12-27T01:00:00Z
@@ -114,6 +114,21 @@
Image SLES12-SP5-Azure-SAP-BYOS
+
+
+ Image SLES12-SP5-GCE-BYOS
+
+
+
+
+ Image SLES12-SP5-GCE-SAP-BYOS
+
+
+
+
+ Image SLES12-SP5-GCE-SAP-On-Demand
+
+
Image SLES15-SP5-Azure-Basic
@@ -1652,6 +1667,39 @@
ocfs2-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-Azure-SAP-BYOS
+
+ kernel-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-BYOS
+
+
+ cluster-md-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ dlm-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ gfs2-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ kernel-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ ocfs2-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ cluster-md-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
+
+ dlm-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
+
+ gfs2-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
+
+ kernel-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
+
+ ocfs2-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
kernel-azure-5.14.21-150500.33.66.1 as a component of Image SLES15-SP5-Azure-Basic
@@ -3300,6 +3348,17 @@
Image SLES12-SP5-Azure-SAP-BYOS:gfs2-kmp-default-4.12.14-122.228.1
Image SLES12-SP5-Azure-SAP-BYOS:kernel-default-4.12.14-122.228.1
Image SLES12-SP5-Azure-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.228.1
+ Image SLES12-SP5-GCE-BYOS:kernel-default-4.12.14-122.228.1
+ Image SLES12-SP5-GCE-SAP-BYOS:cluster-md-kmp-default-4.12.14-122.228.1
+ Image SLES12-SP5-GCE-SAP-BYOS:dlm-kmp-default-4.12.14-122.228.1
+ Image SLES12-SP5-GCE-SAP-BYOS:gfs2-kmp-default-4.12.14-122.228.1
+ Image SLES12-SP5-GCE-SAP-BYOS:kernel-default-4.12.14-122.228.1
+ Image SLES12-SP5-GCE-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.228.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:cluster-md-kmp-default-4.12.14-122.228.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:dlm-kmp-default-4.12.14-122.228.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:gfs2-kmp-default-4.12.14-122.228.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:kernel-default-4.12.14-122.228.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:ocfs2-kmp-default-4.12.14-122.228.1
Image SLES15-SP5-Azure-Basic:kernel-azure-5.14.21-150500.33.66.1
Image SLES15-SP5-Azure-Standard:kernel-azure-5.14.21-150500.33.66.1
Image SLES15-SP5-CHOST-BYOS-Aliyun:kernel-default-5.14.21-150500.55.80.2
no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2024-42232
skipping CVE-2024-42235 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-42234 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-42233 as CVE page is older than CVRF-CVE file.
--- /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2024-42232.xml 2024-10-20 01:14:14.946720000 +0200
+++ /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2024-42232.xml.new 2024-10-29 01:14:47.910234000 +0100
@@ -14,13 +14,13 @@
1
- 28
- 2024-10-19T23:14:14Z
+ 29
+ 2024-10-29T00:14:47Z
current
2024-08-07T23:10:19Z
- 2024-10-19T23:14:14Z
+ 2024-10-29T00:14:47Z
cve-database/bin/generate-cvrf-cve.pl
2020-12-27T01:00:00Z
@@ -164,6 +164,21 @@
Image SLES12-SP5-Azure-SAP-BYOS
+
+
+ Image SLES12-SP5-GCE-BYOS
+
+
+
+
+ Image SLES12-SP5-GCE-SAP-BYOS
+
+
+
+
+ Image SLES12-SP5-GCE-SAP-On-Demand
+
+
Image SLES15-SP4-SAP-Azure-LI-BYOS
@@ -2000,6 +2015,39 @@
ocfs2-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-Azure-SAP-BYOS
+
+ kernel-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-BYOS
+
+
+ cluster-md-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ dlm-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ gfs2-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ kernel-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ ocfs2-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ cluster-md-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
+
+ dlm-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
+
+ gfs2-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
+
+ kernel-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
+
+ ocfs2-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
cluster-md-kmp-default-5.14.21-150400.24.133.2 as a component of Image SLES15-SP4-SAP-Azure-LI-BYOS
@@ -4139,6 +4187,17 @@
Image SLES12-SP5-Azure-SAP-BYOS:gfs2-kmp-default-4.12.14-122.228.1
Image SLES12-SP5-Azure-SAP-BYOS:kernel-default-4.12.14-122.228.1
Image SLES12-SP5-Azure-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.228.1
+ Image SLES12-SP5-GCE-BYOS:kernel-default-4.12.14-122.228.1
+ Image SLES12-SP5-GCE-SAP-BYOS:cluster-md-kmp-default-4.12.14-122.228.1
+ Image SLES12-SP5-GCE-SAP-BYOS:dlm-kmp-default-4.12.14-122.228.1
+ Image SLES12-SP5-GCE-SAP-BYOS:gfs2-kmp-default-4.12.14-122.228.1
+ Image SLES12-SP5-GCE-SAP-BYOS:kernel-default-4.12.14-122.228.1
+ Image SLES12-SP5-GCE-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.228.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:cluster-md-kmp-default-4.12.14-122.228.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:dlm-kmp-default-4.12.14-122.228.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:gfs2-kmp-default-4.12.14-122.228.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:kernel-default-4.12.14-122.228.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:ocfs2-kmp-default-4.12.14-122.228.1
Image SLES15-SP4-SAP-Azure-LI-BYOS:cluster-md-kmp-default-5.14.21-150400.24.133.2
Image SLES15-SP4-SAP-Azure-LI-BYOS:dlm-kmp-default-5.14.21-150400.24.133.2
Image SLES15-SP4-SAP-Azure-LI-BYOS:gfs2-kmp-default-5.14.21-150400.24.133.2
skipping CVE-2024-42231 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-42230 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-42229 as CVE page is older than CVRF-CVE file.
--- /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2024-42228.xml 2024-10-16 01:15:35.571719000 +0200
+++ /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2024-42228.xml.new 2024-10-29 01:14:48.606195000 +0100
@@ -14,13 +14,13 @@
1
- 28
- 2024-10-15T23:15:34Z
+ 29
+ 2024-10-29T00:14:48Z
current
2024-08-05T23:09:42Z
- 2024-10-15T23:15:34Z
+ 2024-10-29T00:14:48Z
cve-database/bin/generate-cvrf-cve.pl
2020-12-27T01:00:00Z
@@ -114,6 +114,21 @@
Image SLES12-SP5-Azure-SAP-BYOS
+
+
+ Image SLES12-SP5-GCE-BYOS
+
+
+
+
+ Image SLES12-SP5-GCE-SAP-BYOS
+
+
+
+
+ Image SLES12-SP5-GCE-SAP-On-Demand
+
+
Image SLES15-SP5-Azure-Basic
@@ -1727,6 +1742,39 @@
ocfs2-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-Azure-SAP-BYOS
+
+ kernel-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-BYOS
+
+
+ cluster-md-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ dlm-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ gfs2-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ kernel-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ ocfs2-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ cluster-md-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
+
+ dlm-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
+
+ gfs2-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
+
+ kernel-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
+
+ ocfs2-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
kernel-azure-5.14.21-150500.33.66.1 as a component of Image SLES15-SP5-Azure-Basic
@@ -3467,6 +3515,17 @@
Image SLES12-SP5-Azure-SAP-BYOS:gfs2-kmp-default-4.12.14-122.228.1
Image SLES12-SP5-Azure-SAP-BYOS:kernel-default-4.12.14-122.228.1
Image SLES12-SP5-Azure-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.228.1
+ Image SLES12-SP5-GCE-BYOS:kernel-default-4.12.14-122.228.1
+ Image SLES12-SP5-GCE-SAP-BYOS:cluster-md-kmp-default-4.12.14-122.228.1
+ Image SLES12-SP5-GCE-SAP-BYOS:dlm-kmp-default-4.12.14-122.228.1
+ Image SLES12-SP5-GCE-SAP-BYOS:gfs2-kmp-default-4.12.14-122.228.1
+ Image SLES12-SP5-GCE-SAP-BYOS:kernel-default-4.12.14-122.228.1
+ Image SLES12-SP5-GCE-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.228.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:cluster-md-kmp-default-4.12.14-122.228.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:dlm-kmp-default-4.12.14-122.228.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:gfs2-kmp-default-4.12.14-122.228.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:kernel-default-4.12.14-122.228.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:ocfs2-kmp-default-4.12.14-122.228.1
Image SLES15-SP5-Azure-Basic:kernel-azure-5.14.21-150500.33.66.1
Image SLES15-SP5-Azure-Standard:kernel-azure-5.14.21-150500.33.66.1
Image SLES15-SP5-CHOST-BYOS-Aliyun:kernel-default-5.14.21-150500.55.80.2
skipping CVE-2024-42227 as CVE page is older than CVRF-CVE file.
--- /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2024-42226.xml 2024-10-16 01:15:36.816658000 +0200
+++ /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2024-42226.xml.new 2024-10-29 01:14:49.405190000 +0100
@@ -14,13 +14,13 @@
1
- 22
- 2024-10-15T23:15:36Z
+ 23
+ 2024-10-29T00:14:48Z
current
2024-08-05T23:09:42Z
- 2024-10-15T23:15:36Z
+ 2024-10-29T00:14:48Z
cve-database/bin/generate-cvrf-cve.pl
2020-12-27T01:00:00Z
@@ -81,6 +81,21 @@
Image SLES12-SP5-Azure-SAP-BYOS
+
+
+ Image SLES12-SP5-GCE-BYOS
+
+
+
+
+ Image SLES12-SP5-GCE-SAP-BYOS
+
+
+
+
+ Image SLES12-SP5-GCE-SAP-On-Demand
+
+
Image SLES15-SP6-CHOST-BYOS
@@ -1299,6 +1314,39 @@
ocfs2-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-Azure-SAP-BYOS
+
+ kernel-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-BYOS
+
+
+ cluster-md-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ dlm-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ gfs2-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ kernel-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ ocfs2-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ cluster-md-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
+
+ dlm-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
+
+ gfs2-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
+
+ kernel-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
+
+ ocfs2-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
kernel-default-6.4.0-150600.23.22.1 as a component of Image SLES15-SP6-CHOST-BYOS
@@ -2580,6 +2628,17 @@
Image SLES12-SP5-Azure-SAP-BYOS:gfs2-kmp-default-4.12.14-122.228.1
Image SLES12-SP5-Azure-SAP-BYOS:kernel-default-4.12.14-122.228.1
Image SLES12-SP5-Azure-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.228.1
+ Image SLES12-SP5-GCE-BYOS:kernel-default-4.12.14-122.228.1
+ Image SLES12-SP5-GCE-SAP-BYOS:cluster-md-kmp-default-4.12.14-122.228.1
+ Image SLES12-SP5-GCE-SAP-BYOS:dlm-kmp-default-4.12.14-122.228.1
+ Image SLES12-SP5-GCE-SAP-BYOS:gfs2-kmp-default-4.12.14-122.228.1
+ Image SLES12-SP5-GCE-SAP-BYOS:kernel-default-4.12.14-122.228.1
+ Image SLES12-SP5-GCE-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.228.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:cluster-md-kmp-default-4.12.14-122.228.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:dlm-kmp-default-4.12.14-122.228.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:gfs2-kmp-default-4.12.14-122.228.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:kernel-default-4.12.14-122.228.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:ocfs2-kmp-default-4.12.14-122.228.1
Image SLES15-SP6-CHOST-BYOS:kernel-default-6.4.0-150600.23.22.1
Image SLES15-SP6-CHOST-BYOS-Aliyun:kernel-default-6.4.0-150600.23.22.1
Image SLES15-SP6-CHOST-BYOS-Azure:kernel-default-6.4.0-150600.23.22.1
skipping CVE-2024-42225 as CVE page is older than CVRF-CVE file.
--- /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2024-42224.xml 2024-10-16 01:15:37.482634000 +0200
+++ /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2024-42224.xml.new 2024-10-29 01:14:50.208114000 +0100
@@ -14,13 +14,13 @@
1
- 36
- 2024-10-15T23:15:37Z
+ 37
+ 2024-10-29T00:14:49Z
current
2024-08-05T23:09:43Z
- 2024-10-15T23:15:37Z
+ 2024-10-29T00:14:49Z
cve-database/bin/generate-cvrf-cve.pl
2020-12-27T01:00:00Z
@@ -130,6 +130,21 @@
Image SLES12-SP5-EC2-BYOS
+
+
+ Image SLES12-SP5-GCE-BYOS
+
+
+
+
+ Image SLES12-SP5-GCE-SAP-BYOS
+
+
+
+
+ Image SLES12-SP5-GCE-SAP-On-Demand
+
+
Image SLES12-SP5-SAP-Azure-LI-BYOS-Production
@@ -1861,6 +1876,39 @@
kernel-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-EC2-BYOS
+
+ kernel-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-BYOS
+
+
+ cluster-md-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ dlm-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ gfs2-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ kernel-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ ocfs2-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ cluster-md-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
+
+ dlm-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
+
+ gfs2-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
+
+ kernel-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
+
+ ocfs2-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
cluster-md-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-SAP-Azure-LI-BYOS-Production
@@ -3766,6 +3814,17 @@
Image SLES12-SP5-Azure-SAP-BYOS:kernel-default-4.12.14-122.225.1
Image SLES12-SP5-Azure-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.225.1
Image SLES12-SP5-EC2-BYOS:kernel-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-BYOS:kernel-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-BYOS:cluster-md-kmp-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-BYOS:dlm-kmp-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-BYOS:gfs2-kmp-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-BYOS:kernel-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:cluster-md-kmp-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:dlm-kmp-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:gfs2-kmp-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:kernel-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:ocfs2-kmp-default-4.12.14-122.225.1
Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:cluster-md-kmp-default-4.12.14-122.225.1
Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:dlm-kmp-default-4.12.14-122.225.1
Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:gfs2-kmp-default-4.12.14-122.225.1
--- /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2024-42223.xml 2024-10-22 01:19:49.161699000 +0200
+++ /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2024-42223.xml.new 2024-10-29 01:14:51.359081000 +0100
@@ -14,13 +14,13 @@
1
- 31
- 2024-10-21T23:19:48Z
+ 32
+ 2024-10-29T00:14:50Z
current
2024-08-05T23:09:43Z
- 2024-10-21T23:19:48Z
+ 2024-10-29T00:14:50Z
cve-database/bin/generate-cvrf-cve.pl
2020-12-27T01:00:00Z
@@ -121,6 +121,21 @@
Image SLES12-SP5-EC2-BYOS
+
+
+ Image SLES12-SP5-GCE-BYOS
+
+
+
+
+ Image SLES12-SP5-GCE-SAP-BYOS
+
+
+
+
+ Image SLES12-SP5-GCE-SAP-On-Demand
+
+
Image SLES12-SP5-SAP-Azure-LI-BYOS-Production
@@ -1632,6 +1647,39 @@
kernel-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-EC2-BYOS
+
+ kernel-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-BYOS
+
+
+ cluster-md-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ dlm-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ gfs2-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ kernel-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ ocfs2-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ cluster-md-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
+
+ dlm-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
+
+ gfs2-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
+
+ kernel-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
+
+ ocfs2-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
cluster-md-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-SAP-Azure-LI-BYOS-Production
@@ -3165,6 +3213,17 @@
Image SLES12-SP5-Azure-SAP-BYOS:kernel-default-4.12.14-122.225.1
Image SLES12-SP5-Azure-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.225.1
Image SLES12-SP5-EC2-BYOS:kernel-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-BYOS:kernel-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-BYOS:cluster-md-kmp-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-BYOS:dlm-kmp-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-BYOS:gfs2-kmp-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-BYOS:kernel-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:cluster-md-kmp-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:dlm-kmp-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:gfs2-kmp-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:kernel-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:ocfs2-kmp-default-4.12.14-122.225.1
Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:cluster-md-kmp-default-4.12.14-122.225.1
Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:dlm-kmp-default-4.12.14-122.225.1
Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:gfs2-kmp-default-4.12.14-122.225.1
--- /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2024-42162.xml 2024-10-16 01:15:38.146624000 +0200
+++ /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2024-42162.xml.new 2024-10-29 01:14:52.073043000 +0100
@@ -14,13 +14,13 @@
1
- 29
- 2024-10-15T23:15:37Z
+ 30
+ 2024-10-29T00:14:51Z
current
2024-08-05T23:09:44Z
- 2024-10-15T23:15:37Z
+ 2024-10-29T00:14:51Z
cve-database/bin/generate-cvrf-cve.pl
2020-12-27T01:00:00Z
@@ -110,6 +110,21 @@
Image SLES12-SP5-Azure-SAP-BYOS
+
+
+ Image SLES12-SP5-GCE-BYOS
+
+
+
+
+ Image SLES12-SP5-GCE-SAP-BYOS
+
+
+
+
+ Image SLES12-SP5-GCE-SAP-On-Demand
+
+
Image SLES15-SP5-Azure-Basic
@@ -1650,6 +1665,39 @@
ocfs2-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-Azure-SAP-BYOS
+
+ kernel-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-BYOS
+
+
+ cluster-md-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ dlm-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ gfs2-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ kernel-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ ocfs2-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ cluster-md-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
+
+ dlm-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
+
+ gfs2-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
+
+ kernel-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
+
+ ocfs2-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
kernel-azure-5.14.21-150500.33.66.1 as a component of Image SLES15-SP5-Azure-Basic
@@ -3312,6 +3360,17 @@
Image SLES12-SP5-Azure-SAP-BYOS:gfs2-kmp-default-4.12.14-122.228.1
Image SLES12-SP5-Azure-SAP-BYOS:kernel-default-4.12.14-122.228.1
Image SLES12-SP5-Azure-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.228.1
+ Image SLES12-SP5-GCE-BYOS:kernel-default-4.12.14-122.228.1
+ Image SLES12-SP5-GCE-SAP-BYOS:cluster-md-kmp-default-4.12.14-122.228.1
+ Image SLES12-SP5-GCE-SAP-BYOS:dlm-kmp-default-4.12.14-122.228.1
+ Image SLES12-SP5-GCE-SAP-BYOS:gfs2-kmp-default-4.12.14-122.228.1
+ Image SLES12-SP5-GCE-SAP-BYOS:kernel-default-4.12.14-122.228.1
+ Image SLES12-SP5-GCE-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.228.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:cluster-md-kmp-default-4.12.14-122.228.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:dlm-kmp-default-4.12.14-122.228.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:gfs2-kmp-default-4.12.14-122.228.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:kernel-default-4.12.14-122.228.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:ocfs2-kmp-default-4.12.14-122.228.1
Image SLES15-SP5-Azure-Basic:kernel-azure-5.14.21-150500.33.66.1
Image SLES15-SP5-Azure-Standard:kernel-azure-5.14.21-150500.33.66.1
Image SLES15-SP5-CHOST-BYOS-Aliyun:kernel-default-5.14.21-150500.55.80.2
skipping CVE-2024-42161 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-42160 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-42159 as CVE page is older than CVRF-CVE file.
--- /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2024-42158.xml 2024-10-16 01:15:40.969462000 +0200
+++ /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2024-42158.xml.new 2024-10-29 01:14:52.857981000 +0100
@@ -14,13 +14,13 @@
1
- 29
- 2024-10-15T23:15:40Z
+ 30
+ 2024-10-29T00:14:52Z
current
2024-08-05T23:09:45Z
- 2024-10-15T23:15:40Z
+ 2024-10-29T00:14:52Z
cve-database/bin/generate-cvrf-cve.pl
2020-12-27T01:00:00Z
@@ -113,6 +113,21 @@
Image SLES12-SP5-Azure-SAP-BYOS
+
+
+ Image SLES12-SP5-GCE-BYOS
+
+
+
+
+ Image SLES12-SP5-GCE-SAP-BYOS
+
+
+
+
+ Image SLES12-SP5-GCE-SAP-On-Demand
+
+
Image SLES15-SP5-Azure-Basic
@@ -1653,6 +1668,39 @@
ocfs2-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-Azure-SAP-BYOS
+
+ kernel-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-BYOS
+
+
+ cluster-md-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ dlm-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ gfs2-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ kernel-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ ocfs2-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ cluster-md-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
+
+ dlm-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
+
+ gfs2-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
+
+ kernel-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
+
+ ocfs2-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
kernel-azure-5.14.21-150500.33.66.1 as a component of Image SLES15-SP5-Azure-Basic
@@ -3318,6 +3366,17 @@
Image SLES12-SP5-Azure-SAP-BYOS:gfs2-kmp-default-4.12.14-122.228.1
Image SLES12-SP5-Azure-SAP-BYOS:kernel-default-4.12.14-122.228.1
Image SLES12-SP5-Azure-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.228.1
+ Image SLES12-SP5-GCE-BYOS:kernel-default-4.12.14-122.228.1
+ Image SLES12-SP5-GCE-SAP-BYOS:cluster-md-kmp-default-4.12.14-122.228.1
+ Image SLES12-SP5-GCE-SAP-BYOS:dlm-kmp-default-4.12.14-122.228.1
+ Image SLES12-SP5-GCE-SAP-BYOS:gfs2-kmp-default-4.12.14-122.228.1
+ Image SLES12-SP5-GCE-SAP-BYOS:kernel-default-4.12.14-122.228.1
+ Image SLES12-SP5-GCE-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.228.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:cluster-md-kmp-default-4.12.14-122.228.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:dlm-kmp-default-4.12.14-122.228.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:gfs2-kmp-default-4.12.14-122.228.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:kernel-default-4.12.14-122.228.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:ocfs2-kmp-default-4.12.14-122.228.1
Image SLES15-SP5-Azure-Basic:kernel-azure-5.14.21-150500.33.66.1
Image SLES15-SP5-Azure-Standard:kernel-azure-5.14.21-150500.33.66.1
Image SLES15-SP5-CHOST-BYOS-Aliyun:kernel-default-5.14.21-150500.55.80.2
--- /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2024-42157.xml 2024-10-16 01:15:41.777411000 +0200
+++ /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2024-42157.xml.new 2024-10-29 01:14:53.594959000 +0100
@@ -14,13 +14,13 @@
1
- 29
- 2024-10-15T23:15:41Z
+ 30
+ 2024-10-29T00:14:53Z
current
2024-08-05T23:09:45Z
- 2024-10-15T23:15:41Z
+ 2024-10-29T00:14:53Z
cve-database/bin/generate-cvrf-cve.pl
2020-12-27T01:00:00Z
@@ -108,6 +108,21 @@
Image SLES12-SP5-Azure-SAP-BYOS
+
+
+ Image SLES12-SP5-GCE-BYOS
+
+
+
+
+ Image SLES12-SP5-GCE-SAP-BYOS
+
+
+
+
+ Image SLES12-SP5-GCE-SAP-On-Demand
+
+
Image SLES15-SP5-Azure-Basic
@@ -1648,6 +1663,39 @@
ocfs2-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-Azure-SAP-BYOS
+
+ kernel-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-BYOS
+
+
+ cluster-md-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ dlm-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ gfs2-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ kernel-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ ocfs2-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ cluster-md-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
+
+ dlm-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
+
+ gfs2-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
+
+ kernel-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
+
+ ocfs2-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
kernel-azure-5.14.21-150500.33.66.1 as a component of Image SLES15-SP5-Azure-Basic
@@ -3308,6 +3356,17 @@
Image SLES12-SP5-Azure-SAP-BYOS:gfs2-kmp-default-4.12.14-122.228.1
Image SLES12-SP5-Azure-SAP-BYOS:kernel-default-4.12.14-122.228.1
Image SLES12-SP5-Azure-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.228.1
+ Image SLES12-SP5-GCE-BYOS:kernel-default-4.12.14-122.228.1
+ Image SLES12-SP5-GCE-SAP-BYOS:cluster-md-kmp-default-4.12.14-122.228.1
+ Image SLES12-SP5-GCE-SAP-BYOS:dlm-kmp-default-4.12.14-122.228.1
+ Image SLES12-SP5-GCE-SAP-BYOS:gfs2-kmp-default-4.12.14-122.228.1
+ Image SLES12-SP5-GCE-SAP-BYOS:kernel-default-4.12.14-122.228.1
+ Image SLES12-SP5-GCE-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.228.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:cluster-md-kmp-default-4.12.14-122.228.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:dlm-kmp-default-4.12.14-122.228.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:gfs2-kmp-default-4.12.14-122.228.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:kernel-default-4.12.14-122.228.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:ocfs2-kmp-default-4.12.14-122.228.1
Image SLES15-SP5-Azure-Basic:kernel-azure-5.14.21-150500.33.66.1
Image SLES15-SP5-Azure-Standard:kernel-azure-5.14.21-150500.33.66.1
Image SLES15-SP5-CHOST-BYOS-Aliyun:kernel-default-5.14.21-150500.55.80.2
skipping CVE-2024-42156 as CVE page is older than CVRF-CVE file.
--- /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2024-42155.xml 2024-10-16 01:15:43.516803000 +0200
+++ /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2024-42155.xml.new 2024-10-29 01:14:54.344960000 +0100
@@ -14,13 +14,13 @@
1
- 29
- 2024-10-15T23:15:43Z
+ 30
+ 2024-10-29T00:14:53Z
current
2024-08-05T23:09:46Z
- 2024-10-15T23:15:43Z
+ 2024-10-29T00:14:53Z
cve-database/bin/generate-cvrf-cve.pl
2020-12-27T01:00:00Z
@@ -111,6 +111,21 @@
Image SLES12-SP5-Azure-SAP-BYOS
+
+
+ Image SLES12-SP5-GCE-BYOS
+
+
+
+
+ Image SLES12-SP5-GCE-SAP-BYOS
+
+
+
+
+ Image SLES12-SP5-GCE-SAP-On-Demand
+
+
Image SLES15-SP5-Azure-Basic
@@ -1651,6 +1666,39 @@
ocfs2-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-Azure-SAP-BYOS
+
+ kernel-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-BYOS
+
+
+ cluster-md-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ dlm-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ gfs2-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ kernel-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ ocfs2-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ cluster-md-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
+
+ dlm-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
+
+ gfs2-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
+
+ kernel-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
+
+ ocfs2-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
kernel-azure-5.14.21-150500.33.66.1 as a component of Image SLES15-SP5-Azure-Basic
@@ -3314,6 +3362,17 @@
Image SLES12-SP5-Azure-SAP-BYOS:gfs2-kmp-default-4.12.14-122.228.1
Image SLES12-SP5-Azure-SAP-BYOS:kernel-default-4.12.14-122.228.1
Image SLES12-SP5-Azure-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.228.1
+ Image SLES12-SP5-GCE-BYOS:kernel-default-4.12.14-122.228.1
+ Image SLES12-SP5-GCE-SAP-BYOS:cluster-md-kmp-default-4.12.14-122.228.1
+ Image SLES12-SP5-GCE-SAP-BYOS:dlm-kmp-default-4.12.14-122.228.1
+ Image SLES12-SP5-GCE-SAP-BYOS:gfs2-kmp-default-4.12.14-122.228.1
+ Image SLES12-SP5-GCE-SAP-BYOS:kernel-default-4.12.14-122.228.1
+ Image SLES12-SP5-GCE-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.228.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:cluster-md-kmp-default-4.12.14-122.228.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:dlm-kmp-default-4.12.14-122.228.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:gfs2-kmp-default-4.12.14-122.228.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:kernel-default-4.12.14-122.228.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:ocfs2-kmp-default-4.12.14-122.228.1
Image SLES15-SP5-Azure-Basic:kernel-azure-5.14.21-150500.33.66.1
Image SLES15-SP5-Azure-Standard:kernel-azure-5.14.21-150500.33.66.1
Image SLES15-SP5-CHOST-BYOS-Aliyun:kernel-default-5.14.21-150500.55.80.2
no cpe found for SUSE Linux Enterprise Module for Confidential Computing Technical Preview 15 SP6 in CVE-2024-42154
--- /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2024-42154.xml 2024-10-16 01:15:44.337771000 +0200
+++ /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2024-42154.xml.new 2024-10-29 01:14:55.006885000 +0100
@@ -14,13 +14,13 @@
1
- 13
- 2024-10-15T23:15:43Z
+ 14
+ 2024-10-29T00:14:54Z
current
2024-08-05T23:09:46Z
- 2024-10-15T23:15:43Z
+ 2024-10-29T00:14:54Z
cve-database/bin/generate-cvrf-cve.pl
2020-12-27T01:00:00Z
@@ -114,6 +114,21 @@
Container suse/sle-micro/rt-5.5:2.0.4-4.5.211
+
+
+ Image SLES12-SP5-GCE-BYOS
+
+
+
+
+ Image SLES12-SP5-GCE-SAP-BYOS
+
+
+
+
+ Image SLES12-SP5-GCE-SAP-On-Demand
+
+
Image SLES15-SP5-CHOST-BYOS-Aliyun
@@ -1651,6 +1666,39 @@
kernel-rt-5.14.21-150500.13.73.1 as a component of Container suse/sle-micro/rt-5.5:2.0.4-4.5.211
+
+ kernel-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-BYOS
+
+
+ cluster-md-kmp-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ dlm-kmp-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ gfs2-kmp-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ kernel-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ ocfs2-kmp-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ cluster-md-kmp-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
+
+ dlm-kmp-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
+
+ gfs2-kmp-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
+
+ kernel-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
+
+ ocfs2-kmp-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
kernel-default-5.14.21-150500.55.83.1 as a component of Image SLES15-SP5-CHOST-BYOS-Aliyun
@@ -3273,6 +3321,17 @@
Container suse/hpc/warewulf4-x86_64/sle-hpc-node:15.6.17.5.49:kernel-default-6.4.0-150600.23.25.1
Container suse/sle-micro/kvm-5.5:2.0.4-3.5.197:kernel-default-base-5.14.21-150500.55.83.1.150500.6.37.1
Container suse/sle-micro/rt-5.5:2.0.4-4.5.211:kernel-rt-5.14.21-150500.13.73.1
+ Image SLES12-SP5-GCE-BYOS:kernel-default-4.12.14-122.231.1
+ Image SLES12-SP5-GCE-SAP-BYOS:cluster-md-kmp-default-4.12.14-122.231.1
+ Image SLES12-SP5-GCE-SAP-BYOS:dlm-kmp-default-4.12.14-122.231.1
+ Image SLES12-SP5-GCE-SAP-BYOS:gfs2-kmp-default-4.12.14-122.231.1
+ Image SLES12-SP5-GCE-SAP-BYOS:kernel-default-4.12.14-122.231.1
+ Image SLES12-SP5-GCE-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.231.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:cluster-md-kmp-default-4.12.14-122.231.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:dlm-kmp-default-4.12.14-122.231.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:gfs2-kmp-default-4.12.14-122.231.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:kernel-default-4.12.14-122.231.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:ocfs2-kmp-default-4.12.14-122.231.1
Image SLES15-SP5-CHOST-BYOS-Aliyun:kernel-default-5.14.21-150500.55.83.1
Image SLES15-SP5-CHOST-BYOS-Azure:kernel-default-5.14.21-150500.55.83.1
Image SLES15-SP5-CHOST-BYOS-EC2:kernel-default-5.14.21-150500.55.83.1
skipping CVE-2024-42153 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-42152 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-42151 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-42150 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-42149 as CVE page is older than CVRF-CVE file.
--- /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2024-42148.xml 2024-10-16 01:15:47.236639000 +0200
+++ /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2024-42148.xml.new 2024-10-29 01:14:55.800903000 +0100
@@ -14,13 +14,13 @@
1
- 32
- 2024-10-15T23:15:46Z
+ 33
+ 2024-10-29T00:14:55Z
current
2024-08-05T23:09:48Z
- 2024-10-15T23:15:46Z
+ 2024-10-29T00:14:55Z
cve-database/bin/generate-cvrf-cve.pl
2020-12-27T01:00:00Z
@@ -187,6 +187,21 @@
Image SLES12-SP5-Azure-SAP-BYOS
+
+
+ Image SLES12-SP5-GCE-BYOS
+
+
+
+
+ Image SLES12-SP5-GCE-SAP-BYOS
+
+
+
+
+ Image SLES12-SP5-GCE-SAP-On-Demand
+
+
Image SLES15-SP5-Azure-Basic
@@ -1790,6 +1805,39 @@
ocfs2-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-Azure-SAP-BYOS
+
+ kernel-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-BYOS
+
+
+ cluster-md-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ dlm-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ gfs2-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ kernel-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ ocfs2-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ cluster-md-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
+
+ dlm-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
+
+ gfs2-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
+
+ kernel-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
+
+ ocfs2-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
kernel-azure-5.14.21-150500.33.66.1 as a component of Image SLES15-SP5-Azure-Basic
@@ -3570,6 +3618,17 @@
Image SLES12-SP5-Azure-SAP-BYOS:gfs2-kmp-default-4.12.14-122.228.1
Image SLES12-SP5-Azure-SAP-BYOS:kernel-default-4.12.14-122.228.1
Image SLES12-SP5-Azure-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.228.1
+ Image SLES12-SP5-GCE-BYOS:kernel-default-4.12.14-122.228.1
+ Image SLES12-SP5-GCE-SAP-BYOS:cluster-md-kmp-default-4.12.14-122.228.1
+ Image SLES12-SP5-GCE-SAP-BYOS:dlm-kmp-default-4.12.14-122.228.1
+ Image SLES12-SP5-GCE-SAP-BYOS:gfs2-kmp-default-4.12.14-122.228.1
+ Image SLES12-SP5-GCE-SAP-BYOS:kernel-default-4.12.14-122.228.1
+ Image SLES12-SP5-GCE-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.228.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:cluster-md-kmp-default-4.12.14-122.228.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:dlm-kmp-default-4.12.14-122.228.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:gfs2-kmp-default-4.12.14-122.228.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:kernel-default-4.12.14-122.228.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:ocfs2-kmp-default-4.12.14-122.228.1
Image SLES15-SP5-Azure-Basic:kernel-azure-5.14.21-150500.33.66.1
Image SLES15-SP5-Azure-Standard:kernel-azure-5.14.21-150500.33.66.1
Image SLES15-SP5-CHOST-BYOS-Aliyun:kernel-default-5.14.21-150500.55.80.2
no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2024-42145
skipping CVE-2024-42147 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-42146 as CVE page is older than CVRF-CVE file.
--- /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2024-42145.xml 2024-10-20 01:14:25.271675000 +0200
+++ /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2024-42145.xml.new 2024-10-29 01:14:56.638824000 +0100
@@ -14,13 +14,13 @@
1
- 40
- 2024-10-19T23:14:24Z
+ 41
+ 2024-10-29T00:14:56Z
current
2024-08-05T23:09:49Z
- 2024-10-19T23:14:24Z
+ 2024-10-29T00:14:56Z
cve-database/bin/generate-cvrf-cve.pl
2020-12-27T01:00:00Z
@@ -171,6 +171,21 @@
Image SLES12-SP5-EC2-BYOS
+
+
+ Image SLES12-SP5-GCE-BYOS
+
+
+
+
+ Image SLES12-SP5-GCE-SAP-BYOS
+
+
+
+
+ Image SLES12-SP5-GCE-SAP-On-Demand
+
+
Image SLES12-SP5-SAP-Azure-LI-BYOS-Production
@@ -2414,6 +2429,39 @@
kernel-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-EC2-BYOS
+
+ kernel-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-BYOS
+
+
+ cluster-md-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ dlm-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ gfs2-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ kernel-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ ocfs2-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ cluster-md-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
+
+ dlm-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
+
+ gfs2-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
+
+ kernel-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
+
+ ocfs2-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
cluster-md-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-SAP-Azure-LI-BYOS-Production
@@ -4975,6 +5023,17 @@
Image SLES12-SP5-Azure-SAP-BYOS:kernel-default-4.12.14-122.225.1
Image SLES12-SP5-Azure-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.225.1
Image SLES12-SP5-EC2-BYOS:kernel-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-BYOS:kernel-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-BYOS:cluster-md-kmp-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-BYOS:dlm-kmp-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-BYOS:gfs2-kmp-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-BYOS:kernel-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:cluster-md-kmp-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:dlm-kmp-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:gfs2-kmp-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:kernel-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:ocfs2-kmp-default-4.12.14-122.225.1
Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:cluster-md-kmp-default-4.12.14-122.225.1
Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:dlm-kmp-default-4.12.14-122.225.1
Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:gfs2-kmp-default-4.12.14-122.225.1
skipping CVE-2024-42144 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-42142 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-42141 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-42140 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-42139 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-42138 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-42137 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-42136 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-42135 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-42134 as CVE page is older than CVRF-CVE file.
--- /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2024-42133.xml 2024-10-22 01:20:11.116055000 +0200
+++ /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2024-42133.xml.new 2024-10-29 01:14:57.799236000 +0100
@@ -14,13 +14,13 @@
1
- 14
- 2024-10-21T23:20:10Z
+ 15
+ 2024-10-29T00:14:57Z
current
2024-08-05T23:09:52Z
- 2024-10-21T23:20:10Z
+ 2024-10-29T00:14:57Z
cve-database/bin/generate-cvrf-cve.pl
2020-12-27T01:00:00Z
@@ -915,9 +915,21 @@
kernel-livepatch-6_4_0-150600_10_8-rt-1-150600.1.3.2
+
+ kernel-livepatch-6_4_0-150600_21-default-6-150600.4.10.1
+
+
+ kernel-livepatch-6_4_0-150600_23_14-default-4-150600.13.6.1
+
kernel-livepatch-6_4_0-150600_23_22-default-1-150600.13.3.3
+
+ kernel-livepatch-6_4_0-150600_23_7-default-4-150600.13.6.1
+
+
+ kernel-livepatch-6_4_0-150600_8-rt-5-150600.3.1
+
kernel-macros
@@ -1557,6 +1569,18 @@
reiserfs-kmp-rt-6.4.0-150600.10.8.3 as a component of openSUSE Leap 15.6
+
+ kernel-livepatch-6_4_0-150600_21-default-6-150600.4.10.1 as a component of SUSE Linux Enterprise Live Patching 15 SP6
+
+
+ kernel-livepatch-6_4_0-150600_23_14-default-4-150600.13.6.1 as a component of SUSE Linux Enterprise Live Patching 15 SP6
+
+
+ kernel-livepatch-6_4_0-150600_23_7-default-4-150600.13.6.1 as a component of SUSE Linux Enterprise Live Patching 15 SP6
+
+
+ kernel-livepatch-6_4_0-150600_8-rt-5-150600.3.1 as a component of SUSE Linux Enterprise Live Patching 15 SP6
+
kernel-default as a component of SUSE Enterprise Storage 7.1
@@ -2307,6 +2331,12 @@
openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.22.1
openSUSE Leap 15.6:reiserfs-kmp-rt-6.4.0-150600.10.8.3
+
+ SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_21-default-6-150600.4.10.1
+ SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_14-default-4-150600.13.6.1
+ SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_7-default-4-150600.13.6.1
+ SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_8-rt-5-150600.3.1
+
SUSE Enterprise Storage 7.1:kernel-default
SUSE Enterprise Storage 7.1:kernel-default-devel
skipping CVE-2024-42132 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-42131 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-42130 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-42129 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-42128 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-42127 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-42126 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-42125 as CVE page is older than CVRF-CVE file.
--- /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2024-42124.xml 2024-10-16 01:15:59.535550000 +0200
+++ /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2024-42124.xml.new 2024-10-29 01:14:58.541185000 +0100
@@ -14,13 +14,13 @@
1
- 38
- 2024-10-15T23:15:58Z
+ 39
+ 2024-10-29T00:14:58Z
current
2024-08-05T23:09:54Z
- 2024-10-15T23:15:58Z
+ 2024-10-29T00:14:58Z
cve-database/bin/generate-cvrf-cve.pl
2020-12-27T01:00:00Z
@@ -126,6 +126,21 @@
Image SLES12-SP5-EC2-BYOS
+
+
+ Image SLES12-SP5-GCE-BYOS
+
+
+
+
+ Image SLES12-SP5-GCE-SAP-BYOS
+
+
+
+
+ Image SLES12-SP5-GCE-SAP-On-Demand
+
+
Image SLES12-SP5-SAP-Azure-LI-BYOS-Production
@@ -1943,6 +1958,39 @@
kernel-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-EC2-BYOS
+
+ kernel-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-BYOS
+
+
+ cluster-md-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ dlm-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ gfs2-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ kernel-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ ocfs2-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ cluster-md-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
+
+ dlm-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
+
+ gfs2-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
+
+ kernel-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
+
+ ocfs2-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
cluster-md-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-SAP-Azure-LI-BYOS-Production
@@ -3915,6 +3963,17 @@
Image SLES12-SP5-Azure-SAP-BYOS:kernel-default-4.12.14-122.225.1
Image SLES12-SP5-Azure-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.225.1
Image SLES12-SP5-EC2-BYOS:kernel-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-BYOS:kernel-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-BYOS:cluster-md-kmp-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-BYOS:dlm-kmp-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-BYOS:gfs2-kmp-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-BYOS:kernel-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:cluster-md-kmp-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:dlm-kmp-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:gfs2-kmp-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:kernel-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:ocfs2-kmp-default-4.12.14-122.225.1
Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:cluster-md-kmp-default-4.12.14-122.225.1
Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:dlm-kmp-default-4.12.14-122.225.1
Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:gfs2-kmp-default-4.12.14-122.225.1
skipping CVE-2024-42123 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-42122 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-42121 as CVE page is older than CVRF-CVE file.
--- /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2024-42120.xml 2024-10-16 01:16:02.300866000 +0200
+++ /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2024-42120.xml.new 2024-10-29 01:14:59.310129000 +0100
@@ -14,13 +14,13 @@
1
- 34
- 2024-10-15T23:16:01Z
+ 35
+ 2024-10-29T00:14:58Z
current
2024-08-05T23:09:55Z
- 2024-10-15T23:16:01Z
+ 2024-10-29T00:14:58Z
cve-database/bin/generate-cvrf-cve.pl
2020-12-27T01:00:00Z
@@ -121,6 +121,21 @@
Image SLES12-SP5-EC2-BYOS
+
+
+ Image SLES12-SP5-GCE-BYOS
+
+
+
+
+ Image SLES12-SP5-GCE-SAP-BYOS
+
+
+
+
+ Image SLES12-SP5-GCE-SAP-On-Demand
+
+
Image SLES12-SP5-SAP-Azure-LI-BYOS-Production
@@ -1706,6 +1721,39 @@
kernel-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-EC2-BYOS
+
+ kernel-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-BYOS
+
+
+ cluster-md-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ dlm-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ gfs2-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ kernel-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ ocfs2-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ cluster-md-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
+
+ dlm-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
+
+ gfs2-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
+
+ kernel-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
+
+ ocfs2-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
cluster-md-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-SAP-Azure-LI-BYOS-Production
@@ -3434,6 +3482,17 @@
Image SLES12-SP5-Azure-SAP-BYOS:kernel-default-4.12.14-122.225.1
Image SLES12-SP5-Azure-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.225.1
Image SLES12-SP5-EC2-BYOS:kernel-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-BYOS:kernel-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-BYOS:cluster-md-kmp-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-BYOS:dlm-kmp-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-BYOS:gfs2-kmp-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-BYOS:kernel-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:cluster-md-kmp-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:dlm-kmp-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:gfs2-kmp-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:kernel-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:ocfs2-kmp-default-4.12.14-122.225.1
Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:cluster-md-kmp-default-4.12.14-122.225.1
Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:dlm-kmp-default-4.12.14-122.225.1
Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:gfs2-kmp-default-4.12.14-122.225.1
--- /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2024-42119.xml 2024-10-22 01:20:22.681944000 +0200
+++ /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2024-42119.xml.new 2024-10-29 01:15:00.426139000 +0100
@@ -14,13 +14,13 @@
1
- 33
- 2024-10-21T23:20:22Z
+ 34
+ 2024-10-29T00:14:59Z
current
2024-08-05T23:09:55Z
- 2024-10-21T23:20:22Z
+ 2024-10-29T00:14:59Z
cve-database/bin/generate-cvrf-cve.pl
2020-12-27T01:00:00Z
@@ -125,6 +125,21 @@
Image SLES12-SP5-EC2-BYOS
+
+
+ Image SLES12-SP5-GCE-BYOS
+
+
+
+
+ Image SLES12-SP5-GCE-SAP-BYOS
+
+
+
+
+ Image SLES12-SP5-GCE-SAP-On-Demand
+
+
Image SLES12-SP5-SAP-Azure-LI-BYOS-Production
@@ -1636,6 +1651,39 @@
kernel-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-EC2-BYOS
+
+ kernel-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-BYOS
+
+
+ cluster-md-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ dlm-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ gfs2-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ kernel-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ ocfs2-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ cluster-md-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
+
+ dlm-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
+
+ gfs2-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
+
+ kernel-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
+
+ ocfs2-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
cluster-md-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-SAP-Azure-LI-BYOS-Production
@@ -3161,6 +3209,17 @@
Image SLES12-SP5-Azure-SAP-BYOS:kernel-default-4.12.14-122.225.1
Image SLES12-SP5-Azure-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.225.1
Image SLES12-SP5-EC2-BYOS:kernel-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-BYOS:kernel-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-BYOS:cluster-md-kmp-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-BYOS:dlm-kmp-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-BYOS:gfs2-kmp-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-BYOS:kernel-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:cluster-md-kmp-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:dlm-kmp-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:gfs2-kmp-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:kernel-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:ocfs2-kmp-default-4.12.14-122.225.1
Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:cluster-md-kmp-default-4.12.14-122.225.1
Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:dlm-kmp-default-4.12.14-122.225.1
Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:gfs2-kmp-default-4.12.14-122.225.1
skipping CVE-2024-42118 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-42117 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-42116 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-42115 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-42114 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-42113 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-42112 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-42111 as CVE page is older than CVRF-CVE file.
--- /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2024-42110.xml 2024-10-16 01:16:07.370590000 +0200
+++ /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2024-42110.xml.new 2024-10-29 01:15:01.254028000 +0100
@@ -14,13 +14,13 @@
1
- 31
- 2024-10-15T23:16:06Z
+ 32
+ 2024-10-29T00:15:00Z
current
2024-08-05T23:09:58Z
- 2024-10-15T23:16:06Z
+ 2024-10-29T00:15:00Z
cve-database/bin/generate-cvrf-cve.pl
2020-12-27T01:00:00Z
@@ -148,6 +148,21 @@
Image SLES12-SP5-Azure-SAP-BYOS
+
+
+ Image SLES12-SP5-GCE-BYOS
+
+
+
+
+ Image SLES12-SP5-GCE-SAP-BYOS
+
+
+
+
+ Image SLES12-SP5-GCE-SAP-On-Demand
+
+
Image SLES15-SP5-Azure-Basic
@@ -1801,6 +1816,39 @@
ocfs2-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-Azure-SAP-BYOS
+
+ kernel-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-BYOS
+
+
+ cluster-md-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ dlm-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ gfs2-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ kernel-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ ocfs2-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ cluster-md-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
+
+ dlm-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
+
+ gfs2-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
+
+ kernel-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
+
+ ocfs2-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
kernel-azure-5.14.21-150500.33.66.1 as a component of Image SLES15-SP5-Azure-Basic
@@ -3603,6 +3651,17 @@
Image SLES12-SP5-Azure-SAP-BYOS:gfs2-kmp-default-4.12.14-122.228.1
Image SLES12-SP5-Azure-SAP-BYOS:kernel-default-4.12.14-122.228.1
Image SLES12-SP5-Azure-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.228.1
+ Image SLES12-SP5-GCE-BYOS:kernel-default-4.12.14-122.228.1
+ Image SLES12-SP5-GCE-SAP-BYOS:cluster-md-kmp-default-4.12.14-122.228.1
+ Image SLES12-SP5-GCE-SAP-BYOS:dlm-kmp-default-4.12.14-122.228.1
+ Image SLES12-SP5-GCE-SAP-BYOS:gfs2-kmp-default-4.12.14-122.228.1
+ Image SLES12-SP5-GCE-SAP-BYOS:kernel-default-4.12.14-122.228.1
+ Image SLES12-SP5-GCE-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.228.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:cluster-md-kmp-default-4.12.14-122.228.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:dlm-kmp-default-4.12.14-122.228.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:gfs2-kmp-default-4.12.14-122.228.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:kernel-default-4.12.14-122.228.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:ocfs2-kmp-default-4.12.14-122.228.1
Image SLES15-SP5-Azure-Basic:kernel-azure-5.14.21-150500.33.66.1
Image SLES15-SP5-Azure-Standard:kernel-azure-5.14.21-150500.33.66.1
Image SLES15-SP5-CHOST-BYOS-Aliyun:kernel-default-5.14.21-150500.55.80.2
skipping CVE-2024-42109 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-42108 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-42107 as CVE page is older than CVRF-CVE file.
--- /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2024-42106.xml 2024-10-16 01:16:09.845437000 +0200
+++ /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2024-42106.xml.new 2024-10-29 01:15:01.968021000 +0100
@@ -14,13 +14,13 @@
1
- 29
- 2024-10-15T23:16:09Z
+ 30
+ 2024-10-29T00:15:01Z
current
2024-08-05T23:09:59Z
- 2024-10-15T23:16:09Z
+ 2024-10-29T00:15:01Z
cve-database/bin/generate-cvrf-cve.pl
2020-12-27T01:00:00Z
@@ -180,6 +180,21 @@
Image SLES12-SP5-Azure-SAP-BYOS
+
+
+ Image SLES12-SP5-GCE-BYOS
+
+
+
+
+ Image SLES12-SP5-GCE-SAP-BYOS
+
+
+
+
+ Image SLES12-SP5-GCE-SAP-On-Demand
+
+
Image SLES15-SP5-Azure-Basic
@@ -1720,6 +1735,39 @@
ocfs2-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-Azure-SAP-BYOS
+
+ kernel-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-BYOS
+
+
+ cluster-md-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ dlm-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ gfs2-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ kernel-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ ocfs2-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ cluster-md-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
+
+ dlm-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
+
+ gfs2-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
+
+ kernel-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
+
+ ocfs2-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
kernel-azure-5.14.21-150500.33.66.1 as a component of Image SLES15-SP5-Azure-Basic
@@ -3452,6 +3500,17 @@
Image SLES12-SP5-Azure-SAP-BYOS:gfs2-kmp-default-4.12.14-122.228.1
Image SLES12-SP5-Azure-SAP-BYOS:kernel-default-4.12.14-122.228.1
Image SLES12-SP5-Azure-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.228.1
+ Image SLES12-SP5-GCE-BYOS:kernel-default-4.12.14-122.228.1
+ Image SLES12-SP5-GCE-SAP-BYOS:cluster-md-kmp-default-4.12.14-122.228.1
+ Image SLES12-SP5-GCE-SAP-BYOS:dlm-kmp-default-4.12.14-122.228.1
+ Image SLES12-SP5-GCE-SAP-BYOS:gfs2-kmp-default-4.12.14-122.228.1
+ Image SLES12-SP5-GCE-SAP-BYOS:kernel-default-4.12.14-122.228.1
+ Image SLES12-SP5-GCE-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.228.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:cluster-md-kmp-default-4.12.14-122.228.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:dlm-kmp-default-4.12.14-122.228.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:gfs2-kmp-default-4.12.14-122.228.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:kernel-default-4.12.14-122.228.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:ocfs2-kmp-default-4.12.14-122.228.1
Image SLES15-SP5-Azure-Basic:kernel-azure-5.14.21-150500.33.66.1
Image SLES15-SP5-Azure-Standard:kernel-azure-5.14.21-150500.33.66.1
Image SLES15-SP5-CHOST-BYOS-Aliyun:kernel-default-5.14.21-150500.55.80.2
skipping CVE-2024-42105 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-42104 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-42103 as CVE page is older than CVRF-CVE file.
--- /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2024-42101.xml 2024-10-16 01:16:11.643851000 +0200
+++ /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2024-42101.xml.new 2024-10-29 01:15:02.853963000 +0100
@@ -14,13 +14,13 @@
1
- 28
- 2024-10-15T23:16:11Z
+ 29
+ 2024-10-29T00:15:02Z
current
2024-08-05T23:10:00Z
- 2024-10-15T23:16:11Z
+ 2024-10-29T00:15:02Z
cve-database/bin/generate-cvrf-cve.pl
2020-12-27T01:00:00Z
@@ -110,6 +110,21 @@
Image SLES12-SP5-Azure-SAP-BYOS
+
+
+ Image SLES12-SP5-GCE-BYOS
+
+
+
+
+ Image SLES12-SP5-GCE-SAP-BYOS
+
+
+
+
+ Image SLES12-SP5-GCE-SAP-On-Demand
+
+
Image SLES15-SP5-Azure-Basic
@@ -1658,6 +1673,39 @@
ocfs2-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-Azure-SAP-BYOS
+
+ kernel-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-BYOS
+
+
+ cluster-md-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ dlm-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ gfs2-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ kernel-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ ocfs2-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ cluster-md-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
+
+ dlm-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
+
+ gfs2-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
+
+ kernel-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
+
+ ocfs2-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
kernel-azure-5.14.21-150500.33.66.1 as a component of Image SLES15-SP5-Azure-Basic
@@ -3338,6 +3386,17 @@
Image SLES12-SP5-Azure-SAP-BYOS:gfs2-kmp-default-4.12.14-122.228.1
Image SLES12-SP5-Azure-SAP-BYOS:kernel-default-4.12.14-122.228.1
Image SLES12-SP5-Azure-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.228.1
+ Image SLES12-SP5-GCE-BYOS:kernel-default-4.12.14-122.228.1
+ Image SLES12-SP5-GCE-SAP-BYOS:cluster-md-kmp-default-4.12.14-122.228.1
+ Image SLES12-SP5-GCE-SAP-BYOS:dlm-kmp-default-4.12.14-122.228.1
+ Image SLES12-SP5-GCE-SAP-BYOS:gfs2-kmp-default-4.12.14-122.228.1
+ Image SLES12-SP5-GCE-SAP-BYOS:kernel-default-4.12.14-122.228.1
+ Image SLES12-SP5-GCE-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.228.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:cluster-md-kmp-default-4.12.14-122.228.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:dlm-kmp-default-4.12.14-122.228.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:gfs2-kmp-default-4.12.14-122.228.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:kernel-default-4.12.14-122.228.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:ocfs2-kmp-default-4.12.14-122.228.1
Image SLES15-SP5-Azure-Basic:kernel-azure-5.14.21-150500.33.66.1
Image SLES15-SP5-Azure-Standard:kernel-azure-5.14.21-150500.33.66.1
Image SLES15-SP5-CHOST-BYOS-Aliyun:kernel-default-5.14.21-150500.55.80.2
skipping CVE-2024-42100 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-42099 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-42098 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-42097 as CVE page is older than CVRF-CVE file.
--- /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2024-42096.xml 2024-10-16 01:16:14.528715000 +0200
+++ /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2024-42096.xml.new 2024-10-29 01:15:03.626905000 +0100
@@ -14,13 +14,13 @@
1
- 40
- 2024-10-15T23:16:14Z
+ 41
+ 2024-10-29T00:15:03Z
current
2024-08-05T23:10:01Z
- 2024-10-15T23:16:14Z
+ 2024-10-29T00:15:03Z
cve-database/bin/generate-cvrf-cve.pl
2020-12-27T01:00:00Z
@@ -168,6 +168,21 @@
Image SLES12-SP5-EC2-BYOS
+
+
+ Image SLES12-SP5-GCE-BYOS
+
+
+
+
+ Image SLES12-SP5-GCE-SAP-BYOS
+
+
+
+
+ Image SLES12-SP5-GCE-SAP-On-Demand
+
+
Image SLES12-SP5-SAP-Azure-LI-BYOS-Production
@@ -2077,6 +2092,39 @@
kernel-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-EC2-BYOS
+
+ kernel-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-BYOS
+
+
+ cluster-md-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ dlm-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ gfs2-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ kernel-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ ocfs2-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ cluster-md-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
+
+ dlm-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
+
+ gfs2-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
+
+ kernel-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
+
+ ocfs2-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
cluster-md-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-SAP-Azure-LI-BYOS-Production
@@ -4174,6 +4222,17 @@
Image SLES12-SP5-Azure-SAP-BYOS:kernel-default-4.12.14-122.225.1
Image SLES12-SP5-Azure-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.225.1
Image SLES12-SP5-EC2-BYOS:kernel-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-BYOS:kernel-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-BYOS:cluster-md-kmp-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-BYOS:dlm-kmp-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-BYOS:gfs2-kmp-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-BYOS:kernel-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:cluster-md-kmp-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:dlm-kmp-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:gfs2-kmp-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:kernel-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:ocfs2-kmp-default-4.12.14-122.225.1
Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:cluster-md-kmp-default-4.12.14-122.225.1
Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:dlm-kmp-default-4.12.14-122.225.1
Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:gfs2-kmp-default-4.12.14-122.225.1
no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2024-42093
skipping CVE-2024-42095 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-42094 as CVE page is older than CVRF-CVE file.
--- /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2024-42093.xml 2024-10-20 01:14:44.977649000 +0200
+++ /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2024-42093.xml.new 2024-10-29 01:15:04.625884000 +0100
@@ -14,13 +14,13 @@
1
- 41
- 2024-10-19T23:14:44Z
+ 42
+ 2024-10-29T00:15:03Z
current
2024-08-05T23:10:02Z
- 2024-10-19T23:14:44Z
+ 2024-10-29T00:15:03Z
cve-database/bin/generate-cvrf-cve.pl
2020-12-27T01:00:00Z
@@ -144,6 +144,21 @@
Image SLES12-SP5-EC2-BYOS
+
+
+ Image SLES12-SP5-GCE-BYOS
+
+
+
+
+ Image SLES12-SP5-GCE-SAP-BYOS
+
+
+
+
+ Image SLES12-SP5-GCE-SAP-On-Demand
+
+
Image SLES12-SP5-SAP-Azure-LI-BYOS-Production
@@ -2137,6 +2152,39 @@
kernel-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-EC2-BYOS
+
+ kernel-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-BYOS
+
+
+ cluster-md-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ dlm-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ gfs2-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ kernel-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ ocfs2-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ cluster-md-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
+
+ dlm-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
+
+ gfs2-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
+
+ kernel-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
+
+ ocfs2-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
cluster-md-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-SAP-Azure-LI-BYOS-Production
@@ -4375,18 +4423,6 @@
kernel-default as a component of SUSE Linux Enterprise Server for SAP Applications 12 SP5
-
- kernel-default-base as a component of SUSE Linux Enterprise Server for SAP Applications 12 SP5
-
-
- kernel-default-devel as a component of SUSE Linux Enterprise Server for SAP Applications 12 SP5
-
-
- kernel-devel as a component of SUSE Linux Enterprise Server for SAP Applications 12 SP5
-
-
- kernel-macros as a component of SUSE Linux Enterprise Server for SAP Applications 12 SP5
-
kernel-source as a component of SUSE Linux Enterprise Server for SAP Applications 12 SP5
@@ -4466,6 +4502,17 @@
Image SLES12-SP5-Azure-SAP-BYOS:kernel-default-4.12.14-122.225.1
Image SLES12-SP5-Azure-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.225.1
Image SLES12-SP5-EC2-BYOS:kernel-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-BYOS:kernel-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-BYOS:cluster-md-kmp-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-BYOS:dlm-kmp-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-BYOS:gfs2-kmp-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-BYOS:kernel-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:cluster-md-kmp-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:dlm-kmp-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:gfs2-kmp-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:kernel-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:ocfs2-kmp-default-4.12.14-122.225.1
Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:cluster-md-kmp-default-4.12.14-122.225.1
Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:dlm-kmp-default-4.12.14-122.225.1
Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:gfs2-kmp-default-4.12.14-122.225.1
@@ -5169,10 +5216,6 @@
SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros
SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source
SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default
- SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base
- SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel
- SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel
- SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros
SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source
skipping CVE-2024-42092 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-42091 as CVE page is older than CVRF-CVE file.
--- /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2024-42090.xml 2024-10-16 01:16:17.610582000 +0200
+++ /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2024-42090.xml.new 2024-10-29 01:15:05.438860000 +0100
@@ -14,13 +14,13 @@
1
- 30
- 2024-10-15T23:16:17Z
+ 31
+ 2024-10-29T00:15:04Z
current
2024-08-05T23:10:03Z
- 2024-10-15T23:16:17Z
+ 2024-10-29T00:15:04Z
cve-database/bin/generate-cvrf-cve.pl
2020-12-27T01:00:00Z
@@ -122,6 +122,21 @@
Image SLES12-SP5-Azure-SAP-BYOS
+
+
+ Image SLES12-SP5-GCE-BYOS
+
+
+
+
+ Image SLES12-SP5-GCE-SAP-BYOS
+
+
+
+
+ Image SLES12-SP5-GCE-SAP-On-Demand
+
+
Image SLES15-SP5-Azure-Basic
@@ -1756,6 +1771,39 @@
ocfs2-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-Azure-SAP-BYOS
+
+ kernel-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-BYOS
+
+
+ cluster-md-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ dlm-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ gfs2-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ kernel-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ ocfs2-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ cluster-md-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
+
+ dlm-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
+
+ gfs2-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
+
+ kernel-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
+
+ ocfs2-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
kernel-azure-5.14.21-150500.33.66.1 as a component of Image SLES15-SP5-Azure-Basic
@@ -3519,6 +3567,17 @@
Image SLES12-SP5-Azure-SAP-BYOS:gfs2-kmp-default-4.12.14-122.228.1
Image SLES12-SP5-Azure-SAP-BYOS:kernel-default-4.12.14-122.228.1
Image SLES12-SP5-Azure-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.228.1
+ Image SLES12-SP5-GCE-BYOS:kernel-default-4.12.14-122.228.1
+ Image SLES12-SP5-GCE-SAP-BYOS:cluster-md-kmp-default-4.12.14-122.228.1
+ Image SLES12-SP5-GCE-SAP-BYOS:dlm-kmp-default-4.12.14-122.228.1
+ Image SLES12-SP5-GCE-SAP-BYOS:gfs2-kmp-default-4.12.14-122.228.1
+ Image SLES12-SP5-GCE-SAP-BYOS:kernel-default-4.12.14-122.228.1
+ Image SLES12-SP5-GCE-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.228.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:cluster-md-kmp-default-4.12.14-122.228.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:dlm-kmp-default-4.12.14-122.228.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:gfs2-kmp-default-4.12.14-122.228.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:kernel-default-4.12.14-122.228.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:ocfs2-kmp-default-4.12.14-122.228.1
Image SLES15-SP5-Azure-Basic:kernel-azure-5.14.21-150500.33.66.1
Image SLES15-SP5-Azure-Standard:kernel-azure-5.14.21-150500.33.66.1
Image SLES15-SP5-CHOST-BYOS-Aliyun:kernel-default-5.14.21-150500.55.80.2
skipping CVE-2024-42089 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-42088 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-42087 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-42086 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-42085 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-42084 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-42083 as CVE page is older than CVRF-CVE file.
--- /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2024-42082.xml 2024-10-16 01:16:20.621871000 +0200
+++ /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2024-42082.xml.new 2024-10-29 01:15:06.339845000 +0100
@@ -14,13 +14,13 @@
1
- 30
- 2024-10-15T23:16:20Z
+ 31
+ 2024-10-29T00:15:05Z
current
2024-08-05T23:10:05Z
- 2024-10-15T23:16:20Z
+ 2024-10-29T00:15:05Z
cve-database/bin/generate-cvrf-cve.pl
2020-12-27T01:00:00Z
@@ -147,6 +147,21 @@
Image SLES12-SP5-Azure-SAP-BYOS
+
+
+ Image SLES12-SP5-GCE-BYOS
+
+
+
+
+ Image SLES12-SP5-GCE-SAP-BYOS
+
+
+
+
+ Image SLES12-SP5-GCE-SAP-On-Demand
+
+
Image SLES15-SP5-Azure-Basic
@@ -1779,6 +1794,39 @@
ocfs2-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-Azure-SAP-BYOS
+
+ kernel-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-BYOS
+
+
+ cluster-md-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ dlm-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ gfs2-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ kernel-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ ocfs2-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ cluster-md-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
+
+ dlm-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
+
+ gfs2-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
+
+ kernel-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
+
+ ocfs2-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
kernel-azure-5.14.21-150500.33.66.1 as a component of Image SLES15-SP5-Azure-Basic
@@ -3561,6 +3609,17 @@
Image SLES12-SP5-Azure-SAP-BYOS:gfs2-kmp-default-4.12.14-122.228.1
Image SLES12-SP5-Azure-SAP-BYOS:kernel-default-4.12.14-122.228.1
Image SLES12-SP5-Azure-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.228.1
+ Image SLES12-SP5-GCE-BYOS:kernel-default-4.12.14-122.228.1
+ Image SLES12-SP5-GCE-SAP-BYOS:cluster-md-kmp-default-4.12.14-122.228.1
+ Image SLES12-SP5-GCE-SAP-BYOS:dlm-kmp-default-4.12.14-122.228.1
+ Image SLES12-SP5-GCE-SAP-BYOS:gfs2-kmp-default-4.12.14-122.228.1
+ Image SLES12-SP5-GCE-SAP-BYOS:kernel-default-4.12.14-122.228.1
+ Image SLES12-SP5-GCE-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.228.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:cluster-md-kmp-default-4.12.14-122.228.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:dlm-kmp-default-4.12.14-122.228.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:gfs2-kmp-default-4.12.14-122.228.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:kernel-default-4.12.14-122.228.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:ocfs2-kmp-default-4.12.14-122.228.1
Image SLES15-SP5-Azure-Basic:kernel-azure-5.14.21-150500.33.66.1
Image SLES15-SP5-Azure-Standard:kernel-azure-5.14.21-150500.33.66.1
Image SLES15-SP5-CHOST-BYOS-Aliyun:kernel-default-5.14.21-150500.55.80.2
no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2024-42077
skipping CVE-2024-42081 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-42080 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-42079 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-42078 as CVE page is older than CVRF-CVE file.
--- /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2024-42077.xml 2024-10-20 01:14:51.303822000 +0200
+++ /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2024-42077.xml.new 2024-10-29 01:15:07.456241000 +0100
@@ -14,13 +14,13 @@
1
- 26
- 2024-10-19T23:14:50Z
+ 27
+ 2024-10-29T00:15:06Z
current
2024-08-05T23:10:06Z
- 2024-10-19T23:14:50Z
+ 2024-10-29T00:15:06Z
cve-database/bin/generate-cvrf-cve.pl
2020-12-27T01:00:00Z
@@ -189,6 +189,21 @@
Image SLES12-SP5-Azure-SAP-BYOS
+
+
+ Image SLES12-SP5-GCE-BYOS
+
+
+
+
+ Image SLES12-SP5-GCE-SAP-BYOS
+
+
+
+
+ Image SLES12-SP5-GCE-SAP-On-Demand
+
+
Image SLES15-SP4-SAP-Azure-LI-BYOS
@@ -1967,6 +1982,39 @@
ocfs2-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-Azure-SAP-BYOS
+
+ kernel-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-BYOS
+
+
+ cluster-md-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ dlm-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ gfs2-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ kernel-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ ocfs2-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ cluster-md-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
+
+ dlm-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
+
+ gfs2-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
+
+ kernel-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
+
+ ocfs2-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
cluster-md-kmp-default-5.14.21-150400.24.133.2 as a component of Image SLES15-SP4-SAP-Azure-LI-BYOS
@@ -4022,18 +4070,6 @@
kernel-default as a component of SUSE Linux Enterprise Server for SAP Applications 12 SP5
-
- kernel-default-base as a component of SUSE Linux Enterprise Server for SAP Applications 12 SP5
-
-
- kernel-default-devel as a component of SUSE Linux Enterprise Server for SAP Applications 12 SP5
-
-
- kernel-devel as a component of SUSE Linux Enterprise Server for SAP Applications 12 SP5
-
-
- kernel-macros as a component of SUSE Linux Enterprise Server for SAP Applications 12 SP5
-
kernel-source as a component of SUSE Linux Enterprise Server for SAP Applications 12 SP5
@@ -4132,6 +4168,17 @@
Image SLES12-SP5-Azure-SAP-BYOS:gfs2-kmp-default-4.12.14-122.228.1
Image SLES12-SP5-Azure-SAP-BYOS:kernel-default-4.12.14-122.228.1
Image SLES12-SP5-Azure-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.228.1
+ Image SLES12-SP5-GCE-BYOS:kernel-default-4.12.14-122.228.1
+ Image SLES12-SP5-GCE-SAP-BYOS:cluster-md-kmp-default-4.12.14-122.228.1
+ Image SLES12-SP5-GCE-SAP-BYOS:dlm-kmp-default-4.12.14-122.228.1
+ Image SLES12-SP5-GCE-SAP-BYOS:gfs2-kmp-default-4.12.14-122.228.1
+ Image SLES12-SP5-GCE-SAP-BYOS:kernel-default-4.12.14-122.228.1
+ Image SLES12-SP5-GCE-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.228.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:cluster-md-kmp-default-4.12.14-122.228.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:dlm-kmp-default-4.12.14-122.228.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:gfs2-kmp-default-4.12.14-122.228.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:kernel-default-4.12.14-122.228.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:ocfs2-kmp-default-4.12.14-122.228.1
Image SLES15-SP4-SAP-Azure-LI-BYOS:cluster-md-kmp-default-5.14.21-150400.24.133.2
Image SLES15-SP4-SAP-Azure-LI-BYOS:dlm-kmp-default-5.14.21-150400.24.133.2
Image SLES15-SP4-SAP-Azure-LI-BYOS:gfs2-kmp-default-5.14.21-150400.24.133.2
skipping CVE-2024-42076 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-42075 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-42074 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-42073 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-42072 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-42071 as CVE page is older than CVRF-CVE file.
--- /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2024-42070.xml 2024-10-16 01:16:25.954611000 +0200
+++ /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2024-42070.xml.new 2024-10-29 01:15:08.204178000 +0100
@@ -14,13 +14,13 @@
1
- 36
- 2024-10-15T23:16:25Z
+ 37
+ 2024-10-29T00:15:07Z
current
2024-08-05T23:10:07Z
- 2024-10-15T23:16:25Z
+ 2024-10-29T00:15:07Z
cve-database/bin/generate-cvrf-cve.pl
2020-12-27T01:00:00Z
@@ -122,6 +122,21 @@
Image SLES12-SP5-EC2-BYOS
+
+
+ Image SLES12-SP5-GCE-BYOS
+
+
+
+
+ Image SLES12-SP5-GCE-SAP-BYOS
+
+
+
+
+ Image SLES12-SP5-GCE-SAP-On-Demand
+
+
Image SLES12-SP5-SAP-Azure-LI-BYOS-Production
@@ -1874,6 +1889,39 @@
kernel-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-EC2-BYOS
+
+ kernel-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-BYOS
+
+
+ cluster-md-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ dlm-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ gfs2-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ kernel-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ ocfs2-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ cluster-md-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
+
+ dlm-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
+
+ gfs2-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
+
+ kernel-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
+
+ ocfs2-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
cluster-md-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-SAP-Azure-LI-BYOS-Production
@@ -3786,6 +3834,17 @@
Image SLES12-SP5-Azure-SAP-BYOS:kernel-default-4.12.14-122.225.1
Image SLES12-SP5-Azure-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.225.1
Image SLES12-SP5-EC2-BYOS:kernel-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-BYOS:kernel-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-BYOS:cluster-md-kmp-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-BYOS:dlm-kmp-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-BYOS:gfs2-kmp-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-BYOS:kernel-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:cluster-md-kmp-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:dlm-kmp-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:gfs2-kmp-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:kernel-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:ocfs2-kmp-default-4.12.14-122.225.1
Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:cluster-md-kmp-default-4.12.14-122.225.1
Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:dlm-kmp-default-4.12.14-122.225.1
Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:gfs2-kmp-default-4.12.14-122.225.1
skipping CVE-2024-42069 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-42068 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-42067 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-42066 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-42065 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-42064 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-42063 as CVE page is older than CVRF-CVE file.
no cpe found for SUSE Package Hub 15 SP5 in CVE-2024-42010
no cpe found for SUSE Package Hub 15 SP6 in CVE-2024-42010
no cpe found for SUSE Package Hub 15 SP5 in CVE-2024-42009
no cpe found for SUSE Package Hub 15 SP6 in CVE-2024-42009
no cpe found for SUSE Package Hub 15 SP5 in CVE-2024-42008
no cpe found for SUSE Package Hub 15 SP6 in CVE-2024-42008
CVE-2024-42005: no packages for SUSE Package Hub 15 SP5, but entry?
CVE-2024-42005: no packages for SUSE Package Hub 15 SP5, but entry?
CVE-2024-42005: no packages for SUSE Package Hub 15 SP5, but entry?
notsure where SUSE Linux Enterprise Module for Certifications 15 SP5 is contained?
no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2024-41996
CVE-2024-41991: no packages for SUSE Package Hub 15 SP5, but entry?
CVE-2024-41991: no packages for SUSE Package Hub 15 SP5, but entry?
CVE-2024-41991: no packages for SUSE Package Hub 15 SP5, but entry?
CVE-2024-41990: no packages for SUSE Package Hub 15 SP5, but entry?
CVE-2024-41990: no packages for SUSE Package Hub 15 SP5, but entry?
CVE-2024-41990: no packages for SUSE Package Hub 15 SP5, but entry?
CVE-2024-41989: no packages for SUSE Package Hub 15 SP5, but entry?
CVE-2024-41989: no packages for SUSE Package Hub 15 SP5, but entry?
CVE-2024-41989: no packages for SUSE Package Hub 15 SP5, but entry?
skipping CVE-2024-41965 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-41957 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-41946 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-41817 as CVE page is older than CVRF-CVE file.
no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2024-41810
no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2024-41671
no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2024-41110
skipping CVE-2024-41123 as CVE page is older than CVRF-CVE file.
--- /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2024-41098.xml 2024-10-22 01:21:26.502123000 +0200
+++ /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2024-41098.xml.new 2024-10-29 01:15:15.480787000 +0100
@@ -14,13 +14,13 @@
1
- 27
- 2024-10-21T23:21:25Z
+ 28
+ 2024-10-29T00:15:14Z
current
2024-08-05T23:10:13Z
- 2024-10-21T23:21:25Z
+ 2024-10-29T00:15:14Z
cve-database/bin/generate-cvrf-cve.pl
2020-12-27T01:00:00Z
@@ -145,6 +145,21 @@
Image SLES12-SP5-Azure-SAP-BYOS
+
+
+ Image SLES12-SP5-GCE-BYOS
+
+
+
+
+ Image SLES12-SP5-GCE-SAP-BYOS
+
+
+
+
+ Image SLES12-SP5-GCE-SAP-On-Demand
+
+
Image SLES15-SP5-Azure-Basic
@@ -1619,6 +1634,39 @@
ocfs2-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-Azure-SAP-BYOS
+
+ kernel-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-BYOS
+
+
+ cluster-md-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ dlm-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ gfs2-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ kernel-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ ocfs2-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ cluster-md-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
+
+ dlm-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
+
+ gfs2-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
+
+ kernel-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
+
+ ocfs2-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
kernel-azure-5.14.21-150500.33.66.1 as a component of Image SLES15-SP5-Azure-Basic
@@ -3139,6 +3187,17 @@
Image SLES12-SP5-Azure-SAP-BYOS:gfs2-kmp-default-4.12.14-122.228.1
Image SLES12-SP5-Azure-SAP-BYOS:kernel-default-4.12.14-122.228.1
Image SLES12-SP5-Azure-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.228.1
+ Image SLES12-SP5-GCE-BYOS:kernel-default-4.12.14-122.228.1
+ Image SLES12-SP5-GCE-SAP-BYOS:cluster-md-kmp-default-4.12.14-122.228.1
+ Image SLES12-SP5-GCE-SAP-BYOS:dlm-kmp-default-4.12.14-122.228.1
+ Image SLES12-SP5-GCE-SAP-BYOS:gfs2-kmp-default-4.12.14-122.228.1
+ Image SLES12-SP5-GCE-SAP-BYOS:kernel-default-4.12.14-122.228.1
+ Image SLES12-SP5-GCE-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.228.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:cluster-md-kmp-default-4.12.14-122.228.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:dlm-kmp-default-4.12.14-122.228.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:gfs2-kmp-default-4.12.14-122.228.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:kernel-default-4.12.14-122.228.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:ocfs2-kmp-default-4.12.14-122.228.1
Image SLES15-SP5-Azure-Basic:kernel-azure-5.14.21-150500.33.66.1
Image SLES15-SP5-Azure-Standard:kernel-azure-5.14.21-150500.33.66.1
Image SLES15-SP5-CHOST-BYOS-Aliyun:kernel-default-5.14.21-150500.55.80.2
--- /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2024-41097.xml 2024-10-16 01:16:35.952604000 +0200
+++ /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2024-41097.xml.new 2024-10-29 01:15:16.363772000 +0100
@@ -14,13 +14,13 @@
1
- 28
- 2024-10-15T23:16:35Z
+ 29
+ 2024-10-29T00:15:15Z
current
2024-08-05T23:10:13Z
- 2024-10-15T23:16:35Z
+ 2024-10-29T00:15:15Z
cve-database/bin/generate-cvrf-cve.pl
2020-12-27T01:00:00Z
@@ -149,6 +149,21 @@
Image SLES12-SP5-Azure-SAP-BYOS
+
+
+ Image SLES12-SP5-GCE-BYOS
+
+
+
+
+ Image SLES12-SP5-GCE-SAP-BYOS
+
+
+
+
+ Image SLES12-SP5-GCE-SAP-On-Demand
+
+
Image SLES15-SP5-Azure-Basic
@@ -1762,6 +1777,39 @@
ocfs2-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-Azure-SAP-BYOS
+
+ kernel-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-BYOS
+
+
+ cluster-md-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ dlm-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ gfs2-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ kernel-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ ocfs2-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ cluster-md-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
+
+ dlm-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
+
+ gfs2-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
+
+ kernel-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
+
+ ocfs2-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
kernel-azure-5.14.21-150500.33.66.1 as a component of Image SLES15-SP5-Azure-Basic
@@ -3537,6 +3585,17 @@
Image SLES12-SP5-Azure-SAP-BYOS:gfs2-kmp-default-4.12.14-122.228.1
Image SLES12-SP5-Azure-SAP-BYOS:kernel-default-4.12.14-122.228.1
Image SLES12-SP5-Azure-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.228.1
+ Image SLES12-SP5-GCE-BYOS:kernel-default-4.12.14-122.228.1
+ Image SLES12-SP5-GCE-SAP-BYOS:cluster-md-kmp-default-4.12.14-122.228.1
+ Image SLES12-SP5-GCE-SAP-BYOS:dlm-kmp-default-4.12.14-122.228.1
+ Image SLES12-SP5-GCE-SAP-BYOS:gfs2-kmp-default-4.12.14-122.228.1
+ Image SLES12-SP5-GCE-SAP-BYOS:kernel-default-4.12.14-122.228.1
+ Image SLES12-SP5-GCE-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.228.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:cluster-md-kmp-default-4.12.14-122.228.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:dlm-kmp-default-4.12.14-122.228.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:gfs2-kmp-default-4.12.14-122.228.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:kernel-default-4.12.14-122.228.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:ocfs2-kmp-default-4.12.14-122.228.1
Image SLES15-SP5-Azure-Basic:kernel-azure-5.14.21-150500.33.66.1
Image SLES15-SP5-Azure-Standard:kernel-azure-5.14.21-150500.33.66.1
Image SLES15-SP5-CHOST-BYOS-Aliyun:kernel-default-5.14.21-150500.55.80.2
skipping CVE-2024-41096 as CVE page is older than CVRF-CVE file.
--- /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2024-41095.xml 2024-10-22 01:21:28.670991000 +0200
+++ /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2024-41095.xml.new 2024-10-29 01:15:17.291214000 +0100
@@ -14,13 +14,13 @@
1
- 33
- 2024-10-21T23:21:28Z
+ 34
+ 2024-10-29T00:15:16Z
current
2024-08-05T23:10:14Z
- 2024-10-21T23:21:28Z
+ 2024-10-29T00:15:16Z
cve-database/bin/generate-cvrf-cve.pl
2020-12-27T01:00:00Z
@@ -120,6 +120,21 @@
Image SLES12-SP5-EC2-BYOS
+
+
+ Image SLES12-SP5-GCE-BYOS
+
+
+
+
+ Image SLES12-SP5-GCE-SAP-BYOS
+
+
+
+
+ Image SLES12-SP5-GCE-SAP-On-Demand
+
+
Image SLES12-SP5-SAP-Azure-LI-BYOS-Production
@@ -1631,6 +1646,39 @@
kernel-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-EC2-BYOS
+
+ kernel-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-BYOS
+
+
+ cluster-md-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ dlm-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ gfs2-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ kernel-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ ocfs2-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ cluster-md-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
+
+ dlm-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
+
+ gfs2-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
+
+ kernel-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
+
+ ocfs2-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
cluster-md-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-SAP-Azure-LI-BYOS-Production
@@ -3163,6 +3211,17 @@
Image SLES12-SP5-Azure-SAP-BYOS:kernel-default-4.12.14-122.225.1
Image SLES12-SP5-Azure-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.225.1
Image SLES12-SP5-EC2-BYOS:kernel-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-BYOS:kernel-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-BYOS:cluster-md-kmp-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-BYOS:dlm-kmp-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-BYOS:gfs2-kmp-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-BYOS:kernel-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:cluster-md-kmp-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:dlm-kmp-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:gfs2-kmp-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:kernel-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:ocfs2-kmp-default-4.12.14-122.225.1
Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:cluster-md-kmp-default-4.12.14-122.225.1
Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:dlm-kmp-default-4.12.14-122.225.1
Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:gfs2-kmp-default-4.12.14-122.225.1
skipping CVE-2024-41094 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-41093 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-41092 as CVE page is older than CVRF-CVE file.
--- /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2024-41091.xml 2024-10-22 01:21:32.208843000 +0200
+++ /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2024-41091.xml.new 2024-10-29 01:15:18.069211000 +0100
@@ -14,13 +14,13 @@
1
- 41
- 2024-10-21T23:21:31Z
+ 42
+ 2024-10-29T00:15:17Z
current
2024-07-25T23:10:24Z
- 2024-10-21T23:21:31Z
+ 2024-10-29T00:15:17Z
cve-database/bin/generate-cvrf-cve.pl
2020-12-27T01:00:00Z
@@ -187,6 +187,21 @@
Image SLES12-SP5-EC2-BYOS
+
+
+ Image SLES12-SP5-GCE-BYOS
+
+
+
+
+ Image SLES12-SP5-GCE-SAP-BYOS
+
+
+
+
+ Image SLES12-SP5-GCE-SAP-On-Demand
+
+
Image SLES12-SP5-SAP-Azure-LI-BYOS-Production
@@ -2253,6 +2268,39 @@
kernel-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-EC2-BYOS
+
+ kernel-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-BYOS
+
+
+ cluster-md-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ dlm-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ gfs2-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ kernel-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ ocfs2-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ cluster-md-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
+
+ dlm-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
+
+ gfs2-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
+
+ kernel-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
+
+ ocfs2-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
cluster-md-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-SAP-Azure-LI-BYOS-Production
@@ -4411,6 +4459,17 @@
Image SLES12-SP5-Azure-SAP-BYOS:kernel-default-4.12.14-122.225.1
Image SLES12-SP5-Azure-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.225.1
Image SLES12-SP5-EC2-BYOS:kernel-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-BYOS:kernel-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-BYOS:cluster-md-kmp-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-BYOS:dlm-kmp-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-BYOS:gfs2-kmp-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-BYOS:kernel-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:cluster-md-kmp-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:dlm-kmp-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:gfs2-kmp-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:kernel-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:ocfs2-kmp-default-4.12.14-122.225.1
Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:cluster-md-kmp-default-4.12.14-122.225.1
Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:dlm-kmp-default-4.12.14-122.225.1
Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:gfs2-kmp-default-4.12.14-122.225.1
no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2024-41090
--- /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2024-41090.xml 2024-10-20 01:15:07.592958000 +0200
+++ /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2024-41090.xml.new 2024-10-29 01:15:18.819181000 +0100
@@ -14,13 +14,13 @@
1
- 45
- 2024-10-19T23:15:07Z
+ 46
+ 2024-10-29T00:15:18Z
current
2024-07-25T23:10:24Z
- 2024-10-19T23:15:07Z
+ 2024-10-29T00:15:18Z
cve-database/bin/generate-cvrf-cve.pl
2020-12-27T01:00:00Z
@@ -221,6 +221,21 @@
Image SLES12-SP5-EC2-BYOS
+
+
+ Image SLES12-SP5-GCE-BYOS
+
+
+
+
+ Image SLES12-SP5-GCE-SAP-BYOS
+
+
+
+
+ Image SLES12-SP5-GCE-SAP-On-Demand
+
+
Image SLES12-SP5-SAP-Azure-LI-BYOS-Production
@@ -2849,6 +2864,39 @@
kernel-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-EC2-BYOS
+
+ kernel-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-BYOS
+
+
+ cluster-md-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ dlm-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ gfs2-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ kernel-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ ocfs2-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ cluster-md-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
+
+ dlm-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
+
+ gfs2-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
+
+ kernel-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
+
+ ocfs2-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
cluster-md-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-SAP-Azure-LI-BYOS-Production
@@ -5840,18 +5888,6 @@
kernel-default as a component of SUSE Linux Enterprise Server for SAP Applications 12 SP5
-
- kernel-default-base as a component of SUSE Linux Enterprise Server for SAP Applications 12 SP5
-
-
- kernel-default-devel as a component of SUSE Linux Enterprise Server for SAP Applications 12 SP5
-
-
- kernel-devel as a component of SUSE Linux Enterprise Server for SAP Applications 12 SP5
-
-
- kernel-macros as a component of SUSE Linux Enterprise Server for SAP Applications 12 SP5
-
kernel-source as a component of SUSE Linux Enterprise Server for SAP Applications 12 SP5
@@ -5912,6 +5948,17 @@
Image SLES12-SP5-Azure-SAP-BYOS:kernel-default-4.12.14-122.225.1
Image SLES12-SP5-Azure-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.225.1
Image SLES12-SP5-EC2-BYOS:kernel-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-BYOS:kernel-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-BYOS:cluster-md-kmp-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-BYOS:dlm-kmp-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-BYOS:gfs2-kmp-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-BYOS:kernel-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:cluster-md-kmp-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:dlm-kmp-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:gfs2-kmp-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:kernel-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:ocfs2-kmp-default-4.12.14-122.225.1
Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:cluster-md-kmp-default-4.12.14-122.225.1
Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:dlm-kmp-default-4.12.14-122.225.1
Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:gfs2-kmp-default-4.12.14-122.225.1
--- /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2024-41089.xml 2024-10-22 01:21:33.125761000 +0200
+++ /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2024-41089.xml.new 2024-10-29 01:15:19.510191000 +0100
@@ -14,13 +14,13 @@
1
- 34
- 2024-10-21T23:21:32Z
+ 35
+ 2024-10-29T00:15:19Z
current
2024-08-05T23:10:15Z
- 2024-10-21T23:21:32Z
+ 2024-10-29T00:15:19Z
cve-database/bin/generate-cvrf-cve.pl
2020-12-27T01:00:00Z
@@ -121,6 +121,21 @@
Image SLES12-SP5-EC2-BYOS
+
+
+ Image SLES12-SP5-GCE-BYOS
+
+
+
+
+ Image SLES12-SP5-GCE-SAP-BYOS
+
+
+
+
+ Image SLES12-SP5-GCE-SAP-On-Demand
+
+
Image SLES12-SP5-SAP-Azure-LI-BYOS-Production
@@ -1685,6 +1700,39 @@
kernel-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-EC2-BYOS
+
+ kernel-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-BYOS
+
+
+ cluster-md-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ dlm-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ gfs2-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ kernel-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ ocfs2-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ cluster-md-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
+
+ dlm-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
+
+ gfs2-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
+
+ kernel-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
+
+ ocfs2-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
cluster-md-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-SAP-Azure-LI-BYOS-Production
@@ -3371,6 +3419,17 @@
Image SLES12-SP5-Azure-SAP-BYOS:kernel-default-4.12.14-122.225.1
Image SLES12-SP5-Azure-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.225.1
Image SLES12-SP5-EC2-BYOS:kernel-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-BYOS:kernel-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-BYOS:cluster-md-kmp-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-BYOS:dlm-kmp-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-BYOS:gfs2-kmp-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-BYOS:kernel-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:cluster-md-kmp-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:dlm-kmp-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:gfs2-kmp-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:kernel-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:ocfs2-kmp-default-4.12.14-122.225.1
Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:cluster-md-kmp-default-4.12.14-122.225.1
Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:dlm-kmp-default-4.12.14-122.225.1
Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:gfs2-kmp-default-4.12.14-122.225.1
no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2024-41087
skipping CVE-2024-41088 as CVE page is older than CVRF-CVE file.
--- /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2024-41087.xml 2024-10-20 01:15:08.968875000 +0200
+++ /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2024-41087.xml.new 2024-10-29 01:15:20.316032000 +0100
@@ -14,13 +14,13 @@
1
- 41
- 2024-10-19T23:15:08Z
+ 42
+ 2024-10-29T00:15:19Z
current
2024-08-01T23:09:51Z
- 2024-10-19T23:15:08Z
+ 2024-10-29T00:15:19Z
cve-database/bin/generate-cvrf-cve.pl
2020-12-27T01:00:00Z
@@ -199,6 +199,21 @@
Image SLES12-SP5-Azure-SAP-BYOS
+
+
+ Image SLES12-SP5-GCE-BYOS
+
+
+
+
+ Image SLES12-SP5-GCE-SAP-BYOS
+
+
+
+
+ Image SLES12-SP5-GCE-SAP-On-Demand
+
+
Image SLES15-SP4-SAP-Azure-LI-BYOS
@@ -2176,6 +2191,39 @@
ocfs2-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-Azure-SAP-BYOS
+
+ kernel-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-BYOS
+
+
+ cluster-md-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ dlm-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ gfs2-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ kernel-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ ocfs2-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ cluster-md-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
+
+ dlm-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
+
+ gfs2-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
+
+ kernel-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
+
+ ocfs2-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
cluster-md-kmp-default-5.14.21-150400.24.136.1 as a component of Image SLES15-SP4-SAP-Azure-LI-BYOS
@@ -4449,6 +4497,17 @@
Image SLES12-SP5-Azure-SAP-BYOS:gfs2-kmp-default-4.12.14-122.228.1
Image SLES12-SP5-Azure-SAP-BYOS:kernel-default-4.12.14-122.228.1
Image SLES12-SP5-Azure-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.228.1
+ Image SLES12-SP5-GCE-BYOS:kernel-default-4.12.14-122.228.1
+ Image SLES12-SP5-GCE-SAP-BYOS:cluster-md-kmp-default-4.12.14-122.228.1
+ Image SLES12-SP5-GCE-SAP-BYOS:dlm-kmp-default-4.12.14-122.228.1
+ Image SLES12-SP5-GCE-SAP-BYOS:gfs2-kmp-default-4.12.14-122.228.1
+ Image SLES12-SP5-GCE-SAP-BYOS:kernel-default-4.12.14-122.228.1
+ Image SLES12-SP5-GCE-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.228.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:cluster-md-kmp-default-4.12.14-122.228.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:dlm-kmp-default-4.12.14-122.228.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:gfs2-kmp-default-4.12.14-122.228.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:kernel-default-4.12.14-122.228.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:ocfs2-kmp-default-4.12.14-122.228.1
Image SLES15-SP4-SAP-Azure-LI-BYOS:cluster-md-kmp-default-5.14.21-150400.24.136.1
Image SLES15-SP4-SAP-Azure-LI-BYOS:dlm-kmp-default-5.14.21-150400.24.136.1
Image SLES15-SP4-SAP-Azure-LI-BYOS:gfs2-kmp-default-5.14.21-150400.24.136.1
skipping CVE-2024-41086 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-41085 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-41084 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-41083 as CVE page is older than CVRF-CVE file.
--- /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2024-41082.xml 2024-10-22 01:21:38.181059000 +0200
+++ /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2024-41082.xml.new 2024-10-29 01:15:21.138022000 +0100
@@ -14,13 +14,13 @@
1
- 11
- 2024-10-21T23:21:37Z
+ 12
+ 2024-10-29T00:15:20Z
current
2024-08-05T23:10:17Z
- 2024-10-21T23:21:37Z
+ 2024-10-29T00:15:20Z
cve-database/bin/generate-cvrf-cve.pl
2020-12-27T01:00:00Z
@@ -93,6 +93,21 @@
Container suse/sle-micro/rt-5.5:2.0.4-4.5.211
+
+
+ Image SLES12-SP5-GCE-BYOS
+
+
+
+
+ Image SLES12-SP5-GCE-SAP-BYOS
+
+
+
+
+ Image SLES12-SP5-GCE-SAP-On-Demand
+
+
Image SLES15-SP5-CHOST-BYOS-Aliyun
@@ -1222,6 +1237,39 @@
kernel-rt-5.14.21-150500.13.73.1 as a component of Container suse/sle-micro/rt-5.5:2.0.4-4.5.211
+
+ kernel-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-BYOS
+
+
+ cluster-md-kmp-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ dlm-kmp-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ gfs2-kmp-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ kernel-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ ocfs2-kmp-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ cluster-md-kmp-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
+
+ dlm-kmp-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
+
+ gfs2-kmp-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
+
+ kernel-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
+
+ ocfs2-kmp-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
kernel-default-5.14.21-150500.55.83.1 as a component of Image SLES15-SP5-CHOST-BYOS-Aliyun
@@ -2452,6 +2500,17 @@
Container bci/bci-sle15-kernel-module-devel:15.5.26.7:kernel-syms-5.14.21-150500.55.83.1
Container suse/sle-micro/kvm-5.5:2.0.4-3.5.197:kernel-default-base-5.14.21-150500.55.83.1.150500.6.37.1
Container suse/sle-micro/rt-5.5:2.0.4-4.5.211:kernel-rt-5.14.21-150500.13.73.1
+ Image SLES12-SP5-GCE-BYOS:kernel-default-4.12.14-122.231.1
+ Image SLES12-SP5-GCE-SAP-BYOS:cluster-md-kmp-default-4.12.14-122.231.1
+ Image SLES12-SP5-GCE-SAP-BYOS:dlm-kmp-default-4.12.14-122.231.1
+ Image SLES12-SP5-GCE-SAP-BYOS:gfs2-kmp-default-4.12.14-122.231.1
+ Image SLES12-SP5-GCE-SAP-BYOS:kernel-default-4.12.14-122.231.1
+ Image SLES12-SP5-GCE-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.231.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:cluster-md-kmp-default-4.12.14-122.231.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:dlm-kmp-default-4.12.14-122.231.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:gfs2-kmp-default-4.12.14-122.231.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:kernel-default-4.12.14-122.231.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:ocfs2-kmp-default-4.12.14-122.231.1
Image SLES15-SP5-CHOST-BYOS-Aliyun:kernel-default-5.14.21-150500.55.83.1
Image SLES15-SP5-CHOST-BYOS-Azure:kernel-default-5.14.21-150500.55.83.1
Image SLES15-SP5-CHOST-BYOS-EC2:kernel-default-5.14.21-150500.55.83.1
--- /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2024-41081.xml 2024-10-16 01:16:42.836696000 +0200
+++ /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2024-41081.xml.new 2024-10-29 01:15:22.307942000 +0100
@@ -14,13 +14,13 @@
1
- 36
- 2024-10-15T23:16:42Z
+ 37
+ 2024-10-29T00:15:21Z
current
2024-08-05T23:10:17Z
- 2024-10-15T23:16:42Z
+ 2024-10-29T00:15:21Z
cve-database/bin/generate-cvrf-cve.pl
2020-12-27T01:00:00Z
@@ -128,6 +128,21 @@
Image SLES12-SP5-EC2-BYOS
+
+
+ Image SLES12-SP5-GCE-BYOS
+
+
+
+
+ Image SLES12-SP5-GCE-SAP-BYOS
+
+
+
+
+ Image SLES12-SP5-GCE-SAP-On-Demand
+
+
Image SLES12-SP5-SAP-Azure-LI-BYOS-Production
@@ -1859,6 +1874,39 @@
kernel-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-EC2-BYOS
+
+ kernel-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-BYOS
+
+
+ cluster-md-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ dlm-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ gfs2-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ kernel-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ ocfs2-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ cluster-md-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
+
+ dlm-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
+
+ gfs2-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
+
+ kernel-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
+
+ ocfs2-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
cluster-md-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-SAP-Azure-LI-BYOS-Production
@@ -3762,6 +3810,17 @@
Image SLES12-SP5-Azure-SAP-BYOS:kernel-default-4.12.14-122.225.1
Image SLES12-SP5-Azure-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.225.1
Image SLES12-SP5-EC2-BYOS:kernel-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-BYOS:kernel-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-BYOS:cluster-md-kmp-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-BYOS:dlm-kmp-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-BYOS:gfs2-kmp-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-BYOS:kernel-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:cluster-md-kmp-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:dlm-kmp-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:gfs2-kmp-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:kernel-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:ocfs2-kmp-default-4.12.14-122.225.1
Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:cluster-md-kmp-default-4.12.14-122.225.1
Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:dlm-kmp-default-4.12.14-122.225.1
Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:gfs2-kmp-default-4.12.14-122.225.1
skipping CVE-2024-41080 as CVE page is older than CVRF-CVE file.
--- /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2024-41079.xml 2024-10-22 01:21:40.818854000 +0200
+++ /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2024-41079.xml.new 2024-10-29 01:15:23.150901000 +0100
@@ -14,13 +14,13 @@
1
- 30
- 2024-10-21T23:21:40Z
+ 31
+ 2024-10-29T00:15:22Z
current
2024-08-05T23:10:18Z
- 2024-10-21T23:21:40Z
+ 2024-10-29T00:15:22Z
cve-database/bin/generate-cvrf-cve.pl
2020-12-27T01:00:00Z
@@ -109,6 +109,21 @@
Container suse/sle-micro/rt-5.5:2.0.4-4.5.160
+
+
+ Image SLES12-SP5-GCE-BYOS
+
+
+
+
+ Image SLES12-SP5-GCE-SAP-BYOS
+
+
+
+
+ Image SLES12-SP5-GCE-SAP-On-Demand
+
+
Image SLES15-SP5-Azure-Basic
@@ -1634,6 +1649,39 @@
kernel-rt-5.14.21-150500.13.67.3 as a component of Container suse/sle-micro/rt-5.5:2.0.4-4.5.160
+
+ kernel-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-BYOS
+
+
+ cluster-md-kmp-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ dlm-kmp-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ gfs2-kmp-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ kernel-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ ocfs2-kmp-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ cluster-md-kmp-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
+
+ dlm-kmp-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
+
+ gfs2-kmp-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
+
+ kernel-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
+
+ ocfs2-kmp-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
kernel-azure-5.14.21-150500.33.66.1 as a component of Image SLES15-SP5-Azure-Basic
@@ -3307,6 +3355,17 @@
Container suse/hpc/warewulf4-x86_64/sle-hpc-node:15.6.17.5.37:kernel-default-6.4.0-150600.23.22.1
Container suse/sle-micro/kvm-5.5:2.0.4-3.5.184:kernel-default-base-5.14.21-150500.55.80.2.150500.6.35.6
Container suse/sle-micro/rt-5.5:2.0.4-4.5.160:kernel-rt-5.14.21-150500.13.67.3
+ Image SLES12-SP5-GCE-BYOS:kernel-default-4.12.14-122.231.1
+ Image SLES12-SP5-GCE-SAP-BYOS:cluster-md-kmp-default-4.12.14-122.231.1
+ Image SLES12-SP5-GCE-SAP-BYOS:dlm-kmp-default-4.12.14-122.231.1
+ Image SLES12-SP5-GCE-SAP-BYOS:gfs2-kmp-default-4.12.14-122.231.1
+ Image SLES12-SP5-GCE-SAP-BYOS:kernel-default-4.12.14-122.231.1
+ Image SLES12-SP5-GCE-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.231.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:cluster-md-kmp-default-4.12.14-122.231.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:dlm-kmp-default-4.12.14-122.231.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:gfs2-kmp-default-4.12.14-122.231.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:kernel-default-4.12.14-122.231.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:ocfs2-kmp-default-4.12.14-122.231.1
Image SLES15-SP5-Azure-Basic:kernel-azure-5.14.21-150500.33.66.1
Image SLES15-SP5-Azure-Standard:kernel-azure-5.14.21-150500.33.66.1
Image SLES15-SP5-CHOST-BYOS-Aliyun:kernel-default-5.14.21-150500.55.80.2
--- /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2024-41078.xml 2024-10-16 01:16:45.468549000 +0200
+++ /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2024-41078.xml.new 2024-10-29 01:15:24.147887000 +0100
@@ -14,13 +14,13 @@
1
- 36
- 2024-10-15T23:16:44Z
+ 37
+ 2024-10-29T00:15:23Z
current
2024-08-05T23:10:18Z
- 2024-10-15T23:16:44Z
+ 2024-10-29T00:15:23Z
cve-database/bin/generate-cvrf-cve.pl
2020-12-27T01:00:00Z
@@ -129,6 +129,21 @@
Image SLES12-SP5-EC2-BYOS
+
+
+ Image SLES12-SP5-GCE-BYOS
+
+
+
+
+ Image SLES12-SP5-GCE-SAP-BYOS
+
+
+
+
+ Image SLES12-SP5-GCE-SAP-On-Demand
+
+
Image SLES12-SP5-SAP-Azure-LI-BYOS-Production
@@ -1820,6 +1835,39 @@
kernel-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-EC2-BYOS
+
+ kernel-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-BYOS
+
+
+ cluster-md-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ dlm-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ gfs2-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ kernel-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ ocfs2-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ cluster-md-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
+
+ dlm-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
+
+ gfs2-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
+
+ kernel-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
+
+ ocfs2-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
cluster-md-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-SAP-Azure-LI-BYOS-Production
@@ -3568,6 +3616,17 @@
Image SLES12-SP5-Azure-SAP-BYOS:kernel-default-4.12.14-122.225.1
Image SLES12-SP5-Azure-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.225.1
Image SLES12-SP5-EC2-BYOS:kernel-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-BYOS:kernel-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-BYOS:cluster-md-kmp-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-BYOS:dlm-kmp-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-BYOS:gfs2-kmp-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-BYOS:kernel-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:cluster-md-kmp-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:dlm-kmp-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:gfs2-kmp-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:kernel-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:ocfs2-kmp-default-4.12.14-122.225.1
Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:cluster-md-kmp-default-4.12.14-122.225.1
Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:dlm-kmp-default-4.12.14-122.225.1
Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:gfs2-kmp-default-4.12.14-122.225.1
skipping CVE-2024-41077 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-41075 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-41074 as CVE page is older than CVRF-CVE file.
--- /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2024-41073.xml 2024-10-16 01:16:49.000877000 +0200
+++ /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2024-41073.xml.new 2024-10-29 01:15:25.631755000 +0100
@@ -14,13 +14,13 @@
1
- 29
- 2024-10-15T23:16:48Z
+ 30
+ 2024-10-29T00:15:25Z
current
2024-08-05T23:10:19Z
- 2024-10-15T23:16:48Z
+ 2024-10-29T00:15:25Z
cve-database/bin/generate-cvrf-cve.pl
2020-12-27T01:00:00Z
@@ -109,6 +109,21 @@
Container suse/sle-micro/rt-5.5:2.0.4-4.5.160
+
+
+ Image SLES12-SP5-GCE-BYOS
+
+
+
+
+ Image SLES12-SP5-GCE-SAP-BYOS
+
+
+
+
+ Image SLES12-SP5-GCE-SAP-On-Demand
+
+
Image SLES15-SP5-Azure-Basic
@@ -1726,6 +1741,39 @@
kernel-rt-5.14.21-150500.13.67.3 as a component of Container suse/sle-micro/rt-5.5:2.0.4-4.5.160
+
+ kernel-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-BYOS
+
+
+ cluster-md-kmp-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ dlm-kmp-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ gfs2-kmp-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ kernel-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ ocfs2-kmp-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ cluster-md-kmp-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
+
+ dlm-kmp-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
+
+ gfs2-kmp-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
+
+ kernel-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
+
+ ocfs2-kmp-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
kernel-azure-5.14.21-150500.33.66.1 as a component of Image SLES15-SP5-Azure-Basic
@@ -3476,6 +3524,17 @@
Container suse/hpc/warewulf4-x86_64/sle-hpc-node:15.6.17.5.37:kernel-default-6.4.0-150600.23.22.1
Container suse/sle-micro/kvm-5.5:2.0.4-3.5.184:kernel-default-base-5.14.21-150500.55.80.2.150500.6.35.6
Container suse/sle-micro/rt-5.5:2.0.4-4.5.160:kernel-rt-5.14.21-150500.13.67.3
+ Image SLES12-SP5-GCE-BYOS:kernel-default-4.12.14-122.231.1
+ Image SLES12-SP5-GCE-SAP-BYOS:cluster-md-kmp-default-4.12.14-122.231.1
+ Image SLES12-SP5-GCE-SAP-BYOS:dlm-kmp-default-4.12.14-122.231.1
+ Image SLES12-SP5-GCE-SAP-BYOS:gfs2-kmp-default-4.12.14-122.231.1
+ Image SLES12-SP5-GCE-SAP-BYOS:kernel-default-4.12.14-122.231.1
+ Image SLES12-SP5-GCE-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.231.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:cluster-md-kmp-default-4.12.14-122.231.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:dlm-kmp-default-4.12.14-122.231.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:gfs2-kmp-default-4.12.14-122.231.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:kernel-default-4.12.14-122.231.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:ocfs2-kmp-default-4.12.14-122.231.1
Image SLES15-SP5-Azure-Basic:kernel-azure-5.14.21-150500.33.66.1
Image SLES15-SP5-Azure-Standard:kernel-azure-5.14.21-150500.33.66.1
Image SLES15-SP5-CHOST-BYOS-Aliyun:kernel-default-5.14.21-150500.55.80.2
--- /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2024-41072.xml 2024-10-22 01:21:47.441000000 +0200
+++ /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2024-41072.xml.new 2024-10-29 01:15:26.313236000 +0100
@@ -14,13 +14,13 @@
1
- 34
- 2024-10-21T23:21:46Z
+ 35
+ 2024-10-29T00:15:25Z
current
2024-08-05T23:10:19Z
- 2024-10-21T23:21:46Z
+ 2024-10-29T00:15:25Z
cve-database/bin/generate-cvrf-cve.pl
2020-12-27T01:00:00Z
@@ -120,6 +120,21 @@
Image SLES12-SP5-EC2-BYOS
+
+
+ Image SLES12-SP5-GCE-BYOS
+
+
+
+
+ Image SLES12-SP5-GCE-SAP-BYOS
+
+
+
+
+ Image SLES12-SP5-GCE-SAP-On-Demand
+
+
Image SLES12-SP5-SAP-Azure-LI-BYOS-Production
@@ -1806,6 +1821,39 @@
kernel-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-EC2-BYOS
+
+ kernel-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-BYOS
+
+
+ cluster-md-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ dlm-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ gfs2-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ kernel-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ ocfs2-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ cluster-md-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
+
+ dlm-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
+
+ gfs2-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
+
+ kernel-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
+
+ ocfs2-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
cluster-md-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-SAP-Azure-LI-BYOS-Production
@@ -3539,6 +3587,17 @@
Image SLES12-SP5-Azure-SAP-BYOS:kernel-default-4.12.14-122.225.1
Image SLES12-SP5-Azure-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.225.1
Image SLES12-SP5-EC2-BYOS:kernel-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-BYOS:kernel-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-BYOS:cluster-md-kmp-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-BYOS:dlm-kmp-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-BYOS:gfs2-kmp-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-BYOS:kernel-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:cluster-md-kmp-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:dlm-kmp-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:gfs2-kmp-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:kernel-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:ocfs2-kmp-default-4.12.14-122.225.1
Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:cluster-md-kmp-default-4.12.14-122.225.1
Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:dlm-kmp-default-4.12.14-122.225.1
Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:gfs2-kmp-default-4.12.14-122.225.1
notsure where SUSE Liberty Linux 7 LTSS is contained?
no cpe found for SUSE Liberty Linux 7 LTSS in CVE-2024-41071
--- /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2024-41071.xml 2024-10-22 01:21:48.521012000 +0200
+++ /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2024-41071.xml.new 2024-10-29 01:15:27.206177000 +0100
@@ -14,13 +14,13 @@
1
- 38
- 2024-10-21T23:21:47Z
+ 39
+ 2024-10-29T00:15:26Z
current
2024-08-05T23:10:19Z
- 2024-10-21T23:21:47Z
+ 2024-10-29T00:15:26Z
cve-database/bin/generate-cvrf-cve.pl
2020-12-27T01:00:00Z
@@ -148,6 +148,21 @@
Image SLES12-SP5-EC2-BYOS
+
+
+ Image SLES12-SP5-GCE-BYOS
+
+
+
+
+ Image SLES12-SP5-GCE-SAP-BYOS
+
+
+
+
+ Image SLES12-SP5-GCE-SAP-On-Demand
+
+
Image SLES12-SP5-SAP-Azure-LI-BYOS-Production
@@ -2035,6 +2050,39 @@
kernel-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-EC2-BYOS
+
+ kernel-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-BYOS
+
+
+ cluster-md-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ dlm-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ gfs2-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ kernel-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ ocfs2-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ cluster-md-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
+
+ dlm-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
+
+ gfs2-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
+
+ kernel-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
+
+ ocfs2-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
cluster-md-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-SAP-Azure-LI-BYOS-Production
@@ -3970,6 +4018,17 @@
Image SLES12-SP5-Azure-SAP-BYOS:kernel-default-4.12.14-122.225.1
Image SLES12-SP5-Azure-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.225.1
Image SLES12-SP5-EC2-BYOS:kernel-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-BYOS:kernel-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-BYOS:cluster-md-kmp-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-BYOS:dlm-kmp-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-BYOS:gfs2-kmp-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-BYOS:kernel-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:cluster-md-kmp-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:dlm-kmp-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:gfs2-kmp-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:kernel-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:ocfs2-kmp-default-4.12.14-122.225.1
Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:cluster-md-kmp-default-4.12.14-122.225.1
Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:dlm-kmp-default-4.12.14-122.225.1
Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:gfs2-kmp-default-4.12.14-122.225.1
--- /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2024-41070.xml 2024-10-16 01:16:49.729872000 +0200
+++ /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2024-41070.xml.new 2024-10-29 01:15:28.105175000 +0100
@@ -14,13 +14,13 @@
1
- 37
- 2024-10-15T23:16:49Z
+ 38
+ 2024-10-29T00:15:27Z
current
2024-08-05T23:10:20Z
- 2024-10-15T23:16:49Z
+ 2024-10-29T00:15:27Z
cve-database/bin/generate-cvrf-cve.pl
2020-12-27T01:00:00Z
@@ -173,6 +173,21 @@
Image SLES12-SP5-EC2-BYOS
+
+
+ Image SLES12-SP5-GCE-BYOS
+
+
+
+
+ Image SLES12-SP5-GCE-SAP-BYOS
+
+
+
+
+ Image SLES12-SP5-GCE-SAP-On-Demand
+
+
Image SLES12-SP5-SAP-Azure-LI-BYOS-Production
@@ -1904,6 +1919,39 @@
kernel-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-EC2-BYOS
+
+ kernel-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-BYOS
+
+
+ cluster-md-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ dlm-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ gfs2-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ kernel-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ ocfs2-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ cluster-md-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
+
+ dlm-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
+
+ gfs2-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
+
+ kernel-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
+
+ ocfs2-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
cluster-md-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-SAP-Azure-LI-BYOS-Production
@@ -3852,6 +3900,17 @@
Image SLES12-SP5-Azure-SAP-BYOS:kernel-default-4.12.14-122.225.1
Image SLES12-SP5-Azure-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.225.1
Image SLES12-SP5-EC2-BYOS:kernel-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-BYOS:kernel-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-BYOS:cluster-md-kmp-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-BYOS:dlm-kmp-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-BYOS:gfs2-kmp-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-BYOS:kernel-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:cluster-md-kmp-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:dlm-kmp-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:gfs2-kmp-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:kernel-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:ocfs2-kmp-default-4.12.14-122.225.1
Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:cluster-md-kmp-default-4.12.14-122.225.1
Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:dlm-kmp-default-4.12.14-122.225.1
Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:gfs2-kmp-default-4.12.14-122.225.1
skipping CVE-2024-41069 as CVE page is older than CVRF-CVE file.
--- /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2024-41068.xml 2024-10-16 01:16:50.918779000 +0200
+++ /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2024-41068.xml.new 2024-10-29 01:15:28.723103000 +0100
@@ -14,13 +14,13 @@
1
- 30
- 2024-10-15T23:16:50Z
+ 31
+ 2024-10-29T00:15:28Z
current
2024-08-05T23:10:20Z
- 2024-10-15T23:16:50Z
+ 2024-10-29T00:15:28Z
cve-database/bin/generate-cvrf-cve.pl
2020-12-27T01:00:00Z
@@ -131,6 +131,21 @@
Image SLES12-SP5-Azure-SAP-BYOS
+
+
+ Image SLES12-SP5-GCE-BYOS
+
+
+
+
+ Image SLES12-SP5-GCE-SAP-BYOS
+
+
+
+
+ Image SLES12-SP5-GCE-SAP-On-Demand
+
+
Image SLES15-SP5-Azure-Basic
@@ -1671,6 +1686,39 @@
ocfs2-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-Azure-SAP-BYOS
+
+ kernel-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-BYOS
+
+
+ cluster-md-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ dlm-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ gfs2-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ kernel-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ ocfs2-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ cluster-md-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
+
+ dlm-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
+
+ gfs2-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
+
+ kernel-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
+
+ ocfs2-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
kernel-azure-5.14.21-150500.33.66.1 as a component of Image SLES15-SP5-Azure-Basic
@@ -3354,6 +3402,17 @@
Image SLES12-SP5-Azure-SAP-BYOS:gfs2-kmp-default-4.12.14-122.228.1
Image SLES12-SP5-Azure-SAP-BYOS:kernel-default-4.12.14-122.228.1
Image SLES12-SP5-Azure-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.228.1
+ Image SLES12-SP5-GCE-BYOS:kernel-default-4.12.14-122.228.1
+ Image SLES12-SP5-GCE-SAP-BYOS:cluster-md-kmp-default-4.12.14-122.228.1
+ Image SLES12-SP5-GCE-SAP-BYOS:dlm-kmp-default-4.12.14-122.228.1
+ Image SLES12-SP5-GCE-SAP-BYOS:gfs2-kmp-default-4.12.14-122.228.1
+ Image SLES12-SP5-GCE-SAP-BYOS:kernel-default-4.12.14-122.228.1
+ Image SLES12-SP5-GCE-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.228.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:cluster-md-kmp-default-4.12.14-122.228.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:dlm-kmp-default-4.12.14-122.228.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:gfs2-kmp-default-4.12.14-122.228.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:kernel-default-4.12.14-122.228.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:ocfs2-kmp-default-4.12.14-122.228.1
Image SLES15-SP5-Azure-Basic:kernel-azure-5.14.21-150500.33.66.1
Image SLES15-SP5-Azure-Standard:kernel-azure-5.14.21-150500.33.66.1
Image SLES15-SP5-CHOST-BYOS-Aliyun:kernel-default-5.14.21-150500.55.80.2
skipping CVE-2024-41067 as CVE page is older than CVRF-CVE file.
--- /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2024-41066.xml 2024-10-16 01:16:52.095759000 +0200
+++ /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2024-41066.xml.new 2024-10-29 01:15:29.537092000 +0100
@@ -14,13 +14,13 @@
1
- 35
- 2024-10-15T23:16:51Z
+ 36
+ 2024-10-29T00:15:29Z
current
2024-08-05T23:10:21Z
- 2024-10-15T23:16:51Z
+ 2024-10-29T00:15:29Z
cve-database/bin/generate-cvrf-cve.pl
2020-12-27T01:00:00Z
@@ -137,6 +137,21 @@
Image SLES12-SP5-EC2-BYOS
+
+
+ Image SLES12-SP5-GCE-BYOS
+
+
+
+
+ Image SLES12-SP5-GCE-SAP-BYOS
+
+
+
+
+ Image SLES12-SP5-GCE-SAP-On-Demand
+
+
Image SLES12-SP5-SAP-Azure-LI-BYOS-Production
@@ -1828,6 +1843,39 @@
kernel-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-EC2-BYOS
+
+ kernel-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-BYOS
+
+
+ cluster-md-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ dlm-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ gfs2-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ kernel-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ ocfs2-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ cluster-md-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
+
+ dlm-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
+
+ gfs2-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
+
+ kernel-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
+
+ ocfs2-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
cluster-md-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-SAP-Azure-LI-BYOS-Production
@@ -3584,6 +3632,17 @@
Image SLES12-SP5-Azure-SAP-BYOS:kernel-default-4.12.14-122.225.1
Image SLES12-SP5-Azure-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.225.1
Image SLES12-SP5-EC2-BYOS:kernel-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-BYOS:kernel-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-BYOS:cluster-md-kmp-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-BYOS:dlm-kmp-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-BYOS:gfs2-kmp-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-BYOS:kernel-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:cluster-md-kmp-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:dlm-kmp-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:gfs2-kmp-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:kernel-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:ocfs2-kmp-default-4.12.14-122.225.1
Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:cluster-md-kmp-default-4.12.14-122.225.1
Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:dlm-kmp-default-4.12.14-122.225.1
Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:gfs2-kmp-default-4.12.14-122.225.1
skipping CVE-2024-41065 as CVE page is older than CVRF-CVE file.
--- /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2024-41064.xml 2024-10-16 01:16:53.999641000 +0200
+++ /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2024-41064.xml.new 2024-10-29 01:15:30.231020000 +0100
@@ -14,13 +14,13 @@
1
- 40
- 2024-10-15T23:16:53Z
+ 41
+ 2024-10-29T00:15:29Z
current
2024-08-05T23:10:21Z
- 2024-10-15T23:16:53Z
+ 2024-10-29T00:15:29Z
cve-database/bin/generate-cvrf-cve.pl
2020-12-27T01:00:00Z
@@ -124,6 +124,21 @@
Image SLES12-SP5-EC2-BYOS
+
+
+ Image SLES12-SP5-GCE-BYOS
+
+
+
+
+ Image SLES12-SP5-GCE-SAP-BYOS
+
+
+
+
+ Image SLES12-SP5-GCE-SAP-On-Demand
+
+
Image SLES12-SP5-SAP-Azure-LI-BYOS-Production
@@ -1859,6 +1874,39 @@
kernel-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-EC2-BYOS
+
+ kernel-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-BYOS
+
+
+ cluster-md-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ dlm-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ gfs2-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ kernel-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ ocfs2-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ cluster-md-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
+
+ dlm-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
+
+ gfs2-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
+
+ kernel-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
+
+ ocfs2-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
cluster-md-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-SAP-Azure-LI-BYOS-Production
@@ -3643,6 +3691,17 @@
Image SLES12-SP5-Azure-SAP-BYOS:kernel-default-4.12.14-122.225.1
Image SLES12-SP5-Azure-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.225.1
Image SLES12-SP5-EC2-BYOS:kernel-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-BYOS:kernel-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-BYOS:cluster-md-kmp-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-BYOS:dlm-kmp-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-BYOS:gfs2-kmp-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-BYOS:kernel-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:cluster-md-kmp-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:dlm-kmp-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:gfs2-kmp-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:kernel-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:ocfs2-kmp-default-4.12.14-122.225.1
Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:cluster-md-kmp-default-4.12.14-122.225.1
Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:dlm-kmp-default-4.12.14-122.225.1
Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:gfs2-kmp-default-4.12.14-122.225.1
--- /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2024-41063.xml 2024-10-22 01:21:52.965744000 +0200
+++ /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2024-41063.xml.new 2024-10-29 01:15:31.017980000 +0100
@@ -14,13 +14,13 @@
1
- 32
- 2024-10-21T23:21:52Z
+ 33
+ 2024-10-29T00:15:30Z
current
2024-08-05T23:10:21Z
- 2024-10-21T23:21:52Z
+ 2024-10-29T00:15:30Z
cve-database/bin/generate-cvrf-cve.pl
2020-12-27T01:00:00Z
@@ -133,6 +133,21 @@
Image SLES12-SP5-EC2-BYOS
+
+
+ Image SLES12-SP5-GCE-BYOS
+
+
+
+
+ Image SLES12-SP5-GCE-SAP-BYOS
+
+
+
+
+ Image SLES12-SP5-GCE-SAP-On-Demand
+
+
Image SLES12-SP5-SAP-Azure-LI-BYOS-Production
@@ -1819,6 +1834,39 @@
kernel-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-EC2-BYOS
+
+ kernel-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-BYOS
+
+
+ cluster-md-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ dlm-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ gfs2-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ kernel-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ ocfs2-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ cluster-md-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
+
+ dlm-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
+
+ gfs2-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
+
+ kernel-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
+
+ ocfs2-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
cluster-md-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-SAP-Azure-LI-BYOS-Production
@@ -3565,6 +3613,17 @@
Image SLES12-SP5-Azure-SAP-BYOS:kernel-default-4.12.14-122.225.1
Image SLES12-SP5-Azure-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.225.1
Image SLES12-SP5-EC2-BYOS:kernel-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-BYOS:kernel-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-BYOS:cluster-md-kmp-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-BYOS:dlm-kmp-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-BYOS:gfs2-kmp-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-BYOS:kernel-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:cluster-md-kmp-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:dlm-kmp-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:gfs2-kmp-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:kernel-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:ocfs2-kmp-default-4.12.14-122.225.1
Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:cluster-md-kmp-default-4.12.14-122.225.1
Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:dlm-kmp-default-4.12.14-122.225.1
Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:gfs2-kmp-default-4.12.14-122.225.1
no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2024-41062
--- /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2024-41062.xml 2024-10-20 01:15:19.429853000 +0200
+++ /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2024-41062.xml.new 2024-10-29 01:15:32.091037000 +0100
@@ -14,13 +14,13 @@
1
- 32
- 2024-10-19T23:15:19Z
+ 33
+ 2024-10-29T00:15:31Z
current
2024-08-05T23:10:22Z
- 2024-10-19T23:15:19Z
+ 2024-10-29T00:15:31Z
cve-database/bin/generate-cvrf-cve.pl
2020-12-27T01:00:00Z
@@ -173,6 +173,21 @@
Image SLES12-SP5-Azure-SAP-BYOS
+
+
+ Image SLES12-SP5-GCE-BYOS
+
+
+
+
+ Image SLES12-SP5-GCE-SAP-BYOS
+
+
+
+
+ Image SLES12-SP5-GCE-SAP-On-Demand
+
+
Image SLES15-SP4-SAP-Azure-LI-BYOS
@@ -1970,6 +1985,39 @@
ocfs2-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-Azure-SAP-BYOS
+
+ kernel-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-BYOS
+
+
+ cluster-md-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ dlm-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ gfs2-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ kernel-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ ocfs2-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ cluster-md-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
+
+ dlm-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
+
+ gfs2-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
+
+ kernel-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
+
+ ocfs2-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
cluster-md-kmp-default-5.14.21-150400.24.133.2 as a component of Image SLES15-SP4-SAP-Azure-LI-BYOS
@@ -4095,6 +4143,17 @@
Image SLES12-SP5-Azure-SAP-BYOS:gfs2-kmp-default-4.12.14-122.228.1
Image SLES12-SP5-Azure-SAP-BYOS:kernel-default-4.12.14-122.228.1
Image SLES12-SP5-Azure-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.228.1
+ Image SLES12-SP5-GCE-BYOS:kernel-default-4.12.14-122.228.1
+ Image SLES12-SP5-GCE-SAP-BYOS:cluster-md-kmp-default-4.12.14-122.228.1
+ Image SLES12-SP5-GCE-SAP-BYOS:dlm-kmp-default-4.12.14-122.228.1
+ Image SLES12-SP5-GCE-SAP-BYOS:gfs2-kmp-default-4.12.14-122.228.1
+ Image SLES12-SP5-GCE-SAP-BYOS:kernel-default-4.12.14-122.228.1
+ Image SLES12-SP5-GCE-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.228.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:cluster-md-kmp-default-4.12.14-122.228.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:dlm-kmp-default-4.12.14-122.228.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:gfs2-kmp-default-4.12.14-122.228.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:kernel-default-4.12.14-122.228.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:ocfs2-kmp-default-4.12.14-122.228.1
Image SLES15-SP4-SAP-Azure-LI-BYOS:cluster-md-kmp-default-5.14.21-150400.24.133.2
Image SLES15-SP4-SAP-Azure-LI-BYOS:dlm-kmp-default-5.14.21-150400.24.133.2
Image SLES15-SP4-SAP-Azure-LI-BYOS:gfs2-kmp-default-5.14.21-150400.24.133.2
skipping CVE-2024-41061 as CVE page is older than CVRF-CVE file.
--- /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2024-41060.xml 2024-10-22 01:21:54.490155000 +0200
+++ /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2024-41060.xml.new 2024-10-29 01:15:32.883874000 +0100
@@ -14,13 +14,13 @@
1
- 32
- 2024-10-21T23:21:54Z
+ 33
+ 2024-10-29T00:15:32Z
current
2024-08-05T23:10:22Z
- 2024-10-21T23:21:54Z
+ 2024-10-29T00:15:32Z
cve-database/bin/generate-cvrf-cve.pl
2020-12-27T01:00:00Z
@@ -123,6 +123,21 @@
Image SLES12-SP5-EC2-BYOS
+
+
+ Image SLES12-SP5-GCE-BYOS
+
+
+
+
+ Image SLES12-SP5-GCE-SAP-BYOS
+
+
+
+
+ Image SLES12-SP5-GCE-SAP-On-Demand
+
+
Image SLES12-SP5-SAP-Azure-LI-BYOS-Production
@@ -1699,6 +1714,39 @@
kernel-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-EC2-BYOS
+
+ kernel-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-BYOS
+
+
+ cluster-md-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ dlm-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ gfs2-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ kernel-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ ocfs2-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ cluster-md-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
+
+ dlm-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
+
+ gfs2-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
+
+ kernel-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
+
+ ocfs2-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
cluster-md-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-SAP-Azure-LI-BYOS-Production
@@ -3290,6 +3338,17 @@
Image SLES12-SP5-Azure-SAP-BYOS:kernel-default-4.12.14-122.225.1
Image SLES12-SP5-Azure-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.225.1
Image SLES12-SP5-EC2-BYOS:kernel-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-BYOS:kernel-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-BYOS:cluster-md-kmp-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-BYOS:dlm-kmp-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-BYOS:gfs2-kmp-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-BYOS:kernel-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:cluster-md-kmp-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:dlm-kmp-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:gfs2-kmp-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:kernel-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:ocfs2-kmp-default-4.12.14-122.225.1
Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:cluster-md-kmp-default-4.12.14-122.225.1
Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:dlm-kmp-default-4.12.14-122.225.1
Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:gfs2-kmp-default-4.12.14-122.225.1
no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2024-41059
--- /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2024-41059.xml 2024-10-20 01:15:20.983776000 +0200
+++ /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2024-41059.xml.new 2024-10-29 01:15:33.885842000 +0100
@@ -14,13 +14,13 @@
1
- 42
- 2024-10-19T23:15:20Z
+ 43
+ 2024-10-29T00:15:33Z
current
2024-08-05T23:10:22Z
- 2024-10-19T23:15:20Z
+ 2024-10-29T00:15:33Z
cve-database/bin/generate-cvrf-cve.pl
2020-12-27T01:00:00Z
@@ -358,6 +358,21 @@
Image SLES12-SP5-EC2-BYOS
+
+
+ Image SLES12-SP5-GCE-BYOS
+
+
+
+
+ Image SLES12-SP5-GCE-SAP-BYOS
+
+
+
+
+ Image SLES12-SP5-GCE-SAP-On-Demand
+
+
Image SLES12-SP5-SAP-Azure-LI-BYOS-Production
@@ -2175,24 +2190,42 @@
kernel-livepatch-5_14_21-150400_24_103-default-10-150400.2.1
+
+ kernel-livepatch-5_14_21-150400_24_108-default-10-150400.9.8.1
+
kernel-livepatch-5_14_21-150400_24_108-default-9-150400.9.8.1
kernel-livepatch-5_14_21-150400_24_111-default-7-150400.9.6.1
+
+ kernel-livepatch-5_14_21-150400_24_111-default-8-150400.9.6.1
+
kernel-livepatch-5_14_21-150400_24_116-default-7-150400.9.8.1
+
+ kernel-livepatch-5_14_21-150400_24_116-default-8-150400.9.8.1
+
kernel-livepatch-5_14_21-150400_24_119-default-6-150400.9.6.1
+
+ kernel-livepatch-5_14_21-150400_24_119-default-7-150400.9.6.1
+
kernel-livepatch-5_14_21-150400_24_122-default-4-150400.9.6.1
+
+ kernel-livepatch-5_14_21-150400_24_122-default-5-150400.9.6.1
+
kernel-livepatch-5_14_21-150400_24_125-default-2-150400.9.6.1
+
+ kernel-livepatch-5_14_21-150400_24_125-default-3-150400.9.6.1
+
kernel-livepatch-5_14_21-150400_24_128-default-1-150400.9.3.1
@@ -2220,27 +2253,48 @@
kernel-livepatch-5_14_21-150500_13_30-rt-11-150500.2.1
+
+ kernel-livepatch-5_14_21-150500_13_35-rt-10-150500.11.8.1
+
kernel-livepatch-5_14_21-150500_13_35-rt-9-150500.11.8.1
kernel-livepatch-5_14_21-150500_13_38-rt-7-150500.11.6.1
+
+ kernel-livepatch-5_14_21-150500_13_38-rt-8-150500.11.6.1
+
kernel-livepatch-5_14_21-150500_13_47-rt-7-150500.11.6.1
+
+ kernel-livepatch-5_14_21-150500_13_47-rt-8-150500.11.6.1
+
kernel-livepatch-5_14_21-150500_13_52-rt-5-150500.11.8.1
+
+ kernel-livepatch-5_14_21-150500_13_52-rt-6-150500.11.8.1
+
kernel-livepatch-5_14_21-150500_13_55-rt-5-150500.11.6.1
+
+ kernel-livepatch-5_14_21-150500_13_55-rt-6-150500.11.6.1
+
kernel-livepatch-5_14_21-150500_13_58-rt-4-150500.11.6.1
+
+ kernel-livepatch-5_14_21-150500_13_58-rt-5-150500.11.6.1
+
kernel-livepatch-5_14_21-150500_13_61-rt-2-150500.11.6.1
+
+ kernel-livepatch-5_14_21-150500_13_61-rt-3-150500.11.6.1
+
kernel-livepatch-5_14_21-150500_13_64-rt-1-150500.11.3.1
@@ -2259,24 +2313,42 @@
kernel-livepatch-5_14_21-150500_55_44-default-11-150500.2.1
+
+ kernel-livepatch-5_14_21-150500_55_49-default-10-150500.11.8.1
+
kernel-livepatch-5_14_21-150500_55_49-default-9-150500.11.8.1
kernel-livepatch-5_14_21-150500_55_52-default-7-150500.11.6.1
+
+ kernel-livepatch-5_14_21-150500_55_52-default-8-150500.11.6.1
+
kernel-livepatch-5_14_21-150500_55_59-default-7-150500.11.10.1
+
+ kernel-livepatch-5_14_21-150500_55_59-default-8-150500.11.10.1
+
kernel-livepatch-5_14_21-150500_55_62-default-5-150500.11.6.1
+
+ kernel-livepatch-5_14_21-150500_55_62-default-6-150500.11.6.1
+
kernel-livepatch-5_14_21-150500_55_65-default-5-150500.11.6.1
+
+ kernel-livepatch-5_14_21-150500_55_65-default-6-150500.11.6.1
+
kernel-livepatch-5_14_21-150500_55_68-default-4-150500.11.6.1
+
+ kernel-livepatch-5_14_21-150500_55_68-default-5-150500.11.6.1
+
kernel-livepatch-5_14_21-150500_55_73-default-1-150500.11.3.1
@@ -2301,18 +2373,33 @@
kernel-livepatch-5_3_18-150200_24_183-default-8-150200.5.6.1
+
+ kernel-livepatch-5_3_18-150200_24_183-default-9-150200.5.6.1
+
kernel-livepatch-5_3_18-150200_24_188-default-7-150200.5.6.1
+
+ kernel-livepatch-5_3_18-150200_24_188-default-8-150200.5.6.1
+
kernel-livepatch-5_3_18-150200_24_191-default-6-150200.5.6.1
+
+ kernel-livepatch-5_3_18-150200_24_191-default-7-150200.5.6.1
+
kernel-livepatch-5_3_18-150200_24_194-default-3-150200.5.6.1
+
+ kernel-livepatch-5_3_18-150200_24_194-default-4-150200.5.6.1
+
kernel-livepatch-5_3_18-150200_24_197-default-2-150200.5.6.1
+
+ kernel-livepatch-5_3_18-150200_24_197-default-3-150200.5.6.1
+
kernel-livepatch-5_3_18-150200_24_200-default-1-150200.5.3.1
@@ -2337,18 +2424,33 @@
kernel-livepatch-5_3_18-150300_59_153-default-8-150300.7.6.1
+
+ kernel-livepatch-5_3_18-150300_59_153-default-9-150300.7.6.1
+
kernel-livepatch-5_3_18-150300_59_158-default-7-150300.7.6.1
+
+ kernel-livepatch-5_3_18-150300_59_158-default-8-150300.7.6.1
+
kernel-livepatch-5_3_18-150300_59_161-default-6-150300.7.6.1
+
+ kernel-livepatch-5_3_18-150300_59_161-default-7-150300.7.6.1
+
kernel-livepatch-5_3_18-150300_59_164-default-3-150300.7.6.1
+
+ kernel-livepatch-5_3_18-150300_59_164-default-4-150300.7.6.1
+
kernel-livepatch-5_3_18-150300_59_167-default-2-150300.7.6.1
+
+ kernel-livepatch-5_3_18-150300_59_167-default-3-150300.7.6.1
+
kernel-livepatch-5_3_18-150300_59_170-default-1-150300.7.3.1
@@ -2637,12 +2739,21 @@
kgraft-patch-4_12_14-122_201-default-8-8.10.1
+
+ kgraft-patch-4_12_14-122_201-default-9-8.10.1
+
kgraft-patch-4_12_14-122_216-default-6-8.6.1
+
+ kgraft-patch-4_12_14-122_216-default-7-8.6.1
+
kgraft-patch-4_12_14-122_219-default-3-8.6.1
+
+ kgraft-patch-4_12_14-122_219-default-4-8.6.1
+
kgraft-patch-4_12_14-122_222-default-2-8.6.1
@@ -2811,6 +2922,39 @@
kernel-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-EC2-BYOS
+
+ kernel-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-BYOS
+
+
+ cluster-md-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ dlm-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ gfs2-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ kernel-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ ocfs2-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ cluster-md-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
+
+ dlm-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
+
+ gfs2-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
+
+ kernel-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
+
+ ocfs2-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
cluster-md-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-SAP-Azure-LI-BYOS-Production
@@ -5481,6 +5625,102 @@
kernel-rt-5.14.21-150500.13.64.1 as a component of openSUSE Leap Micro 5.5
+
+ kgraft-patch-4_12_14-122_201-default-9-8.10.1 as a component of SUSE Linux Enterprise Live Patching 12 SP5
+
+
+ kgraft-patch-4_12_14-122_216-default-7-8.6.1 as a component of SUSE Linux Enterprise Live Patching 12 SP5
+
+
+ kgraft-patch-4_12_14-122_219-default-4-8.6.1 as a component of SUSE Linux Enterprise Live Patching 12 SP5
+
+
+ kernel-livepatch-5_3_18-150200_24_183-default-9-150200.5.6.1 as a component of SUSE Linux Enterprise Live Patching 15 SP2
+
+
+ kernel-livepatch-5_3_18-150200_24_188-default-8-150200.5.6.1 as a component of SUSE Linux Enterprise Live Patching 15 SP2
+
+
+ kernel-livepatch-5_3_18-150200_24_191-default-7-150200.5.6.1 as a component of SUSE Linux Enterprise Live Patching 15 SP2
+
+
+ kernel-livepatch-5_3_18-150200_24_194-default-4-150200.5.6.1 as a component of SUSE Linux Enterprise Live Patching 15 SP2
+
+
+ kernel-livepatch-5_3_18-150200_24_197-default-3-150200.5.6.1 as a component of SUSE Linux Enterprise Live Patching 15 SP2
+
+
+ kernel-livepatch-5_3_18-150300_59_153-default-9-150300.7.6.1 as a component of SUSE Linux Enterprise Live Patching 15 SP3
+
+
+ kernel-livepatch-5_3_18-150300_59_158-default-8-150300.7.6.1 as a component of SUSE Linux Enterprise Live Patching 15 SP3
+
+
+ kernel-livepatch-5_3_18-150300_59_161-default-7-150300.7.6.1 as a component of SUSE Linux Enterprise Live Patching 15 SP3
+
+
+ kernel-livepatch-5_3_18-150300_59_164-default-4-150300.7.6.1 as a component of SUSE Linux Enterprise Live Patching 15 SP3
+
+
+ kernel-livepatch-5_3_18-150300_59_167-default-3-150300.7.6.1 as a component of SUSE Linux Enterprise Live Patching 15 SP3
+
+
+ kernel-livepatch-5_14_21-150400_24_108-default-10-150400.9.8.1 as a component of SUSE Linux Enterprise Live Patching 15 SP4
+
+
+ kernel-livepatch-5_14_21-150400_24_111-default-8-150400.9.6.1 as a component of SUSE Linux Enterprise Live Patching 15 SP4
+
+
+ kernel-livepatch-5_14_21-150400_24_116-default-8-150400.9.8.1 as a component of SUSE Linux Enterprise Live Patching 15 SP4
+
+
+ kernel-livepatch-5_14_21-150400_24_119-default-7-150400.9.6.1 as a component of SUSE Linux Enterprise Live Patching 15 SP4
+
+
+ kernel-livepatch-5_14_21-150400_24_122-default-5-150400.9.6.1 as a component of SUSE Linux Enterprise Live Patching 15 SP4
+
+
+ kernel-livepatch-5_14_21-150400_24_125-default-3-150400.9.6.1 as a component of SUSE Linux Enterprise Live Patching 15 SP4
+
+
+ kernel-livepatch-5_14_21-150500_13_35-rt-10-150500.11.8.1 as a component of SUSE Linux Enterprise Live Patching 15 SP5
+
+
+ kernel-livepatch-5_14_21-150500_13_38-rt-8-150500.11.6.1 as a component of SUSE Linux Enterprise Live Patching 15 SP5
+
+
+ kernel-livepatch-5_14_21-150500_13_47-rt-8-150500.11.6.1 as a component of SUSE Linux Enterprise Live Patching 15 SP5
+
+
+ kernel-livepatch-5_14_21-150500_13_52-rt-6-150500.11.8.1 as a component of SUSE Linux Enterprise Live Patching 15 SP5
+
+
+ kernel-livepatch-5_14_21-150500_13_55-rt-6-150500.11.6.1 as a component of SUSE Linux Enterprise Live Patching 15 SP5
+
+
+ kernel-livepatch-5_14_21-150500_13_58-rt-5-150500.11.6.1 as a component of SUSE Linux Enterprise Live Patching 15 SP5
+
+
+ kernel-livepatch-5_14_21-150500_13_61-rt-3-150500.11.6.1 as a component of SUSE Linux Enterprise Live Patching 15 SP5
+
+
+ kernel-livepatch-5_14_21-150500_55_49-default-10-150500.11.8.1 as a component of SUSE Linux Enterprise Live Patching 15 SP5
+
+
+ kernel-livepatch-5_14_21-150500_55_52-default-8-150500.11.6.1 as a component of SUSE Linux Enterprise Live Patching 15 SP5
+
+
+ kernel-livepatch-5_14_21-150500_55_59-default-8-150500.11.10.1 as a component of SUSE Linux Enterprise Live Patching 15 SP5
+
+
+ kernel-livepatch-5_14_21-150500_55_62-default-6-150500.11.6.1 as a component of SUSE Linux Enterprise Live Patching 15 SP5
+
+
+ kernel-livepatch-5_14_21-150500_55_65-default-6-150500.11.6.1 as a component of SUSE Linux Enterprise Live Patching 15 SP5
+
+
+ kernel-livepatch-5_14_21-150500_55_68-default-5-150500.11.6.1 as a component of SUSE Linux Enterprise Live Patching 15 SP5
+
kernel-default as a component of SUSE Linux Enterprise Micro 5.0
@@ -5592,18 +5832,6 @@
kernel-default as a component of SUSE Linux Enterprise Server for SAP Applications 12 SP5
-
- kernel-default-base as a component of SUSE Linux Enterprise Server for SAP Applications 12 SP5
-
-
- kernel-default-devel as a component of SUSE Linux Enterprise Server for SAP Applications 12 SP5
-
-
- kernel-devel as a component of SUSE Linux Enterprise Server for SAP Applications 12 SP5
-
-
- kernel-macros as a component of SUSE Linux Enterprise Server for SAP Applications 12 SP5
-
kernel-source as a component of SUSE Linux Enterprise Server for SAP Applications 12 SP5
@@ -5673,6 +5901,17 @@
Image SLES12-SP5-Azure-SAP-BYOS:kernel-default-4.12.14-122.225.1
Image SLES12-SP5-Azure-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.225.1
Image SLES12-SP5-EC2-BYOS:kernel-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-BYOS:kernel-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-BYOS:cluster-md-kmp-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-BYOS:dlm-kmp-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-BYOS:gfs2-kmp-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-BYOS:kernel-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:cluster-md-kmp-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:dlm-kmp-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:gfs2-kmp-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:kernel-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:ocfs2-kmp-default-4.12.14-122.225.1
Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:cluster-md-kmp-default-4.12.14-122.225.1
Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:dlm-kmp-default-4.12.14-122.225.1
Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:gfs2-kmp-default-4.12.14-122.225.1
@@ -6564,6 +6803,40 @@
openSUSE Leap Micro 5.5:kernel-default-base-5.14.21-150500.55.73.1.150500.6.33.8
openSUSE Leap Micro 5.5:kernel-rt-5.14.21-150500.13.64.1
+
+ SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_201-default-9-8.10.1
+ SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_216-default-7-8.6.1
+ SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-4-8.6.1
+ SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_183-default-9-150200.5.6.1
+ SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_188-default-8-150200.5.6.1
+ SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_191-default-7-150200.5.6.1
+ SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_194-default-4-150200.5.6.1
+ SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_197-default-3-150200.5.6.1
+ SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_153-default-9-150300.7.6.1
+ SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_158-default-8-150300.7.6.1
+ SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_161-default-7-150300.7.6.1
+ SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_164-default-4-150300.7.6.1
+ SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_167-default-3-150300.7.6.1
+ SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_108-default-10-150400.9.8.1
+ SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_111-default-8-150400.9.6.1
+ SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_116-default-8-150400.9.8.1
+ SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_119-default-7-150400.9.6.1
+ SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_122-default-5-150400.9.6.1
+ SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_125-default-3-150400.9.6.1
+ SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_35-rt-10-150500.11.8.1
+ SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_38-rt-8-150500.11.6.1
+ SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_47-rt-8-150500.11.6.1
+ SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_52-rt-6-150500.11.8.1
+ SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_55-rt-6-150500.11.6.1
+ SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-5-150500.11.6.1
+ SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_61-rt-3-150500.11.6.1
+ SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_49-default-10-150500.11.8.1
+ SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_52-default-8-150500.11.6.1
+ SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_59-default-8-150500.11.10.1
+ SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-6-150500.11.6.1
+ SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_65-default-6-150500.11.6.1
+ SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_68-default-5-150500.11.6.1
+
SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-default
SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-default-base
skipping CVE-2024-41058 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-41057 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-41056 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-41055 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-41054 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-41053 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-41052 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-41051 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-41050 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-41049 as CVE page is older than CVRF-CVE file.
--- /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2024-41048.xml 2024-10-16 01:17:01.696738000 +0200
+++ /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2024-41048.xml.new 2024-10-29 01:15:34.590798000 +0100
@@ -14,13 +14,13 @@
1
- 37
- 2024-10-15T23:17:01Z
+ 38
+ 2024-10-29T00:15:34Z
current
2024-08-05T23:10:25Z
- 2024-10-15T23:17:01Z
+ 2024-10-29T00:15:34Z
cve-database/bin/generate-cvrf-cve.pl
2020-12-27T01:00:00Z
@@ -184,6 +184,21 @@
Image SLES12-SP5-EC2-BYOS
+
+
+ Image SLES12-SP5-GCE-BYOS
+
+
+
+
+ Image SLES12-SP5-GCE-SAP-BYOS
+
+
+
+
+ Image SLES12-SP5-GCE-SAP-On-Demand
+
+
Image SLES12-SP5-SAP-Azure-LI-BYOS-Production
@@ -1915,6 +1930,39 @@
kernel-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-EC2-BYOS
+
+ kernel-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-BYOS
+
+
+ cluster-md-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ dlm-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ gfs2-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ kernel-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ ocfs2-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ cluster-md-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
+
+ dlm-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
+
+ gfs2-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
+
+ kernel-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
+
+ ocfs2-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
cluster-md-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-SAP-Azure-LI-BYOS-Production
@@ -3874,6 +3922,17 @@
Image SLES12-SP5-Azure-SAP-BYOS:kernel-default-4.12.14-122.225.1
Image SLES12-SP5-Azure-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.225.1
Image SLES12-SP5-EC2-BYOS:kernel-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-BYOS:kernel-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-BYOS:cluster-md-kmp-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-BYOS:dlm-kmp-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-BYOS:gfs2-kmp-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-BYOS:kernel-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:cluster-md-kmp-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:dlm-kmp-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:gfs2-kmp-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:kernel-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:ocfs2-kmp-default-4.12.14-122.225.1
Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:cluster-md-kmp-default-4.12.14-122.225.1
Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:dlm-kmp-default-4.12.14-122.225.1
Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:gfs2-kmp-default-4.12.14-122.225.1
skipping CVE-2024-41047 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-41046 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-41045 as CVE page is older than CVRF-CVE file.
--- /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2024-41044.xml 2024-10-16 01:17:03.653624000 +0200
+++ /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2024-41044.xml.new 2024-10-29 01:15:35.337777000 +0100
@@ -14,13 +14,13 @@
1
- 39
- 2024-10-15T23:17:03Z
+ 40
+ 2024-10-29T00:15:34Z
current
2024-08-05T23:10:26Z
- 2024-10-15T23:17:03Z
+ 2024-10-29T00:15:34Z
cve-database/bin/generate-cvrf-cve.pl
2020-12-27T01:00:00Z
@@ -129,6 +129,21 @@
Image SLES12-SP5-EC2-BYOS
+
+
+ Image SLES12-SP5-GCE-BYOS
+
+
+
+
+ Image SLES12-SP5-GCE-SAP-BYOS
+
+
+
+
+ Image SLES12-SP5-GCE-SAP-On-Demand
+
+
Image SLES12-SP5-SAP-Azure-LI-BYOS-Production
@@ -2038,6 +2053,39 @@
kernel-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-EC2-BYOS
+
+ kernel-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-BYOS
+
+
+ cluster-md-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ dlm-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ gfs2-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ kernel-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ ocfs2-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ cluster-md-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
+
+ dlm-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
+
+ gfs2-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
+
+ kernel-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
+
+ ocfs2-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
cluster-md-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-SAP-Azure-LI-BYOS-Production
@@ -4096,6 +4144,17 @@
Image SLES12-SP5-Azure-SAP-BYOS:kernel-default-4.12.14-122.225.1
Image SLES12-SP5-Azure-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.225.1
Image SLES12-SP5-EC2-BYOS:kernel-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-BYOS:kernel-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-BYOS:cluster-md-kmp-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-BYOS:dlm-kmp-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-BYOS:gfs2-kmp-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-BYOS:kernel-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:cluster-md-kmp-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:dlm-kmp-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:gfs2-kmp-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:kernel-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:ocfs2-kmp-default-4.12.14-122.225.1
Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:cluster-md-kmp-default-4.12.14-122.225.1
Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:dlm-kmp-default-4.12.14-122.225.1
Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:gfs2-kmp-default-4.12.14-122.225.1
skipping CVE-2024-41043 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-41042 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-41041 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-41040 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-41039 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-41038 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-41037 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-41036 as CVE page is older than CVRF-CVE file.
--- /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2024-41035.xml 2024-10-16 01:17:06.668448000 +0200
+++ /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2024-41035.xml.new 2024-10-29 01:15:36.140202000 +0100
@@ -14,13 +14,13 @@
1
- 28
- 2024-10-15T23:17:06Z
+ 29
+ 2024-10-29T00:15:35Z
current
2024-08-05T23:10:28Z
- 2024-10-15T23:17:06Z
+ 2024-10-29T00:15:35Z
cve-database/bin/generate-cvrf-cve.pl
2020-12-27T01:00:00Z
@@ -126,6 +126,21 @@
Image SLES12-SP5-Azure-SAP-BYOS
+
+
+ Image SLES12-SP5-GCE-BYOS
+
+
+
+
+ Image SLES12-SP5-GCE-SAP-BYOS
+
+
+
+
+ Image SLES12-SP5-GCE-SAP-On-Demand
+
+
Image SLES15-SP5-Azure-Basic
@@ -1739,6 +1754,39 @@
ocfs2-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-Azure-SAP-BYOS
+
+ kernel-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-BYOS
+
+
+ cluster-md-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ dlm-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ gfs2-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ kernel-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ ocfs2-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ cluster-md-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
+
+ dlm-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
+
+ gfs2-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
+
+ kernel-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
+
+ ocfs2-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
kernel-azure-5.14.21-150500.33.66.1 as a component of Image SLES15-SP5-Azure-Basic
@@ -3491,6 +3539,17 @@
Image SLES12-SP5-Azure-SAP-BYOS:gfs2-kmp-default-4.12.14-122.228.1
Image SLES12-SP5-Azure-SAP-BYOS:kernel-default-4.12.14-122.228.1
Image SLES12-SP5-Azure-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.228.1
+ Image SLES12-SP5-GCE-BYOS:kernel-default-4.12.14-122.228.1
+ Image SLES12-SP5-GCE-SAP-BYOS:cluster-md-kmp-default-4.12.14-122.228.1
+ Image SLES12-SP5-GCE-SAP-BYOS:dlm-kmp-default-4.12.14-122.228.1
+ Image SLES12-SP5-GCE-SAP-BYOS:gfs2-kmp-default-4.12.14-122.228.1
+ Image SLES12-SP5-GCE-SAP-BYOS:kernel-default-4.12.14-122.228.1
+ Image SLES12-SP5-GCE-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.228.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:cluster-md-kmp-default-4.12.14-122.228.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:dlm-kmp-default-4.12.14-122.228.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:gfs2-kmp-default-4.12.14-122.228.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:kernel-default-4.12.14-122.228.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:ocfs2-kmp-default-4.12.14-122.228.1
Image SLES15-SP5-Azure-Basic:kernel-azure-5.14.21-150500.33.66.1
Image SLES15-SP5-Azure-Standard:kernel-azure-5.14.21-150500.33.66.1
Image SLES15-SP5-CHOST-BYOS-Aliyun:kernel-default-5.14.21-150500.55.80.2
skipping CVE-2024-41034 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-41033 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-41032 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-41031 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-41030 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-41029 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-41028 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-41027 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-41026 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-41025 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-41024 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-41023 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-41022 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-41021 as CVE page is older than CVRF-CVE file.
--- /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2024-41020.xml 2024-10-16 01:17:12.788630000 +0200
+++ /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2024-41020.xml.new 2024-10-29 01:15:36.994159000 +0100
@@ -14,13 +14,13 @@
1
- 29
- 2024-10-15T23:17:12Z
+ 30
+ 2024-10-29T00:15:36Z
current
2024-08-05T23:10:32Z
- 2024-10-15T23:17:12Z
+ 2024-10-29T00:15:36Z
cve-database/bin/generate-cvrf-cve.pl
2020-12-27T01:00:00Z
@@ -115,6 +115,21 @@
Image SLES12-SP5-Azure-SAP-BYOS
+
+
+ Image SLES12-SP5-GCE-BYOS
+
+
+
+
+ Image SLES12-SP5-GCE-SAP-BYOS
+
+
+
+
+ Image SLES12-SP5-GCE-SAP-On-Demand
+
+
Image SLES15-SP5-Azure-Basic
@@ -1655,6 +1670,39 @@
ocfs2-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-Azure-SAP-BYOS
+
+ kernel-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-BYOS
+
+
+ cluster-md-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ dlm-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ gfs2-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ kernel-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ ocfs2-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ cluster-md-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
+
+ dlm-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
+
+ gfs2-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
+
+ kernel-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
+
+ ocfs2-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
kernel-azure-5.14.21-150500.33.66.1 as a component of Image SLES15-SP5-Azure-Basic
@@ -3322,6 +3370,17 @@
Image SLES12-SP5-Azure-SAP-BYOS:gfs2-kmp-default-4.12.14-122.228.1
Image SLES12-SP5-Azure-SAP-BYOS:kernel-default-4.12.14-122.228.1
Image SLES12-SP5-Azure-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.228.1
+ Image SLES12-SP5-GCE-BYOS:kernel-default-4.12.14-122.228.1
+ Image SLES12-SP5-GCE-SAP-BYOS:cluster-md-kmp-default-4.12.14-122.228.1
+ Image SLES12-SP5-GCE-SAP-BYOS:dlm-kmp-default-4.12.14-122.228.1
+ Image SLES12-SP5-GCE-SAP-BYOS:gfs2-kmp-default-4.12.14-122.228.1
+ Image SLES12-SP5-GCE-SAP-BYOS:kernel-default-4.12.14-122.228.1
+ Image SLES12-SP5-GCE-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.228.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:cluster-md-kmp-default-4.12.14-122.228.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:dlm-kmp-default-4.12.14-122.228.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:gfs2-kmp-default-4.12.14-122.228.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:kernel-default-4.12.14-122.228.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:ocfs2-kmp-default-4.12.14-122.228.1
Image SLES15-SP5-Azure-Basic:kernel-azure-5.14.21-150500.33.66.1
Image SLES15-SP5-Azure-Standard:kernel-azure-5.14.21-150500.33.66.1
Image SLES15-SP5-CHOST-BYOS-Aliyun:kernel-default-5.14.21-150500.55.80.2
skipping CVE-2024-41019 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-41018 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-41017 as CVE page is older than CVRF-CVE file.
--- /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2024-41016.xml 2024-10-17 01:13:54.711723000 +0200
+++ /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2024-41016.xml.new 2024-10-29 01:15:37.728163000 +0100
@@ -14,13 +14,13 @@
1
- 43
- 2024-10-16T23:13:54Z
+ 44
+ 2024-10-29T00:15:37Z
current
2024-08-05T23:10:33Z
- 2024-10-16T23:13:54Z
+ 2024-10-29T00:15:37Z
cve-database/bin/generate-cvrf-cve.pl
2020-12-27T01:00:00Z
@@ -145,6 +145,21 @@
Image SLES12-SP5-EC2-BYOS
+
+
+ Image SLES12-SP5-GCE-BYOS
+
+
+
+
+ Image SLES12-SP5-GCE-SAP-BYOS
+
+
+
+
+ Image SLES12-SP5-GCE-SAP-On-Demand
+
+
Image SLES12-SP5-SAP-Azure-LI-BYOS-Production
@@ -1936,6 +1951,39 @@
kernel-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-EC2-BYOS
+
+ kernel-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-BYOS
+
+
+ cluster-md-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ dlm-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ gfs2-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ kernel-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ ocfs2-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ cluster-md-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
+
+ dlm-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
+
+ gfs2-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
+
+ kernel-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
+
+ ocfs2-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
cluster-md-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-SAP-Azure-LI-BYOS-Production
@@ -3856,6 +3904,17 @@
Image SLES12-SP5-Azure-SAP-BYOS:kernel-default-4.12.14-122.228.1
Image SLES12-SP5-Azure-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.228.1
Image SLES12-SP5-EC2-BYOS:kernel-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-BYOS:kernel-default-4.12.14-122.228.1
+ Image SLES12-SP5-GCE-SAP-BYOS:cluster-md-kmp-default-4.12.14-122.228.1
+ Image SLES12-SP5-GCE-SAP-BYOS:dlm-kmp-default-4.12.14-122.228.1
+ Image SLES12-SP5-GCE-SAP-BYOS:gfs2-kmp-default-4.12.14-122.228.1
+ Image SLES12-SP5-GCE-SAP-BYOS:kernel-default-4.12.14-122.228.1
+ Image SLES12-SP5-GCE-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.228.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:cluster-md-kmp-default-4.12.14-122.228.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:dlm-kmp-default-4.12.14-122.228.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:gfs2-kmp-default-4.12.14-122.228.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:kernel-default-4.12.14-122.228.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:ocfs2-kmp-default-4.12.14-122.228.1
Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:cluster-md-kmp-default-4.12.14-122.225.1
Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:dlm-kmp-default-4.12.14-122.225.1
Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:gfs2-kmp-default-4.12.14-122.225.1
--- /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2024-41015.xml 2024-10-16 01:17:15.700502000 +0200
+++ /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2024-41015.xml.new 2024-10-29 01:15:38.432119000 +0100
@@ -14,13 +14,13 @@
1
- 36
- 2024-10-15T23:17:15Z
+ 37
+ 2024-10-29T00:15:38Z
current
2024-08-05T23:10:33Z
- 2024-10-15T23:17:15Z
+ 2024-10-29T00:15:38Z
cve-database/bin/generate-cvrf-cve.pl
2020-12-27T01:00:00Z
@@ -119,6 +119,21 @@
Image SLES12-SP5-EC2-BYOS
+
+
+ Image SLES12-SP5-GCE-BYOS
+
+
+
+
+ Image SLES12-SP5-GCE-SAP-BYOS
+
+
+
+
+ Image SLES12-SP5-GCE-SAP-On-Demand
+
+
Image SLES12-SP5-SAP-Azure-LI-BYOS-Production
@@ -1871,6 +1886,39 @@
kernel-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-EC2-BYOS
+
+ kernel-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-BYOS
+
+
+ cluster-md-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ dlm-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ gfs2-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ kernel-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ ocfs2-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ cluster-md-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
+
+ dlm-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
+
+ gfs2-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
+
+ kernel-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
+
+ ocfs2-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
cluster-md-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-SAP-Azure-LI-BYOS-Production
@@ -3780,6 +3828,17 @@
Image SLES12-SP5-Azure-SAP-BYOS:kernel-default-4.12.14-122.225.1
Image SLES12-SP5-Azure-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.225.1
Image SLES12-SP5-EC2-BYOS:kernel-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-BYOS:kernel-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-BYOS:cluster-md-kmp-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-BYOS:dlm-kmp-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-BYOS:gfs2-kmp-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-BYOS:kernel-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:cluster-md-kmp-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:dlm-kmp-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:gfs2-kmp-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:kernel-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:ocfs2-kmp-default-4.12.14-122.225.1
Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:cluster-md-kmp-default-4.12.14-122.225.1
Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:dlm-kmp-default-4.12.14-122.225.1
Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:gfs2-kmp-default-4.12.14-122.225.1
--- /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2024-41014.xml 2024-10-22 01:22:26.361962000 +0200
+++ /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2024-41014.xml.new 2024-10-29 01:15:39.162067000 +0100
@@ -14,13 +14,13 @@
1
- 40
- 2024-10-21T23:22:25Z
+ 41
+ 2024-10-29T00:15:38Z
current
2024-07-31T23:09:57Z
- 2024-10-21T23:22:25Z
+ 2024-10-29T00:15:38Z
cve-database/bin/generate-cvrf-cve.pl
2020-12-27T01:00:00Z
@@ -190,6 +190,21 @@
Image SLES12-SP5-EC2-BYOS
+
+
+ Image SLES12-SP5-GCE-BYOS
+
+
+
+
+ Image SLES12-SP5-GCE-SAP-BYOS
+
+
+
+
+ Image SLES12-SP5-GCE-SAP-On-Demand
+
+
Image SLES12-SP5-SAP-Azure-LI-BYOS-Production
@@ -2185,6 +2200,39 @@
kernel-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-EC2-BYOS
+
+ kernel-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-BYOS
+
+
+ cluster-md-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ dlm-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ gfs2-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ kernel-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ ocfs2-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ cluster-md-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
+
+ dlm-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
+
+ gfs2-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
+
+ kernel-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
+
+ ocfs2-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
cluster-md-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-SAP-Azure-LI-BYOS-Production
@@ -4274,6 +4322,17 @@
Image SLES12-SP5-Azure-SAP-BYOS:kernel-default-4.12.14-122.225.1
Image SLES12-SP5-Azure-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.225.1
Image SLES12-SP5-EC2-BYOS:kernel-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-BYOS:kernel-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-BYOS:cluster-md-kmp-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-BYOS:dlm-kmp-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-BYOS:gfs2-kmp-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-BYOS:kernel-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:cluster-md-kmp-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:dlm-kmp-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:gfs2-kmp-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:kernel-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:ocfs2-kmp-default-4.12.14-122.225.1
Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:cluster-md-kmp-default-4.12.14-122.225.1
Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:dlm-kmp-default-4.12.14-122.225.1
Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:gfs2-kmp-default-4.12.14-122.225.1
no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2024-41012
skipping CVE-2024-41013 as CVE page is older than CVRF-CVE file.
--- /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2024-41012.xml 2024-10-20 01:15:38.414854000 +0200
+++ /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2024-41012.xml.new 2024-10-29 01:15:39.996056000 +0100
@@ -14,13 +14,13 @@
1
- 43
- 2024-10-19T23:15:37Z
+ 44
+ 2024-10-29T00:15:39Z
current
2024-07-25T10:03:16Z
- 2024-10-19T23:15:37Z
+ 2024-10-29T00:15:39Z
cve-database/bin/generate-cvrf-cve.pl
2020-12-27T01:00:00Z
@@ -144,6 +144,21 @@
Image SLES12-SP5-Azure-SAP-BYOS
+
+
+ Image SLES12-SP5-GCE-BYOS
+
+
+
+
+ Image SLES12-SP5-GCE-SAP-BYOS
+
+
+
+
+ Image SLES12-SP5-GCE-SAP-On-Demand
+
+
Image SLES15-SP4-CHOST-BYOS
@@ -2186,6 +2201,39 @@
ocfs2-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-Azure-SAP-BYOS
+
+ kernel-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-BYOS
+
+
+ cluster-md-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ dlm-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ gfs2-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ kernel-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ ocfs2-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ cluster-md-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
+
+ dlm-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
+
+ gfs2-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
+
+ kernel-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
+
+ ocfs2-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
kernel-default-5.14.21-150400.24.128.1 as a component of Image SLES15-SP4-CHOST-BYOS
@@ -4531,6 +4579,17 @@
Image SLES12-SP5-Azure-SAP-BYOS:gfs2-kmp-default-4.12.14-122.228.1
Image SLES12-SP5-Azure-SAP-BYOS:kernel-default-4.12.14-122.228.1
Image SLES12-SP5-Azure-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.228.1
+ Image SLES12-SP5-GCE-BYOS:kernel-default-4.12.14-122.228.1
+ Image SLES12-SP5-GCE-SAP-BYOS:cluster-md-kmp-default-4.12.14-122.228.1
+ Image SLES12-SP5-GCE-SAP-BYOS:dlm-kmp-default-4.12.14-122.228.1
+ Image SLES12-SP5-GCE-SAP-BYOS:gfs2-kmp-default-4.12.14-122.228.1
+ Image SLES12-SP5-GCE-SAP-BYOS:kernel-default-4.12.14-122.228.1
+ Image SLES12-SP5-GCE-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.228.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:cluster-md-kmp-default-4.12.14-122.228.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:dlm-kmp-default-4.12.14-122.228.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:gfs2-kmp-default-4.12.14-122.228.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:kernel-default-4.12.14-122.228.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:ocfs2-kmp-default-4.12.14-122.228.1
Image SLES15-SP4-CHOST-BYOS:kernel-default-5.14.21-150400.24.128.1
Image SLES15-SP4-CHOST-BYOS-Aliyun:kernel-default-5.14.21-150400.24.128.1
Image SLES15-SP4-CHOST-BYOS-Azure:kernel-default-5.14.21-150400.24.128.1
skipping CVE-2024-41011 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-41010 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-41009 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-41008 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-41007 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-41006 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-41005 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-41004 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-41003 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-41002 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-41001 as CVE page is older than CVRF-CVE file.
--- /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2024-40999.xml 2024-10-16 01:17:26.314451000 +0200
+++ /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2024-40999.xml.new 2024-10-29 01:15:41.942933000 +0100
@@ -14,13 +14,13 @@
1
- 44
- 2024-10-15T23:17:25Z
+ 45
+ 2024-10-29T00:15:41Z
current
2024-07-16T23:10:06Z
- 2024-10-15T23:17:25Z
+ 2024-10-29T00:15:41Z
cve-database/bin/generate-cvrf-cve.pl
2020-12-27T01:00:00Z
@@ -171,6 +171,21 @@
Image SLES12-SP5-EC2-BYOS
+
+
+ Image SLES12-SP5-GCE-BYOS
+
+
+
+
+ Image SLES12-SP5-GCE-SAP-BYOS
+
+
+
+
+ Image SLES12-SP5-GCE-SAP-On-Demand
+
+
Image SLES12-SP5-SAP-Azure-LI-BYOS-Production
@@ -2178,6 +2193,39 @@
kernel-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-EC2-BYOS
+
+ kernel-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-BYOS
+
+
+ cluster-md-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ dlm-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ gfs2-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ kernel-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ ocfs2-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ cluster-md-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
+
+ dlm-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
+
+ gfs2-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
+
+ kernel-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
+
+ ocfs2-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
cluster-md-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-SAP-Azure-LI-BYOS-Production
@@ -4387,6 +4435,17 @@
Image SLES12-SP5-Azure-SAP-BYOS:kernel-default-4.12.14-122.225.1
Image SLES12-SP5-Azure-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.225.1
Image SLES12-SP5-EC2-BYOS:kernel-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-BYOS:kernel-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-BYOS:cluster-md-kmp-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-BYOS:dlm-kmp-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-BYOS:gfs2-kmp-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-BYOS:kernel-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:cluster-md-kmp-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:dlm-kmp-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:gfs2-kmp-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:kernel-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:ocfs2-kmp-default-4.12.14-122.225.1
Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:cluster-md-kmp-default-4.12.14-122.225.1
Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:dlm-kmp-default-4.12.14-122.225.1
Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:gfs2-kmp-default-4.12.14-122.225.1
--- /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2024-40998.xml 2024-10-16 01:17:27.053887000 +0200
+++ /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2024-40998.xml.new 2024-10-29 01:15:42.664870000 +0100
@@ -14,13 +14,13 @@
1
- 47
- 2024-10-15T23:17:26Z
+ 48
+ 2024-10-29T00:15:42Z
current
2024-07-15T23:09:46Z
- 2024-10-15T23:17:26Z
+ 2024-10-29T00:15:42Z
cve-database/bin/generate-cvrf-cve.pl
2020-12-27T01:00:00Z
@@ -229,6 +229,21 @@
Image SLES12-SP5-EC2-BYOS
+
+
+ Image SLES12-SP5-GCE-BYOS
+
+
+
+
+ Image SLES12-SP5-GCE-SAP-BYOS
+
+
+
+
+ Image SLES12-SP5-GCE-SAP-On-Demand
+
+
Image SLES12-SP5-SAP-Azure-LI-BYOS-Production
@@ -2274,6 +2289,39 @@
kernel-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-EC2-BYOS
+
+ kernel-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-BYOS
+
+
+ cluster-md-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ dlm-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ gfs2-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ kernel-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ ocfs2-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ cluster-md-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
+
+ dlm-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
+
+ gfs2-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
+
+ kernel-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
+
+ ocfs2-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
cluster-md-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-SAP-Azure-LI-BYOS-Production
@@ -4558,6 +4606,17 @@
Image SLES12-SP5-Azure-SAP-BYOS:kernel-default-4.12.14-122.225.1
Image SLES12-SP5-Azure-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.225.1
Image SLES12-SP5-EC2-BYOS:kernel-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-BYOS:kernel-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-BYOS:cluster-md-kmp-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-BYOS:dlm-kmp-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-BYOS:gfs2-kmp-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-BYOS:kernel-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:cluster-md-kmp-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:dlm-kmp-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:gfs2-kmp-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:kernel-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:ocfs2-kmp-default-4.12.14-122.225.1
Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:cluster-md-kmp-default-4.12.14-122.225.1
Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:dlm-kmp-default-4.12.14-122.225.1
Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:gfs2-kmp-default-4.12.14-122.225.1
skipping CVE-2024-40997 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-40996 as CVE page is older than CVRF-CVE file.
--- /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2024-40995.xml 2024-10-16 01:17:28.071858000 +0200
+++ /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2024-40995.xml.new 2024-10-29 01:15:43.448854000 +0100
@@ -14,13 +14,13 @@
1
- 38
- 2024-10-15T23:17:27Z
+ 39
+ 2024-10-29T00:15:42Z
current
2024-07-15T23:09:47Z
- 2024-10-15T23:17:27Z
+ 2024-10-29T00:15:42Z
cve-database/bin/generate-cvrf-cve.pl
2020-12-27T01:00:00Z
@@ -151,6 +151,21 @@
Image SLES12-SP5-EC2-BYOS
+
+
+ Image SLES12-SP5-GCE-BYOS
+
+
+
+
+ Image SLES12-SP5-GCE-SAP-BYOS
+
+
+
+
+ Image SLES12-SP5-GCE-SAP-On-Demand
+
+
Image SLES12-SP5-SAP-Azure-LI-BYOS-Production
@@ -1772,6 +1787,39 @@
kernel-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-EC2-BYOS
+
+ kernel-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-BYOS
+
+
+ cluster-md-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ dlm-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ gfs2-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ kernel-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ ocfs2-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ cluster-md-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
+
+ dlm-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
+
+ gfs2-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
+
+ kernel-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
+
+ ocfs2-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
cluster-md-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-SAP-Azure-LI-BYOS-Production
@@ -3553,6 +3601,17 @@
Image SLES12-SP5-Azure-SAP-BYOS:kernel-default-4.12.14-122.225.1
Image SLES12-SP5-Azure-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.225.1
Image SLES12-SP5-EC2-BYOS:kernel-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-BYOS:kernel-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-BYOS:cluster-md-kmp-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-BYOS:dlm-kmp-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-BYOS:gfs2-kmp-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-BYOS:kernel-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:cluster-md-kmp-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:dlm-kmp-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:gfs2-kmp-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:kernel-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:ocfs2-kmp-default-4.12.14-122.225.1
Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:cluster-md-kmp-default-4.12.14-122.225.1
Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:dlm-kmp-default-4.12.14-122.225.1
Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:gfs2-kmp-default-4.12.14-122.225.1
skipping CVE-2024-40994 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-40993 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-40992 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-40991 as CVE page is older than CVRF-CVE file.
--- /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2024-40990.xml 2024-10-22 01:22:40.980720000 +0200
+++ /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2024-40990.xml.new 2024-10-29 01:15:44.538816000 +0100
@@ -14,13 +14,13 @@
1
- 36
- 2024-10-21T23:22:40Z
+ 37
+ 2024-10-29T00:15:43Z
current
2024-07-15T23:09:48Z
- 2024-10-21T23:22:40Z
+ 2024-10-29T00:15:43Z
cve-database/bin/generate-cvrf-cve.pl
2020-12-27T01:00:00Z
@@ -120,6 +120,21 @@
Image SLES12-SP5-EC2-BYOS
+
+
+ Image SLES12-SP5-GCE-BYOS
+
+
+
+
+ Image SLES12-SP5-GCE-SAP-BYOS
+
+
+
+
+ Image SLES12-SP5-GCE-SAP-On-Demand
+
+
Image SLES12-SP5-SAP-Azure-LI-BYOS-Production
@@ -1795,6 +1810,39 @@
kernel-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-EC2-BYOS
+
+ kernel-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-BYOS
+
+
+ cluster-md-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ dlm-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ gfs2-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ kernel-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ ocfs2-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ cluster-md-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
+
+ dlm-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
+
+ gfs2-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
+
+ kernel-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
+
+ ocfs2-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
cluster-md-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-SAP-Azure-LI-BYOS-Production
@@ -3510,6 +3558,17 @@
Image SLES12-SP5-Azure-SAP-BYOS:kernel-default-4.12.14-122.225.1
Image SLES12-SP5-Azure-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.225.1
Image SLES12-SP5-EC2-BYOS:kernel-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-BYOS:kernel-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-BYOS:cluster-md-kmp-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-BYOS:dlm-kmp-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-BYOS:gfs2-kmp-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-BYOS:kernel-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:cluster-md-kmp-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:dlm-kmp-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:gfs2-kmp-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:kernel-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:ocfs2-kmp-default-4.12.14-122.225.1
Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:cluster-md-kmp-default-4.12.14-122.225.1
Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:dlm-kmp-default-4.12.14-122.225.1
Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:gfs2-kmp-default-4.12.14-122.225.1
skipping CVE-2024-40989 as CVE page is older than CVRF-CVE file.
--- /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2024-40988.xml 2024-10-16 01:17:31.090683000 +0200
+++ /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2024-40988.xml.new 2024-10-29 01:15:45.324247000 +0100
@@ -14,13 +14,13 @@
1
- 37
- 2024-10-15T23:17:30Z
+ 38
+ 2024-10-29T00:15:44Z
current
2024-07-16T23:10:09Z
- 2024-10-15T23:17:30Z
+ 2024-10-29T00:15:44Z
cve-database/bin/generate-cvrf-cve.pl
2020-12-27T01:00:00Z
@@ -122,6 +122,21 @@
Image SLES12-SP5-EC2-BYOS
+
+
+ Image SLES12-SP5-GCE-BYOS
+
+
+
+
+ Image SLES12-SP5-GCE-SAP-BYOS
+
+
+
+
+ Image SLES12-SP5-GCE-SAP-On-Demand
+
+
Image SLES12-SP5-SAP-Azure-LI-BYOS-Production
@@ -1944,6 +1959,39 @@
kernel-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-EC2-BYOS
+
+ kernel-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-BYOS
+
+
+ cluster-md-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ dlm-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ gfs2-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ kernel-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ ocfs2-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ cluster-md-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
+
+ dlm-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
+
+ gfs2-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
+
+ kernel-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
+
+ ocfs2-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
cluster-md-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-SAP-Azure-LI-BYOS-Production
@@ -3933,6 +3981,17 @@
Image SLES12-SP5-Azure-SAP-BYOS:kernel-default-4.12.14-122.225.1
Image SLES12-SP5-Azure-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.225.1
Image SLES12-SP5-EC2-BYOS:kernel-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-BYOS:kernel-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-BYOS:cluster-md-kmp-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-BYOS:dlm-kmp-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-BYOS:gfs2-kmp-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-BYOS:kernel-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:cluster-md-kmp-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:dlm-kmp-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:gfs2-kmp-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:kernel-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:ocfs2-kmp-default-4.12.14-122.225.1
Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:cluster-md-kmp-default-4.12.14-122.225.1
Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:dlm-kmp-default-4.12.14-122.225.1
Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:gfs2-kmp-default-4.12.14-122.225.1
--- /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2024-40987.xml 2024-10-16 01:17:31.845634000 +0200
+++ /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2024-40987.xml.new 2024-10-29 01:15:46.021193000 +0100
@@ -14,13 +14,13 @@
1
- 39
- 2024-10-15T23:17:31Z
+ 40
+ 2024-10-29T00:15:45Z
current
2024-07-25T10:03:19Z
- 2024-10-15T23:17:31Z
+ 2024-10-29T00:15:45Z
cve-database/bin/generate-cvrf-cve.pl
2020-12-27T01:00:00Z
@@ -118,6 +118,21 @@
Image SLES12-SP5-EC2-BYOS
+
+
+ Image SLES12-SP5-GCE-BYOS
+
+
+
+
+ Image SLES12-SP5-GCE-SAP-BYOS
+
+
+
+
+ Image SLES12-SP5-GCE-SAP-On-Demand
+
+
Image SLES12-SP5-SAP-Azure-LI-BYOS-Production
@@ -1870,6 +1885,39 @@
kernel-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-EC2-BYOS
+
+ kernel-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-BYOS
+
+
+ cluster-md-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ dlm-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ gfs2-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ kernel-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ ocfs2-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ cluster-md-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
+
+ dlm-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
+
+ gfs2-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
+
+ kernel-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
+
+ ocfs2-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
cluster-md-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-SAP-Azure-LI-BYOS-Production
@@ -3778,6 +3826,17 @@
Image SLES12-SP5-Azure-SAP-BYOS:kernel-default-4.12.14-122.225.1
Image SLES12-SP5-Azure-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.225.1
Image SLES12-SP5-EC2-BYOS:kernel-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-BYOS:kernel-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-BYOS:cluster-md-kmp-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-BYOS:dlm-kmp-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-BYOS:gfs2-kmp-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-BYOS:kernel-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:cluster-md-kmp-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:dlm-kmp-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:gfs2-kmp-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:kernel-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:ocfs2-kmp-default-4.12.14-122.225.1
Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:cluster-md-kmp-default-4.12.14-122.225.1
Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:dlm-kmp-default-4.12.14-122.225.1
Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:gfs2-kmp-default-4.12.14-122.225.1
skipping CVE-2024-40986 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-40985 as CVE page is older than CVRF-CVE file.
--- /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2024-40984.xml 2024-10-16 01:17:33.375571000 +0200
+++ /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2024-40984.xml.new 2024-10-29 01:15:46.738157000 +0100
@@ -14,13 +14,13 @@
1
- 36
- 2024-10-15T23:17:32Z
+ 37
+ 2024-10-29T00:15:46Z
current
2024-07-15T23:09:49Z
- 2024-10-15T23:17:32Z
+ 2024-10-29T00:15:46Z
cve-database/bin/generate-cvrf-cve.pl
2020-12-27T01:00:00Z
@@ -128,6 +128,21 @@
Image SLES12-SP5-Azure-SAP-BYOS
+
+
+ Image SLES12-SP5-GCE-BYOS
+
+
+
+
+ Image SLES12-SP5-GCE-SAP-BYOS
+
+
+
+
+ Image SLES12-SP5-GCE-SAP-On-Demand
+
+
Image SLES15-SP5-Azure-Basic
@@ -1943,6 +1958,39 @@
ocfs2-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-Azure-SAP-BYOS
+
+ kernel-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-BYOS
+
+
+ cluster-md-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ dlm-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ gfs2-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ kernel-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ ocfs2-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ cluster-md-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
+
+ dlm-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
+
+ gfs2-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
+
+ kernel-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
+
+ ocfs2-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
kernel-azure-5.14.21-150500.33.63.1 as a component of Image SLES15-SP5-Azure-Basic
@@ -3925,6 +3973,17 @@
Image SLES12-SP5-Azure-SAP-BYOS:gfs2-kmp-default-4.12.14-122.228.1
Image SLES12-SP5-Azure-SAP-BYOS:kernel-default-4.12.14-122.228.1
Image SLES12-SP5-Azure-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.228.1
+ Image SLES12-SP5-GCE-BYOS:kernel-default-4.12.14-122.228.1
+ Image SLES12-SP5-GCE-SAP-BYOS:cluster-md-kmp-default-4.12.14-122.228.1
+ Image SLES12-SP5-GCE-SAP-BYOS:dlm-kmp-default-4.12.14-122.228.1
+ Image SLES12-SP5-GCE-SAP-BYOS:gfs2-kmp-default-4.12.14-122.228.1
+ Image SLES12-SP5-GCE-SAP-BYOS:kernel-default-4.12.14-122.228.1
+ Image SLES12-SP5-GCE-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.228.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:cluster-md-kmp-default-4.12.14-122.228.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:dlm-kmp-default-4.12.14-122.228.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:gfs2-kmp-default-4.12.14-122.228.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:kernel-default-4.12.14-122.228.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:ocfs2-kmp-default-4.12.14-122.228.1
Image SLES15-SP5-Azure-Basic:kernel-azure-5.14.21-150500.33.63.1
Image SLES15-SP5-Azure-Standard:kernel-azure-5.14.21-150500.33.63.1
Image SLES15-SP5-BYOS-Azure:kernel-default-5.14.21-150500.55.73.1
skipping CVE-2024-40983 as CVE page is older than CVRF-CVE file.
--- /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2024-40982.xml 2024-10-16 01:17:34.835474000 +0200
+++ /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2024-40982.xml.new 2024-10-29 01:15:47.469118000 +0100
@@ -14,13 +14,13 @@
1
- 37
- 2024-10-15T23:17:34Z
+ 38
+ 2024-10-29T00:15:47Z
current
2024-07-15T23:09:50Z
- 2024-10-15T23:17:34Z
+ 2024-10-29T00:15:47Z
cve-database/bin/generate-cvrf-cve.pl
2020-12-27T01:00:00Z
@@ -126,6 +126,21 @@
Image SLES12-SP5-EC2-BYOS
+
+
+ Image SLES12-SP5-GCE-BYOS
+
+
+
+
+ Image SLES12-SP5-GCE-SAP-BYOS
+
+
+
+
+ Image SLES12-SP5-GCE-SAP-On-Demand
+
+
Image SLES12-SP5-SAP-Azure-LI-BYOS-Production
@@ -1886,6 +1901,39 @@
kernel-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-EC2-BYOS
+
+ kernel-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-BYOS
+
+
+ cluster-md-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ dlm-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ gfs2-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ kernel-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ ocfs2-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ cluster-md-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
+
+ dlm-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
+
+ gfs2-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
+
+ kernel-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
+
+ ocfs2-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
cluster-md-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-SAP-Azure-LI-BYOS-Production
@@ -3820,6 +3868,17 @@
Image SLES12-SP5-Azure-SAP-BYOS:kernel-default-4.12.14-122.225.1
Image SLES12-SP5-Azure-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.225.1
Image SLES12-SP5-EC2-BYOS:kernel-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-BYOS:kernel-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-BYOS:cluster-md-kmp-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-BYOS:dlm-kmp-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-BYOS:gfs2-kmp-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-BYOS:kernel-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:cluster-md-kmp-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:dlm-kmp-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:gfs2-kmp-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:kernel-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:ocfs2-kmp-default-4.12.14-122.225.1
Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:cluster-md-kmp-default-4.12.14-122.225.1
Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:dlm-kmp-default-4.12.14-122.225.1
Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:gfs2-kmp-default-4.12.14-122.225.1
skipping CVE-2024-40981 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-40980 as CVE page is older than CVRF-CVE file.
--- /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2024-40978.xml 2024-10-16 01:17:37.064839000 +0200
+++ /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2024-40978.xml.new 2024-10-29 01:15:48.821063000 +0100
@@ -14,13 +14,13 @@
1
- 38
- 2024-10-15T23:17:36Z
+ 39
+ 2024-10-29T00:15:48Z
current
2024-07-16T23:10:11Z
- 2024-10-15T23:17:36Z
+ 2024-10-29T00:15:48Z
cve-database/bin/generate-cvrf-cve.pl
2020-12-27T01:00:00Z
@@ -169,6 +169,21 @@
Image SLES12-SP5-EC2-BYOS
+
+
+ Image SLES12-SP5-GCE-BYOS
+
+
+
+
+ Image SLES12-SP5-GCE-SAP-BYOS
+
+
+
+
+ Image SLES12-SP5-GCE-SAP-On-Demand
+
+
Image SLES12-SP5-SAP-Azure-LI-BYOS-Production
@@ -1882,6 +1897,39 @@
kernel-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-EC2-BYOS
+
+ kernel-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-BYOS
+
+
+ cluster-md-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ dlm-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ gfs2-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ kernel-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ ocfs2-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ cluster-md-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
+
+ dlm-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
+
+ gfs2-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
+
+ kernel-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
+
+ ocfs2-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
cluster-md-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-SAP-Azure-LI-BYOS-Production
@@ -3768,6 +3816,17 @@
Image SLES12-SP5-Azure-SAP-BYOS:kernel-default-4.12.14-122.225.1
Image SLES12-SP5-Azure-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.225.1
Image SLES12-SP5-EC2-BYOS:kernel-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-BYOS:kernel-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-BYOS:cluster-md-kmp-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-BYOS:dlm-kmp-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-BYOS:gfs2-kmp-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-BYOS:kernel-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:cluster-md-kmp-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:dlm-kmp-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:gfs2-kmp-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:kernel-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:ocfs2-kmp-default-4.12.14-122.225.1
Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:cluster-md-kmp-default-4.12.14-122.225.1
Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:dlm-kmp-default-4.12.14-122.225.1
Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:gfs2-kmp-default-4.12.14-122.225.1
no cpe found for SUSE Linux Enterprise Module for Confidential Computing Technical Preview 15 SP6 in CVE-2024-40973
skipping CVE-2024-40976 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-40975 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-40974 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-40972 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-40971 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-40970 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-40969 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-40968 as CVE page is older than CVRF-CVE file.
--- /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2024-40967.xml 2024-10-16 01:17:41.900600000 +0200
+++ /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2024-40967.xml.new 2024-10-29 01:15:50.214993000 +0100
@@ -14,13 +14,13 @@
1
- 38
- 2024-10-15T23:17:41Z
+ 39
+ 2024-10-29T00:15:49Z
current
2024-07-16T23:10:15Z
- 2024-10-15T23:17:41Z
+ 2024-10-29T00:15:49Z
cve-database/bin/generate-cvrf-cve.pl
2020-12-27T01:00:00Z
@@ -122,6 +122,21 @@
Image SLES12-SP5-EC2-BYOS
+
+
+ Image SLES12-SP5-GCE-BYOS
+
+
+
+
+ Image SLES12-SP5-GCE-SAP-BYOS
+
+
+
+
+ Image SLES12-SP5-GCE-SAP-On-Demand
+
+
Image SLES12-SP5-SAP-Azure-LI-BYOS-Production
@@ -1861,6 +1876,39 @@
kernel-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-EC2-BYOS
+
+ kernel-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-BYOS
+
+
+ cluster-md-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ dlm-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ gfs2-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ kernel-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ ocfs2-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ cluster-md-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
+
+ dlm-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
+
+ gfs2-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
+
+ kernel-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
+
+ ocfs2-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
cluster-md-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-SAP-Azure-LI-BYOS-Production
@@ -3776,6 +3824,17 @@
Image SLES12-SP5-Azure-SAP-BYOS:kernel-default-4.12.14-122.225.1
Image SLES12-SP5-Azure-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.225.1
Image SLES12-SP5-EC2-BYOS:kernel-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-BYOS:kernel-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-BYOS:cluster-md-kmp-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-BYOS:dlm-kmp-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-BYOS:gfs2-kmp-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-BYOS:kernel-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:cluster-md-kmp-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:dlm-kmp-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:gfs2-kmp-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:kernel-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:ocfs2-kmp-default-4.12.14-122.225.1
Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:cluster-md-kmp-default-4.12.14-122.225.1
Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:dlm-kmp-default-4.12.14-122.225.1
Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:gfs2-kmp-default-4.12.14-122.225.1
--- /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2024-40966.xml 2024-10-16 01:17:42.694584000 +0200
+++ /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2024-40966.xml.new 2024-10-29 01:15:50.952956000 +0100
@@ -14,13 +14,13 @@
1
- 45
- 2024-10-15T23:17:42Z
+ 46
+ 2024-10-29T00:15:50Z
current
2024-07-16T23:10:16Z
- 2024-10-15T23:17:42Z
+ 2024-10-29T00:15:50Z
cve-database/bin/generate-cvrf-cve.pl
2020-12-27T01:00:00Z
@@ -178,6 +178,21 @@
Image SLES12-SP5-EC2-BYOS
+
+
+ Image SLES12-SP5-GCE-BYOS
+
+
+
+
+ Image SLES12-SP5-GCE-SAP-BYOS
+
+
+
+
+ Image SLES12-SP5-GCE-SAP-On-Demand
+
+
Image SLES12-SP5-SAP-Azure-LI-BYOS-Production
@@ -2185,6 +2200,39 @@
kernel-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-EC2-BYOS
+
+ kernel-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-BYOS
+
+
+ cluster-md-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ dlm-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ gfs2-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ kernel-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ ocfs2-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ cluster-md-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
+
+ dlm-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
+
+ gfs2-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
+
+ kernel-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
+
+ ocfs2-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
cluster-md-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-SAP-Azure-LI-BYOS-Production
@@ -4401,6 +4449,17 @@
Image SLES12-SP5-Azure-SAP-BYOS:kernel-default-4.12.14-122.225.1
Image SLES12-SP5-Azure-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.225.1
Image SLES12-SP5-EC2-BYOS:kernel-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-BYOS:kernel-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-BYOS:cluster-md-kmp-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-BYOS:dlm-kmp-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-BYOS:gfs2-kmp-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-BYOS:kernel-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:cluster-md-kmp-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:dlm-kmp-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:gfs2-kmp-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:kernel-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:ocfs2-kmp-default-4.12.14-122.225.1
Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:cluster-md-kmp-default-4.12.14-122.225.1
Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:dlm-kmp-default-4.12.14-122.225.1
Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:gfs2-kmp-default-4.12.14-122.225.1
no cpe found for SUSE Linux Enterprise Module for Confidential Computing Technical Preview 15 SP6 in CVE-2024-40965
skipping CVE-2024-40964 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-40963 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-40962 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-40961 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-40960 as CVE page is older than CVRF-CVE file.
--- /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2024-40959.xml 2024-10-18 01:15:35.298556000 +0200
+++ /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2024-40959.xml.new 2024-10-29 01:15:52.706839000 +0100
@@ -14,13 +14,13 @@
1
- 42
- 2024-10-17T23:15:34Z
+ 43
+ 2024-10-29T00:15:52Z
current
2024-07-16T23:10:17Z
- 2024-10-17T23:15:34Z
+ 2024-10-29T00:15:52Z
cve-database/bin/generate-cvrf-cve.pl
2020-12-27T01:00:00Z
@@ -169,6 +169,21 @@
Image SLES12-SP5-EC2-BYOS
+
+
+ Image SLES12-SP5-GCE-BYOS
+
+
+
+
+ Image SLES12-SP5-GCE-SAP-BYOS
+
+
+
+
+ Image SLES12-SP5-GCE-SAP-On-Demand
+
+
Image SLES12-SP5-SAP-Azure-LI-BYOS-Production
@@ -2072,6 +2087,39 @@
kernel-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-EC2-BYOS
+
+ kernel-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-BYOS
+
+
+ cluster-md-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ dlm-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ gfs2-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ kernel-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ ocfs2-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ cluster-md-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
+
+ dlm-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
+
+ gfs2-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
+
+ kernel-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
+
+ ocfs2-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
cluster-md-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-SAP-Azure-LI-BYOS-Production
@@ -4146,6 +4194,17 @@
Image SLES12-SP5-Azure-SAP-BYOS:kernel-default-4.12.14-122.225.1
Image SLES12-SP5-Azure-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.225.1
Image SLES12-SP5-EC2-BYOS:kernel-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-BYOS:kernel-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-BYOS:cluster-md-kmp-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-BYOS:dlm-kmp-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-BYOS:gfs2-kmp-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-BYOS:kernel-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:cluster-md-kmp-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:dlm-kmp-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:gfs2-kmp-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:kernel-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:ocfs2-kmp-default-4.12.14-122.225.1
Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:cluster-md-kmp-default-4.12.14-122.225.1
Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:dlm-kmp-default-4.12.14-122.225.1
Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:gfs2-kmp-default-4.12.14-122.225.1
no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2024-40954
skipping CVE-2024-40958 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-40957 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-40956 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-40955 as CVE page is older than CVRF-CVE file.
--- /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2024-40954.xml 2024-10-20 01:16:02.532101000 +0200
+++ /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2024-40954.xml.new 2024-10-29 01:15:53.620913000 +0100
@@ -14,13 +14,13 @@
1
- 48
- 2024-10-19T23:16:02Z
+ 49
+ 2024-10-29T00:15:52Z
current
2024-07-15T23:09:53Z
- 2024-10-19T23:16:02Z
+ 2024-10-29T00:15:52Z
cve-database/bin/generate-cvrf-cve.pl
2020-12-27T01:00:00Z
@@ -1983,24 +1983,42 @@
kernel-livepatch-5_14_21-150400_24_103-default-10-150400.2.1
+
+ kernel-livepatch-5_14_21-150400_24_108-default-10-150400.9.8.1
+
kernel-livepatch-5_14_21-150400_24_108-default-9-150400.9.8.1
kernel-livepatch-5_14_21-150400_24_111-default-7-150400.9.6.1
+
+ kernel-livepatch-5_14_21-150400_24_111-default-8-150400.9.6.1
+
kernel-livepatch-5_14_21-150400_24_116-default-7-150400.9.8.1
+
+ kernel-livepatch-5_14_21-150400_24_116-default-8-150400.9.8.1
+
kernel-livepatch-5_14_21-150400_24_119-default-6-150400.9.6.1
+
+ kernel-livepatch-5_14_21-150400_24_119-default-7-150400.9.6.1
+
kernel-livepatch-5_14_21-150400_24_122-default-4-150400.9.6.1
+
+ kernel-livepatch-5_14_21-150400_24_122-default-5-150400.9.6.1
+
kernel-livepatch-5_14_21-150400_24_125-default-2-150400.9.6.1
+
+ kernel-livepatch-5_14_21-150400_24_125-default-3-150400.9.6.1
+
kernel-livepatch-5_14_21-150400_24_128-default-1-150400.9.3.1
@@ -2028,27 +2046,48 @@
kernel-livepatch-5_14_21-150500_13_30-rt-11-150500.2.1
+
+ kernel-livepatch-5_14_21-150500_13_35-rt-10-150500.11.8.1
+
kernel-livepatch-5_14_21-150500_13_35-rt-9-150500.11.8.1
kernel-livepatch-5_14_21-150500_13_38-rt-7-150500.11.6.1
+
+ kernel-livepatch-5_14_21-150500_13_38-rt-8-150500.11.6.1
+
kernel-livepatch-5_14_21-150500_13_47-rt-7-150500.11.6.1
+
+ kernel-livepatch-5_14_21-150500_13_47-rt-8-150500.11.6.1
+
kernel-livepatch-5_14_21-150500_13_52-rt-5-150500.11.8.1
+
+ kernel-livepatch-5_14_21-150500_13_52-rt-6-150500.11.8.1
+
kernel-livepatch-5_14_21-150500_13_55-rt-5-150500.11.6.1
+
+ kernel-livepatch-5_14_21-150500_13_55-rt-6-150500.11.6.1
+
kernel-livepatch-5_14_21-150500_13_58-rt-4-150500.11.6.1
+
+ kernel-livepatch-5_14_21-150500_13_58-rt-5-150500.11.6.1
+
kernel-livepatch-5_14_21-150500_13_61-rt-2-150500.11.6.1
+
+ kernel-livepatch-5_14_21-150500_13_61-rt-3-150500.11.6.1
+
kernel-livepatch-5_14_21-150500_13_64-rt-1-150500.11.3.1
@@ -2067,48 +2106,81 @@
kernel-livepatch-5_14_21-150500_55_44-default-11-150500.2.1
+
+ kernel-livepatch-5_14_21-150500_55_49-default-10-150500.11.8.1
+
kernel-livepatch-5_14_21-150500_55_49-default-9-150500.11.8.1
kernel-livepatch-5_14_21-150500_55_52-default-7-150500.11.6.1
+
+ kernel-livepatch-5_14_21-150500_55_52-default-8-150500.11.6.1
+
kernel-livepatch-5_14_21-150500_55_59-default-7-150500.11.10.1
+
+ kernel-livepatch-5_14_21-150500_55_59-default-8-150500.11.10.1
+
kernel-livepatch-5_14_21-150500_55_62-default-5-150500.11.6.1
+
+ kernel-livepatch-5_14_21-150500_55_62-default-6-150500.11.6.1
+
kernel-livepatch-5_14_21-150500_55_65-default-5-150500.11.6.1
+
+ kernel-livepatch-5_14_21-150500_55_65-default-6-150500.11.6.1
+
kernel-livepatch-5_14_21-150500_55_68-default-4-150500.11.6.1
+
+ kernel-livepatch-5_14_21-150500_55_68-default-5-150500.11.6.1
+
kernel-livepatch-5_14_21-150500_55_73-default-1-150500.11.3.1
kernel-livepatch-6_4_0-150600_10_5-rt-3-150600.1.8.1
+
+ kernel-livepatch-6_4_0-150600_10_5-rt-4-150600.1.8.1
+
kernel-livepatch-6_4_0-150600_10_8-rt-1-150600.1.3.2
kernel-livepatch-6_4_0-150600_21-default-5-150600.1.1
+
+ kernel-livepatch-6_4_0-150600_21-default-6-150600.4.10.1
+
kernel-livepatch-6_4_0-150600_23_14-default-3-150600.13.6.1
+
+ kernel-livepatch-6_4_0-150600_23_14-default-4-150600.13.6.1
+
kernel-livepatch-6_4_0-150600_23_17-default-3-150600.13.6.1
+
+ kernel-livepatch-6_4_0-150600_23_17-default-4-150600.13.6.1
+
kernel-livepatch-6_4_0-150600_23_22-default-1-150600.13.3.3
kernel-livepatch-6_4_0-150600_23_7-default-3-150600.13.6.1
+
+ kernel-livepatch-6_4_0-150600_23_7-default-4-150600.13.6.1
+
kernel-livepatch-6_4_0-150600_8-rt-4-150600.3.1
@@ -4524,6 +4596,78 @@
kernel-rt-5.14.21-150500.13.64.1 as a component of openSUSE Leap Micro 5.5
+
+ kernel-livepatch-5_14_21-150400_24_108-default-10-150400.9.8.1 as a component of SUSE Linux Enterprise Live Patching 15 SP4
+
+
+ kernel-livepatch-5_14_21-150400_24_111-default-8-150400.9.6.1 as a component of SUSE Linux Enterprise Live Patching 15 SP4
+
+
+ kernel-livepatch-5_14_21-150400_24_116-default-8-150400.9.8.1 as a component of SUSE Linux Enterprise Live Patching 15 SP4
+
+
+ kernel-livepatch-5_14_21-150400_24_119-default-7-150400.9.6.1 as a component of SUSE Linux Enterprise Live Patching 15 SP4
+
+
+ kernel-livepatch-5_14_21-150400_24_122-default-5-150400.9.6.1 as a component of SUSE Linux Enterprise Live Patching 15 SP4
+
+
+ kernel-livepatch-5_14_21-150400_24_125-default-3-150400.9.6.1 as a component of SUSE Linux Enterprise Live Patching 15 SP4
+
+
+ kernel-livepatch-5_14_21-150500_13_35-rt-10-150500.11.8.1 as a component of SUSE Linux Enterprise Live Patching 15 SP5
+
+
+ kernel-livepatch-5_14_21-150500_13_38-rt-8-150500.11.6.1 as a component of SUSE Linux Enterprise Live Patching 15 SP5
+
+
+ kernel-livepatch-5_14_21-150500_13_47-rt-8-150500.11.6.1 as a component of SUSE Linux Enterprise Live Patching 15 SP5
+
+
+ kernel-livepatch-5_14_21-150500_13_52-rt-6-150500.11.8.1 as a component of SUSE Linux Enterprise Live Patching 15 SP5
+
+
+ kernel-livepatch-5_14_21-150500_13_55-rt-6-150500.11.6.1 as a component of SUSE Linux Enterprise Live Patching 15 SP5
+
+
+ kernel-livepatch-5_14_21-150500_13_58-rt-5-150500.11.6.1 as a component of SUSE Linux Enterprise Live Patching 15 SP5
+
+
+ kernel-livepatch-5_14_21-150500_13_61-rt-3-150500.11.6.1 as a component of SUSE Linux Enterprise Live Patching 15 SP5
+
+
+ kernel-livepatch-5_14_21-150500_55_49-default-10-150500.11.8.1 as a component of SUSE Linux Enterprise Live Patching 15 SP5
+
+
+ kernel-livepatch-5_14_21-150500_55_52-default-8-150500.11.6.1 as a component of SUSE Linux Enterprise Live Patching 15 SP5
+
+
+ kernel-livepatch-5_14_21-150500_55_59-default-8-150500.11.10.1 as a component of SUSE Linux Enterprise Live Patching 15 SP5
+
+
+ kernel-livepatch-5_14_21-150500_55_62-default-6-150500.11.6.1 as a component of SUSE Linux Enterprise Live Patching 15 SP5
+
+
+ kernel-livepatch-5_14_21-150500_55_65-default-6-150500.11.6.1 as a component of SUSE Linux Enterprise Live Patching 15 SP5
+
+
+ kernel-livepatch-5_14_21-150500_55_68-default-5-150500.11.6.1 as a component of SUSE Linux Enterprise Live Patching 15 SP5
+
+
+ kernel-livepatch-6_4_0-150600_10_5-rt-4-150600.1.8.1 as a component of SUSE Linux Enterprise Live Patching 15 SP6
+
+
+ kernel-livepatch-6_4_0-150600_21-default-6-150600.4.10.1 as a component of SUSE Linux Enterprise Live Patching 15 SP6
+
+
+ kernel-livepatch-6_4_0-150600_23_14-default-4-150600.13.6.1 as a component of SUSE Linux Enterprise Live Patching 15 SP6
+
+
+ kernel-livepatch-6_4_0-150600_23_17-default-4-150600.13.6.1 as a component of SUSE Linux Enterprise Live Patching 15 SP6
+
+
+ kernel-livepatch-6_4_0-150600_23_7-default-4-150600.13.6.1 as a component of SUSE Linux Enterprise Live Patching 15 SP6
+
kernel-default as a component of SUSE Enterprise Storage 7.1
@@ -4854,24 +4998,9 @@
kernel-default as a component of SUSE Linux Enterprise Server for SAP Applications 12 SP5
-
- kernel-default-base as a component of SUSE Linux Enterprise Server for SAP Applications 12 SP5
-
-
- kernel-default-devel as a component of SUSE Linux Enterprise Server for SAP Applications 12 SP5
-
-
- kernel-devel as a component of SUSE Linux Enterprise Server for SAP Applications 12 SP5
-
-
- kernel-macros as a component of SUSE Linux Enterprise Server for SAP Applications 12 SP5
-
kernel-source as a component of SUSE Linux Enterprise Server for SAP Applications 12 SP5
-
- kernel-devel-azure as a component of SUSE Linux Enterprise Server for SAP Applications 12 SP5
-
kernel-source-azure as a component of SUSE Linux Enterprise Server for SAP Applications 12 SP5
@@ -5699,6 +5828,32 @@
openSUSE Leap Micro 5.5:kernel-default-base-5.14.21-150500.55.73.1.150500.6.33.8
openSUSE Leap Micro 5.5:kernel-rt-5.14.21-150500.13.64.1
+
+ SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_108-default-10-150400.9.8.1
+ SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_111-default-8-150400.9.6.1
+ SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_116-default-8-150400.9.8.1
+ SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_119-default-7-150400.9.6.1
+ SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_122-default-5-150400.9.6.1
+ SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_125-default-3-150400.9.6.1
+ SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_35-rt-10-150500.11.8.1
+ SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_38-rt-8-150500.11.6.1
+ SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_47-rt-8-150500.11.6.1
+ SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_52-rt-6-150500.11.8.1
+ SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_55-rt-6-150500.11.6.1
+ SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-5-150500.11.6.1
+ SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_61-rt-3-150500.11.6.1
+ SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_49-default-10-150500.11.8.1
+ SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_52-default-8-150500.11.6.1
+ SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_59-default-8-150500.11.10.1
+ SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-6-150500.11.6.1
+ SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_65-default-6-150500.11.6.1
+ SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_68-default-5-150500.11.6.1
+ SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_10_5-rt-4-150600.1.8.1
+ SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_21-default-6-150600.4.10.1
+ SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_14-default-4-150600.13.6.1
+ SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_17-default-4-150600.13.6.1
+ SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_7-default-4-150600.13.6.1
+
SUSE Enterprise Storage 7.1:kernel-default
SUSE Enterprise Storage 7.1:kernel-default-devel
@@ -5810,11 +5965,6 @@
SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros
SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source
SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default
- SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base
- SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel
- SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel
- SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure
- SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros
SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source
SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure
SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default
--- /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2024-40953.xml 2024-10-16 01:17:52.964505000 +0200
+++ /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2024-40953.xml.new 2024-10-29 01:15:54.466784000 +0100
@@ -14,13 +14,13 @@
1
- 45
- 2024-10-15T23:17:52Z
+ 46
+ 2024-10-29T00:15:53Z
current
2024-07-15T23:09:53Z
- 2024-10-15T23:17:52Z
+ 2024-10-29T00:15:53Z
cve-database/bin/generate-cvrf-cve.pl
2020-12-27T01:00:00Z
@@ -217,6 +217,21 @@
Image SLES12-SP5-EC2-BYOS
+
+
+ Image SLES12-SP5-GCE-BYOS
+
+
+
+
+ Image SLES12-SP5-GCE-SAP-BYOS
+
+
+
+
+ Image SLES12-SP5-GCE-SAP-On-Demand
+
+
Image SLES12-SP5-SAP-Azure-LI-BYOS-Production
@@ -2224,6 +2239,39 @@
kernel-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-EC2-BYOS
+
+ kernel-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-BYOS
+
+
+ cluster-md-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ dlm-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ gfs2-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ kernel-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ ocfs2-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ cluster-md-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
+
+ dlm-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
+
+ gfs2-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
+
+ kernel-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
+
+ ocfs2-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
cluster-md-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-SAP-Azure-LI-BYOS-Production
@@ -4479,6 +4527,17 @@
Image SLES12-SP5-Azure-SAP-BYOS:kernel-default-4.12.14-122.225.1
Image SLES12-SP5-Azure-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.225.1
Image SLES12-SP5-EC2-BYOS:kernel-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-BYOS:kernel-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-BYOS:cluster-md-kmp-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-BYOS:dlm-kmp-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-BYOS:gfs2-kmp-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-BYOS:kernel-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:cluster-md-kmp-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:dlm-kmp-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:gfs2-kmp-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:kernel-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:ocfs2-kmp-default-4.12.14-122.225.1
Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:cluster-md-kmp-default-4.12.14-122.225.1
Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:dlm-kmp-default-4.12.14-122.225.1
Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:gfs2-kmp-default-4.12.14-122.225.1
skipping CVE-2024-40952 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-40951 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-40950 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-40949 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-40948 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-40947 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-40945 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-40944 as CVE page is older than CVRF-CVE file.
--- /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2024-40943.xml 2024-10-22 01:23:11.723173000 +0200
+++ /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2024-40943.xml.new 2024-10-29 01:15:55.391232000 +0100
@@ -14,13 +14,13 @@
1
- 37
- 2024-10-21T23:23:11Z
+ 38
+ 2024-10-29T00:15:54Z
current
2024-07-15T23:09:55Z
- 2024-10-21T23:23:11Z
+ 2024-10-29T00:15:54Z
cve-database/bin/generate-cvrf-cve.pl
2020-12-27T01:00:00Z
@@ -170,6 +170,21 @@
Image SLES12-SP5-EC2-BYOS
+
+
+ Image SLES12-SP5-GCE-BYOS
+
+
+
+
+ Image SLES12-SP5-GCE-SAP-BYOS
+
+
+
+
+ Image SLES12-SP5-GCE-SAP-On-Demand
+
+
Image SLES12-SP5-SAP-Azure-LI-BYOS-Production
@@ -1856,6 +1871,39 @@
kernel-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-EC2-BYOS
+
+ kernel-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-BYOS
+
+
+ cluster-md-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ dlm-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ gfs2-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ kernel-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ ocfs2-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ cluster-md-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
+
+ dlm-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
+
+ gfs2-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
+
+ kernel-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
+
+ ocfs2-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
cluster-md-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-SAP-Azure-LI-BYOS-Production
@@ -3639,6 +3687,17 @@
Image SLES12-SP5-Azure-SAP-BYOS:kernel-default-4.12.14-122.225.1
Image SLES12-SP5-Azure-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.225.1
Image SLES12-SP5-EC2-BYOS:kernel-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-BYOS:kernel-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-BYOS:cluster-md-kmp-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-BYOS:dlm-kmp-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-BYOS:gfs2-kmp-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-BYOS:kernel-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:cluster-md-kmp-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:dlm-kmp-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:gfs2-kmp-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:kernel-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:ocfs2-kmp-default-4.12.14-122.225.1
Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:cluster-md-kmp-default-4.12.14-122.225.1
Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:dlm-kmp-default-4.12.14-122.225.1
Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:gfs2-kmp-default-4.12.14-122.225.1
--- /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2024-40942.xml 2024-10-16 01:18:00.008677000 +0200
+++ /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2024-40942.xml.new 2024-10-29 01:15:56.183220000 +0100
@@ -14,13 +14,13 @@
1
- 39
- 2024-10-15T23:17:59Z
+ 40
+ 2024-10-29T00:15:55Z
current
2024-07-15T23:09:55Z
- 2024-10-15T23:17:59Z
+ 2024-10-29T00:15:55Z
cve-database/bin/generate-cvrf-cve.pl
2020-12-27T01:00:00Z
@@ -167,6 +167,21 @@
Image SLES12-SP5-EC2-BYOS
+
+
+ Image SLES12-SP5-GCE-BYOS
+
+
+
+
+ Image SLES12-SP5-GCE-SAP-BYOS
+
+
+
+
+ Image SLES12-SP5-GCE-SAP-On-Demand
+
+
Image SLES12-SP5-SAP-Azure-LI-BYOS-Production
@@ -1919,6 +1934,39 @@
kernel-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-EC2-BYOS
+
+ kernel-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-BYOS
+
+
+ cluster-md-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ dlm-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ gfs2-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ kernel-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ ocfs2-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ cluster-md-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
+
+ dlm-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
+
+ gfs2-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
+
+ kernel-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
+
+ ocfs2-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
cluster-md-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-SAP-Azure-LI-BYOS-Production
@@ -3876,6 +3924,17 @@
Image SLES12-SP5-Azure-SAP-BYOS:kernel-default-4.12.14-122.225.1
Image SLES12-SP5-Azure-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.225.1
Image SLES12-SP5-EC2-BYOS:kernel-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-BYOS:kernel-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-BYOS:cluster-md-kmp-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-BYOS:dlm-kmp-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-BYOS:gfs2-kmp-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-BYOS:kernel-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:cluster-md-kmp-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:dlm-kmp-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:gfs2-kmp-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:kernel-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:ocfs2-kmp-default-4.12.14-122.225.1
Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:cluster-md-kmp-default-4.12.14-122.225.1
Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:dlm-kmp-default-4.12.14-122.225.1
Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:gfs2-kmp-default-4.12.14-122.225.1
--- /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2024-40941.xml 2024-10-16 01:18:00.985582000 +0200
+++ /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2024-40941.xml.new 2024-10-29 01:15:57.962085000 +0100
@@ -14,13 +14,13 @@
1
- 43
- 2024-10-15T23:18:00Z
+ 44
+ 2024-10-29T00:15:56Z
current
2024-07-15T23:09:56Z
- 2024-10-15T23:18:00Z
+ 2024-10-29T00:15:56Z
cve-database/bin/generate-cvrf-cve.pl
2020-12-27T01:00:00Z
@@ -127,6 +127,21 @@
Image SLES12-SP5-EC2-BYOS
+
+
+ Image SLES12-SP5-GCE-BYOS
+
+
+
+
+ Image SLES12-SP5-GCE-SAP-BYOS
+
+
+
+
+ Image SLES12-SP5-GCE-SAP-On-Demand
+
+
Image SLES12-SP5-SAP-Azure-LI-BYOS-Production
@@ -2015,6 +2030,39 @@
kernel-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-EC2-BYOS
+
+ kernel-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-BYOS
+
+
+ cluster-md-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ dlm-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ gfs2-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ kernel-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ ocfs2-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ cluster-md-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
+
+ dlm-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
+
+ gfs2-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
+
+ kernel-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
+
+ ocfs2-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
cluster-md-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-SAP-Azure-LI-BYOS-Production
@@ -4060,6 +4108,17 @@
Image SLES12-SP5-Azure-SAP-BYOS:kernel-default-4.12.14-122.225.1
Image SLES12-SP5-Azure-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.225.1
Image SLES12-SP5-EC2-BYOS:kernel-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-BYOS:kernel-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-BYOS:cluster-md-kmp-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-BYOS:dlm-kmp-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-BYOS:gfs2-kmp-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-BYOS:kernel-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:cluster-md-kmp-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:dlm-kmp-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:gfs2-kmp-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:kernel-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:ocfs2-kmp-default-4.12.14-122.225.1
Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:cluster-md-kmp-default-4.12.14-122.225.1
Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:dlm-kmp-default-4.12.14-122.225.1
Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:gfs2-kmp-default-4.12.14-122.225.1
no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2024-40937
skipping CVE-2024-40940 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-40939 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-40938 as CVE page is older than CVRF-CVE file.
--- /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2024-40937.xml 2024-10-20 01:16:09.296725000 +0200
+++ /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2024-40937.xml.new 2024-10-29 01:15:58.876019000 +0100
@@ -14,13 +14,13 @@
1
- 44
- 2024-10-19T23:16:08Z
+ 45
+ 2024-10-29T00:15:58Z
current
2024-07-15T23:09:56Z
- 2024-10-19T23:16:08Z
+ 2024-10-29T00:15:58Z
cve-database/bin/generate-cvrf-cve.pl
2020-12-27T01:00:00Z
@@ -207,6 +207,21 @@
Image SLES12-SP5-EC2-BYOS
+
+
+ Image SLES12-SP5-GCE-BYOS
+
+
+
+
+ Image SLES12-SP5-GCE-SAP-BYOS
+
+
+
+
+ Image SLES12-SP5-GCE-SAP-On-Demand
+
+
Image SLES12-SP5-SAP-Azure-LI-BYOS-Production
@@ -2675,6 +2690,39 @@
kernel-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-EC2-BYOS
+
+ kernel-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-BYOS
+
+
+ cluster-md-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ dlm-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ gfs2-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ kernel-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ ocfs2-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ cluster-md-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
+
+ dlm-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
+
+ gfs2-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
+
+ kernel-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
+
+ ocfs2-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
cluster-md-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-SAP-Azure-LI-BYOS-Production
@@ -5560,6 +5608,17 @@
Image SLES12-SP5-Azure-SAP-BYOS:kernel-default-4.12.14-122.225.1
Image SLES12-SP5-Azure-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.225.1
Image SLES12-SP5-EC2-BYOS:kernel-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-BYOS:kernel-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-BYOS:cluster-md-kmp-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-BYOS:dlm-kmp-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-BYOS:gfs2-kmp-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-BYOS:kernel-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:cluster-md-kmp-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:dlm-kmp-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:gfs2-kmp-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:kernel-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:ocfs2-kmp-default-4.12.14-122.225.1
Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:cluster-md-kmp-default-4.12.14-122.225.1
Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:dlm-kmp-default-4.12.14-122.225.1
Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:gfs2-kmp-default-4.12.14-122.225.1
skipping CVE-2024-40936 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-40935 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-40934 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-40933 as CVE page is older than CVRF-CVE file.
--- /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2024-40932.xml 2024-10-22 01:23:18.931715000 +0200
+++ /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2024-40932.xml.new 2024-10-29 01:15:59.707017000 +0100
@@ -14,13 +14,13 @@
1
- 35
- 2024-10-21T23:23:18Z
+ 36
+ 2024-10-29T00:15:59Z
current
2024-07-15T23:09:58Z
- 2024-10-21T23:23:18Z
+ 2024-10-29T00:15:59Z
cve-database/bin/generate-cvrf-cve.pl
2020-12-27T01:00:00Z
@@ -118,6 +118,21 @@
Image SLES12-SP5-EC2-BYOS
+
+
+ Image SLES12-SP5-GCE-BYOS
+
+
+
+
+ Image SLES12-SP5-GCE-SAP-BYOS
+
+
+
+
+ Image SLES12-SP5-GCE-SAP-On-Demand
+
+
Image SLES12-SP5-SAP-Azure-LI-BYOS-Production
@@ -1804,6 +1819,39 @@
kernel-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-EC2-BYOS
+
+ kernel-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-BYOS
+
+
+ cluster-md-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ dlm-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ gfs2-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ kernel-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ ocfs2-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ cluster-md-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
+
+ dlm-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
+
+ gfs2-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
+
+ kernel-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
+
+ ocfs2-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
cluster-md-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-SAP-Azure-LI-BYOS-Production
@@ -3535,6 +3583,17 @@
Image SLES12-SP5-Azure-SAP-BYOS:kernel-default-4.12.14-122.225.1
Image SLES12-SP5-Azure-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.225.1
Image SLES12-SP5-EC2-BYOS:kernel-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-BYOS:kernel-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-BYOS:cluster-md-kmp-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-BYOS:dlm-kmp-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-BYOS:gfs2-kmp-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-BYOS:kernel-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:cluster-md-kmp-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:dlm-kmp-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:gfs2-kmp-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:kernel-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:ocfs2-kmp-default-4.12.14-122.225.1
Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:cluster-md-kmp-default-4.12.14-122.225.1
Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:dlm-kmp-default-4.12.14-122.225.1
Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:gfs2-kmp-default-4.12.14-122.225.1
skipping CVE-2024-40931 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-40930 as CVE page is older than CVRF-CVE file.
--- /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2024-40929.xml 2024-10-16 01:18:09.492672000 +0200
+++ /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2024-40929.xml.new 2024-10-29 01:16:00.480963000 +0100
@@ -14,13 +14,13 @@
1
- 42
- 2024-10-15T23:18:08Z
+ 43
+ 2024-10-29T00:15:59Z
current
2024-07-15T23:09:59Z
- 2024-10-15T23:18:08Z
+ 2024-10-29T00:15:59Z
cve-database/bin/generate-cvrf-cve.pl
2020-12-27T01:00:00Z
@@ -124,6 +124,21 @@
Image SLES12-SP5-EC2-BYOS
+
+
+ Image SLES12-SP5-GCE-BYOS
+
+
+
+
+ Image SLES12-SP5-GCE-SAP-BYOS
+
+
+
+
+ Image SLES12-SP5-GCE-SAP-On-Demand
+
+
Image SLES12-SP5-SAP-Azure-LI-BYOS-Production
@@ -2012,6 +2027,39 @@
kernel-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-EC2-BYOS
+
+ kernel-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-BYOS
+
+
+ cluster-md-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ dlm-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ gfs2-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ kernel-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ ocfs2-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ cluster-md-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
+
+ dlm-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
+
+ gfs2-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
+
+ kernel-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
+
+ ocfs2-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
cluster-md-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-SAP-Azure-LI-BYOS-Production
@@ -4054,6 +4102,17 @@
Image SLES12-SP5-Azure-SAP-BYOS:kernel-default-4.12.14-122.225.1
Image SLES12-SP5-Azure-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.225.1
Image SLES12-SP5-EC2-BYOS:kernel-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-BYOS:kernel-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-BYOS:cluster-md-kmp-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-BYOS:dlm-kmp-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-BYOS:gfs2-kmp-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-BYOS:kernel-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:cluster-md-kmp-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:dlm-kmp-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:gfs2-kmp-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:kernel-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:ocfs2-kmp-default-4.12.14-122.225.1
Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:cluster-md-kmp-default-4.12.14-122.225.1
Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:dlm-kmp-default-4.12.14-122.225.1
Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:gfs2-kmp-default-4.12.14-122.225.1
skipping CVE-2024-40928 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-40927 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-40926 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-40925 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-40924 as CVE page is older than CVRF-CVE file.
--- /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2024-40923.xml 2024-10-16 01:18:14.101419000 +0200
+++ /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2024-40923.xml.new 2024-10-29 01:16:01.486881000 +0100
@@ -14,13 +14,13 @@
1
- 44
- 2024-10-15T23:18:13Z
+ 45
+ 2024-10-29T00:16:01Z
current
2024-07-15T23:10:00Z
- 2024-10-15T23:18:13Z
+ 2024-10-29T00:16:01Z
cve-database/bin/generate-cvrf-cve.pl
2020-12-27T01:00:00Z
@@ -237,6 +237,21 @@
Image SLES12-SP5-EC2-BYOS
+
+
+ Image SLES12-SP5-GCE-BYOS
+
+
+
+
+ Image SLES12-SP5-GCE-SAP-BYOS
+
+
+
+
+ Image SLES12-SP5-GCE-SAP-On-Demand
+
+
Image SLES12-SP5-SAP-Azure-LI-BYOS-Production
@@ -2226,6 +2241,39 @@
kernel-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-EC2-BYOS
+
+ kernel-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-BYOS
+
+
+ cluster-md-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ dlm-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ gfs2-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ kernel-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ ocfs2-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ cluster-md-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
+
+ dlm-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
+
+ gfs2-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
+
+ kernel-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
+
+ ocfs2-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
cluster-md-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-SAP-Azure-LI-BYOS-Production
@@ -4489,6 +4537,17 @@
Image SLES12-SP5-Azure-SAP-BYOS:kernel-default-4.12.14-122.225.1
Image SLES12-SP5-Azure-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.225.1
Image SLES12-SP5-EC2-BYOS:kernel-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-BYOS:kernel-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-BYOS:cluster-md-kmp-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-BYOS:dlm-kmp-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-BYOS:gfs2-kmp-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-BYOS:kernel-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:cluster-md-kmp-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:dlm-kmp-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:gfs2-kmp-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:kernel-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:ocfs2-kmp-default-4.12.14-122.225.1
Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:cluster-md-kmp-default-4.12.14-122.225.1
Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:dlm-kmp-default-4.12.14-122.225.1
Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:gfs2-kmp-default-4.12.14-122.225.1
skipping CVE-2024-40922 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-40921 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-40920 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-40919 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-40918 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-40917 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-40916 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-40915 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-40914 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-40913 as CVE page is older than CVRF-CVE file.
--- /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2024-40912.xml 2024-10-16 01:18:19.514637000 +0200
+++ /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2024-40912.xml.new 2024-10-29 01:16:02.256868000 +0100
@@ -14,13 +14,13 @@
1
- 42
- 2024-10-15T23:18:19Z
+ 43
+ 2024-10-29T00:16:01Z
current
2024-07-15T23:10:03Z
- 2024-10-15T23:18:19Z
+ 2024-10-29T00:16:01Z
cve-database/bin/generate-cvrf-cve.pl
2020-12-27T01:00:00Z
@@ -186,6 +186,21 @@
Image SLES12-SP5-EC2-BYOS
+
+
+ Image SLES12-SP5-GCE-BYOS
+
+
+
+
+ Image SLES12-SP5-GCE-SAP-BYOS
+
+
+
+
+ Image SLES12-SP5-GCE-SAP-On-Demand
+
+
Image SLES12-SP5-SAP-Azure-LI-BYOS-Production
@@ -2095,6 +2110,39 @@
kernel-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-EC2-BYOS
+
+ kernel-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-BYOS
+
+
+ cluster-md-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ dlm-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ gfs2-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ kernel-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ ocfs2-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ cluster-md-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
+
+ dlm-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
+
+ gfs2-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
+
+ kernel-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
+
+ ocfs2-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
cluster-md-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-SAP-Azure-LI-BYOS-Production
@@ -4214,6 +4262,17 @@
Image SLES12-SP5-Azure-SAP-BYOS:kernel-default-4.12.14-122.225.1
Image SLES12-SP5-Azure-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.225.1
Image SLES12-SP5-EC2-BYOS:kernel-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-BYOS:kernel-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-BYOS:cluster-md-kmp-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-BYOS:dlm-kmp-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-BYOS:gfs2-kmp-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-BYOS:kernel-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:cluster-md-kmp-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:dlm-kmp-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:gfs2-kmp-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:kernel-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:ocfs2-kmp-default-4.12.14-122.225.1
Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:cluster-md-kmp-default-4.12.14-122.225.1
Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:dlm-kmp-default-4.12.14-122.225.1
Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:gfs2-kmp-default-4.12.14-122.225.1
skipping CVE-2024-40911 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-40910 as CVE page is older than CVRF-CVE file.
--- /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2024-40909.xml 2024-10-22 01:23:35.888832000 +0200
+++ /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2024-40909.xml.new 2024-10-29 01:16:02.995805000 +0100
@@ -14,13 +14,13 @@
1
- 43
- 2024-10-21T23:23:35Z
+ 44
+ 2024-10-29T00:16:02Z
current
2024-07-15T23:10:04Z
- 2024-10-21T23:23:35Z
+ 2024-10-29T00:16:02Z
cve-database/bin/generate-cvrf-cve.pl
2020-12-27T01:00:00Z
@@ -1508,30 +1508,48 @@
kernel-livepatch-5_14_21-150500_13_58-rt-4-150500.11.6.1
+
+ kernel-livepatch-5_14_21-150500_13_58-rt-5-150500.11.6.1
+
kernel-livepatch-5_14_21-150500_13_61-rt-2-150500.11.6.1
+
+ kernel-livepatch-5_14_21-150500_13_61-rt-3-150500.11.6.1
+
kernel-livepatch-5_14_21-150500_13_64-rt-1-150500.11.3.1
kernel-livepatch-5_14_21-150500_55_68-default-4-150500.11.6.1
+
+ kernel-livepatch-5_14_21-150500_55_68-default-5-150500.11.6.1
+
kernel-livepatch-5_14_21-150500_55_73-default-1-150500.11.3.1
kernel-livepatch-6_4_0-150600_10_5-rt-3-150600.1.8.1
+
+ kernel-livepatch-6_4_0-150600_10_5-rt-4-150600.1.8.1
+
kernel-livepatch-6_4_0-150600_10_8-rt-1-150600.1.3.2
kernel-livepatch-6_4_0-150600_23_14-default-3-150600.13.6.1
+
+ kernel-livepatch-6_4_0-150600_23_14-default-4-150600.13.6.1
+
kernel-livepatch-6_4_0-150600_23_17-default-3-150600.13.6.1
+
+ kernel-livepatch-6_4_0-150600_23_17-default-4-150600.13.6.1
+
kernel-livepatch-6_4_0-150600_23_22-default-1-150600.13.3.3
@@ -3053,6 +3071,24 @@
klp-build-0~20240812.ad9f0e0-1.1 as a component of openSUSE Tumbleweed
+
+ kernel-livepatch-5_14_21-150500_13_58-rt-5-150500.11.6.1 as a component of SUSE Linux Enterprise Live Patching 15 SP5
+
+
+ kernel-livepatch-5_14_21-150500_13_61-rt-3-150500.11.6.1 as a component of SUSE Linux Enterprise Live Patching 15 SP5
+
+
+ kernel-livepatch-5_14_21-150500_55_68-default-5-150500.11.6.1 as a component of SUSE Linux Enterprise Live Patching 15 SP5
+
+
+ kernel-livepatch-6_4_0-150600_10_5-rt-4-150600.1.8.1 as a component of SUSE Linux Enterprise Live Patching 15 SP6
+
+
+ kernel-livepatch-6_4_0-150600_23_14-default-4-150600.13.6.1 as a component of SUSE Linux Enterprise Live Patching 15 SP6
+
+
+ kernel-livepatch-6_4_0-150600_23_17-default-4-150600.13.6.1 as a component of SUSE Linux Enterprise Live Patching 15 SP6
+
kernel-default as a component of SUSE Enterprise Storage 7.1
@@ -4047,6 +4083,14 @@
openSUSE Leap Micro 5.5:kernel-rt-5.14.21-150500.13.64.1
openSUSE Tumbleweed:klp-build-0~20240812.ad9f0e0-1.1
+
+ SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-5-150500.11.6.1
+ SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_61-rt-3-150500.11.6.1
+ SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_68-default-5-150500.11.6.1
+ SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_10_5-rt-4-150600.1.8.1
+ SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_14-default-4-150600.13.6.1
+ SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_17-default-4-150600.13.6.1
+
SUSE Enterprise Storage 7.1:kernel-default
SUSE Enterprise Storage 7.1:kernel-default-devel
skipping CVE-2024-40908 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-40907 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-40906 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-40905 as CVE page is older than CVRF-CVE file.
--- /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2024-40904.xml 2024-10-17 01:14:37.499505000 +0200
+++ /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2024-40904.xml.new 2024-10-29 01:16:03.927766000 +0100
@@ -14,13 +14,13 @@
1
- 38
- 2024-10-16T23:14:37Z
+ 39
+ 2024-10-29T00:16:03Z
current
2024-07-15T23:10:05Z
- 2024-10-16T23:14:37Z
+ 2024-10-29T00:16:03Z
cve-database/bin/generate-cvrf-cve.pl
2020-12-27T01:00:00Z
@@ -155,6 +155,21 @@
Image SLES12-SP5-EC2-BYOS
+
+
+ Image SLES12-SP5-GCE-BYOS
+
+
+
+
+ Image SLES12-SP5-GCE-SAP-BYOS
+
+
+
+
+ Image SLES12-SP5-GCE-SAP-On-Demand
+
+
Image SLES12-SP5-SAP-Azure-LI-BYOS-Production
@@ -1959,6 +1974,39 @@
kernel-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-EC2-BYOS
+
+ kernel-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-BYOS
+
+
+ cluster-md-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ dlm-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ gfs2-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ kernel-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ ocfs2-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ cluster-md-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
+
+ dlm-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
+
+ gfs2-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
+
+ kernel-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
+
+ ocfs2-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
cluster-md-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-SAP-Azure-LI-BYOS-Production
@@ -3963,6 +4011,17 @@
Image SLES12-SP5-Azure-SAP-BYOS:kernel-default-4.12.14-122.225.1
Image SLES12-SP5-Azure-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.225.1
Image SLES12-SP5-EC2-BYOS:kernel-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-BYOS:kernel-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-BYOS:cluster-md-kmp-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-BYOS:dlm-kmp-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-BYOS:gfs2-kmp-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-BYOS:kernel-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:cluster-md-kmp-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:dlm-kmp-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:gfs2-kmp-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:kernel-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:ocfs2-kmp-default-4.12.14-122.225.1
Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:cluster-md-kmp-default-4.12.14-122.225.1
Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:dlm-kmp-default-4.12.14-122.225.1
Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:gfs2-kmp-default-4.12.14-122.225.1
skipping CVE-2024-40903 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-40902 as CVE page is older than CVRF-CVE file.
--- /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2024-40901.xml 2024-10-16 01:18:24.614865000 +0200
+++ /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2024-40901.xml.new 2024-10-29 01:16:04.624286000 +0100
@@ -14,13 +14,13 @@
1
- 45
- 2024-10-15T23:18:24Z
+ 46
+ 2024-10-29T00:16:04Z
current
2024-07-15T23:10:05Z
- 2024-10-15T23:18:24Z
+ 2024-10-29T00:16:04Z
cve-database/bin/generate-cvrf-cve.pl
2020-12-27T01:00:00Z
@@ -187,6 +187,21 @@
Image SLES12-SP5-EC2-BYOS
+
+
+ Image SLES12-SP5-GCE-BYOS
+
+
+
+
+ Image SLES12-SP5-GCE-SAP-BYOS
+
+
+
+
+ Image SLES12-SP5-GCE-SAP-On-Demand
+
+
Image SLES12-SP5-SAP-Azure-LI-BYOS-Production
@@ -2259,6 +2274,39 @@
kernel-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-EC2-BYOS
+
+ kernel-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-BYOS
+
+
+ cluster-md-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ dlm-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ gfs2-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ kernel-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ ocfs2-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ cluster-md-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
+
+ dlm-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
+
+ gfs2-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
+
+ kernel-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
+
+ ocfs2-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
cluster-md-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-SAP-Azure-LI-BYOS-Production
@@ -4540,6 +4588,17 @@
Image SLES12-SP5-Azure-SAP-BYOS:kernel-default-4.12.14-122.225.1
Image SLES12-SP5-Azure-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.225.1
Image SLES12-SP5-EC2-BYOS:kernel-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-BYOS:kernel-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-BYOS:cluster-md-kmp-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-BYOS:dlm-kmp-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-BYOS:gfs2-kmp-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-BYOS:kernel-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:cluster-md-kmp-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:dlm-kmp-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:gfs2-kmp-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:kernel-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:ocfs2-kmp-default-4.12.14-122.225.1
Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:cluster-md-kmp-default-4.12.14-122.225.1
Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:dlm-kmp-default-4.12.14-122.225.1
Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:gfs2-kmp-default-4.12.14-122.225.1
No V5 entry found for CVE-2024-40896 / /home/securitybot/prod/cve-database/cvelistV5/cves/2024/40xxxx/CVE-2024-40896.json:No such file or directory
skipping CVE-2024-40900 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-40899 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-40898 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-40897 as CVE page is older than CVRF-CVE file.
no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2024-40780
skipping CVE-2024-40866 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-40857 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-40794 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-40789 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-40785 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-40782 as CVE page is older than CVRF-CVE file.
no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2024-40776
skipping CVE-2024-40779 as CVE page is older than CVRF-CVE file.
no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2024-40724
no cpe found for SUSE Package Hub 15 SP5 in CVE-2024-40724
no cpe found for SUSE Package Hub 15 SP6 in CVE-2024-40724
skipping CVE-2024-40725 as CVE page is older than CVRF-CVE file.
no cpe found for SUSE Package Hub 15 SP5 in CVE-2024-40647
no cpe found for SUSE Package Hub 15 SP6 in CVE-2024-40647
no cpe found for SUSE Package Hub 15 SP5 in CVE-2024-39929
skipping CVE-2024-39936 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-39908 as CVE page is older than CVRF-CVE file.
no cpe found for SUSE Package Hub 15 SP6 in CVE-2024-39844
skipping CVE-2024-39894 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-39884 as CVE page is older than CVRF-CVE file.
no cpe found for SUSE Package Hub 15 SP5 in CVE-2024-39705
no cpe found for SUSE Package Hub 15 SP6 in CVE-2024-39705
skipping CVE-2024-39695 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-39689 as CVE page is older than CVRF-CVE file.
CVE-2024-39614: no packages for SUSE Package Hub 15 SP5, but entry?
CVE-2024-39614: no packages for SUSE Package Hub 15 SP5, but entry?
CVE-2024-39614: no packages for SUSE Package Hub 15 SP5, but entry?
skipping CVE-2024-39573 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-39510 as CVE page is older than CVRF-CVE file.
--- /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2024-39509.xml 2024-10-16 01:18:36.286747000 +0200
+++ /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2024-39509.xml.new 2024-10-29 01:16:11.489854000 +0100
@@ -14,13 +14,13 @@
1
- 37
- 2024-10-15T23:18:35Z
+ 38
+ 2024-10-29T00:16:11Z
current
2024-07-12T23:09:53Z
- 2024-10-15T23:18:35Z
+ 2024-10-29T00:16:11Z
cve-database/bin/generate-cvrf-cve.pl
2020-12-27T01:00:00Z
@@ -149,6 +149,21 @@
Image SLES12-SP5-EC2-BYOS
+
+
+ Image SLES12-SP5-GCE-BYOS
+
+
+
+
+ Image SLES12-SP5-GCE-SAP-BYOS
+
+
+
+
+ Image SLES12-SP5-GCE-SAP-On-Demand
+
+
Image SLES12-SP5-SAP-Azure-LI-BYOS-Production
@@ -1888,6 +1903,39 @@
kernel-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-EC2-BYOS
+
+ kernel-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-BYOS
+
+
+ cluster-md-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ dlm-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ gfs2-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ kernel-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ ocfs2-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ cluster-md-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
+
+ dlm-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
+
+ gfs2-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
+
+ kernel-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
+
+ ocfs2-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
cluster-md-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-SAP-Azure-LI-BYOS-Production
@@ -3830,6 +3878,17 @@
Image SLES12-SP5-Azure-SAP-BYOS:kernel-default-4.12.14-122.225.1
Image SLES12-SP5-Azure-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.225.1
Image SLES12-SP5-EC2-BYOS:kernel-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-BYOS:kernel-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-BYOS:cluster-md-kmp-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-BYOS:dlm-kmp-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-BYOS:gfs2-kmp-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-BYOS:kernel-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:cluster-md-kmp-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:dlm-kmp-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:gfs2-kmp-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:kernel-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:ocfs2-kmp-default-4.12.14-122.225.1
Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:cluster-md-kmp-default-4.12.14-122.225.1
Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:dlm-kmp-default-4.12.14-122.225.1
Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:gfs2-kmp-default-4.12.14-122.225.1
skipping CVE-2024-39508 as CVE page is older than CVRF-CVE file.
--- /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2024-39507.xml 2024-10-16 01:18:37.551694000 +0200
+++ /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2024-39507.xml.new 2024-10-29 01:16:12.182853000 +0100
@@ -14,13 +14,13 @@
1
- 44
- 2024-10-15T23:18:37Z
+ 45
+ 2024-10-29T00:16:11Z
current
2024-07-12T23:09:54Z
- 2024-10-15T23:18:37Z
+ 2024-10-29T00:16:11Z
cve-database/bin/generate-cvrf-cve.pl
2020-12-27T01:00:00Z
@@ -174,6 +174,21 @@
Image SLES12-SP5-EC2-BYOS
+
+
+ Image SLES12-SP5-GCE-BYOS
+
+
+
+
+ Image SLES12-SP5-GCE-SAP-BYOS
+
+
+
+
+ Image SLES12-SP5-GCE-SAP-On-Demand
+
+
Image SLES12-SP5-SAP-Azure-LI-BYOS-Production
@@ -2160,6 +2175,39 @@
kernel-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-EC2-BYOS
+
+ kernel-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-BYOS
+
+
+ cluster-md-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ dlm-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ gfs2-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ kernel-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ ocfs2-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ cluster-md-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
+
+ dlm-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
+
+ gfs2-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
+
+ kernel-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
+
+ ocfs2-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
cluster-md-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-SAP-Azure-LI-BYOS-Production
@@ -4357,6 +4405,17 @@
Image SLES12-SP5-Azure-SAP-BYOS:kernel-default-4.12.14-122.225.1
Image SLES12-SP5-Azure-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.225.1
Image SLES12-SP5-EC2-BYOS:kernel-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-BYOS:kernel-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-BYOS:cluster-md-kmp-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-BYOS:dlm-kmp-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-BYOS:gfs2-kmp-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-BYOS:kernel-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:cluster-md-kmp-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:dlm-kmp-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:gfs2-kmp-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:kernel-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:ocfs2-kmp-default-4.12.14-122.225.1
Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:cluster-md-kmp-default-4.12.14-122.225.1
Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:dlm-kmp-default-4.12.14-122.225.1
Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:gfs2-kmp-default-4.12.14-122.225.1
--- /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2024-39506.xml 2024-10-16 01:18:38.282650000 +0200
+++ /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2024-39506.xml.new 2024-10-29 01:16:12.921845000 +0100
@@ -14,13 +14,13 @@
1
- 41
- 2024-10-15T23:18:37Z
+ 42
+ 2024-10-29T00:16:12Z
current
2024-07-12T23:09:54Z
- 2024-10-15T23:18:37Z
+ 2024-10-29T00:16:12Z
cve-database/bin/generate-cvrf-cve.pl
2020-12-27T01:00:00Z
@@ -144,6 +144,21 @@
Image SLES12-SP5-EC2-BYOS
+
+
+ Image SLES12-SP5-GCE-BYOS
+
+
+
+
+ Image SLES12-SP5-GCE-SAP-BYOS
+
+
+
+
+ Image SLES12-SP5-GCE-SAP-On-Demand
+
+
Image SLES12-SP5-SAP-Azure-LI-BYOS-Production
@@ -1940,6 +1955,39 @@
kernel-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-EC2-BYOS
+
+ kernel-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-BYOS
+
+
+ cluster-md-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ dlm-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ gfs2-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ kernel-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ ocfs2-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ cluster-md-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
+
+ dlm-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
+
+ gfs2-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
+
+ kernel-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
+
+ ocfs2-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
cluster-md-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-SAP-Azure-LI-BYOS-Production
@@ -3915,6 +3963,17 @@
Image SLES12-SP5-Azure-SAP-BYOS:kernel-default-4.12.14-122.225.1
Image SLES12-SP5-Azure-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.225.1
Image SLES12-SP5-EC2-BYOS:kernel-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-BYOS:kernel-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-BYOS:cluster-md-kmp-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-BYOS:dlm-kmp-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-BYOS:gfs2-kmp-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-BYOS:kernel-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:cluster-md-kmp-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:dlm-kmp-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:gfs2-kmp-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:kernel-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:ocfs2-kmp-default-4.12.14-122.225.1
Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:cluster-md-kmp-default-4.12.14-122.225.1
Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:dlm-kmp-default-4.12.14-122.225.1
Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:gfs2-kmp-default-4.12.14-122.225.1
skipping CVE-2024-39505 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-39504 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-39503 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-39502 as CVE page is older than CVRF-CVE file.
--- /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2024-39501.xml 2024-10-16 01:18:41.135508000 +0200
+++ /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2024-39501.xml.new 2024-10-29 01:16:13.924244000 +0100
@@ -14,13 +14,13 @@
1
- 37
- 2024-10-15T23:18:40Z
+ 38
+ 2024-10-29T00:16:13Z
current
2024-07-15T23:10:10Z
- 2024-10-15T23:18:40Z
+ 2024-10-29T00:16:13Z
cve-database/bin/generate-cvrf-cve.pl
2020-12-27T01:00:00Z
@@ -189,6 +189,21 @@
Image SLES12-SP5-EC2-BYOS
+
+
+ Image SLES12-SP5-GCE-BYOS
+
+
+
+
+ Image SLES12-SP5-GCE-SAP-BYOS
+
+
+
+
+ Image SLES12-SP5-GCE-SAP-On-Demand
+
+
Image SLES12-SP5-SAP-Azure-LI-BYOS-Production
@@ -2014,6 +2029,39 @@
kernel-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-EC2-BYOS
+
+ kernel-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-BYOS
+
+
+ cluster-md-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ dlm-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ gfs2-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ kernel-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ ocfs2-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ cluster-md-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
+
+ dlm-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
+
+ gfs2-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
+
+ kernel-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
+
+ ocfs2-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
cluster-md-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-SAP-Azure-LI-BYOS-Production
@@ -4067,6 +4115,17 @@
Image SLES12-SP5-Azure-SAP-BYOS:kernel-default-4.12.14-122.225.1
Image SLES12-SP5-Azure-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.225.1
Image SLES12-SP5-EC2-BYOS:kernel-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-BYOS:kernel-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-BYOS:cluster-md-kmp-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-BYOS:dlm-kmp-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-BYOS:gfs2-kmp-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-BYOS:kernel-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:cluster-md-kmp-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:dlm-kmp-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:gfs2-kmp-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:kernel-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:ocfs2-kmp-default-4.12.14-122.225.1
Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:cluster-md-kmp-default-4.12.14-122.225.1
Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:dlm-kmp-default-4.12.14-122.225.1
Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:gfs2-kmp-default-4.12.14-122.225.1
skipping CVE-2024-39500 as CVE page is older than CVRF-CVE file.
--- /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2024-39499.xml 2024-10-16 01:18:42.076424000 +0200
+++ /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2024-39499.xml.new 2024-10-29 01:16:14.652236000 +0100
@@ -14,13 +14,13 @@
1
- 39
- 2024-10-15T23:18:41Z
+ 40
+ 2024-10-29T00:16:14Z
current
2024-07-12T23:09:55Z
- 2024-10-15T23:18:41Z
+ 2024-10-29T00:16:14Z
cve-database/bin/generate-cvrf-cve.pl
2020-12-27T01:00:00Z
@@ -132,6 +132,21 @@
Image SLES12-SP5-EC2-BYOS
+
+
+ Image SLES12-SP5-GCE-BYOS
+
+
+
+
+ Image SLES12-SP5-GCE-SAP-BYOS
+
+
+
+
+ Image SLES12-SP5-GCE-SAP-On-Demand
+
+
Image SLES12-SP5-SAP-Azure-LI-BYOS-Production
@@ -1957,6 +1972,39 @@
kernel-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-EC2-BYOS
+
+ kernel-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-BYOS
+
+
+ cluster-md-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ dlm-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ gfs2-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ kernel-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ ocfs2-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ cluster-md-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
+
+ dlm-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
+
+ gfs2-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
+
+ kernel-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
+
+ ocfs2-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
cluster-md-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-SAP-Azure-LI-BYOS-Production
@@ -3953,6 +4001,17 @@
Image SLES12-SP5-Azure-SAP-BYOS:kernel-default-4.12.14-122.225.1
Image SLES12-SP5-Azure-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.225.1
Image SLES12-SP5-EC2-BYOS:kernel-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-BYOS:kernel-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-BYOS:cluster-md-kmp-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-BYOS:dlm-kmp-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-BYOS:gfs2-kmp-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-BYOS:kernel-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:cluster-md-kmp-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:dlm-kmp-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:gfs2-kmp-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:kernel-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:ocfs2-kmp-default-4.12.14-122.225.1
Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:cluster-md-kmp-default-4.12.14-122.225.1
Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:dlm-kmp-default-4.12.14-122.225.1
Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:gfs2-kmp-default-4.12.14-122.225.1
no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2024-39494
skipping CVE-2024-39498 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-39497 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-39496 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-39495 as CVE page is older than CVRF-CVE file.
--- /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2024-39494.xml 2024-10-20 01:16:44.114915000 +0200
+++ /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2024-39494.xml.new 2024-10-29 01:16:15.326228000 +0100
@@ -14,13 +14,13 @@
1
- 45
- 2024-10-19T23:16:43Z
+ 46
+ 2024-10-29T00:16:14Z
current
2024-07-12T23:09:56Z
- 2024-10-19T23:16:43Z
+ 2024-10-29T00:16:14Z
cve-database/bin/generate-cvrf-cve.pl
2020-12-27T01:00:00Z
@@ -207,6 +207,21 @@
Image SLES12-SP5-EC2-BYOS
+
+
+ Image SLES12-SP5-GCE-BYOS
+
+
+
+
+ Image SLES12-SP5-GCE-SAP-BYOS
+
+
+
+
+ Image SLES12-SP5-GCE-SAP-On-Demand
+
+
Image SLES12-SP5-SAP-Azure-LI-BYOS-Production
@@ -2696,6 +2711,39 @@
kernel-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-EC2-BYOS
+
+ kernel-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-BYOS
+
+
+ cluster-md-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ dlm-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ gfs2-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ kernel-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ ocfs2-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ cluster-md-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
+
+ dlm-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
+
+ gfs2-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
+
+ kernel-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
+
+ ocfs2-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
cluster-md-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-SAP-Azure-LI-BYOS-Production
@@ -5596,6 +5644,17 @@
Image SLES12-SP5-Azure-SAP-BYOS:kernel-default-4.12.14-122.225.1
Image SLES12-SP5-Azure-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.225.1
Image SLES12-SP5-EC2-BYOS:kernel-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-BYOS:kernel-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-BYOS:cluster-md-kmp-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-BYOS:dlm-kmp-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-BYOS:gfs2-kmp-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-BYOS:kernel-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:cluster-md-kmp-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:dlm-kmp-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:gfs2-kmp-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:kernel-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:ocfs2-kmp-default-4.12.14-122.225.1
Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:cluster-md-kmp-default-4.12.14-122.225.1
Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:dlm-kmp-default-4.12.14-122.225.1
Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:gfs2-kmp-default-4.12.14-122.225.1
skipping CVE-2024-39493 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-39492 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-39491 as CVE page is older than CVRF-CVE file.
--- /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2024-39490.xml 2024-10-16 01:18:46.269738000 +0200
+++ /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2024-39490.xml.new 2024-10-29 01:16:15.904167000 +0100
@@ -14,13 +14,13 @@
1
- 44
- 2024-10-15T23:18:45Z
+ 45
+ 2024-10-29T00:16:15Z
current
2024-07-10T23:09:52Z
- 2024-10-15T23:18:45Z
+ 2024-10-29T00:16:15Z
cve-database/bin/generate-cvrf-cve.pl
2020-12-27T01:00:00Z
@@ -184,6 +184,21 @@
Image SLES12-SP5-EC2-BYOS
+
+
+ Image SLES12-SP5-GCE-BYOS
+
+
+
+
+ Image SLES12-SP5-GCE-SAP-BYOS
+
+
+
+
+ Image SLES12-SP5-GCE-SAP-On-Demand
+
+
Image SLES12-SP5-SAP-Azure-LI-BYOS-Production
@@ -2164,6 +2179,39 @@
kernel-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-EC2-BYOS
+
+ kernel-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-BYOS
+
+
+ cluster-md-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ dlm-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ gfs2-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ kernel-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ ocfs2-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ cluster-md-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
+
+ dlm-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
+
+ gfs2-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
+
+ kernel-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
+
+ ocfs2-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
cluster-md-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-SAP-Azure-LI-BYOS-Production
@@ -4347,6 +4395,17 @@
Image SLES12-SP5-Azure-SAP-BYOS:kernel-default-4.12.14-122.225.1
Image SLES12-SP5-Azure-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.225.1
Image SLES12-SP5-EC2-BYOS:kernel-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-BYOS:kernel-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-BYOS:cluster-md-kmp-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-BYOS:dlm-kmp-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-BYOS:gfs2-kmp-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-BYOS:kernel-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:cluster-md-kmp-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:dlm-kmp-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:gfs2-kmp-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:kernel-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:ocfs2-kmp-default-4.12.14-122.225.1
Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:cluster-md-kmp-default-4.12.14-122.225.1
Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:dlm-kmp-default-4.12.14-122.225.1
Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:gfs2-kmp-default-4.12.14-122.225.1
--- /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2024-39489.xml 2024-10-17 01:14:55.458536000 +0200
+++ /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2024-39489.xml.new 2024-10-29 01:16:16.913171000 +0100
@@ -14,13 +14,13 @@
1
- 33
- 2024-10-16T23:14:55Z
+ 34
+ 2024-10-29T00:16:16Z
current
2024-07-10T23:09:53Z
- 2024-10-16T23:14:55Z
+ 2024-10-29T00:16:16Z
cve-database/bin/generate-cvrf-cve.pl
2020-12-27T01:00:00Z
@@ -112,6 +112,21 @@
Image SLES12-SP5-Azure-SAP-BYOS
+
+
+ Image SLES12-SP5-GCE-BYOS
+
+
+
+
+ Image SLES12-SP5-GCE-SAP-BYOS
+
+
+
+
+ Image SLES12-SP5-GCE-SAP-On-Demand
+
+
Image SLES15-SP5-Azure-Basic
@@ -1646,6 +1661,39 @@
ocfs2-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-Azure-SAP-BYOS
+
+ kernel-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-BYOS
+
+
+ cluster-md-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ dlm-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ gfs2-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ kernel-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ ocfs2-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ cluster-md-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
+
+ dlm-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
+
+ gfs2-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
+
+ kernel-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
+
+ ocfs2-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
kernel-azure-5.14.21-150500.33.66.1 as a component of Image SLES15-SP5-Azure-Basic
@@ -3286,6 +3334,17 @@
Image SLES12-SP5-Azure-SAP-BYOS:gfs2-kmp-default-4.12.14-122.228.1
Image SLES12-SP5-Azure-SAP-BYOS:kernel-default-4.12.14-122.228.1
Image SLES12-SP5-Azure-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.228.1
+ Image SLES12-SP5-GCE-BYOS:kernel-default-4.12.14-122.228.1
+ Image SLES12-SP5-GCE-SAP-BYOS:cluster-md-kmp-default-4.12.14-122.228.1
+ Image SLES12-SP5-GCE-SAP-BYOS:dlm-kmp-default-4.12.14-122.228.1
+ Image SLES12-SP5-GCE-SAP-BYOS:gfs2-kmp-default-4.12.14-122.228.1
+ Image SLES12-SP5-GCE-SAP-BYOS:kernel-default-4.12.14-122.228.1
+ Image SLES12-SP5-GCE-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.228.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:cluster-md-kmp-default-4.12.14-122.228.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:dlm-kmp-default-4.12.14-122.228.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:gfs2-kmp-default-4.12.14-122.228.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:kernel-default-4.12.14-122.228.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:ocfs2-kmp-default-4.12.14-122.228.1
Image SLES15-SP5-Azure-Basic:kernel-azure-5.14.21-150500.33.66.1
Image SLES15-SP5-Azure-Standard:kernel-azure-5.14.21-150500.33.66.1
Image SLES15-SP5-CHOST-BYOS-Aliyun:kernel-default-5.14.21-150500.55.80.2
--- /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2024-39488.xml 2024-10-22 01:24:15.669764000 +0200
+++ /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2024-39488.xml.new 2024-10-29 01:16:17.743064000 +0100
@@ -14,13 +14,13 @@
1
- 37
- 2024-10-21T23:24:15Z
+ 38
+ 2024-10-29T00:16:17Z
current
2024-07-10T23:09:54Z
- 2024-10-21T23:24:15Z
+ 2024-10-29T00:16:17Z
cve-database/bin/generate-cvrf-cve.pl
2020-12-27T01:00:00Z
@@ -231,6 +231,21 @@
Image SLES12-SP5-EC2-BYOS
+
+
+ Image SLES12-SP5-GCE-BYOS
+
+
+
+
+ Image SLES12-SP5-GCE-SAP-BYOS
+
+
+
+
+ Image SLES12-SP5-GCE-SAP-On-Demand
+
+
Image SLES12-SP5-SAP-Azure-LI-BYOS-Production
@@ -1967,6 +1982,39 @@
kernel-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-EC2-BYOS
+
+ kernel-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-BYOS
+
+
+ cluster-md-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ dlm-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ gfs2-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ kernel-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ ocfs2-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ cluster-md-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
+
+ dlm-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
+
+ gfs2-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
+
+ kernel-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
+
+ ocfs2-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
cluster-md-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-SAP-Azure-LI-BYOS-Production
@@ -3973,6 +4021,17 @@
Image SLES12-SP5-Azure-SAP-BYOS:kernel-default-4.12.14-122.225.1
Image SLES12-SP5-Azure-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.225.1
Image SLES12-SP5-EC2-BYOS:kernel-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-BYOS:kernel-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-BYOS:cluster-md-kmp-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-BYOS:dlm-kmp-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-BYOS:gfs2-kmp-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-BYOS:kernel-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:cluster-md-kmp-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:dlm-kmp-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:gfs2-kmp-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:kernel-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:ocfs2-kmp-default-4.12.14-122.225.1
Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:cluster-md-kmp-default-4.12.14-122.225.1
Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:dlm-kmp-default-4.12.14-122.225.1
Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:gfs2-kmp-default-4.12.14-122.225.1
--- /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2024-39487.xml 2024-10-16 01:18:48.096630000 +0200
+++ /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2024-39487.xml.new 2024-10-29 01:16:18.558981000 +0100
@@ -14,13 +14,13 @@
1
- 44
- 2024-10-15T23:18:47Z
+ 45
+ 2024-10-29T00:16:18Z
current
2024-07-09T23:10:02Z
- 2024-10-15T23:18:47Z
+ 2024-10-29T00:16:18Z
cve-database/bin/generate-cvrf-cve.pl
2020-12-27T01:00:00Z
@@ -204,6 +204,21 @@
Image SLES12-SP5-EC2-BYOS
+
+
+ Image SLES12-SP5-GCE-BYOS
+
+
+
+
+ Image SLES12-SP5-GCE-SAP-BYOS
+
+
+
+
+ Image SLES12-SP5-GCE-SAP-On-Demand
+
+
Image SLES12-SP5-SAP-Azure-LI-BYOS-Production
@@ -2368,6 +2383,39 @@
kernel-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-EC2-BYOS
+
+ kernel-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-BYOS
+
+
+ cluster-md-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ dlm-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ gfs2-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ kernel-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ ocfs2-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ cluster-md-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
+
+ dlm-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
+
+ gfs2-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
+
+ kernel-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
+
+ ocfs2-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
cluster-md-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-SAP-Azure-LI-BYOS-Production
@@ -4757,6 +4805,17 @@
Image SLES12-SP5-Azure-SAP-BYOS:kernel-default-4.12.14-122.225.1
Image SLES12-SP5-Azure-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.225.1
Image SLES12-SP5-EC2-BYOS:kernel-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-BYOS:kernel-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-BYOS:cluster-md-kmp-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-BYOS:dlm-kmp-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-BYOS:gfs2-kmp-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-BYOS:kernel-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:cluster-md-kmp-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:dlm-kmp-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:gfs2-kmp-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:kernel-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:ocfs2-kmp-default-4.12.14-122.225.1
Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:cluster-md-kmp-default-4.12.14-122.225.1
Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:dlm-kmp-default-4.12.14-122.225.1
Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:gfs2-kmp-default-4.12.14-122.225.1
skipping CVE-2024-39486 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-39485 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-39484 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-39483 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-39481 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-39480 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-39479 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-39478 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-39477 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-39475 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-39474 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-39473 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-39472 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-39471 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-39470 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-39469 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-39468 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-39467 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-39466 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-39465 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-39464 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-39463 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-39462 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-39461 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-39371 as CVE page is older than CVRF-CVE file.
CVE-2024-39330: no packages for SUSE Package Hub 15 SP5, but entry?
CVE-2024-39330: no packages for SUSE Package Hub 15 SP5, but entry?
CVE-2024-39330: no packages for SUSE Package Hub 15 SP5, but entry?
skipping CVE-2024-39338 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-39331 as CVE page is older than CVRF-CVE file.
CVE-2024-39329: no packages for SUSE Package Hub 15 SP5, but entry?
CVE-2024-39329: no packages for SUSE Package Hub 15 SP5, but entry?
CVE-2024-39329: no packages for SUSE Package Hub 15 SP5, but entry?
no cpe found for SUSE Package Hub 15 SP5 in CVE-2024-39312
no cpe found for SUSE Package Hub 15 SP6 in CVE-2024-39312
skipping CVE-2024-39298 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-39296 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-39293 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-39292 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-39291 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-39277 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-39276 as CVE page is older than CVRF-CVE file.
no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2024-39134
CVE-2024-38875: no packages for SUSE Package Hub 15 SP5, but entry?
CVE-2024-38875: no packages for SUSE Package Hub 15 SP5, but entry?
CVE-2024-38875: no packages for SUSE Package Hub 15 SP5, but entry?
skipping CVE-2024-38999 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-38998 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-38796 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-38667 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-38664 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-38663 as CVE page is older than CVRF-CVE file.
--- /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2024-38662.xml 2024-10-22 01:25:05.890112000 +0200
+++ /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2024-38662.xml.new 2024-10-29 01:16:26.992042000 +0100
@@ -14,13 +14,13 @@
1
- 35
- 2024-10-21T23:25:05Z
+ 36
+ 2024-10-29T00:16:26Z
current
2024-06-29T17:04:46Z
- 2024-10-21T23:25:05Z
+ 2024-10-29T00:16:26Z
cve-database/bin/generate-cvrf-cve.pl
2020-12-27T01:00:00Z
@@ -117,6 +117,21 @@
Image SLES12-SP5-Azure-SAP-BYOS
+
+
+ Image SLES12-SP5-GCE-BYOS
+
+
+
+
+ Image SLES12-SP5-GCE-SAP-BYOS
+
+
+
+
+ Image SLES12-SP5-GCE-SAP-On-Demand
+
+
Image SLES15-SP5-Azure-Basic
@@ -1692,6 +1707,39 @@
ocfs2-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-Azure-SAP-BYOS
+
+ kernel-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-BYOS
+
+
+ cluster-md-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ dlm-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ gfs2-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ kernel-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ ocfs2-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ cluster-md-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
+
+ dlm-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
+
+ gfs2-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
+
+ kernel-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
+
+ ocfs2-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
kernel-azure-5.14.21-150500.33.66.1 as a component of Image SLES15-SP5-Azure-Basic
@@ -3457,6 +3505,17 @@
Image SLES12-SP5-Azure-SAP-BYOS:gfs2-kmp-default-4.12.14-122.228.1
Image SLES12-SP5-Azure-SAP-BYOS:kernel-default-4.12.14-122.228.1
Image SLES12-SP5-Azure-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.228.1
+ Image SLES12-SP5-GCE-BYOS:kernel-default-4.12.14-122.228.1
+ Image SLES12-SP5-GCE-SAP-BYOS:cluster-md-kmp-default-4.12.14-122.228.1
+ Image SLES12-SP5-GCE-SAP-BYOS:dlm-kmp-default-4.12.14-122.228.1
+ Image SLES12-SP5-GCE-SAP-BYOS:gfs2-kmp-default-4.12.14-122.228.1
+ Image SLES12-SP5-GCE-SAP-BYOS:kernel-default-4.12.14-122.228.1
+ Image SLES12-SP5-GCE-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.228.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:cluster-md-kmp-default-4.12.14-122.228.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:dlm-kmp-default-4.12.14-122.228.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:gfs2-kmp-default-4.12.14-122.228.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:kernel-default-4.12.14-122.228.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:ocfs2-kmp-default-4.12.14-122.228.1
Image SLES15-SP5-Azure-Basic:kernel-azure-5.14.21-150500.33.66.1
Image SLES15-SP5-Azure-Standard:kernel-azure-5.14.21-150500.33.66.1
Image SLES15-SP5-CHOST-BYOS-Aliyun:kernel-default-5.14.21-150500.55.80.2
skipping CVE-2024-38661 as CVE page is older than CVRF-CVE file.
no cpe found for SUSE Linux Enterprise Module for Confidential Computing Technical Preview 15 SP6 in CVE-2024-38632
skipping CVE-2024-38637 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-38636 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-38635 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-38634 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-38633 as CVE page is older than CVRF-CVE file.
--- /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2024-38632.xml 2024-10-22 01:25:15.561114000 +0200
+++ /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2024-38632.xml.new 2024-10-29 01:16:28.067043000 +0100
@@ -14,13 +14,13 @@
1
- 11
- 2024-10-21T23:25:14Z
+ 12
+ 2024-10-29T00:16:27Z
current
2024-06-29T17:04:48Z
- 2024-10-21T23:25:14Z
+ 2024-10-29T00:16:27Z
cve-database/bin/generate-cvrf-cve.pl
2020-12-27T01:00:00Z
@@ -107,6 +107,21 @@
Container suse/sle-micro/rt-5.5:2.0.4-4.5.211
+
+
+ Image SLES12-SP5-GCE-BYOS
+
+
+
+
+ Image SLES12-SP5-GCE-SAP-BYOS
+
+
+
+
+ Image SLES12-SP5-GCE-SAP-On-Demand
+
+
Image SLES15-SP5-CHOST-BYOS-Aliyun
@@ -1545,6 +1560,39 @@
kernel-rt-5.14.21-150500.13.73.1 as a component of Container suse/sle-micro/rt-5.5:2.0.4-4.5.211
+
+ kernel-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-BYOS
+
+
+ cluster-md-kmp-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ dlm-kmp-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ gfs2-kmp-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ kernel-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ ocfs2-kmp-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ cluster-md-kmp-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
+
+ dlm-kmp-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
+
+ gfs2-kmp-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
+
+ kernel-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
+
+ ocfs2-kmp-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
kernel-default-5.14.21-150500.55.83.1 as a component of Image SLES15-SP5-CHOST-BYOS-Aliyun
@@ -3026,6 +3074,17 @@
Container suse/hpc/warewulf4-x86_64/sle-hpc-node:15.6.17.5.49:kernel-default-6.4.0-150600.23.25.1
Container suse/sle-micro/kvm-5.5:2.0.4-3.5.197:kernel-default-base-5.14.21-150500.55.83.1.150500.6.37.1
Container suse/sle-micro/rt-5.5:2.0.4-4.5.211:kernel-rt-5.14.21-150500.13.73.1
+ Image SLES12-SP5-GCE-BYOS:kernel-default-4.12.14-122.231.1
+ Image SLES12-SP5-GCE-SAP-BYOS:cluster-md-kmp-default-4.12.14-122.231.1
+ Image SLES12-SP5-GCE-SAP-BYOS:dlm-kmp-default-4.12.14-122.231.1
+ Image SLES12-SP5-GCE-SAP-BYOS:gfs2-kmp-default-4.12.14-122.231.1
+ Image SLES12-SP5-GCE-SAP-BYOS:kernel-default-4.12.14-122.231.1
+ Image SLES12-SP5-GCE-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.231.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:cluster-md-kmp-default-4.12.14-122.231.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:dlm-kmp-default-4.12.14-122.231.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:gfs2-kmp-default-4.12.14-122.231.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:kernel-default-4.12.14-122.231.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:ocfs2-kmp-default-4.12.14-122.231.1
Image SLES15-SP5-CHOST-BYOS-Aliyun:kernel-default-5.14.21-150500.55.83.1
Image SLES15-SP5-CHOST-BYOS-Azure:kernel-default-5.14.21-150500.55.83.1
Image SLES15-SP5-CHOST-BYOS-EC2:kernel-default-5.14.21-150500.55.83.1
skipping CVE-2024-38631 as CVE page is older than CVRF-CVE file.
--- /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2024-38630.xml 2024-10-16 01:19:17.309587000 +0200
+++ /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2024-38630.xml.new 2024-10-29 01:16:28.704955000 +0100
@@ -14,13 +14,13 @@
1
- 53
- 2024-10-15T23:19:16Z
+ 54
+ 2024-10-29T00:16:28Z
current
2024-06-29T17:04:48Z
- 2024-10-15T23:19:16Z
+ 2024-10-29T00:16:28Z
cve-database/bin/generate-cvrf-cve.pl
2020-12-27T01:00:00Z
@@ -176,6 +176,21 @@
Image SLES12-SP5-EC2-BYOS
+
+
+ Image SLES12-SP5-GCE-BYOS
+
+
+
+
+ Image SLES12-SP5-GCE-SAP-BYOS
+
+
+
+
+ Image SLES12-SP5-GCE-SAP-On-Demand
+
+
Image SLES12-SP5-SAP-Azure-LI-BYOS-Production
@@ -2183,6 +2198,39 @@
kernel-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-EC2-BYOS
+
+ kernel-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-BYOS
+
+
+ cluster-md-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ dlm-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ gfs2-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ kernel-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ ocfs2-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ cluster-md-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
+
+ dlm-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
+
+ gfs2-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
+
+ kernel-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
+
+ ocfs2-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
cluster-md-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-SAP-Azure-LI-BYOS-Production
@@ -4418,6 +4466,17 @@
Image SLES12-SP5-Azure-SAP-BYOS:kernel-default-4.12.14-122.225.1
Image SLES12-SP5-Azure-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.225.1
Image SLES12-SP5-EC2-BYOS:kernel-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-BYOS:kernel-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-BYOS:cluster-md-kmp-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-BYOS:dlm-kmp-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-BYOS:gfs2-kmp-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-BYOS:kernel-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:cluster-md-kmp-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:dlm-kmp-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:gfs2-kmp-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:kernel-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:ocfs2-kmp-default-4.12.14-122.225.1
Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:cluster-md-kmp-default-4.12.14-122.225.1
Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:dlm-kmp-default-4.12.14-122.225.1
Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:gfs2-kmp-default-4.12.14-122.225.1
skipping CVE-2024-38629 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-38628 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-38626 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-38625 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-38624 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-38623 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-38622 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-38621 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-38620 as CVE page is older than CVRF-CVE file.
--- /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2024-38618.xml 2024-10-22 01:25:30.752805000 +0200
+++ /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2024-38618.xml.new 2024-10-29 01:16:32.296799000 +0100
@@ -14,13 +14,13 @@
1
- 55
- 2024-10-21T23:25:30Z
+ 56
+ 2024-10-29T00:16:31Z
current
2024-06-21T23:09:37Z
- 2024-10-21T23:25:30Z
+ 2024-10-29T00:16:31Z
cve-database/bin/generate-cvrf-cve.pl
2020-12-27T01:00:00Z
@@ -2313,41 +2313,41 @@
ocfs2-kmp-default-4.12.14-122.222.1 as a component of Image SLES12-SP5-EC2-SAP-On-Demand
-
- kernel-default-4.12.14-122.222.1 as a component of Image SLES12-SP5-GCE-BYOS
+
+ kernel-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-BYOS
kernel-default-4.12.14-122.222.1 as a component of Image SLES12-SP5-GCE-On-Demand
-
- cluster-md-kmp-default-4.12.14-122.222.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+ cluster-md-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
-
- dlm-kmp-default-4.12.14-122.222.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+ dlm-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
-
- gfs2-kmp-default-4.12.14-122.222.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+ gfs2-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
-
- kernel-default-4.12.14-122.222.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+ kernel-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
-
- ocfs2-kmp-default-4.12.14-122.222.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+ ocfs2-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
-
- cluster-md-kmp-default-4.12.14-122.222.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
+ cluster-md-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
-
- dlm-kmp-default-4.12.14-122.222.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
+ dlm-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
-
- gfs2-kmp-default-4.12.14-122.222.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
+ gfs2-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
-
- kernel-default-4.12.14-122.222.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
+ kernel-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
-
- ocfs2-kmp-default-4.12.14-122.222.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
+ ocfs2-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
cluster-md-kmp-default-4.12.14-122.222.1 as a component of Image SLES12-SP5-SAP-Azure-LI-BYOS-Production
@@ -4537,18 +4537,18 @@
Image SLES12-SP5-EC2-SAP-On-Demand:gfs2-kmp-default-4.12.14-122.222.1
Image SLES12-SP5-EC2-SAP-On-Demand:kernel-default-4.12.14-122.222.1
Image SLES12-SP5-EC2-SAP-On-Demand:ocfs2-kmp-default-4.12.14-122.222.1
- Image SLES12-SP5-GCE-BYOS:kernel-default-4.12.14-122.222.1
+ Image SLES12-SP5-GCE-BYOS:kernel-default-4.12.14-122.228.1
Image SLES12-SP5-GCE-On-Demand:kernel-default-4.12.14-122.222.1
- Image SLES12-SP5-GCE-SAP-BYOS:cluster-md-kmp-default-4.12.14-122.222.1
- Image SLES12-SP5-GCE-SAP-BYOS:dlm-kmp-default-4.12.14-122.222.1
- Image SLES12-SP5-GCE-SAP-BYOS:gfs2-kmp-default-4.12.14-122.222.1
- Image SLES12-SP5-GCE-SAP-BYOS:kernel-default-4.12.14-122.222.1
- Image SLES12-SP5-GCE-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.222.1
- Image SLES12-SP5-GCE-SAP-On-Demand:cluster-md-kmp-default-4.12.14-122.222.1
- Image SLES12-SP5-GCE-SAP-On-Demand:dlm-kmp-default-4.12.14-122.222.1
- Image SLES12-SP5-GCE-SAP-On-Demand:gfs2-kmp-default-4.12.14-122.222.1
- Image SLES12-SP5-GCE-SAP-On-Demand:kernel-default-4.12.14-122.222.1
- Image SLES12-SP5-GCE-SAP-On-Demand:ocfs2-kmp-default-4.12.14-122.222.1
+ Image SLES12-SP5-GCE-SAP-BYOS:cluster-md-kmp-default-4.12.14-122.228.1
+ Image SLES12-SP5-GCE-SAP-BYOS:dlm-kmp-default-4.12.14-122.228.1
+ Image SLES12-SP5-GCE-SAP-BYOS:gfs2-kmp-default-4.12.14-122.228.1
+ Image SLES12-SP5-GCE-SAP-BYOS:kernel-default-4.12.14-122.228.1
+ Image SLES12-SP5-GCE-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.228.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:cluster-md-kmp-default-4.12.14-122.228.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:dlm-kmp-default-4.12.14-122.228.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:gfs2-kmp-default-4.12.14-122.228.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:kernel-default-4.12.14-122.228.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:ocfs2-kmp-default-4.12.14-122.228.1
Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:cluster-md-kmp-default-4.12.14-122.222.1
Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:dlm-kmp-default-4.12.14-122.222.1
Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:gfs2-kmp-default-4.12.14-122.222.1
skipping CVE-2024-38617 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-38616 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-38615 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-38614 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-38613 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-38612 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-38611 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-38610 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-38609 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-38608 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-38607 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-38606 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-38605 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-38604 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-38603 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-38602 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-38601 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-38600 as CVE page is older than CVRF-CVE file.
--- /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2024-38596.xml 2024-10-17 01:15:26.424933000 +0200
+++ /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2024-38596.xml.new 2024-10-29 01:16:34.583211000 +0100
@@ -14,13 +14,13 @@
1
- 16
- 2024-10-16T23:15:26Z
+ 17
+ 2024-10-29T00:16:34Z
current
2024-06-29T17:04:58Z
- 2024-10-16T23:15:26Z
+ 2024-10-29T00:16:34Z
cve-database/bin/generate-cvrf-cve.pl
2020-12-27T01:00:00Z
@@ -141,6 +141,21 @@
Container suse/sle-micro/rt-5.5:2.0.4-4.5.211
+
+
+ Image SLES12-SP5-GCE-BYOS
+
+
+
+
+ Image SLES12-SP5-GCE-SAP-BYOS
+
+
+
+
+ Image SLES12-SP5-GCE-SAP-On-Demand
+
+
Image SLES15-SP5-CHOST-BYOS-Aliyun
@@ -1649,6 +1664,39 @@
kernel-rt-5.14.21-150500.13.73.1 as a component of Container suse/sle-micro/rt-5.5:2.0.4-4.5.211
+
+ kernel-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-BYOS
+
+
+ cluster-md-kmp-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ dlm-kmp-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ gfs2-kmp-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ kernel-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ ocfs2-kmp-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ cluster-md-kmp-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
+
+ dlm-kmp-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
+
+ gfs2-kmp-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
+
+ kernel-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
+
+ ocfs2-kmp-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
kernel-default-5.14.21-150500.55.83.1 as a component of Image SLES15-SP5-CHOST-BYOS-Aliyun
@@ -3282,6 +3330,17 @@
Container suse/hpc/warewulf4-x86_64/sle-hpc-node:15.6.17.5.49:kernel-default-6.4.0-150600.23.25.1
Container suse/sle-micro/kvm-5.5:2.0.4-3.5.197:kernel-default-base-5.14.21-150500.55.83.1.150500.6.37.1
Container suse/sle-micro/rt-5.5:2.0.4-4.5.211:kernel-rt-5.14.21-150500.13.73.1
+ Image SLES12-SP5-GCE-BYOS:kernel-default-4.12.14-122.231.1
+ Image SLES12-SP5-GCE-SAP-BYOS:cluster-md-kmp-default-4.12.14-122.231.1
+ Image SLES12-SP5-GCE-SAP-BYOS:dlm-kmp-default-4.12.14-122.231.1
+ Image SLES12-SP5-GCE-SAP-BYOS:gfs2-kmp-default-4.12.14-122.231.1
+ Image SLES12-SP5-GCE-SAP-BYOS:kernel-default-4.12.14-122.231.1
+ Image SLES12-SP5-GCE-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.231.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:cluster-md-kmp-default-4.12.14-122.231.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:dlm-kmp-default-4.12.14-122.231.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:gfs2-kmp-default-4.12.14-122.231.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:kernel-default-4.12.14-122.231.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:ocfs2-kmp-default-4.12.14-122.231.1
Image SLES15-SP5-CHOST-BYOS-Aliyun:kernel-default-5.14.21-150500.55.83.1
Image SLES15-SP5-CHOST-BYOS-Azure:kernel-default-5.14.21-150500.55.83.1
Image SLES15-SP5-CHOST-BYOS-EC2:kernel-default-5.14.21-150500.55.83.1
skipping CVE-2024-38595 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-38594 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-38593 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-38592 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-38591 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-38590 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-38589 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-38588 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-38587 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-38586 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-38585 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-38584 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-38583 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-38582 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-38581 as CVE page is older than CVRF-CVE file.
no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2024-38578
skipping CVE-2024-38579 as CVE page is older than CVRF-CVE file.
no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2024-38560
skipping CVE-2024-38577 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-38576 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-38575 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-38574 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-38573 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-38572 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-38571 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-38570 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-38569 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-38568 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-38567 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-38566 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-38565 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-38564 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-38563 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-38562 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-38561 as CVE page is older than CVRF-CVE file.
--- /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2024-38560.xml 2024-10-16 01:19:52.356755000 +0200
+++ /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2024-38560.xml.new 2024-10-29 01:16:36.457084000 +0100
@@ -14,13 +14,13 @@
1
- 55
- 2024-10-15T23:19:51Z
+ 56
+ 2024-10-29T00:16:35Z
current
2024-06-21T23:09:58Z
- 2024-10-15T23:19:51Z
+ 2024-10-29T00:16:35Z
cve-database/bin/generate-cvrf-cve.pl
2020-12-27T01:00:00Z
@@ -203,6 +203,21 @@
Image SLES12-SP5-EC2-BYOS
+
+
+ Image SLES12-SP5-GCE-BYOS
+
+
+
+
+ Image SLES12-SP5-GCE-SAP-BYOS
+
+
+
+
+ Image SLES12-SP5-GCE-SAP-On-Demand
+
+
Image SLES12-SP5-SAP-Azure-LI-BYOS-Production
@@ -2854,6 +2869,39 @@
kernel-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-EC2-BYOS
+
+ kernel-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-BYOS
+
+
+ cluster-md-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ dlm-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ gfs2-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ kernel-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ ocfs2-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ cluster-md-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
+
+ dlm-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
+
+ gfs2-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
+
+ kernel-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
+
+ ocfs2-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
cluster-md-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-SAP-Azure-LI-BYOS-Production
@@ -5820,6 +5868,17 @@
Image SLES12-SP5-Azure-SAP-BYOS:kernel-default-4.12.14-122.225.1
Image SLES12-SP5-Azure-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.225.1
Image SLES12-SP5-EC2-BYOS:kernel-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-BYOS:kernel-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-BYOS:cluster-md-kmp-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-BYOS:dlm-kmp-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-BYOS:gfs2-kmp-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-BYOS:kernel-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:cluster-md-kmp-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:dlm-kmp-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:gfs2-kmp-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:kernel-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:ocfs2-kmp-default-4.12.14-122.225.1
Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:cluster-md-kmp-default-4.12.14-122.225.1
Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:dlm-kmp-default-4.12.14-122.225.1
Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:gfs2-kmp-default-4.12.14-122.225.1
skipping CVE-2024-38559 as CVE page is older than CVRF-CVE file.
--- /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2024-38558.xml 2024-10-16 01:19:54.029656000 +0200
+++ /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2024-38558.xml.new 2024-10-29 01:16:37.218118000 +0100
@@ -14,13 +14,13 @@
1
- 47
- 2024-10-15T23:19:53Z
+ 48
+ 2024-10-29T00:16:36Z
current
2024-06-21T23:09:59Z
- 2024-10-15T23:19:53Z
+ 2024-10-29T00:16:36Z
cve-database/bin/generate-cvrf-cve.pl
2020-12-27T01:00:00Z
@@ -210,6 +210,21 @@
Image SLES12-SP5-EC2-BYOS
+
+
+ Image SLES12-SP5-GCE-BYOS
+
+
+
+
+ Image SLES12-SP5-GCE-SAP-BYOS
+
+
+
+
+ Image SLES12-SP5-GCE-SAP-On-Demand
+
+
Image SLES12-SP5-SAP-Azure-LI-BYOS-Production
@@ -2353,6 +2368,39 @@
kernel-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-EC2-BYOS
+
+ kernel-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-BYOS
+
+
+ cluster-md-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ dlm-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ gfs2-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ kernel-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ ocfs2-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ cluster-md-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
+
+ dlm-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
+
+ gfs2-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
+
+ kernel-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
+
+ ocfs2-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
cluster-md-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-SAP-Azure-LI-BYOS-Production
@@ -4729,6 +4777,17 @@
Image SLES12-SP5-Azure-SAP-BYOS:kernel-default-4.12.14-122.225.1
Image SLES12-SP5-Azure-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.225.1
Image SLES12-SP5-EC2-BYOS:kernel-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-BYOS:kernel-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-BYOS:cluster-md-kmp-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-BYOS:dlm-kmp-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-BYOS:gfs2-kmp-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-BYOS:kernel-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:cluster-md-kmp-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:dlm-kmp-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:gfs2-kmp-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:kernel-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:ocfs2-kmp-default-4.12.14-122.225.1
Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:cluster-md-kmp-default-4.12.14-122.225.1
Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:dlm-kmp-default-4.12.14-122.225.1
Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:gfs2-kmp-default-4.12.14-122.225.1
skipping CVE-2024-38557 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-38556 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-38555 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-38554 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-38552 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-38551 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-38550 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-38548 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-38547 as CVE page is older than CVRF-CVE file.
no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2024-38545
no cpe found for SUSE Linux Enterprise Module for Confidential Computing Technical Preview 15 SP6 in CVE-2024-38538
skipping CVE-2024-38544 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-38543 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-38542 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-38541 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-38540 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-38539 as CVE page is older than CVRF-CVE file.
no cpe found for SUSE Package Hub 15 SP5 in CVE-2024-38528
no cpe found for SUSE Package Hub 15 SP6 in CVE-2024-38528
no cpe found for SUSE Package Hub 15 SP6 in CVE-2024-38519
skipping CVE-2024-38526 as CVE page is older than CVRF-CVE file.
no cpe found for SUSE Package Hub 15 SP5 in CVE-2024-38448
no cpe found for SUSE Package Hub 15 SP6 in CVE-2024-38448
skipping CVE-2024-38477 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-38476 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-38475 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-38474 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-38473 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-38472 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-38445 as CVE page is older than CVRF-CVE file.
no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2024-38428
skipping CVE-2024-38394 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-38391 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-38390 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-38388 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-38385 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-38384 as CVE page is older than CVRF-CVE file.
--- /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2024-38381.xml 2024-10-22 01:27:18.198707000 +0200
+++ /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2024-38381.xml.new 2024-10-29 01:16:43.669207000 +0100
@@ -14,13 +14,13 @@
1
- 48
- 2024-10-21T23:27:17Z
+ 49
+ 2024-10-29T00:16:42Z
current
2024-06-29T17:05:08Z
- 2024-10-21T23:27:17Z
+ 2024-10-29T00:16:42Z
cve-database/bin/generate-cvrf-cve.pl
2020-12-27T01:00:00Z
@@ -158,6 +158,21 @@
Image SLE-Micro-GCE
+
+
+ Image SLES12-SP5-GCE-BYOS
+
+
+
+
+ Image SLES12-SP5-GCE-SAP-BYOS
+
+
+
+
+ Image SLES12-SP5-GCE-SAP-On-Demand
+
+
Image SLES15-SP5-Azure-Basic
@@ -2087,6 +2102,39 @@
kernel-default-6.4.0-18.1 as a component of Image SLE-Micro-GCE
+
+ kernel-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-BYOS
+
+
+ cluster-md-kmp-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ dlm-kmp-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ gfs2-kmp-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ kernel-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ ocfs2-kmp-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ cluster-md-kmp-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
+
+ dlm-kmp-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
+
+ gfs2-kmp-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
+
+ kernel-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
+
+ ocfs2-kmp-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
kernel-azure-5.14.21-150500.33.60.1 as a component of Image SLES15-SP5-Azure-Basic
@@ -4219,6 +4267,17 @@
Image SLE-Micro-BYOS-GCE:kernel-default-6.4.0-18.1
Image SLE-Micro-EC2:kernel-default-6.4.0-18.1
Image SLE-Micro-GCE:kernel-default-6.4.0-18.1
+ Image SLES12-SP5-GCE-BYOS:kernel-default-4.12.14-122.231.1
+ Image SLES12-SP5-GCE-SAP-BYOS:cluster-md-kmp-default-4.12.14-122.231.1
+ Image SLES12-SP5-GCE-SAP-BYOS:dlm-kmp-default-4.12.14-122.231.1
+ Image SLES12-SP5-GCE-SAP-BYOS:gfs2-kmp-default-4.12.14-122.231.1
+ Image SLES12-SP5-GCE-SAP-BYOS:kernel-default-4.12.14-122.231.1
+ Image SLES12-SP5-GCE-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.231.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:cluster-md-kmp-default-4.12.14-122.231.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:dlm-kmp-default-4.12.14-122.231.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:gfs2-kmp-default-4.12.14-122.231.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:kernel-default-4.12.14-122.231.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:ocfs2-kmp-default-4.12.14-122.231.1
Image SLES15-SP5-Azure-Basic:kernel-azure-5.14.21-150500.33.60.1
Image SLES15-SP5-Azure-Standard:kernel-azure-5.14.21-150500.33.60.1
Image SLES15-SP5-BYOS-Azure:kernel-default-5.14.21-150500.55.73.1
skipping CVE-2024-38355 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-38306 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-38286 as CVE page is older than CVRF-CVE file.
no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2024-37894
no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2024-37891
--- /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2024-37891.xml 2024-10-20 01:18:01.706840000 +0200
+++ /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2024-37891.xml.new 2024-10-29 01:16:46.086063000 +0100
@@ -14,13 +14,13 @@
1
- 38
- 2024-10-19T23:18:01Z
+ 39
+ 2024-10-29T00:16:45Z
current
2024-06-18T23:09:36Z
- 2024-10-19T23:18:01Z
+ 2024-10-29T00:16:45Z
cve-database/bin/generate-cvrf-cve.pl
2020-12-27T01:00:00Z
@@ -132,6 +132,21 @@
Image SLES12-SP5-EC2-BYOS
+
+
+ Image SLES12-SP5-GCE-BYOS
+
+
+
+
+ Image SLES12-SP5-GCE-SAP-BYOS
+
+
+
+
+ Image SLES12-SP5-GCE-SAP-On-Demand
+
+
Image SLES12-SP5-SAP-Azure-LI-BYOS-Production
@@ -1423,6 +1438,11 @@
SUSE Manager Proxy 4.3
+
+
+ SUSE Manager Proxy Module 4.3
+
+
SUSE Linux Enterprise Module for Public Cloud 15 SP4
@@ -1439,6 +1459,21 @@
SUSE Manager Server 4.3
+
+
+ SUSE Manager Server Module 4.3
+
+
+
+
+ SUSE Manager Tools 12
+
+
+
+
+ SUSE Manager Tools 15
+
+
openSUSE Leap 15.5
@@ -2060,6 +2095,12 @@
venv-salt-minion
+
+ venv-salt-minion-3006.0-150000.3.67.1
+
+
+ venv-salt-minion-3006.0-3.65.1
+
python3-urllib3-1.25.10-150300.4.12.1 as a component of Container bci/kiwi:9.24.43-8.6
@@ -2111,6 +2152,24 @@
python3-urllib3-1.25.10-3.40.1 as a component of Image SLES12-SP5-EC2-BYOS
+
+ python-urllib3-1.25.10-3.40.1 as a component of Image SLES12-SP5-GCE-BYOS
+
+
+ python3-urllib3-1.25.10-3.40.1 as a component of Image SLES12-SP5-GCE-BYOS
+
+
+ python-urllib3-1.25.10-3.40.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ python3-urllib3-1.25.10-3.40.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ python-urllib3-1.25.10-3.40.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
+
+ python3-urllib3-1.25.10-3.40.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
python-urllib3-1.25.10-3.40.1 as a component of Image SLES12-SP5-SAP-Azure-LI-BYOS-Production
@@ -3320,6 +3379,18 @@
python312-urllib3-2.1.0-3.1 as a component of openSUSE Tumbleweed
+
+ venv-salt-minion-3006.0-150000.3.67.1 as a component of SUSE Manager Proxy Module 4.3
+
+
+ venv-salt-minion-3006.0-150000.3.67.1 as a component of SUSE Manager Server Module 4.3
+
+
+ venv-salt-minion-3006.0-3.65.1 as a component of SUSE Manager Tools 12
+
+
+ venv-salt-minion-3006.0-150000.3.67.1 as a component of SUSE Manager Tools 15
+
python3-urllib3 as a component of SUSE Enterprise Storage 7.1
@@ -3419,9 +3490,6 @@
python-urllib3 as a component of SUSE Linux Enterprise Server for SAP Applications 12 SP5
-
- python3-urllib3 as a component of SUSE Linux Enterprise Server for SAP Applications 12 SP5
-
python2-urllib3 as a component of SUSE Linux Enterprise Server for SAP Applications 15 SP2
@@ -3507,6 +3575,12 @@
Image SLES12-SP5-Azure-SAP-BYOS:python3-urllib3-1.25.10-3.40.1
Image SLES12-SP5-EC2-BYOS:python-urllib3-1.25.10-3.40.1
Image SLES12-SP5-EC2-BYOS:python3-urllib3-1.25.10-3.40.1
+ Image SLES12-SP5-GCE-BYOS:python-urllib3-1.25.10-3.40.1
+ Image SLES12-SP5-GCE-BYOS:python3-urllib3-1.25.10-3.40.1
+ Image SLES12-SP5-GCE-SAP-BYOS:python-urllib3-1.25.10-3.40.1
+ Image SLES12-SP5-GCE-SAP-BYOS:python3-urllib3-1.25.10-3.40.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:python-urllib3-1.25.10-3.40.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:python3-urllib3-1.25.10-3.40.1
Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:python-urllib3-1.25.10-3.40.1
Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production:python-urllib3-1.25.10-3.40.1
Image SLES15-SP3-BYOS-Azure:python3-urllib3-1.25.10-150300.4.12.1
@@ -3911,6 +3985,12 @@
openSUSE Tumbleweed:python311-urllib3-2.1.0-3.1
openSUSE Tumbleweed:python312-urllib3-2.1.0-3.1
+
+ SUSE Manager Proxy Module 4.3:venv-salt-minion-3006.0-150000.3.67.1
+ SUSE Manager Server Module 4.3:venv-salt-minion-3006.0-150000.3.67.1
+ SUSE Manager Tools 12:venv-salt-minion-3006.0-3.65.1
+ SUSE Manager Tools 15:venv-salt-minion-3006.0-150000.3.67.1
+
chost:amazon/suse-sles-15-sp3-chost-byos-v20240807-hvm-ssd-x86_64
chost:amazon/suse-sles-15-sp3-chost-byos-v20240912-hvm-ssd-x86_64
skipping CVE-2024-37535 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-37407 as CVE page is older than CVRF-CVE file.
No V5 entry found for CVE-2024-37372 / /home/securitybot/prod/cve-database/cvelistV5/cves/2024/37xxxx/CVE-2024-37372.json:No such file or directory
no cpe found for SUSE Liberty Linux 7 LTSS in CVE-2024-37371
no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2024-37371
no cpe found for SUSE Liberty Linux 7 LTSS in CVE-2024-37370
no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2024-37370
skipping CVE-2024-37356 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-37353 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-37078 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-37026 as CVE page is older than CVRF-CVE file.
no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2024-36964
skipping CVE-2024-36979 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-36978 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-36977 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-36976 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-36975 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-36974 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-36973 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-36972 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-36971 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-36970 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-36969 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-36968 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-36967 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-36966 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-36965 as CVE page is older than CVRF-CVE file.
--- /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2024-36964.xml 2024-10-18 01:17:45.260741000 +0200
+++ /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2024-36964.xml.new 2024-10-29 01:16:59.752856000 +0100
@@ -14,13 +14,13 @@
1
- 63
- 2024-10-17T23:17:44Z
+ 64
+ 2024-10-29T00:16:59Z
current
2024-06-03T23:09:15Z
- 2024-10-17T23:17:44Z
+ 2024-10-29T00:16:59Z
cve-database/bin/generate-cvrf-cve.pl
2020-12-27T01:00:00Z
@@ -2684,21 +2684,36 @@
kernel-livepatch-5_14_21-150400_24_103-default-10-150400.2.1
+
+ kernel-livepatch-5_14_21-150400_24_108-default-10-150400.9.8.1
+
kernel-livepatch-5_14_21-150400_24_108-default-9-150400.9.8.1
kernel-livepatch-5_14_21-150400_24_111-default-7-150400.9.6.1
+
+ kernel-livepatch-5_14_21-150400_24_111-default-8-150400.9.6.1
+
kernel-livepatch-5_14_21-150400_24_116-default-7-150400.9.8.1
+
+ kernel-livepatch-5_14_21-150400_24_116-default-8-150400.9.8.1
+
kernel-livepatch-5_14_21-150400_24_119-default-6-150400.9.6.1
+
+ kernel-livepatch-5_14_21-150400_24_119-default-7-150400.9.6.1
+
kernel-livepatch-5_14_21-150400_24_122-default-4-150400.9.6.1
+
+ kernel-livepatch-5_14_21-150400_24_122-default-5-150400.9.6.1
+
kernel-livepatch-5_14_21-150400_24_125-default-1-150400.9.3.1
@@ -2726,21 +2741,36 @@
kernel-livepatch-5_14_21-150500_13_30-rt-11-150500.2.1
+
+ kernel-livepatch-5_14_21-150500_13_35-rt-10-150500.11.8.1
+
kernel-livepatch-5_14_21-150500_13_35-rt-9-150500.11.8.1
kernel-livepatch-5_14_21-150500_13_38-rt-7-150500.11.6.1
+
+ kernel-livepatch-5_14_21-150500_13_38-rt-8-150500.11.6.1
+
kernel-livepatch-5_14_21-150500_13_47-rt-7-150500.11.6.1
+
+ kernel-livepatch-5_14_21-150500_13_47-rt-8-150500.11.6.1
+
kernel-livepatch-5_14_21-150500_13_52-rt-5-150500.11.8.1
+
+ kernel-livepatch-5_14_21-150500_13_52-rt-6-150500.11.8.1
+
kernel-livepatch-5_14_21-150500_13_55-rt-5-150500.11.6.1
+
+ kernel-livepatch-5_14_21-150500_13_55-rt-6-150500.11.6.1
+
kernel-livepatch-5_14_21-150500_13_61-rt-1-150500.11.3.1
@@ -2759,21 +2789,36 @@
kernel-livepatch-5_14_21-150500_55_44-default-11-150500.2.1
+
+ kernel-livepatch-5_14_21-150500_55_49-default-10-150500.11.8.1
+
kernel-livepatch-5_14_21-150500_55_49-default-9-150500.11.8.1
kernel-livepatch-5_14_21-150500_55_52-default-7-150500.11.6.1
+
+ kernel-livepatch-5_14_21-150500_55_52-default-8-150500.11.6.1
+
kernel-livepatch-5_14_21-150500_55_59-default-7-150500.11.10.1
+
+ kernel-livepatch-5_14_21-150500_55_59-default-8-150500.11.10.1
+
kernel-livepatch-5_14_21-150500_55_62-default-5-150500.11.6.1
+
+ kernel-livepatch-5_14_21-150500_55_62-default-6-150500.11.6.1
+
kernel-livepatch-5_14_21-150500_55_65-default-5-150500.11.6.1
+
+ kernel-livepatch-5_14_21-150500_55_65-default-6-150500.11.6.1
+
kernel-livepatch-5_14_21-150500_55_73-default-1-150500.11.3.1
@@ -2798,15 +2843,27 @@
kernel-livepatch-5_3_18-150200_24_183-default-8-150200.5.6.1
+
+ kernel-livepatch-5_3_18-150200_24_183-default-9-150200.5.6.1
+
kernel-livepatch-5_3_18-150200_24_188-default-7-150200.5.6.1
+
+ kernel-livepatch-5_3_18-150200_24_188-default-8-150200.5.6.1
+
kernel-livepatch-5_3_18-150200_24_191-default-6-150200.5.6.1
+
+ kernel-livepatch-5_3_18-150200_24_191-default-7-150200.5.6.1
+
kernel-livepatch-5_3_18-150200_24_194-default-3-150200.5.6.1
+
+ kernel-livepatch-5_3_18-150200_24_194-default-4-150200.5.6.1
+
kernel-livepatch-5_3_18-150200_24_197-default-1-150200.5.3.1
@@ -2831,15 +2888,27 @@
kernel-livepatch-5_3_18-150300_59_153-default-8-150300.7.6.1
+
+ kernel-livepatch-5_3_18-150300_59_153-default-9-150300.7.6.1
+
kernel-livepatch-5_3_18-150300_59_158-default-7-150300.7.6.1
+
+ kernel-livepatch-5_3_18-150300_59_158-default-8-150300.7.6.1
+
kernel-livepatch-5_3_18-150300_59_161-default-6-150300.7.6.1
+
+ kernel-livepatch-5_3_18-150300_59_161-default-7-150300.7.6.1
+
kernel-livepatch-5_3_18-150300_59_164-default-3-150300.7.6.1
+
+ kernel-livepatch-5_3_18-150300_59_164-default-4-150300.7.6.1
+
kernel-livepatch-5_3_18-150300_59_167-default-1-150300.7.3.1
@@ -2849,6 +2918,9 @@
kernel-livepatch-6_4_0-150600_21-default-5-150600.1.1
+
+ kernel-livepatch-6_4_0-150600_21-default-6-150600.4.10.1
+
kernel-livepatch-6_4_0-150600_23_14-default-1-150600.13.3.2
@@ -3170,12 +3242,21 @@
kgraft-patch-4_12_14-122_201-default-8-8.10.1
+
+ kgraft-patch-4_12_14-122_201-default-9-8.10.1
+
kgraft-patch-4_12_14-122_216-default-6-8.6.1
+
+ kgraft-patch-4_12_14-122_216-default-7-8.6.1
+
kgraft-patch-4_12_14-122_219-default-3-8.6.1
+
+ kgraft-patch-4_12_14-122_219-default-4-8.6.1
+
kgraft-patch-4_12_14-122_222-default-1-8.3.1
@@ -6572,6 +6653,87 @@
kernel-rt-5.14.21-150500.13.61.1 as a component of openSUSE Leap Micro 5.5
+
+ kgraft-patch-4_12_14-122_201-default-9-8.10.1 as a component of SUSE Linux Enterprise Live Patching 12 SP5
+
+
+ kgraft-patch-4_12_14-122_216-default-7-8.6.1 as a component of SUSE Linux Enterprise Live Patching 12 SP5
+
+
+ kgraft-patch-4_12_14-122_219-default-4-8.6.1 as a component of SUSE Linux Enterprise Live Patching 12 SP5
+
+
+ kernel-livepatch-5_3_18-150200_24_183-default-9-150200.5.6.1 as a component of SUSE Linux Enterprise Live Patching 15 SP2
+
+
+ kernel-livepatch-5_3_18-150200_24_188-default-8-150200.5.6.1 as a component of SUSE Linux Enterprise Live Patching 15 SP2
+
+
+ kernel-livepatch-5_3_18-150200_24_191-default-7-150200.5.6.1 as a component of SUSE Linux Enterprise Live Patching 15 SP2
+
+
+ kernel-livepatch-5_3_18-150200_24_194-default-4-150200.5.6.1 as a component of SUSE Linux Enterprise Live Patching 15 SP2
+
+
+ kernel-livepatch-5_3_18-150300_59_153-default-9-150300.7.6.1 as a component of SUSE Linux Enterprise Live Patching 15 SP3
+
+
+ kernel-livepatch-5_3_18-150300_59_158-default-8-150300.7.6.1 as a component of SUSE Linux Enterprise Live Patching 15 SP3
+
+
+ kernel-livepatch-5_3_18-150300_59_161-default-7-150300.7.6.1 as a component of SUSE Linux Enterprise Live Patching 15 SP3
+
+
+ kernel-livepatch-5_3_18-150300_59_164-default-4-150300.7.6.1 as a component of SUSE Linux Enterprise Live Patching 15 SP3
+
+
+ kernel-livepatch-5_14_21-150400_24_108-default-10-150400.9.8.1 as a component of SUSE Linux Enterprise Live Patching 15 SP4
+
+
+ kernel-livepatch-5_14_21-150400_24_111-default-8-150400.9.6.1 as a component of SUSE Linux Enterprise Live Patching 15 SP4
+
+
+ kernel-livepatch-5_14_21-150400_24_116-default-8-150400.9.8.1 as a component of SUSE Linux Enterprise Live Patching 15 SP4
+
+
+ kernel-livepatch-5_14_21-150400_24_119-default-7-150400.9.6.1 as a component of SUSE Linux Enterprise Live Patching 15 SP4
+
+
+ kernel-livepatch-5_14_21-150400_24_122-default-5-150400.9.6.1 as a component of SUSE Linux Enterprise Live Patching 15 SP4
+
+
+ kernel-livepatch-5_14_21-150500_13_35-rt-10-150500.11.8.1 as a component of SUSE Linux Enterprise Live Patching 15 SP5
+
+
+ kernel-livepatch-5_14_21-150500_13_38-rt-8-150500.11.6.1 as a component of SUSE Linux Enterprise Live Patching 15 SP5
+
+
+ kernel-livepatch-5_14_21-150500_13_47-rt-8-150500.11.6.1 as a component of SUSE Linux Enterprise Live Patching 15 SP5
+
+
+ kernel-livepatch-5_14_21-150500_13_52-rt-6-150500.11.8.1 as a component of SUSE Linux Enterprise Live Patching 15 SP5
+
+
+ kernel-livepatch-5_14_21-150500_13_55-rt-6-150500.11.6.1 as a component of SUSE Linux Enterprise Live Patching 15 SP5
+
+
+ kernel-livepatch-5_14_21-150500_55_49-default-10-150500.11.8.1 as a component of SUSE Linux Enterprise Live Patching 15 SP5
+
+
+ kernel-livepatch-5_14_21-150500_55_52-default-8-150500.11.6.1 as a component of SUSE Linux Enterprise Live Patching 15 SP5
+
+
+ kernel-livepatch-5_14_21-150500_55_59-default-8-150500.11.10.1 as a component of SUSE Linux Enterprise Live Patching 15 SP5
+
+
+ kernel-livepatch-5_14_21-150500_55_62-default-6-150500.11.6.1 as a component of SUSE Linux Enterprise Live Patching 15 SP5
+
+
+ kernel-livepatch-5_14_21-150500_55_65-default-6-150500.11.6.1 as a component of SUSE Linux Enterprise Live Patching 15 SP5
+
+
+ kernel-livepatch-6_4_0-150600_21-default-6-150600.4.10.1 as a component of SUSE Linux Enterprise Live Patching 15 SP6
+
kernel-default as a component of SUSE Linux Enterprise Micro 5.0
@@ -7839,6 +8001,35 @@
openSUSE Leap Micro 5.5:kernel-default-base-5.14.21-150500.55.73.1.150500.6.33.8
openSUSE Leap Micro 5.5:kernel-rt-5.14.21-150500.13.61.1
+
+ SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_201-default-9-8.10.1
+ SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_216-default-7-8.6.1
+ SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-4-8.6.1
+ SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_183-default-9-150200.5.6.1
+ SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_188-default-8-150200.5.6.1
+ SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_191-default-7-150200.5.6.1
+ SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_194-default-4-150200.5.6.1
+ SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_153-default-9-150300.7.6.1
+ SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_158-default-8-150300.7.6.1
+ SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_161-default-7-150300.7.6.1
+ SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_164-default-4-150300.7.6.1
+ SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_108-default-10-150400.9.8.1
+ SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_111-default-8-150400.9.6.1
+ SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_116-default-8-150400.9.8.1
+ SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_119-default-7-150400.9.6.1
+ SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_122-default-5-150400.9.6.1
+ SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_35-rt-10-150500.11.8.1
+ SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_38-rt-8-150500.11.6.1
+ SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_47-rt-8-150500.11.6.1
+ SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_52-rt-6-150500.11.8.1
+ SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_55-rt-6-150500.11.6.1
+ SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_49-default-10-150500.11.8.1
+ SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_52-default-8-150500.11.6.1
+ SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_59-default-8-150500.11.10.1
+ SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-6-150500.11.6.1
+ SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_65-default-6-150500.11.6.1
+ SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_21-default-6-150600.4.10.1
+
SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default
SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel
skipping CVE-2024-36963 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-36962 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-36961 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-36959 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-36958 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-36957 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-36956 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-36955 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-36954 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-36953 as CVE page is older than CVRF-CVE file.
--- /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2024-36952.xml 2024-10-16 01:20:50.864721000 +0200
+++ /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2024-36952.xml.new 2024-10-29 01:17:01.188804000 +0100
@@ -14,13 +14,13 @@
1
- 58
- 2024-10-15T23:20:50Z
+ 59
+ 2024-10-29T00:17:00Z
current
2024-06-04T23:09:34Z
- 2024-10-15T23:20:50Z
+ 2024-10-29T00:17:00Z
cve-database/bin/generate-cvrf-cve.pl
2020-12-27T01:00:00Z
@@ -2365,41 +2365,41 @@
ocfs2-kmp-default-4.12.14-122.222.1 as a component of Image SLES12-SP5-EC2-SAP-On-Demand
-
- kernel-default-4.12.14-122.222.1 as a component of Image SLES12-SP5-GCE-BYOS
+
+ kernel-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-BYOS
kernel-default-4.12.14-122.222.1 as a component of Image SLES12-SP5-GCE-On-Demand
-
- cluster-md-kmp-default-4.12.14-122.222.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+ cluster-md-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
-
- dlm-kmp-default-4.12.14-122.222.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+ dlm-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
-
- gfs2-kmp-default-4.12.14-122.222.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+ gfs2-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
-
- kernel-default-4.12.14-122.222.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+ kernel-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
-
- ocfs2-kmp-default-4.12.14-122.222.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+ ocfs2-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
-
- cluster-md-kmp-default-4.12.14-122.222.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
+ cluster-md-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
-
- dlm-kmp-default-4.12.14-122.222.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
+ dlm-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
-
- gfs2-kmp-default-4.12.14-122.222.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
+ gfs2-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
-
- kernel-default-4.12.14-122.222.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
+ kernel-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
-
- ocfs2-kmp-default-4.12.14-122.222.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
+ ocfs2-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
cluster-md-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-SAP-Azure-LI-BYOS-Production
@@ -4735,18 +4735,18 @@
Image SLES12-SP5-EC2-SAP-On-Demand:gfs2-kmp-default-4.12.14-122.222.1
Image SLES12-SP5-EC2-SAP-On-Demand:kernel-default-4.12.14-122.222.1
Image SLES12-SP5-EC2-SAP-On-Demand:ocfs2-kmp-default-4.12.14-122.222.1
- Image SLES12-SP5-GCE-BYOS:kernel-default-4.12.14-122.222.1
+ Image SLES12-SP5-GCE-BYOS:kernel-default-4.12.14-122.225.1
Image SLES12-SP5-GCE-On-Demand:kernel-default-4.12.14-122.222.1
- Image SLES12-SP5-GCE-SAP-BYOS:cluster-md-kmp-default-4.12.14-122.222.1
- Image SLES12-SP5-GCE-SAP-BYOS:dlm-kmp-default-4.12.14-122.222.1
- Image SLES12-SP5-GCE-SAP-BYOS:gfs2-kmp-default-4.12.14-122.222.1
- Image SLES12-SP5-GCE-SAP-BYOS:kernel-default-4.12.14-122.222.1
- Image SLES12-SP5-GCE-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.222.1
- Image SLES12-SP5-GCE-SAP-On-Demand:cluster-md-kmp-default-4.12.14-122.222.1
- Image SLES12-SP5-GCE-SAP-On-Demand:dlm-kmp-default-4.12.14-122.222.1
- Image SLES12-SP5-GCE-SAP-On-Demand:gfs2-kmp-default-4.12.14-122.222.1
- Image SLES12-SP5-GCE-SAP-On-Demand:kernel-default-4.12.14-122.222.1
- Image SLES12-SP5-GCE-SAP-On-Demand:ocfs2-kmp-default-4.12.14-122.222.1
+ Image SLES12-SP5-GCE-SAP-BYOS:cluster-md-kmp-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-BYOS:dlm-kmp-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-BYOS:gfs2-kmp-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-BYOS:kernel-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:cluster-md-kmp-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:dlm-kmp-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:gfs2-kmp-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:kernel-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:ocfs2-kmp-default-4.12.14-122.225.1
Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:cluster-md-kmp-default-4.12.14-122.225.1
Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:dlm-kmp-default-4.12.14-122.225.1
Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:gfs2-kmp-default-4.12.14-122.225.1
skipping CVE-2024-36951 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-36948 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-36947 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-36946 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-36945 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-36944 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-36943 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-36942 as CVE page is older than CVRF-CVE file.
no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2024-36940
--- /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2024-36939.xml 2024-10-22 01:28:05.364838000 +0200
+++ /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2024-36939.xml.new 2024-10-29 01:17:04.641092000 +0100
@@ -14,13 +14,13 @@
1
- 34
- 2024-10-21T23:28:04Z
+ 35
+ 2024-10-29T00:17:03Z
current
2024-06-03T23:09:26Z
- 2024-10-21T23:28:04Z
+ 2024-10-29T00:17:03Z
cve-database/bin/generate-cvrf-cve.pl
2020-12-27T01:00:00Z
@@ -185,6 +185,21 @@
Image SLES12-SP5-EC2-BYOS
+
+
+ Image SLES12-SP5-GCE-BYOS
+
+
+
+
+ Image SLES12-SP5-GCE-SAP-BYOS
+
+
+
+
+ Image SLES12-SP5-GCE-SAP-On-Demand
+
+
Image SLES12-SP5-SAP-Azure-LI-BYOS-Production
@@ -1986,6 +2001,39 @@
kernel-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-EC2-BYOS
+
+ kernel-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-BYOS
+
+
+ cluster-md-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ dlm-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ gfs2-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ kernel-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ ocfs2-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ cluster-md-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
+
+ dlm-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
+
+ gfs2-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
+
+ kernel-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
+
+ ocfs2-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
cluster-md-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-SAP-Azure-LI-BYOS-Production
@@ -4005,6 +4053,17 @@
Image SLES12-SP5-Azure-SAP-BYOS:kernel-default-4.12.14-122.225.1
Image SLES12-SP5-Azure-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.225.1
Image SLES12-SP5-EC2-BYOS:kernel-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-BYOS:kernel-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-BYOS:cluster-md-kmp-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-BYOS:dlm-kmp-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-BYOS:gfs2-kmp-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-BYOS:kernel-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:cluster-md-kmp-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:dlm-kmp-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:gfs2-kmp-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:kernel-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:ocfs2-kmp-default-4.12.14-122.225.1
Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:cluster-md-kmp-default-4.12.14-122.225.1
Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:dlm-kmp-default-4.12.14-122.225.1
Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:gfs2-kmp-default-4.12.14-122.225.1
skipping CVE-2024-36937 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-36936 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-36935 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-36933 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-36932 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-36931 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-36930 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-36929 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-36928 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-36927 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-36926 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-36925 as CVE page is older than CVRF-CVE file.
--- /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2024-36924.xml 2024-10-16 01:21:10.663653000 +0200
+++ /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2024-36924.xml.new 2024-10-29 01:17:06.588036000 +0100
@@ -14,13 +14,13 @@
1
- 53
- 2024-10-15T23:21:10Z
+ 54
+ 2024-10-29T00:17:06Z
current
2024-06-03T23:09:30Z
- 2024-10-15T23:21:10Z
+ 2024-10-29T00:17:06Z
cve-database/bin/generate-cvrf-cve.pl
2020-12-27T01:00:00Z
@@ -172,6 +172,21 @@
Image SLES12-SP5-EC2-BYOS
+
+
+ Image SLES12-SP5-GCE-BYOS
+
+
+
+
+ Image SLES12-SP5-GCE-SAP-BYOS
+
+
+
+
+ Image SLES12-SP5-GCE-SAP-On-Demand
+
+
Image SLES12-SP5-SAP-Azure-LI-BYOS-Production
@@ -2284,6 +2299,39 @@
kernel-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-EC2-BYOS
+
+ kernel-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-BYOS
+
+
+ cluster-md-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ dlm-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ gfs2-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ kernel-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ ocfs2-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ cluster-md-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
+
+ dlm-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
+
+ gfs2-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
+
+ kernel-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
+
+ ocfs2-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
cluster-md-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-SAP-Azure-LI-BYOS-Production
@@ -4633,6 +4681,17 @@
Image SLES12-SP5-Azure-SAP-BYOS:kernel-default-4.12.14-122.225.1
Image SLES12-SP5-Azure-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.225.1
Image SLES12-SP5-EC2-BYOS:kernel-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-BYOS:kernel-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-BYOS:cluster-md-kmp-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-BYOS:dlm-kmp-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-BYOS:gfs2-kmp-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-BYOS:kernel-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:cluster-md-kmp-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:dlm-kmp-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:gfs2-kmp-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:kernel-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:ocfs2-kmp-default-4.12.14-122.225.1
Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:cluster-md-kmp-default-4.12.14-122.225.1
Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:dlm-kmp-default-4.12.14-122.225.1
Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:gfs2-kmp-default-4.12.14-122.225.1
skipping CVE-2024-36922 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-36921 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-36920 as CVE page is older than CVRF-CVE file.
--- /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2024-36919.xml 2024-10-16 01:21:14.446482000 +0200
+++ /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2024-36919.xml.new 2024-10-29 01:17:08.254916000 +0100
@@ -14,13 +14,13 @@
1
- 59
- 2024-10-15T23:21:13Z
+ 60
+ 2024-10-29T00:17:07Z
current
2024-05-31T23:09:38Z
- 2024-10-15T23:21:13Z
+ 2024-10-29T00:17:07Z
cve-database/bin/generate-cvrf-cve.pl
2020-12-27T01:00:00Z
@@ -2463,41 +2463,41 @@
ocfs2-kmp-default-4.12.14-122.222.1 as a component of Image SLES12-SP5-EC2-SAP-On-Demand
-
- kernel-default-4.12.14-122.222.1 as a component of Image SLES12-SP5-GCE-BYOS
+
+ kernel-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-BYOS
kernel-default-4.12.14-122.222.1 as a component of Image SLES12-SP5-GCE-On-Demand
-
- cluster-md-kmp-default-4.12.14-122.222.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+ cluster-md-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
-
- dlm-kmp-default-4.12.14-122.222.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+ dlm-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
-
- gfs2-kmp-default-4.12.14-122.222.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+ gfs2-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
-
- kernel-default-4.12.14-122.222.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+ kernel-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
-
- ocfs2-kmp-default-4.12.14-122.222.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+ ocfs2-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
-
- cluster-md-kmp-default-4.12.14-122.222.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
+ cluster-md-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
-
- dlm-kmp-default-4.12.14-122.222.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
+ dlm-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
-
- gfs2-kmp-default-4.12.14-122.222.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
+ gfs2-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
-
- kernel-default-4.12.14-122.222.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
+ kernel-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
-
- ocfs2-kmp-default-4.12.14-122.222.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
+ ocfs2-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
cluster-md-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-SAP-Azure-LI-BYOS-Production
@@ -4890,18 +4890,18 @@
Image SLES12-SP5-EC2-SAP-On-Demand:gfs2-kmp-default-4.12.14-122.222.1
Image SLES12-SP5-EC2-SAP-On-Demand:kernel-default-4.12.14-122.222.1
Image SLES12-SP5-EC2-SAP-On-Demand:ocfs2-kmp-default-4.12.14-122.222.1
- Image SLES12-SP5-GCE-BYOS:kernel-default-4.12.14-122.222.1
+ Image SLES12-SP5-GCE-BYOS:kernel-default-4.12.14-122.225.1
Image SLES12-SP5-GCE-On-Demand:kernel-default-4.12.14-122.222.1
- Image SLES12-SP5-GCE-SAP-BYOS:cluster-md-kmp-default-4.12.14-122.222.1
- Image SLES12-SP5-GCE-SAP-BYOS:dlm-kmp-default-4.12.14-122.222.1
- Image SLES12-SP5-GCE-SAP-BYOS:gfs2-kmp-default-4.12.14-122.222.1
- Image SLES12-SP5-GCE-SAP-BYOS:kernel-default-4.12.14-122.222.1
- Image SLES12-SP5-GCE-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.222.1
- Image SLES12-SP5-GCE-SAP-On-Demand:cluster-md-kmp-default-4.12.14-122.222.1
- Image SLES12-SP5-GCE-SAP-On-Demand:dlm-kmp-default-4.12.14-122.222.1
- Image SLES12-SP5-GCE-SAP-On-Demand:gfs2-kmp-default-4.12.14-122.222.1
- Image SLES12-SP5-GCE-SAP-On-Demand:kernel-default-4.12.14-122.222.1
- Image SLES12-SP5-GCE-SAP-On-Demand:ocfs2-kmp-default-4.12.14-122.222.1
+ Image SLES12-SP5-GCE-SAP-BYOS:cluster-md-kmp-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-BYOS:dlm-kmp-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-BYOS:gfs2-kmp-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-BYOS:kernel-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:cluster-md-kmp-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:dlm-kmp-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:gfs2-kmp-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:kernel-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:ocfs2-kmp-default-4.12.14-122.225.1
Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:cluster-md-kmp-default-4.12.14-122.225.1
Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:dlm-kmp-default-4.12.14-122.225.1
Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:gfs2-kmp-default-4.12.14-122.225.1
skipping CVE-2024-36918 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-36916 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-36915 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-36914 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-36913 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-36912 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-36911 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-36910 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-36909 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-36908 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-36907 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-36906 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-36905 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-36904 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-36903 as CVE page is older than CVRF-CVE file.
--- /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2024-36902.xml 2024-10-16 01:21:30.481629000 +0200
+++ /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2024-36902.xml.new 2024-10-29 01:17:09.517855000 +0100
@@ -14,13 +14,13 @@
1
- 47
- 2024-10-15T23:21:29Z
+ 48
+ 2024-10-29T00:17:08Z
current
2024-05-31T23:09:45Z
- 2024-10-15T23:21:29Z
+ 2024-10-29T00:17:08Z
cve-database/bin/generate-cvrf-cve.pl
2020-12-27T01:00:00Z
@@ -220,6 +220,21 @@
Image SLES12-SP5-EC2-BYOS
+
+
+ Image SLES12-SP5-GCE-BYOS
+
+
+
+
+ Image SLES12-SP5-GCE-SAP-BYOS
+
+
+
+
+ Image SLES12-SP5-GCE-SAP-On-Demand
+
+
Image SLES12-SP5-SAP-Azure-LI-BYOS-Production
@@ -2302,6 +2317,39 @@
kernel-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-EC2-BYOS
+
+ kernel-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-BYOS
+
+
+ cluster-md-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ dlm-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ gfs2-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ kernel-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ ocfs2-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ cluster-md-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
+
+ dlm-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
+
+ gfs2-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
+
+ kernel-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
+
+ ocfs2-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
cluster-md-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-SAP-Azure-LI-BYOS-Production
@@ -4652,6 +4700,17 @@
Image SLES12-SP5-Azure-SAP-BYOS:kernel-default-4.12.14-122.225.1
Image SLES12-SP5-Azure-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.225.1
Image SLES12-SP5-EC2-BYOS:kernel-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-BYOS:kernel-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-BYOS:cluster-md-kmp-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-BYOS:dlm-kmp-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-BYOS:gfs2-kmp-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-BYOS:kernel-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:cluster-md-kmp-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:dlm-kmp-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:gfs2-kmp-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:kernel-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:ocfs2-kmp-default-4.12.14-122.225.1
Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:cluster-md-kmp-default-4.12.14-122.225.1
Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:dlm-kmp-default-4.12.14-122.225.1
Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:gfs2-kmp-default-4.12.14-122.225.1
--- /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2024-36901.xml 2024-10-16 01:21:31.579553000 +0200
+++ /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2024-36901.xml.new 2024-10-29 01:17:10.240798000 +0100
@@ -14,13 +14,13 @@
1
- 47
- 2024-10-15T23:21:30Z
+ 48
+ 2024-10-29T00:17:09Z
current
2024-05-31T23:09:46Z
- 2024-10-15T23:21:30Z
+ 2024-10-29T00:17:09Z
cve-database/bin/generate-cvrf-cve.pl
2020-12-27T01:00:00Z
@@ -217,6 +217,21 @@
Image SLES12-SP5-EC2-BYOS
+
+
+ Image SLES12-SP5-GCE-BYOS
+
+
+
+
+ Image SLES12-SP5-GCE-SAP-BYOS
+
+
+
+
+ Image SLES12-SP5-GCE-SAP-On-Demand
+
+
Image SLES12-SP5-SAP-Azure-LI-BYOS-Production
@@ -2299,6 +2314,39 @@
kernel-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-EC2-BYOS
+
+ kernel-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-BYOS
+
+
+ cluster-md-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ dlm-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ gfs2-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ kernel-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ ocfs2-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ cluster-md-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
+
+ dlm-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
+
+ gfs2-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
+
+ kernel-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
+
+ ocfs2-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
cluster-md-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-SAP-Azure-LI-BYOS-Production
@@ -4646,6 +4694,17 @@
Image SLES12-SP5-Azure-SAP-BYOS:kernel-default-4.12.14-122.225.1
Image SLES12-SP5-Azure-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.225.1
Image SLES12-SP5-EC2-BYOS:kernel-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-BYOS:kernel-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-BYOS:cluster-md-kmp-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-BYOS:dlm-kmp-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-BYOS:gfs2-kmp-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-BYOS:kernel-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:cluster-md-kmp-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:dlm-kmp-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:gfs2-kmp-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:kernel-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:ocfs2-kmp-default-4.12.14-122.225.1
Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:cluster-md-kmp-default-4.12.14-122.225.1
Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:dlm-kmp-default-4.12.14-122.225.1
Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:gfs2-kmp-default-4.12.14-122.225.1
no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2024-36899
skipping CVE-2024-36900 as CVE page is older than CVRF-CVE file.
--- /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2024-36899.xml 2024-10-22 01:28:34.493707000 +0200
+++ /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2024-36899.xml.new 2024-10-29 01:17:11.134834000 +0100
@@ -14,13 +14,13 @@
1
- 57
- 2024-10-21T23:28:34Z
+ 58
+ 2024-10-29T00:17:10Z
current
2024-05-31T23:09:46Z
- 2024-10-21T23:28:34Z
+ 2024-10-29T00:17:10Z
cve-database/bin/generate-cvrf-cve.pl
2020-12-27T01:00:00Z
@@ -2294,21 +2294,36 @@
kernel-livepatch-5_14_21-150400_24_103-default-10-150400.2.1
+
+ kernel-livepatch-5_14_21-150400_24_108-default-10-150400.9.8.1
+
kernel-livepatch-5_14_21-150400_24_108-default-9-150400.9.8.1
kernel-livepatch-5_14_21-150400_24_111-default-7-150400.9.6.1
+
+ kernel-livepatch-5_14_21-150400_24_111-default-8-150400.9.6.1
+
kernel-livepatch-5_14_21-150400_24_116-default-7-150400.9.8.1
+
+ kernel-livepatch-5_14_21-150400_24_116-default-8-150400.9.8.1
+
kernel-livepatch-5_14_21-150400_24_119-default-6-150400.9.6.1
+
+ kernel-livepatch-5_14_21-150400_24_119-default-7-150400.9.6.1
+
kernel-livepatch-5_14_21-150400_24_122-default-4-150400.9.6.1
+
+ kernel-livepatch-5_14_21-150400_24_122-default-5-150400.9.6.1
+
kernel-livepatch-5_14_21-150400_24_125-default-1-150400.9.3.1
@@ -2336,24 +2351,42 @@
kernel-livepatch-5_14_21-150500_13_30-rt-11-150500.2.1
+
+ kernel-livepatch-5_14_21-150500_13_35-rt-10-150500.11.8.1
+
kernel-livepatch-5_14_21-150500_13_35-rt-9-150500.11.8.1
kernel-livepatch-5_14_21-150500_13_38-rt-7-150500.11.6.1
+
+ kernel-livepatch-5_14_21-150500_13_38-rt-8-150500.11.6.1
+
kernel-livepatch-5_14_21-150500_13_47-rt-7-150500.11.6.1
+
+ kernel-livepatch-5_14_21-150500_13_47-rt-8-150500.11.6.1
+
kernel-livepatch-5_14_21-150500_13_52-rt-5-150500.11.8.1
+
+ kernel-livepatch-5_14_21-150500_13_52-rt-6-150500.11.8.1
+
kernel-livepatch-5_14_21-150500_13_55-rt-5-150500.11.6.1
+
+ kernel-livepatch-5_14_21-150500_13_55-rt-6-150500.11.6.1
+
kernel-livepatch-5_14_21-150500_13_58-rt-4-150500.11.6.1
+
+ kernel-livepatch-5_14_21-150500_13_58-rt-5-150500.11.6.1
+
kernel-livepatch-5_14_21-150500_13_61-rt-1-150500.11.3.1
@@ -2372,24 +2405,42 @@
kernel-livepatch-5_14_21-150500_55_44-default-11-150500.2.1
+
+ kernel-livepatch-5_14_21-150500_55_49-default-10-150500.11.8.1
+
kernel-livepatch-5_14_21-150500_55_49-default-9-150500.11.8.1
kernel-livepatch-5_14_21-150500_55_52-default-7-150500.11.6.1
+
+ kernel-livepatch-5_14_21-150500_55_52-default-8-150500.11.6.1
+
kernel-livepatch-5_14_21-150500_55_59-default-7-150500.11.10.1
+
+ kernel-livepatch-5_14_21-150500_55_59-default-8-150500.11.10.1
+
kernel-livepatch-5_14_21-150500_55_62-default-5-150500.11.6.1
+
+ kernel-livepatch-5_14_21-150500_55_62-default-6-150500.11.6.1
+
kernel-livepatch-5_14_21-150500_55_65-default-5-150500.11.6.1
+
+ kernel-livepatch-5_14_21-150500_55_65-default-6-150500.11.6.1
+
kernel-livepatch-5_14_21-150500_55_68-default-4-150500.11.6.1
+
+ kernel-livepatch-5_14_21-150500_55_68-default-5-150500.11.6.1
+
kernel-livepatch-5_14_21-150500_55_73-default-1-150500.11.3.1
@@ -2399,12 +2450,18 @@
kernel-livepatch-6_4_0-150600_21-default-5-150600.1.1
+
+ kernel-livepatch-6_4_0-150600_21-default-6-150600.4.10.1
+
kernel-livepatch-6_4_0-150600_23_14-default-1-150600.13.3.2
kernel-livepatch-6_4_0-150600_23_7-default-3-150600.13.6.1
+
+ kernel-livepatch-6_4_0-150600_23_7-default-4-150600.13.6.1
+
kernel-livepatch-6_4_0-150600_8-rt-4-150600.3.1
@@ -5150,6 +5207,63 @@
kernel-rt-5.14.21-150500.13.61.1 as a component of openSUSE Leap Micro 5.5
+
+ kernel-livepatch-5_14_21-150400_24_108-default-10-150400.9.8.1 as a component of SUSE Linux Enterprise Live Patching 15 SP4
+
+
+ kernel-livepatch-5_14_21-150400_24_111-default-8-150400.9.6.1 as a component of SUSE Linux Enterprise Live Patching 15 SP4
+
+
+ kernel-livepatch-5_14_21-150400_24_116-default-8-150400.9.8.1 as a component of SUSE Linux Enterprise Live Patching 15 SP4
+
+
+ kernel-livepatch-5_14_21-150400_24_119-default-7-150400.9.6.1 as a component of SUSE Linux Enterprise Live Patching 15 SP4
+
+
+ kernel-livepatch-5_14_21-150400_24_122-default-5-150400.9.6.1 as a component of SUSE Linux Enterprise Live Patching 15 SP4
+
+
+ kernel-livepatch-5_14_21-150500_13_35-rt-10-150500.11.8.1 as a component of SUSE Linux Enterprise Live Patching 15 SP5
+
+
+ kernel-livepatch-5_14_21-150500_13_38-rt-8-150500.11.6.1 as a component of SUSE Linux Enterprise Live Patching 15 SP5
+
+
+ kernel-livepatch-5_14_21-150500_13_47-rt-8-150500.11.6.1 as a component of SUSE Linux Enterprise Live Patching 15 SP5
+
+
+ kernel-livepatch-5_14_21-150500_13_52-rt-6-150500.11.8.1 as a component of SUSE Linux Enterprise Live Patching 15 SP5
+
+
+ kernel-livepatch-5_14_21-150500_13_55-rt-6-150500.11.6.1 as a component of SUSE Linux Enterprise Live Patching 15 SP5
+
+
+ kernel-livepatch-5_14_21-150500_13_58-rt-5-150500.11.6.1 as a component of SUSE Linux Enterprise Live Patching 15 SP5
+
+
+ kernel-livepatch-5_14_21-150500_55_49-default-10-150500.11.8.1 as a component of SUSE Linux Enterprise Live Patching 15 SP5
+
+
+ kernel-livepatch-5_14_21-150500_55_52-default-8-150500.11.6.1 as a component of SUSE Linux Enterprise Live Patching 15 SP5
+
+
+ kernel-livepatch-5_14_21-150500_55_59-default-8-150500.11.10.1 as a component of SUSE Linux Enterprise Live Patching 15 SP5
+
+
+ kernel-livepatch-5_14_21-150500_55_62-default-6-150500.11.6.1 as a component of SUSE Linux Enterprise Live Patching 15 SP5
+
+
+ kernel-livepatch-5_14_21-150500_55_65-default-6-150500.11.6.1 as a component of SUSE Linux Enterprise Live Patching 15 SP5
+
+
+ kernel-livepatch-5_14_21-150500_55_68-default-5-150500.11.6.1 as a component of SUSE Linux Enterprise Live Patching 15 SP5
+
+
+ kernel-livepatch-6_4_0-150600_21-default-6-150600.4.10.1 as a component of SUSE Linux Enterprise Live Patching 15 SP6
+
+
+ kernel-livepatch-6_4_0-150600_23_7-default-4-150600.13.6.1 as a component of SUSE Linux Enterprise Live Patching 15 SP6
+
kernel-default as a component of SUSE Enterprise Storage 7.1
@@ -6418,6 +6532,27 @@
openSUSE Leap Micro 5.5:kernel-default-base-5.14.21-150500.55.73.1.150500.6.33.8
openSUSE Leap Micro 5.5:kernel-rt-5.14.21-150500.13.61.1
+
+ SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_108-default-10-150400.9.8.1
+ SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_111-default-8-150400.9.6.1
+ SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_116-default-8-150400.9.8.1
+ SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_119-default-7-150400.9.6.1
+ SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_122-default-5-150400.9.6.1
+ SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_35-rt-10-150500.11.8.1
+ SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_38-rt-8-150500.11.6.1
+ SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_47-rt-8-150500.11.6.1
+ SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_52-rt-6-150500.11.8.1
+ SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_55-rt-6-150500.11.6.1
+ SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-5-150500.11.6.1
+ SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_49-default-10-150500.11.8.1
+ SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_52-default-8-150500.11.6.1
+ SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_59-default-8-150500.11.10.1
+ SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-6-150500.11.6.1
+ SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_65-default-6-150500.11.6.1
+ SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_68-default-5-150500.11.6.1
+ SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_21-default-6-150600.4.10.1
+ SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_7-default-4-150600.13.6.1
+
SUSE Enterprise Storage 7.1:kernel-default
SUSE Enterprise Storage 7.1:kernel-default-devel
no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2024-36894
skipping CVE-2024-36898 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-36897 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-36896 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-36895 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-36893 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-36892 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-36891 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-36890 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-36889 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-36888 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-36887 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-36886 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-36885 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-36884 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-36883 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-36882 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-36881 as CVE page is older than CVRF-CVE file.
No V5 entry found for CVE-2024-36592 / /home/securitybot/prod/cve-database/cvelistV5/cves/2024/36xxxx/CVE-2024-36592.json:No such file or directory
skipping CVE-2024-36600 as CVE page is older than CVRF-CVE file.
--- /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2024-36592.xml 2024-09-21 01:18:23.318408000 +0200
+++ /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2024-36592.xml.new 2024-10-29 01:17:14.481075000 +0100
@@ -14,13 +14,13 @@
1
- 16
- 2024-09-20T23:18:23Z
+ 17
+ 2024-10-29T00:17:14Z
current
2024-07-08T23:12:46Z
- 2024-09-20T23:18:23Z
+ 2024-10-29T00:17:14Z
cve-database/bin/generate-cvrf-cve.pl
2020-12-27T01:00:00Z
@@ -84,6 +84,21 @@
Image SLES12-SP5-EC2-BYOS
+
+
+ Image SLES12-SP5-GCE-BYOS
+
+
+
+
+ Image SLES12-SP5-GCE-SAP-BYOS
+
+
+
+
+ Image SLES12-SP5-GCE-SAP-On-Demand
+
+
Image SLES12-SP5-SAP-Azure-LI-BYOS-Production
@@ -519,6 +534,39 @@
kernel-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-EC2-BYOS
+
+ kernel-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-BYOS
+
+
+ cluster-md-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ dlm-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ gfs2-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ kernel-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ ocfs2-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ cluster-md-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
+
+ dlm-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
+
+ gfs2-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
+
+ kernel-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
+
+ ocfs2-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
cluster-md-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-SAP-Azure-LI-BYOS-Production
@@ -717,6 +765,17 @@
Image SLES12-SP5-Azure-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.225.1
Image SLES12-SP5-Azure-Standard-On-Demand:kernel-azure-4.12.14-16.191.1
Image SLES12-SP5-EC2-BYOS:kernel-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-BYOS:kernel-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-BYOS:cluster-md-kmp-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-BYOS:dlm-kmp-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-BYOS:gfs2-kmp-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-BYOS:kernel-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:cluster-md-kmp-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:dlm-kmp-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:gfs2-kmp-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:kernel-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:ocfs2-kmp-default-4.12.14-122.225.1
Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:cluster-md-kmp-default-4.12.14-122.225.1
Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:dlm-kmp-default-4.12.14-122.225.1
Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:gfs2-kmp-default-4.12.14-122.225.1
skipping CVE-2024-36489 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-36484 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-36481 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-36478 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-36477 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-36474 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-36472 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-36462 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-36461 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-36460 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-36387 as CVE page is older than CVRF-CVE file.
--- /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2024-36288.xml 2024-10-22 01:29:05.421069000 +0200
+++ /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2024-36288.xml.new 2024-10-29 01:17:16.934970000 +0100
@@ -14,13 +14,13 @@
1
- 32
- 2024-10-21T23:29:04Z
+ 33
+ 2024-10-29T00:17:16Z
current
2024-06-29T17:06:18Z
- 2024-10-21T23:29:04Z
+ 2024-10-29T00:17:16Z
cve-database/bin/generate-cvrf-cve.pl
2020-12-27T01:00:00Z
@@ -121,6 +121,21 @@
Image SLES12-SP5-EC2-BYOS
+
+
+ Image SLES12-SP5-GCE-BYOS
+
+
+
+
+ Image SLES12-SP5-GCE-SAP-BYOS
+
+
+
+
+ Image SLES12-SP5-GCE-SAP-On-Demand
+
+
Image SLES12-SP5-SAP-Azure-LI-BYOS-Production
@@ -1826,6 +1841,39 @@
kernel-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-EC2-BYOS
+
+ kernel-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-BYOS
+
+
+ cluster-md-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ dlm-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ gfs2-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ kernel-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ ocfs2-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ cluster-md-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
+
+ dlm-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
+
+ gfs2-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
+
+ kernel-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
+
+ ocfs2-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
cluster-md-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-SAP-Azure-LI-BYOS-Production
@@ -3674,6 +3722,17 @@
Image SLES12-SP5-Azure-SAP-BYOS:kernel-default-4.12.14-122.225.1
Image SLES12-SP5-Azure-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.225.1
Image SLES12-SP5-EC2-BYOS:kernel-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-BYOS:kernel-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-BYOS:cluster-md-kmp-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-BYOS:dlm-kmp-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-BYOS:gfs2-kmp-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-BYOS:kernel-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:cluster-md-kmp-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:dlm-kmp-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:gfs2-kmp-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:kernel-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:ocfs2-kmp-default-4.12.14-122.225.1
Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:cluster-md-kmp-default-4.12.14-122.225.1
Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:dlm-kmp-default-4.12.14-122.225.1
Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:gfs2-kmp-default-4.12.14-122.225.1
--- /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2024-36286.xml 2024-10-16 01:21:55.276796000 +0200
+++ /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2024-36286.xml.new 2024-10-29 01:17:17.749884000 +0100
@@ -14,13 +14,13 @@
1
- 33
- 2024-10-15T23:21:54Z
+ 34
+ 2024-10-29T00:17:17Z
current
2024-06-21T23:10:50Z
- 2024-10-15T23:21:54Z
+ 2024-10-29T00:17:17Z
cve-database/bin/generate-cvrf-cve.pl
2020-12-27T01:00:00Z
@@ -148,6 +148,21 @@
Image SLES12-SP5-Azure-SAP-BYOS
+
+
+ Image SLES12-SP5-GCE-BYOS
+
+
+
+
+ Image SLES12-SP5-GCE-SAP-BYOS
+
+
+
+
+ Image SLES12-SP5-GCE-SAP-On-Demand
+
+
Image SLES15-SP5-Azure-Basic
@@ -1753,6 +1768,39 @@
ocfs2-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-Azure-SAP-BYOS
+
+ kernel-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-BYOS
+
+
+ cluster-md-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ dlm-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ gfs2-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ kernel-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ ocfs2-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ cluster-md-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
+
+ dlm-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
+
+ gfs2-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
+
+ kernel-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
+
+ ocfs2-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
kernel-azure-5.14.21-150500.33.66.1 as a component of Image SLES15-SP5-Azure-Basic
@@ -3513,6 +3561,17 @@
Image SLES12-SP5-Azure-SAP-BYOS:gfs2-kmp-default-4.12.14-122.228.1
Image SLES12-SP5-Azure-SAP-BYOS:kernel-default-4.12.14-122.228.1
Image SLES12-SP5-Azure-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.228.1
+ Image SLES12-SP5-GCE-BYOS:kernel-default-4.12.14-122.228.1
+ Image SLES12-SP5-GCE-SAP-BYOS:cluster-md-kmp-default-4.12.14-122.228.1
+ Image SLES12-SP5-GCE-SAP-BYOS:dlm-kmp-default-4.12.14-122.228.1
+ Image SLES12-SP5-GCE-SAP-BYOS:gfs2-kmp-default-4.12.14-122.228.1
+ Image SLES12-SP5-GCE-SAP-BYOS:kernel-default-4.12.14-122.228.1
+ Image SLES12-SP5-GCE-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.228.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:cluster-md-kmp-default-4.12.14-122.228.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:dlm-kmp-default-4.12.14-122.228.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:gfs2-kmp-default-4.12.14-122.228.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:kernel-default-4.12.14-122.228.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:ocfs2-kmp-default-4.12.14-122.228.1
Image SLES15-SP5-Azure-Basic:kernel-azure-5.14.21-150500.33.66.1
Image SLES15-SP5-Azure-Standard:kernel-azure-5.14.21-150500.33.66.1
Image SLES15-SP5-CHOST-BYOS-Aliyun:kernel-default-5.14.21-150500.55.80.2
skipping CVE-2024-36281 as CVE page is older than CVRF-CVE file.
--- /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2024-36270.xml 2024-10-16 01:21:56.482757000 +0200
+++ /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2024-36270.xml.new 2024-10-29 01:17:18.493989000 +0100
@@ -14,13 +14,13 @@
1
- 32
- 2024-10-15T23:21:56Z
+ 33
+ 2024-10-29T00:17:18Z
current
2024-06-21T23:10:50Z
- 2024-10-15T23:21:56Z
+ 2024-10-29T00:17:18Z
cve-database/bin/generate-cvrf-cve.pl
2020-12-27T01:00:00Z
@@ -117,6 +117,21 @@
Image SLES12-SP5-Azure-SAP-BYOS
+
+
+ Image SLES12-SP5-GCE-BYOS
+
+
+
+
+ Image SLES12-SP5-GCE-SAP-BYOS
+
+
+
+
+ Image SLES12-SP5-GCE-SAP-On-Demand
+
+
Image SLES15-SP5-Azure-Basic
@@ -1814,6 +1829,39 @@
ocfs2-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-Azure-SAP-BYOS
+
+ kernel-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-BYOS
+
+
+ cluster-md-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ dlm-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ gfs2-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ kernel-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ ocfs2-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ cluster-md-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
+
+ dlm-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
+
+ gfs2-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
+
+ kernel-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
+
+ ocfs2-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
kernel-azure-5.14.21-150500.33.66.1 as a component of Image SLES15-SP5-Azure-Basic
@@ -3630,6 +3678,17 @@
Image SLES12-SP5-Azure-SAP-BYOS:gfs2-kmp-default-4.12.14-122.228.1
Image SLES12-SP5-Azure-SAP-BYOS:kernel-default-4.12.14-122.228.1
Image SLES12-SP5-Azure-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.228.1
+ Image SLES12-SP5-GCE-BYOS:kernel-default-4.12.14-122.228.1
+ Image SLES12-SP5-GCE-SAP-BYOS:cluster-md-kmp-default-4.12.14-122.228.1
+ Image SLES12-SP5-GCE-SAP-BYOS:dlm-kmp-default-4.12.14-122.228.1
+ Image SLES12-SP5-GCE-SAP-BYOS:gfs2-kmp-default-4.12.14-122.228.1
+ Image SLES12-SP5-GCE-SAP-BYOS:kernel-default-4.12.14-122.228.1
+ Image SLES12-SP5-GCE-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.228.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:cluster-md-kmp-default-4.12.14-122.228.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:dlm-kmp-default-4.12.14-122.228.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:gfs2-kmp-default-4.12.14-122.228.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:kernel-default-4.12.14-122.228.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:ocfs2-kmp-default-4.12.14-122.228.1
Image SLES15-SP5-Azure-Basic:kernel-azure-5.14.21-150500.33.66.1
Image SLES15-SP5-Azure-Standard:kernel-azure-5.14.21-150500.33.66.1
Image SLES15-SP5-CHOST-BYOS-Aliyun:kernel-default-5.14.21-150500.55.80.2
no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2024-36138
no cpe found for SUSE Package Hub 15 SP5 in CVE-2024-36048
no cpe found for SUSE Package Hub 15 SP5 in CVE-2024-36041
no cpe found for SUSE Package Hub 15 SP6 in CVE-2024-36041
skipping CVE-2024-36033 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-36032 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-36031 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-36030 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-36028 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-36027 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-36026 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-36024 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-36023 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-36022 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-36021 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-36020 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-36019 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-36018 as CVE page is older than CVRF-CVE file.
--- /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2024-36013.xml 2024-10-16 01:22:09.797522000 +0200
+++ /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2024-36013.xml.new 2024-10-29 01:17:25.939970000 +0100
@@ -14,13 +14,13 @@
1
- 48
- 2024-10-15T23:22:09Z
+ 49
+ 2024-10-29T00:17:25Z
current
2024-05-29T23:09:41Z
- 2024-10-15T23:22:09Z
+ 2024-10-29T00:17:25Z
cve-database/bin/generate-cvrf-cve.pl
2020-12-27T01:00:00Z
@@ -194,6 +194,21 @@
Image SLES12-SP5-Azure-SAP-BYOS
+
+
+ Image SLES12-SP5-GCE-BYOS
+
+
+
+
+ Image SLES12-SP5-GCE-SAP-BYOS
+
+
+
+
+ Image SLES12-SP5-GCE-SAP-On-Demand
+
+
Image SLES15-SP5-Azure-Basic
@@ -2019,6 +2034,39 @@
ocfs2-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-Azure-SAP-BYOS
+
+ kernel-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-BYOS
+
+
+ cluster-md-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ dlm-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ gfs2-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ kernel-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ ocfs2-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ cluster-md-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
+
+ dlm-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
+
+ gfs2-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
+
+ kernel-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
+
+ ocfs2-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
kernel-azure-5.14.21-150500.33.66.1 as a component of Image SLES15-SP5-Azure-Basic
@@ -4061,6 +4109,17 @@
Image SLES12-SP5-Azure-SAP-BYOS:gfs2-kmp-default-4.12.14-122.228.1
Image SLES12-SP5-Azure-SAP-BYOS:kernel-default-4.12.14-122.228.1
Image SLES12-SP5-Azure-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.228.1
+ Image SLES12-SP5-GCE-BYOS:kernel-default-4.12.14-122.228.1
+ Image SLES12-SP5-GCE-SAP-BYOS:cluster-md-kmp-default-4.12.14-122.228.1
+ Image SLES12-SP5-GCE-SAP-BYOS:dlm-kmp-default-4.12.14-122.228.1
+ Image SLES12-SP5-GCE-SAP-BYOS:gfs2-kmp-default-4.12.14-122.228.1
+ Image SLES12-SP5-GCE-SAP-BYOS:kernel-default-4.12.14-122.228.1
+ Image SLES12-SP5-GCE-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.228.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:cluster-md-kmp-default-4.12.14-122.228.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:dlm-kmp-default-4.12.14-122.228.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:gfs2-kmp-default-4.12.14-122.228.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:kernel-default-4.12.14-122.228.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:ocfs2-kmp-default-4.12.14-122.228.1
Image SLES15-SP5-Azure-Basic:kernel-azure-5.14.21-150500.33.66.1
Image SLES15-SP5-Azure-Standard:kernel-azure-5.14.21-150500.33.66.1
Image SLES15-SP5-CHOST-BYOS-Aliyun:kernel-default-5.14.21-150500.55.80.2
skipping CVE-2024-36012 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-36011 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-36010 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-36009 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-36008 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-36007 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-36006 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-36005 as CVE page is older than CVRF-CVE file.
--- /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2024-36004.xml 2024-10-22 01:29:49.105805000 +0200
+++ /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2024-36004.xml.new 2024-10-29 01:17:27.040945000 +0100
@@ -14,13 +14,13 @@
1
- 48
- 2024-10-21T23:29:48Z
+ 49
+ 2024-10-29T00:17:26Z
current
2024-05-20T23:09:13Z
- 2024-10-21T23:29:48Z
+ 2024-10-29T00:17:26Z
cve-database/bin/generate-cvrf-cve.pl
2020-12-27T01:00:00Z
@@ -245,6 +245,21 @@
Image SLES12-SP5-EC2-BYOS
+
+
+ Image SLES12-SP5-GCE-BYOS
+
+
+
+
+ Image SLES12-SP5-GCE-SAP-BYOS
+
+
+
+
+ Image SLES12-SP5-GCE-SAP-On-Demand
+
+
Image SLES12-SP5-SAP-Azure-LI-BYOS-Production
@@ -2306,6 +2321,39 @@
kernel-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-EC2-BYOS
+
+ kernel-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-BYOS
+
+
+ cluster-md-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ dlm-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ gfs2-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ kernel-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ ocfs2-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ cluster-md-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
+
+ dlm-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
+
+ gfs2-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
+
+ kernel-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
+
+ ocfs2-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
cluster-md-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-SAP-Azure-LI-BYOS-Production
@@ -4676,6 +4724,17 @@
Image SLES12-SP5-Azure-SAP-BYOS:kernel-default-4.12.14-122.225.1
Image SLES12-SP5-Azure-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.225.1
Image SLES12-SP5-EC2-BYOS:kernel-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-BYOS:kernel-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-BYOS:cluster-md-kmp-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-BYOS:dlm-kmp-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-BYOS:gfs2-kmp-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-BYOS:kernel-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:cluster-md-kmp-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:dlm-kmp-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:gfs2-kmp-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:kernel-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:ocfs2-kmp-default-4.12.14-122.225.1
Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:cluster-md-kmp-default-4.12.14-122.225.1
Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:dlm-kmp-default-4.12.14-122.225.1
Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:gfs2-kmp-default-4.12.14-122.225.1
skipping CVE-2024-36003 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-36002 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-36001 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-36000 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-35999 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-35996 as CVE page is older than CVRF-CVE file.
--- /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2024-35995.xml 2024-10-16 01:22:22.961854000 +0200
+++ /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2024-35995.xml.new 2024-10-29 01:17:30.038893000 +0100
@@ -14,13 +14,13 @@
1
- 55
- 2024-10-15T23:22:22Z
+ 56
+ 2024-10-29T00:17:29Z
current
2024-05-20T23:09:17Z
- 2024-10-15T23:22:22Z
+ 2024-10-29T00:17:29Z
cve-database/bin/generate-cvrf-cve.pl
2020-12-27T01:00:00Z
@@ -231,6 +231,21 @@
Image SLES12-SP5-EC2-BYOS
+
+
+ Image SLES12-SP5-GCE-BYOS
+
+
+
+
+ Image SLES12-SP5-GCE-SAP-BYOS
+
+
+
+
+ Image SLES12-SP5-GCE-SAP-On-Demand
+
+
Image SLES12-SP5-SAP-Azure-LI-BYOS-Production
@@ -2247,6 +2262,39 @@
kernel-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-EC2-BYOS
+
+ kernel-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-BYOS
+
+
+ cluster-md-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ dlm-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ gfs2-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ kernel-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ ocfs2-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ cluster-md-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
+
+ dlm-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
+
+ gfs2-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
+
+ kernel-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
+
+ ocfs2-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
cluster-md-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-SAP-Azure-LI-BYOS-Production
@@ -4549,6 +4597,17 @@
Image SLES12-SP5-Azure-SAP-BYOS:kernel-default-4.12.14-122.225.1
Image SLES12-SP5-Azure-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.225.1
Image SLES12-SP5-EC2-BYOS:kernel-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-BYOS:kernel-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-BYOS:cluster-md-kmp-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-BYOS:dlm-kmp-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-BYOS:gfs2-kmp-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-BYOS:kernel-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:cluster-md-kmp-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:dlm-kmp-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:gfs2-kmp-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:kernel-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:ocfs2-kmp-default-4.12.14-122.225.1
Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:cluster-md-kmp-default-4.12.14-122.225.1
Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:dlm-kmp-default-4.12.14-122.225.1
Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:gfs2-kmp-default-4.12.14-122.225.1
skipping CVE-2024-35994 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-35993 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-35992 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-35991 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-35990 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-35989 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-35986 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-35985 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-35984 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-35983 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-35982 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-35981 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-35980 as CVE page is older than CVRF-CVE file.
--- /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2024-35978.xml 2024-10-16 01:22:33.354815000 +0200
+++ /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2024-35978.xml.new 2024-10-29 01:17:31.803163000 +0100
@@ -14,13 +14,13 @@
1
- 55
- 2024-10-15T23:22:32Z
+ 56
+ 2024-10-29T00:17:31Z
current
2024-05-20T23:09:21Z
- 2024-10-15T23:22:32Z
+ 2024-10-29T00:17:31Z
cve-database/bin/generate-cvrf-cve.pl
2020-12-27T01:00:00Z
@@ -169,6 +169,21 @@
Image SLES12-SP5-EC2-BYOS
+
+
+ Image SLES12-SP5-GCE-BYOS
+
+
+
+
+ Image SLES12-SP5-GCE-SAP-BYOS
+
+
+
+
+ Image SLES12-SP5-GCE-SAP-On-Demand
+
+
Image SLES12-SP5-SAP-Azure-LI-BYOS-Production
@@ -2206,6 +2221,39 @@
kernel-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-EC2-BYOS
+
+ kernel-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-BYOS
+
+
+ cluster-md-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ dlm-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ gfs2-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ kernel-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ ocfs2-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ cluster-md-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
+
+ dlm-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
+
+ gfs2-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
+
+ kernel-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
+
+ ocfs2-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
cluster-md-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-SAP-Azure-LI-BYOS-Production
@@ -4461,6 +4509,17 @@
Image SLES12-SP5-Azure-SAP-BYOS:kernel-default-4.12.14-122.225.1
Image SLES12-SP5-Azure-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.225.1
Image SLES12-SP5-EC2-BYOS:kernel-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-BYOS:kernel-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-BYOS:cluster-md-kmp-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-BYOS:dlm-kmp-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-BYOS:gfs2-kmp-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-BYOS:kernel-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:cluster-md-kmp-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:dlm-kmp-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:gfs2-kmp-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:kernel-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:ocfs2-kmp-default-4.12.14-122.225.1
Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:cluster-md-kmp-default-4.12.14-122.225.1
Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:dlm-kmp-default-4.12.14-122.225.1
Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:gfs2-kmp-default-4.12.14-122.225.1
skipping CVE-2024-35977 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-35975 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-35974 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-35973 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-35972 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-35971 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-35970 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-35968 as CVE page is older than CVRF-CVE file.
--- /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2024-35967.xml 2024-10-16 01:22:41.112377000 +0200
+++ /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2024-35967.xml.new 2024-10-29 01:17:33.787072000 +0100
@@ -14,13 +14,13 @@
1
- 54
- 2024-10-15T23:22:40Z
+ 55
+ 2024-10-29T00:17:33Z
current
2024-05-20T23:09:23Z
- 2024-10-15T23:22:40Z
+ 2024-10-29T00:17:33Z
cve-database/bin/generate-cvrf-cve.pl
2020-12-27T01:00:00Z
@@ -177,6 +177,21 @@
Image SLES12-SP5-EC2-BYOS
+
+
+ Image SLES12-SP5-GCE-BYOS
+
+
+
+
+ Image SLES12-SP5-GCE-SAP-BYOS
+
+
+
+
+ Image SLES12-SP5-GCE-SAP-On-Demand
+
+
Image SLES12-SP5-SAP-Azure-LI-BYOS-Production
@@ -2214,6 +2229,39 @@
kernel-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-EC2-BYOS
+
+ kernel-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-BYOS
+
+
+ cluster-md-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ dlm-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ gfs2-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ kernel-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ ocfs2-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ cluster-md-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
+
+ dlm-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
+
+ gfs2-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
+
+ kernel-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
+
+ ocfs2-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
cluster-md-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-SAP-Azure-LI-BYOS-Production
@@ -4477,6 +4525,17 @@
Image SLES12-SP5-Azure-SAP-BYOS:kernel-default-4.12.14-122.225.1
Image SLES12-SP5-Azure-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.225.1
Image SLES12-SP5-EC2-BYOS:kernel-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-BYOS:kernel-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-BYOS:cluster-md-kmp-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-BYOS:dlm-kmp-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-BYOS:gfs2-kmp-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-BYOS:kernel-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:cluster-md-kmp-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:dlm-kmp-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:gfs2-kmp-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:kernel-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:ocfs2-kmp-default-4.12.14-122.225.1
Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:cluster-md-kmp-default-4.12.14-122.225.1
Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:dlm-kmp-default-4.12.14-122.225.1
Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:gfs2-kmp-default-4.12.14-122.225.1
--- /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2024-35966.xml 2024-10-16 01:22:42.040853000 +0200
+++ /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2024-35966.xml.new 2024-10-29 01:17:34.478019000 +0100
@@ -14,13 +14,13 @@
1
- 55
- 2024-10-15T23:22:41Z
+ 56
+ 2024-10-29T00:17:34Z
current
2024-05-20T23:09:24Z
- 2024-10-15T23:22:41Z
+ 2024-10-29T00:17:34Z
cve-database/bin/generate-cvrf-cve.pl
2020-12-27T01:00:00Z
@@ -179,6 +179,21 @@
Image SLES12-SP5-EC2-BYOS
+
+
+ Image SLES12-SP5-GCE-BYOS
+
+
+
+
+ Image SLES12-SP5-GCE-SAP-BYOS
+
+
+
+
+ Image SLES12-SP5-GCE-SAP-On-Demand
+
+
Image SLES12-SP5-SAP-Azure-LI-BYOS-Production
@@ -2216,6 +2231,39 @@
kernel-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-EC2-BYOS
+
+ kernel-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-BYOS
+
+
+ cluster-md-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ dlm-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ gfs2-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ kernel-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ ocfs2-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ cluster-md-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
+
+ dlm-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
+
+ gfs2-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
+
+ kernel-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
+
+ ocfs2-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
cluster-md-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-SAP-Azure-LI-BYOS-Production
@@ -4481,6 +4529,17 @@
Image SLES12-SP5-Azure-SAP-BYOS:kernel-default-4.12.14-122.225.1
Image SLES12-SP5-Azure-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.225.1
Image SLES12-SP5-EC2-BYOS:kernel-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-BYOS:kernel-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-BYOS:cluster-md-kmp-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-BYOS:dlm-kmp-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-BYOS:gfs2-kmp-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-BYOS:kernel-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:cluster-md-kmp-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:dlm-kmp-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:gfs2-kmp-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:kernel-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:ocfs2-kmp-default-4.12.14-122.225.1
Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:cluster-md-kmp-default-4.12.14-122.225.1
Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:dlm-kmp-default-4.12.14-122.225.1
Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:gfs2-kmp-default-4.12.14-122.225.1
--- /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2024-35965.xml 2024-10-16 01:22:43.101803000 +0200
+++ /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2024-35965.xml.new 2024-10-29 01:17:35.140019000 +0100
@@ -14,13 +14,13 @@
1
- 50
- 2024-10-15T23:22:42Z
+ 51
+ 2024-10-29T00:17:34Z
current
2024-05-20T23:09:24Z
- 2024-10-15T23:22:42Z
+ 2024-10-29T00:17:34Z
cve-database/bin/generate-cvrf-cve.pl
2020-12-27T01:00:00Z
@@ -158,6 +158,21 @@
Image SLES12-SP5-Azure-SAP-BYOS
+
+
+ Image SLES12-SP5-GCE-BYOS
+
+
+
+
+ Image SLES12-SP5-GCE-SAP-BYOS
+
+
+
+
+ Image SLES12-SP5-GCE-SAP-On-Demand
+
+
Image SLES15-SP5-Azure-Basic
@@ -2158,6 +2173,39 @@
ocfs2-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-Azure-SAP-BYOS
+
+ kernel-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-BYOS
+
+
+ cluster-md-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ dlm-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ gfs2-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ kernel-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ ocfs2-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ cluster-md-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
+
+ dlm-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
+
+ gfs2-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
+
+ kernel-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
+
+ ocfs2-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
kernel-azure-5.14.21-150500.33.57.1 as a component of Image SLES15-SP5-Azure-Basic
@@ -4365,6 +4413,17 @@
Image SLES12-SP5-Azure-SAP-BYOS:gfs2-kmp-default-4.12.14-122.228.1
Image SLES12-SP5-Azure-SAP-BYOS:kernel-default-4.12.14-122.228.1
Image SLES12-SP5-Azure-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.228.1
+ Image SLES12-SP5-GCE-BYOS:kernel-default-4.12.14-122.228.1
+ Image SLES12-SP5-GCE-SAP-BYOS:cluster-md-kmp-default-4.12.14-122.228.1
+ Image SLES12-SP5-GCE-SAP-BYOS:dlm-kmp-default-4.12.14-122.228.1
+ Image SLES12-SP5-GCE-SAP-BYOS:gfs2-kmp-default-4.12.14-122.228.1
+ Image SLES12-SP5-GCE-SAP-BYOS:kernel-default-4.12.14-122.228.1
+ Image SLES12-SP5-GCE-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.228.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:cluster-md-kmp-default-4.12.14-122.228.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:dlm-kmp-default-4.12.14-122.228.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:gfs2-kmp-default-4.12.14-122.228.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:kernel-default-4.12.14-122.228.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:ocfs2-kmp-default-4.12.14-122.228.1
Image SLES15-SP5-Azure-Basic:kernel-azure-5.14.21-150500.33.57.1
Image SLES15-SP5-Azure-Standard:kernel-azure-5.14.21-150500.33.57.1
Image SLES15-SP5-BYOS-Azure:kernel-default-5.14.21-150500.55.68.1
skipping CVE-2024-35964 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-35963 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-35962 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-35961 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-35959 as CVE page is older than CVRF-CVE file.
no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2024-35950
skipping CVE-2024-35957 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-35956 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-35955 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-35954 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-35953 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-35952 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-35951 as CVE page is older than CVRF-CVE file.
--- /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2024-35950.xml 2024-10-17 01:17:16.056668000 +0200
+++ /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2024-35950.xml.new 2024-10-29 01:17:36.711931000 +0100
@@ -14,13 +14,13 @@
1
- 76
- 2024-10-16T23:17:15Z
+ 77
+ 2024-10-29T00:17:36Z
current
2024-05-20T23:09:27Z
- 2024-10-16T23:17:15Z
+ 2024-10-29T00:17:36Z
cve-database/bin/generate-cvrf-cve.pl
2020-12-27T01:00:00Z
@@ -2791,21 +2791,36 @@
kernel-livepatch-5_14_21-150400_24_103-default-8-150400.2.1
+
+ kernel-livepatch-5_14_21-150400_24_108-default-10-150400.9.8.1
+
kernel-livepatch-5_14_21-150400_24_108-default-9-150400.9.8.1
kernel-livepatch-5_14_21-150400_24_111-default-7-150400.9.6.1
+
+ kernel-livepatch-5_14_21-150400_24_111-default-8-150400.9.6.1
+
kernel-livepatch-5_14_21-150400_24_116-default-7-150400.9.8.1
+
+ kernel-livepatch-5_14_21-150400_24_116-default-8-150400.9.8.1
+
kernel-livepatch-5_14_21-150400_24_119-default-6-150400.9.6.1
+
+ kernel-livepatch-5_14_21-150400_24_119-default-7-150400.9.6.1
+
kernel-livepatch-5_14_21-150400_24_122-default-4-150400.9.6.1
+
+ kernel-livepatch-5_14_21-150400_24_122-default-5-150400.9.6.1
+
kernel-livepatch-5_14_21-150400_24_125-default-1-150400.9.3.1
@@ -2845,15 +2860,24 @@
kernel-livepatch-5_14_21-150500_13_30-rt-9-150500.2.1
+
+ kernel-livepatch-5_14_21-150500_13_35-rt-10-150500.11.8.1
+
kernel-livepatch-5_14_21-150500_13_35-rt-9-150500.11.8.1
kernel-livepatch-5_14_21-150500_13_38-rt-7-150500.11.6.1
+
+ kernel-livepatch-5_14_21-150500_13_38-rt-8-150500.11.6.1
+
kernel-livepatch-5_14_21-150500_13_47-rt-7-150500.11.6.1
+
+ kernel-livepatch-5_14_21-150500_13_47-rt-8-150500.11.6.1
+
kernel-livepatch-5_14_21-150500_13_5-rt-15-150500.2.1
@@ -2884,15 +2908,24 @@
kernel-livepatch-5_14_21-150500_55_44-default-9-150500.2.1
+
+ kernel-livepatch-5_14_21-150500_55_49-default-10-150500.11.8.1
+
kernel-livepatch-5_14_21-150500_55_49-default-9-150500.11.8.1
kernel-livepatch-5_14_21-150500_55_52-default-7-150500.11.6.1
+
+ kernel-livepatch-5_14_21-150500_55_52-default-8-150500.11.6.1
+
kernel-livepatch-5_14_21-150500_55_59-default-7-150500.11.10.1
+
+ kernel-livepatch-5_14_21-150500_55_59-default-8-150500.11.10.1
+
kernel-livepatch-5_14_21-150500_55_68-default-1-150500.11.3.1
@@ -2929,15 +2962,27 @@
kernel-livepatch-5_3_18-150200_24_183-default-8-150200.5.6.1
+
+ kernel-livepatch-5_3_18-150200_24_183-default-9-150200.5.6.1
+
kernel-livepatch-5_3_18-150200_24_188-default-7-150200.5.6.1
+
+ kernel-livepatch-5_3_18-150200_24_188-default-8-150200.5.6.1
+
kernel-livepatch-5_3_18-150200_24_191-default-6-150200.5.6.1
+
+ kernel-livepatch-5_3_18-150200_24_191-default-7-150200.5.6.1
+
kernel-livepatch-5_3_18-150200_24_194-default-3-150200.5.6.1
+
+ kernel-livepatch-5_3_18-150200_24_194-default-4-150200.5.6.1
+
kernel-livepatch-5_3_18-150200_24_197-default-1-150200.5.3.1
@@ -2968,15 +3013,27 @@
kernel-livepatch-5_3_18-150300_59_153-default-8-150300.7.6.1
+
+ kernel-livepatch-5_3_18-150300_59_153-default-9-150300.7.6.1
+
kernel-livepatch-5_3_18-150300_59_158-default-7-150300.7.6.1
+
+ kernel-livepatch-5_3_18-150300_59_158-default-8-150300.7.6.1
+
kernel-livepatch-5_3_18-150300_59_161-default-6-150300.7.6.1
+
+ kernel-livepatch-5_3_18-150300_59_161-default-7-150300.7.6.1
+
kernel-livepatch-5_3_18-150300_59_164-default-3-150300.7.6.1
+
+ kernel-livepatch-5_3_18-150300_59_164-default-4-150300.7.6.1
+
kernel-livepatch-5_3_18-150300_59_167-default-1-150300.7.3.1
@@ -3268,12 +3325,21 @@
kgraft-patch-4_12_14-122_201-default-8-8.10.1
+
+ kgraft-patch-4_12_14-122_201-default-9-8.10.1
+
kgraft-patch-4_12_14-122_216-default-6-8.6.1
+
+ kgraft-patch-4_12_14-122_216-default-7-8.6.1
+
kgraft-patch-4_12_14-122_219-default-3-8.6.1
+
+ kgraft-patch-4_12_14-122_219-default-4-8.6.1
+
kgraft-patch-4_12_14-122_222-default-1-8.3.1
@@ -6631,6 +6697,72 @@
kernel-rt-5.14.21-150500.13.61.1 as a component of openSUSE Leap Micro 5.5
+
+ kgraft-patch-4_12_14-122_201-default-9-8.10.1 as a component of SUSE Linux Enterprise Live Patching 12 SP5
+
+
+ kgraft-patch-4_12_14-122_216-default-7-8.6.1 as a component of SUSE Linux Enterprise Live Patching 12 SP5
+
+
+ kgraft-patch-4_12_14-122_219-default-4-8.6.1 as a component of SUSE Linux Enterprise Live Patching 12 SP5
+
+
+ kernel-livepatch-5_3_18-150200_24_183-default-9-150200.5.6.1 as a component of SUSE Linux Enterprise Live Patching 15 SP2
+
+
+ kernel-livepatch-5_3_18-150200_24_188-default-8-150200.5.6.1 as a component of SUSE Linux Enterprise Live Patching 15 SP2
+
+
+ kernel-livepatch-5_3_18-150200_24_191-default-7-150200.5.6.1 as a component of SUSE Linux Enterprise Live Patching 15 SP2
+
+
+ kernel-livepatch-5_3_18-150200_24_194-default-4-150200.5.6.1 as a component of SUSE Linux Enterprise Live Patching 15 SP2
+
+
+ kernel-livepatch-5_3_18-150300_59_153-default-9-150300.7.6.1 as a component of SUSE Linux Enterprise Live Patching 15 SP3
+
+
+ kernel-livepatch-5_3_18-150300_59_158-default-8-150300.7.6.1 as a component of SUSE Linux Enterprise Live Patching 15 SP3
+
+
+ kernel-livepatch-5_3_18-150300_59_161-default-7-150300.7.6.1 as a component of SUSE Linux Enterprise Live Patching 15 SP3
+
+
+ kernel-livepatch-5_3_18-150300_59_164-default-4-150300.7.6.1 as a component of SUSE Linux Enterprise Live Patching 15 SP3
+
+
+ kernel-livepatch-5_14_21-150400_24_108-default-10-150400.9.8.1 as a component of SUSE Linux Enterprise Live Patching 15 SP4
+
+
+ kernel-livepatch-5_14_21-150400_24_111-default-8-150400.9.6.1 as a component of SUSE Linux Enterprise Live Patching 15 SP4
+
+
+ kernel-livepatch-5_14_21-150400_24_116-default-8-150400.9.8.1 as a component of SUSE Linux Enterprise Live Patching 15 SP4
+
+
+ kernel-livepatch-5_14_21-150400_24_119-default-7-150400.9.6.1 as a component of SUSE Linux Enterprise Live Patching 15 SP4
+
+
+ kernel-livepatch-5_14_21-150400_24_122-default-5-150400.9.6.1 as a component of SUSE Linux Enterprise Live Patching 15 SP4
+
+
+ kernel-livepatch-5_14_21-150500_13_35-rt-10-150500.11.8.1 as a component of SUSE Linux Enterprise Live Patching 15 SP5
+
+
+ kernel-livepatch-5_14_21-150500_13_38-rt-8-150500.11.6.1 as a component of SUSE Linux Enterprise Live Patching 15 SP5
+
+
+ kernel-livepatch-5_14_21-150500_13_47-rt-8-150500.11.6.1 as a component of SUSE Linux Enterprise Live Patching 15 SP5
+
+
+ kernel-livepatch-5_14_21-150500_55_49-default-10-150500.11.8.1 as a component of SUSE Linux Enterprise Live Patching 15 SP5
+
+
+ kernel-livepatch-5_14_21-150500_55_52-default-8-150500.11.6.1 as a component of SUSE Linux Enterprise Live Patching 15 SP5
+
+
+ kernel-livepatch-5_14_21-150500_55_59-default-8-150500.11.10.1 as a component of SUSE Linux Enterprise Live Patching 15 SP5
+
kernel-default as a component of SUSE Linux Enterprise Micro 5.0
@@ -7889,6 +8021,30 @@
openSUSE Leap Micro 5.5:kernel-default-base-5.14.21-150500.55.73.1.150500.6.33.8
openSUSE Leap Micro 5.5:kernel-rt-5.14.21-150500.13.61.1
+
+ SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_201-default-9-8.10.1
+ SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_216-default-7-8.6.1
+ SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-4-8.6.1
+ SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_183-default-9-150200.5.6.1
+ SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_188-default-8-150200.5.6.1
+ SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_191-default-7-150200.5.6.1
+ SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_194-default-4-150200.5.6.1
+ SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_153-default-9-150300.7.6.1
+ SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_158-default-8-150300.7.6.1
+ SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_161-default-7-150300.7.6.1
+ SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_164-default-4-150300.7.6.1
+ SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_108-default-10-150400.9.8.1
+ SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_111-default-8-150400.9.6.1
+ SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_116-default-8-150400.9.8.1
+ SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_119-default-7-150400.9.6.1
+ SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_122-default-5-150400.9.6.1
+ SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_35-rt-10-150500.11.8.1
+ SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_38-rt-8-150500.11.6.1
+ SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_47-rt-8-150500.11.6.1
+ SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_49-default-10-150500.11.8.1
+ SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_52-default-8-150500.11.6.1
+ SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_59-default-8-150500.11.10.1
+
SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-default
SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-default-base
--- /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2024-35949.xml 2024-10-22 01:30:45.088855000 +0200
+++ /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2024-35949.xml.new 2024-10-29 01:17:37.288928000 +0100
@@ -14,13 +14,13 @@
1
- 37
- 2024-10-21T23:30:44Z
+ 38
+ 2024-10-29T00:17:36Z
current
2024-05-20T23:09:27Z
- 2024-10-21T23:30:44Z
+ 2024-10-29T00:17:36Z
cve-database/bin/generate-cvrf-cve.pl
2020-12-27T01:00:00Z
@@ -174,6 +174,21 @@
Image SLES12-SP5-EC2-BYOS
+
+
+ Image SLES12-SP5-GCE-BYOS
+
+
+
+
+ Image SLES12-SP5-GCE-SAP-BYOS
+
+
+
+
+ Image SLES12-SP5-GCE-SAP-On-Demand
+
+
Image SLES12-SP5-SAP-Azure-LI-BYOS-Production
@@ -1910,6 +1925,39 @@
kernel-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-EC2-BYOS
+
+ kernel-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-BYOS
+
+
+ cluster-md-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ dlm-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ gfs2-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ kernel-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ ocfs2-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ cluster-md-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
+
+ dlm-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
+
+ gfs2-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
+
+ kernel-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
+
+ ocfs2-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
cluster-md-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-SAP-Azure-LI-BYOS-Production
@@ -3862,6 +3910,17 @@
Image SLES12-SP5-Azure-SAP-BYOS:kernel-default-4.12.14-122.225.1
Image SLES12-SP5-Azure-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.225.1
Image SLES12-SP5-EC2-BYOS:kernel-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-BYOS:kernel-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-BYOS:cluster-md-kmp-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-BYOS:dlm-kmp-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-BYOS:gfs2-kmp-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-BYOS:kernel-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:cluster-md-kmp-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:dlm-kmp-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:gfs2-kmp-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:kernel-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:ocfs2-kmp-default-4.12.14-122.225.1
Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:cluster-md-kmp-default-4.12.14-122.225.1
Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:dlm-kmp-default-4.12.14-122.225.1
Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:gfs2-kmp-default-4.12.14-122.225.1
skipping CVE-2024-35948 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-35946 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-35945 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-35943 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-35942 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-35940 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-35939 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-35938 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-35937 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-35936 as CVE page is older than CVRF-CVE file.
--- /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2024-35934.xml 2024-10-22 01:30:59.343122000 +0200
+++ /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2024-35934.xml.new 2024-10-29 01:17:39.697786000 +0100
@@ -14,13 +14,13 @@
1
- 47
- 2024-10-21T23:30:58Z
+ 48
+ 2024-10-29T00:17:39Z
current
2024-05-20T23:09:31Z
- 2024-10-21T23:30:58Z
+ 2024-10-29T00:17:39Z
cve-database/bin/generate-cvrf-cve.pl
2020-12-27T01:00:00Z
@@ -215,6 +215,21 @@
Image SLES12-SP5-EC2-BYOS
+
+
+ Image SLES12-SP5-GCE-BYOS
+
+
+
+
+ Image SLES12-SP5-GCE-SAP-BYOS
+
+
+
+
+ Image SLES12-SP5-GCE-SAP-On-Demand
+
+
Image SLES12-SP5-SAP-Azure-LI-BYOS-Production
@@ -2264,6 +2279,39 @@
kernel-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-EC2-BYOS
+
+ kernel-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-BYOS
+
+
+ cluster-md-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ dlm-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ gfs2-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ kernel-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ ocfs2-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ cluster-md-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
+
+ dlm-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
+
+ gfs2-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
+
+ kernel-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
+
+ ocfs2-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
cluster-md-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-SAP-Azure-LI-BYOS-Production
@@ -4625,6 +4673,17 @@
Image SLES12-SP5-Azure-SAP-BYOS:kernel-default-4.12.14-122.225.1
Image SLES12-SP5-Azure-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.225.1
Image SLES12-SP5-EC2-BYOS:kernel-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-BYOS:kernel-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-BYOS:cluster-md-kmp-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-BYOS:dlm-kmp-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-BYOS:gfs2-kmp-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-BYOS:kernel-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:cluster-md-kmp-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:dlm-kmp-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:gfs2-kmp-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:kernel-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:ocfs2-kmp-default-4.12.14-122.225.1
Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:cluster-md-kmp-default-4.12.14-122.225.1
Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:dlm-kmp-default-4.12.14-122.225.1
Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:gfs2-kmp-default-4.12.14-122.225.1
--- /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2024-35933.xml 2024-10-22 01:31:00.453056000 +0200
+++ /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2024-35933.xml.new 2024-10-29 01:17:41.296174000 +0100
@@ -14,13 +14,13 @@
1
- 50
- 2024-10-21T23:30:59Z
+ 51
+ 2024-10-29T00:17:39Z
current
2024-05-20T23:09:31Z
- 2024-10-21T23:30:59Z
+ 2024-10-29T00:17:39Z
cve-database/bin/generate-cvrf-cve.pl
2020-12-27T01:00:00Z
@@ -159,6 +159,21 @@
Image SLES12-SP5-Azure-SAP-BYOS
+
+
+ Image SLES12-SP5-GCE-BYOS
+
+
+
+
+ Image SLES12-SP5-GCE-SAP-BYOS
+
+
+
+
+ Image SLES12-SP5-GCE-SAP-On-Demand
+
+
Image SLES15-SP5-Azure-Basic
@@ -2135,6 +2150,39 @@
ocfs2-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-Azure-SAP-BYOS
+
+ kernel-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-BYOS
+
+
+ cluster-md-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ dlm-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ gfs2-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ kernel-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ ocfs2-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ cluster-md-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
+
+ dlm-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
+
+ gfs2-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
+
+ kernel-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
+
+ ocfs2-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
kernel-azure-5.14.21-150500.33.57.1 as a component of Image SLES15-SP5-Azure-Basic
@@ -4280,6 +4328,17 @@
Image SLES12-SP5-Azure-SAP-BYOS:gfs2-kmp-default-4.12.14-122.228.1
Image SLES12-SP5-Azure-SAP-BYOS:kernel-default-4.12.14-122.228.1
Image SLES12-SP5-Azure-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.228.1
+ Image SLES12-SP5-GCE-BYOS:kernel-default-4.12.14-122.228.1
+ Image SLES12-SP5-GCE-SAP-BYOS:cluster-md-kmp-default-4.12.14-122.228.1
+ Image SLES12-SP5-GCE-SAP-BYOS:dlm-kmp-default-4.12.14-122.228.1
+ Image SLES12-SP5-GCE-SAP-BYOS:gfs2-kmp-default-4.12.14-122.228.1
+ Image SLES12-SP5-GCE-SAP-BYOS:kernel-default-4.12.14-122.228.1
+ Image SLES12-SP5-GCE-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.228.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:cluster-md-kmp-default-4.12.14-122.228.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:dlm-kmp-default-4.12.14-122.228.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:gfs2-kmp-default-4.12.14-122.228.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:kernel-default-4.12.14-122.228.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:ocfs2-kmp-default-4.12.14-122.228.1
Image SLES15-SP5-Azure-Basic:kernel-azure-5.14.21-150500.33.57.1
Image SLES15-SP5-Azure-Standard:kernel-azure-5.14.21-150500.33.57.1
Image SLES15-SP5-BYOS-Azure:kernel-default-5.14.21-150500.55.68.1
skipping CVE-2024-35932 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-35931 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-35929 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-35928 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-35927 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-35926 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-35924 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-35921 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-35920 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-35919 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-35918 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-35917 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-35916 as CVE page is older than CVRF-CVE file.
--- /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2024-35915.xml 2024-10-16 01:23:08.064548000 +0200
+++ /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2024-35915.xml.new 2024-10-29 01:17:43.910033000 +0100
@@ -14,13 +14,13 @@
1
- 50
- 2024-10-15T23:23:07Z
+ 51
+ 2024-10-29T00:17:43Z
current
2024-05-20T23:09:34Z
- 2024-10-15T23:23:07Z
+ 2024-10-29T00:17:43Z
cve-database/bin/generate-cvrf-cve.pl
2020-12-27T01:00:00Z
@@ -167,6 +167,21 @@
Image SLES12-SP5-Azure-SAP-BYOS
+
+
+ Image SLES12-SP5-GCE-BYOS
+
+
+
+
+ Image SLES12-SP5-GCE-SAP-BYOS
+
+
+
+
+ Image SLES12-SP5-GCE-SAP-On-Demand
+
+
Image SLES15-SP5-Azure-Basic
@@ -2167,6 +2182,39 @@
ocfs2-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-Azure-SAP-BYOS
+
+ kernel-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-BYOS
+
+
+ cluster-md-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ dlm-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ gfs2-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ kernel-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ ocfs2-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ cluster-md-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
+
+ dlm-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
+
+ gfs2-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
+
+ kernel-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
+
+ ocfs2-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
kernel-azure-5.14.21-150500.33.57.1 as a component of Image SLES15-SP5-Azure-Basic
@@ -4383,6 +4431,17 @@
Image SLES12-SP5-Azure-SAP-BYOS:gfs2-kmp-default-4.12.14-122.228.1
Image SLES12-SP5-Azure-SAP-BYOS:kernel-default-4.12.14-122.228.1
Image SLES12-SP5-Azure-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.228.1
+ Image SLES12-SP5-GCE-BYOS:kernel-default-4.12.14-122.228.1
+ Image SLES12-SP5-GCE-SAP-BYOS:cluster-md-kmp-default-4.12.14-122.228.1
+ Image SLES12-SP5-GCE-SAP-BYOS:dlm-kmp-default-4.12.14-122.228.1
+ Image SLES12-SP5-GCE-SAP-BYOS:gfs2-kmp-default-4.12.14-122.228.1
+ Image SLES12-SP5-GCE-SAP-BYOS:kernel-default-4.12.14-122.228.1
+ Image SLES12-SP5-GCE-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.228.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:cluster-md-kmp-default-4.12.14-122.228.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:dlm-kmp-default-4.12.14-122.228.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:gfs2-kmp-default-4.12.14-122.228.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:kernel-default-4.12.14-122.228.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:ocfs2-kmp-default-4.12.14-122.228.1
Image SLES15-SP5-Azure-Basic:kernel-azure-5.14.21-150500.33.57.1
Image SLES15-SP5-Azure-Standard:kernel-azure-5.14.21-150500.33.57.1
Image SLES15-SP5-BYOS-Azure:kernel-default-5.14.21-150500.55.68.1
skipping CVE-2024-35914 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-35913 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-35912 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-35911 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-35910 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-35909 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-35908 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-35907 as CVE page is older than CVRF-CVE file.
no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2024-35905
--- /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2024-35905.xml 2024-10-20 01:19:56.563833000 +0200
+++ /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2024-35905.xml.new 2024-10-29 01:17:45.032018000 +0100
@@ -14,13 +14,13 @@
1
- 64
- 2024-10-19T23:19:56Z
+ 65
+ 2024-10-29T00:17:44Z
current
2024-05-20T23:09:36Z
- 2024-10-19T23:19:56Z
+ 2024-10-29T00:17:44Z
cve-database/bin/generate-cvrf-cve.pl
2020-12-27T01:00:00Z
@@ -2190,18 +2190,87 @@
kernel-kvmsmall-vdso-6.4.0-150600.23.7.3
+
+ kernel-livepatch-5_14_21-150400_24_111-default-8-150400.9.6.1
+
+
+ kernel-livepatch-5_14_21-150400_24_116-default-8-150400.9.8.1
+
+
+ kernel-livepatch-5_14_21-150400_24_119-default-7-150400.9.6.1
+
kernel-livepatch-5_14_21-150400_24_122-default-1-150400.9.3.2
kernel-livepatch-5_14_21-150400_24_128-default-1-150400.9.3.1
+
+ kernel-livepatch-5_14_21-150500_13_18-rt-15-150500.2.1
+
+
+ kernel-livepatch-5_14_21-150500_13_21-rt-14-150500.2.1
+
+
+ kernel-livepatch-5_14_21-150500_13_24-rt-14-150500.2.1
+
+
+ kernel-livepatch-5_14_21-150500_13_27-rt-13-150500.2.1
+
+
+ kernel-livepatch-5_14_21-150500_13_30-rt-12-150500.2.1
+
+
+ kernel-livepatch-5_14_21-150500_13_35-rt-10-150500.11.8.1
+
+
+ kernel-livepatch-5_14_21-150500_13_38-rt-8-150500.11.6.1
+
+
+ kernel-livepatch-5_14_21-150500_13_47-rt-8-150500.11.6.1
+
+
+ kernel-livepatch-5_14_21-150500_13_52-rt-6-150500.11.8.1
+
+
+ kernel-livepatch-5_14_21-150500_13_55-rt-6-150500.11.6.1
+
kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1
kernel-livepatch-5_14_21-150500_13_61-rt-1-150500.11.3.1
+
+ kernel-livepatch-5_14_21-150500_55_28-default-15-150500.2.1
+
+
+ kernel-livepatch-5_14_21-150500_55_31-default-14-150500.2.1
+
+
+ kernel-livepatch-5_14_21-150500_55_36-default-13-150500.2.1
+
+
+ kernel-livepatch-5_14_21-150500_55_39-default-13-150500.2.1
+
+
+ kernel-livepatch-5_14_21-150500_55_44-default-12-150500.2.1
+
+
+ kernel-livepatch-5_14_21-150500_55_49-default-10-150500.11.8.1
+
+
+ kernel-livepatch-5_14_21-150500_55_52-default-8-150500.11.6.1
+
+
+ kernel-livepatch-5_14_21-150500_55_59-default-8-150500.11.10.1
+
+
+ kernel-livepatch-5_14_21-150500_55_62-default-6-150500.11.6.1
+
+
+ kernel-livepatch-5_14_21-150500_55_65-default-6-150500.11.6.1
+
kernel-livepatch-5_14_21-150500_55_68-default-1-150500.11.3.1
@@ -2211,9 +2280,15 @@
kernel-livepatch-6_4_0-150600_10_5-rt-1-150600.1.5.1
+
+ kernel-livepatch-6_4_0-150600_21-default-6-150600.4.10.1
+
kernel-livepatch-6_4_0-150600_23_7-default-1-150600.13.3.7
+
+ kernel-livepatch-6_4_0-150600_8-rt-5-150600.3.1
+
kernel-macros
@@ -4767,6 +4842,81 @@
kernel-rt-5.14.21-150500.13.61.1 as a component of openSUSE Leap Micro 5.5
+
+ kernel-livepatch-5_14_21-150400_24_111-default-8-150400.9.6.1 as a component of SUSE Linux Enterprise Live Patching 15 SP4
+
+
+ kernel-livepatch-5_14_21-150400_24_116-default-8-150400.9.8.1 as a component of SUSE Linux Enterprise Live Patching 15 SP4
+
+
+ kernel-livepatch-5_14_21-150400_24_119-default-7-150400.9.6.1 as a component of SUSE Linux Enterprise Live Patching 15 SP4
+
+
+ kernel-livepatch-5_14_21-150500_13_18-rt-15-150500.2.1 as a component of SUSE Linux Enterprise Live Patching 15 SP5
+
+
+ kernel-livepatch-5_14_21-150500_13_21-rt-14-150500.2.1 as a component of SUSE Linux Enterprise Live Patching 15 SP5
+
+
+ kernel-livepatch-5_14_21-150500_13_24-rt-14-150500.2.1 as a component of SUSE Linux Enterprise Live Patching 15 SP5
+
+
+ kernel-livepatch-5_14_21-150500_13_27-rt-13-150500.2.1 as a component of SUSE Linux Enterprise Live Patching 15 SP5
+
+
+ kernel-livepatch-5_14_21-150500_13_30-rt-12-150500.2.1 as a component of SUSE Linux Enterprise Live Patching 15 SP5
+
+
+ kernel-livepatch-5_14_21-150500_13_35-rt-10-150500.11.8.1 as a component of SUSE Linux Enterprise Live Patching 15 SP5
+
+
+ kernel-livepatch-5_14_21-150500_13_38-rt-8-150500.11.6.1 as a component of SUSE Linux Enterprise Live Patching 15 SP5
+
+
+ kernel-livepatch-5_14_21-150500_13_47-rt-8-150500.11.6.1 as a component of SUSE Linux Enterprise Live Patching 15 SP5
+
+
+ kernel-livepatch-5_14_21-150500_13_52-rt-6-150500.11.8.1 as a component of SUSE Linux Enterprise Live Patching 15 SP5
+
+
+ kernel-livepatch-5_14_21-150500_13_55-rt-6-150500.11.6.1 as a component of SUSE Linux Enterprise Live Patching 15 SP5
+
+
+ kernel-livepatch-5_14_21-150500_55_28-default-15-150500.2.1 as a component of SUSE Linux Enterprise Live Patching 15 SP5
+
+
+ kernel-livepatch-5_14_21-150500_55_31-default-14-150500.2.1 as a component of SUSE Linux Enterprise Live Patching 15 SP5
+
+
+ kernel-livepatch-5_14_21-150500_55_36-default-13-150500.2.1 as a component of SUSE Linux Enterprise Live Patching 15 SP5
+
+
+ kernel-livepatch-5_14_21-150500_55_39-default-13-150500.2.1 as a component of SUSE Linux Enterprise Live Patching 15 SP5
+
+
+ kernel-livepatch-5_14_21-150500_55_44-default-12-150500.2.1 as a component of SUSE Linux Enterprise Live Patching 15 SP5
+
+
+ kernel-livepatch-5_14_21-150500_55_49-default-10-150500.11.8.1 as a component of SUSE Linux Enterprise Live Patching 15 SP5
+
+
+ kernel-livepatch-5_14_21-150500_55_52-default-8-150500.11.6.1 as a component of SUSE Linux Enterprise Live Patching 15 SP5
+
+
+ kernel-livepatch-5_14_21-150500_55_59-default-8-150500.11.10.1 as a component of SUSE Linux Enterprise Live Patching 15 SP5
+
+
+ kernel-livepatch-5_14_21-150500_55_62-default-6-150500.11.6.1 as a component of SUSE Linux Enterprise Live Patching 15 SP5
+
+
+ kernel-livepatch-5_14_21-150500_55_65-default-6-150500.11.6.1 as a component of SUSE Linux Enterprise Live Patching 15 SP5
+
+
+ kernel-livepatch-6_4_0-150600_21-default-6-150600.4.10.1 as a component of SUSE Linux Enterprise Live Patching 15 SP6
+
+
+ kernel-livepatch-6_4_0-150600_8-rt-5-150600.3.1 as a component of SUSE Linux Enterprise Live Patching 15 SP6
+
kernel-default as a component of SUSE Enterprise Storage 7.1
@@ -5097,24 +5247,9 @@
kernel-default as a component of SUSE Linux Enterprise Server for SAP Applications 12 SP5
-
- kernel-default-base as a component of SUSE Linux Enterprise Server for SAP Applications 12 SP5
-
-
- kernel-default-devel as a component of SUSE Linux Enterprise Server for SAP Applications 12 SP5
-
-
- kernel-devel as a component of SUSE Linux Enterprise Server for SAP Applications 12 SP5
-
-
- kernel-macros as a component of SUSE Linux Enterprise Server for SAP Applications 12 SP5
-
kernel-source as a component of SUSE Linux Enterprise Server for SAP Applications 12 SP5
-
- kernel-devel-azure as a component of SUSE Linux Enterprise Server for SAP Applications 12 SP5
-
kernel-source-azure as a component of SUSE Linux Enterprise Server for SAP Applications 12 SP5
@@ -5992,6 +6127,33 @@
openSUSE Leap Micro 5.5:kernel-default-base-5.14.21-150500.55.73.1.150500.6.33.8
openSUSE Leap Micro 5.5:kernel-rt-5.14.21-150500.13.61.1
+
+ SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_111-default-8-150400.9.6.1
+ SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_116-default-8-150400.9.8.1
+ SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_119-default-7-150400.9.6.1
+ SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_18-rt-15-150500.2.1
+ SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_21-rt-14-150500.2.1
+ SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_24-rt-14-150500.2.1
+ SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_27-rt-13-150500.2.1
+ SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_30-rt-12-150500.2.1
+ SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_35-rt-10-150500.11.8.1
+ SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_38-rt-8-150500.11.6.1
+ SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_47-rt-8-150500.11.6.1
+ SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_52-rt-6-150500.11.8.1
+ SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_55-rt-6-150500.11.6.1
+ SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_28-default-15-150500.2.1
+ SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_31-default-14-150500.2.1
+ SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_36-default-13-150500.2.1
+ SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_39-default-13-150500.2.1
+ SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_44-default-12-150500.2.1
+ SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_49-default-10-150500.11.8.1
+ SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_52-default-8-150500.11.6.1
+ SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_59-default-8-150500.11.10.1
+ SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-6-150500.11.6.1
+ SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_65-default-6-150500.11.6.1
+ SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_21-default-6-150600.4.10.1
+ SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_8-rt-5-150600.3.1
+
SUSE Enterprise Storage 7.1:kernel-default
SUSE Enterprise Storage 7.1:kernel-default-devel
@@ -6103,11 +6265,6 @@
SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros
SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source
SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default
- SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base
- SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel
- SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel
- SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure
- SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros
SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source
SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure
SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default
skipping CVE-2024-35904 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-35903 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-35902 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-35901 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-35900 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-35899 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-35898 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-35897 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-35896 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-35895 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-35894 as CVE page is older than CVRF-CVE file.
--- /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2024-35893.xml 2024-10-16 01:23:18.734411000 +0200
+++ /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2024-35893.xml.new 2024-10-29 01:17:45.790978000 +0100
@@ -14,13 +14,13 @@
1
- 46
- 2024-10-15T23:23:18Z
+ 47
+ 2024-10-29T00:17:45Z
current
2024-05-20T23:09:39Z
- 2024-10-15T23:23:18Z
+ 2024-10-29T00:17:45Z
cve-database/bin/generate-cvrf-cve.pl
2020-12-27T01:00:00Z
@@ -245,6 +245,21 @@
Image SLES12-SP5-EC2-BYOS
+
+
+ Image SLES12-SP5-GCE-BYOS
+
+
+
+
+ Image SLES12-SP5-GCE-SAP-BYOS
+
+
+
+
+ Image SLES12-SP5-GCE-SAP-On-Demand
+
+
Image SLES12-SP5-SAP-Azure-LI-BYOS-Production
@@ -2306,6 +2321,39 @@
kernel-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-EC2-BYOS
+
+ kernel-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-BYOS
+
+
+ cluster-md-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ dlm-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ gfs2-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ kernel-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ ocfs2-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ cluster-md-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
+
+ dlm-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
+
+ gfs2-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
+
+ kernel-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
+
+ ocfs2-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
cluster-md-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-SAP-Azure-LI-BYOS-Production
@@ -4670,6 +4718,17 @@
Image SLES12-SP5-Azure-SAP-BYOS:kernel-default-4.12.14-122.225.1
Image SLES12-SP5-Azure-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.225.1
Image SLES12-SP5-EC2-BYOS:kernel-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-BYOS:kernel-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-BYOS:cluster-md-kmp-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-BYOS:dlm-kmp-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-BYOS:gfs2-kmp-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-BYOS:kernel-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:cluster-md-kmp-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:dlm-kmp-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:gfs2-kmp-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:kernel-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:ocfs2-kmp-default-4.12.14-122.225.1
Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:cluster-md-kmp-default-4.12.14-122.225.1
Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:dlm-kmp-default-4.12.14-122.225.1
Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:gfs2-kmp-default-4.12.14-122.225.1
skipping CVE-2024-35892 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-35891 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-35890 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-35889 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-35888 as CVE page is older than CVRF-CVE file.
--- /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2024-35887.xml 2024-10-16 01:23:22.728729000 +0200
+++ /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2024-35887.xml.new 2024-10-29 01:17:46.515943000 +0100
@@ -14,13 +14,13 @@
1
- 61
- 2024-10-15T23:23:22Z
+ 62
+ 2024-10-29T00:17:46Z
current
2024-05-20T23:09:41Z
- 2024-10-15T23:23:22Z
+ 2024-10-29T00:17:46Z
cve-database/bin/generate-cvrf-cve.pl
2020-12-27T01:00:00Z
@@ -2378,41 +2378,41 @@
ocfs2-kmp-default-4.12.14-122.219.1 as a component of Image SLES12-SP5-EC2-SAP-On-Demand
-
- kernel-default-4.12.14-122.219.1 as a component of Image SLES12-SP5-GCE-BYOS
+
+ kernel-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-BYOS
kernel-default-4.12.14-122.219.1 as a component of Image SLES12-SP5-GCE-On-Demand
-
- cluster-md-kmp-default-4.12.14-122.219.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+ cluster-md-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
-
- dlm-kmp-default-4.12.14-122.219.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+ dlm-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
-
- gfs2-kmp-default-4.12.14-122.219.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+ gfs2-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
-
- kernel-default-4.12.14-122.219.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+ kernel-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
-
- ocfs2-kmp-default-4.12.14-122.219.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+ ocfs2-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
-
- cluster-md-kmp-default-4.12.14-122.219.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
+ cluster-md-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
-
- dlm-kmp-default-4.12.14-122.219.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
+ dlm-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
-
- gfs2-kmp-default-4.12.14-122.219.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
+ gfs2-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
-
- kernel-default-4.12.14-122.219.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
+ kernel-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
-
- ocfs2-kmp-default-4.12.14-122.219.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
+ ocfs2-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
cluster-md-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-SAP-Azure-LI-BYOS-Production
@@ -4708,18 +4708,18 @@
Image SLES12-SP5-EC2-SAP-On-Demand:gfs2-kmp-default-4.12.14-122.219.1
Image SLES12-SP5-EC2-SAP-On-Demand:kernel-default-4.12.14-122.219.1
Image SLES12-SP5-EC2-SAP-On-Demand:ocfs2-kmp-default-4.12.14-122.219.1
- Image SLES12-SP5-GCE-BYOS:kernel-default-4.12.14-122.219.1
+ Image SLES12-SP5-GCE-BYOS:kernel-default-4.12.14-122.225.1
Image SLES12-SP5-GCE-On-Demand:kernel-default-4.12.14-122.219.1
- Image SLES12-SP5-GCE-SAP-BYOS:cluster-md-kmp-default-4.12.14-122.219.1
- Image SLES12-SP5-GCE-SAP-BYOS:dlm-kmp-default-4.12.14-122.219.1
- Image SLES12-SP5-GCE-SAP-BYOS:gfs2-kmp-default-4.12.14-122.219.1
- Image SLES12-SP5-GCE-SAP-BYOS:kernel-default-4.12.14-122.219.1
- Image SLES12-SP5-GCE-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.219.1
- Image SLES12-SP5-GCE-SAP-On-Demand:cluster-md-kmp-default-4.12.14-122.219.1
- Image SLES12-SP5-GCE-SAP-On-Demand:dlm-kmp-default-4.12.14-122.219.1
- Image SLES12-SP5-GCE-SAP-On-Demand:gfs2-kmp-default-4.12.14-122.219.1
- Image SLES12-SP5-GCE-SAP-On-Demand:kernel-default-4.12.14-122.219.1
- Image SLES12-SP5-GCE-SAP-On-Demand:ocfs2-kmp-default-4.12.14-122.219.1
+ Image SLES12-SP5-GCE-SAP-BYOS:cluster-md-kmp-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-BYOS:dlm-kmp-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-BYOS:gfs2-kmp-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-BYOS:kernel-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:cluster-md-kmp-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:dlm-kmp-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:gfs2-kmp-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:kernel-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:ocfs2-kmp-default-4.12.14-122.225.1
Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:cluster-md-kmp-default-4.12.14-122.225.1
Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:dlm-kmp-default-4.12.14-122.225.1
Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:gfs2-kmp-default-4.12.14-122.225.1
skipping CVE-2024-35885 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-35884 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-35883 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-35882 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-35880 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-35879 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-35878 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-35875 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-35874 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-35873 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-35872 as CVE page is older than CVRF-CVE file.
no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2024-35867
skipping CVE-2024-35869 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-35868 as CVE page is older than CVRF-CVE file.
--- /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2024-35867.xml 2024-10-22 01:32:07.429090000 +0200
+++ /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2024-35867.xml.new 2024-10-29 01:17:50.505171000 +0100
@@ -14,13 +14,13 @@
1
- 57
- 2024-10-21T23:32:06Z
+ 58
+ 2024-10-29T00:17:49Z
current
2024-05-20T23:09:45Z
- 2024-10-21T23:32:06Z
+ 2024-10-29T00:17:49Z
cve-database/bin/generate-cvrf-cve.pl
2020-12-27T01:00:00Z
@@ -2297,21 +2297,114 @@
kernel-kvmsmall-vdso-6.4.0-150600.23.7.3
+
+ kernel-livepatch-5_14_21-150400_24_100-default-13-150400.2.1
+
+
+ kernel-livepatch-5_14_21-150400_24_103-default-11-150400.2.1
+
+
+ kernel-livepatch-5_14_21-150400_24_108-default-10-150400.9.8.1
+
+
+ kernel-livepatch-5_14_21-150400_24_111-default-8-150400.9.6.1
+
+
+ kernel-livepatch-5_14_21-150400_24_116-default-8-150400.9.8.1
+
+
+ kernel-livepatch-5_14_21-150400_24_119-default-7-150400.9.6.1
+
kernel-livepatch-5_14_21-150400_24_122-default-1-150400.9.3.2
+
+ kernel-livepatch-5_14_21-150400_24_88-default-15-150400.2.1
+
+
+ kernel-livepatch-5_14_21-150400_24_92-default-14-150400.2.1
+
+
+ kernel-livepatch-5_14_21-150400_24_97-default-13-150400.2.1
+
+
+ kernel-livepatch-5_14_21-150500_13_18-rt-15-150500.2.1
+
+
+ kernel-livepatch-5_14_21-150500_13_21-rt-14-150500.2.1
+
+
+ kernel-livepatch-5_14_21-150500_13_24-rt-14-150500.2.1
+
+
+ kernel-livepatch-5_14_21-150500_13_27-rt-13-150500.2.1
+
+
+ kernel-livepatch-5_14_21-150500_13_30-rt-12-150500.2.1
+
+
+ kernel-livepatch-5_14_21-150500_13_35-rt-10-150500.11.8.1
+
+
+ kernel-livepatch-5_14_21-150500_13_38-rt-8-150500.11.6.1
+
+
+ kernel-livepatch-5_14_21-150500_13_47-rt-8-150500.11.6.1
+
+
+ kernel-livepatch-5_14_21-150500_13_52-rt-6-150500.11.8.1
+
+
+ kernel-livepatch-5_14_21-150500_13_55-rt-6-150500.11.6.1
+
kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1
+
+ kernel-livepatch-5_14_21-150500_55_28-default-15-150500.2.1
+
+
+ kernel-livepatch-5_14_21-150500_55_31-default-14-150500.2.1
+
+
+ kernel-livepatch-5_14_21-150500_55_36-default-13-150500.2.1
+
+
+ kernel-livepatch-5_14_21-150500_55_39-default-13-150500.2.1
+
+
+ kernel-livepatch-5_14_21-150500_55_44-default-12-150500.2.1
+
+
+ kernel-livepatch-5_14_21-150500_55_49-default-10-150500.11.8.1
+
+
+ kernel-livepatch-5_14_21-150500_55_52-default-8-150500.11.6.1
+
+
+ kernel-livepatch-5_14_21-150500_55_59-default-8-150500.11.10.1
+
+
+ kernel-livepatch-5_14_21-150500_55_62-default-6-150500.11.6.1
+
+
+ kernel-livepatch-5_14_21-150500_55_65-default-6-150500.11.6.1
+
kernel-livepatch-5_14_21-150500_55_68-default-1-150500.11.3.1
kernel-livepatch-6_4_0-150600_10_5-rt-1-150600.1.5.1
+
+ kernel-livepatch-6_4_0-150600_21-default-6-150600.4.10.1
+
kernel-livepatch-6_4_0-150600_23_7-default-1-150600.13.3.7
+
+ kernel-livepatch-6_4_0-150600_8-rt-5-150600.3.1
+
kernel-macros
@@ -2525,6 +2618,30 @@
kernel-zfcpdump-6.4.0-150600.23.7.3
+
+ kgraft-patch-4_12_14-122_179-default-14-2.1
+
+
+ kgraft-patch-4_12_14-122_183-default-14-2.1
+
+
+ kgraft-patch-4_12_14-122_186-default-13-2.1
+
+
+ kgraft-patch-4_12_14-122_189-default-12-2.1
+
+
+ kgraft-patch-4_12_14-122_194-default-10-2.1
+
+
+ kgraft-patch-4_12_14-122_201-default-9-8.10.1
+
+
+ kgraft-patch-4_12_14-122_216-default-7-8.6.1
+
+
+ kgraft-patch-4_12_14-122_219-default-4-8.6.1
+
kgraft-patch-4_12_14-122_222-default-1-8.3.1
@@ -5198,6 +5315,123 @@
kernel-rt-5.14.21-150500.13.58.1 as a component of openSUSE Leap Micro 5.5
+
+ kgraft-patch-4_12_14-122_179-default-14-2.1 as a component of SUSE Linux Enterprise Live Patching 12 SP5
+
+
+ kgraft-patch-4_12_14-122_183-default-14-2.1 as a component of SUSE Linux Enterprise Live Patching 12 SP5
+
+
+ kgraft-patch-4_12_14-122_186-default-13-2.1 as a component of SUSE Linux Enterprise Live Patching 12 SP5
+
+
+ kgraft-patch-4_12_14-122_189-default-12-2.1 as a component of SUSE Linux Enterprise Live Patching 12 SP5
+
+
+ kgraft-patch-4_12_14-122_194-default-10-2.1 as a component of SUSE Linux Enterprise Live Patching 12 SP5
+
+
+ kgraft-patch-4_12_14-122_201-default-9-8.10.1 as a component of SUSE Linux Enterprise Live Patching 12 SP5
+
+
+ kgraft-patch-4_12_14-122_216-default-7-8.6.1 as a component of SUSE Linux Enterprise Live Patching 12 SP5
+
+
+ kgraft-patch-4_12_14-122_219-default-4-8.6.1 as a component of SUSE Linux Enterprise Live Patching 12 SP5
+
+
+ kernel-livepatch-5_14_21-150400_24_100-default-13-150400.2.1 as a component of SUSE Linux Enterprise Live Patching 15 SP4
+
+
+ kernel-livepatch-5_14_21-150400_24_103-default-11-150400.2.1 as a component of SUSE Linux Enterprise Live Patching 15 SP4
+
+
+ kernel-livepatch-5_14_21-150400_24_108-default-10-150400.9.8.1 as a component of SUSE Linux Enterprise Live Patching 15 SP4
+
+
+ kernel-livepatch-5_14_21-150400_24_111-default-8-150400.9.6.1 as a component of SUSE Linux Enterprise Live Patching 15 SP4
+
+
+ kernel-livepatch-5_14_21-150400_24_116-default-8-150400.9.8.1 as a component of SUSE Linux Enterprise Live Patching 15 SP4
+
+
+ kernel-livepatch-5_14_21-150400_24_119-default-7-150400.9.6.1 as a component of SUSE Linux Enterprise Live Patching 15 SP4
+
+
+ kernel-livepatch-5_14_21-150400_24_88-default-15-150400.2.1 as a component of SUSE Linux Enterprise Live Patching 15 SP4
+
+
+ kernel-livepatch-5_14_21-150400_24_92-default-14-150400.2.1 as a component of SUSE Linux Enterprise Live Patching 15 SP4
+
+
+ kernel-livepatch-5_14_21-150400_24_97-default-13-150400.2.1 as a component of SUSE Linux Enterprise Live Patching 15 SP4
+
+
+ kernel-livepatch-5_14_21-150500_13_18-rt-15-150500.2.1 as a component of SUSE Linux Enterprise Live Patching 15 SP5
+
+
+ kernel-livepatch-5_14_21-150500_13_21-rt-14-150500.2.1 as a component of SUSE Linux Enterprise Live Patching 15 SP5
+
+
+ kernel-livepatch-5_14_21-150500_13_24-rt-14-150500.2.1 as a component of SUSE Linux Enterprise Live Patching 15 SP5
+
+
+ kernel-livepatch-5_14_21-150500_13_27-rt-13-150500.2.1 as a component of SUSE Linux Enterprise Live Patching 15 SP5
+
+
+ kernel-livepatch-5_14_21-150500_13_30-rt-12-150500.2.1 as a component of SUSE Linux Enterprise Live Patching 15 SP5
+
+
+ kernel-livepatch-5_14_21-150500_13_35-rt-10-150500.11.8.1 as a component of SUSE Linux Enterprise Live Patching 15 SP5
+
+
+ kernel-livepatch-5_14_21-150500_13_38-rt-8-150500.11.6.1 as a component of SUSE Linux Enterprise Live Patching 15 SP5
+
+
+ kernel-livepatch-5_14_21-150500_13_47-rt-8-150500.11.6.1 as a component of SUSE Linux Enterprise Live Patching 15 SP5
+
+
+ kernel-livepatch-5_14_21-150500_13_52-rt-6-150500.11.8.1 as a component of SUSE Linux Enterprise Live Patching 15 SP5
+
+
+ kernel-livepatch-5_14_21-150500_13_55-rt-6-150500.11.6.1 as a component of SUSE Linux Enterprise Live Patching 15 SP5
+
+
+ kernel-livepatch-5_14_21-150500_55_28-default-15-150500.2.1 as a component of SUSE Linux Enterprise Live Patching 15 SP5
+
+
+ kernel-livepatch-5_14_21-150500_55_31-default-14-150500.2.1 as a component of SUSE Linux Enterprise Live Patching 15 SP5
+
+
+ kernel-livepatch-5_14_21-150500_55_36-default-13-150500.2.1 as a component of SUSE Linux Enterprise Live Patching 15 SP5
+
+
+ kernel-livepatch-5_14_21-150500_55_39-default-13-150500.2.1 as a component of SUSE Linux Enterprise Live Patching 15 SP5
+
+
+ kernel-livepatch-5_14_21-150500_55_44-default-12-150500.2.1 as a component of SUSE Linux Enterprise Live Patching 15 SP5
+
+
+ kernel-livepatch-5_14_21-150500_55_49-default-10-150500.11.8.1 as a component of SUSE Linux Enterprise Live Patching 15 SP5
+
+
+ kernel-livepatch-5_14_21-150500_55_52-default-8-150500.11.6.1 as a component of SUSE Linux Enterprise Live Patching 15 SP5
+
+
+ kernel-livepatch-5_14_21-150500_55_59-default-8-150500.11.10.1 as a component of SUSE Linux Enterprise Live Patching 15 SP5
+
+
+ kernel-livepatch-5_14_21-150500_55_62-default-6-150500.11.6.1 as a component of SUSE Linux Enterprise Live Patching 15 SP5
+
+
+ kernel-livepatch-5_14_21-150500_55_65-default-6-150500.11.6.1 as a component of SUSE Linux Enterprise Live Patching 15 SP5
+
+
+ kernel-livepatch-6_4_0-150600_21-default-6-150600.4.10.1 as a component of SUSE Linux Enterprise Live Patching 15 SP6
+
+
+ kernel-livepatch-6_4_0-150600_8-rt-5-150600.3.1 as a component of SUSE Linux Enterprise Live Patching 15 SP6
+
kernel-default as a component of SUSE Enterprise Storage 7.1
@@ -6433,6 +6667,47 @@
openSUSE Leap Micro 5.5:kernel-default-base-5.14.21-150500.55.68.1.150500.6.31.1
openSUSE Leap Micro 5.5:kernel-rt-5.14.21-150500.13.58.1
+
+ SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_179-default-14-2.1
+ SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_183-default-14-2.1
+ SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_186-default-13-2.1
+ SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_189-default-12-2.1
+ SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_194-default-10-2.1
+ SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_201-default-9-8.10.1
+ SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_216-default-7-8.6.1
+ SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-4-8.6.1
+ SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_100-default-13-150400.2.1
+ SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_103-default-11-150400.2.1
+ SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_108-default-10-150400.9.8.1
+ SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_111-default-8-150400.9.6.1
+ SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_116-default-8-150400.9.8.1
+ SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_119-default-7-150400.9.6.1
+ SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_88-default-15-150400.2.1
+ SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_92-default-14-150400.2.1
+ SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_97-default-13-150400.2.1
+ SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_18-rt-15-150500.2.1
+ SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_21-rt-14-150500.2.1
+ SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_24-rt-14-150500.2.1
+ SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_27-rt-13-150500.2.1
+ SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_30-rt-12-150500.2.1
+ SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_35-rt-10-150500.11.8.1
+ SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_38-rt-8-150500.11.6.1
+ SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_47-rt-8-150500.11.6.1
+ SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_52-rt-6-150500.11.8.1
+ SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_55-rt-6-150500.11.6.1
+ SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_28-default-15-150500.2.1
+ SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_31-default-14-150500.2.1
+ SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_36-default-13-150500.2.1
+ SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_39-default-13-150500.2.1
+ SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_44-default-12-150500.2.1
+ SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_49-default-10-150500.11.8.1
+ SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_52-default-8-150500.11.6.1
+ SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_59-default-8-150500.11.10.1
+ SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-6-150500.11.6.1
+ SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_65-default-6-150500.11.6.1
+ SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_21-default-6-150600.4.10.1
+ SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_8-rt-5-150600.3.1
+
SUSE Enterprise Storage 7.1:kernel-default
SUSE Enterprise Storage 7.1:kernel-default-devel
skipping CVE-2024-35866 as CVE page is older than CVRF-CVE file.
no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2024-35864
--- /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2024-35864.xml 2024-10-14 01:21:05.765479000 +0200
+++ /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2024-35864.xml.new 2024-10-29 01:17:52.487193000 +0100
@@ -14,13 +14,13 @@
1
- 66
- 2024-10-13T23:21:05Z
+ 67
+ 2024-10-29T00:17:51Z
current
2024-05-20T23:09:45Z
- 2024-10-13T23:21:05Z
+ 2024-10-29T00:17:51Z
cve-database/bin/generate-cvrf-cve.pl
2020-12-27T01:00:00Z
@@ -2530,33 +2530,183 @@
kernel-kvmsmall-vdso-6.4.0-150600.23.7.3
+
+ kernel-livepatch-5_14_21-150400_24_100-default-13-150400.2.1
+
+
+ kernel-livepatch-5_14_21-150400_24_103-default-11-150400.2.1
+
+
+ kernel-livepatch-5_14_21-150400_24_108-default-10-150400.9.8.1
+
+
+ kernel-livepatch-5_14_21-150400_24_111-default-8-150400.9.6.1
+
+
+ kernel-livepatch-5_14_21-150400_24_116-default-8-150400.9.8.1
+
+
+ kernel-livepatch-5_14_21-150400_24_119-default-7-150400.9.6.1
+
+
+ kernel-livepatch-5_14_21-150400_24_122-default-5-150400.9.6.1
+
kernel-livepatch-5_14_21-150400_24_125-default-1-150400.9.3.1
+
+ kernel-livepatch-5_14_21-150400_24_88-default-15-150400.2.1
+
+
+ kernel-livepatch-5_14_21-150400_24_92-default-14-150400.2.1
+
+
+ kernel-livepatch-5_14_21-150400_24_97-default-13-150400.2.1
+
+
+ kernel-livepatch-5_14_21-150500_13_18-rt-15-150500.2.1
+
+
+ kernel-livepatch-5_14_21-150500_13_21-rt-14-150500.2.1
+
+
+ kernel-livepatch-5_14_21-150500_13_24-rt-14-150500.2.1
+
+
+ kernel-livepatch-5_14_21-150500_13_27-rt-13-150500.2.1
+
+
+ kernel-livepatch-5_14_21-150500_13_30-rt-12-150500.2.1
+
+
+ kernel-livepatch-5_14_21-150500_13_35-rt-10-150500.11.8.1
+
+
+ kernel-livepatch-5_14_21-150500_13_38-rt-8-150500.11.6.1
+
+
+ kernel-livepatch-5_14_21-150500_13_47-rt-8-150500.11.6.1
+
+
+ kernel-livepatch-5_14_21-150500_13_52-rt-6-150500.11.8.1
+
+
+ kernel-livepatch-5_14_21-150500_13_55-rt-6-150500.11.6.1
+
kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1
kernel-livepatch-5_14_21-150500_13_61-rt-1-150500.11.3.1
+
+ kernel-livepatch-5_14_21-150500_55_28-default-15-150500.2.1
+
+
+ kernel-livepatch-5_14_21-150500_55_31-default-14-150500.2.1
+
+
+ kernel-livepatch-5_14_21-150500_55_36-default-13-150500.2.1
+
+
+ kernel-livepatch-5_14_21-150500_55_39-default-13-150500.2.1
+
+
+ kernel-livepatch-5_14_21-150500_55_44-default-12-150500.2.1
+
+
+ kernel-livepatch-5_14_21-150500_55_49-default-10-150500.11.8.1
+
+
+ kernel-livepatch-5_14_21-150500_55_52-default-8-150500.11.6.1
+
+
+ kernel-livepatch-5_14_21-150500_55_59-default-8-150500.11.10.1
+
+
+ kernel-livepatch-5_14_21-150500_55_62-default-6-150500.11.6.1
+
+
+ kernel-livepatch-5_14_21-150500_55_65-default-6-150500.11.6.1
+
kernel-livepatch-5_14_21-150500_55_68-default-1-150500.11.3.1
kernel-livepatch-5_14_21-150500_55_73-default-1-150500.11.3.1
+
+ kernel-livepatch-5_3_18-150200_24_166-default-15-150200.2.1
+
+
+ kernel-livepatch-5_3_18-150200_24_169-default-15-150200.2.1
+
+
+ kernel-livepatch-5_3_18-150200_24_172-default-13-150200.2.1
+
+
+ kernel-livepatch-5_3_18-150200_24_175-default-14-150200.2.1
+
+
+ kernel-livepatch-5_3_18-150200_24_178-default-11-150200.2.1
+
+
+ kernel-livepatch-5_3_18-150200_24_183-default-9-150200.5.6.1
+
+
+ kernel-livepatch-5_3_18-150200_24_188-default-8-150200.5.6.1
+
+
+ kernel-livepatch-5_3_18-150200_24_191-default-7-150200.5.6.1
+
+
+ kernel-livepatch-5_3_18-150200_24_194-default-4-150200.5.6.1
+
kernel-livepatch-5_3_18-150200_24_197-default-1-150200.5.3.1
+
+ kernel-livepatch-5_3_18-150300_59_138-default-15-150300.2.1
+
+
+ kernel-livepatch-5_3_18-150300_59_141-default-14-150300.2.1
+
+
+ kernel-livepatch-5_3_18-150300_59_144-default-13-150300.2.1
+
+
+ kernel-livepatch-5_3_18-150300_59_147-default-13-150300.2.1
+
+
+ kernel-livepatch-5_3_18-150300_59_150-default-12-150300.2.1
+
+
+ kernel-livepatch-5_3_18-150300_59_153-default-9-150300.7.6.1
+
+
+ kernel-livepatch-5_3_18-150300_59_158-default-8-150300.7.6.1
+
+
+ kernel-livepatch-5_3_18-150300_59_161-default-7-150300.7.6.1
+
+
+ kernel-livepatch-5_3_18-150300_59_164-default-4-150300.7.6.1
+
kernel-livepatch-5_3_18-150300_59_167-default-1-150300.7.3.1
kernel-livepatch-6_4_0-150600_10_5-rt-1-150600.1.5.1
+
+ kernel-livepatch-6_4_0-150600_21-default-6-150600.4.10.1
+
kernel-livepatch-6_4_0-150600_23_7-default-1-150600.13.3.7
+
+ kernel-livepatch-6_4_0-150600_8-rt-5-150600.3.1
+
kernel-macros
@@ -2827,6 +2977,30 @@
kernel-zfcpdump-6.4.0-150600.23.7.3
+
+ kgraft-patch-4_12_14-122_179-default-14-2.1
+
+
+ kgraft-patch-4_12_14-122_183-default-14-2.1
+
+
+ kgraft-patch-4_12_14-122_186-default-13-2.1
+
+
+ kgraft-patch-4_12_14-122_189-default-12-2.1
+
+
+ kgraft-patch-4_12_14-122_194-default-10-2.1
+
+
+ kgraft-patch-4_12_14-122_201-default-9-8.10.1
+
+
+ kgraft-patch-4_12_14-122_216-default-7-8.6.1
+
+
+ kgraft-patch-4_12_14-122_219-default-4-8.6.1
+
kgraft-patch-4_12_14-122_222-default-1-8.3.1
@@ -6016,6 +6190,180 @@
kernel-rt-5.14.21-150500.13.61.1 as a component of openSUSE Leap Micro 5.5
+
+ kgraft-patch-4_12_14-122_179-default-14-2.1 as a component of SUSE Linux Enterprise Live Patching 12 SP5
+
+
+ kgraft-patch-4_12_14-122_183-default-14-2.1 as a component of SUSE Linux Enterprise Live Patching 12 SP5
+
+
+ kgraft-patch-4_12_14-122_186-default-13-2.1 as a component of SUSE Linux Enterprise Live Patching 12 SP5
+
+
+ kgraft-patch-4_12_14-122_189-default-12-2.1 as a component of SUSE Linux Enterprise Live Patching 12 SP5
+
+
+ kgraft-patch-4_12_14-122_194-default-10-2.1 as a component of SUSE Linux Enterprise Live Patching 12 SP5
+
+
+ kgraft-patch-4_12_14-122_201-default-9-8.10.1 as a component of SUSE Linux Enterprise Live Patching 12 SP5
+
+
+ kgraft-patch-4_12_14-122_216-default-7-8.6.1 as a component of SUSE Linux Enterprise Live Patching 12 SP5
+
+
+ kgraft-patch-4_12_14-122_219-default-4-8.6.1 as a component of SUSE Linux Enterprise Live Patching 12 SP5
+
+
+ kernel-livepatch-5_3_18-150200_24_166-default-15-150200.2.1 as a component of SUSE Linux Enterprise Live Patching 15 SP2
+
+
+ kernel-livepatch-5_3_18-150200_24_169-default-15-150200.2.1 as a component of SUSE Linux Enterprise Live Patching 15 SP2
+
+
+ kernel-livepatch-5_3_18-150200_24_172-default-13-150200.2.1 as a component of SUSE Linux Enterprise Live Patching 15 SP2
+
+
+ kernel-livepatch-5_3_18-150200_24_175-default-14-150200.2.1 as a component of SUSE Linux Enterprise Live Patching 15 SP2
+
+
+ kernel-livepatch-5_3_18-150200_24_178-default-11-150200.2.1 as a component of SUSE Linux Enterprise Live Patching 15 SP2
+
+
+ kernel-livepatch-5_3_18-150200_24_183-default-9-150200.5.6.1 as a component of SUSE Linux Enterprise Live Patching 15 SP2
+
+
+ kernel-livepatch-5_3_18-150200_24_188-default-8-150200.5.6.1 as a component of SUSE Linux Enterprise Live Patching 15 SP2
+
+
+ kernel-livepatch-5_3_18-150200_24_191-default-7-150200.5.6.1 as a component of SUSE Linux Enterprise Live Patching 15 SP2
+
+
+ kernel-livepatch-5_3_18-150200_24_194-default-4-150200.5.6.1 as a component of SUSE Linux Enterprise Live Patching 15 SP2
+
+
+ kernel-livepatch-5_3_18-150300_59_138-default-15-150300.2.1 as a component of SUSE Linux Enterprise Live Patching 15 SP3
+
+
+ kernel-livepatch-5_3_18-150300_59_141-default-14-150300.2.1 as a component of SUSE Linux Enterprise Live Patching 15 SP3
+
+
+ kernel-livepatch-5_3_18-150300_59_144-default-13-150300.2.1 as a component of SUSE Linux Enterprise Live Patching 15 SP3
+
+
+ kernel-livepatch-5_3_18-150300_59_147-default-13-150300.2.1 as a component of SUSE Linux Enterprise Live Patching 15 SP3
+
+
+ kernel-livepatch-5_3_18-150300_59_150-default-12-150300.2.1 as a component of SUSE Linux Enterprise Live Patching 15 SP3
+
+
+ kernel-livepatch-5_3_18-150300_59_153-default-9-150300.7.6.1 as a component of SUSE Linux Enterprise Live Patching 15 SP3
+
+
+ kernel-livepatch-5_3_18-150300_59_158-default-8-150300.7.6.1 as a component of SUSE Linux Enterprise Live Patching 15 SP3
+
+
+ kernel-livepatch-5_3_18-150300_59_161-default-7-150300.7.6.1 as a component of SUSE Linux Enterprise Live Patching 15 SP3
+
+
+ kernel-livepatch-5_3_18-150300_59_164-default-4-150300.7.6.1 as a component of SUSE Linux Enterprise Live Patching 15 SP3
+
+
+ kernel-livepatch-5_14_21-150400_24_100-default-13-150400.2.1 as a component of SUSE Linux Enterprise Live Patching 15 SP4
+
+
+ kernel-livepatch-5_14_21-150400_24_103-default-11-150400.2.1 as a component of SUSE Linux Enterprise Live Patching 15 SP4
+
+
+ kernel-livepatch-5_14_21-150400_24_108-default-10-150400.9.8.1 as a component of SUSE Linux Enterprise Live Patching 15 SP4
+
+
+ kernel-livepatch-5_14_21-150400_24_111-default-8-150400.9.6.1 as a component of SUSE Linux Enterprise Live Patching 15 SP4
+
+
+ kernel-livepatch-5_14_21-150400_24_116-default-8-150400.9.8.1 as a component of SUSE Linux Enterprise Live Patching 15 SP4
+
+
+ kernel-livepatch-5_14_21-150400_24_119-default-7-150400.9.6.1 as a component of SUSE Linux Enterprise Live Patching 15 SP4
+
+
+ kernel-livepatch-5_14_21-150400_24_122-default-5-150400.9.6.1 as a component of SUSE Linux Enterprise Live Patching 15 SP4
+
+
+ kernel-livepatch-5_14_21-150400_24_88-default-15-150400.2.1 as a component of SUSE Linux Enterprise Live Patching 15 SP4
+
+
+ kernel-livepatch-5_14_21-150400_24_92-default-14-150400.2.1 as a component of SUSE Linux Enterprise Live Patching 15 SP4
+
+
+ kernel-livepatch-5_14_21-150400_24_97-default-13-150400.2.1 as a component of SUSE Linux Enterprise Live Patching 15 SP4
+
+
+ kernel-livepatch-5_14_21-150500_13_18-rt-15-150500.2.1 as a component of SUSE Linux Enterprise Live Patching 15 SP5
+
+
+ kernel-livepatch-5_14_21-150500_13_21-rt-14-150500.2.1 as a component of SUSE Linux Enterprise Live Patching 15 SP5
+
+
+ kernel-livepatch-5_14_21-150500_13_24-rt-14-150500.2.1 as a component of SUSE Linux Enterprise Live Patching 15 SP5
+
+
+ kernel-livepatch-5_14_21-150500_13_27-rt-13-150500.2.1 as a component of SUSE Linux Enterprise Live Patching 15 SP5
+
+
+ kernel-livepatch-5_14_21-150500_13_30-rt-12-150500.2.1 as a component of SUSE Linux Enterprise Live Patching 15 SP5
+
+
+ kernel-livepatch-5_14_21-150500_13_35-rt-10-150500.11.8.1 as a component of SUSE Linux Enterprise Live Patching 15 SP5
+
+
+ kernel-livepatch-5_14_21-150500_13_38-rt-8-150500.11.6.1 as a component of SUSE Linux Enterprise Live Patching 15 SP5
+
+
+ kernel-livepatch-5_14_21-150500_13_47-rt-8-150500.11.6.1 as a component of SUSE Linux Enterprise Live Patching 15 SP5
+
+
+ kernel-livepatch-5_14_21-150500_13_52-rt-6-150500.11.8.1 as a component of SUSE Linux Enterprise Live Patching 15 SP5
+
+
+ kernel-livepatch-5_14_21-150500_13_55-rt-6-150500.11.6.1 as a component of SUSE Linux Enterprise Live Patching 15 SP5
+
+
+ kernel-livepatch-5_14_21-150500_55_28-default-15-150500.2.1 as a component of SUSE Linux Enterprise Live Patching 15 SP5
+
+
+ kernel-livepatch-5_14_21-150500_55_31-default-14-150500.2.1 as a component of SUSE Linux Enterprise Live Patching 15 SP5
+
+
+ kernel-livepatch-5_14_21-150500_55_36-default-13-150500.2.1 as a component of SUSE Linux Enterprise Live Patching 15 SP5
+
+
+ kernel-livepatch-5_14_21-150500_55_39-default-13-150500.2.1 as a component of SUSE Linux Enterprise Live Patching 15 SP5
+
+
+ kernel-livepatch-5_14_21-150500_55_44-default-12-150500.2.1 as a component of SUSE Linux Enterprise Live Patching 15 SP5
+
+
+ kernel-livepatch-5_14_21-150500_55_49-default-10-150500.11.8.1 as a component of SUSE Linux Enterprise Live Patching 15 SP5
+
+
+ kernel-livepatch-5_14_21-150500_55_52-default-8-150500.11.6.1 as a component of SUSE Linux Enterprise Live Patching 15 SP5
+
+
+ kernel-livepatch-5_14_21-150500_55_59-default-8-150500.11.10.1 as a component of SUSE Linux Enterprise Live Patching 15 SP5
+
+
+ kernel-livepatch-5_14_21-150500_55_62-default-6-150500.11.6.1 as a component of SUSE Linux Enterprise Live Patching 15 SP5
+
+
+ kernel-livepatch-5_14_21-150500_55_65-default-6-150500.11.6.1 as a component of SUSE Linux Enterprise Live Patching 15 SP5
+
+
+ kernel-livepatch-6_4_0-150600_21-default-6-150600.4.10.1 as a component of SUSE Linux Enterprise Live Patching 15 SP6
+
+
+ kernel-livepatch-6_4_0-150600_8-rt-5-150600.3.1 as a component of SUSE Linux Enterprise Live Patching 15 SP6
+
kernel-default as a component of SUSE Linux Enterprise Micro 5.0
@@ -7203,6 +7551,66 @@
openSUSE Leap Micro 5.5:kernel-default-base-5.14.21-150500.55.73.1.150500.6.33.8
openSUSE Leap Micro 5.5:kernel-rt-5.14.21-150500.13.61.1
+
+ SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_179-default-14-2.1
+ SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_183-default-14-2.1
+ SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_186-default-13-2.1
+ SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_189-default-12-2.1
+ SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_194-default-10-2.1
+ SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_201-default-9-8.10.1
+ SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_216-default-7-8.6.1
+ SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-4-8.6.1
+ SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_166-default-15-150200.2.1
+ SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_169-default-15-150200.2.1
+ SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_172-default-13-150200.2.1
+ SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_175-default-14-150200.2.1
+ SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_178-default-11-150200.2.1
+ SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_183-default-9-150200.5.6.1
+ SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_188-default-8-150200.5.6.1
+ SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_191-default-7-150200.5.6.1
+ SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_194-default-4-150200.5.6.1
+ SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_138-default-15-150300.2.1
+ SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_141-default-14-150300.2.1
+ SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_144-default-13-150300.2.1
+ SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_147-default-13-150300.2.1
+ SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_150-default-12-150300.2.1
+ SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_153-default-9-150300.7.6.1
+ SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_158-default-8-150300.7.6.1
+ SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_161-default-7-150300.7.6.1
+ SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_164-default-4-150300.7.6.1
+ SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_100-default-13-150400.2.1
+ SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_103-default-11-150400.2.1
+ SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_108-default-10-150400.9.8.1
+ SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_111-default-8-150400.9.6.1
+ SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_116-default-8-150400.9.8.1
+ SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_119-default-7-150400.9.6.1
+ SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_122-default-5-150400.9.6.1
+ SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_88-default-15-150400.2.1
+ SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_92-default-14-150400.2.1
+ SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_97-default-13-150400.2.1
+ SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_18-rt-15-150500.2.1
+ SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_21-rt-14-150500.2.1
+ SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_24-rt-14-150500.2.1
+ SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_27-rt-13-150500.2.1
+ SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_30-rt-12-150500.2.1
+ SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_35-rt-10-150500.11.8.1
+ SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_38-rt-8-150500.11.6.1
+ SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_47-rt-8-150500.11.6.1
+ SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_52-rt-6-150500.11.8.1
+ SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_55-rt-6-150500.11.6.1
+ SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_28-default-15-150500.2.1
+ SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_31-default-14-150500.2.1
+ SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_36-default-13-150500.2.1
+ SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_39-default-13-150500.2.1
+ SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_44-default-12-150500.2.1
+ SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_49-default-10-150500.11.8.1
+ SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_52-default-8-150500.11.6.1
+ SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_59-default-8-150500.11.10.1
+ SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-6-150500.11.6.1
+ SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_65-default-6-150500.11.6.1
+ SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_21-default-6-150600.4.10.1
+ SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_8-rt-5-150600.3.1
+
SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-default
SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-default-base
no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2024-35863
--- /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2024-35863.xml 2024-10-14 01:21:06.456464000 +0200
+++ /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2024-35863.xml.new 2024-10-29 01:17:53.685041000 +0100
@@ -14,13 +14,13 @@
1
- 61
- 2024-10-13T23:21:06Z
+ 62
+ 2024-10-29T00:17:52Z
current
2024-05-20T23:09:45Z
- 2024-10-13T23:21:06Z
+ 2024-10-29T00:17:52Z
cve-database/bin/generate-cvrf-cve.pl
2020-12-27T01:00:00Z
@@ -2292,21 +2292,114 @@
kernel-kvmsmall-vdso-6.4.0-150600.23.7.3
+
+ kernel-livepatch-5_14_21-150400_24_100-default-13-150400.2.1
+
+
+ kernel-livepatch-5_14_21-150400_24_103-default-11-150400.2.1
+
+
+ kernel-livepatch-5_14_21-150400_24_108-default-10-150400.9.8.1
+
+
+ kernel-livepatch-5_14_21-150400_24_111-default-8-150400.9.6.1
+
+
+ kernel-livepatch-5_14_21-150400_24_116-default-8-150400.9.8.1
+
+
+ kernel-livepatch-5_14_21-150400_24_119-default-7-150400.9.6.1
+
kernel-livepatch-5_14_21-150400_24_122-default-1-150400.9.3.2
+
+ kernel-livepatch-5_14_21-150400_24_88-default-15-150400.2.1
+
+
+ kernel-livepatch-5_14_21-150400_24_92-default-14-150400.2.1
+
+
+ kernel-livepatch-5_14_21-150400_24_97-default-13-150400.2.1
+
+
+ kernel-livepatch-5_14_21-150500_13_18-rt-15-150500.2.1
+
+
+ kernel-livepatch-5_14_21-150500_13_21-rt-14-150500.2.1
+
+
+ kernel-livepatch-5_14_21-150500_13_24-rt-14-150500.2.1
+
+
+ kernel-livepatch-5_14_21-150500_13_27-rt-13-150500.2.1
+
+
+ kernel-livepatch-5_14_21-150500_13_30-rt-12-150500.2.1
+
+
+ kernel-livepatch-5_14_21-150500_13_35-rt-10-150500.11.8.1
+
+
+ kernel-livepatch-5_14_21-150500_13_38-rt-8-150500.11.6.1
+
+
+ kernel-livepatch-5_14_21-150500_13_47-rt-8-150500.11.6.1
+
+
+ kernel-livepatch-5_14_21-150500_13_52-rt-6-150500.11.8.1
+
+
+ kernel-livepatch-5_14_21-150500_13_55-rt-6-150500.11.6.1
+
kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1
+
+ kernel-livepatch-5_14_21-150500_55_28-default-15-150500.2.1
+
+
+ kernel-livepatch-5_14_21-150500_55_31-default-14-150500.2.1
+
+
+ kernel-livepatch-5_14_21-150500_55_36-default-13-150500.2.1
+
+
+ kernel-livepatch-5_14_21-150500_55_39-default-13-150500.2.1
+
+
+ kernel-livepatch-5_14_21-150500_55_44-default-12-150500.2.1
+
+
+ kernel-livepatch-5_14_21-150500_55_49-default-10-150500.11.8.1
+
+
+ kernel-livepatch-5_14_21-150500_55_52-default-8-150500.11.6.1
+
+
+ kernel-livepatch-5_14_21-150500_55_59-default-8-150500.11.10.1
+
+
+ kernel-livepatch-5_14_21-150500_55_62-default-6-150500.11.6.1
+
+
+ kernel-livepatch-5_14_21-150500_55_65-default-6-150500.11.6.1
+
kernel-livepatch-5_14_21-150500_55_68-default-1-150500.11.3.1
kernel-livepatch-6_4_0-150600_10_5-rt-1-150600.1.5.1
+
+ kernel-livepatch-6_4_0-150600_21-default-6-150600.4.10.1
+
kernel-livepatch-6_4_0-150600_23_7-default-1-150600.13.3.7
+
+ kernel-livepatch-6_4_0-150600_8-rt-5-150600.3.1
+
kernel-macros
@@ -2520,6 +2613,30 @@
kernel-zfcpdump-6.4.0-150600.23.7.3
+
+ kgraft-patch-4_12_14-122_179-default-14-2.1
+
+
+ kgraft-patch-4_12_14-122_183-default-14-2.1
+
+
+ kgraft-patch-4_12_14-122_186-default-13-2.1
+
+
+ kgraft-patch-4_12_14-122_189-default-12-2.1
+
+
+ kgraft-patch-4_12_14-122_194-default-10-2.1
+
+
+ kgraft-patch-4_12_14-122_201-default-9-8.10.1
+
+
+ kgraft-patch-4_12_14-122_216-default-7-8.6.1
+
+
+ kgraft-patch-4_12_14-122_219-default-4-8.6.1
+
kgraft-patch-4_12_14-122_222-default-1-8.3.1
@@ -5193,6 +5310,123 @@
kernel-rt-5.14.21-150500.13.58.1 as a component of openSUSE Leap Micro 5.5
+
+ kgraft-patch-4_12_14-122_179-default-14-2.1 as a component of SUSE Linux Enterprise Live Patching 12 SP5
+
+
+ kgraft-patch-4_12_14-122_183-default-14-2.1 as a component of SUSE Linux Enterprise Live Patching 12 SP5
+
+
+ kgraft-patch-4_12_14-122_186-default-13-2.1 as a component of SUSE Linux Enterprise Live Patching 12 SP5
+
+
+ kgraft-patch-4_12_14-122_189-default-12-2.1 as a component of SUSE Linux Enterprise Live Patching 12 SP5
+
+
+ kgraft-patch-4_12_14-122_194-default-10-2.1 as a component of SUSE Linux Enterprise Live Patching 12 SP5
+
+
+ kgraft-patch-4_12_14-122_201-default-9-8.10.1 as a component of SUSE Linux Enterprise Live Patching 12 SP5
+
+
+ kgraft-patch-4_12_14-122_216-default-7-8.6.1 as a component of SUSE Linux Enterprise Live Patching 12 SP5
+
+
+ kgraft-patch-4_12_14-122_219-default-4-8.6.1 as a component of SUSE Linux Enterprise Live Patching 12 SP5
+
+
+ kernel-livepatch-5_14_21-150400_24_100-default-13-150400.2.1 as a component of SUSE Linux Enterprise Live Patching 15 SP4
+
+
+ kernel-livepatch-5_14_21-150400_24_103-default-11-150400.2.1 as a component of SUSE Linux Enterprise Live Patching 15 SP4
+
+
+ kernel-livepatch-5_14_21-150400_24_108-default-10-150400.9.8.1 as a component of SUSE Linux Enterprise Live Patching 15 SP4
+
+
+ kernel-livepatch-5_14_21-150400_24_111-default-8-150400.9.6.1 as a component of SUSE Linux Enterprise Live Patching 15 SP4
+
+
+ kernel-livepatch-5_14_21-150400_24_116-default-8-150400.9.8.1 as a component of SUSE Linux Enterprise Live Patching 15 SP4
+
+
+ kernel-livepatch-5_14_21-150400_24_119-default-7-150400.9.6.1 as a component of SUSE Linux Enterprise Live Patching 15 SP4
+
+
+ kernel-livepatch-5_14_21-150400_24_88-default-15-150400.2.1 as a component of SUSE Linux Enterprise Live Patching 15 SP4
+
+
+ kernel-livepatch-5_14_21-150400_24_92-default-14-150400.2.1 as a component of SUSE Linux Enterprise Live Patching 15 SP4
+
+
+ kernel-livepatch-5_14_21-150400_24_97-default-13-150400.2.1 as a component of SUSE Linux Enterprise Live Patching 15 SP4
+
+
+ kernel-livepatch-5_14_21-150500_13_18-rt-15-150500.2.1 as a component of SUSE Linux Enterprise Live Patching 15 SP5
+
+
+ kernel-livepatch-5_14_21-150500_13_21-rt-14-150500.2.1 as a component of SUSE Linux Enterprise Live Patching 15 SP5
+
+
+ kernel-livepatch-5_14_21-150500_13_24-rt-14-150500.2.1 as a component of SUSE Linux Enterprise Live Patching 15 SP5
+
+
+ kernel-livepatch-5_14_21-150500_13_27-rt-13-150500.2.1 as a component of SUSE Linux Enterprise Live Patching 15 SP5
+
+
+ kernel-livepatch-5_14_21-150500_13_30-rt-12-150500.2.1 as a component of SUSE Linux Enterprise Live Patching 15 SP5
+
+
+ kernel-livepatch-5_14_21-150500_13_35-rt-10-150500.11.8.1 as a component of SUSE Linux Enterprise Live Patching 15 SP5
+
+
+ kernel-livepatch-5_14_21-150500_13_38-rt-8-150500.11.6.1 as a component of SUSE Linux Enterprise Live Patching 15 SP5
+
+
+ kernel-livepatch-5_14_21-150500_13_47-rt-8-150500.11.6.1 as a component of SUSE Linux Enterprise Live Patching 15 SP5
+
+
+ kernel-livepatch-5_14_21-150500_13_52-rt-6-150500.11.8.1 as a component of SUSE Linux Enterprise Live Patching 15 SP5
+
+
+ kernel-livepatch-5_14_21-150500_13_55-rt-6-150500.11.6.1 as a component of SUSE Linux Enterprise Live Patching 15 SP5
+
+
+ kernel-livepatch-5_14_21-150500_55_28-default-15-150500.2.1 as a component of SUSE Linux Enterprise Live Patching 15 SP5
+
+
+ kernel-livepatch-5_14_21-150500_55_31-default-14-150500.2.1 as a component of SUSE Linux Enterprise Live Patching 15 SP5
+
+
+ kernel-livepatch-5_14_21-150500_55_36-default-13-150500.2.1 as a component of SUSE Linux Enterprise Live Patching 15 SP5
+
+
+ kernel-livepatch-5_14_21-150500_55_39-default-13-150500.2.1 as a component of SUSE Linux Enterprise Live Patching 15 SP5
+
+
+ kernel-livepatch-5_14_21-150500_55_44-default-12-150500.2.1 as a component of SUSE Linux Enterprise Live Patching 15 SP5
+
+
+ kernel-livepatch-5_14_21-150500_55_49-default-10-150500.11.8.1 as a component of SUSE Linux Enterprise Live Patching 15 SP5
+
+
+ kernel-livepatch-5_14_21-150500_55_52-default-8-150500.11.6.1 as a component of SUSE Linux Enterprise Live Patching 15 SP5
+
+
+ kernel-livepatch-5_14_21-150500_55_59-default-8-150500.11.10.1 as a component of SUSE Linux Enterprise Live Patching 15 SP5
+
+
+ kernel-livepatch-5_14_21-150500_55_62-default-6-150500.11.6.1 as a component of SUSE Linux Enterprise Live Patching 15 SP5
+
+
+ kernel-livepatch-5_14_21-150500_55_65-default-6-150500.11.6.1 as a component of SUSE Linux Enterprise Live Patching 15 SP5
+
+
+ kernel-livepatch-6_4_0-150600_21-default-6-150600.4.10.1 as a component of SUSE Linux Enterprise Live Patching 15 SP6
+
+
+ kernel-livepatch-6_4_0-150600_8-rt-5-150600.3.1 as a component of SUSE Linux Enterprise Live Patching 15 SP6
+
kernel-default as a component of SUSE Enterprise Storage 7.1
@@ -6395,6 +6629,47 @@
openSUSE Leap Micro 5.5:kernel-default-base-5.14.21-150500.55.68.1.150500.6.31.1
openSUSE Leap Micro 5.5:kernel-rt-5.14.21-150500.13.58.1
+
+ SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_179-default-14-2.1
+ SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_183-default-14-2.1
+ SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_186-default-13-2.1
+ SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_189-default-12-2.1
+ SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_194-default-10-2.1
+ SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_201-default-9-8.10.1
+ SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_216-default-7-8.6.1
+ SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-4-8.6.1
+ SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_100-default-13-150400.2.1
+ SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_103-default-11-150400.2.1
+ SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_108-default-10-150400.9.8.1
+ SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_111-default-8-150400.9.6.1
+ SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_116-default-8-150400.9.8.1
+ SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_119-default-7-150400.9.6.1
+ SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_88-default-15-150400.2.1
+ SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_92-default-14-150400.2.1
+ SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_97-default-13-150400.2.1
+ SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_18-rt-15-150500.2.1
+ SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_21-rt-14-150500.2.1
+ SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_24-rt-14-150500.2.1
+ SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_27-rt-13-150500.2.1
+ SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_30-rt-12-150500.2.1
+ SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_35-rt-10-150500.11.8.1
+ SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_38-rt-8-150500.11.6.1
+ SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_47-rt-8-150500.11.6.1
+ SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_52-rt-6-150500.11.8.1
+ SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_55-rt-6-150500.11.6.1
+ SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_28-default-15-150500.2.1
+ SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_31-default-14-150500.2.1
+ SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_36-default-13-150500.2.1
+ SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_39-default-13-150500.2.1
+ SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_44-default-12-150500.2.1
+ SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_49-default-10-150500.11.8.1
+ SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_52-default-8-150500.11.6.1
+ SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_59-default-8-150500.11.10.1
+ SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-6-150500.11.6.1
+ SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_65-default-6-150500.11.6.1
+ SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_21-default-6-150600.4.10.1
+ SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_8-rt-5-150600.3.1
+
chost:amazon/suse-sles-15-sp4-chost-byos-v20240809-hvm-ssd-x86_64
chost:amazon/suse-sles-15-sp4-chost-byos-v20240912-hvm-ssd-x86_64
no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2024-35862
--- /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2024-35862.xml 2024-10-14 01:21:07.284459000 +0200
+++ /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2024-35862.xml.new 2024-10-29 01:17:54.722956000 +0100
@@ -14,13 +14,13 @@
1
- 62
- 2024-10-13T23:21:06Z
+ 63
+ 2024-10-29T00:17:54Z
current
2024-05-20T23:09:46Z
- 2024-10-13T23:21:06Z
+ 2024-10-29T00:17:54Z
cve-database/bin/generate-cvrf-cve.pl
2020-12-27T01:00:00Z
@@ -2506,33 +2506,183 @@
kernel-kvmsmall-vdso-6.4.0-150600.23.7.3
+
+ kernel-livepatch-5_14_21-150400_24_100-default-13-150400.2.1
+
+
+ kernel-livepatch-5_14_21-150400_24_103-default-11-150400.2.1
+
+
+ kernel-livepatch-5_14_21-150400_24_108-default-10-150400.9.8.1
+
+
+ kernel-livepatch-5_14_21-150400_24_111-default-8-150400.9.6.1
+
+
+ kernel-livepatch-5_14_21-150400_24_116-default-8-150400.9.8.1
+
+
+ kernel-livepatch-5_14_21-150400_24_119-default-7-150400.9.6.1
+
+
+ kernel-livepatch-5_14_21-150400_24_122-default-5-150400.9.6.1
+
kernel-livepatch-5_14_21-150400_24_125-default-1-150400.9.3.1
+
+ kernel-livepatch-5_14_21-150400_24_88-default-15-150400.2.1
+
+
+ kernel-livepatch-5_14_21-150400_24_92-default-14-150400.2.1
+
+
+ kernel-livepatch-5_14_21-150400_24_97-default-13-150400.2.1
+
+
+ kernel-livepatch-5_14_21-150500_13_18-rt-15-150500.2.1
+
+
+ kernel-livepatch-5_14_21-150500_13_21-rt-14-150500.2.1
+
+
+ kernel-livepatch-5_14_21-150500_13_24-rt-14-150500.2.1
+
+
+ kernel-livepatch-5_14_21-150500_13_27-rt-13-150500.2.1
+
+
+ kernel-livepatch-5_14_21-150500_13_30-rt-12-150500.2.1
+
+
+ kernel-livepatch-5_14_21-150500_13_35-rt-10-150500.11.8.1
+
+
+ kernel-livepatch-5_14_21-150500_13_38-rt-8-150500.11.6.1
+
+
+ kernel-livepatch-5_14_21-150500_13_47-rt-8-150500.11.6.1
+
+
+ kernel-livepatch-5_14_21-150500_13_52-rt-6-150500.11.8.1
+
+
+ kernel-livepatch-5_14_21-150500_13_55-rt-6-150500.11.6.1
+
kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1
kernel-livepatch-5_14_21-150500_13_61-rt-1-150500.11.3.1
+
+ kernel-livepatch-5_14_21-150500_55_28-default-15-150500.2.1
+
+
+ kernel-livepatch-5_14_21-150500_55_31-default-14-150500.2.1
+
+
+ kernel-livepatch-5_14_21-150500_55_36-default-13-150500.2.1
+
+
+ kernel-livepatch-5_14_21-150500_55_39-default-13-150500.2.1
+
+
+ kernel-livepatch-5_14_21-150500_55_44-default-12-150500.2.1
+
+
+ kernel-livepatch-5_14_21-150500_55_49-default-10-150500.11.8.1
+
+
+ kernel-livepatch-5_14_21-150500_55_52-default-8-150500.11.6.1
+
+
+ kernel-livepatch-5_14_21-150500_55_59-default-8-150500.11.10.1
+
+
+ kernel-livepatch-5_14_21-150500_55_62-default-6-150500.11.6.1
+
+
+ kernel-livepatch-5_14_21-150500_55_65-default-6-150500.11.6.1
+
kernel-livepatch-5_14_21-150500_55_68-default-1-150500.11.3.1
kernel-livepatch-5_14_21-150500_55_73-default-1-150500.11.3.1
+
+ kernel-livepatch-5_3_18-150200_24_166-default-15-150200.2.1
+
+
+ kernel-livepatch-5_3_18-150200_24_169-default-15-150200.2.1
+
+
+ kernel-livepatch-5_3_18-150200_24_172-default-13-150200.2.1
+
+
+ kernel-livepatch-5_3_18-150200_24_175-default-14-150200.2.1
+
+
+ kernel-livepatch-5_3_18-150200_24_178-default-11-150200.2.1
+
+
+ kernel-livepatch-5_3_18-150200_24_183-default-9-150200.5.6.1
+
+
+ kernel-livepatch-5_3_18-150200_24_188-default-8-150200.5.6.1
+
+
+ kernel-livepatch-5_3_18-150200_24_191-default-7-150200.5.6.1
+
+
+ kernel-livepatch-5_3_18-150200_24_194-default-4-150200.5.6.1
+
kernel-livepatch-5_3_18-150200_24_197-default-1-150200.5.3.1
+
+ kernel-livepatch-5_3_18-150300_59_138-default-15-150300.2.1
+
+
+ kernel-livepatch-5_3_18-150300_59_141-default-14-150300.2.1
+
+
+ kernel-livepatch-5_3_18-150300_59_144-default-13-150300.2.1
+
+
+ kernel-livepatch-5_3_18-150300_59_147-default-13-150300.2.1
+
+
+ kernel-livepatch-5_3_18-150300_59_150-default-12-150300.2.1
+
+
+ kernel-livepatch-5_3_18-150300_59_153-default-9-150300.7.6.1
+
+
+ kernel-livepatch-5_3_18-150300_59_158-default-8-150300.7.6.1
+
+
+ kernel-livepatch-5_3_18-150300_59_161-default-7-150300.7.6.1
+
+
+ kernel-livepatch-5_3_18-150300_59_164-default-4-150300.7.6.1
+
kernel-livepatch-5_3_18-150300_59_167-default-1-150300.7.3.1
kernel-livepatch-6_4_0-150600_10_5-rt-1-150600.1.5.1
+
+ kernel-livepatch-6_4_0-150600_21-default-6-150600.4.10.1
+
kernel-livepatch-6_4_0-150600_23_7-default-1-150600.13.3.7
+
+ kernel-livepatch-6_4_0-150600_8-rt-5-150600.3.1
+
kernel-macros
@@ -2785,6 +2935,30 @@
kernel-zfcpdump-6.4.0-150600.23.7.3
+
+ kgraft-patch-4_12_14-122_179-default-14-2.1
+
+
+ kgraft-patch-4_12_14-122_183-default-14-2.1
+
+
+ kgraft-patch-4_12_14-122_186-default-13-2.1
+
+
+ kgraft-patch-4_12_14-122_189-default-12-2.1
+
+
+ kgraft-patch-4_12_14-122_194-default-10-2.1
+
+
+ kgraft-patch-4_12_14-122_201-default-9-8.10.1
+
+
+ kgraft-patch-4_12_14-122_216-default-7-8.6.1
+
+
+ kgraft-patch-4_12_14-122_219-default-4-8.6.1
+
kgraft-patch-4_12_14-122_222-default-1-8.3.1
@@ -5932,6 +6106,180 @@
kernel-rt-5.14.21-150500.13.61.1 as a component of openSUSE Leap Micro 5.5
+
+ kgraft-patch-4_12_14-122_179-default-14-2.1 as a component of SUSE Linux Enterprise Live Patching 12 SP5
+
+
+ kgraft-patch-4_12_14-122_183-default-14-2.1 as a component of SUSE Linux Enterprise Live Patching 12 SP5
+
+
+ kgraft-patch-4_12_14-122_186-default-13-2.1 as a component of SUSE Linux Enterprise Live Patching 12 SP5
+
+
+ kgraft-patch-4_12_14-122_189-default-12-2.1 as a component of SUSE Linux Enterprise Live Patching 12 SP5
+
+
+ kgraft-patch-4_12_14-122_194-default-10-2.1 as a component of SUSE Linux Enterprise Live Patching 12 SP5
+
+
+ kgraft-patch-4_12_14-122_201-default-9-8.10.1 as a component of SUSE Linux Enterprise Live Patching 12 SP5
+
+
+ kgraft-patch-4_12_14-122_216-default-7-8.6.1 as a component of SUSE Linux Enterprise Live Patching 12 SP5
+
+
+ kgraft-patch-4_12_14-122_219-default-4-8.6.1 as a component of SUSE Linux Enterprise Live Patching 12 SP5
+
+
+ kernel-livepatch-5_3_18-150200_24_166-default-15-150200.2.1 as a component of SUSE Linux Enterprise Live Patching 15 SP2
+
+
+ kernel-livepatch-5_3_18-150200_24_169-default-15-150200.2.1 as a component of SUSE Linux Enterprise Live Patching 15 SP2
+
+
+ kernel-livepatch-5_3_18-150200_24_172-default-13-150200.2.1 as a component of SUSE Linux Enterprise Live Patching 15 SP2
+
+
+ kernel-livepatch-5_3_18-150200_24_175-default-14-150200.2.1 as a component of SUSE Linux Enterprise Live Patching 15 SP2
+
+
+ kernel-livepatch-5_3_18-150200_24_178-default-11-150200.2.1 as a component of SUSE Linux Enterprise Live Patching 15 SP2
+
+
+ kernel-livepatch-5_3_18-150200_24_183-default-9-150200.5.6.1 as a component of SUSE Linux Enterprise Live Patching 15 SP2
+
+
+ kernel-livepatch-5_3_18-150200_24_188-default-8-150200.5.6.1 as a component of SUSE Linux Enterprise Live Patching 15 SP2
+
+
+ kernel-livepatch-5_3_18-150200_24_191-default-7-150200.5.6.1 as a component of SUSE Linux Enterprise Live Patching 15 SP2
+
+
+ kernel-livepatch-5_3_18-150200_24_194-default-4-150200.5.6.1 as a component of SUSE Linux Enterprise Live Patching 15 SP2
+
+
+ kernel-livepatch-5_3_18-150300_59_138-default-15-150300.2.1 as a component of SUSE Linux Enterprise Live Patching 15 SP3
+
+
+ kernel-livepatch-5_3_18-150300_59_141-default-14-150300.2.1 as a component of SUSE Linux Enterprise Live Patching 15 SP3
+
+
+ kernel-livepatch-5_3_18-150300_59_144-default-13-150300.2.1 as a component of SUSE Linux Enterprise Live Patching 15 SP3
+
+
+ kernel-livepatch-5_3_18-150300_59_147-default-13-150300.2.1 as a component of SUSE Linux Enterprise Live Patching 15 SP3
+
+
+ kernel-livepatch-5_3_18-150300_59_150-default-12-150300.2.1 as a component of SUSE Linux Enterprise Live Patching 15 SP3
+
+
+ kernel-livepatch-5_3_18-150300_59_153-default-9-150300.7.6.1 as a component of SUSE Linux Enterprise Live Patching 15 SP3
+
+
+ kernel-livepatch-5_3_18-150300_59_158-default-8-150300.7.6.1 as a component of SUSE Linux Enterprise Live Patching 15 SP3
+
+
+ kernel-livepatch-5_3_18-150300_59_161-default-7-150300.7.6.1 as a component of SUSE Linux Enterprise Live Patching 15 SP3
+
+
+ kernel-livepatch-5_3_18-150300_59_164-default-4-150300.7.6.1 as a component of SUSE Linux Enterprise Live Patching 15 SP3
+
+
+ kernel-livepatch-5_14_21-150400_24_100-default-13-150400.2.1 as a component of SUSE Linux Enterprise Live Patching 15 SP4
+
+
+ kernel-livepatch-5_14_21-150400_24_103-default-11-150400.2.1 as a component of SUSE Linux Enterprise Live Patching 15 SP4
+
+
+ kernel-livepatch-5_14_21-150400_24_108-default-10-150400.9.8.1 as a component of SUSE Linux Enterprise Live Patching 15 SP4
+
+
+ kernel-livepatch-5_14_21-150400_24_111-default-8-150400.9.6.1 as a component of SUSE Linux Enterprise Live Patching 15 SP4
+
+
+ kernel-livepatch-5_14_21-150400_24_116-default-8-150400.9.8.1 as a component of SUSE Linux Enterprise Live Patching 15 SP4
+
+
+ kernel-livepatch-5_14_21-150400_24_119-default-7-150400.9.6.1 as a component of SUSE Linux Enterprise Live Patching 15 SP4
+
+
+ kernel-livepatch-5_14_21-150400_24_122-default-5-150400.9.6.1 as a component of SUSE Linux Enterprise Live Patching 15 SP4
+
+
+ kernel-livepatch-5_14_21-150400_24_88-default-15-150400.2.1 as a component of SUSE Linux Enterprise Live Patching 15 SP4
+
+
+ kernel-livepatch-5_14_21-150400_24_92-default-14-150400.2.1 as a component of SUSE Linux Enterprise Live Patching 15 SP4
+
+
+ kernel-livepatch-5_14_21-150400_24_97-default-13-150400.2.1 as a component of SUSE Linux Enterprise Live Patching 15 SP4
+
+
+ kernel-livepatch-5_14_21-150500_13_18-rt-15-150500.2.1 as a component of SUSE Linux Enterprise Live Patching 15 SP5
+
+
+ kernel-livepatch-5_14_21-150500_13_21-rt-14-150500.2.1 as a component of SUSE Linux Enterprise Live Patching 15 SP5
+
+
+ kernel-livepatch-5_14_21-150500_13_24-rt-14-150500.2.1 as a component of SUSE Linux Enterprise Live Patching 15 SP5
+
+
+ kernel-livepatch-5_14_21-150500_13_27-rt-13-150500.2.1 as a component of SUSE Linux Enterprise Live Patching 15 SP5
+
+
+ kernel-livepatch-5_14_21-150500_13_30-rt-12-150500.2.1 as a component of SUSE Linux Enterprise Live Patching 15 SP5
+
+
+ kernel-livepatch-5_14_21-150500_13_35-rt-10-150500.11.8.1 as a component of SUSE Linux Enterprise Live Patching 15 SP5
+
+
+ kernel-livepatch-5_14_21-150500_13_38-rt-8-150500.11.6.1 as a component of SUSE Linux Enterprise Live Patching 15 SP5
+
+
+ kernel-livepatch-5_14_21-150500_13_47-rt-8-150500.11.6.1 as a component of SUSE Linux Enterprise Live Patching 15 SP5
+
+
+ kernel-livepatch-5_14_21-150500_13_52-rt-6-150500.11.8.1 as a component of SUSE Linux Enterprise Live Patching 15 SP5
+
+
+ kernel-livepatch-5_14_21-150500_13_55-rt-6-150500.11.6.1 as a component of SUSE Linux Enterprise Live Patching 15 SP5
+
+
+ kernel-livepatch-5_14_21-150500_55_28-default-15-150500.2.1 as a component of SUSE Linux Enterprise Live Patching 15 SP5
+
+
+ kernel-livepatch-5_14_21-150500_55_31-default-14-150500.2.1 as a component of SUSE Linux Enterprise Live Patching 15 SP5
+
+
+ kernel-livepatch-5_14_21-150500_55_36-default-13-150500.2.1 as a component of SUSE Linux Enterprise Live Patching 15 SP5
+
+
+ kernel-livepatch-5_14_21-150500_55_39-default-13-150500.2.1 as a component of SUSE Linux Enterprise Live Patching 15 SP5
+
+
+ kernel-livepatch-5_14_21-150500_55_44-default-12-150500.2.1 as a component of SUSE Linux Enterprise Live Patching 15 SP5
+
+
+ kernel-livepatch-5_14_21-150500_55_49-default-10-150500.11.8.1 as a component of SUSE Linux Enterprise Live Patching 15 SP5
+
+
+ kernel-livepatch-5_14_21-150500_55_52-default-8-150500.11.6.1 as a component of SUSE Linux Enterprise Live Patching 15 SP5
+
+
+ kernel-livepatch-5_14_21-150500_55_59-default-8-150500.11.10.1 as a component of SUSE Linux Enterprise Live Patching 15 SP5
+
+
+ kernel-livepatch-5_14_21-150500_55_62-default-6-150500.11.6.1 as a component of SUSE Linux Enterprise Live Patching 15 SP5
+
+
+ kernel-livepatch-5_14_21-150500_55_65-default-6-150500.11.6.1 as a component of SUSE Linux Enterprise Live Patching 15 SP5
+
+
+ kernel-livepatch-6_4_0-150600_21-default-6-150600.4.10.1 as a component of SUSE Linux Enterprise Live Patching 15 SP6
+
+
+ kernel-livepatch-6_4_0-150600_8-rt-5-150600.3.1 as a component of SUSE Linux Enterprise Live Patching 15 SP6
+
kernel-default as a component of SUSE Linux Enterprise Micro 5.0
@@ -7117,6 +7465,66 @@
openSUSE Leap Micro 5.5:kernel-default-base-5.14.21-150500.55.73.1.150500.6.33.8
openSUSE Leap Micro 5.5:kernel-rt-5.14.21-150500.13.61.1
+
+ SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_179-default-14-2.1
+ SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_183-default-14-2.1
+ SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_186-default-13-2.1
+ SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_189-default-12-2.1
+ SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_194-default-10-2.1
+ SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_201-default-9-8.10.1
+ SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_216-default-7-8.6.1
+ SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-4-8.6.1
+ SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_166-default-15-150200.2.1
+ SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_169-default-15-150200.2.1
+ SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_172-default-13-150200.2.1
+ SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_175-default-14-150200.2.1
+ SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_178-default-11-150200.2.1
+ SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_183-default-9-150200.5.6.1
+ SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_188-default-8-150200.5.6.1
+ SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_191-default-7-150200.5.6.1
+ SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_194-default-4-150200.5.6.1
+ SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_138-default-15-150300.2.1
+ SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_141-default-14-150300.2.1
+ SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_144-default-13-150300.2.1
+ SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_147-default-13-150300.2.1
+ SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_150-default-12-150300.2.1
+ SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_153-default-9-150300.7.6.1
+ SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_158-default-8-150300.7.6.1
+ SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_161-default-7-150300.7.6.1
+ SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_164-default-4-150300.7.6.1
+ SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_100-default-13-150400.2.1
+ SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_103-default-11-150400.2.1
+ SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_108-default-10-150400.9.8.1
+ SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_111-default-8-150400.9.6.1
+ SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_116-default-8-150400.9.8.1
+ SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_119-default-7-150400.9.6.1
+ SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_122-default-5-150400.9.6.1
+ SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_88-default-15-150400.2.1
+ SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_92-default-14-150400.2.1
+ SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_97-default-13-150400.2.1
+ SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_18-rt-15-150500.2.1
+ SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_21-rt-14-150500.2.1
+ SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_24-rt-14-150500.2.1
+ SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_27-rt-13-150500.2.1
+ SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_30-rt-12-150500.2.1
+ SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_35-rt-10-150500.11.8.1
+ SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_38-rt-8-150500.11.6.1
+ SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_47-rt-8-150500.11.6.1
+ SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_52-rt-6-150500.11.8.1
+ SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_55-rt-6-150500.11.6.1
+ SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_28-default-15-150500.2.1
+ SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_31-default-14-150500.2.1
+ SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_36-default-13-150500.2.1
+ SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_39-default-13-150500.2.1
+ SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_44-default-12-150500.2.1
+ SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_49-default-10-150500.11.8.1
+ SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_52-default-8-150500.11.6.1
+ SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_59-default-8-150500.11.10.1
+ SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-6-150500.11.6.1
+ SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_65-default-6-150500.11.6.1
+ SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_21-default-6-150600.4.10.1
+ SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_8-rt-5-150600.3.1
+
SUSE Linux Enterprise Micro 5.0:kernel-default
SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-default
no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2024-35861
--- /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2024-35861.xml 2024-10-22 01:32:13.499719000 +0200
+++ /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2024-35861.xml.new 2024-10-29 01:17:55.659953000 +0100
@@ -14,13 +14,13 @@
1
- 66
- 2024-10-21T23:32:12Z
+ 67
+ 2024-10-29T00:17:55Z
current
2024-05-20T23:09:46Z
- 2024-10-21T23:32:12Z
+ 2024-10-29T00:17:55Z
cve-database/bin/generate-cvrf-cve.pl
2020-12-27T01:00:00Z
@@ -2535,21 +2535,36 @@
kernel-livepatch-5_14_21-150400_24_103-default-10-150400.2.1
+
+ kernel-livepatch-5_14_21-150400_24_108-default-10-150400.9.8.1
+
kernel-livepatch-5_14_21-150400_24_108-default-9-150400.9.8.1
kernel-livepatch-5_14_21-150400_24_111-default-7-150400.9.6.1
+
+ kernel-livepatch-5_14_21-150400_24_111-default-8-150400.9.6.1
+
kernel-livepatch-5_14_21-150400_24_116-default-7-150400.9.8.1
+
+ kernel-livepatch-5_14_21-150400_24_116-default-8-150400.9.8.1
+
kernel-livepatch-5_14_21-150400_24_119-default-6-150400.9.6.1
+
+ kernel-livepatch-5_14_21-150400_24_119-default-7-150400.9.6.1
+
kernel-livepatch-5_14_21-150400_24_122-default-4-150400.9.6.1
+
+ kernel-livepatch-5_14_21-150400_24_122-default-5-150400.9.6.1
+
kernel-livepatch-5_14_21-150400_24_125-default-1-150400.9.3.1
@@ -2577,21 +2592,36 @@
kernel-livepatch-5_14_21-150500_13_30-rt-11-150500.2.1
+
+ kernel-livepatch-5_14_21-150500_13_35-rt-10-150500.11.8.1
+
kernel-livepatch-5_14_21-150500_13_35-rt-9-150500.11.8.1
kernel-livepatch-5_14_21-150500_13_38-rt-7-150500.11.6.1
+
+ kernel-livepatch-5_14_21-150500_13_38-rt-8-150500.11.6.1
+
kernel-livepatch-5_14_21-150500_13_47-rt-7-150500.11.6.1
+
+ kernel-livepatch-5_14_21-150500_13_47-rt-8-150500.11.6.1
+
kernel-livepatch-5_14_21-150500_13_52-rt-5-150500.11.8.1
+
+ kernel-livepatch-5_14_21-150500_13_52-rt-6-150500.11.8.1
+
kernel-livepatch-5_14_21-150500_13_55-rt-5-150500.11.6.1
+
+ kernel-livepatch-5_14_21-150500_13_55-rt-6-150500.11.6.1
+
kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1
@@ -2613,21 +2643,36 @@
kernel-livepatch-5_14_21-150500_55_44-default-11-150500.2.1
+
+ kernel-livepatch-5_14_21-150500_55_49-default-10-150500.11.8.1
+
kernel-livepatch-5_14_21-150500_55_49-default-9-150500.11.8.1
kernel-livepatch-5_14_21-150500_55_52-default-7-150500.11.6.1
+
+ kernel-livepatch-5_14_21-150500_55_52-default-8-150500.11.6.1
+
kernel-livepatch-5_14_21-150500_55_59-default-7-150500.11.10.1
+
+ kernel-livepatch-5_14_21-150500_55_59-default-8-150500.11.10.1
+
kernel-livepatch-5_14_21-150500_55_62-default-5-150500.11.6.1
+
+ kernel-livepatch-5_14_21-150500_55_62-default-6-150500.11.6.1
+
kernel-livepatch-5_14_21-150500_55_65-default-5-150500.11.6.1
+
+ kernel-livepatch-5_14_21-150500_55_65-default-6-150500.11.6.1
+
kernel-livepatch-5_14_21-150500_55_68-default-1-150500.11.3.1
@@ -2655,15 +2700,27 @@
kernel-livepatch-5_3_18-150200_24_183-default-8-150200.5.6.1
+
+ kernel-livepatch-5_3_18-150200_24_183-default-9-150200.5.6.1
+
kernel-livepatch-5_3_18-150200_24_188-default-7-150200.5.6.1
+
+ kernel-livepatch-5_3_18-150200_24_188-default-8-150200.5.6.1
+
kernel-livepatch-5_3_18-150200_24_191-default-6-150200.5.6.1
+
+ kernel-livepatch-5_3_18-150200_24_191-default-7-150200.5.6.1
+
kernel-livepatch-5_3_18-150200_24_194-default-3-150200.5.6.1
+
+ kernel-livepatch-5_3_18-150200_24_194-default-4-150200.5.6.1
+
kernel-livepatch-5_3_18-150200_24_197-default-1-150200.5.3.1
@@ -2688,15 +2745,27 @@
kernel-livepatch-5_3_18-150300_59_153-default-8-150300.7.6.1
+
+ kernel-livepatch-5_3_18-150300_59_153-default-9-150300.7.6.1
+
kernel-livepatch-5_3_18-150300_59_158-default-7-150300.7.6.1
+
+ kernel-livepatch-5_3_18-150300_59_158-default-8-150300.7.6.1
+
kernel-livepatch-5_3_18-150300_59_161-default-6-150300.7.6.1
+
+ kernel-livepatch-5_3_18-150300_59_161-default-7-150300.7.6.1
+
kernel-livepatch-5_3_18-150300_59_164-default-3-150300.7.6.1
+
+ kernel-livepatch-5_3_18-150300_59_164-default-4-150300.7.6.1
+
kernel-livepatch-5_3_18-150300_59_167-default-1-150300.7.3.1
@@ -2706,6 +2775,9 @@
kernel-livepatch-6_4_0-150600_21-default-5-150600.1.1
+
+ kernel-livepatch-6_4_0-150600_21-default-6-150600.4.10.1
+
kernel-livepatch-6_4_0-150600_23_7-default-1-150600.13.3.7
@@ -5988,6 +6060,78 @@
kernel-rt-5.14.21-150500.13.61.1 as a component of openSUSE Leap Micro 5.5
+
+ kernel-livepatch-5_3_18-150200_24_183-default-9-150200.5.6.1 as a component of SUSE Linux Enterprise Live Patching 15 SP2
+
+
+ kernel-livepatch-5_3_18-150200_24_188-default-8-150200.5.6.1 as a component of SUSE Linux Enterprise Live Patching 15 SP2
+
+
+ kernel-livepatch-5_3_18-150200_24_191-default-7-150200.5.6.1 as a component of SUSE Linux Enterprise Live Patching 15 SP2
+
+
+ kernel-livepatch-5_3_18-150200_24_194-default-4-150200.5.6.1 as a component of SUSE Linux Enterprise Live Patching 15 SP2
+
+
+ kernel-livepatch-5_3_18-150300_59_153-default-9-150300.7.6.1 as a component of SUSE Linux Enterprise Live Patching 15 SP3
+
+
+ kernel-livepatch-5_3_18-150300_59_158-default-8-150300.7.6.1 as a component of SUSE Linux Enterprise Live Patching 15 SP3
+
+
+ kernel-livepatch-5_3_18-150300_59_161-default-7-150300.7.6.1 as a component of SUSE Linux Enterprise Live Patching 15 SP3
+
+
+ kernel-livepatch-5_3_18-150300_59_164-default-4-150300.7.6.1 as a component of SUSE Linux Enterprise Live Patching 15 SP3
+
+
+ kernel-livepatch-5_14_21-150400_24_108-default-10-150400.9.8.1 as a component of SUSE Linux Enterprise Live Patching 15 SP4
+
+
+ kernel-livepatch-5_14_21-150400_24_111-default-8-150400.9.6.1 as a component of SUSE Linux Enterprise Live Patching 15 SP4
+
+
+ kernel-livepatch-5_14_21-150400_24_116-default-8-150400.9.8.1 as a component of SUSE Linux Enterprise Live Patching 15 SP4
+
+
+ kernel-livepatch-5_14_21-150400_24_119-default-7-150400.9.6.1 as a component of SUSE Linux Enterprise Live Patching 15 SP4
+
+
+ kernel-livepatch-5_14_21-150400_24_122-default-5-150400.9.6.1 as a component of SUSE Linux Enterprise Live Patching 15 SP4
+
+
+ kernel-livepatch-5_14_21-150500_13_35-rt-10-150500.11.8.1 as a component of SUSE Linux Enterprise Live Patching 15 SP5
+
+
+ kernel-livepatch-5_14_21-150500_13_38-rt-8-150500.11.6.1 as a component of SUSE Linux Enterprise Live Patching 15 SP5
+
+
+ kernel-livepatch-5_14_21-150500_13_47-rt-8-150500.11.6.1 as a component of SUSE Linux Enterprise Live Patching 15 SP5
+
+
+ kernel-livepatch-5_14_21-150500_13_52-rt-6-150500.11.8.1 as a component of SUSE Linux Enterprise Live Patching 15 SP5
+
+
+ kernel-livepatch-5_14_21-150500_13_55-rt-6-150500.11.6.1 as a component of SUSE Linux Enterprise Live Patching 15 SP5
+
+
+ kernel-livepatch-5_14_21-150500_55_49-default-10-150500.11.8.1 as a component of SUSE Linux Enterprise Live Patching 15 SP5
+
+
+ kernel-livepatch-5_14_21-150500_55_52-default-8-150500.11.6.1 as a component of SUSE Linux Enterprise Live Patching 15 SP5
+
+
+ kernel-livepatch-5_14_21-150500_55_59-default-8-150500.11.10.1 as a component of SUSE Linux Enterprise Live Patching 15 SP5
+
+
+ kernel-livepatch-5_14_21-150500_55_62-default-6-150500.11.6.1 as a component of SUSE Linux Enterprise Live Patching 15 SP5
+
+
+ kernel-livepatch-5_14_21-150500_55_65-default-6-150500.11.6.1 as a component of SUSE Linux Enterprise Live Patching 15 SP5
+
+
+ kernel-livepatch-6_4_0-150600_21-default-6-150600.4.10.1 as a component of SUSE Linux Enterprise Live Patching 15 SP6
+
cluster-md-kmp-default as a component of SUSE Linux Enterprise High Availability Extension 12 SP5
@@ -7223,6 +7367,32 @@
openSUSE Leap Micro 5.5:kernel-default-base-5.14.21-150500.55.73.1.150500.6.33.8
openSUSE Leap Micro 5.5:kernel-rt-5.14.21-150500.13.61.1
+
+ SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_183-default-9-150200.5.6.1
+ SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_188-default-8-150200.5.6.1
+ SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_191-default-7-150200.5.6.1
+ SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_194-default-4-150200.5.6.1
+ SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_153-default-9-150300.7.6.1
+ SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_158-default-8-150300.7.6.1
+ SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_161-default-7-150300.7.6.1
+ SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_164-default-4-150300.7.6.1
+ SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_108-default-10-150400.9.8.1
+ SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_111-default-8-150400.9.6.1
+ SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_116-default-8-150400.9.8.1
+ SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_119-default-7-150400.9.6.1
+ SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_122-default-5-150400.9.6.1
+ SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_35-rt-10-150500.11.8.1
+ SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_38-rt-8-150500.11.6.1
+ SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_47-rt-8-150500.11.6.1
+ SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_52-rt-6-150500.11.8.1
+ SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_55-rt-6-150500.11.6.1
+ SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_49-default-10-150500.11.8.1
+ SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_52-default-8-150500.11.6.1
+ SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_59-default-8-150500.11.10.1
+ SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-6-150500.11.6.1
+ SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_65-default-6-150500.11.6.1
+ SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_21-default-6-150600.4.10.1
+
SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default
SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default
skipping CVE-2024-35860 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-35859 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-35858 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-35857 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-35856 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-35855 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-35854 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-35853 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-35852 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-35851 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-35850 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-35849 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-35848 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-35847 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-35846 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-35845 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-35844 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-35843 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-35842 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-35841 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-35840 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-35839 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-35838 as CVE page is older than CVRF-CVE file.
--- /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2024-35837.xml 2024-10-16 01:23:48.515846000 +0200
+++ /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2024-35837.xml.new 2024-10-29 01:17:56.519876000 +0100
@@ -14,13 +14,13 @@
1
- 54
- 2024-10-15T23:23:48Z
+ 55
+ 2024-10-29T00:17:56Z
current
2024-05-20T23:09:52Z
- 2024-10-15T23:23:48Z
+ 2024-10-29T00:17:56Z
cve-database/bin/generate-cvrf-cve.pl
2020-12-27T01:00:00Z
@@ -170,6 +170,21 @@
Image SLES12-SP5-EC2-BYOS
+
+
+ Image SLES12-SP5-GCE-BYOS
+
+
+
+
+ Image SLES12-SP5-GCE-SAP-BYOS
+
+
+
+
+ Image SLES12-SP5-GCE-SAP-On-Demand
+
+
Image SLES12-SP5-SAP-Azure-LI-BYOS-Production
@@ -2207,6 +2222,39 @@
kernel-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-EC2-BYOS
+
+ kernel-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-BYOS
+
+
+ cluster-md-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ dlm-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ gfs2-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ kernel-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ ocfs2-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ cluster-md-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
+
+ dlm-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
+
+ gfs2-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
+
+ kernel-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
+
+ ocfs2-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
cluster-md-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-SAP-Azure-LI-BYOS-Production
@@ -4463,6 +4511,17 @@
Image SLES12-SP5-Azure-SAP-BYOS:kernel-default-4.12.14-122.225.1
Image SLES12-SP5-Azure-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.225.1
Image SLES12-SP5-EC2-BYOS:kernel-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-BYOS:kernel-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-BYOS:cluster-md-kmp-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-BYOS:dlm-kmp-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-BYOS:gfs2-kmp-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-BYOS:kernel-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:cluster-md-kmp-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:dlm-kmp-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:gfs2-kmp-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:kernel-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:ocfs2-kmp-default-4.12.14-122.225.1
Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:cluster-md-kmp-default-4.12.14-122.225.1
Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:dlm-kmp-default-4.12.14-122.225.1
Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:gfs2-kmp-default-4.12.14-122.225.1
skipping CVE-2024-35836 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-35834 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-35833 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-35832 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-35831 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-35830 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-35829 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-35827 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-35826 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-35825 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-35824 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-35823 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-35822 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-35821 as CVE page is older than CVRF-CVE file.
--- /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2024-35819.xml 2024-10-22 01:33:01.756684000 +0200
+++ /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2024-35819.xml.new 2024-10-29 01:18:00.713209000 +0100
@@ -14,13 +14,13 @@
1
- 60
- 2024-10-21T23:33:01Z
+ 61
+ 2024-10-29T00:17:58Z
current
2024-05-20T23:09:58Z
- 2024-10-21T23:33:01Z
+ 2024-10-29T00:17:58Z
cve-database/bin/generate-cvrf-cve.pl
2020-12-27T01:00:00Z
@@ -2317,41 +2317,41 @@
ocfs2-kmp-default-4.12.14-122.222.1 as a component of Image SLES12-SP5-EC2-SAP-On-Demand
-
- kernel-default-4.12.14-122.222.1 as a component of Image SLES12-SP5-GCE-BYOS
+
+ kernel-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-BYOS
kernel-default-4.12.14-122.222.1 as a component of Image SLES12-SP5-GCE-On-Demand
-
- cluster-md-kmp-default-4.12.14-122.222.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+ cluster-md-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
-
- dlm-kmp-default-4.12.14-122.222.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+ dlm-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
-
- gfs2-kmp-default-4.12.14-122.222.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+ gfs2-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
-
- kernel-default-4.12.14-122.222.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+ kernel-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
-
- ocfs2-kmp-default-4.12.14-122.222.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+ ocfs2-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
-
- cluster-md-kmp-default-4.12.14-122.222.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
+ cluster-md-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
-
- dlm-kmp-default-4.12.14-122.222.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
+ dlm-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
-
- gfs2-kmp-default-4.12.14-122.222.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
+ gfs2-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
-
- kernel-default-4.12.14-122.222.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
+ kernel-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
-
- ocfs2-kmp-default-4.12.14-122.222.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
+ ocfs2-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
cluster-md-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-SAP-Azure-LI-BYOS-Production
@@ -4626,18 +4626,18 @@
Image SLES12-SP5-EC2-SAP-On-Demand:gfs2-kmp-default-4.12.14-122.222.1
Image SLES12-SP5-EC2-SAP-On-Demand:kernel-default-4.12.14-122.222.1
Image SLES12-SP5-EC2-SAP-On-Demand:ocfs2-kmp-default-4.12.14-122.222.1
- Image SLES12-SP5-GCE-BYOS:kernel-default-4.12.14-122.222.1
+ Image SLES12-SP5-GCE-BYOS:kernel-default-4.12.14-122.225.1
Image SLES12-SP5-GCE-On-Demand:kernel-default-4.12.14-122.222.1
- Image SLES12-SP5-GCE-SAP-BYOS:cluster-md-kmp-default-4.12.14-122.222.1
- Image SLES12-SP5-GCE-SAP-BYOS:dlm-kmp-default-4.12.14-122.222.1
- Image SLES12-SP5-GCE-SAP-BYOS:gfs2-kmp-default-4.12.14-122.222.1
- Image SLES12-SP5-GCE-SAP-BYOS:kernel-default-4.12.14-122.222.1
- Image SLES12-SP5-GCE-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.222.1
- Image SLES12-SP5-GCE-SAP-On-Demand:cluster-md-kmp-default-4.12.14-122.222.1
- Image SLES12-SP5-GCE-SAP-On-Demand:dlm-kmp-default-4.12.14-122.222.1
- Image SLES12-SP5-GCE-SAP-On-Demand:gfs2-kmp-default-4.12.14-122.222.1
- Image SLES12-SP5-GCE-SAP-On-Demand:kernel-default-4.12.14-122.222.1
- Image SLES12-SP5-GCE-SAP-On-Demand:ocfs2-kmp-default-4.12.14-122.222.1
+ Image SLES12-SP5-GCE-SAP-BYOS:cluster-md-kmp-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-BYOS:dlm-kmp-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-BYOS:gfs2-kmp-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-BYOS:kernel-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:cluster-md-kmp-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:dlm-kmp-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:gfs2-kmp-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:kernel-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:ocfs2-kmp-default-4.12.14-122.225.1
Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:cluster-md-kmp-default-4.12.14-122.225.1
Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:dlm-kmp-default-4.12.14-122.225.1
Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:gfs2-kmp-default-4.12.14-122.225.1
no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2024-35817
skipping CVE-2024-35818 as CVE page is older than CVRF-CVE file.
--- /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2024-35817.xml 2024-10-22 01:33:04.121083000 +0200
+++ /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2024-35817.xml.new 2024-10-29 01:18:02.244071000 +0100
@@ -14,13 +14,13 @@
1
- 54
- 2024-10-21T23:33:03Z
+ 55
+ 2024-10-29T00:18:00Z
current
2024-05-20T23:09:58Z
- 2024-10-21T23:33:03Z
+ 2024-10-29T00:18:00Z
cve-database/bin/generate-cvrf-cve.pl
2020-12-27T01:00:00Z
@@ -2201,18 +2201,30 @@
kernel-livepatch-5_14_21-150400_24_103-default-9-150400.2.2
+
+ kernel-livepatch-5_14_21-150400_24_108-default-10-150400.9.8.1
+
kernel-livepatch-5_14_21-150400_24_108-default-9-150400.9.8.1
kernel-livepatch-5_14_21-150400_24_111-default-7-150400.9.6.1
+
+ kernel-livepatch-5_14_21-150400_24_111-default-8-150400.9.6.1
+
kernel-livepatch-5_14_21-150400_24_116-default-7-150400.9.8.1
+
+ kernel-livepatch-5_14_21-150400_24_116-default-8-150400.9.8.1
+
kernel-livepatch-5_14_21-150400_24_119-default-6-150400.9.6.1
+
+ kernel-livepatch-5_14_21-150400_24_119-default-7-150400.9.6.1
+
kernel-livepatch-5_14_21-150400_24_122-default-1-150400.9.3.2
@@ -2246,12 +2258,18 @@
kernel-livepatch-5_14_21-150500_13_30-rt-10-150500.2.1
+
+ kernel-livepatch-5_14_21-150500_13_35-rt-10-150500.11.8.1
+
kernel-livepatch-5_14_21-150500_13_35-rt-9-150500.11.8.1
kernel-livepatch-5_14_21-150500_13_38-rt-7-150500.11.6.1
+
+ kernel-livepatch-5_14_21-150500_13_38-rt-8-150500.11.6.1
+
kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1
@@ -2273,12 +2291,18 @@
kernel-livepatch-5_14_21-150500_55_44-default-10-150500.2.2
+
+ kernel-livepatch-5_14_21-150500_55_49-default-10-150500.11.8.1
+
kernel-livepatch-5_14_21-150500_55_49-default-9-150500.11.8.1
kernel-livepatch-5_14_21-150500_55_52-default-7-150500.11.6.1
+
+ kernel-livepatch-5_14_21-150500_55_52-default-8-150500.11.6.1
+
kernel-livepatch-5_14_21-150500_55_68-default-1-150500.11.3.1
@@ -2288,6 +2312,9 @@
kernel-livepatch-6_4_0-150600_21-default-5-150600.1.1
+
+ kernel-livepatch-6_4_0-150600_21-default-6-150600.4.10.1
+
kernel-livepatch-6_4_0-150600_23_7-default-1-150600.13.3.7
@@ -4925,6 +4952,33 @@
klp-build-0~20240902.c95cc9e-1.1 as a component of openSUSE Tumbleweed
+
+ kernel-livepatch-5_14_21-150400_24_108-default-10-150400.9.8.1 as a component of SUSE Linux Enterprise Live Patching 15 SP4
+
+
+ kernel-livepatch-5_14_21-150400_24_111-default-8-150400.9.6.1 as a component of SUSE Linux Enterprise Live Patching 15 SP4
+
+
+ kernel-livepatch-5_14_21-150400_24_116-default-8-150400.9.8.1 as a component of SUSE Linux Enterprise Live Patching 15 SP4
+
+
+ kernel-livepatch-5_14_21-150400_24_119-default-7-150400.9.6.1 as a component of SUSE Linux Enterprise Live Patching 15 SP4
+
+
+ kernel-livepatch-5_14_21-150500_13_35-rt-10-150500.11.8.1 as a component of SUSE Linux Enterprise Live Patching 15 SP5
+
+
+ kernel-livepatch-5_14_21-150500_13_38-rt-8-150500.11.6.1 as a component of SUSE Linux Enterprise Live Patching 15 SP5
+
+
+ kernel-livepatch-5_14_21-150500_55_49-default-10-150500.11.8.1 as a component of SUSE Linux Enterprise Live Patching 15 SP5
+
+
+ kernel-livepatch-5_14_21-150500_55_52-default-8-150500.11.6.1 as a component of SUSE Linux Enterprise Live Patching 15 SP5
+
+
+ kernel-livepatch-6_4_0-150600_21-default-6-150600.4.10.1 as a component of SUSE Linux Enterprise Live Patching 15 SP6
+
kernel-default as a component of SUSE Enterprise Storage 7.1
@@ -6080,6 +6134,17 @@
openSUSE Leap Micro 5.5:kernel-rt-5.14.21-150500.13.58.1
openSUSE Tumbleweed:klp-build-0~20240902.c95cc9e-1.1
+
+ SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_108-default-10-150400.9.8.1
+ SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_111-default-8-150400.9.6.1
+ SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_116-default-8-150400.9.8.1
+ SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_119-default-7-150400.9.6.1
+ SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_35-rt-10-150500.11.8.1
+ SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_38-rt-8-150500.11.6.1
+ SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_49-default-10-150500.11.8.1
+ SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_52-default-8-150500.11.6.1
+ SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_21-default-6-150600.4.10.1
+
SUSE Enterprise Storage 7.1:kernel-default
SUSE Enterprise Storage 7.1:kernel-default-devel
skipping CVE-2024-35816 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-35815 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-35814 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-35813 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-35811 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-35810 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-35809 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-35808 as CVE page is older than CVRF-CVE file.
--- /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2024-35806.xml 2024-10-16 01:23:59.665749000 +0200
+++ /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2024-35806.xml.new 2024-10-29 01:18:04.616952000 +0100
@@ -14,13 +14,13 @@
1
- 53
- 2024-10-15T23:23:59Z
+ 54
+ 2024-10-29T00:18:04Z
current
2024-05-20T23:10:01Z
- 2024-10-15T23:23:59Z
+ 2024-10-29T00:18:04Z
cve-database/bin/generate-cvrf-cve.pl
2020-12-27T01:00:00Z
@@ -171,6 +171,21 @@
Image SLES12-SP5-EC2-BYOS
+
+
+ Image SLES12-SP5-GCE-BYOS
+
+
+
+
+ Image SLES12-SP5-GCE-SAP-BYOS
+
+
+
+
+ Image SLES12-SP5-GCE-SAP-On-Demand
+
+
Image SLES12-SP5-SAP-Azure-LI-BYOS-Production
@@ -2181,6 +2196,39 @@
kernel-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-EC2-BYOS
+
+ kernel-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-BYOS
+
+
+ cluster-md-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ dlm-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ gfs2-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ kernel-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ ocfs2-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ cluster-md-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
+
+ dlm-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
+
+ gfs2-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
+
+ kernel-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
+
+ ocfs2-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
cluster-md-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-SAP-Azure-LI-BYOS-Production
@@ -4399,6 +4447,17 @@
Image SLES12-SP5-Azure-SAP-BYOS:kernel-default-4.12.14-122.225.1
Image SLES12-SP5-Azure-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.225.1
Image SLES12-SP5-EC2-BYOS:kernel-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-BYOS:kernel-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-BYOS:cluster-md-kmp-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-BYOS:dlm-kmp-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-BYOS:gfs2-kmp-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-BYOS:kernel-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:cluster-md-kmp-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:dlm-kmp-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:gfs2-kmp-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:kernel-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:ocfs2-kmp-default-4.12.14-122.225.1
Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:cluster-md-kmp-default-4.12.14-122.225.1
Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:dlm-kmp-default-4.12.14-122.225.1
Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:gfs2-kmp-default-4.12.14-122.225.1
skipping CVE-2024-35804 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-35803 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-35802 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-35801 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-35800 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-35799 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-35798 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-35797 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-35796 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-35795 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-35794 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-35793 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-35792 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-35790 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-35789 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-35788 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-35787 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-35786 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-35785 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-35784 as CVE page is older than CVRF-CVE file.
no cpe found for SUSE Package Hub 15 SP5 in CVE-2024-35434
no cpe found for SUSE Package Hub 15 SP6 in CVE-2024-35434
skipping CVE-2024-35329 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-35328 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-35326 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-35325 as CVE page is older than CVRF-CVE file.
no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2024-35255
no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2024-35242
no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2024-35241
skipping CVE-2024-35235 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-35221 as CVE page is older than CVRF-CVE file.
no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2024-35195
--- /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2024-35195.xml 2024-10-14 01:21:49.233723000 +0200
+++ /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2024-35195.xml.new 2024-10-29 01:18:10.469127000 +0100
@@ -14,13 +14,13 @@
1
- 58
- 2024-10-13T23:21:48Z
+ 59
+ 2024-10-29T00:18:10Z
current
2024-05-22T23:09:50Z
- 2024-10-13T23:21:48Z
+ 2024-10-29T00:18:10Z
cve-database/bin/generate-cvrf-cve.pl
2020-12-27T01:00:00Z
@@ -1927,14 +1927,14 @@
python-requests-2.24.0-8.17.1 as a component of Image SLES12-SP5-EC2-SAP-On-Demand
-
- python-requests-2.24.0-8.17.1 as a component of Image SLES12-SP5-GCE-BYOS
+
+ python-requests-2.24.0-8.20.1 as a component of Image SLES12-SP5-GCE-BYOS
-
- python-requests-2.24.0-8.17.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+ python-requests-2.24.0-8.20.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
-
- python-requests-2.24.0-8.17.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
+ python-requests-2.24.0-8.20.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
python-requests-2.24.0-8.17.1 as a component of Image SLES12-SP5-SAP-Azure-LI-BYOS-Production
@@ -3129,9 +3129,9 @@
Image SLES12-SP5-EC2-On-Demand:python-requests-2.24.0-8.17.1
Image SLES12-SP5-EC2-SAP-BYOS:python-requests-2.24.0-8.17.1
Image SLES12-SP5-EC2-SAP-On-Demand:python-requests-2.24.0-8.17.1
- Image SLES12-SP5-GCE-BYOS:python-requests-2.24.0-8.17.1
- Image SLES12-SP5-GCE-SAP-BYOS:python-requests-2.24.0-8.17.1
- Image SLES12-SP5-GCE-SAP-On-Demand:python-requests-2.24.0-8.17.1
+ Image SLES12-SP5-GCE-BYOS:python-requests-2.24.0-8.20.1
+ Image SLES12-SP5-GCE-SAP-BYOS:python-requests-2.24.0-8.20.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:python-requests-2.24.0-8.20.1
Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:python-requests-2.24.0-8.17.1
Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production:python-requests-2.24.0-8.17.1
Image SLES15-SP3-BYOS-Azure:python3-requests-2.25.1-150300.3.9.1
no cpe found for SUSE Package Hub 15 SP5 in CVE-2024-35192
no cpe found for SUSE Package Hub 15 SP6 in CVE-2024-35192
skipping CVE-2024-35176 as CVE page is older than CVRF-CVE file.
no cpe found for SUSE Package Hub 15 SP5 in CVE-2024-34703
no cpe found for SUSE Package Hub 15 SP6 in CVE-2024-34703
skipping CVE-2024-34777 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-34750 as CVE page is older than CVRF-CVE file.
no cpe found for SUSE Package Hub 15 SP5 in CVE-2024-34702
no cpe found for SUSE Package Hub 15 SP6 in CVE-2024-34702
skipping CVE-2024-34580 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-34459 as CVE page is older than CVRF-CVE file.
no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2024-34397
--- /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2024-34397.xml 2024-10-20 01:20:58.035599000 +0200
+++ /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2024-34397.xml.new 2024-10-29 01:18:18.341246000 +0100
@@ -14,13 +14,13 @@
1
- 72
- 2024-10-19T23:20:57Z
+ 73
+ 2024-10-29T00:18:17Z
current
2024-05-08T23:09:06Z
- 2024-10-19T23:20:57Z
+ 2024-10-29T00:18:17Z
cve-database/bin/generate-cvrf-cve.pl
2020-12-27T01:00:00Z
@@ -2931,20 +2931,20 @@
libgthread-2_0-0-2.48.2-12.37.1 as a component of Image SLES12-SP5-EC2-SAP-On-Demand
-
- glib2-tools-2.48.2-12.37.1 as a component of Image SLES12-SP5-GCE-BYOS
+
+ glib2-tools-2.48.2-12.40.1 as a component of Image SLES12-SP5-GCE-BYOS
-
- libgio-2_0-0-2.48.2-12.37.1 as a component of Image SLES12-SP5-GCE-BYOS
+
+ libgio-2_0-0-2.48.2-12.40.1 as a component of Image SLES12-SP5-GCE-BYOS
-
- libglib-2_0-0-2.48.2-12.37.1 as a component of Image SLES12-SP5-GCE-BYOS
+
+ libglib-2_0-0-2.48.2-12.40.1 as a component of Image SLES12-SP5-GCE-BYOS
-
- libgmodule-2_0-0-2.48.2-12.37.1 as a component of Image SLES12-SP5-GCE-BYOS
+
+ libgmodule-2_0-0-2.48.2-12.40.1 as a component of Image SLES12-SP5-GCE-BYOS
-
- libgobject-2_0-0-2.48.2-12.37.1 as a component of Image SLES12-SP5-GCE-BYOS
+
+ libgobject-2_0-0-2.48.2-12.40.1 as a component of Image SLES12-SP5-GCE-BYOS
glib2-tools-2.48.2-12.37.1 as a component of Image SLES12-SP5-GCE-On-Demand
@@ -2961,41 +2961,41 @@
libgobject-2_0-0-2.48.2-12.37.1 as a component of Image SLES12-SP5-GCE-On-Demand
-
- glib2-tools-2.48.2-12.37.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+ glib2-tools-2.48.2-12.40.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
-
- libgio-2_0-0-2.48.2-12.37.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+ libgio-2_0-0-2.48.2-12.40.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
-
- libglib-2_0-0-2.48.2-12.37.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+ libglib-2_0-0-2.48.2-12.40.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
-
- libgmodule-2_0-0-2.48.2-12.37.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+ libgmodule-2_0-0-2.48.2-12.40.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
-
- libgobject-2_0-0-2.48.2-12.37.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+ libgobject-2_0-0-2.48.2-12.40.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
-
- libgthread-2_0-0-2.48.2-12.37.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+ libgthread-2_0-0-2.48.2-12.40.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
-
- glib2-tools-2.48.2-12.37.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
+ glib2-tools-2.48.2-12.40.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
-
- libgio-2_0-0-2.48.2-12.37.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
+ libgio-2_0-0-2.48.2-12.40.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
-
- libglib-2_0-0-2.48.2-12.37.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
+ libglib-2_0-0-2.48.2-12.40.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
-
- libgmodule-2_0-0-2.48.2-12.37.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
+ libgmodule-2_0-0-2.48.2-12.40.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
-
- libgobject-2_0-0-2.48.2-12.37.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
+ libgobject-2_0-0-2.48.2-12.40.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
-
- libgthread-2_0-0-2.48.2-12.37.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
+ libgthread-2_0-0-2.48.2-12.40.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
glib2-tools-2.48.2-12.37.1 as a component of Image SLES12-SP5-SAP-Azure-LI-BYOS-Production
@@ -7254,42 +7254,6 @@
glib2 as a component of SUSE Linux Enterprise Server for SAP Applications 12 SP4
-
- glib2-lang as a component of SUSE Linux Enterprise Server for SAP Applications 12 SP5
-
-
- glib2-tools as a component of SUSE Linux Enterprise Server for SAP Applications 12 SP5
-
-
- libgio-2_0-0 as a component of SUSE Linux Enterprise Server for SAP Applications 12 SP5
-
-
- libgio-2_0-0-32bit as a component of SUSE Linux Enterprise Server for SAP Applications 12 SP5
-
-
- libglib-2_0-0 as a component of SUSE Linux Enterprise Server for SAP Applications 12 SP5
-
-
- libglib-2_0-0-32bit as a component of SUSE Linux Enterprise Server for SAP Applications 12 SP5
-
-
- libgmodule-2_0-0 as a component of SUSE Linux Enterprise Server for SAP Applications 12 SP5
-
-
- libgmodule-2_0-0-32bit as a component of SUSE Linux Enterprise Server for SAP Applications 12 SP5
-
-
- libgobject-2_0-0 as a component of SUSE Linux Enterprise Server for SAP Applications 12 SP5
-
-
- libgobject-2_0-0-32bit as a component of SUSE Linux Enterprise Server for SAP Applications 12 SP5
-
-
- libgthread-2_0-0 as a component of SUSE Linux Enterprise Server for SAP Applications 12 SP5
-
-
- libgthread-2_0-0-32bit as a component of SUSE Linux Enterprise Server for SAP Applications 12 SP5
-
glib2 as a component of SUSE Linux Enterprise Server for SAP Applications 12 SP5
@@ -7841,28 +7805,28 @@
Image SLES12-SP5-EC2-SAP-On-Demand:libgmodule-2_0-0-2.48.2-12.37.1
Image SLES12-SP5-EC2-SAP-On-Demand:libgobject-2_0-0-2.48.2-12.37.1
Image SLES12-SP5-EC2-SAP-On-Demand:libgthread-2_0-0-2.48.2-12.37.1
- Image SLES12-SP5-GCE-BYOS:glib2-tools-2.48.2-12.37.1
- Image SLES12-SP5-GCE-BYOS:libgio-2_0-0-2.48.2-12.37.1
- Image SLES12-SP5-GCE-BYOS:libglib-2_0-0-2.48.2-12.37.1
- Image SLES12-SP5-GCE-BYOS:libgmodule-2_0-0-2.48.2-12.37.1
- Image SLES12-SP5-GCE-BYOS:libgobject-2_0-0-2.48.2-12.37.1
+ Image SLES12-SP5-GCE-BYOS:glib2-tools-2.48.2-12.40.1
+ Image SLES12-SP5-GCE-BYOS:libgio-2_0-0-2.48.2-12.40.1
+ Image SLES12-SP5-GCE-BYOS:libglib-2_0-0-2.48.2-12.40.1
+ Image SLES12-SP5-GCE-BYOS:libgmodule-2_0-0-2.48.2-12.40.1
+ Image SLES12-SP5-GCE-BYOS:libgobject-2_0-0-2.48.2-12.40.1
Image SLES12-SP5-GCE-On-Demand:glib2-tools-2.48.2-12.37.1
Image SLES12-SP5-GCE-On-Demand:libgio-2_0-0-2.48.2-12.37.1
Image SLES12-SP5-GCE-On-Demand:libglib-2_0-0-2.48.2-12.37.1
Image SLES12-SP5-GCE-On-Demand:libgmodule-2_0-0-2.48.2-12.37.1
Image SLES12-SP5-GCE-On-Demand:libgobject-2_0-0-2.48.2-12.37.1
- Image SLES12-SP5-GCE-SAP-BYOS:glib2-tools-2.48.2-12.37.1
- Image SLES12-SP5-GCE-SAP-BYOS:libgio-2_0-0-2.48.2-12.37.1
- Image SLES12-SP5-GCE-SAP-BYOS:libglib-2_0-0-2.48.2-12.37.1
- Image SLES12-SP5-GCE-SAP-BYOS:libgmodule-2_0-0-2.48.2-12.37.1
- Image SLES12-SP5-GCE-SAP-BYOS:libgobject-2_0-0-2.48.2-12.37.1
- Image SLES12-SP5-GCE-SAP-BYOS:libgthread-2_0-0-2.48.2-12.37.1
- Image SLES12-SP5-GCE-SAP-On-Demand:glib2-tools-2.48.2-12.37.1
- Image SLES12-SP5-GCE-SAP-On-Demand:libgio-2_0-0-2.48.2-12.37.1
- Image SLES12-SP5-GCE-SAP-On-Demand:libglib-2_0-0-2.48.2-12.37.1
- Image SLES12-SP5-GCE-SAP-On-Demand:libgmodule-2_0-0-2.48.2-12.37.1
- Image SLES12-SP5-GCE-SAP-On-Demand:libgobject-2_0-0-2.48.2-12.37.1
- Image SLES12-SP5-GCE-SAP-On-Demand:libgthread-2_0-0-2.48.2-12.37.1
+ Image SLES12-SP5-GCE-SAP-BYOS:glib2-tools-2.48.2-12.40.1
+ Image SLES12-SP5-GCE-SAP-BYOS:libgio-2_0-0-2.48.2-12.40.1
+ Image SLES12-SP5-GCE-SAP-BYOS:libglib-2_0-0-2.48.2-12.40.1
+ Image SLES12-SP5-GCE-SAP-BYOS:libgmodule-2_0-0-2.48.2-12.40.1
+ Image SLES12-SP5-GCE-SAP-BYOS:libgobject-2_0-0-2.48.2-12.40.1
+ Image SLES12-SP5-GCE-SAP-BYOS:libgthread-2_0-0-2.48.2-12.40.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:glib2-tools-2.48.2-12.40.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:libgio-2_0-0-2.48.2-12.40.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:libglib-2_0-0-2.48.2-12.40.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:libgmodule-2_0-0-2.48.2-12.40.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:libgobject-2_0-0-2.48.2-12.40.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:libgthread-2_0-0-2.48.2-12.40.1
Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:glib2-tools-2.48.2-12.37.1
Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:libgio-2_0-0-2.48.2-12.37.1
Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:libglib-2_0-0-2.48.2-12.37.1
no cpe found for SUSE Package Hub 15 SP5 in CVE-2024-34340
no cpe found for SUSE Package Hub 15 SP6 in CVE-2024-34340
no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2024-34158
--- /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2024-34158.xml 2024-10-27 01:14:14.492144000 +0200
+++ /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2024-34158.xml.new 2024-10-29 01:18:20.070228000 +0100
@@ -14,13 +14,13 @@
1
- 17
- 2024-10-26T23:14:14Z
+ 18
+ 2024-10-29T00:18:19Z
current
2024-09-05T23:16:37Z
- 2024-10-26T23:14:14Z
+ 2024-10-29T00:18:19Z
cve-database/bin/generate-cvrf-cve.pl
2020-12-27T01:00:00Z
@@ -300,6 +300,24 @@
go1.22-libstd-1.22.7-1.1
+
+ go1.22-openssl-1.22.7.1-150000.1.3.1
+
+
+ go1.22-openssl-1.22.7.1-150600.13.3.1
+
+
+ go1.22-openssl-doc-1.22.7.1-150000.1.3.1
+
+
+ go1.22-openssl-doc-1.22.7.1-150600.13.3.1
+
+
+ go1.22-openssl-race-1.22.7.1-150000.1.3.1
+
+
+ go1.22-openssl-race-1.22.7.1-150600.13.3.1
+
go1.22-race-1.22.7-1.1
@@ -327,6 +345,24 @@
go1.23-libstd-1.23.1-1.1
+
+ go1.23-openssl-1.23.2.2-150000.1.3.1
+
+
+ go1.23-openssl-1.23.2.2-150600.13.3.1
+
+
+ go1.23-openssl-doc-1.23.2.2-150000.1.3.1
+
+
+ go1.23-openssl-doc-1.23.2.2-150600.13.3.1
+
+
+ go1.23-openssl-race-1.23.2.2-150000.1.3.1
+
+
+ go1.23-openssl-race-1.23.2.2-150600.13.3.1
+
go1.23-race-1.23.1-1.1
@@ -1365,6 +1401,78 @@
go1.23-race-1.23.1-1.1 as a component of openSUSE Tumbleweed
+
+ go1.22-openssl-1.22.7.1-150000.1.3.1 as a component of SUSE Linux Enterprise Module for Development Tools 15 SP5
+
+
+ go1.22-openssl-doc-1.22.7.1-150000.1.3.1 as a component of SUSE Linux Enterprise Module for Development Tools 15 SP5
+
+
+ go1.22-openssl-race-1.22.7.1-150000.1.3.1 as a component of SUSE Linux Enterprise Module for Development Tools 15 SP5
+
+
+ go1.23-openssl-1.23.2.2-150000.1.3.1 as a component of SUSE Linux Enterprise Module for Development Tools 15 SP5
+
+
+ go1.23-openssl-doc-1.23.2.2-150000.1.3.1 as a component of SUSE Linux Enterprise Module for Development Tools 15 SP5
+
+
+ go1.23-openssl-race-1.23.2.2-150000.1.3.1 as a component of SUSE Linux Enterprise Module for Development Tools 15 SP5
+
+
+ go1.22-openssl-1.22.7.1-150600.13.3.1 as a component of SUSE Linux Enterprise Module for Development Tools 15 SP6
+
+
+ go1.22-openssl-doc-1.22.7.1-150600.13.3.1 as a component of SUSE Linux Enterprise Module for Development Tools 15 SP6
+
+
+ go1.22-openssl-race-1.22.7.1-150600.13.3.1 as a component of SUSE Linux Enterprise Module for Development Tools 15 SP6
+
+
+ go1.23-openssl-1.23.2.2-150600.13.3.1 as a component of SUSE Linux Enterprise Module for Development Tools 15 SP6
+
+
+ go1.23-openssl-doc-1.23.2.2-150600.13.3.1 as a component of SUSE Linux Enterprise Module for Development Tools 15 SP6
+
+
+ go1.23-openssl-race-1.23.2.2-150600.13.3.1 as a component of SUSE Linux Enterprise Module for Development Tools 15 SP6
+
+
+ go1.22-openssl-1.22.7.1-150000.1.3.1 as a component of openSUSE Leap 15.5
+
+
+ go1.22-openssl-doc-1.22.7.1-150000.1.3.1 as a component of openSUSE Leap 15.5
+
+
+ go1.22-openssl-race-1.22.7.1-150000.1.3.1 as a component of openSUSE Leap 15.5
+
+
+ go1.23-openssl-1.23.2.2-150000.1.3.1 as a component of openSUSE Leap 15.5
+
+
+ go1.23-openssl-doc-1.23.2.2-150000.1.3.1 as a component of openSUSE Leap 15.5
+
+
+ go1.23-openssl-race-1.23.2.2-150000.1.3.1 as a component of openSUSE Leap 15.5
+
+
+ go1.22-openssl-1.22.7.1-150600.13.3.1 as a component of openSUSE Leap 15.6
+
+
+ go1.22-openssl-doc-1.22.7.1-150600.13.3.1 as a component of openSUSE Leap 15.6
+
+
+ go1.22-openssl-race-1.22.7.1-150600.13.3.1 as a component of openSUSE Leap 15.6
+
+
+ go1.23-openssl-1.23.2.2-150600.13.3.1 as a component of openSUSE Leap 15.6
+
+
+ go1.23-openssl-doc-1.23.2.2-150600.13.3.1 as a component of openSUSE Leap 15.6
+
+
+ go1.23-openssl-race-1.23.2.2-150600.13.3.1 as a component of openSUSE Leap 15.6
+
@@ -1622,6 +1730,32 @@
openSUSE Tumbleweed:go1.23-libstd-1.23.1-1.1
openSUSE Tumbleweed:go1.23-race-1.23.1-1.1
+
+ SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.22-openssl-1.22.7.1-150000.1.3.1
+ SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.22-openssl-doc-1.22.7.1-150000.1.3.1
+ SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.22-openssl-race-1.22.7.1-150000.1.3.1
+ SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.23-openssl-1.23.2.2-150000.1.3.1
+ SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.23-openssl-doc-1.23.2.2-150000.1.3.1
+ SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.23-openssl-race-1.23.2.2-150000.1.3.1
+ SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.22-openssl-1.22.7.1-150600.13.3.1
+ SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.22-openssl-doc-1.22.7.1-150600.13.3.1
+ SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.22-openssl-race-1.22.7.1-150600.13.3.1
+ SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.23-openssl-1.23.2.2-150600.13.3.1
+ SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.23-openssl-doc-1.23.2.2-150600.13.3.1
+ SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.23-openssl-race-1.23.2.2-150600.13.3.1
+ openSUSE Leap 15.5:go1.22-openssl-1.22.7.1-150000.1.3.1
+ openSUSE Leap 15.5:go1.22-openssl-doc-1.22.7.1-150000.1.3.1
+ openSUSE Leap 15.5:go1.22-openssl-race-1.22.7.1-150000.1.3.1
+ openSUSE Leap 15.5:go1.23-openssl-1.23.2.2-150000.1.3.1
+ openSUSE Leap 15.5:go1.23-openssl-doc-1.23.2.2-150000.1.3.1
+ openSUSE Leap 15.5:go1.23-openssl-race-1.23.2.2-150000.1.3.1
+ openSUSE Leap 15.6:go1.22-openssl-1.22.7.1-150600.13.3.1
+ openSUSE Leap 15.6:go1.22-openssl-doc-1.22.7.1-150600.13.3.1
+ openSUSE Leap 15.6:go1.22-openssl-race-1.22.7.1-150600.13.3.1
+ openSUSE Leap 15.6:go1.23-openssl-1.23.2.2-150600.13.3.1
+ openSUSE Leap 15.6:go1.23-openssl-doc-1.23.2.2-150600.13.3.1
+ openSUSE Leap 15.6:go1.23-openssl-race-1.23.2.2-150600.13.3.1
+
no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2024-34156
--- /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2024-34156.xml 2024-10-27 01:14:15.057206000 +0200
+++ /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2024-34156.xml.new 2024-10-29 01:18:20.753093000 +0100
@@ -14,13 +14,13 @@
1
- 20
- 2024-10-26T23:14:14Z
+ 21
+ 2024-10-29T00:18:20Z
current
2024-09-05T23:16:37Z
- 2024-10-26T23:14:14Z
+ 2024-10-29T00:18:20Z
cve-database/bin/generate-cvrf-cve.pl
2020-12-27T01:00:00Z
@@ -337,6 +337,24 @@
go1.22-libstd-1.22.7-1.1
+
+ go1.22-openssl-1.22.7.1-150000.1.3.1
+
+
+ go1.22-openssl-1.22.7.1-150600.13.3.1
+
+
+ go1.22-openssl-doc-1.22.7.1-150000.1.3.1
+
+
+ go1.22-openssl-doc-1.22.7.1-150600.13.3.1
+
+
+ go1.22-openssl-race-1.22.7.1-150000.1.3.1
+
+
+ go1.22-openssl-race-1.22.7.1-150600.13.3.1
+
go1.22-race-1.22.7-1.1
@@ -364,6 +382,24 @@
go1.23-libstd-1.23.1-1.1
+
+ go1.23-openssl-1.23.2.2-150000.1.3.1
+
+
+ go1.23-openssl-1.23.2.2-150600.13.3.1
+
+
+ go1.23-openssl-doc-1.23.2.2-150000.1.3.1
+
+
+ go1.23-openssl-doc-1.23.2.2-150600.13.3.1
+
+
+ go1.23-openssl-race-1.23.2.2-150000.1.3.1
+
+
+ go1.23-openssl-race-1.23.2.2-150600.13.3.1
+
go1.23-race-1.23.1-1.1
@@ -1465,6 +1501,78 @@
kyverno-zsh-completion-1.12.6-1.1 as a component of openSUSE Tumbleweed
+
+ go1.22-openssl-1.22.7.1-150000.1.3.1 as a component of SUSE Linux Enterprise Module for Development Tools 15 SP5
+
+
+ go1.22-openssl-doc-1.22.7.1-150000.1.3.1 as a component of SUSE Linux Enterprise Module for Development Tools 15 SP5
+
+
+ go1.22-openssl-race-1.22.7.1-150000.1.3.1 as a component of SUSE Linux Enterprise Module for Development Tools 15 SP5
+
+
+ go1.23-openssl-1.23.2.2-150000.1.3.1 as a component of SUSE Linux Enterprise Module for Development Tools 15 SP5
+
+
+ go1.23-openssl-doc-1.23.2.2-150000.1.3.1 as a component of SUSE Linux Enterprise Module for Development Tools 15 SP5
+
+
+ go1.23-openssl-race-1.23.2.2-150000.1.3.1 as a component of SUSE Linux Enterprise Module for Development Tools 15 SP5
+
+
+ go1.22-openssl-1.22.7.1-150600.13.3.1 as a component of SUSE Linux Enterprise Module for Development Tools 15 SP6
+
+
+ go1.22-openssl-doc-1.22.7.1-150600.13.3.1 as a component of SUSE Linux Enterprise Module for Development Tools 15 SP6
+
+
+ go1.22-openssl-race-1.22.7.1-150600.13.3.1 as a component of SUSE Linux Enterprise Module for Development Tools 15 SP6
+
+
+ go1.23-openssl-1.23.2.2-150600.13.3.1 as a component of SUSE Linux Enterprise Module for Development Tools 15 SP6
+
+
+ go1.23-openssl-doc-1.23.2.2-150600.13.3.1 as a component of SUSE Linux Enterprise Module for Development Tools 15 SP6
+
+
+ go1.23-openssl-race-1.23.2.2-150600.13.3.1 as a component of SUSE Linux Enterprise Module for Development Tools 15 SP6
+
+
+ go1.22-openssl-1.22.7.1-150000.1.3.1 as a component of openSUSE Leap 15.5
+
+
+ go1.22-openssl-doc-1.22.7.1-150000.1.3.1 as a component of openSUSE Leap 15.5
+
+
+ go1.22-openssl-race-1.22.7.1-150000.1.3.1 as a component of openSUSE Leap 15.5
+
+
+ go1.23-openssl-1.23.2.2-150000.1.3.1 as a component of openSUSE Leap 15.5
+
+
+ go1.23-openssl-doc-1.23.2.2-150000.1.3.1 as a component of openSUSE Leap 15.5
+
+
+ go1.23-openssl-race-1.23.2.2-150000.1.3.1 as a component of openSUSE Leap 15.5
+
+
+ go1.22-openssl-1.22.7.1-150600.13.3.1 as a component of openSUSE Leap 15.6
+
+
+ go1.22-openssl-doc-1.22.7.1-150600.13.3.1 as a component of openSUSE Leap 15.6
+
+
+ go1.22-openssl-race-1.22.7.1-150600.13.3.1 as a component of openSUSE Leap 15.6
+
+
+ go1.23-openssl-1.23.2.2-150600.13.3.1 as a component of openSUSE Leap 15.6
+
+
+ go1.23-openssl-doc-1.23.2.2-150600.13.3.1 as a component of openSUSE Leap 15.6
+
+
+ go1.23-openssl-race-1.23.2.2-150600.13.3.1 as a component of openSUSE Leap 15.6
+
@@ -1734,6 +1842,32 @@
openSUSE Tumbleweed:kyverno-fish-completion-1.12.6-1.1
openSUSE Tumbleweed:kyverno-zsh-completion-1.12.6-1.1
+
+ SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.22-openssl-1.22.7.1-150000.1.3.1
+ SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.22-openssl-doc-1.22.7.1-150000.1.3.1
+ SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.22-openssl-race-1.22.7.1-150000.1.3.1
+ SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.23-openssl-1.23.2.2-150000.1.3.1
+ SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.23-openssl-doc-1.23.2.2-150000.1.3.1
+ SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.23-openssl-race-1.23.2.2-150000.1.3.1
+ SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.22-openssl-1.22.7.1-150600.13.3.1
+ SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.22-openssl-doc-1.22.7.1-150600.13.3.1
+ SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.22-openssl-race-1.22.7.1-150600.13.3.1
+ SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.23-openssl-1.23.2.2-150600.13.3.1
+ SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.23-openssl-doc-1.23.2.2-150600.13.3.1
+ SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.23-openssl-race-1.23.2.2-150600.13.3.1
+ openSUSE Leap 15.5:go1.22-openssl-1.22.7.1-150000.1.3.1
+ openSUSE Leap 15.5:go1.22-openssl-doc-1.22.7.1-150000.1.3.1
+ openSUSE Leap 15.5:go1.22-openssl-race-1.22.7.1-150000.1.3.1
+ openSUSE Leap 15.5:go1.23-openssl-1.23.2.2-150000.1.3.1
+ openSUSE Leap 15.5:go1.23-openssl-doc-1.23.2.2-150000.1.3.1
+ openSUSE Leap 15.5:go1.23-openssl-race-1.23.2.2-150000.1.3.1
+ openSUSE Leap 15.6:go1.22-openssl-1.22.7.1-150600.13.3.1
+ openSUSE Leap 15.6:go1.22-openssl-doc-1.22.7.1-150600.13.3.1
+ openSUSE Leap 15.6:go1.22-openssl-race-1.22.7.1-150600.13.3.1
+ openSUSE Leap 15.6:go1.23-openssl-1.23.2.2-150600.13.3.1
+ openSUSE Leap 15.6:go1.23-openssl-doc-1.23.2.2-150600.13.3.1
+ openSUSE Leap 15.6:go1.23-openssl-race-1.23.2.2-150600.13.3.1
+
no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2024-34155
--- /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2024-34155.xml 2024-10-27 01:14:15.675076000 +0200
+++ /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2024-34155.xml.new 2024-10-29 01:18:21.817042000 +0100
@@ -14,13 +14,13 @@
1
- 19
- 2024-10-26T23:14:15Z
+ 20
+ 2024-10-29T00:18:21Z
current
2024-09-05T23:16:37Z
- 2024-10-26T23:14:15Z
+ 2024-10-29T00:18:21Z
cve-database/bin/generate-cvrf-cve.pl
2020-12-27T01:00:00Z
@@ -304,6 +304,24 @@
go1.22-libstd-1.22.7-1.1
+
+ go1.22-openssl-1.22.7.1-150000.1.3.1
+
+
+ go1.22-openssl-1.22.7.1-150600.13.3.1
+
+
+ go1.22-openssl-doc-1.22.7.1-150000.1.3.1
+
+
+ go1.22-openssl-doc-1.22.7.1-150600.13.3.1
+
+
+ go1.22-openssl-race-1.22.7.1-150000.1.3.1
+
+
+ go1.22-openssl-race-1.22.7.1-150600.13.3.1
+
go1.22-race-1.22.7-1.1
@@ -331,6 +349,24 @@
go1.23-libstd-1.23.1-1.1
+
+ go1.23-openssl-1.23.2.2-150000.1.3.1
+
+
+ go1.23-openssl-1.23.2.2-150600.13.3.1
+
+
+ go1.23-openssl-doc-1.23.2.2-150000.1.3.1
+
+
+ go1.23-openssl-doc-1.23.2.2-150600.13.3.1
+
+
+ go1.23-openssl-race-1.23.2.2-150000.1.3.1
+
+
+ go1.23-openssl-race-1.23.2.2-150600.13.3.1
+
go1.23-race-1.23.1-1.1
@@ -1375,6 +1411,78 @@
trivy-0.56.1-1.1 as a component of openSUSE Tumbleweed
+
+ go1.22-openssl-1.22.7.1-150000.1.3.1 as a component of SUSE Linux Enterprise Module for Development Tools 15 SP5
+
+
+ go1.22-openssl-doc-1.22.7.1-150000.1.3.1 as a component of SUSE Linux Enterprise Module for Development Tools 15 SP5
+
+
+ go1.22-openssl-race-1.22.7.1-150000.1.3.1 as a component of SUSE Linux Enterprise Module for Development Tools 15 SP5
+
+
+ go1.23-openssl-1.23.2.2-150000.1.3.1 as a component of SUSE Linux Enterprise Module for Development Tools 15 SP5
+
+
+ go1.23-openssl-doc-1.23.2.2-150000.1.3.1 as a component of SUSE Linux Enterprise Module for Development Tools 15 SP5
+
+
+ go1.23-openssl-race-1.23.2.2-150000.1.3.1 as a component of SUSE Linux Enterprise Module for Development Tools 15 SP5
+
+
+ go1.22-openssl-1.22.7.1-150600.13.3.1 as a component of SUSE Linux Enterprise Module for Development Tools 15 SP6
+
+
+ go1.22-openssl-doc-1.22.7.1-150600.13.3.1 as a component of SUSE Linux Enterprise Module for Development Tools 15 SP6
+
+
+ go1.22-openssl-race-1.22.7.1-150600.13.3.1 as a component of SUSE Linux Enterprise Module for Development Tools 15 SP6
+
+
+ go1.23-openssl-1.23.2.2-150600.13.3.1 as a component of SUSE Linux Enterprise Module for Development Tools 15 SP6
+
+
+ go1.23-openssl-doc-1.23.2.2-150600.13.3.1 as a component of SUSE Linux Enterprise Module for Development Tools 15 SP6
+
+
+ go1.23-openssl-race-1.23.2.2-150600.13.3.1 as a component of SUSE Linux Enterprise Module for Development Tools 15 SP6
+
+
+ go1.22-openssl-1.22.7.1-150000.1.3.1 as a component of openSUSE Leap 15.5
+
+
+ go1.22-openssl-doc-1.22.7.1-150000.1.3.1 as a component of openSUSE Leap 15.5
+
+
+ go1.22-openssl-race-1.22.7.1-150000.1.3.1 as a component of openSUSE Leap 15.5
+
+
+ go1.23-openssl-1.23.2.2-150000.1.3.1 as a component of openSUSE Leap 15.5
+
+
+ go1.23-openssl-doc-1.23.2.2-150000.1.3.1 as a component of openSUSE Leap 15.5
+
+
+ go1.23-openssl-race-1.23.2.2-150000.1.3.1 as a component of openSUSE Leap 15.5
+
+
+ go1.22-openssl-1.22.7.1-150600.13.3.1 as a component of openSUSE Leap 15.6
+
+
+ go1.22-openssl-doc-1.22.7.1-150600.13.3.1 as a component of openSUSE Leap 15.6
+
+
+ go1.22-openssl-race-1.22.7.1-150600.13.3.1 as a component of openSUSE Leap 15.6
+
+
+ go1.23-openssl-1.23.2.2-150600.13.3.1 as a component of openSUSE Leap 15.6
+
+
+ go1.23-openssl-doc-1.23.2.2-150600.13.3.1 as a component of openSUSE Leap 15.6
+
+
+ go1.23-openssl-race-1.23.2.2-150600.13.3.1 as a component of openSUSE Leap 15.6
+
@@ -1633,6 +1741,32 @@
openSUSE Tumbleweed:go1.23-race-1.23.1-1.1
openSUSE Tumbleweed:trivy-0.56.1-1.1
+
+ SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.22-openssl-1.22.7.1-150000.1.3.1
+ SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.22-openssl-doc-1.22.7.1-150000.1.3.1
+ SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.22-openssl-race-1.22.7.1-150000.1.3.1
+ SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.23-openssl-1.23.2.2-150000.1.3.1
+ SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.23-openssl-doc-1.23.2.2-150000.1.3.1
+ SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.23-openssl-race-1.23.2.2-150000.1.3.1
+ SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.22-openssl-1.22.7.1-150600.13.3.1
+ SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.22-openssl-doc-1.22.7.1-150600.13.3.1
+ SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.22-openssl-race-1.22.7.1-150600.13.3.1
+ SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.23-openssl-1.23.2.2-150600.13.3.1
+ SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.23-openssl-doc-1.23.2.2-150600.13.3.1
+ SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.23-openssl-race-1.23.2.2-150600.13.3.1
+ openSUSE Leap 15.5:go1.22-openssl-1.22.7.1-150000.1.3.1
+ openSUSE Leap 15.5:go1.22-openssl-doc-1.22.7.1-150000.1.3.1
+ openSUSE Leap 15.5:go1.22-openssl-race-1.22.7.1-150000.1.3.1
+ openSUSE Leap 15.5:go1.23-openssl-1.23.2.2-150000.1.3.1
+ openSUSE Leap 15.5:go1.23-openssl-doc-1.23.2.2-150000.1.3.1
+ openSUSE Leap 15.5:go1.23-openssl-race-1.23.2.2-150000.1.3.1
+ openSUSE Leap 15.6:go1.22-openssl-1.22.7.1-150600.13.3.1
+ openSUSE Leap 15.6:go1.22-openssl-doc-1.22.7.1-150600.13.3.1
+ openSUSE Leap 15.6:go1.22-openssl-race-1.22.7.1-150600.13.3.1
+ openSUSE Leap 15.6:go1.23-openssl-1.23.2.2-150600.13.3.1
+ openSUSE Leap 15.6:go1.23-openssl-doc-1.23.2.2-150600.13.3.1
+ openSUSE Leap 15.6:go1.23-openssl-race-1.23.2.2-150600.13.3.1
+
no cpe found for SUSE Package Hub 15 SP5 in CVE-2024-34083
skipping CVE-2024-34088 as CVE page is older than CVRF-CVE file.
no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2024-34064
skipping CVE-2024-34069 as CVE page is older than CVRF-CVE file.
no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2024-34062
skipping CVE-2024-34030 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-34027 as CVE page is older than CVRF-CVE file.
no cpe found for SUSE Package Hub 15 SP5 in CVE-2024-33664
skipping CVE-2024-33871 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-33870 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-33869 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-33861 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-33847 as CVE page is older than CVRF-CVE file.
no cpe found for SUSE Package Hub 15 SP5 in CVE-2024-33663
notsure where SUSE Liberty Linux 7 is contained?
no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2024-33602
skipping CVE-2024-33621 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-33619 as CVE page is older than CVRF-CVE file.
no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2024-33601
no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2024-33600
no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2024-33599
no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2024-33427
skipping CVE-2024-32936 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-32650 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-32487 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-32465 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-32462 as CVE page is older than CVRF-CVE file.
no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2024-32230
skipping CVE-2024-32021 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-32020 as CVE page is older than CVRF-CVE file.
no cpe found for SUSE Package Hub 15 SP5 in CVE-2024-31755
skipping CVE-2024-32004 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-32002 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-31951 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-31950 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-31949 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-31948 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-31852 as CVE page is older than CVRF-CVE file.
no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2024-31744
no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2024-31578
no cpe found for SUSE Package Hub 15 SP5 in CVE-2024-31497
no cpe found for SUSE Package Hub 15 SP5 in CVE-2024-31460
no cpe found for SUSE Package Hub 15 SP6 in CVE-2024-31460
no cpe found for SUSE Package Hub 15 SP5 in CVE-2024-31459
no cpe found for SUSE Package Hub 15 SP6 in CVE-2024-31459
no cpe found for SUSE Package Hub 15 SP5 in CVE-2024-31458
no cpe found for SUSE Package Hub 15 SP6 in CVE-2024-31458
no cpe found for SUSE Package Hub 15 SP5 in CVE-2024-31445
no cpe found for SUSE Package Hub 15 SP6 in CVE-2024-31445
skipping CVE-2024-31449 as CVE page is older than CVRF-CVE file.
no cpe found for SUSE Package Hub 15 SP5 in CVE-2024-31444
no cpe found for SUSE Package Hub 15 SP6 in CVE-2024-31444
no cpe found for SUSE Package Hub 15 SP5 in CVE-2024-31443
no cpe found for SUSE Package Hub 15 SP6 in CVE-2024-31443
skipping CVE-2024-31228 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-31227 as CVE page is older than CVRF-CVE file.
CVE-2024-31146: no packages for Image SLES15-SP5-SAP-Hardened-BYOS-EC2, but entry?
CVE-2024-31146: no packages for Image SLES15-SP6-CHOST-BYOS-EC2, but entry?
CVE-2024-31146: no packages for Image SLES15-SP5-Hardened-BYOS-GCE, but entry?
CVE-2024-31146: no packages for Image SLES15-SP5-GCE, but entry?
CVE-2024-31146: no packages for Image SLES15-SP5-SAP-BYOS-GCE, but entry?
CVE-2024-31146: no packages for Image SLES15-SP5-SAP-Hardened-Azure, but entry?
CVE-2024-31146: no packages for Image SLES15-SP5-SAPCAL-EC2, but entry?
CVE-2024-31146: no packages for Image SLES15-SP5-Manager-Proxy-5-0-BYOS-EC2, but entry?
CVE-2024-31146: no packages for Image SLES15-SP6-CHOST-BYOS, but entry?
CVE-2024-31146: no packages for Image SLES15-SP3-Micro-5-1-BYOS-EC2-HVM, but entry?
CVE-2024-31146: no packages for Image SLES15-SP5-SAP-BYOS-EC2, but entry?
CVE-2024-31146: no packages for Image SLES15-SP4-SAP-Azure-VLI-BYOS, but entry?
CVE-2024-31146: no packages for Image SLES15-SP6-SAP-Azure-LI-BYOS, but entry?
CVE-2024-31146: no packages for Image SLES15-SP3-Micro-5-1-BYOS-Azure, but entry?
CVE-2024-31146: no packages for SUSE Linux Enterprise Micro 5.2, but entry?
CVE-2024-31146: no packages for Image SLES15-SP5-SAP-Hardened-BYOS-Azure, but entry?
CVE-2024-31146: no packages for Image SLES15-SP3-SAP-Azure-LI-BYOS-Production, but entry?
CVE-2024-31146: no packages for Image SLES15-SP5-HPC-BYOS-GCE, but entry?
CVE-2024-31146: no packages for Image SLES15-SP6-SAP-Azure-VLI-BYOS-Production, but entry?
CVE-2024-31146: no packages for Image SLES15-SP5-Manager-Server-5-0-BYOS, but entry?
CVE-2024-31146: no packages for Image SLES15-SP5-SAPCAL-Azure, but entry?
CVE-2024-31146: no packages for Image SLES15-SP5-Manager-Server-5-0-BYOS-GCE, but entry?
CVE-2024-31146: no packages for Image SLES15-SP5-CHOST-BYOS-SAP-CCloud, but entry?
CVE-2024-31146: no packages for Image SLES15-SP5-BYOS-EC2, but entry?
CVE-2024-31146: no packages for Image SLES15-SP5-SAP-BYOS-Azure, but entry?
CVE-2024-31146: no packages for Image SLES15-SP5-Manager-Proxy-5-0-BYOS-Azure, but entry?
CVE-2024-31146: no packages for Image SLES15-SP5-Micro-5-5-EC2, but entry?
CVE-2024-31146: no packages for Image SLES15-SP5-SAP-Azure-LI-BYOS, but entry?
CVE-2024-31146: no packages for Image SLES15-SP5-CHOST-BYOS-GCE, but entry?
CVE-2024-31146: no packages for Image SLES15-SP5-SAPCAL-GCE, but entry?
CVE-2024-31146: no packages for Image SLES15-SP4-SAP-Azure-VLI-BYOS-Production, but entry?
CVE-2024-31146: no packages for Image SLES15-SP3-Micro-5-1-BYOS-GCE, but entry?
CVE-2024-31146: no packages for Image SLES15-SP5-HPC-Azure, but entry?
CVE-2024-31146: no packages for Image SLES15-SP5-BYOS-Azure, but entry?
CVE-2024-31146: no packages for SUSE Linux Enterprise Micro 5.1, but entry?
CVE-2024-31146: no packages for Image SLES15-SP5-SAP-Azure-VLI-BYOS-Production, but entry?
CVE-2024-31146: no packages for Image SLES15-SP5-Hardened-BYOS-Azure, but entry?
CVE-2024-31146: no packages for Image SLES15-SP6-SAP-Azure-VLI-BYOS, but entry?
CVE-2024-31146: no packages for Image SLES15-SP5-Manager-Proxy-5-0-BYOS-GCE, but entry?
CVE-2024-31146: no packages for Image SLES15-SP3-SAP-Azure-VLI-BYOS-Production, but entry?
CVE-2024-31146: no packages for Image SLES15-SP3-Micro-5-2-BYOS-EC2-HVM, but entry?
CVE-2024-31146: no packages for Image SLES15-SP5-SAP-Azure-VLI-BYOS, but entry?
CVE-2024-31146: no packages for Image SLES15-SP6-CHOST-BYOS-Azure, but entry?
CVE-2024-31146: no packages for Image SLES15-SP5-SAP-Azure-LI-BYOS-Production, but entry?
CVE-2024-31146: no packages for SUSE Linux Enterprise Module for Basesystem 15 SP6, but entry?
CVE-2024-31146: no packages for Image SLES15-SP5-EC2, but entry?
CVE-2024-31146: no packages for Image SLES15-SP5-BYOS-GCE, but entry?
CVE-2024-31146: no packages for Image SLES15-SP5-Manager-Proxy-5-0-BYOS, but entry?
CVE-2024-31146: no packages for Image SLES15-SP5-Azure-Basic, but entry?
CVE-2024-31146: no packages for Image SLES15-SP5-Manager-Server-5-0-BYOS-Azure, but entry?
CVE-2024-31146: no packages for Image SLES15-SP6-CHOST-BYOS-Aliyun, but entry?
CVE-2024-31146: no packages for Image SLES15-SP3-CHOST-BYOS-Azure, but entry?
CVE-2024-31146: no packages for Image SLES15-SP5-HPC-BYOS-EC2, but entry?
CVE-2024-31146: no packages for Image SLES15-SP5-HPC-BYOS-Azure, but entry?
CVE-2024-31146: no packages for Image SLES15-SP5-SAP-Hardened-BYOS-GCE, but entry?
CVE-2024-31146: no packages for Image SLES15-SP5-Micro-5-5-GCE, but entry?
CVE-2024-31146: no packages for Image SLES15-SP5-Micro-5-5-BYOS, but entry?
CVE-2024-31146: no packages for Image SLES15-SP5-SAP-Hardened-GCE, but entry?
CVE-2024-31146: no packages for Image SLES15-SP3-SAP-BYOS-EC2-HVM, but entry?
CVE-2024-31146: no packages for Image SLES12-SP5-EC2-BYOS, but entry?
CVE-2024-31146: no packages for Image SLES15-SP3-Micro-5-2-BYOS-Azure, but entry?
CVE-2024-31146: no packages for Image SLES15-SP3-SAP-BYOS-GCE, but entry?
CVE-2024-31146: no packages for SUSE Linux Enterprise Micro 5.5, but entry?
CVE-2024-31146: no packages for Image SLES15-SP5-CHOST-BYOS-EC2, but entry?
CVE-2024-31146: no packages for Image SLES15-SP6-CHOST-BYOS-SAP-CCloud, but entry?
CVE-2024-31146: no packages for Image SLES15-SP3-CHOST-BYOS-GCE, but entry?
CVE-2024-31146: no packages for Image SLES15-SP5-CHOST-BYOS-Aliyun, but entry?
CVE-2024-31146: no packages for Image SLES15-SP6-SAP-Azure-LI-BYOS-Production, but entry?
CVE-2024-31146: no packages for SUSE Linux Enterprise Micro 5.3, but entry?
CVE-2024-31146: no packages for Image SLES15-SP5-CHOST-BYOS-GDC, but entry?
CVE-2024-31146: no packages for Image SLES15-SP3-CHOST-BYOS-Aliyun, but entry?
CVE-2024-31146: no packages for Image SLES15-SP6-CHOST-BYOS-GDC, but entry?
CVE-2024-31146: no packages for Image SLES15-SP5-Manager-Server-5-0-BYOS-EC2, but entry?
CVE-2024-31146: no packages for Image SLES15-SP6-CHOST-BYOS-GCE, but entry?
CVE-2024-31146: no packages for Image SLES15-SP3-Micro-5-2-BYOS-GCE, but entry?
CVE-2024-31146: no packages for Image SLES15-SP5-CHOST-BYOS-Azure, but entry?
CVE-2024-31146: no packages for Image SLES15-SP5-Micro-5-5-BYOS-GCE, but entry?
CVE-2024-31146: no packages for openSUSE Leap Micro 5.5, but entry?
CVE-2024-31146: no packages for Image SLES15-SP3-CHOST-BYOS-EC2, but entry?
CVE-2024-31146: no packages for Image SLES15-SP4-SAP-Azure-LI-BYOS-Production, but entry?
CVE-2024-31146: no packages for SUSE Linux Enterprise Software Development Kit 12 SP5, but entry?
CVE-2024-31146: no packages for SUSE Linux Enterprise Micro 5.4, but entry?
CVE-2024-31146: no packages for Image SLES15-SP3-SAP-BYOS-Azure, but entry?
CVE-2024-31146: no packages for Image SLES15-SP4-SAP-Azure-LI-BYOS, but entry?
CVE-2024-31146: no packages for Image SLES15-SP5-Micro-5-5, but entry?
CVE-2024-31146: no packages for SUSE Linux Enterprise Module for Basesystem 15 SP5, but entry?
CVE-2024-31146: no packages for Image SLES15-SP5-Azure-Standard, but entry?
no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2024-31146
CVE-2024-31146: no packages for Image SLES12-SP5-EC2-BYOS, but entry?
CVE-2024-31146: no packages for Image SLES15-SP3-CHOST-BYOS-Aliyun, but entry?
CVE-2024-31146: no packages for Image SLES15-SP3-CHOST-BYOS-Azure, but entry?
CVE-2024-31146: no packages for Image SLES15-SP3-CHOST-BYOS-EC2, but entry?
CVE-2024-31146: no packages for Image SLES15-SP3-CHOST-BYOS-GCE, but entry?
CVE-2024-31146: no packages for Image SLES15-SP3-Micro-5-1-BYOS-Azure, but entry?
CVE-2024-31146: no packages for Image SLES15-SP3-Micro-5-1-BYOS-EC2-HVM, but entry?
CVE-2024-31146: no packages for Image SLES15-SP3-Micro-5-1-BYOS-GCE, but entry?
CVE-2024-31146: no packages for Image SLES15-SP3-Micro-5-2-BYOS-Azure, but entry?
CVE-2024-31146: no packages for Image SLES15-SP3-Micro-5-2-BYOS-EC2-HVM, but entry?
CVE-2024-31146: no packages for Image SLES15-SP3-Micro-5-2-BYOS-GCE, but entry?
CVE-2024-31146: no packages for Image SLES15-SP3-SAP-Azure-LI-BYOS-Production, but entry?
CVE-2024-31146: no packages for Image SLES15-SP3-SAP-Azure-VLI-BYOS-Production, but entry?
CVE-2024-31146: no packages for Image SLES15-SP3-SAP-BYOS-Azure, but entry?
CVE-2024-31146: no packages for Image SLES15-SP3-SAP-BYOS-EC2-HVM, but entry?
CVE-2024-31146: no packages for Image SLES15-SP3-SAP-BYOS-GCE, but entry?
CVE-2024-31146: no packages for Image SLES15-SP4-SAP-Azure-LI-BYOS, but entry?
CVE-2024-31146: no packages for Image SLES15-SP4-SAP-Azure-LI-BYOS-Production, but entry?
CVE-2024-31146: no packages for Image SLES15-SP4-SAP-Azure-VLI-BYOS, but entry?
CVE-2024-31146: no packages for Image SLES15-SP4-SAP-Azure-VLI-BYOS-Production, but entry?
CVE-2024-31146: no packages for Image SLES15-SP5-Azure-Basic, but entry?
CVE-2024-31146: no packages for Image SLES15-SP5-Azure-Standard, but entry?
CVE-2024-31146: no packages for Image SLES15-SP5-BYOS-Azure, but entry?
CVE-2024-31146: no packages for Image SLES15-SP5-BYOS-EC2, but entry?
CVE-2024-31146: no packages for Image SLES15-SP5-BYOS-GCE, but entry?
CVE-2024-31146: no packages for Image SLES15-SP5-CHOST-BYOS-Aliyun, but entry?
CVE-2024-31146: no packages for Image SLES15-SP5-CHOST-BYOS-Azure, but entry?
CVE-2024-31146: no packages for Image SLES15-SP5-CHOST-BYOS-EC2, but entry?
CVE-2024-31146: no packages for Image SLES15-SP5-CHOST-BYOS-GCE, but entry?
CVE-2024-31146: no packages for Image SLES15-SP5-CHOST-BYOS-GDC, but entry?
CVE-2024-31146: no packages for Image SLES15-SP5-CHOST-BYOS-SAP-CCloud, but entry?
CVE-2024-31146: no packages for Image SLES15-SP5-EC2, but entry?
CVE-2024-31146: no packages for Image SLES15-SP5-GCE, but entry?
CVE-2024-31146: no packages for Image SLES15-SP5-HPC-Azure, but entry?
CVE-2024-31146: no packages for Image SLES15-SP5-HPC-BYOS-Azure, but entry?
CVE-2024-31146: no packages for Image SLES15-SP5-HPC-BYOS-EC2, but entry?
CVE-2024-31146: no packages for Image SLES15-SP5-HPC-BYOS-GCE, but entry?
CVE-2024-31146: no packages for Image SLES15-SP5-Hardened-BYOS-Azure, but entry?
CVE-2024-31146: no packages for Image SLES15-SP5-Hardened-BYOS-GCE, but entry?
CVE-2024-31146: no packages for Image SLES15-SP5-Manager-Proxy-5-0-BYOS, but entry?
CVE-2024-31146: no packages for Image SLES15-SP5-Manager-Proxy-5-0-BYOS-Azure, but entry?
CVE-2024-31146: no packages for Image SLES15-SP5-Manager-Proxy-5-0-BYOS-EC2, but entry?
CVE-2024-31146: no packages for Image SLES15-SP5-Manager-Proxy-5-0-BYOS-GCE, but entry?
CVE-2024-31146: no packages for Image SLES15-SP5-Manager-Server-5-0-BYOS, but entry?
CVE-2024-31146: no packages for Image SLES15-SP5-Manager-Server-5-0-BYOS-Azure, but entry?
CVE-2024-31146: no packages for Image SLES15-SP5-Manager-Server-5-0-BYOS-EC2, but entry?
CVE-2024-31146: no packages for Image SLES15-SP5-Manager-Server-5-0-BYOS-GCE, but entry?
CVE-2024-31146: no packages for Image SLES15-SP5-Micro-5-5, but entry?
CVE-2024-31146: no packages for Image SLES15-SP5-Micro-5-5-BYOS, but entry?
CVE-2024-31146: no packages for Image SLES15-SP5-Micro-5-5-BYOS-GCE, but entry?
CVE-2024-31146: no packages for Image SLES15-SP5-Micro-5-5-EC2, but entry?
CVE-2024-31146: no packages for Image SLES15-SP5-Micro-5-5-GCE, but entry?
CVE-2024-31146: no packages for Image SLES15-SP5-SAP-Azure-LI-BYOS, but entry?
CVE-2024-31146: no packages for Image SLES15-SP5-SAP-Azure-LI-BYOS-Production, but entry?
CVE-2024-31146: no packages for Image SLES15-SP5-SAP-Azure-VLI-BYOS, but entry?
CVE-2024-31146: no packages for Image SLES15-SP5-SAP-Azure-VLI-BYOS-Production, but entry?
CVE-2024-31146: no packages for Image SLES15-SP5-SAP-BYOS-Azure, but entry?
CVE-2024-31146: no packages for Image SLES15-SP5-SAP-BYOS-EC2, but entry?
CVE-2024-31146: no packages for Image SLES15-SP5-SAP-BYOS-GCE, but entry?
CVE-2024-31146: no packages for Image SLES15-SP5-SAP-Hardened-Azure, but entry?
CVE-2024-31146: no packages for Image SLES15-SP5-SAP-Hardened-BYOS-Azure, but entry?
CVE-2024-31146: no packages for Image SLES15-SP5-SAP-Hardened-BYOS-EC2, but entry?
CVE-2024-31146: no packages for Image SLES15-SP5-SAP-Hardened-BYOS-GCE, but entry?
CVE-2024-31146: no packages for Image SLES15-SP5-SAP-Hardened-GCE, but entry?
CVE-2024-31146: no packages for Image SLES15-SP5-SAPCAL-Azure, but entry?
CVE-2024-31146: no packages for Image SLES15-SP5-SAPCAL-EC2, but entry?
CVE-2024-31146: no packages for Image SLES15-SP5-SAPCAL-GCE, but entry?
CVE-2024-31146: no packages for Image SLES15-SP6-CHOST-BYOS, but entry?
CVE-2024-31146: no packages for Image SLES15-SP6-CHOST-BYOS-Aliyun, but entry?
CVE-2024-31146: no packages for Image SLES15-SP6-CHOST-BYOS-Azure, but entry?
CVE-2024-31146: no packages for Image SLES15-SP6-CHOST-BYOS-EC2, but entry?
CVE-2024-31146: no packages for Image SLES15-SP6-CHOST-BYOS-GCE, but entry?
CVE-2024-31146: no packages for Image SLES15-SP6-CHOST-BYOS-GDC, but entry?
CVE-2024-31146: no packages for Image SLES15-SP6-CHOST-BYOS-SAP-CCloud, but entry?
CVE-2024-31146: no packages for Image SLES15-SP6-SAP-Azure-LI-BYOS, but entry?
CVE-2024-31146: no packages for Image SLES15-SP6-SAP-Azure-LI-BYOS-Production, but entry?
CVE-2024-31146: no packages for Image SLES15-SP6-SAP-Azure-VLI-BYOS, but entry?
CVE-2024-31146: no packages for Image SLES15-SP6-SAP-Azure-VLI-BYOS-Production, but entry?
CVE-2024-31146: no packages for SUSE Linux Enterprise Micro 5.1, but entry?
CVE-2024-31146: no packages for SUSE Linux Enterprise Micro 5.2, but entry?
CVE-2024-31146: no packages for SUSE Linux Enterprise Micro 5.3, but entry?
CVE-2024-31146: no packages for SUSE Linux Enterprise Micro 5.4, but entry?
CVE-2024-31146: no packages for SUSE Linux Enterprise Micro 5.5, but entry?
CVE-2024-31146: no packages for SUSE Linux Enterprise Module for Basesystem 15 SP5, but entry?
CVE-2024-31146: no packages for SUSE Linux Enterprise Module for Basesystem 15 SP6, but entry?
CVE-2024-31146: no packages for SUSE Linux Enterprise Software Development Kit 12 SP5, but entry?
CVE-2024-31146: no packages for openSUSE Leap Micro 5.5, but entry?
CVE-2024-31146: no packages for Image SLES12-SP5-EC2-BYOS, but entry?
CVE-2024-31146: no packages for Image SLES15-SP3-CHOST-BYOS-Aliyun, but entry?
CVE-2024-31146: no packages for Image SLES15-SP3-CHOST-BYOS-Azure, but entry?
CVE-2024-31146: no packages for Image SLES15-SP3-CHOST-BYOS-EC2, but entry?
CVE-2024-31146: no packages for Image SLES15-SP3-CHOST-BYOS-GCE, but entry?
CVE-2024-31146: no packages for Image SLES15-SP3-Micro-5-1-BYOS-Azure, but entry?
CVE-2024-31146: no packages for Image SLES15-SP3-Micro-5-1-BYOS-EC2-HVM, but entry?
CVE-2024-31146: no packages for Image SLES15-SP3-Micro-5-1-BYOS-GCE, but entry?
CVE-2024-31146: no packages for Image SLES15-SP3-Micro-5-2-BYOS-Azure, but entry?
CVE-2024-31146: no packages for Image SLES15-SP3-Micro-5-2-BYOS-EC2-HVM, but entry?
CVE-2024-31146: no packages for Image SLES15-SP3-Micro-5-2-BYOS-GCE, but entry?
CVE-2024-31146: no packages for Image SLES15-SP3-SAP-Azure-LI-BYOS-Production, but entry?
CVE-2024-31146: no packages for Image SLES15-SP3-SAP-Azure-VLI-BYOS-Production, but entry?
CVE-2024-31146: no packages for Image SLES15-SP3-SAP-BYOS-Azure, but entry?
CVE-2024-31146: no packages for Image SLES15-SP3-SAP-BYOS-EC2-HVM, but entry?
CVE-2024-31146: no packages for Image SLES15-SP3-SAP-BYOS-GCE, but entry?
CVE-2024-31146: no packages for Image SLES15-SP4-SAP-Azure-LI-BYOS, but entry?
CVE-2024-31146: no packages for Image SLES15-SP4-SAP-Azure-LI-BYOS-Production, but entry?
CVE-2024-31146: no packages for Image SLES15-SP4-SAP-Azure-VLI-BYOS, but entry?
CVE-2024-31146: no packages for Image SLES15-SP4-SAP-Azure-VLI-BYOS-Production, but entry?
CVE-2024-31146: no packages for Image SLES15-SP5-Azure-Basic, but entry?
CVE-2024-31146: no packages for Image SLES15-SP5-Azure-Standard, but entry?
CVE-2024-31146: no packages for Image SLES15-SP5-BYOS-Azure, but entry?
CVE-2024-31146: no packages for Image SLES15-SP5-BYOS-EC2, but entry?
CVE-2024-31146: no packages for Image SLES15-SP5-BYOS-GCE, but entry?
CVE-2024-31146: no packages for Image SLES15-SP5-CHOST-BYOS-Aliyun, but entry?
CVE-2024-31146: no packages for Image SLES15-SP5-CHOST-BYOS-Azure, but entry?
CVE-2024-31146: no packages for Image SLES15-SP5-CHOST-BYOS-EC2, but entry?
CVE-2024-31146: no packages for Image SLES15-SP5-CHOST-BYOS-GCE, but entry?
CVE-2024-31146: no packages for Image SLES15-SP5-CHOST-BYOS-GDC, but entry?
CVE-2024-31146: no packages for Image SLES15-SP5-CHOST-BYOS-SAP-CCloud, but entry?
CVE-2024-31146: no packages for Image SLES15-SP5-EC2, but entry?
CVE-2024-31146: no packages for Image SLES15-SP5-GCE, but entry?
CVE-2024-31146: no packages for Image SLES15-SP5-HPC-Azure, but entry?
CVE-2024-31146: no packages for Image SLES15-SP5-HPC-BYOS-Azure, but entry?
CVE-2024-31146: no packages for Image SLES15-SP5-HPC-BYOS-EC2, but entry?
CVE-2024-31146: no packages for Image SLES15-SP5-HPC-BYOS-GCE, but entry?
CVE-2024-31146: no packages for Image SLES15-SP5-Hardened-BYOS-Azure, but entry?
CVE-2024-31146: no packages for Image SLES15-SP5-Hardened-BYOS-GCE, but entry?
CVE-2024-31146: no packages for Image SLES15-SP5-Manager-Proxy-5-0-BYOS, but entry?
CVE-2024-31146: no packages for Image SLES15-SP5-Manager-Proxy-5-0-BYOS-Azure, but entry?
CVE-2024-31146: no packages for Image SLES15-SP5-Manager-Proxy-5-0-BYOS-EC2, but entry?
CVE-2024-31146: no packages for Image SLES15-SP5-Manager-Proxy-5-0-BYOS-GCE, but entry?
CVE-2024-31146: no packages for Image SLES15-SP5-Manager-Server-5-0-BYOS, but entry?
CVE-2024-31146: no packages for Image SLES15-SP5-Manager-Server-5-0-BYOS-Azure, but entry?
CVE-2024-31146: no packages for Image SLES15-SP5-Manager-Server-5-0-BYOS-EC2, but entry?
CVE-2024-31146: no packages for Image SLES15-SP5-Manager-Server-5-0-BYOS-GCE, but entry?
CVE-2024-31146: no packages for Image SLES15-SP5-Micro-5-5, but entry?
CVE-2024-31146: no packages for Image SLES15-SP5-Micro-5-5-BYOS, but entry?
CVE-2024-31146: no packages for Image SLES15-SP5-Micro-5-5-BYOS-GCE, but entry?
CVE-2024-31146: no packages for Image SLES15-SP5-Micro-5-5-EC2, but entry?
CVE-2024-31146: no packages for Image SLES15-SP5-Micro-5-5-GCE, but entry?
CVE-2024-31146: no packages for Image SLES15-SP5-SAP-Azure-LI-BYOS, but entry?
CVE-2024-31146: no packages for Image SLES15-SP5-SAP-Azure-LI-BYOS-Production, but entry?
CVE-2024-31146: no packages for Image SLES15-SP5-SAP-Azure-VLI-BYOS, but entry?
CVE-2024-31146: no packages for Image SLES15-SP5-SAP-Azure-VLI-BYOS-Production, but entry?
CVE-2024-31146: no packages for Image SLES15-SP5-SAP-BYOS-Azure, but entry?
CVE-2024-31146: no packages for Image SLES15-SP5-SAP-BYOS-EC2, but entry?
CVE-2024-31146: no packages for Image SLES15-SP5-SAP-BYOS-GCE, but entry?
CVE-2024-31146: no packages for Image SLES15-SP5-SAP-Hardened-Azure, but entry?
CVE-2024-31146: no packages for Image SLES15-SP5-SAP-Hardened-BYOS-Azure, but entry?
CVE-2024-31146: no packages for Image SLES15-SP5-SAP-Hardened-BYOS-EC2, but entry?
CVE-2024-31146: no packages for Image SLES15-SP5-SAP-Hardened-BYOS-GCE, but entry?
CVE-2024-31146: no packages for Image SLES15-SP5-SAP-Hardened-GCE, but entry?
CVE-2024-31146: no packages for Image SLES15-SP5-SAPCAL-Azure, but entry?
CVE-2024-31146: no packages for Image SLES15-SP5-SAPCAL-EC2, but entry?
CVE-2024-31146: no packages for Image SLES15-SP5-SAPCAL-GCE, but entry?
CVE-2024-31146: no packages for Image SLES15-SP6-CHOST-BYOS, but entry?
CVE-2024-31146: no packages for Image SLES15-SP6-CHOST-BYOS-Aliyun, but entry?
CVE-2024-31146: no packages for Image SLES15-SP6-CHOST-BYOS-Azure, but entry?
CVE-2024-31146: no packages for Image SLES15-SP6-CHOST-BYOS-EC2, but entry?
CVE-2024-31146: no packages for Image SLES15-SP6-CHOST-BYOS-GCE, but entry?
CVE-2024-31146: no packages for Image SLES15-SP6-CHOST-BYOS-GDC, but entry?
CVE-2024-31146: no packages for Image SLES15-SP6-CHOST-BYOS-SAP-CCloud, but entry?
CVE-2024-31146: no packages for Image SLES15-SP6-SAP-Azure-LI-BYOS, but entry?
CVE-2024-31146: no packages for Image SLES15-SP6-SAP-Azure-LI-BYOS-Production, but entry?
CVE-2024-31146: no packages for Image SLES15-SP6-SAP-Azure-VLI-BYOS, but entry?
CVE-2024-31146: no packages for Image SLES15-SP6-SAP-Azure-VLI-BYOS-Production, but entry?
CVE-2024-31146: no packages for SUSE Linux Enterprise Micro 5.1, but entry?
CVE-2024-31146: no packages for SUSE Linux Enterprise Micro 5.2, but entry?
CVE-2024-31146: no packages for SUSE Linux Enterprise Micro 5.3, but entry?
CVE-2024-31146: no packages for SUSE Linux Enterprise Micro 5.4, but entry?
CVE-2024-31146: no packages for SUSE Linux Enterprise Micro 5.5, but entry?
CVE-2024-31146: no packages for SUSE Linux Enterprise Module for Basesystem 15 SP5, but entry?
CVE-2024-31146: no packages for SUSE Linux Enterprise Module for Basesystem 15 SP6, but entry?
CVE-2024-31146: no packages for SUSE Linux Enterprise Software Development Kit 12 SP5, but entry?
CVE-2024-31146: no packages for openSUSE Leap Micro 5.5, but entry?
CVE-2024-31145: no packages for Image SLES15-SP5-SAPCAL-Azure, but entry?
CVE-2024-31145: no packages for Image SLES15-SP5-BYOS-EC2, but entry?
CVE-2024-31145: no packages for Image SLES15-SP5-SAP-BYOS-Azure, but entry?
CVE-2024-31145: no packages for Image SLES15-SP5-CHOST-BYOS-SAP-CCloud, but entry?
CVE-2024-31145: no packages for Image SLES15-SP5-Manager-Server-5-0-BYOS-GCE, but entry?
CVE-2024-31145: no packages for Image SLES15-SP5-Manager-Proxy-5-0-BYOS-Azure, but entry?
CVE-2024-31145: no packages for Image SLES15-SP4-SAP-Azure-VLI-BYOS-Production, but entry?
CVE-2024-31145: no packages for Image SLES15-SP5-SAPCAL-GCE, but entry?
CVE-2024-31145: no packages for Image SLES15-SP5-CHOST-BYOS-GCE, but entry?
CVE-2024-31145: no packages for Image SLES15-SP5-Micro-5-5-EC2, but entry?
CVE-2024-31145: no packages for Image SLES15-SP5-SAP-Azure-LI-BYOS, but entry?
CVE-2024-31145: no packages for Image SLES15-SP5-HPC-Azure, but entry?
CVE-2024-31145: no packages for Image SLES15-SP3-Micro-5-1-BYOS-GCE, but entry?
CVE-2024-31145: no packages for SUSE Linux Enterprise Micro 5.1, but entry?
CVE-2024-31145: no packages for Image SLES15-SP5-SAP-Azure-VLI-BYOS-Production, but entry?
CVE-2024-31145: no packages for Image SLES15-SP5-BYOS-Azure, but entry?
CVE-2024-31145: no packages for Image SLES15-SP5-Manager-Proxy-5-0-BYOS-GCE, but entry?
CVE-2024-31145: no packages for Image SLES15-SP6-SAP-Azure-VLI-BYOS, but entry?
CVE-2024-31145: no packages for Image SLES15-SP5-Hardened-BYOS-Azure, but entry?
CVE-2024-31145: no packages for Image SLES15-SP6-CHOST-BYOS-EC2, but entry?
CVE-2024-31145: no packages for Image SLES15-SP5-SAP-Hardened-BYOS-EC2, but entry?
CVE-2024-31145: no packages for Image SLES15-SP5-SAP-Hardened-Azure, but entry?
CVE-2024-31145: no packages for Image SLES15-SP5-SAP-BYOS-GCE, but entry?
CVE-2024-31145: no packages for Image SLES15-SP5-GCE, but entry?
CVE-2024-31145: no packages for Image SLES15-SP5-Hardened-BYOS-GCE, but entry?
CVE-2024-31145: no packages for Image SLES15-SP5-SAPCAL-EC2, but entry?
CVE-2024-31145: no packages for Image SLES15-SP6-CHOST-BYOS, but entry?
CVE-2024-31145: no packages for Image SLES15-SP5-Manager-Proxy-5-0-BYOS-EC2, but entry?
CVE-2024-31145: no packages for Image SLES15-SP5-SAP-BYOS-EC2, but entry?
CVE-2024-31145: no packages for Image SLES15-SP3-Micro-5-1-BYOS-EC2-HVM, but entry?
CVE-2024-31145: no packages for Image SLES15-SP6-SAP-Azure-LI-BYOS, but entry?
CVE-2024-31145: no packages for Image SLES15-SP4-SAP-Azure-VLI-BYOS, but entry?
CVE-2024-31145: no packages for SUSE Linux Enterprise Micro 5.2, but entry?
CVE-2024-31145: no packages for Image SLES15-SP5-SAP-Hardened-BYOS-Azure, but entry?
CVE-2024-31145: no packages for Image SLES15-SP3-Micro-5-1-BYOS-Azure, but entry?
CVE-2024-31145: no packages for Image SLES15-SP5-Manager-Server-5-0-BYOS, but entry?
CVE-2024-31145: no packages for Image SLES15-SP6-SAP-Azure-VLI-BYOS-Production, but entry?
CVE-2024-31145: no packages for Image SLES15-SP5-HPC-BYOS-GCE, but entry?
CVE-2024-31145: no packages for Image SLES15-SP3-SAP-Azure-LI-BYOS-Production, but entry?
CVE-2024-31145: no packages for Image SLES15-SP3-CHOST-BYOS-GCE, but entry?
CVE-2024-31145: no packages for Image SLES15-SP5-CHOST-BYOS-GDC, but entry?
CVE-2024-31145: no packages for SUSE Linux Enterprise Micro 5.3, but entry?
CVE-2024-31145: no packages for Image SLES15-SP6-SAP-Azure-LI-BYOS-Production, but entry?
CVE-2024-31145: no packages for Image SLES15-SP5-CHOST-BYOS-Aliyun, but entry?
CVE-2024-31145: no packages for Image SLES15-SP3-CHOST-BYOS-Aliyun, but entry?
CVE-2024-31145: no packages for Image SLES15-SP6-CHOST-BYOS-GCE, but entry?
CVE-2024-31145: no packages for Image SLES15-SP3-Micro-5-2-BYOS-GCE, but entry?
CVE-2024-31145: no packages for Image SLES15-SP5-Manager-Server-5-0-BYOS-EC2, but entry?
CVE-2024-31145: no packages for Image SLES15-SP6-CHOST-BYOS-GDC, but entry?
CVE-2024-31145: no packages for openSUSE Leap Micro 5.5, but entry?
CVE-2024-31145: no packages for Image SLES15-SP3-CHOST-BYOS-EC2, but entry?
CVE-2024-31145: no packages for Image SLES15-SP5-Micro-5-5-BYOS-GCE, but entry?
CVE-2024-31145: no packages for Image SLES15-SP5-CHOST-BYOS-Azure, but entry?
CVE-2024-31145: no packages for Image SLES15-SP4-SAP-Azure-LI-BYOS, but entry?
CVE-2024-31145: no packages for Image SLES15-SP3-SAP-BYOS-Azure, but entry?
CVE-2024-31145: no packages for SUSE Linux Enterprise Micro 5.4, but entry?
CVE-2024-31145: no packages for SUSE Linux Enterprise Software Development Kit 12 SP5, but entry?
CVE-2024-31145: no packages for Image SLES15-SP4-SAP-Azure-LI-BYOS-Production, but entry?
CVE-2024-31145: no packages for Image SLES15-SP5-Micro-5-5, but entry?
CVE-2024-31145: no packages for Image SLES15-SP5-Azure-Standard, but entry?
CVE-2024-31145: no packages for SUSE Linux Enterprise Module for Basesystem 15 SP5, but entry?
CVE-2024-31145: no packages for Image SLES15-SP3-Micro-5-2-BYOS-EC2-HVM, but entry?
CVE-2024-31145: no packages for Image SLES15-SP3-SAP-Azure-VLI-BYOS-Production, but entry?
CVE-2024-31145: no packages for Image SLES15-SP5-EC2, but entry?
CVE-2024-31145: no packages for SUSE Linux Enterprise Module for Basesystem 15 SP6, but entry?
CVE-2024-31145: no packages for Image SLES15-SP5-SAP-Azure-LI-BYOS-Production, but entry?
CVE-2024-31145: no packages for Image SLES15-SP6-CHOST-BYOS-Azure, but entry?
CVE-2024-31145: no packages for Image SLES15-SP5-SAP-Azure-VLI-BYOS, but entry?
CVE-2024-31145: no packages for Image SLES15-SP5-Manager-Proxy-5-0-BYOS, but entry?
CVE-2024-31145: no packages for Image SLES15-SP5-BYOS-GCE, but entry?
CVE-2024-31145: no packages for Image SLES15-SP6-CHOST-BYOS-Aliyun, but entry?
CVE-2024-31145: no packages for Image SLES15-SP5-Manager-Server-5-0-BYOS-Azure, but entry?
CVE-2024-31145: no packages for Image SLES15-SP5-Azure-Basic, but entry?
CVE-2024-31145: no packages for Image SLES15-SP5-HPC-BYOS-EC2, but entry?
CVE-2024-31145: no packages for Image SLES15-SP3-CHOST-BYOS-Azure, but entry?
CVE-2024-31145: no packages for Image SLES15-SP5-Micro-5-5-BYOS, but entry?
CVE-2024-31145: no packages for Image SLES15-SP5-Micro-5-5-GCE, but entry?
CVE-2024-31145: no packages for Image SLES15-SP5-SAP-Hardened-BYOS-GCE, but entry?
CVE-2024-31145: no packages for Image SLES15-SP5-HPC-BYOS-Azure, but entry?
CVE-2024-31145: no packages for Image SLES15-SP3-SAP-BYOS-GCE, but entry?
CVE-2024-31145: no packages for Image SLES15-SP3-Micro-5-2-BYOS-Azure, but entry?
CVE-2024-31145: no packages for Image SLES12-SP5-EC2-BYOS, but entry?
CVE-2024-31145: no packages for Image SLES15-SP3-SAP-BYOS-EC2-HVM, but entry?
CVE-2024-31145: no packages for Image SLES15-SP5-SAP-Hardened-GCE, but entry?
CVE-2024-31145: no packages for Image SLES15-SP6-CHOST-BYOS-SAP-CCloud, but entry?
CVE-2024-31145: no packages for Image SLES15-SP5-CHOST-BYOS-EC2, but entry?
CVE-2024-31145: no packages for SUSE Linux Enterprise Micro 5.5, but entry?
no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2024-31145
CVE-2024-31145: no packages for Image SLES12-SP5-EC2-BYOS, but entry?
CVE-2024-31145: no packages for Image SLES15-SP3-CHOST-BYOS-Aliyun, but entry?
CVE-2024-31145: no packages for Image SLES15-SP3-CHOST-BYOS-Azure, but entry?
CVE-2024-31145: no packages for Image SLES15-SP3-CHOST-BYOS-EC2, but entry?
CVE-2024-31145: no packages for Image SLES15-SP3-CHOST-BYOS-GCE, but entry?
CVE-2024-31145: no packages for Image SLES15-SP3-Micro-5-1-BYOS-Azure, but entry?
CVE-2024-31145: no packages for Image SLES15-SP3-Micro-5-1-BYOS-EC2-HVM, but entry?
CVE-2024-31145: no packages for Image SLES15-SP3-Micro-5-1-BYOS-GCE, but entry?
CVE-2024-31145: no packages for Image SLES15-SP3-Micro-5-2-BYOS-Azure, but entry?
CVE-2024-31145: no packages for Image SLES15-SP3-Micro-5-2-BYOS-EC2-HVM, but entry?
CVE-2024-31145: no packages for Image SLES15-SP3-Micro-5-2-BYOS-GCE, but entry?
CVE-2024-31145: no packages for Image SLES15-SP3-SAP-Azure-LI-BYOS-Production, but entry?
CVE-2024-31145: no packages for Image SLES15-SP3-SAP-Azure-VLI-BYOS-Production, but entry?
CVE-2024-31145: no packages for Image SLES15-SP3-SAP-BYOS-Azure, but entry?
CVE-2024-31145: no packages for Image SLES15-SP3-SAP-BYOS-EC2-HVM, but entry?
CVE-2024-31145: no packages for Image SLES15-SP3-SAP-BYOS-GCE, but entry?
CVE-2024-31145: no packages for Image SLES15-SP4-SAP-Azure-LI-BYOS, but entry?
CVE-2024-31145: no packages for Image SLES15-SP4-SAP-Azure-LI-BYOS-Production, but entry?
CVE-2024-31145: no packages for Image SLES15-SP4-SAP-Azure-VLI-BYOS, but entry?
CVE-2024-31145: no packages for Image SLES15-SP4-SAP-Azure-VLI-BYOS-Production, but entry?
CVE-2024-31145: no packages for Image SLES15-SP5-Azure-Basic, but entry?
CVE-2024-31145: no packages for Image SLES15-SP5-Azure-Standard, but entry?
CVE-2024-31145: no packages for Image SLES15-SP5-BYOS-Azure, but entry?
CVE-2024-31145: no packages for Image SLES15-SP5-BYOS-EC2, but entry?
CVE-2024-31145: no packages for Image SLES15-SP5-BYOS-GCE, but entry?
CVE-2024-31145: no packages for Image SLES15-SP5-CHOST-BYOS-Aliyun, but entry?
CVE-2024-31145: no packages for Image SLES15-SP5-CHOST-BYOS-Azure, but entry?
CVE-2024-31145: no packages for Image SLES15-SP5-CHOST-BYOS-EC2, but entry?
CVE-2024-31145: no packages for Image SLES15-SP5-CHOST-BYOS-GCE, but entry?
CVE-2024-31145: no packages for Image SLES15-SP5-CHOST-BYOS-GDC, but entry?
CVE-2024-31145: no packages for Image SLES15-SP5-CHOST-BYOS-SAP-CCloud, but entry?
CVE-2024-31145: no packages for Image SLES15-SP5-EC2, but entry?
CVE-2024-31145: no packages for Image SLES15-SP5-GCE, but entry?
CVE-2024-31145: no packages for Image SLES15-SP5-HPC-Azure, but entry?
CVE-2024-31145: no packages for Image SLES15-SP5-HPC-BYOS-Azure, but entry?
CVE-2024-31145: no packages for Image SLES15-SP5-HPC-BYOS-EC2, but entry?
CVE-2024-31145: no packages for Image SLES15-SP5-HPC-BYOS-GCE, but entry?
CVE-2024-31145: no packages for Image SLES15-SP5-Hardened-BYOS-Azure, but entry?
CVE-2024-31145: no packages for Image SLES15-SP5-Hardened-BYOS-GCE, but entry?
CVE-2024-31145: no packages for Image SLES15-SP5-Manager-Proxy-5-0-BYOS, but entry?
CVE-2024-31145: no packages for Image SLES15-SP5-Manager-Proxy-5-0-BYOS-Azure, but entry?
CVE-2024-31145: no packages for Image SLES15-SP5-Manager-Proxy-5-0-BYOS-EC2, but entry?
CVE-2024-31145: no packages for Image SLES15-SP5-Manager-Proxy-5-0-BYOS-GCE, but entry?
CVE-2024-31145: no packages for Image SLES15-SP5-Manager-Server-5-0-BYOS, but entry?
CVE-2024-31145: no packages for Image SLES15-SP5-Manager-Server-5-0-BYOS-Azure, but entry?
CVE-2024-31145: no packages for Image SLES15-SP5-Manager-Server-5-0-BYOS-EC2, but entry?
CVE-2024-31145: no packages for Image SLES15-SP5-Manager-Server-5-0-BYOS-GCE, but entry?
CVE-2024-31145: no packages for Image SLES15-SP5-Micro-5-5, but entry?
CVE-2024-31145: no packages for Image SLES15-SP5-Micro-5-5-BYOS, but entry?
CVE-2024-31145: no packages for Image SLES15-SP5-Micro-5-5-BYOS-GCE, but entry?
CVE-2024-31145: no packages for Image SLES15-SP5-Micro-5-5-EC2, but entry?
CVE-2024-31145: no packages for Image SLES15-SP5-Micro-5-5-GCE, but entry?
CVE-2024-31145: no packages for Image SLES15-SP5-SAP-Azure-LI-BYOS, but entry?
CVE-2024-31145: no packages for Image SLES15-SP5-SAP-Azure-LI-BYOS-Production, but entry?
CVE-2024-31145: no packages for Image SLES15-SP5-SAP-Azure-VLI-BYOS, but entry?
CVE-2024-31145: no packages for Image SLES15-SP5-SAP-Azure-VLI-BYOS-Production, but entry?
CVE-2024-31145: no packages for Image SLES15-SP5-SAP-BYOS-Azure, but entry?
CVE-2024-31145: no packages for Image SLES15-SP5-SAP-BYOS-EC2, but entry?
CVE-2024-31145: no packages for Image SLES15-SP5-SAP-BYOS-GCE, but entry?
CVE-2024-31145: no packages for Image SLES15-SP5-SAP-Hardened-Azure, but entry?
CVE-2024-31145: no packages for Image SLES15-SP5-SAP-Hardened-BYOS-Azure, but entry?
CVE-2024-31145: no packages for Image SLES15-SP5-SAP-Hardened-BYOS-EC2, but entry?
CVE-2024-31145: no packages for Image SLES15-SP5-SAP-Hardened-BYOS-GCE, but entry?
CVE-2024-31145: no packages for Image SLES15-SP5-SAP-Hardened-GCE, but entry?
CVE-2024-31145: no packages for Image SLES15-SP5-SAPCAL-Azure, but entry?
CVE-2024-31145: no packages for Image SLES15-SP5-SAPCAL-EC2, but entry?
CVE-2024-31145: no packages for Image SLES15-SP5-SAPCAL-GCE, but entry?
CVE-2024-31145: no packages for Image SLES15-SP6-CHOST-BYOS, but entry?
CVE-2024-31145: no packages for Image SLES15-SP6-CHOST-BYOS-Aliyun, but entry?
CVE-2024-31145: no packages for Image SLES15-SP6-CHOST-BYOS-Azure, but entry?
CVE-2024-31145: no packages for Image SLES15-SP6-CHOST-BYOS-EC2, but entry?
CVE-2024-31145: no packages for Image SLES15-SP6-CHOST-BYOS-GCE, but entry?
CVE-2024-31145: no packages for Image SLES15-SP6-CHOST-BYOS-GDC, but entry?
CVE-2024-31145: no packages for Image SLES15-SP6-CHOST-BYOS-SAP-CCloud, but entry?
CVE-2024-31145: no packages for Image SLES15-SP6-SAP-Azure-LI-BYOS, but entry?
CVE-2024-31145: no packages for Image SLES15-SP6-SAP-Azure-LI-BYOS-Production, but entry?
CVE-2024-31145: no packages for Image SLES15-SP6-SAP-Azure-VLI-BYOS, but entry?
CVE-2024-31145: no packages for Image SLES15-SP6-SAP-Azure-VLI-BYOS-Production, but entry?
CVE-2024-31145: no packages for SUSE Linux Enterprise Micro 5.1, but entry?
CVE-2024-31145: no packages for SUSE Linux Enterprise Micro 5.2, but entry?
CVE-2024-31145: no packages for SUSE Linux Enterprise Micro 5.3, but entry?
CVE-2024-31145: no packages for SUSE Linux Enterprise Micro 5.4, but entry?
CVE-2024-31145: no packages for SUSE Linux Enterprise Micro 5.5, but entry?
CVE-2024-31145: no packages for SUSE Linux Enterprise Module for Basesystem 15 SP5, but entry?
CVE-2024-31145: no packages for SUSE Linux Enterprise Module for Basesystem 15 SP6, but entry?
CVE-2024-31145: no packages for SUSE Linux Enterprise Software Development Kit 12 SP5, but entry?
CVE-2024-31145: no packages for openSUSE Leap Micro 5.5, but entry?
CVE-2024-31145: no packages for Image SLES12-SP5-EC2-BYOS, but entry?
CVE-2024-31145: no packages for Image SLES15-SP3-CHOST-BYOS-Aliyun, but entry?
CVE-2024-31145: no packages for Image SLES15-SP3-CHOST-BYOS-Azure, but entry?
CVE-2024-31145: no packages for Image SLES15-SP3-CHOST-BYOS-EC2, but entry?
CVE-2024-31145: no packages for Image SLES15-SP3-CHOST-BYOS-GCE, but entry?
CVE-2024-31145: no packages for Image SLES15-SP3-Micro-5-1-BYOS-Azure, but entry?
CVE-2024-31145: no packages for Image SLES15-SP3-Micro-5-1-BYOS-EC2-HVM, but entry?
CVE-2024-31145: no packages for Image SLES15-SP3-Micro-5-1-BYOS-GCE, but entry?
CVE-2024-31145: no packages for Image SLES15-SP3-Micro-5-2-BYOS-Azure, but entry?
CVE-2024-31145: no packages for Image SLES15-SP3-Micro-5-2-BYOS-EC2-HVM, but entry?
CVE-2024-31145: no packages for Image SLES15-SP3-Micro-5-2-BYOS-GCE, but entry?
CVE-2024-31145: no packages for Image SLES15-SP3-SAP-Azure-LI-BYOS-Production, but entry?
CVE-2024-31145: no packages for Image SLES15-SP3-SAP-Azure-VLI-BYOS-Production, but entry?
CVE-2024-31145: no packages for Image SLES15-SP3-SAP-BYOS-Azure, but entry?
CVE-2024-31145: no packages for Image SLES15-SP3-SAP-BYOS-EC2-HVM, but entry?
CVE-2024-31145: no packages for Image SLES15-SP3-SAP-BYOS-GCE, but entry?
CVE-2024-31145: no packages for Image SLES15-SP4-SAP-Azure-LI-BYOS, but entry?
CVE-2024-31145: no packages for Image SLES15-SP4-SAP-Azure-LI-BYOS-Production, but entry?
CVE-2024-31145: no packages for Image SLES15-SP4-SAP-Azure-VLI-BYOS, but entry?
CVE-2024-31145: no packages for Image SLES15-SP4-SAP-Azure-VLI-BYOS-Production, but entry?
CVE-2024-31145: no packages for Image SLES15-SP5-Azure-Basic, but entry?
CVE-2024-31145: no packages for Image SLES15-SP5-Azure-Standard, but entry?
CVE-2024-31145: no packages for Image SLES15-SP5-BYOS-Azure, but entry?
CVE-2024-31145: no packages for Image SLES15-SP5-BYOS-EC2, but entry?
CVE-2024-31145: no packages for Image SLES15-SP5-BYOS-GCE, but entry?
CVE-2024-31145: no packages for Image SLES15-SP5-CHOST-BYOS-Aliyun, but entry?
CVE-2024-31145: no packages for Image SLES15-SP5-CHOST-BYOS-Azure, but entry?
CVE-2024-31145: no packages for Image SLES15-SP5-CHOST-BYOS-EC2, but entry?
CVE-2024-31145: no packages for Image SLES15-SP5-CHOST-BYOS-GCE, but entry?
CVE-2024-31145: no packages for Image SLES15-SP5-CHOST-BYOS-GDC, but entry?
CVE-2024-31145: no packages for Image SLES15-SP5-CHOST-BYOS-SAP-CCloud, but entry?
CVE-2024-31145: no packages for Image SLES15-SP5-EC2, but entry?
CVE-2024-31145: no packages for Image SLES15-SP5-GCE, but entry?
CVE-2024-31145: no packages for Image SLES15-SP5-HPC-Azure, but entry?
CVE-2024-31145: no packages for Image SLES15-SP5-HPC-BYOS-Azure, but entry?
CVE-2024-31145: no packages for Image SLES15-SP5-HPC-BYOS-EC2, but entry?
CVE-2024-31145: no packages for Image SLES15-SP5-HPC-BYOS-GCE, but entry?
CVE-2024-31145: no packages for Image SLES15-SP5-Hardened-BYOS-Azure, but entry?
CVE-2024-31145: no packages for Image SLES15-SP5-Hardened-BYOS-GCE, but entry?
CVE-2024-31145: no packages for Image SLES15-SP5-Manager-Proxy-5-0-BYOS, but entry?
CVE-2024-31145: no packages for Image SLES15-SP5-Manager-Proxy-5-0-BYOS-Azure, but entry?
CVE-2024-31145: no packages for Image SLES15-SP5-Manager-Proxy-5-0-BYOS-EC2, but entry?
CVE-2024-31145: no packages for Image SLES15-SP5-Manager-Proxy-5-0-BYOS-GCE, but entry?
CVE-2024-31145: no packages for Image SLES15-SP5-Manager-Server-5-0-BYOS, but entry?
CVE-2024-31145: no packages for Image SLES15-SP5-Manager-Server-5-0-BYOS-Azure, but entry?
CVE-2024-31145: no packages for Image SLES15-SP5-Manager-Server-5-0-BYOS-EC2, but entry?
CVE-2024-31145: no packages for Image SLES15-SP5-Manager-Server-5-0-BYOS-GCE, but entry?
CVE-2024-31145: no packages for Image SLES15-SP5-Micro-5-5, but entry?
CVE-2024-31145: no packages for Image SLES15-SP5-Micro-5-5-BYOS, but entry?
CVE-2024-31145: no packages for Image SLES15-SP5-Micro-5-5-BYOS-GCE, but entry?
CVE-2024-31145: no packages for Image SLES15-SP5-Micro-5-5-EC2, but entry?
CVE-2024-31145: no packages for Image SLES15-SP5-Micro-5-5-GCE, but entry?
CVE-2024-31145: no packages for Image SLES15-SP5-SAP-Azure-LI-BYOS, but entry?
CVE-2024-31145: no packages for Image SLES15-SP5-SAP-Azure-LI-BYOS-Production, but entry?
CVE-2024-31145: no packages for Image SLES15-SP5-SAP-Azure-VLI-BYOS, but entry?
CVE-2024-31145: no packages for Image SLES15-SP5-SAP-Azure-VLI-BYOS-Production, but entry?
CVE-2024-31145: no packages for Image SLES15-SP5-SAP-BYOS-Azure, but entry?
CVE-2024-31145: no packages for Image SLES15-SP5-SAP-BYOS-EC2, but entry?
CVE-2024-31145: no packages for Image SLES15-SP5-SAP-BYOS-GCE, but entry?
CVE-2024-31145: no packages for Image SLES15-SP5-SAP-Hardened-Azure, but entry?
CVE-2024-31145: no packages for Image SLES15-SP5-SAP-Hardened-BYOS-Azure, but entry?
CVE-2024-31145: no packages for Image SLES15-SP5-SAP-Hardened-BYOS-EC2, but entry?
CVE-2024-31145: no packages for Image SLES15-SP5-SAP-Hardened-BYOS-GCE, but entry?
CVE-2024-31145: no packages for Image SLES15-SP5-SAP-Hardened-GCE, but entry?
CVE-2024-31145: no packages for Image SLES15-SP5-SAPCAL-Azure, but entry?
CVE-2024-31145: no packages for Image SLES15-SP5-SAPCAL-EC2, but entry?
CVE-2024-31145: no packages for Image SLES15-SP5-SAPCAL-GCE, but entry?
CVE-2024-31145: no packages for Image SLES15-SP6-CHOST-BYOS, but entry?
CVE-2024-31145: no packages for Image SLES15-SP6-CHOST-BYOS-Aliyun, but entry?
CVE-2024-31145: no packages for Image SLES15-SP6-CHOST-BYOS-Azure, but entry?
CVE-2024-31145: no packages for Image SLES15-SP6-CHOST-BYOS-EC2, but entry?
CVE-2024-31145: no packages for Image SLES15-SP6-CHOST-BYOS-GCE, but entry?
CVE-2024-31145: no packages for Image SLES15-SP6-CHOST-BYOS-GDC, but entry?
CVE-2024-31145: no packages for Image SLES15-SP6-CHOST-BYOS-SAP-CCloud, but entry?
CVE-2024-31145: no packages for Image SLES15-SP6-SAP-Azure-LI-BYOS, but entry?
CVE-2024-31145: no packages for Image SLES15-SP6-SAP-Azure-LI-BYOS-Production, but entry?
CVE-2024-31145: no packages for Image SLES15-SP6-SAP-Azure-VLI-BYOS, but entry?
CVE-2024-31145: no packages for Image SLES15-SP6-SAP-Azure-VLI-BYOS-Production, but entry?
CVE-2024-31145: no packages for SUSE Linux Enterprise Micro 5.1, but entry?
CVE-2024-31145: no packages for SUSE Linux Enterprise Micro 5.2, but entry?
CVE-2024-31145: no packages for SUSE Linux Enterprise Micro 5.3, but entry?
CVE-2024-31145: no packages for SUSE Linux Enterprise Micro 5.4, but entry?
CVE-2024-31145: no packages for SUSE Linux Enterprise Micro 5.5, but entry?
CVE-2024-31145: no packages for SUSE Linux Enterprise Module for Basesystem 15 SP5, but entry?
CVE-2024-31145: no packages for SUSE Linux Enterprise Module for Basesystem 15 SP6, but entry?
CVE-2024-31145: no packages for SUSE Linux Enterprise Software Development Kit 12 SP5, but entry?
CVE-2024-31145: no packages for openSUSE Leap Micro 5.5, but entry?
CVE-2024-31143: no packages for Image SLES15-SP5-SAP-Azure-VLI-BYOS, but entry?
CVE-2024-31143: no packages for Image SLES15-SP6-SAPCAL, but entry?
CVE-2024-31143: no packages for Image SLES15-SP6-CHOST-BYOS-Azure, but entry?
CVE-2024-31143: no packages for SUSE Linux Enterprise Module for Basesystem 15 SP6, but entry?
CVE-2024-31143: no packages for Image SLES15-SP5-EC2, but entry?
CVE-2024-31143: no packages for Image SLES15-SP5-SAP-Azure-LI-BYOS-Production, but entry?
CVE-2024-31143: no packages for Image SLES15-SP3-HPC-BYOS-Azure, but entry?
CVE-2024-31143: no packages for Image SLES15-SP3-SAP-Azure-VLI-BYOS-Production, but entry?
CVE-2024-31143: no packages for Image SLES15-SP6-SAP-Hardened-BYOS-Azure, but entry?
CVE-2024-31143: no packages for Image SLES15-SP6-Hardened-BYOS, but entry?
CVE-2024-31143: no packages for Image SLES15-SP3-SAPCAL-Azure, but entry?
CVE-2024-31143: no packages for Image SLES15-SP6-BYOS-GCE, but entry?
CVE-2024-31143: no packages for Image SLES15-SP3-Micro-5-2-BYOS-EC2-HVM, but entry?
CVE-2024-31143: no packages for Image SLES15-SP6-Hardened-BYOS-EC2, but entry?
CVE-2024-31143: no packages for Image SLES15-SP5-Manager-Server-5-0-BYOS-Azure, but entry?
CVE-2024-31143: no packages for Image SLES15-SP5-Azure-Basic, but entry?
CVE-2024-31143: no packages for Image SLES15-SP6-HPC-BYOS-Azure, but entry?
CVE-2024-31143: no packages for Image SLES15-SP3-HPC-BYOS-EC2-HVM, but entry?
CVE-2024-31143: no packages for Image SLES15-SP6-CHOST-BYOS-Aliyun, but entry?
CVE-2024-31143: no packages for Image SLES15-SP3-BYOS-Azure, but entry?
CVE-2024-31143: no packages for Image SLES15-SP5-BYOS-GCE, but entry?
CVE-2024-31143: no packages for Image SLES15-SP5-Manager-Proxy-5-0-BYOS, but entry?
CVE-2024-31143: no packages for Image SLES15-SP6-SAP-Hardened-BYOS-GCE, but entry?
CVE-2024-31143: no packages for Image SLES15-SP5-HPC-BYOS-Azure, but entry?
CVE-2024-31143: no packages for Image SLES15-SP5-SAP-Hardened-BYOS-GCE, but entry?
CVE-2024-31143: no packages for Image SLES15-SP6-EC2-ECS-HVM, but entry?
CVE-2024-31143: no packages for Image SLES15-SP5-Micro-5-5-BYOS, but entry?
CVE-2024-31143: no packages for Image SLES15-SP5-Micro-5-5-GCE, but entry?
CVE-2024-31143: no packages for Image SLES15-SP3-CHOST-BYOS-Azure, but entry?
CVE-2024-31143: no packages for Image SLES15-SP6-SAPCAL-EC2, but entry?
CVE-2024-31143: no packages for Image SLES15-SP5-HPC-BYOS-EC2, but entry?
CVE-2024-31143: no packages for Image SLES15-SP6-SAP-BYOS-Azure, but entry?
CVE-2024-31143: no packages for SUSE Linux Enterprise Micro 5.5, but entry?
CVE-2024-31143: no packages for Image SLES15-SP5-CHOST-BYOS-EC2, but entry?
CVE-2024-31143: no packages for Image SLES15-SP6-HPC, but entry?
CVE-2024-31143: no packages for Image SLES15-SP6-CHOST-BYOS-SAP-CCloud, but entry?
CVE-2024-31143: no packages for Image SLES15-SP5-SAP-Hardened-GCE, but entry?
CVE-2024-31143: no packages for Image SLES15-SP3-SAP-BYOS-EC2-HVM, but entry?
CVE-2024-31143: no packages for Image SLES15-SP3-Micro-5-2-BYOS-Azure, but entry?
CVE-2024-31143: no packages for Image SLES15-SP3-SAP-BYOS-GCE, but entry?
CVE-2024-31143: no packages for Image SLES15-SP6-HPC-BYOS-GCE, but entry?
CVE-2024-31143: no packages for Image SLES12-SP5-EC2-BYOS, but entry?
CVE-2024-31143: no packages for Image SLES15-SP3-HPC-BYOS-GCE, but entry?
CVE-2024-31143: no packages for Image SLES15-SP5-CHOST-BYOS-Aliyun, but entry?
CVE-2024-31143: no packages for Image SLES15-SP6-SAP-Azure-LI-BYOS-Production, but entry?
CVE-2024-31143: no packages for SUSE Linux Enterprise Micro 5.3, but entry?
CVE-2024-31143: no packages for Image SLES15-SP5-CHOST-BYOS-GDC, but entry?
CVE-2024-31143: no packages for Image SLES15-SP6-SAP-BYOS-EC2, but entry?
CVE-2024-31143: no packages for Image SLES15-SP5-Micro-5-5-BYOS-EC2, but entry?
CVE-2024-31143: no packages for Image SLES15-SP6-BYOS-Azure, but entry?
CVE-2024-31143: no packages for Image SLES15-SP3-CHOST-BYOS-GCE, but entry?
CVE-2024-31143: no packages for Image SLES15-SP6-CHOST-BYOS-GDC, but entry?
CVE-2024-31143: no packages for Image SLES15-SP5-Manager-Server-5-0-BYOS-EC2, but entry?
CVE-2024-31143: no packages for Image SLES15-SP3-Micro-5-2-BYOS-GCE, but entry?
CVE-2024-31143: no packages for Image SLES15-SP6-CHOST-BYOS-GCE, but entry?
CVE-2024-31143: no packages for Image SLES15-SP3-CHOST-BYOS-Aliyun, but entry?
CVE-2024-31143: no packages for Image SLES15-SP6-SAP-Hardened-BYOS, but entry?
CVE-2024-31143: no packages for SUSE Linux Enterprise Software Development Kit 12 SP5, but entry?
CVE-2024-31143: no packages for Image SLES15-SP4-SAP-Azure-LI-BYOS-Production, but entry?
CVE-2024-31143: no packages for Image SLES15-SP3-SAPCAL-EC2-HVM, but entry?
CVE-2024-31143: no packages for Image SLES15-SP4-SAP-Azure-LI-BYOS, but entry?
CVE-2024-31143: no packages for SUSE Linux Enterprise Micro 5.4, but entry?
CVE-2024-31143: no packages for Image SLES15-SP3-SAP-BYOS-Azure, but entry?
CVE-2024-31143: no packages for Image SLES15-SP5-CHOST-BYOS-Azure, but entry?
CVE-2024-31143: no packages for Image SLES15-SP6-BYOS, but entry?
CVE-2024-31143: no packages for Image SLES15-SP5-Micro-5-5-BYOS-GCE, but entry?
CVE-2024-31143: no packages for Image SLES15-SP6-SAP-BYOS, but entry?
CVE-2024-31143: no packages for Image SLES15-SP3-CHOST-BYOS-EC2, but entry?
CVE-2024-31143: no packages for openSUSE Leap Micro 5.5, but entry?
CVE-2024-31143: no packages for SUSE Linux Enterprise Module for Basesystem 15 SP5, but entry?
CVE-2024-31143: no packages for Image SLES15-SP6-EC2, but entry?
CVE-2024-31143: no packages for Image SLES15-SP6-Hardened-BYOS-Azure, but entry?
CVE-2024-31143: no packages for Image SLES15-SP5-Azure-Standard, but entry?
CVE-2024-31143: no packages for Image SLES12-SP5-EC2-ECS-On-Demand, but entry?
CVE-2024-31143: no packages for Image SLES15-SP3-SAPCAL-GCE, but entry?
CVE-2024-31143: no packages for Image SLES15-SP3-BYOS-EC2-HVM, but entry?
CVE-2024-31143: no packages for Image SLES15-SP5-Micro-5-5, but entry?
CVE-2024-31143: no packages for Image SLES15-SP6-Azure-Standard, but entry?
CVE-2024-31143: no packages for Image SLES15-SP6-SAP, but entry?
CVE-2024-31143: no packages for Image SLES15-SP5-Hardened-BYOS-GCE, but entry?
CVE-2024-31143: no packages for Image SLES15-SP5-GCE, but entry?
CVE-2024-31143: no packages for Image SLES12-SP5-EC2-SAP-On-Demand, but entry?
CVE-2024-31143: no packages for Image SLES15-SP5-SAP-BYOS-GCE, but entry?
CVE-2024-31143: no packages for Image SLES15-SP5-SAP-Hardened-Azure, but entry?
CVE-2024-31143: no packages for Image SLES15-SP5-SAP-Hardened-BYOS-EC2, but entry?
CVE-2024-31143: no packages for Image SLES15-SP6-SAP-BYOS-GCE, but entry?
CVE-2024-31143: no packages for Image SLES15-SP6-CHOST-BYOS-EC2, but entry?
CVE-2024-31143: no packages for Image SLES15-SP6-HPC-GCE, but entry?
CVE-2024-31143: no packages for Image SLES15-SP5-Manager-Proxy-5-0-BYOS-EC2, but entry?
CVE-2024-31143: no packages for Image SLES15-SP6-CHOST-BYOS, but entry?
CVE-2024-31143: no packages for Image SLES15-SP6-SAP-Hardened-EC2, but entry?
CVE-2024-31143: no packages for Image SLES15-SP5-SAPCAL-EC2, but entry?
CVE-2024-31143: no packages for Image SLES15-SP6-HPC-EC2, but entry?
CVE-2024-31143: no packages for Image SLES15-SP3-BYOS-GCE, but entry?
CVE-2024-31143: no packages for Image SLES15-SP3-CHOST-BYOS-SAP-CCloud, but entry?
CVE-2024-31143: no packages for Image SLES15-SP6-GCE, but entry?
CVE-2024-31143: no packages for Image SLES15-SP6-SAP-Azure-LI-BYOS, but entry?
CVE-2024-31143: no packages for Image SLES15-SP6-SAP-Hardened-BYOS-EC2, but entry?
CVE-2024-31143: no packages for Image SLES15-SP4-SAP-Azure-VLI-BYOS, but entry?
CVE-2024-31143: no packages for Image SLES15-SP6-SAP-Hardened-Azure, but entry?
CVE-2024-31143: no packages for Image SLES15-SP3-Micro-5-1-BYOS-EC2-HVM, but entry?
CVE-2024-31143: no packages for Image SLES15-SP6-SAP-EC2, but entry?
CVE-2024-31143: no packages for Image SLES15-SP5-SAP-BYOS-EC2, but entry?
CVE-2024-31143: no packages for Image SLES15-SP5-HPC-BYOS-GCE, but entry?
CVE-2024-31143: no packages for Image SLES15-SP3-SAP-Azure-LI-BYOS-Production, but entry?
CVE-2024-31143: no packages for Image SLES15-SP6-SAP-Hardened, but entry?
CVE-2024-31143: no packages for Image SLES15-SP6-SAP-Azure-VLI-BYOS-Production, but entry?
CVE-2024-31143: no packages for Image SLES15-SP6-BYOS-EC2, but entry?
CVE-2024-31143: no packages for Image SLES15-SP5-Manager-Server-5-0-BYOS, but entry?
CVE-2024-31143: no packages for Image SLES12-SP5-EC2-On-Demand, but entry?
CVE-2024-31143: no packages for Image SLES12-SP5-EC2-SAP-BYOS, but entry?
CVE-2024-31143: no packages for Image SLES15-SP3-Micro-5-1-BYOS-Azure, but entry?
CVE-2024-31143: no packages for Image SLES15-SP5-SAP-Hardened-BYOS-Azure, but entry?
CVE-2024-31143: no packages for SUSE Linux Enterprise Micro 5.2, but entry?
CVE-2024-31143: no packages for Image SLES15-SP5-CHOST-BYOS-SAP-CCloud, but entry?
CVE-2024-31143: no packages for Image SLES15-SP5-Manager-Server-5-0-BYOS-GCE, but entry?
CVE-2024-31143: no packages for Image SLES15-SP6, but entry?
CVE-2024-31143: no packages for Image SLES15-SP5-BYOS-EC2, but entry?
CVE-2024-31143: no packages for Image SLES15-SP5-SAP-BYOS-Azure, but entry?
CVE-2024-31143: no packages for Image SLES15-SP5-SAPCAL-Azure, but entry?
CVE-2024-31143: no packages for Image SLES15-SP5-SAP-Azure-LI-BYOS, but entry?
CVE-2024-31143: no packages for Image SLES15-SP5-Micro-5-5-EC2, but entry?
CVE-2024-31143: no packages for Image SLES15-SP6-Hardened-BYOS-GCE, but entry?
CVE-2024-31143: no packages for Image SLES15-SP5-SAPCAL-GCE, but entry?
CVE-2024-31143: no packages for Image SLES15-SP6-HPC-Azure, but entry?
CVE-2024-31143: no packages for Image SLES15-SP5-CHOST-BYOS-GCE, but entry?
CVE-2024-31143: no packages for Image SLES15-SP6-SAP-Azure, but entry?
CVE-2024-31143: no packages for Image SLES15-SP4-SAP-Azure-VLI-BYOS-Production, but entry?
CVE-2024-31143: no packages for Image SLES15-SP6-SAPCAL-GCE, but entry?
CVE-2024-31143: no packages for Image SLES15-SP5-Manager-Proxy-5-0-BYOS-Azure, but entry?
CVE-2024-31143: no packages for Image SLES15-SP6-SAP-GCE, but entry?
CVE-2024-31143: no packages for Image SLES15-SP6-SAP-Hardened-GCE, but entry?
CVE-2024-31143: no packages for Image SLES15-SP5-BYOS-Azure, but entry?
CVE-2024-31143: no packages for SUSE Linux Enterprise Micro 5.1, but entry?
CVE-2024-31143: no packages for Image SLES15-SP5-SAP-Azure-VLI-BYOS-Production, but entry?
CVE-2024-31143: no packages for Image SLES15-SP6-HPC-BYOS-EC2, but entry?
CVE-2024-31143: no packages for Image SLES15-SP5-HPC-Azure, but entry?
CVE-2024-31143: no packages for Image SLES15-SP3-Micro-5-1-BYOS-GCE, but entry?
CVE-2024-31143: no packages for Image SLES15-SP6-HPC-BYOS, but entry?
CVE-2024-31143: no packages for Image SLES15-SP6-SAPCAL-Azure, but entry?
CVE-2024-31143: no packages for Image SLES15-SP6-Azure-Basic, but entry?
CVE-2024-31143: no packages for Image SLES15-SP6-SAP-Azure-VLI-BYOS, but entry?
CVE-2024-31143: no packages for Image SLES15-SP5-Hardened-BYOS-Azure, but entry?
CVE-2024-31143: no packages for Image SLES15-SP5-Manager-Proxy-5-0-BYOS-GCE, but entry?
no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2024-31143
CVE-2024-31143: no packages for Image SLES12-SP5-EC2-BYOS, but entry?
CVE-2024-31143: no packages for Image SLES12-SP5-EC2-ECS-On-Demand, but entry?
CVE-2024-31143: no packages for Image SLES12-SP5-EC2-On-Demand, but entry?
CVE-2024-31143: no packages for Image SLES12-SP5-EC2-SAP-BYOS, but entry?
CVE-2024-31143: no packages for Image SLES12-SP5-EC2-SAP-On-Demand, but entry?
CVE-2024-31143: no packages for Image SLES15-SP3-BYOS-Azure, but entry?
CVE-2024-31143: no packages for Image SLES15-SP3-BYOS-EC2-HVM, but entry?
CVE-2024-31143: no packages for Image SLES15-SP3-BYOS-GCE, but entry?
CVE-2024-31143: no packages for Image SLES15-SP3-CHOST-BYOS-Aliyun, but entry?
CVE-2024-31143: no packages for Image SLES15-SP3-CHOST-BYOS-Azure, but entry?
CVE-2024-31143: no packages for Image SLES15-SP3-CHOST-BYOS-EC2, but entry?
CVE-2024-31143: no packages for Image SLES15-SP3-CHOST-BYOS-GCE, but entry?
CVE-2024-31143: no packages for Image SLES15-SP3-CHOST-BYOS-SAP-CCloud, but entry?
CVE-2024-31143: no packages for Image SLES15-SP3-HPC-BYOS-Azure, but entry?
CVE-2024-31143: no packages for Image SLES15-SP3-HPC-BYOS-EC2-HVM, but entry?
CVE-2024-31143: no packages for Image SLES15-SP3-HPC-BYOS-GCE, but entry?
CVE-2024-31143: no packages for Image SLES15-SP3-Micro-5-1-BYOS-Azure, but entry?
CVE-2024-31143: no packages for Image SLES15-SP3-Micro-5-1-BYOS-EC2-HVM, but entry?
CVE-2024-31143: no packages for Image SLES15-SP3-Micro-5-1-BYOS-GCE, but entry?
CVE-2024-31143: no packages for Image SLES15-SP3-Micro-5-2-BYOS-Azure, but entry?
CVE-2024-31143: no packages for Image SLES15-SP3-Micro-5-2-BYOS-EC2-HVM, but entry?
CVE-2024-31143: no packages for Image SLES15-SP3-Micro-5-2-BYOS-GCE, but entry?
CVE-2024-31143: no packages for Image SLES15-SP3-SAP-Azure-LI-BYOS-Production, but entry?
CVE-2024-31143: no packages for Image SLES15-SP3-SAP-Azure-VLI-BYOS-Production, but entry?
CVE-2024-31143: no packages for Image SLES15-SP3-SAP-BYOS-Azure, but entry?
CVE-2024-31143: no packages for Image SLES15-SP3-SAP-BYOS-EC2-HVM, but entry?
CVE-2024-31143: no packages for Image SLES15-SP3-SAP-BYOS-GCE, but entry?
CVE-2024-31143: no packages for Image SLES15-SP3-SAPCAL-Azure, but entry?
CVE-2024-31143: no packages for Image SLES15-SP3-SAPCAL-EC2-HVM, but entry?
CVE-2024-31143: no packages for Image SLES15-SP3-SAPCAL-GCE, but entry?
CVE-2024-31143: no packages for Image SLES15-SP4-SAP-Azure-LI-BYOS, but entry?
CVE-2024-31143: no packages for Image SLES15-SP4-SAP-Azure-LI-BYOS-Production, but entry?
CVE-2024-31143: no packages for Image SLES15-SP4-SAP-Azure-VLI-BYOS, but entry?
CVE-2024-31143: no packages for Image SLES15-SP4-SAP-Azure-VLI-BYOS-Production, but entry?
CVE-2024-31143: no packages for Image SLES15-SP5-Azure-Basic, but entry?
CVE-2024-31143: no packages for Image SLES15-SP5-Azure-Standard, but entry?
CVE-2024-31143: no packages for Image SLES15-SP5-BYOS-Azure, but entry?
CVE-2024-31143: no packages for Image SLES15-SP5-BYOS-EC2, but entry?
CVE-2024-31143: no packages for Image SLES15-SP5-BYOS-GCE, but entry?
CVE-2024-31143: no packages for Image SLES15-SP5-CHOST-BYOS-Aliyun, but entry?
CVE-2024-31143: no packages for Image SLES15-SP5-CHOST-BYOS-Azure, but entry?
CVE-2024-31143: no packages for Image SLES15-SP5-CHOST-BYOS-EC2, but entry?
CVE-2024-31143: no packages for Image SLES15-SP5-CHOST-BYOS-GCE, but entry?
CVE-2024-31143: no packages for Image SLES15-SP5-CHOST-BYOS-GDC, but entry?
CVE-2024-31143: no packages for Image SLES15-SP5-CHOST-BYOS-SAP-CCloud, but entry?
CVE-2024-31143: no packages for Image SLES15-SP5-EC2, but entry?
CVE-2024-31143: no packages for Image SLES15-SP5-GCE, but entry?
CVE-2024-31143: no packages for Image SLES15-SP5-HPC-Azure, but entry?
CVE-2024-31143: no packages for Image SLES15-SP5-HPC-BYOS-Azure, but entry?
CVE-2024-31143: no packages for Image SLES15-SP5-HPC-BYOS-EC2, but entry?
CVE-2024-31143: no packages for Image SLES15-SP5-HPC-BYOS-GCE, but entry?
CVE-2024-31143: no packages for Image SLES15-SP5-Hardened-BYOS-Azure, but entry?
CVE-2024-31143: no packages for Image SLES15-SP5-Hardened-BYOS-GCE, but entry?
CVE-2024-31143: no packages for Image SLES15-SP5-Manager-Proxy-5-0-BYOS, but entry?
CVE-2024-31143: no packages for Image SLES15-SP5-Manager-Proxy-5-0-BYOS-Azure, but entry?
CVE-2024-31143: no packages for Image SLES15-SP5-Manager-Proxy-5-0-BYOS-EC2, but entry?
CVE-2024-31143: no packages for Image SLES15-SP5-Manager-Proxy-5-0-BYOS-GCE, but entry?
CVE-2024-31143: no packages for Image SLES15-SP5-Manager-Server-5-0-BYOS, but entry?
CVE-2024-31143: no packages for Image SLES15-SP5-Manager-Server-5-0-BYOS-Azure, but entry?
CVE-2024-31143: no packages for Image SLES15-SP5-Manager-Server-5-0-BYOS-EC2, but entry?
CVE-2024-31143: no packages for Image SLES15-SP5-Manager-Server-5-0-BYOS-GCE, but entry?
CVE-2024-31143: no packages for Image SLES15-SP5-Micro-5-5, but entry?
CVE-2024-31143: no packages for Image SLES15-SP5-Micro-5-5-BYOS, but entry?
CVE-2024-31143: no packages for Image SLES15-SP5-Micro-5-5-BYOS-EC2, but entry?
CVE-2024-31143: no packages for Image SLES15-SP5-Micro-5-5-BYOS-GCE, but entry?
CVE-2024-31143: no packages for Image SLES15-SP5-Micro-5-5-EC2, but entry?
CVE-2024-31143: no packages for Image SLES15-SP5-Micro-5-5-GCE, but entry?
CVE-2024-31143: no packages for Image SLES15-SP5-SAP-Azure-LI-BYOS, but entry?
CVE-2024-31143: no packages for Image SLES15-SP5-SAP-Azure-LI-BYOS-Production, but entry?
CVE-2024-31143: no packages for Image SLES15-SP5-SAP-Azure-VLI-BYOS, but entry?
CVE-2024-31143: no packages for Image SLES15-SP5-SAP-Azure-VLI-BYOS-Production, but entry?
CVE-2024-31143: no packages for Image SLES15-SP5-SAP-BYOS-Azure, but entry?
CVE-2024-31143: no packages for Image SLES15-SP5-SAP-BYOS-EC2, but entry?
CVE-2024-31143: no packages for Image SLES15-SP5-SAP-BYOS-GCE, but entry?
CVE-2024-31143: no packages for Image SLES15-SP5-SAP-Hardened-Azure, but entry?
CVE-2024-31143: no packages for Image SLES15-SP5-SAP-Hardened-BYOS-Azure, but entry?
CVE-2024-31143: no packages for Image SLES15-SP5-SAP-Hardened-BYOS-EC2, but entry?
CVE-2024-31143: no packages for Image SLES15-SP5-SAP-Hardened-BYOS-GCE, but entry?
CVE-2024-31143: no packages for Image SLES15-SP5-SAP-Hardened-GCE, but entry?
CVE-2024-31143: no packages for Image SLES15-SP5-SAPCAL-Azure, but entry?
CVE-2024-31143: no packages for Image SLES15-SP5-SAPCAL-EC2, but entry?
CVE-2024-31143: no packages for Image SLES15-SP5-SAPCAL-GCE, but entry?
CVE-2024-31143: no packages for Image SLES15-SP6, but entry?
CVE-2024-31143: no packages for Image SLES15-SP6-Azure-Basic, but entry?
CVE-2024-31143: no packages for Image SLES15-SP6-Azure-Standard, but entry?
CVE-2024-31143: no packages for Image SLES15-SP6-BYOS, but entry?
CVE-2024-31143: no packages for Image SLES15-SP6-BYOS-Azure, but entry?
CVE-2024-31143: no packages for Image SLES15-SP6-BYOS-EC2, but entry?
CVE-2024-31143: no packages for Image SLES15-SP6-BYOS-GCE, but entry?
CVE-2024-31143: no packages for Image SLES15-SP6-CHOST-BYOS, but entry?
CVE-2024-31143: no packages for Image SLES15-SP6-CHOST-BYOS-Aliyun, but entry?
CVE-2024-31143: no packages for Image SLES15-SP6-CHOST-BYOS-Azure, but entry?
CVE-2024-31143: no packages for Image SLES15-SP6-CHOST-BYOS-EC2, but entry?
CVE-2024-31143: no packages for Image SLES15-SP6-CHOST-BYOS-GCE, but entry?
CVE-2024-31143: no packages for Image SLES15-SP6-CHOST-BYOS-GDC, but entry?
CVE-2024-31143: no packages for Image SLES15-SP6-CHOST-BYOS-SAP-CCloud, but entry?
CVE-2024-31143: no packages for Image SLES15-SP6-EC2, but entry?
CVE-2024-31143: no packages for Image SLES15-SP6-EC2-ECS-HVM, but entry?
CVE-2024-31143: no packages for Image SLES15-SP6-GCE, but entry?
CVE-2024-31143: no packages for Image SLES15-SP6-HPC, but entry?
CVE-2024-31143: no packages for Image SLES15-SP6-HPC-Azure, but entry?
CVE-2024-31143: no packages for Image SLES15-SP6-HPC-BYOS, but entry?
CVE-2024-31143: no packages for Image SLES15-SP6-HPC-BYOS-Azure, but entry?
CVE-2024-31143: no packages for Image SLES15-SP6-HPC-BYOS-EC2, but entry?
CVE-2024-31143: no packages for Image SLES15-SP6-HPC-BYOS-GCE, but entry?
CVE-2024-31143: no packages for Image SLES15-SP6-HPC-EC2, but entry?
CVE-2024-31143: no packages for Image SLES15-SP6-HPC-GCE, but entry?
CVE-2024-31143: no packages for Image SLES15-SP6-Hardened-BYOS, but entry?
CVE-2024-31143: no packages for Image SLES15-SP6-Hardened-BYOS-Azure, but entry?
CVE-2024-31143: no packages for Image SLES15-SP6-Hardened-BYOS-EC2, but entry?
CVE-2024-31143: no packages for Image SLES15-SP6-Hardened-BYOS-GCE, but entry?
CVE-2024-31143: no packages for Image SLES15-SP6-SAP, but entry?
CVE-2024-31143: no packages for Image SLES15-SP6-SAP-Azure, but entry?
CVE-2024-31143: no packages for Image SLES15-SP6-SAP-Azure-LI-BYOS, but entry?
CVE-2024-31143: no packages for Image SLES15-SP6-SAP-Azure-LI-BYOS-Production, but entry?
CVE-2024-31143: no packages for Image SLES15-SP6-SAP-Azure-VLI-BYOS, but entry?
CVE-2024-31143: no packages for Image SLES15-SP6-SAP-Azure-VLI-BYOS-Production, but entry?
CVE-2024-31143: no packages for Image SLES15-SP6-SAP-BYOS, but entry?
CVE-2024-31143: no packages for Image SLES15-SP6-SAP-BYOS-Azure, but entry?
CVE-2024-31143: no packages for Image SLES15-SP6-SAP-BYOS-EC2, but entry?
CVE-2024-31143: no packages for Image SLES15-SP6-SAP-BYOS-GCE, but entry?
CVE-2024-31143: no packages for Image SLES15-SP6-SAP-EC2, but entry?
CVE-2024-31143: no packages for Image SLES15-SP6-SAP-GCE, but entry?
CVE-2024-31143: no packages for Image SLES15-SP6-SAP-Hardened, but entry?
CVE-2024-31143: no packages for Image SLES15-SP6-SAP-Hardened-Azure, but entry?
CVE-2024-31143: no packages for Image SLES15-SP6-SAP-Hardened-BYOS, but entry?
CVE-2024-31143: no packages for Image SLES15-SP6-SAP-Hardened-BYOS-Azure, but entry?
CVE-2024-31143: no packages for Image SLES15-SP6-SAP-Hardened-BYOS-EC2, but entry?
CVE-2024-31143: no packages for Image SLES15-SP6-SAP-Hardened-BYOS-GCE, but entry?
CVE-2024-31143: no packages for Image SLES15-SP6-SAP-Hardened-EC2, but entry?
CVE-2024-31143: no packages for Image SLES15-SP6-SAP-Hardened-GCE, but entry?
CVE-2024-31143: no packages for Image SLES15-SP6-SAPCAL, but entry?
CVE-2024-31143: no packages for Image SLES15-SP6-SAPCAL-Azure, but entry?
CVE-2024-31143: no packages for Image SLES15-SP6-SAPCAL-EC2, but entry?
CVE-2024-31143: no packages for Image SLES15-SP6-SAPCAL-GCE, but entry?
CVE-2024-31143: no packages for SUSE Linux Enterprise Micro 5.1, but entry?
CVE-2024-31143: no packages for SUSE Linux Enterprise Micro 5.2, but entry?
CVE-2024-31143: no packages for SUSE Linux Enterprise Micro 5.3, but entry?
CVE-2024-31143: no packages for SUSE Linux Enterprise Micro 5.4, but entry?
CVE-2024-31143: no packages for SUSE Linux Enterprise Micro 5.5, but entry?
CVE-2024-31143: no packages for SUSE Linux Enterprise Module for Basesystem 15 SP5, but entry?
CVE-2024-31143: no packages for SUSE Linux Enterprise Module for Basesystem 15 SP6, but entry?
CVE-2024-31143: no packages for SUSE Linux Enterprise Software Development Kit 12 SP5, but entry?
CVE-2024-31143: no packages for openSUSE Leap Micro 5.5, but entry?
CVE-2024-31143: no packages for Image SLES12-SP5-EC2-BYOS, but entry?
CVE-2024-31143: no packages for Image SLES12-SP5-EC2-ECS-On-Demand, but entry?
CVE-2024-31143: no packages for Image SLES12-SP5-EC2-On-Demand, but entry?
CVE-2024-31143: no packages for Image SLES12-SP5-EC2-SAP-BYOS, but entry?
CVE-2024-31143: no packages for Image SLES12-SP5-EC2-SAP-On-Demand, but entry?
CVE-2024-31143: no packages for Image SLES15-SP3-BYOS-Azure, but entry?
CVE-2024-31143: no packages for Image SLES15-SP3-BYOS-EC2-HVM, but entry?
CVE-2024-31143: no packages for Image SLES15-SP3-BYOS-GCE, but entry?
CVE-2024-31143: no packages for Image SLES15-SP3-CHOST-BYOS-Aliyun, but entry?
CVE-2024-31143: no packages for Image SLES15-SP3-CHOST-BYOS-Azure, but entry?
CVE-2024-31143: no packages for Image SLES15-SP3-CHOST-BYOS-EC2, but entry?
CVE-2024-31143: no packages for Image SLES15-SP3-CHOST-BYOS-GCE, but entry?
CVE-2024-31143: no packages for Image SLES15-SP3-CHOST-BYOS-SAP-CCloud, but entry?
CVE-2024-31143: no packages for Image SLES15-SP3-HPC-BYOS-Azure, but entry?
CVE-2024-31143: no packages for Image SLES15-SP3-HPC-BYOS-EC2-HVM, but entry?
CVE-2024-31143: no packages for Image SLES15-SP3-HPC-BYOS-GCE, but entry?
CVE-2024-31143: no packages for Image SLES15-SP3-Micro-5-1-BYOS-Azure, but entry?
CVE-2024-31143: no packages for Image SLES15-SP3-Micro-5-1-BYOS-EC2-HVM, but entry?
CVE-2024-31143: no packages for Image SLES15-SP3-Micro-5-1-BYOS-GCE, but entry?
CVE-2024-31143: no packages for Image SLES15-SP3-Micro-5-2-BYOS-Azure, but entry?
CVE-2024-31143: no packages for Image SLES15-SP3-Micro-5-2-BYOS-EC2-HVM, but entry?
CVE-2024-31143: no packages for Image SLES15-SP3-Micro-5-2-BYOS-GCE, but entry?
CVE-2024-31143: no packages for Image SLES15-SP3-SAP-Azure-LI-BYOS-Production, but entry?
CVE-2024-31143: no packages for Image SLES15-SP3-SAP-Azure-VLI-BYOS-Production, but entry?
CVE-2024-31143: no packages for Image SLES15-SP3-SAP-BYOS-Azure, but entry?
CVE-2024-31143: no packages for Image SLES15-SP3-SAP-BYOS-EC2-HVM, but entry?
CVE-2024-31143: no packages for Image SLES15-SP3-SAP-BYOS-GCE, but entry?
CVE-2024-31143: no packages for Image SLES15-SP3-SAPCAL-Azure, but entry?
CVE-2024-31143: no packages for Image SLES15-SP3-SAPCAL-EC2-HVM, but entry?
CVE-2024-31143: no packages for Image SLES15-SP3-SAPCAL-GCE, but entry?
CVE-2024-31143: no packages for Image SLES15-SP4-SAP-Azure-LI-BYOS, but entry?
CVE-2024-31143: no packages for Image SLES15-SP4-SAP-Azure-LI-BYOS-Production, but entry?
CVE-2024-31143: no packages for Image SLES15-SP4-SAP-Azure-VLI-BYOS, but entry?
CVE-2024-31143: no packages for Image SLES15-SP4-SAP-Azure-VLI-BYOS-Production, but entry?
CVE-2024-31143: no packages for Image SLES15-SP5-Azure-Basic, but entry?
CVE-2024-31143: no packages for Image SLES15-SP5-Azure-Standard, but entry?
CVE-2024-31143: no packages for Image SLES15-SP5-BYOS-Azure, but entry?
CVE-2024-31143: no packages for Image SLES15-SP5-BYOS-EC2, but entry?
CVE-2024-31143: no packages for Image SLES15-SP5-BYOS-GCE, but entry?
CVE-2024-31143: no packages for Image SLES15-SP5-CHOST-BYOS-Aliyun, but entry?
CVE-2024-31143: no packages for Image SLES15-SP5-CHOST-BYOS-Azure, but entry?
CVE-2024-31143: no packages for Image SLES15-SP5-CHOST-BYOS-EC2, but entry?
CVE-2024-31143: no packages for Image SLES15-SP5-CHOST-BYOS-GCE, but entry?
CVE-2024-31143: no packages for Image SLES15-SP5-CHOST-BYOS-GDC, but entry?
CVE-2024-31143: no packages for Image SLES15-SP5-CHOST-BYOS-SAP-CCloud, but entry?
CVE-2024-31143: no packages for Image SLES15-SP5-EC2, but entry?
CVE-2024-31143: no packages for Image SLES15-SP5-GCE, but entry?
CVE-2024-31143: no packages for Image SLES15-SP5-HPC-Azure, but entry?
CVE-2024-31143: no packages for Image SLES15-SP5-HPC-BYOS-Azure, but entry?
CVE-2024-31143: no packages for Image SLES15-SP5-HPC-BYOS-EC2, but entry?
CVE-2024-31143: no packages for Image SLES15-SP5-HPC-BYOS-GCE, but entry?
CVE-2024-31143: no packages for Image SLES15-SP5-Hardened-BYOS-Azure, but entry?
CVE-2024-31143: no packages for Image SLES15-SP5-Hardened-BYOS-GCE, but entry?
CVE-2024-31143: no packages for Image SLES15-SP5-Manager-Proxy-5-0-BYOS, but entry?
CVE-2024-31143: no packages for Image SLES15-SP5-Manager-Proxy-5-0-BYOS-Azure, but entry?
CVE-2024-31143: no packages for Image SLES15-SP5-Manager-Proxy-5-0-BYOS-EC2, but entry?
CVE-2024-31143: no packages for Image SLES15-SP5-Manager-Proxy-5-0-BYOS-GCE, but entry?
CVE-2024-31143: no packages for Image SLES15-SP5-Manager-Server-5-0-BYOS, but entry?
CVE-2024-31143: no packages for Image SLES15-SP5-Manager-Server-5-0-BYOS-Azure, but entry?
CVE-2024-31143: no packages for Image SLES15-SP5-Manager-Server-5-0-BYOS-EC2, but entry?
CVE-2024-31143: no packages for Image SLES15-SP5-Manager-Server-5-0-BYOS-GCE, but entry?
CVE-2024-31143: no packages for Image SLES15-SP5-Micro-5-5, but entry?
CVE-2024-31143: no packages for Image SLES15-SP5-Micro-5-5-BYOS, but entry?
CVE-2024-31143: no packages for Image SLES15-SP5-Micro-5-5-BYOS-EC2, but entry?
CVE-2024-31143: no packages for Image SLES15-SP5-Micro-5-5-BYOS-GCE, but entry?
CVE-2024-31143: no packages for Image SLES15-SP5-Micro-5-5-EC2, but entry?
CVE-2024-31143: no packages for Image SLES15-SP5-Micro-5-5-GCE, but entry?
CVE-2024-31143: no packages for Image SLES15-SP5-SAP-Azure-LI-BYOS, but entry?
CVE-2024-31143: no packages for Image SLES15-SP5-SAP-Azure-LI-BYOS-Production, but entry?
CVE-2024-31143: no packages for Image SLES15-SP5-SAP-Azure-VLI-BYOS, but entry?
CVE-2024-31143: no packages for Image SLES15-SP5-SAP-Azure-VLI-BYOS-Production, but entry?
CVE-2024-31143: no packages for Image SLES15-SP5-SAP-BYOS-Azure, but entry?
CVE-2024-31143: no packages for Image SLES15-SP5-SAP-BYOS-EC2, but entry?
CVE-2024-31143: no packages for Image SLES15-SP5-SAP-BYOS-GCE, but entry?
CVE-2024-31143: no packages for Image SLES15-SP5-SAP-Hardened-Azure, but entry?
CVE-2024-31143: no packages for Image SLES15-SP5-SAP-Hardened-BYOS-Azure, but entry?
CVE-2024-31143: no packages for Image SLES15-SP5-SAP-Hardened-BYOS-EC2, but entry?
CVE-2024-31143: no packages for Image SLES15-SP5-SAP-Hardened-BYOS-GCE, but entry?
CVE-2024-31143: no packages for Image SLES15-SP5-SAP-Hardened-GCE, but entry?
CVE-2024-31143: no packages for Image SLES15-SP5-SAPCAL-Azure, but entry?
CVE-2024-31143: no packages for Image SLES15-SP5-SAPCAL-EC2, but entry?
CVE-2024-31143: no packages for Image SLES15-SP5-SAPCAL-GCE, but entry?
CVE-2024-31143: no packages for Image SLES15-SP6, but entry?
CVE-2024-31143: no packages for Image SLES15-SP6-Azure-Basic, but entry?
CVE-2024-31143: no packages for Image SLES15-SP6-Azure-Standard, but entry?
CVE-2024-31143: no packages for Image SLES15-SP6-BYOS, but entry?
CVE-2024-31143: no packages for Image SLES15-SP6-BYOS-Azure, but entry?
CVE-2024-31143: no packages for Image SLES15-SP6-BYOS-EC2, but entry?
CVE-2024-31143: no packages for Image SLES15-SP6-BYOS-GCE, but entry?
CVE-2024-31143: no packages for Image SLES15-SP6-CHOST-BYOS, but entry?
CVE-2024-31143: no packages for Image SLES15-SP6-CHOST-BYOS-Aliyun, but entry?
CVE-2024-31143: no packages for Image SLES15-SP6-CHOST-BYOS-Azure, but entry?
CVE-2024-31143: no packages for Image SLES15-SP6-CHOST-BYOS-EC2, but entry?
CVE-2024-31143: no packages for Image SLES15-SP6-CHOST-BYOS-GCE, but entry?
CVE-2024-31143: no packages for Image SLES15-SP6-CHOST-BYOS-GDC, but entry?
CVE-2024-31143: no packages for Image SLES15-SP6-CHOST-BYOS-SAP-CCloud, but entry?
CVE-2024-31143: no packages for Image SLES15-SP6-EC2, but entry?
CVE-2024-31143: no packages for Image SLES15-SP6-EC2-ECS-HVM, but entry?
CVE-2024-31143: no packages for Image SLES15-SP6-GCE, but entry?
CVE-2024-31143: no packages for Image SLES15-SP6-HPC, but entry?
CVE-2024-31143: no packages for Image SLES15-SP6-HPC-Azure, but entry?
CVE-2024-31143: no packages for Image SLES15-SP6-HPC-BYOS, but entry?
CVE-2024-31143: no packages for Image SLES15-SP6-HPC-BYOS-Azure, but entry?
CVE-2024-31143: no packages for Image SLES15-SP6-HPC-BYOS-EC2, but entry?
CVE-2024-31143: no packages for Image SLES15-SP6-HPC-BYOS-GCE, but entry?
CVE-2024-31143: no packages for Image SLES15-SP6-HPC-EC2, but entry?
CVE-2024-31143: no packages for Image SLES15-SP6-HPC-GCE, but entry?
CVE-2024-31143: no packages for Image SLES15-SP6-Hardened-BYOS, but entry?
CVE-2024-31143: no packages for Image SLES15-SP6-Hardened-BYOS-Azure, but entry?
CVE-2024-31143: no packages for Image SLES15-SP6-Hardened-BYOS-EC2, but entry?
CVE-2024-31143: no packages for Image SLES15-SP6-Hardened-BYOS-GCE, but entry?
CVE-2024-31143: no packages for Image SLES15-SP6-SAP, but entry?
CVE-2024-31143: no packages for Image SLES15-SP6-SAP-Azure, but entry?
CVE-2024-31143: no packages for Image SLES15-SP6-SAP-Azure-LI-BYOS, but entry?
CVE-2024-31143: no packages for Image SLES15-SP6-SAP-Azure-LI-BYOS-Production, but entry?
CVE-2024-31143: no packages for Image SLES15-SP6-SAP-Azure-VLI-BYOS, but entry?
CVE-2024-31143: no packages for Image SLES15-SP6-SAP-Azure-VLI-BYOS-Production, but entry?
CVE-2024-31143: no packages for Image SLES15-SP6-SAP-BYOS, but entry?
CVE-2024-31143: no packages for Image SLES15-SP6-SAP-BYOS-Azure, but entry?
CVE-2024-31143: no packages for Image SLES15-SP6-SAP-BYOS-EC2, but entry?
CVE-2024-31143: no packages for Image SLES15-SP6-SAP-BYOS-GCE, but entry?
CVE-2024-31143: no packages for Image SLES15-SP6-SAP-EC2, but entry?
CVE-2024-31143: no packages for Image SLES15-SP6-SAP-GCE, but entry?
CVE-2024-31143: no packages for Image SLES15-SP6-SAP-Hardened, but entry?
CVE-2024-31143: no packages for Image SLES15-SP6-SAP-Hardened-Azure, but entry?
CVE-2024-31143: no packages for Image SLES15-SP6-SAP-Hardened-BYOS, but entry?
CVE-2024-31143: no packages for Image SLES15-SP6-SAP-Hardened-BYOS-Azure, but entry?
CVE-2024-31143: no packages for Image SLES15-SP6-SAP-Hardened-BYOS-EC2, but entry?
CVE-2024-31143: no packages for Image SLES15-SP6-SAP-Hardened-BYOS-GCE, but entry?
CVE-2024-31143: no packages for Image SLES15-SP6-SAP-Hardened-EC2, but entry?
CVE-2024-31143: no packages for Image SLES15-SP6-SAP-Hardened-GCE, but entry?
CVE-2024-31143: no packages for Image SLES15-SP6-SAPCAL, but entry?
CVE-2024-31143: no packages for Image SLES15-SP6-SAPCAL-Azure, but entry?
CVE-2024-31143: no packages for Image SLES15-SP6-SAPCAL-EC2, but entry?
CVE-2024-31143: no packages for Image SLES15-SP6-SAPCAL-GCE, but entry?
CVE-2024-31143: no packages for SUSE Linux Enterprise Micro 5.1, but entry?
CVE-2024-31143: no packages for SUSE Linux Enterprise Micro 5.2, but entry?
CVE-2024-31143: no packages for SUSE Linux Enterprise Micro 5.3, but entry?
CVE-2024-31143: no packages for SUSE Linux Enterprise Micro 5.4, but entry?
CVE-2024-31143: no packages for SUSE Linux Enterprise Micro 5.5, but entry?
CVE-2024-31143: no packages for SUSE Linux Enterprise Module for Basesystem 15 SP5, but entry?
CVE-2024-31143: no packages for SUSE Linux Enterprise Module for Basesystem 15 SP6, but entry?
CVE-2024-31143: no packages for SUSE Linux Enterprise Software Development Kit 12 SP5, but entry?
CVE-2024-31143: no packages for openSUSE Leap Micro 5.5, but entry?
skipping CVE-2024-31083 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-31082 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-31081 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-31080 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-31076 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-30875 as CVE page is older than CVRF-CVE file.
no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2024-30261
no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2024-30260
skipping CVE-2024-30205 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-30204 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-30203 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-30202 as CVE page is older than CVRF-CVE file.
no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2024-30171
skipping CVE-2024-30161 as CVE page is older than CVRF-CVE file.
no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2024-29903
skipping CVE-2024-29944 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-29943 as CVE page is older than CVRF-CVE file.
no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2024-29902
no cpe found for SUSE Package Hub 15 SP5 in CVE-2024-29894
no cpe found for SUSE Package Hub 15 SP6 in CVE-2024-29894
skipping CVE-2024-29511 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-29510 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-29509 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-29508 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-29507 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-29506 as CVE page is older than CVRF-CVE file.
no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2024-29039
skipping CVE-2024-29040 as CVE page is older than CVRF-CVE file.
no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2024-29038
no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2024-29025
skipping CVE-2024-28882 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-28835 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-28834 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-28757 as CVE page is older than CVRF-CVE file.
no cpe found for SUSE Package Hub 15 SP5 in CVE-2024-28397
no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2024-28219
no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2024-28182
no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2024-28180
--- /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2024-28168.xml 2024-10-22 01:36:35.174008000 +0200
+++ /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2024-28168.xml.new 2024-10-29 01:19:28.494061000 +0100
@@ -14,13 +14,13 @@
1
- 4
- 2024-10-21T23:36:34Z
+ 5
+ 2024-10-29T00:19:26Z
current
2024-10-09T23:27:30Z
- 2024-10-21T23:36:34Z
+ 2024-10-29T00:19:26Z
cve-database/bin/generate-cvrf-cve.pl
2020-12-27T01:00:00Z
@@ -43,21 +43,10 @@
-
- SUSE Linux Enterprise Module for Basesystem 15 SP5
-
SUSE Linux Enterprise Module for Development Tools 15 SP5
-
-
- SUSE Linux Enterprise Module for Basesystem 15 SP6
-
-
- SUSE Linux Enterprise Module for Development Tools 15 SP6
-
-
SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS
@@ -79,26 +68,10 @@
-
- SUSE Linux Enterprise Module for Basesystem 15 SP5
-
SUSE Linux Enterprise Module for Development Tools 15 SP5
-
-
- SUSE Linux Enterprise Module for Basesystem 15 SP6
-
-
- SUSE Linux Enterprise Module for Development Tools 15 SP6
-
-
-
-
- SUSE Linux Enterprise Module for Package Hub 15 SP6
-
-
SUSE Linux Enterprise Software Development Kit 12 SP5
@@ -119,27 +92,11 @@
SUSE Linux Enterprise Server 15 SP4-LTSS
-
-
- SUSE Linux Enterprise Server 15 SP4-TERADATA
-
-
-
- SUSE Linux Enterprise Module for Basesystem 15 SP5
-
SUSE Linux Enterprise Module for Development Tools 15 SP5
-
-
- SUSE Linux Enterprise Module for Basesystem 15 SP6
-
-
- SUSE Linux Enterprise Module for Development Tools 15 SP6
-
-
SUSE Linux Enterprise Server Teradata 15 SP4
@@ -166,21 +123,10 @@
-
- SUSE Linux Enterprise Module for Basesystem 15 SP5
-
SUSE Linux Enterprise Module for Development Tools 15 SP5
-
-
- SUSE Linux Enterprise Module for Basesystem 15 SP6
-
-
- SUSE Linux Enterprise Module for Development Tools 15 SP6
-
-
openSUSE Leap 15.5
@@ -196,264 +142,15 @@
openSUSE Tumbleweed
-
- javapackages-filesystem-6.3.4-150200.3.15.1
-
-
- javapackages-gradle-6.3.4-150200.3.15.1
-
-
- javapackages-ivy-6.3.4-150200.3.15.1
-
-
- javapackages-local-6.3.4-150200.3.15.1
-
-
- javapackages-tools-6.3.4-150200.3.15.1
-
-
- python3-javapackages-6.3.4-150200.3.15.1
-
-
- xmlgraphics-batik-1.18-150200.4.10.1
-
-
- xmlgraphics-batik-css-1.18-150200.4.10.1
-
-
- xmlgraphics-batik-demo-1.18-150200.4.10.1
-
-
- xmlgraphics-batik-javadoc-1.18-150200.4.10.1
-
-
- xmlgraphics-batik-rasterizer-1.18-150200.4.10.1
-
-
- xmlgraphics-batik-slideshow-1.18-150200.4.10.1
-
-
- xmlgraphics-batik-squiggle-1.18-150200.4.10.1
-
-
- xmlgraphics-batik-svgpp-1.18-150200.4.10.1
-
-
- xmlgraphics-batik-ttf2svg-1.18-150200.4.10.1
-
-
- xmlgraphics-commons-2.10-150200.3.10.1
-
-
- xmlgraphics-commons-javadoc-2.10-150200.3.10.1
-
xmlgraphics-fop
xmlgraphics-fop-2.10-1.1
-
- xmlgraphics-fop-2.10-150200.13.10.1
-
xmlgraphics-fop-2.10-1.1 as a component of openSUSE Tumbleweed
-
- javapackages-filesystem-6.3.4-150200.3.15.1 as a component of SUSE Linux Enterprise Module for Basesystem 15 SP5
-
-
- javapackages-tools-6.3.4-150200.3.15.1 as a component of SUSE Linux Enterprise Module for Basesystem 15 SP5
-
-
- python3-javapackages-6.3.4-150200.3.15.1 as a component of SUSE Linux Enterprise Module for Basesystem 15 SP5
-
-
- javapackages-filesystem-6.3.4-150200.3.15.1 as a component of SUSE Linux Enterprise Module for Basesystem 15 SP6
-
-
- javapackages-tools-6.3.4-150200.3.15.1 as a component of SUSE Linux Enterprise Module for Basesystem 15 SP6
-
-
- python3-javapackages-6.3.4-150200.3.15.1 as a component of SUSE Linux Enterprise Module for Basesystem 15 SP6
-
-
- javapackages-gradle-6.3.4-150200.3.15.1 as a component of SUSE Linux Enterprise Module for Development Tools 15 SP5
-
-
- javapackages-ivy-6.3.4-150200.3.15.1 as a component of SUSE Linux Enterprise Module for Development Tools 15 SP5
-
-
- javapackages-local-6.3.4-150200.3.15.1 as a component of SUSE Linux Enterprise Module for Development Tools 15 SP5
-
-
- xmlgraphics-batik-1.18-150200.4.10.1 as a component of SUSE Linux Enterprise Module for Development Tools 15 SP5
-
-
- xmlgraphics-batik-css-1.18-150200.4.10.1 as a component of SUSE Linux Enterprise Module for Development Tools 15 SP5
-
-
- xmlgraphics-commons-2.10-150200.3.10.1 as a component of SUSE Linux Enterprise Module for Development Tools 15 SP5
-
-
- xmlgraphics-fop-2.10-150200.13.10.1 as a component of SUSE Linux Enterprise Module for Development Tools 15 SP5
-
-
- javapackages-gradle-6.3.4-150200.3.15.1 as a component of SUSE Linux Enterprise Module for Development Tools 15 SP6
-
-
- javapackages-ivy-6.3.4-150200.3.15.1 as a component of SUSE Linux Enterprise Module for Development Tools 15 SP6
-
-
- javapackages-local-6.3.4-150200.3.15.1 as a component of SUSE Linux Enterprise Module for Development Tools 15 SP6
-
-
- xmlgraphics-batik-1.18-150200.4.10.1 as a component of SUSE Linux Enterprise Module for Package Hub 15 SP6
-
-
- xmlgraphics-batik-css-1.18-150200.4.10.1 as a component of SUSE Linux Enterprise Module for Package Hub 15 SP6
-
-
- xmlgraphics-commons-2.10-150200.3.10.1 as a component of SUSE Linux Enterprise Module for Package Hub 15 SP6
-
-
- javapackages-filesystem-6.3.4-150200.3.15.1 as a component of SUSE Linux Enterprise Server 15 SP4-TERADATA
-
-
- javapackages-gradle-6.3.4-150200.3.15.1 as a component of SUSE Linux Enterprise Server 15 SP4-TERADATA
-
-
- javapackages-ivy-6.3.4-150200.3.15.1 as a component of SUSE Linux Enterprise Server 15 SP4-TERADATA
-
-
- javapackages-local-6.3.4-150200.3.15.1 as a component of SUSE Linux Enterprise Server 15 SP4-TERADATA
-
-
- javapackages-tools-6.3.4-150200.3.15.1 as a component of SUSE Linux Enterprise Server 15 SP4-TERADATA
-
-
- python3-javapackages-6.3.4-150200.3.15.1 as a component of SUSE Linux Enterprise Server 15 SP4-TERADATA
-
-
- xmlgraphics-batik-1.18-150200.4.10.1 as a component of SUSE Linux Enterprise Server 15 SP4-TERADATA
-
-
- xmlgraphics-batik-css-1.18-150200.4.10.1 as a component of SUSE Linux Enterprise Server 15 SP4-TERADATA
-
-
- xmlgraphics-commons-2.10-150200.3.10.1 as a component of SUSE Linux Enterprise Server 15 SP4-TERADATA
-
-
- xmlgraphics-fop-2.10-150200.13.10.1 as a component of SUSE Linux Enterprise Server 15 SP4-TERADATA
-
-
- javapackages-filesystem-6.3.4-150200.3.15.1 as a component of openSUSE Leap 15.5
-
-
- javapackages-gradle-6.3.4-150200.3.15.1 as a component of openSUSE Leap 15.5
-
-
- javapackages-ivy-6.3.4-150200.3.15.1 as a component of openSUSE Leap 15.5
-
-
- javapackages-local-6.3.4-150200.3.15.1 as a component of openSUSE Leap 15.5
-
-
- javapackages-tools-6.3.4-150200.3.15.1 as a component of openSUSE Leap 15.5
-
-
- python3-javapackages-6.3.4-150200.3.15.1 as a component of openSUSE Leap 15.5
-
-
- xmlgraphics-batik-1.18-150200.4.10.1 as a component of openSUSE Leap 15.5
-
-
- xmlgraphics-batik-css-1.18-150200.4.10.1 as a component of openSUSE Leap 15.5
-
-
- xmlgraphics-batik-demo-1.18-150200.4.10.1 as a component of openSUSE Leap 15.5
-
-
- xmlgraphics-batik-javadoc-1.18-150200.4.10.1 as a component of openSUSE Leap 15.5
-
-
- xmlgraphics-batik-rasterizer-1.18-150200.4.10.1 as a component of openSUSE Leap 15.5
-
-
- xmlgraphics-batik-slideshow-1.18-150200.4.10.1 as a component of openSUSE Leap 15.5
-
-
- xmlgraphics-batik-squiggle-1.18-150200.4.10.1 as a component of openSUSE Leap 15.5
-
-
- xmlgraphics-batik-svgpp-1.18-150200.4.10.1 as a component of openSUSE Leap 15.5
-
-
- xmlgraphics-batik-ttf2svg-1.18-150200.4.10.1 as a component of openSUSE Leap 15.5
-
-
- xmlgraphics-commons-2.10-150200.3.10.1 as a component of openSUSE Leap 15.5
-
-
- xmlgraphics-commons-javadoc-2.10-150200.3.10.1 as a component of openSUSE Leap 15.5
-
-
- xmlgraphics-fop-2.10-150200.13.10.1 as a component of openSUSE Leap 15.5
-
-
- javapackages-filesystem-6.3.4-150200.3.15.1 as a component of openSUSE Leap 15.6
-
-
- javapackages-gradle-6.3.4-150200.3.15.1 as a component of openSUSE Leap 15.6
-
-
- javapackages-ivy-6.3.4-150200.3.15.1 as a component of openSUSE Leap 15.6
-
-
- javapackages-local-6.3.4-150200.3.15.1 as a component of openSUSE Leap 15.6
-
-
- javapackages-tools-6.3.4-150200.3.15.1 as a component of openSUSE Leap 15.6
-
-
- python3-javapackages-6.3.4-150200.3.15.1 as a component of openSUSE Leap 15.6
-
-
- xmlgraphics-batik-1.18-150200.4.10.1 as a component of openSUSE Leap 15.6
-
-
- xmlgraphics-batik-css-1.18-150200.4.10.1 as a component of openSUSE Leap 15.6
-
-
- xmlgraphics-batik-demo-1.18-150200.4.10.1 as a component of openSUSE Leap 15.6
-
-
- xmlgraphics-batik-javadoc-1.18-150200.4.10.1 as a component of openSUSE Leap 15.6
-
-
- xmlgraphics-batik-rasterizer-1.18-150200.4.10.1 as a component of openSUSE Leap 15.6
-
-
- xmlgraphics-batik-slideshow-1.18-150200.4.10.1 as a component of openSUSE Leap 15.6
-
-
- xmlgraphics-batik-squiggle-1.18-150200.4.10.1 as a component of openSUSE Leap 15.6
-
-
- xmlgraphics-batik-svgpp-1.18-150200.4.10.1 as a component of openSUSE Leap 15.6
-
-
- xmlgraphics-batik-ttf2svg-1.18-150200.4.10.1 as a component of openSUSE Leap 15.6
-
-
- xmlgraphics-commons-2.10-150200.3.10.1 as a component of openSUSE Leap 15.6
-
-
- xmlgraphics-commons-javadoc-2.10-150200.3.10.1 as a component of openSUSE Leap 15.6
-
-
- xmlgraphics-fop-2.10-150200.13.10.1 as a component of openSUSE Leap 15.6
-
xmlgraphics-fop as a component of SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS
@@ -513,73 +210,6 @@
openSUSE Tumbleweed:xmlgraphics-fop-2.10-1.1
-
- SUSE Linux Enterprise Module for Basesystem 15 SP5:javapackages-filesystem-6.3.4-150200.3.15.1
- SUSE Linux Enterprise Module for Basesystem 15 SP5:javapackages-tools-6.3.4-150200.3.15.1
- SUSE Linux Enterprise Module for Basesystem 15 SP5:python3-javapackages-6.3.4-150200.3.15.1
- SUSE Linux Enterprise Module for Basesystem 15 SP6:javapackages-filesystem-6.3.4-150200.3.15.1
- SUSE Linux Enterprise Module for Basesystem 15 SP6:javapackages-tools-6.3.4-150200.3.15.1
- SUSE Linux Enterprise Module for Basesystem 15 SP6:python3-javapackages-6.3.4-150200.3.15.1
- SUSE Linux Enterprise Module for Development Tools 15 SP5:javapackages-gradle-6.3.4-150200.3.15.1
- SUSE Linux Enterprise Module for Development Tools 15 SP5:javapackages-ivy-6.3.4-150200.3.15.1
- SUSE Linux Enterprise Module for Development Tools 15 SP5:javapackages-local-6.3.4-150200.3.15.1
- SUSE Linux Enterprise Module for Development Tools 15 SP5:xmlgraphics-batik-1.18-150200.4.10.1
- SUSE Linux Enterprise Module for Development Tools 15 SP5:xmlgraphics-batik-css-1.18-150200.4.10.1
- SUSE Linux Enterprise Module for Development Tools 15 SP5:xmlgraphics-commons-2.10-150200.3.10.1
- SUSE Linux Enterprise Module for Development Tools 15 SP5:xmlgraphics-fop-2.10-150200.13.10.1
- SUSE Linux Enterprise Module for Development Tools 15 SP6:javapackages-gradle-6.3.4-150200.3.15.1
- SUSE Linux Enterprise Module for Development Tools 15 SP6:javapackages-ivy-6.3.4-150200.3.15.1
- SUSE Linux Enterprise Module for Development Tools 15 SP6:javapackages-local-6.3.4-150200.3.15.1
- SUSE Linux Enterprise Module for Package Hub 15 SP6:xmlgraphics-batik-1.18-150200.4.10.1
- SUSE Linux Enterprise Module for Package Hub 15 SP6:xmlgraphics-batik-css-1.18-150200.4.10.1
- SUSE Linux Enterprise Module for Package Hub 15 SP6:xmlgraphics-commons-2.10-150200.3.10.1
- SUSE Linux Enterprise Server 15 SP4-TERADATA:javapackages-filesystem-6.3.4-150200.3.15.1
- SUSE Linux Enterprise Server 15 SP4-TERADATA:javapackages-gradle-6.3.4-150200.3.15.1
- SUSE Linux Enterprise Server 15 SP4-TERADATA:javapackages-ivy-6.3.4-150200.3.15.1
- SUSE Linux Enterprise Server 15 SP4-TERADATA:javapackages-local-6.3.4-150200.3.15.1
- SUSE Linux Enterprise Server 15 SP4-TERADATA:javapackages-tools-6.3.4-150200.3.15.1
- SUSE Linux Enterprise Server 15 SP4-TERADATA:python3-javapackages-6.3.4-150200.3.15.1
- SUSE Linux Enterprise Server 15 SP4-TERADATA:xmlgraphics-batik-1.18-150200.4.10.1
- SUSE Linux Enterprise Server 15 SP4-TERADATA:xmlgraphics-batik-css-1.18-150200.4.10.1
- SUSE Linux Enterprise Server 15 SP4-TERADATA:xmlgraphics-commons-2.10-150200.3.10.1
- SUSE Linux Enterprise Server 15 SP4-TERADATA:xmlgraphics-fop-2.10-150200.13.10.1
- openSUSE Leap 15.5:javapackages-filesystem-6.3.4-150200.3.15.1
- openSUSE Leap 15.5:javapackages-gradle-6.3.4-150200.3.15.1
- openSUSE Leap 15.5:javapackages-ivy-6.3.4-150200.3.15.1
- openSUSE Leap 15.5:javapackages-local-6.3.4-150200.3.15.1
- openSUSE Leap 15.5:javapackages-tools-6.3.4-150200.3.15.1
- openSUSE Leap 15.5:python3-javapackages-6.3.4-150200.3.15.1
- openSUSE Leap 15.5:xmlgraphics-batik-1.18-150200.4.10.1
- openSUSE Leap 15.5:xmlgraphics-batik-css-1.18-150200.4.10.1
- openSUSE Leap 15.5:xmlgraphics-batik-demo-1.18-150200.4.10.1
- openSUSE Leap 15.5:xmlgraphics-batik-javadoc-1.18-150200.4.10.1
- openSUSE Leap 15.5:xmlgraphics-batik-rasterizer-1.18-150200.4.10.1
- openSUSE Leap 15.5:xmlgraphics-batik-slideshow-1.18-150200.4.10.1
- openSUSE Leap 15.5:xmlgraphics-batik-squiggle-1.18-150200.4.10.1
- openSUSE Leap 15.5:xmlgraphics-batik-svgpp-1.18-150200.4.10.1
- openSUSE Leap 15.5:xmlgraphics-batik-ttf2svg-1.18-150200.4.10.1
- openSUSE Leap 15.5:xmlgraphics-commons-2.10-150200.3.10.1
- openSUSE Leap 15.5:xmlgraphics-commons-javadoc-2.10-150200.3.10.1
- openSUSE Leap 15.5:xmlgraphics-fop-2.10-150200.13.10.1
- openSUSE Leap 15.6:javapackages-filesystem-6.3.4-150200.3.15.1
- openSUSE Leap 15.6:javapackages-gradle-6.3.4-150200.3.15.1
- openSUSE Leap 15.6:javapackages-ivy-6.3.4-150200.3.15.1
- openSUSE Leap 15.6:javapackages-local-6.3.4-150200.3.15.1
- openSUSE Leap 15.6:javapackages-tools-6.3.4-150200.3.15.1
- openSUSE Leap 15.6:python3-javapackages-6.3.4-150200.3.15.1
- openSUSE Leap 15.6:xmlgraphics-batik-1.18-150200.4.10.1
- openSUSE Leap 15.6:xmlgraphics-batik-css-1.18-150200.4.10.1
- openSUSE Leap 15.6:xmlgraphics-batik-demo-1.18-150200.4.10.1
- openSUSE Leap 15.6:xmlgraphics-batik-javadoc-1.18-150200.4.10.1
- openSUSE Leap 15.6:xmlgraphics-batik-rasterizer-1.18-150200.4.10.1
- openSUSE Leap 15.6:xmlgraphics-batik-slideshow-1.18-150200.4.10.1
- openSUSE Leap 15.6:xmlgraphics-batik-squiggle-1.18-150200.4.10.1
- openSUSE Leap 15.6:xmlgraphics-batik-svgpp-1.18-150200.4.10.1
- openSUSE Leap 15.6:xmlgraphics-batik-ttf2svg-1.18-150200.4.10.1
- openSUSE Leap 15.6:xmlgraphics-commons-2.10-150200.3.10.1
- openSUSE Leap 15.6:xmlgraphics-commons-javadoc-2.10-150200.3.10.1
- openSUSE Leap 15.6:xmlgraphics-fop-2.10-150200.13.10.1
-
no cpe found for SUSE Package Hub 15 SP5 in CVE-2024-28130
no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2024-28103
no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2024-28085
no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2024-27983
no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2024-27982
No V5 entry found for CVE-2024-27980 / /home/securitybot/prod/cve-database/cvelistV5/cves/2024/27xxxx/CVE-2024-27980.json:No such file or directory
no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2024-27980
no cpe found for SUSE Package Hub 15 SP5 in CVE-2024-27758
skipping CVE-2024-27913 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-27903 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-27851 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-27850 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-27838 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-27834 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-27833 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-27830 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-27820 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-27808 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-27766 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-27459 as CVE page is older than CVRF-CVE file.
--- /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2024-27437.xml 2024-10-16 01:25:40.673442000 +0200
+++ /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2024-27437.xml.new 2024-10-29 01:19:39.243022000 +0100
@@ -14,13 +14,13 @@
1
- 48
- 2024-10-15T23:25:40Z
+ 49
+ 2024-10-29T00:19:38Z
current
2024-04-10T23:09:04Z
- 2024-10-15T23:25:40Z
+ 2024-10-29T00:19:38Z
cve-database/bin/generate-cvrf-cve.pl
2020-12-27T01:00:00Z
@@ -127,6 +127,21 @@
Image SLES12-SP5-EC2-BYOS
+
+
+ Image SLES12-SP5-GCE-BYOS
+
+
+
+
+ Image SLES12-SP5-GCE-SAP-BYOS
+
+
+
+
+ Image SLES12-SP5-GCE-SAP-On-Demand
+
+
Image SLES12-SP5-SAP-Azure-LI-BYOS-Production
@@ -1978,6 +1993,39 @@
kernel-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-EC2-BYOS
+
+ kernel-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-BYOS
+
+
+ cluster-md-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ dlm-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ gfs2-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ kernel-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ ocfs2-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ cluster-md-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
+
+ dlm-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
+
+ gfs2-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
+
+ kernel-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
+
+ ocfs2-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
cluster-md-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-SAP-Azure-LI-BYOS-Production
@@ -3943,6 +3991,17 @@
Image SLES12-SP5-Azure-SAP-BYOS:kernel-default-4.12.14-122.225.1
Image SLES12-SP5-Azure-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.225.1
Image SLES12-SP5-EC2-BYOS:kernel-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-BYOS:kernel-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-BYOS:cluster-md-kmp-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-BYOS:dlm-kmp-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-BYOS:gfs2-kmp-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-BYOS:kernel-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:cluster-md-kmp-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:dlm-kmp-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:gfs2-kmp-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:kernel-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:ocfs2-kmp-default-4.12.14-122.225.1
Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:cluster-md-kmp-default-4.12.14-122.225.1
Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:dlm-kmp-default-4.12.14-122.225.1
Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:gfs2-kmp-default-4.12.14-122.225.1
skipping CVE-2024-27435 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-27434 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-27433 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-27432 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-27431 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-27419 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-27418 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-27417 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-27416 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-27415 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-27414 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-27413 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-27412 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-27411 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-27409 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-27408 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-27407 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-27406 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-27405 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-27404 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-27403 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-27402 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-27400 as CVE page is older than CVRF-CVE file.
no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2024-27398
--- /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2024-27398.xml 2024-10-18 01:22:01.904790000 +0200
+++ /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2024-27398.xml.new 2024-10-29 01:19:49.115015000 +0100
@@ -14,13 +14,13 @@
1
- 66
- 2024-10-17T23:22:01Z
+ 67
+ 2024-10-29T00:19:48Z
current
2024-05-13T23:09:39Z
- 2024-10-17T23:22:01Z
+ 2024-10-29T00:19:48Z
cve-database/bin/generate-cvrf-cve.pl
2020-12-27T01:00:00Z
@@ -2896,18 +2896,30 @@
kernel-livepatch-5_14_21-150400_24_103-default-8-150400.2.1
+
+ kernel-livepatch-5_14_21-150400_24_108-default-10-150400.9.8.1
+
kernel-livepatch-5_14_21-150400_24_108-default-9-150400.9.8.1
kernel-livepatch-5_14_21-150400_24_111-default-7-150400.9.6.1
+
+ kernel-livepatch-5_14_21-150400_24_111-default-8-150400.9.6.1
+
kernel-livepatch-5_14_21-150400_24_116-default-7-150400.9.8.1
+
+ kernel-livepatch-5_14_21-150400_24_116-default-8-150400.9.8.1
+
kernel-livepatch-5_14_21-150400_24_119-default-6-150400.9.6.1
+
+ kernel-livepatch-5_14_21-150400_24_119-default-7-150400.9.6.1
+
kernel-livepatch-5_14_21-150400_24_122-default-1-150400.9.3.2
@@ -2947,24 +2959,39 @@
kernel-livepatch-5_14_21-150500_13_30-rt-9-150500.2.1
+
+ kernel-livepatch-5_14_21-150500_13_35-rt-10-150500.11.8.1
+
kernel-livepatch-5_14_21-150500_13_35-rt-9-150500.11.8.1
kernel-livepatch-5_14_21-150500_13_38-rt-7-150500.11.6.1
+
+ kernel-livepatch-5_14_21-150500_13_38-rt-8-150500.11.6.1
+
kernel-livepatch-5_14_21-150500_13_47-rt-7-150500.11.6.1
+
+ kernel-livepatch-5_14_21-150500_13_47-rt-8-150500.11.6.1
+
kernel-livepatch-5_14_21-150500_13_5-rt-15-150500.2.1
kernel-livepatch-5_14_21-150500_13_52-rt-5-150500.11.8.1
+
+ kernel-livepatch-5_14_21-150500_13_52-rt-6-150500.11.8.1
+
kernel-livepatch-5_14_21-150500_13_55-rt-5-150500.11.6.1
+
+ kernel-livepatch-5_14_21-150500_13_55-rt-6-150500.11.6.1
+
kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1
@@ -2989,21 +3016,36 @@
kernel-livepatch-5_14_21-150500_55_44-default-9-150500.2.1
+
+ kernel-livepatch-5_14_21-150500_55_49-default-10-150500.11.8.1
+
kernel-livepatch-5_14_21-150500_55_49-default-9-150500.11.8.1
kernel-livepatch-5_14_21-150500_55_52-default-7-150500.11.6.1
+
+ kernel-livepatch-5_14_21-150500_55_52-default-8-150500.11.6.1
+
kernel-livepatch-5_14_21-150500_55_59-default-7-150500.11.10.1
+
+ kernel-livepatch-5_14_21-150500_55_59-default-8-150500.11.10.1
+
kernel-livepatch-5_14_21-150500_55_62-default-5-150500.11.6.1
+
+ kernel-livepatch-5_14_21-150500_55_62-default-6-150500.11.6.1
+
kernel-livepatch-5_14_21-150500_55_65-default-5-150500.11.6.1
+
+ kernel-livepatch-5_14_21-150500_55_65-default-6-150500.11.6.1
+
kernel-livepatch-5_14_21-150500_55_68-default-1-150500.11.3.1
@@ -3037,12 +3079,21 @@
kernel-livepatch-5_3_18-150200_24_183-default-8-150200.5.6.1
+
+ kernel-livepatch-5_3_18-150200_24_183-default-9-150200.5.6.1
+
kernel-livepatch-5_3_18-150200_24_188-default-7-150200.5.6.1
+
+ kernel-livepatch-5_3_18-150200_24_188-default-8-150200.5.6.1
+
kernel-livepatch-5_3_18-150200_24_191-default-6-150200.5.6.1
+
+ kernel-livepatch-5_3_18-150200_24_191-default-7-150200.5.6.1
+
kernel-livepatch-5_3_18-150200_24_194-default-1-150200.5.3.1
@@ -3073,12 +3124,21 @@
kernel-livepatch-5_3_18-150300_59_153-default-8-150300.7.6.1
+
+ kernel-livepatch-5_3_18-150300_59_153-default-9-150300.7.6.1
+
kernel-livepatch-5_3_18-150300_59_158-default-7-150300.7.6.1
+
+ kernel-livepatch-5_3_18-150300_59_158-default-8-150300.7.6.1
+
kernel-livepatch-5_3_18-150300_59_161-default-6-150300.7.6.1
+
+ kernel-livepatch-5_3_18-150300_59_161-default-7-150300.7.6.1
+
kernel-livepatch-5_3_18-150300_59_164-default-1-150300.7.3.1
@@ -3352,9 +3412,15 @@
kgraft-patch-4_12_14-122_201-default-8-8.10.1
+
+ kgraft-patch-4_12_14-122_201-default-9-8.10.1
+
kgraft-patch-4_12_14-122_216-default-6-8.6.1
+
+ kgraft-patch-4_12_14-122_216-default-7-8.6.1
+
kgraft-patch-4_12_14-122_219-default-1-8.3.1
@@ -6664,6 +6730,72 @@
kernel-rt-5.14.21-150500.13.58.1 as a component of openSUSE Leap Micro 5.5
+
+ kgraft-patch-4_12_14-122_201-default-9-8.10.1 as a component of SUSE Linux Enterprise Live Patching 12 SP5
+
+
+ kgraft-patch-4_12_14-122_216-default-7-8.6.1 as a component of SUSE Linux Enterprise Live Patching 12 SP5
+
+
+ kernel-livepatch-5_3_18-150200_24_183-default-9-150200.5.6.1 as a component of SUSE Linux Enterprise Live Patching 15 SP2
+
+
+ kernel-livepatch-5_3_18-150200_24_188-default-8-150200.5.6.1 as a component of SUSE Linux Enterprise Live Patching 15 SP2
+
+
+ kernel-livepatch-5_3_18-150200_24_191-default-7-150200.5.6.1 as a component of SUSE Linux Enterprise Live Patching 15 SP2
+
+
+ kernel-livepatch-5_3_18-150300_59_153-default-9-150300.7.6.1 as a component of SUSE Linux Enterprise Live Patching 15 SP3
+
+
+ kernel-livepatch-5_3_18-150300_59_158-default-8-150300.7.6.1 as a component of SUSE Linux Enterprise Live Patching 15 SP3
+
+
+ kernel-livepatch-5_3_18-150300_59_161-default-7-150300.7.6.1 as a component of SUSE Linux Enterprise Live Patching 15 SP3
+
+
+ kernel-livepatch-5_14_21-150400_24_108-default-10-150400.9.8.1 as a component of SUSE Linux Enterprise Live Patching 15 SP4
+
+
+ kernel-livepatch-5_14_21-150400_24_111-default-8-150400.9.6.1 as a component of SUSE Linux Enterprise Live Patching 15 SP4
+
+
+ kernel-livepatch-5_14_21-150400_24_116-default-8-150400.9.8.1 as a component of SUSE Linux Enterprise Live Patching 15 SP4
+
+
+ kernel-livepatch-5_14_21-150400_24_119-default-7-150400.9.6.1 as a component of SUSE Linux Enterprise Live Patching 15 SP4
+
+
+ kernel-livepatch-5_14_21-150500_13_35-rt-10-150500.11.8.1 as a component of SUSE Linux Enterprise Live Patching 15 SP5
+
+
+ kernel-livepatch-5_14_21-150500_13_38-rt-8-150500.11.6.1 as a component of SUSE Linux Enterprise Live Patching 15 SP5
+
+
+ kernel-livepatch-5_14_21-150500_13_47-rt-8-150500.11.6.1 as a component of SUSE Linux Enterprise Live Patching 15 SP5
+
+
+ kernel-livepatch-5_14_21-150500_13_52-rt-6-150500.11.8.1 as a component of SUSE Linux Enterprise Live Patching 15 SP5
+
+
+ kernel-livepatch-5_14_21-150500_13_55-rt-6-150500.11.6.1 as a component of SUSE Linux Enterprise Live Patching 15 SP5
+
+
+ kernel-livepatch-5_14_21-150500_55_49-default-10-150500.11.8.1 as a component of SUSE Linux Enterprise Live Patching 15 SP5
+
+
+ kernel-livepatch-5_14_21-150500_55_52-default-8-150500.11.6.1 as a component of SUSE Linux Enterprise Live Patching 15 SP5
+
+
+ kernel-livepatch-5_14_21-150500_55_59-default-8-150500.11.10.1 as a component of SUSE Linux Enterprise Live Patching 15 SP5
+
+
+ kernel-livepatch-5_14_21-150500_55_62-default-6-150500.11.6.1 as a component of SUSE Linux Enterprise Live Patching 15 SP5
+
+
+ kernel-livepatch-5_14_21-150500_55_65-default-6-150500.11.6.1 as a component of SUSE Linux Enterprise Live Patching 15 SP5
+
kernel-default as a component of SUSE Linux Enterprise Micro 5.0
@@ -7993,6 +8125,30 @@
openSUSE Leap Micro 5.5:kernel-default-base-5.14.21-150500.55.68.1.150500.6.31.1
openSUSE Leap Micro 5.5:kernel-rt-5.14.21-150500.13.58.1
+
+ SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_201-default-9-8.10.1
+ SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_216-default-7-8.6.1
+ SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_183-default-9-150200.5.6.1
+ SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_188-default-8-150200.5.6.1
+ SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_191-default-7-150200.5.6.1
+ SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_153-default-9-150300.7.6.1
+ SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_158-default-8-150300.7.6.1
+ SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_161-default-7-150300.7.6.1
+ SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_108-default-10-150400.9.8.1
+ SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_111-default-8-150400.9.6.1
+ SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_116-default-8-150400.9.8.1
+ SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_119-default-7-150400.9.6.1
+ SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_35-rt-10-150500.11.8.1
+ SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_38-rt-8-150500.11.6.1
+ SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_47-rt-8-150500.11.6.1
+ SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_52-rt-6-150500.11.8.1
+ SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_55-rt-6-150500.11.6.1
+ SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_49-default-10-150500.11.8.1
+ SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_52-default-8-150500.11.6.1
+ SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_59-default-8-150500.11.10.1
+ SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-6-150500.11.6.1
+ SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_65-default-6-150500.11.6.1
+
SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-default
SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-default-base
skipping CVE-2024-27397 as CVE page is older than CVRF-CVE file.
no cpe found for SUSE Package Hub 15 SP5 in CVE-2024-27351
skipping CVE-2024-27395 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-27394 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-27393 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-27392 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-27391 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-27390 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-27389 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-27388 as CVE page is older than CVRF-CVE file.
no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2024-27316
no cpe found for SUSE Package Hub 15 SP5 in CVE-2024-27305
skipping CVE-2024-27306 as CVE page is older than CVRF-CVE file.
no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2024-27099
skipping CVE-2024-27282 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-27281 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-27280 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-27267 as CVE page is older than CVRF-CVE file.
no cpe found for SUSE Package Hub 15 SP5 in CVE-2024-27082
no cpe found for SUSE Package Hub 15 SP6 in CVE-2024-27082
skipping CVE-2024-27080 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-27079 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-27077 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-27076 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-27075 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-27074 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-27073 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-27072 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-27071 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-27070 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-27069 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-27068 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-27067 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-27066 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-27065 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-27064 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-27063 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-27061 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-27060 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-27059 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-27058 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-27057 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-27056 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-27055 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-27054 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-27053 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-27052 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-27051 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-27049 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-27048 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-27047 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-27046 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-27045 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-27044 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-27043 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-27042 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-27041 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-27040 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-27039 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-27038 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-27037 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-27036 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-27035 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-27034 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-27033 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-27032 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-27031 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-27030 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-27029 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-27028 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-27027 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-27026 as CVE page is older than CVRF-CVE file.
--- /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2024-27025.xml 2024-10-16 01:26:40.026825000 +0200
+++ /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2024-27025.xml.new 2024-10-29 01:19:58.927958000 +0100
@@ -14,13 +14,13 @@
1
- 49
- 2024-10-15T23:26:39Z
+ 50
+ 2024-10-29T00:19:58Z
current
2024-05-02T23:10:42Z
- 2024-10-15T23:26:39Z
+ 2024-10-29T00:19:58Z
cve-database/bin/generate-cvrf-cve.pl
2020-12-27T01:00:00Z
@@ -169,6 +169,21 @@
Image SLES12-SP5-EC2-BYOS
+
+
+ Image SLES12-SP5-GCE-BYOS
+
+
+
+
+ Image SLES12-SP5-GCE-SAP-BYOS
+
+
+
+
+ Image SLES12-SP5-GCE-SAP-On-Demand
+
+
Image SLES12-SP5-SAP-Azure-LI-BYOS-Production
@@ -2230,6 +2245,39 @@
kernel-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-EC2-BYOS
+
+ kernel-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-BYOS
+
+
+ cluster-md-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ dlm-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ gfs2-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ kernel-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ ocfs2-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ cluster-md-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
+
+ dlm-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
+
+ gfs2-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
+
+ kernel-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
+
+ ocfs2-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
cluster-md-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-SAP-Azure-LI-BYOS-Production
@@ -4518,6 +4566,17 @@
Image SLES12-SP5-Azure-SAP-BYOS:kernel-default-4.12.14-122.225.1
Image SLES12-SP5-Azure-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.225.1
Image SLES12-SP5-EC2-BYOS:kernel-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-BYOS:kernel-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-BYOS:cluster-md-kmp-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-BYOS:dlm-kmp-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-BYOS:gfs2-kmp-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-BYOS:kernel-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:cluster-md-kmp-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:dlm-kmp-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:gfs2-kmp-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:kernel-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:ocfs2-kmp-default-4.12.14-122.225.1
Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:cluster-md-kmp-default-4.12.14-122.225.1
Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:dlm-kmp-default-4.12.14-122.225.1
Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:gfs2-kmp-default-4.12.14-122.225.1
--- /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2024-27024.xml 2024-10-22 01:39:04.319701000 +0200
+++ /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2024-27024.xml.new 2024-10-29 01:19:59.942930000 +0100
@@ -14,13 +14,13 @@
1
- 35
- 2024-10-21T23:39:03Z
+ 36
+ 2024-10-29T00:19:59Z
current
2024-05-02T23:10:42Z
- 2024-10-21T23:39:03Z
+ 2024-10-29T00:19:59Z
cve-database/bin/generate-cvrf-cve.pl
2020-12-27T01:00:00Z
@@ -591,6 +591,253 @@
openSUSE Leap Micro 5.5
+
+
+ SLES 15 SP1 CHOST Images for Amazon EC2 suse-sles-15-sp1-chost-byos-v20210304-hvm-ssd-x86_64
+ SLES 15 SP1 CHOST Images for Amazon EC2 suse-sles-15-sp1-chost-byos-v20220127-hvm-ssd-x86_64
+ SLES 15 SP1 CHOST Images for Amazon EC2 suse-sles-15-sp1-chost-byos-v20220715-hvm-ssd-x86_64
+
+
+ SLES 15 SP2 CHOST Images for Amazon EC2 suse-sles-15-sp2-chost-byos-v20210610-hvm-ssd-x86_64
+ SLES 15 SP2 CHOST Images for Amazon EC2 suse-sles-15-sp2-chost-byos-v20210722-hvm-ssd-x86_64
+ SLES 15 SP2 CHOST Images for Amazon EC2 suse-sles-15-sp2-chost-byos-v20210913-hvm-ssd-x86_64
+ SLES 15 SP2 CHOST Images for Amazon EC2 suse-sles-15-sp2-chost-byos-v20211025-hvm-ssd-x86_64
+ SLES 15 SP2 CHOST Images for Amazon EC2 suse-sles-15-sp2-chost-byos-v20220126-hvm-ssd-x86_64
+ SLES 15 SP2 CHOST Images for Amazon EC2 suse-sles-15-sp2-chost-byos-v20220718-hvm-ssd-x86_64
+
+
+ SLES 15 SP3 CHOST Images for Amazon EC2 suse-sles-15-sp3-chost-byos-v20210729-hvm-ssd-x86_64
+ SLES 15 SP3 CHOST Images for Amazon EC2 suse-sles-15-sp3-chost-byos-v20210827-hvm-ssd-x86_64
+ SLES 15 SP3 CHOST Images for Amazon EC2 suse-sles-15-sp3-chost-byos-v20210927-hvm-ssd-x86_64
+ SLES 15 SP3 CHOST Images for Amazon EC2 suse-sles-15-sp3-chost-byos-v20211004-hvm-ssd-x86_64
+ SLES 15 SP3 CHOST Images for Amazon EC2 suse-sles-15-sp3-chost-byos-v20211101-hvm-ssd-x86_64
+ SLES 15 SP3 CHOST Images for Amazon EC2 suse-sles-15-sp3-chost-byos-v20211202-hvm-ssd-x86_64
+ SLES 15 SP3 CHOST Images for Amazon EC2 suse-sles-15-sp3-chost-byos-v20220103-hvm-ssd-x86_64
+ SLES 15 SP3 CHOST Images for Amazon EC2 suse-sles-15-sp3-chost-byos-v20220126-hvm-ssd-x86_64
+ SLES 15 SP3 CHOST Images for Amazon EC2 suse-sles-15-sp3-chost-byos-v20220222-hvm-ssd-x86_64
+ SLES 15 SP3 CHOST Images for Amazon EC2 suse-sles-15-sp3-chost-byos-v20220310-hvm-ssd-x86_64
+ SLES 15 SP3 CHOST Images for Amazon EC2 suse-sles-15-sp3-chost-byos-v20220411-hvm-ssd-x86_64
+ SLES 15 SP3 CHOST Images for Amazon EC2 suse-sles-15-sp3-chost-byos-v20220510-hvm-ssd-x86_64
+ SLES 15 SP3 CHOST Images for Amazon EC2 suse-sles-15-sp3-chost-byos-v20220608-hvm-ssd-x86_64
+ SLES 15 SP3 CHOST Images for Amazon EC2 suse-sles-15-sp3-chost-byos-v20220708-hvm-ssd-x86_64
+ SLES 15 SP3 CHOST Images for Amazon EC2 suse-sles-15-sp3-chost-byos-v20220718-hvm-ssd-x86_64
+ SLES 15 SP3 CHOST Images for Amazon EC2 suse-sles-15-sp3-chost-byos-v20220818-hvm-ssd-x86_64
+ SLES 15 SP3 CHOST Images for Amazon EC2 suse-sles-15-sp3-chost-byos-v20220916-hvm-ssd-x86_64
+ SLES 15 SP3 CHOST Images for Amazon EC2 suse-sles-15-sp3-chost-byos-v20220921-hvm-ssd-x86_64
+ SLES 15 SP3 CHOST Images for Amazon EC2 suse-sles-15-sp3-chost-byos-v20221019-hvm-ssd-x86_64
+ SLES 15 SP3 CHOST Images for Amazon EC2 suse-sles-15-sp3-chost-byos-v20221119-hvm-ssd-x86_64
+ SLES 15 SP3 CHOST Images for Amazon EC2 suse-sles-15-sp3-chost-byos-v20221215-hvm-ssd-x86_64
+ SLES 15 SP3 CHOST Images for Amazon EC2 suse-sles-15-sp3-chost-byos-v20230313-hvm-ssd-x86_64
+ SLES 15 SP3 CHOST Images for Amazon EC2 suse-sles-15-sp3-chost-byos-v20230613-hvm-ssd-x86_64
+ SLES 15 SP3 CHOST Images for Amazon EC2 suse-sles-15-sp3-chost-byos-v20240807-hvm-ssd-x86_64
+ SLES 15 SP3 CHOST Images for Amazon EC2 suse-sles-15-sp3-chost-byos-v20240912-hvm-ssd-x86_64
+
+
+ SLES 15 SP4 CHOST Images for Amazon EC2 suse-sles-15-sp4-chost-byos-v20220718-hvm-ssd-x86_64
+ SLES 15 SP4 CHOST Images for Amazon EC2 suse-sles-15-sp4-chost-byos-v20220721-hvm-ssd-x86_64
+ SLES 15 SP4 CHOST Images for Amazon EC2 suse-sles-15-sp4-chost-byos-v20220819-hvm-ssd-x86_64
+ SLES 15 SP4 CHOST Images for Amazon EC2 suse-sles-15-sp4-chost-byos-v20220916-hvm-ssd-x86_64
+ SLES 15 SP4 CHOST Images for Amazon EC2 suse-sles-15-sp4-chost-byos-v20220923-hvm-ssd-x86_64
+ SLES 15 SP4 CHOST Images for Amazon EC2 suse-sles-15-sp4-chost-byos-v20221018-hvm-ssd-x86_64
+ SLES 15 SP4 CHOST Images for Amazon EC2 suse-sles-15-sp4-chost-byos-v20221118-hvm-ssd-x86_64
+ SLES 15 SP4 CHOST Images for Amazon EC2 suse-sles-15-sp4-chost-byos-v20221215-hvm-ssd-x86_64
+ SLES 15 SP4 CHOST Images for Amazon EC2 suse-sles-15-sp4-chost-byos-v20230111-hvm-ssd-x86_64
+ SLES 15 SP4 CHOST Images for Amazon EC2 suse-sles-15-sp4-chost-byos-v20230210-hvm-ssd-x86_64
+ SLES 15 SP4 CHOST Images for Amazon EC2 suse-sles-15-sp4-chost-byos-v20230310-hvm-ssd-x86_64
+ SLES 15 SP4 CHOST Images for Amazon EC2 suse-sles-15-sp4-chost-byos-v20230410-hvm-ssd-x86_64
+ SLES 15 SP4 CHOST Images for Amazon EC2 suse-sles-15-sp4-chost-byos-v20230510-hvm-ssd-x86_64
+ SLES 15 SP4 CHOST Images for Amazon EC2 suse-sles-15-sp4-chost-byos-v20230606-hvm-ssd-x86_64
+ SLES 15 SP4 CHOST Images for Amazon EC2 suse-sles-15-sp4-chost-byos-v20230704-hvm-ssd-x86_64
+ SLES 15 SP4 CHOST Images for Amazon EC2 suse-sles-15-sp4-chost-byos-v20230803-hvm-ssd-x86_64
+ SLES 15 SP4 CHOST Images for Amazon EC2 suse-sles-15-sp4-chost-byos-v20230901-hvm-ssd-x86_64
+ SLES 15 SP4 CHOST Images for Amazon EC2 suse-sles-15-sp4-chost-byos-v20230928-hvm-ssd-x86_64
+ SLES 15 SP4 CHOST Images for Amazon EC2 suse-sles-15-sp4-chost-byos-v20231027-hvm-ssd-x86_64
+ SLES 15 SP4 CHOST Images for Amazon EC2 suse-sles-15-sp4-chost-byos-v20231127-hvm-ssd-x86_64
+ SLES 15 SP4 CHOST Images for Amazon EC2 suse-sles-15-sp4-chost-byos-v20231212-hvm-ssd-x86_64
+ SLES 15 SP4 CHOST Images for Amazon EC2 suse-sles-15-sp4-chost-byos-v20240312-hvm-ssd-x86_64
+ SLES 15 SP4 CHOST Images for Amazon EC2 suse-sles-15-sp4-chost-byos-v20240612-hvm-ssd-x86_64
+ SLES 15 SP4 CHOST Images for Amazon EC2 suse-sles-15-sp4-chost-byos-v20240809-hvm-ssd-x86_64
+ SLES 15 SP4 CHOST Images for Amazon EC2 suse-sles-15-sp4-chost-byos-v20240912-hvm-ssd-x86_64
+
+
+ SLES 15 SP1 CHOST Images for Google sles-15-sp1-chost-byos-v20210202
+ SLES 15 SP1 CHOST Images for Google sles-15-sp1-chost-byos-v20210304
+ SLES 15 SP1 CHOST Images for Google sles-15-sp1-chost-byos-v20220127
+ SLES 15 SP1 CHOST Images for Google sles-15-sp1-chost-byos-v20220715-x86-64
+
+
+ SLES 15 SP2 CHOST Images for Google sles-15-sp2-chost-byos-v20210202
+ SLES 15 SP2 CHOST Images for Google sles-15-sp2-chost-byos-v20210304
+ SLES 15 SP2 CHOST Images for Google sles-15-sp2-chost-byos-v20210405
+ SLES 15 SP2 CHOST Images for Google sles-15-sp2-chost-byos-v20210506
+ SLES 15 SP2 CHOST Images for Google sles-15-sp2-chost-byos-v20210610
+ SLES 15 SP2 CHOST Images for Google sles-15-sp2-chost-byos-v20210722
+ SLES 15 SP2 CHOST Images for Google sles-15-sp2-chost-byos-v20210913
+ SLES 15 SP2 CHOST Images for Google sles-15-sp2-chost-byos-v20211025
+ SLES 15 SP2 CHOST Images for Google sles-15-sp2-chost-byos-v20220126
+ SLES 15 SP2 CHOST Images for Google sles-15-sp2-chost-byos-v20220718-x86-64
+
+
+ SLES 15 SP3 CHOST Images for Google sles-15-sp3-chost-byos-v20210729
+ SLES 15 SP3 CHOST Images for Google sles-15-sp3-chost-byos-v20210827
+ SLES 15 SP3 CHOST Images for Google sles-15-sp3-chost-byos-v20210927
+ SLES 15 SP3 CHOST Images for Google sles-15-sp3-chost-byos-v20211004
+ SLES 15 SP3 CHOST Images for Google sles-15-sp3-chost-byos-v20211101
+ SLES 15 SP3 CHOST Images for Google sles-15-sp3-chost-byos-v20211202
+ SLES 15 SP3 CHOST Images for Google sles-15-sp3-chost-byos-v20220103
+ SLES 15 SP3 CHOST Images for Google sles-15-sp3-chost-byos-v20220126
+ SLES 15 SP3 CHOST Images for Google sles-15-sp3-chost-byos-v20220222
+ SLES 15 SP3 CHOST Images for Google sles-15-sp3-chost-byos-v20220310
+ SLES 15 SP3 CHOST Images for Google sles-15-sp3-chost-byos-v20220411-x86-64
+ SLES 15 SP3 CHOST Images for Google sles-15-sp3-chost-byos-v20220510-x86-64
+ SLES 15 SP3 CHOST Images for Google sles-15-sp3-chost-byos-v20220608-x86-64
+ SLES 15 SP3 CHOST Images for Google sles-15-sp3-chost-byos-v20220708-x86-64
+ SLES 15 SP3 CHOST Images for Google sles-15-sp3-chost-byos-v20220718-x86-64
+ SLES 15 SP3 CHOST Images for Google sles-15-sp3-chost-byos-v20220818-x86-64
+ SLES 15 SP3 CHOST Images for Google sles-15-sp3-chost-byos-v20220916-x86-64
+ SLES 15 SP3 CHOST Images for Google sles-15-sp3-chost-byos-v20221019-x86-64
+ SLES 15 SP3 CHOST Images for Google sles-15-sp3-chost-byos-v20221118-x86-64
+ SLES 15 SP3 CHOST Images for Google sles-15-sp3-chost-byos-v20221215-x86-64
+ SLES 15 SP3 CHOST Images for Google sles-15-sp3-chost-byos-v20230313-x86-64
+ SLES 15 SP3 CHOST Images for Google sles-15-sp3-chost-byos-v20230613-x86-64
+ SLES 15 SP3 CHOST Images for Google sles-15-sp3-chost-byos-v20240807-x86-64
+ SLES 15 SP3 CHOST Images for Google sles-15-sp3-chost-byos-v20240912-x86-64
+
+
+ SLES 15 SP4 CHOST Images for Google sles-15-sp4-chost-byos-v20220718-x86-64
+ SLES 15 SP4 CHOST Images for Google sles-15-sp4-chost-byos-v20220721-x86-64
+ SLES 15 SP4 CHOST Images for Google sles-15-sp4-chost-byos-v20220818-x86-64
+ SLES 15 SP4 CHOST Images for Google sles-15-sp4-chost-byos-v20220916-x86-64
+ SLES 15 SP4 CHOST Images for Google sles-15-sp4-chost-byos-v20221018-x86-64
+ SLES 15 SP4 CHOST Images for Google sles-15-sp4-chost-byos-v20221118-x86-64
+ SLES 15 SP4 CHOST Images for Google sles-15-sp4-chost-byos-v20221215-arm64
+ SLES 15 SP4 CHOST Images for Google sles-15-sp4-chost-byos-v20221215-x86-64
+ SLES 15 SP4 CHOST Images for Google sles-15-sp4-chost-byos-v20230111-arm64
+ SLES 15 SP4 CHOST Images for Google sles-15-sp4-chost-byos-v20230111-x86-64
+ SLES 15 SP4 CHOST Images for Google sles-15-sp4-chost-byos-v20230210-arm64
+ SLES 15 SP4 CHOST Images for Google sles-15-sp4-chost-byos-v20230210-x86-64
+ SLES 15 SP4 CHOST Images for Google sles-15-sp4-chost-byos-v20230310-arm64
+ SLES 15 SP4 CHOST Images for Google sles-15-sp4-chost-byos-v20230310-x86-64
+ SLES 15 SP4 CHOST Images for Google sles-15-sp4-chost-byos-v20230410-arm64
+ SLES 15 SP4 CHOST Images for Google sles-15-sp4-chost-byos-v20230410-x86-64
+ SLES 15 SP4 CHOST Images for Google sles-15-sp4-chost-byos-v20230510-arm64
+ SLES 15 SP4 CHOST Images for Google sles-15-sp4-chost-byos-v20230510-x86-64
+ SLES 15 SP4 CHOST Images for Google sles-15-sp4-chost-byos-v20230606-arm64
+ SLES 15 SP4 CHOST Images for Google sles-15-sp4-chost-byos-v20230606-x86-64
+ SLES 15 SP4 CHOST Images for Google sles-15-sp4-chost-byos-v20230704-arm64
+ SLES 15 SP4 CHOST Images for Google sles-15-sp4-chost-byos-v20230704-x86-64
+ SLES 15 SP4 CHOST Images for Google sles-15-sp4-chost-byos-v20230804-arm64
+ SLES 15 SP4 CHOST Images for Google sles-15-sp4-chost-byos-v20230804-x86-64
+ SLES 15 SP4 CHOST Images for Google sles-15-sp4-chost-byos-v20230901-arm64
+ SLES 15 SP4 CHOST Images for Google sles-15-sp4-chost-byos-v20230901-x86-64
+ SLES 15 SP4 CHOST Images for Google sles-15-sp4-chost-byos-v20230928-arm64
+ SLES 15 SP4 CHOST Images for Google sles-15-sp4-chost-byos-v20230928-x86-64
+ SLES 15 SP4 CHOST Images for Google sles-15-sp4-chost-byos-v20231027-arm64
+ SLES 15 SP4 CHOST Images for Google sles-15-sp4-chost-byos-v20231027-x86-64
+ SLES 15 SP4 CHOST Images for Google sles-15-sp4-chost-byos-v20231127-arm64
+ SLES 15 SP4 CHOST Images for Google sles-15-sp4-chost-byos-v20231127-x86-64
+ SLES 15 SP4 CHOST Images for Google sles-15-sp4-chost-byos-v20231212-arm64
+ SLES 15 SP4 CHOST Images for Google sles-15-sp4-chost-byos-v20231212-x86-64
+ SLES 15 SP4 CHOST Images for Google sles-15-sp4-chost-byos-v20240312-arm64
+ SLES 15 SP4 CHOST Images for Google sles-15-sp4-chost-byos-v20240312-x86-64
+ SLES 15 SP4 CHOST Images for Google sles-15-sp4-chost-byos-v20240612-arm64
+ SLES 15 SP4 CHOST Images for Google sles-15-sp4-chost-byos-v20240612-x86-64
+ SLES 15 SP4 CHOST Images for Google sles-15-sp4-chost-byos-v20240809-arm64
+ SLES 15 SP4 CHOST Images for Google sles-15-sp4-chost-byos-v20240809-x86-64
+ SLES 15 SP4 CHOST Images for Google sles-15-sp4-chost-byos-v20240912-arm64
+ SLES 15 SP4 CHOST Images for Google sles-15-sp4-chost-byos-v20240912-x86-64
+
+
+ SLES 15 SP1 CHOST Images for Microsoft Azure suse-sles-15-sp1-chost-byos-v20210202
+ SLES 15 SP1 CHOST Images for Microsoft Azure suse-sles-15-sp1-chost-byos-v20210304
+ SLES 15 SP1 CHOST Images for Microsoft Azure suse-sles-15-sp1-chost-byos-v20220127
+ SLES 15 SP1 CHOST Images for Microsoft Azure suse-sles-15-sp1-chost-byos-v20220715-x86_64
+
+
+ SLES 15 SP2 CHOST Images for Microsoft Azure suse-sles-15-sp2-chost-byos-v20210202
+ SLES 15 SP2 CHOST Images for Microsoft Azure suse-sles-15-sp2-chost-byos-v20210304
+ SLES 15 SP2 CHOST Images for Microsoft Azure suse-sles-15-sp2-chost-byos-v20210405
+ SLES 15 SP2 CHOST Images for Microsoft Azure suse-sles-15-sp2-chost-byos-v20210506
+ SLES 15 SP2 CHOST Images for Microsoft Azure suse-sles-15-sp2-chost-byos-v20210610
+ SLES 15 SP2 CHOST Images for Microsoft Azure suse-sles-15-sp2-chost-byos-v20210722
+ SLES 15 SP2 CHOST Images for Microsoft Azure suse-sles-15-sp2-chost-byos-v20210913
+ SLES 15 SP2 CHOST Images for Microsoft Azure suse-sles-15-sp2-chost-byos-v20211025
+ SLES 15 SP2 CHOST Images for Microsoft Azure suse-sles-15-sp2-chost-byos-v20220126
+ SLES 15 SP2 CHOST Images for Microsoft Azure suse-sles-15-sp2-chost-byos-v20220718-x86_64
+
+
+ SLES 15 SP3 CHOST Images for Microsoft Azure suse-sles-15-sp3-chost-byos-v20210729
+ SLES 15 SP3 CHOST Images for Microsoft Azure suse-sles-15-sp3-chost-byos-v20210827
+ SLES 15 SP3 CHOST Images for Microsoft Azure suse-sles-15-sp3-chost-byos-v20210927
+ SLES 15 SP3 CHOST Images for Microsoft Azure suse-sles-15-sp3-chost-byos-v20211004
+ SLES 15 SP3 CHOST Images for Microsoft Azure suse-sles-15-sp3-chost-byos-v20211101
+ SLES 15 SP3 CHOST Images for Microsoft Azure suse-sles-15-sp3-chost-byos-v20211202
+ SLES 15 SP3 CHOST Images for Microsoft Azure suse-sles-15-sp3-chost-byos-v20220103
+ SLES 15 SP3 CHOST Images for Microsoft Azure suse-sles-15-sp3-chost-byos-v20220126
+ SLES 15 SP3 CHOST Images for Microsoft Azure suse-sles-15-sp3-chost-byos-v20220222
+ SLES 15 SP3 CHOST Images for Microsoft Azure suse-sles-15-sp3-chost-byos-v20220310
+ SLES 15 SP3 CHOST Images for Microsoft Azure suse-sles-15-sp3-chost-byos-v20220411-x86_64
+ SLES 15 SP3 CHOST Images for Microsoft Azure suse-sles-15-sp3-chost-byos-v20220510-x86_64
+ SLES 15 SP3 CHOST Images for Microsoft Azure suse-sles-15-sp3-chost-byos-v20220609-x86_64
+ SLES 15 SP3 CHOST Images for Microsoft Azure suse-sles-15-sp3-chost-byos-v20220708-x86_64
+ SLES 15 SP3 CHOST Images for Microsoft Azure suse-sles-15-sp3-chost-byos-v20220718-x86_64
+ SLES 15 SP3 CHOST Images for Microsoft Azure suse-sles-15-sp3-chost-byos-v20220818-x86_64
+ SLES 15 SP3 CHOST Images for Microsoft Azure suse-sles-15-sp3-chost-byos-v20220916-x86_64
+ SLES 15 SP3 CHOST Images for Microsoft Azure suse-sles-15-sp3-chost-byos-v20220921-x86_64
+ SLES 15 SP3 CHOST Images for Microsoft Azure suse-sles-15-sp3-chost-byos-v20221019-x86_64
+ SLES 15 SP3 CHOST Images for Microsoft Azure suse-sles-15-sp3-chost-byos-v20221119-x86_64
+ SLES 15 SP3 CHOST Images for Microsoft Azure suse-sles-15-sp3-chost-byos-v20221215-x86_64
+ SLES 15 SP3 CHOST Images for Microsoft Azure suse-sles-15-sp3-chost-byos-v20230313-x86_64
+ SLES 15 SP3 CHOST Images for Microsoft Azure suse-sles-15-sp3-chost-byos-v20230613-x86_64
+ SLES 15 SP3 CHOST Images for Microsoft Azure suse-sles-15-sp3-chost-byos-v20240807-x86_64
+ SLES 15 SP3 CHOST Images for Microsoft Azure suse-sles-15-sp3-chost-byos-v20240912-x86_64
+
+
+ SLES 15 SP4 CHOST Images for Microsoft Azure suse-sles-15-sp4-chost-byos-v20220718-x86_64
+ SLES 15 SP4 CHOST Images for Microsoft Azure suse-sles-15-sp4-chost-byos-v20220721-x86_64
+ SLES 15 SP4 CHOST Images for Microsoft Azure suse-sles-15-sp4-chost-byos-v20220819-x86_64
+ SLES 15 SP4 CHOST Images for Microsoft Azure suse-sles-15-sp4-chost-byos-v20220916-x86_64
+ SLES 15 SP4 CHOST Images for Microsoft Azure suse-sles-15-sp4-chost-byos-v20220923-x86_64
+ SLES 15 SP4 CHOST Images for Microsoft Azure suse-sles-15-sp4-chost-byos-v20221018-x86_64
+ SLES 15 SP4 CHOST Images for Microsoft Azure suse-sles-15-sp4-chost-byos-v20221118-x86_64
+ SLES 15 SP4 CHOST Images for Microsoft Azure suse-sles-15-sp4-chost-byos-v20221215-arm64
+ SLES 15 SP4 CHOST Images for Microsoft Azure suse-sles-15-sp4-chost-byos-v20221215-x86_64
+ SLES 15 SP4 CHOST Images for Microsoft Azure suse-sles-15-sp4-chost-byos-v20230111-arm64
+ SLES 15 SP4 CHOST Images for Microsoft Azure suse-sles-15-sp4-chost-byos-v20230111-x86_64
+ SLES 15 SP4 CHOST Images for Microsoft Azure suse-sles-15-sp4-chost-byos-v20230210-arm64
+ SLES 15 SP4 CHOST Images for Microsoft Azure suse-sles-15-sp4-chost-byos-v20230210-x86_64
+ SLES 15 SP4 CHOST Images for Microsoft Azure suse-sles-15-sp4-chost-byos-v20230310-arm64
+ SLES 15 SP4 CHOST Images for Microsoft Azure suse-sles-15-sp4-chost-byos-v20230310-x86_64
+ SLES 15 SP4 CHOST Images for Microsoft Azure suse-sles-15-sp4-chost-byos-v20230410-arm64
+ SLES 15 SP4 CHOST Images for Microsoft Azure suse-sles-15-sp4-chost-byos-v20230410-x86_64
+ SLES 15 SP4 CHOST Images for Microsoft Azure suse-sles-15-sp4-chost-byos-v20230510-arm64
+ SLES 15 SP4 CHOST Images for Microsoft Azure suse-sles-15-sp4-chost-byos-v20230510-x86_64
+ SLES 15 SP4 CHOST Images for Microsoft Azure suse-sles-15-sp4-chost-byos-v20230606-arm64
+ SLES 15 SP4 CHOST Images for Microsoft Azure suse-sles-15-sp4-chost-byos-v20230606-x86_64
+ SLES 15 SP4 CHOST Images for Microsoft Azure suse-sles-15-sp4-chost-byos-v20230704-arm64
+ SLES 15 SP4 CHOST Images for Microsoft Azure suse-sles-15-sp4-chost-byos-v20230704-x86_64
+ SLES 15 SP4 CHOST Images for Microsoft Azure suse-sles-15-sp4-chost-byos-v20230803-arm64
+ SLES 15 SP4 CHOST Images for Microsoft Azure suse-sles-15-sp4-chost-byos-v20230803-x86_64
+ SLES 15 SP4 CHOST Images for Microsoft Azure suse-sles-15-sp4-chost-byos-v20230901-arm64
+ SLES 15 SP4 CHOST Images for Microsoft Azure suse-sles-15-sp4-chost-byos-v20230901-x86_64
+ SLES 15 SP4 CHOST Images for Microsoft Azure suse-sles-15-sp4-chost-byos-v20230928-arm64
+ SLES 15 SP4 CHOST Images for Microsoft Azure suse-sles-15-sp4-chost-byos-v20230928-x86_64
+ SLES 15 SP4 CHOST Images for Microsoft Azure suse-sles-15-sp4-chost-byos-v20231027-arm64
+ SLES 15 SP4 CHOST Images for Microsoft Azure suse-sles-15-sp4-chost-byos-v20231027-x86_64
+ SLES 15 SP4 CHOST Images for Microsoft Azure suse-sles-15-sp4-chost-byos-v20231127-arm64
+ SLES 15 SP4 CHOST Images for Microsoft Azure suse-sles-15-sp4-chost-byos-v20231127-x86_64
+ SLES 15 SP4 CHOST Images for Microsoft Azure suse-sles-15-sp4-chost-byos-v20231212-arm64
+ SLES 15 SP4 CHOST Images for Microsoft Azure suse-sles-15-sp4-chost-byos-v20231212-x86_64
+ SLES 15 SP4 CHOST Images for Microsoft Azure suse-sles-15-sp4-chost-byos-v20240312-arm64
+ SLES 15 SP4 CHOST Images for Microsoft Azure suse-sles-15-sp4-chost-byos-v20240312-x86_64
+ SLES 15 SP4 CHOST Images for Microsoft Azure suse-sles-15-sp4-chost-byos-v20240612-arm64
+ SLES 15 SP4 CHOST Images for Microsoft Azure suse-sles-15-sp4-chost-byos-v20240612-x86_64
+ SLES 15 SP4 CHOST Images for Microsoft Azure suse-sles-15-sp4-chost-byos-v20240809-arm64
+ SLES 15 SP4 CHOST Images for Microsoft Azure suse-sles-15-sp4-chost-byos-v20240809-x86_64
+ SLES 15 SP4 CHOST Images for Microsoft Azure suse-sles-15-sp4-chost-byos-v20240912-arm64
+ SLES 15 SP4 CHOST Images for Microsoft Azure suse-sles-15-sp4-chost-byos-v20240912-x86_64
+
+
cluster-md-kmp-64kb-5.14.21-150500.55.80.2
@@ -3422,6 +3669,229 @@
SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra
SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-source
+
+ chost:amazon/suse-sles-15-sp1-chost-byos-v20210304-hvm-ssd-x86_64
+ chost:amazon/suse-sles-15-sp1-chost-byos-v20220127-hvm-ssd-x86_64
+ chost:amazon/suse-sles-15-sp1-chost-byos-v20220715-hvm-ssd-x86_64
+ chost:amazon/suse-sles-15-sp2-chost-byos-v20210610-hvm-ssd-x86_64
+ chost:amazon/suse-sles-15-sp2-chost-byos-v20210722-hvm-ssd-x86_64
+ chost:amazon/suse-sles-15-sp2-chost-byos-v20210913-hvm-ssd-x86_64
+ chost:amazon/suse-sles-15-sp2-chost-byos-v20211025-hvm-ssd-x86_64
+ chost:amazon/suse-sles-15-sp2-chost-byos-v20220126-hvm-ssd-x86_64
+ chost:amazon/suse-sles-15-sp2-chost-byos-v20220718-hvm-ssd-x86_64
+ chost:amazon/suse-sles-15-sp3-chost-byos-v20210729-hvm-ssd-x86_64
+ chost:amazon/suse-sles-15-sp3-chost-byos-v20210827-hvm-ssd-x86_64
+ chost:amazon/suse-sles-15-sp3-chost-byos-v20210927-hvm-ssd-x86_64
+ chost:amazon/suse-sles-15-sp3-chost-byos-v20211004-hvm-ssd-x86_64
+ chost:amazon/suse-sles-15-sp3-chost-byos-v20211101-hvm-ssd-x86_64
+ chost:amazon/suse-sles-15-sp3-chost-byos-v20211202-hvm-ssd-x86_64
+ chost:amazon/suse-sles-15-sp3-chost-byos-v20220103-hvm-ssd-x86_64
+ chost:amazon/suse-sles-15-sp3-chost-byos-v20220126-hvm-ssd-x86_64
+ chost:amazon/suse-sles-15-sp3-chost-byos-v20220222-hvm-ssd-x86_64
+ chost:amazon/suse-sles-15-sp3-chost-byos-v20220310-hvm-ssd-x86_64
+ chost:amazon/suse-sles-15-sp3-chost-byos-v20220411-hvm-ssd-x86_64
+ chost:amazon/suse-sles-15-sp3-chost-byos-v20220510-hvm-ssd-x86_64
+ chost:amazon/suse-sles-15-sp3-chost-byos-v20220608-hvm-ssd-x86_64
+ chost:amazon/suse-sles-15-sp3-chost-byos-v20220708-hvm-ssd-x86_64
+ chost:amazon/suse-sles-15-sp3-chost-byos-v20220718-hvm-ssd-x86_64
+ chost:amazon/suse-sles-15-sp3-chost-byos-v20220818-hvm-ssd-x86_64
+ chost:amazon/suse-sles-15-sp3-chost-byos-v20220916-hvm-ssd-x86_64
+ chost:amazon/suse-sles-15-sp3-chost-byos-v20220921-hvm-ssd-x86_64
+ chost:amazon/suse-sles-15-sp3-chost-byos-v20221019-hvm-ssd-x86_64
+ chost:amazon/suse-sles-15-sp3-chost-byos-v20221119-hvm-ssd-x86_64
+ chost:amazon/suse-sles-15-sp3-chost-byos-v20221215-hvm-ssd-x86_64
+ chost:amazon/suse-sles-15-sp3-chost-byos-v20230313-hvm-ssd-x86_64
+ chost:amazon/suse-sles-15-sp3-chost-byos-v20230613-hvm-ssd-x86_64
+ chost:amazon/suse-sles-15-sp3-chost-byos-v20240807-hvm-ssd-x86_64
+ chost:amazon/suse-sles-15-sp3-chost-byos-v20240912-hvm-ssd-x86_64
+ chost:amazon/suse-sles-15-sp4-chost-byos-v20220718-hvm-ssd-x86_64
+ chost:amazon/suse-sles-15-sp4-chost-byos-v20220721-hvm-ssd-x86_64
+ chost:amazon/suse-sles-15-sp4-chost-byos-v20220819-hvm-ssd-x86_64
+ chost:amazon/suse-sles-15-sp4-chost-byos-v20220916-hvm-ssd-x86_64
+ chost:amazon/suse-sles-15-sp4-chost-byos-v20220923-hvm-ssd-x86_64
+ chost:amazon/suse-sles-15-sp4-chost-byos-v20221018-hvm-ssd-x86_64
+ chost:amazon/suse-sles-15-sp4-chost-byos-v20221118-hvm-ssd-x86_64
+ chost:amazon/suse-sles-15-sp4-chost-byos-v20221215-hvm-ssd-x86_64
+ chost:amazon/suse-sles-15-sp4-chost-byos-v20230111-hvm-ssd-x86_64
+ chost:amazon/suse-sles-15-sp4-chost-byos-v20230210-hvm-ssd-x86_64
+ chost:amazon/suse-sles-15-sp4-chost-byos-v20230310-hvm-ssd-x86_64
+ chost:amazon/suse-sles-15-sp4-chost-byos-v20230410-hvm-ssd-x86_64
+ chost:amazon/suse-sles-15-sp4-chost-byos-v20230510-hvm-ssd-x86_64
+ chost:amazon/suse-sles-15-sp4-chost-byos-v20230606-hvm-ssd-x86_64
+ chost:amazon/suse-sles-15-sp4-chost-byos-v20230704-hvm-ssd-x86_64
+ chost:amazon/suse-sles-15-sp4-chost-byos-v20230803-hvm-ssd-x86_64
+ chost:amazon/suse-sles-15-sp4-chost-byos-v20230901-hvm-ssd-x86_64
+ chost:amazon/suse-sles-15-sp4-chost-byos-v20230928-hvm-ssd-x86_64
+ chost:amazon/suse-sles-15-sp4-chost-byos-v20231027-hvm-ssd-x86_64
+ chost:amazon/suse-sles-15-sp4-chost-byos-v20231127-hvm-ssd-x86_64
+ chost:amazon/suse-sles-15-sp4-chost-byos-v20231212-hvm-ssd-x86_64
+ chost:amazon/suse-sles-15-sp4-chost-byos-v20240312-hvm-ssd-x86_64
+ chost:amazon/suse-sles-15-sp4-chost-byos-v20240612-hvm-ssd-x86_64
+ chost:amazon/suse-sles-15-sp4-chost-byos-v20240809-hvm-ssd-x86_64
+ chost:amazon/suse-sles-15-sp4-chost-byos-v20240912-hvm-ssd-x86_64
+ chost:google/sles-15-sp1-chost-byos-v20210202
+ chost:google/sles-15-sp1-chost-byos-v20210304
+ chost:google/sles-15-sp1-chost-byos-v20220127
+ chost:google/sles-15-sp1-chost-byos-v20220715-x86-64
+ chost:google/sles-15-sp2-chost-byos-v20210202
+ chost:google/sles-15-sp2-chost-byos-v20210304
+ chost:google/sles-15-sp2-chost-byos-v20210405
+ chost:google/sles-15-sp2-chost-byos-v20210506
+ chost:google/sles-15-sp2-chost-byos-v20210610
+ chost:google/sles-15-sp2-chost-byos-v20210722
+ chost:google/sles-15-sp2-chost-byos-v20210913
+ chost:google/sles-15-sp2-chost-byos-v20211025
+ chost:google/sles-15-sp2-chost-byos-v20220126
+ chost:google/sles-15-sp2-chost-byos-v20220718-x86-64
+ chost:google/sles-15-sp3-chost-byos-v20210729
+ chost:google/sles-15-sp3-chost-byos-v20210827
+ chost:google/sles-15-sp3-chost-byos-v20210927
+ chost:google/sles-15-sp3-chost-byos-v20211004
+ chost:google/sles-15-sp3-chost-byos-v20211101
+ chost:google/sles-15-sp3-chost-byos-v20211202
+ chost:google/sles-15-sp3-chost-byos-v20220103
+ chost:google/sles-15-sp3-chost-byos-v20220126
+ chost:google/sles-15-sp3-chost-byos-v20220222
+ chost:google/sles-15-sp3-chost-byos-v20220310
+ chost:google/sles-15-sp3-chost-byos-v20220411-x86-64
+ chost:google/sles-15-sp3-chost-byos-v20220510-x86-64
+ chost:google/sles-15-sp3-chost-byos-v20220608-x86-64
+ chost:google/sles-15-sp3-chost-byos-v20220708-x86-64
+ chost:google/sles-15-sp3-chost-byos-v20220718-x86-64
+ chost:google/sles-15-sp3-chost-byos-v20220818-x86-64
+ chost:google/sles-15-sp3-chost-byos-v20220916-x86-64
+ chost:google/sles-15-sp3-chost-byos-v20221019-x86-64
+ chost:google/sles-15-sp3-chost-byos-v20221118-x86-64
+ chost:google/sles-15-sp3-chost-byos-v20221215-x86-64
+ chost:google/sles-15-sp3-chost-byos-v20230313-x86-64
+ chost:google/sles-15-sp3-chost-byos-v20230613-x86-64
+ chost:google/sles-15-sp3-chost-byos-v20240807-x86-64
+ chost:google/sles-15-sp3-chost-byos-v20240912-x86-64
+ chost:google/sles-15-sp4-chost-byos-v20220718-x86-64
+ chost:google/sles-15-sp4-chost-byos-v20220721-x86-64
+ chost:google/sles-15-sp4-chost-byos-v20220818-x86-64
+ chost:google/sles-15-sp4-chost-byos-v20220916-x86-64
+ chost:google/sles-15-sp4-chost-byos-v20221018-x86-64
+ chost:google/sles-15-sp4-chost-byos-v20221118-x86-64
+ chost:google/sles-15-sp4-chost-byos-v20221215-arm64
+ chost:google/sles-15-sp4-chost-byos-v20221215-x86-64
+ chost:google/sles-15-sp4-chost-byos-v20230111-arm64
+ chost:google/sles-15-sp4-chost-byos-v20230111-x86-64
+ chost:google/sles-15-sp4-chost-byos-v20230210-arm64
+ chost:google/sles-15-sp4-chost-byos-v20230210-x86-64
+ chost:google/sles-15-sp4-chost-byos-v20230310-arm64
+ chost:google/sles-15-sp4-chost-byos-v20230310-x86-64
+ chost:google/sles-15-sp4-chost-byos-v20230410-arm64
+ chost:google/sles-15-sp4-chost-byos-v20230410-x86-64
+ chost:google/sles-15-sp4-chost-byos-v20230510-arm64
+ chost:google/sles-15-sp4-chost-byos-v20230510-x86-64
+ chost:google/sles-15-sp4-chost-byos-v20230606-arm64
+ chost:google/sles-15-sp4-chost-byos-v20230606-x86-64
+ chost:google/sles-15-sp4-chost-byos-v20230704-arm64
+ chost:google/sles-15-sp4-chost-byos-v20230704-x86-64
+ chost:google/sles-15-sp4-chost-byos-v20230804-arm64
+ chost:google/sles-15-sp4-chost-byos-v20230804-x86-64
+ chost:google/sles-15-sp4-chost-byos-v20230901-arm64
+ chost:google/sles-15-sp4-chost-byos-v20230901-x86-64
+ chost:google/sles-15-sp4-chost-byos-v20230928-arm64
+ chost:google/sles-15-sp4-chost-byos-v20230928-x86-64
+ chost:google/sles-15-sp4-chost-byos-v20231027-arm64
+ chost:google/sles-15-sp4-chost-byos-v20231027-x86-64
+ chost:google/sles-15-sp4-chost-byos-v20231127-arm64
+ chost:google/sles-15-sp4-chost-byos-v20231127-x86-64
+ chost:google/sles-15-sp4-chost-byos-v20231212-arm64
+ chost:google/sles-15-sp4-chost-byos-v20231212-x86-64
+ chost:google/sles-15-sp4-chost-byos-v20240312-arm64
+ chost:google/sles-15-sp4-chost-byos-v20240312-x86-64
+ chost:google/sles-15-sp4-chost-byos-v20240612-arm64
+ chost:google/sles-15-sp4-chost-byos-v20240612-x86-64
+ chost:google/sles-15-sp4-chost-byos-v20240809-arm64
+ chost:google/sles-15-sp4-chost-byos-v20240809-x86-64
+ chost:google/sles-15-sp4-chost-byos-v20240912-arm64
+ chost:google/sles-15-sp4-chost-byos-v20240912-x86-64
+ chost:microsoft/suse-sles-15-sp1-chost-byos-v20210202
+ chost:microsoft/suse-sles-15-sp1-chost-byos-v20210304
+ chost:microsoft/suse-sles-15-sp1-chost-byos-v20220127
+ chost:microsoft/suse-sles-15-sp1-chost-byos-v20220715-x86_64
+ chost:microsoft/suse-sles-15-sp2-chost-byos-v20210202
+ chost:microsoft/suse-sles-15-sp2-chost-byos-v20210304
+ chost:microsoft/suse-sles-15-sp2-chost-byos-v20210405
+ chost:microsoft/suse-sles-15-sp2-chost-byos-v20210506
+ chost:microsoft/suse-sles-15-sp2-chost-byos-v20210610
+ chost:microsoft/suse-sles-15-sp2-chost-byos-v20210722
+ chost:microsoft/suse-sles-15-sp2-chost-byos-v20210913
+ chost:microsoft/suse-sles-15-sp2-chost-byos-v20211025
+ chost:microsoft/suse-sles-15-sp2-chost-byos-v20220126
+ chost:microsoft/suse-sles-15-sp2-chost-byos-v20220718-x86_64
+ chost:microsoft/suse-sles-15-sp3-chost-byos-v20210729
+ chost:microsoft/suse-sles-15-sp3-chost-byos-v20210827
+ chost:microsoft/suse-sles-15-sp3-chost-byos-v20210927
+ chost:microsoft/suse-sles-15-sp3-chost-byos-v20211004
+ chost:microsoft/suse-sles-15-sp3-chost-byos-v20211101
+ chost:microsoft/suse-sles-15-sp3-chost-byos-v20211202
+ chost:microsoft/suse-sles-15-sp3-chost-byos-v20220103
+ chost:microsoft/suse-sles-15-sp3-chost-byos-v20220126
+ chost:microsoft/suse-sles-15-sp3-chost-byos-v20220222
+ chost:microsoft/suse-sles-15-sp3-chost-byos-v20220310
+ chost:microsoft/suse-sles-15-sp3-chost-byos-v20220411-x86_64
+ chost:microsoft/suse-sles-15-sp3-chost-byos-v20220510-x86_64
+ chost:microsoft/suse-sles-15-sp3-chost-byos-v20220609-x86_64
+ chost:microsoft/suse-sles-15-sp3-chost-byos-v20220708-x86_64
+ chost:microsoft/suse-sles-15-sp3-chost-byos-v20220718-x86_64
+ chost:microsoft/suse-sles-15-sp3-chost-byos-v20220818-x86_64
+ chost:microsoft/suse-sles-15-sp3-chost-byos-v20220916-x86_64
+ chost:microsoft/suse-sles-15-sp3-chost-byos-v20220921-x86_64
+ chost:microsoft/suse-sles-15-sp3-chost-byos-v20221019-x86_64
+ chost:microsoft/suse-sles-15-sp3-chost-byos-v20221119-x86_64
+ chost:microsoft/suse-sles-15-sp3-chost-byos-v20221215-x86_64
+ chost:microsoft/suse-sles-15-sp3-chost-byos-v20230313-x86_64
+ chost:microsoft/suse-sles-15-sp3-chost-byos-v20230613-x86_64
+ chost:microsoft/suse-sles-15-sp3-chost-byos-v20240807-x86_64
+ chost:microsoft/suse-sles-15-sp3-chost-byos-v20240912-x86_64
+ chost:microsoft/suse-sles-15-sp4-chost-byos-v20220718-x86_64
+ chost:microsoft/suse-sles-15-sp4-chost-byos-v20220721-x86_64
+ chost:microsoft/suse-sles-15-sp4-chost-byos-v20220819-x86_64
+ chost:microsoft/suse-sles-15-sp4-chost-byos-v20220916-x86_64
+ chost:microsoft/suse-sles-15-sp4-chost-byos-v20220923-x86_64
+ chost:microsoft/suse-sles-15-sp4-chost-byos-v20221018-x86_64
+ chost:microsoft/suse-sles-15-sp4-chost-byos-v20221118-x86_64
+ chost:microsoft/suse-sles-15-sp4-chost-byos-v20221215-arm64
+ chost:microsoft/suse-sles-15-sp4-chost-byos-v20221215-x86_64
+ chost:microsoft/suse-sles-15-sp4-chost-byos-v20230111-arm64
+ chost:microsoft/suse-sles-15-sp4-chost-byos-v20230111-x86_64
+ chost:microsoft/suse-sles-15-sp4-chost-byos-v20230210-arm64
+ chost:microsoft/suse-sles-15-sp4-chost-byos-v20230210-x86_64
+ chost:microsoft/suse-sles-15-sp4-chost-byos-v20230310-arm64
+ chost:microsoft/suse-sles-15-sp4-chost-byos-v20230310-x86_64
+ chost:microsoft/suse-sles-15-sp4-chost-byos-v20230410-arm64
+ chost:microsoft/suse-sles-15-sp4-chost-byos-v20230410-x86_64
+ chost:microsoft/suse-sles-15-sp4-chost-byos-v20230510-arm64
+ chost:microsoft/suse-sles-15-sp4-chost-byos-v20230510-x86_64
+ chost:microsoft/suse-sles-15-sp4-chost-byos-v20230606-arm64
+ chost:microsoft/suse-sles-15-sp4-chost-byos-v20230606-x86_64
+ chost:microsoft/suse-sles-15-sp4-chost-byos-v20230704-arm64
+ chost:microsoft/suse-sles-15-sp4-chost-byos-v20230704-x86_64
+ chost:microsoft/suse-sles-15-sp4-chost-byos-v20230803-arm64
+ chost:microsoft/suse-sles-15-sp4-chost-byos-v20230803-x86_64
+ chost:microsoft/suse-sles-15-sp4-chost-byos-v20230901-arm64
+ chost:microsoft/suse-sles-15-sp4-chost-byos-v20230901-x86_64
+ chost:microsoft/suse-sles-15-sp4-chost-byos-v20230928-arm64
+ chost:microsoft/suse-sles-15-sp4-chost-byos-v20230928-x86_64
+ chost:microsoft/suse-sles-15-sp4-chost-byos-v20231027-arm64
+ chost:microsoft/suse-sles-15-sp4-chost-byos-v20231027-x86_64
+ chost:microsoft/suse-sles-15-sp4-chost-byos-v20231127-arm64
+ chost:microsoft/suse-sles-15-sp4-chost-byos-v20231127-x86_64
+ chost:microsoft/suse-sles-15-sp4-chost-byos-v20231212-arm64
+ chost:microsoft/suse-sles-15-sp4-chost-byos-v20231212-x86_64
+ chost:microsoft/suse-sles-15-sp4-chost-byos-v20240312-arm64
+ chost:microsoft/suse-sles-15-sp4-chost-byos-v20240312-x86_64
+ chost:microsoft/suse-sles-15-sp4-chost-byos-v20240612-arm64
+ chost:microsoft/suse-sles-15-sp4-chost-byos-v20240612-x86_64
+ chost:microsoft/suse-sles-15-sp4-chost-byos-v20240809-arm64
+ chost:microsoft/suse-sles-15-sp4-chost-byos-v20240809-x86_64
+ chost:microsoft/suse-sles-15-sp4-chost-byos-v20240912-arm64
+ chost:microsoft/suse-sles-15-sp4-chost-byos-v20240912-x86_64
+
skipping CVE-2024-27023 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-27022 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-27021 as CVE page is older than CVRF-CVE file.
--- /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2024-27020.xml 2024-10-16 01:26:43.647652000 +0200
+++ /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2024-27020.xml.new 2024-10-29 01:20:00.769854000 +0100
@@ -14,13 +14,13 @@
1
- 47
- 2024-10-15T23:26:43Z
+ 48
+ 2024-10-29T00:20:00Z
current
2024-05-03T23:09:33Z
- 2024-10-15T23:26:43Z
+ 2024-10-29T00:20:00Z
cve-database/bin/generate-cvrf-cve.pl
2020-12-27T01:00:00Z
@@ -175,6 +175,21 @@
Image SLES12-SP5-EC2-BYOS
+
+
+ Image SLES12-SP5-GCE-BYOS
+
+
+
+
+ Image SLES12-SP5-GCE-SAP-BYOS
+
+
+
+
+ Image SLES12-SP5-GCE-SAP-On-Demand
+
+
Image SLES12-SP5-SAP-Azure-LI-BYOS-Production
@@ -2349,6 +2364,39 @@
kernel-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-EC2-BYOS
+
+ kernel-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-BYOS
+
+
+ cluster-md-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ dlm-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ gfs2-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ kernel-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ ocfs2-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ cluster-md-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
+
+ dlm-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
+
+ gfs2-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
+
+ kernel-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
+
+ ocfs2-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
cluster-md-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-SAP-Azure-LI-BYOS-Production
@@ -4745,6 +4793,17 @@
Image SLES12-SP5-Azure-SAP-BYOS:kernel-default-4.12.14-122.225.1
Image SLES12-SP5-Azure-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.225.1
Image SLES12-SP5-EC2-BYOS:kernel-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-BYOS:kernel-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-BYOS:cluster-md-kmp-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-BYOS:dlm-kmp-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-BYOS:gfs2-kmp-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-BYOS:kernel-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:cluster-md-kmp-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:dlm-kmp-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:gfs2-kmp-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:kernel-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:ocfs2-kmp-default-4.12.14-122.225.1
Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:cluster-md-kmp-default-4.12.14-122.225.1
Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:dlm-kmp-default-4.12.14-122.225.1
Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:gfs2-kmp-default-4.12.14-122.225.1
--- /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2024-27019.xml 2024-10-16 01:26:44.485663000 +0200
+++ /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2024-27019.xml.new 2024-10-29 01:20:01.717851000 +0100
@@ -14,13 +14,13 @@
1
- 48
- 2024-10-15T23:26:43Z
+ 49
+ 2024-10-29T00:20:01Z
current
2024-05-03T23:09:34Z
- 2024-10-15T23:26:43Z
+ 2024-10-29T00:20:01Z
cve-database/bin/generate-cvrf-cve.pl
2020-12-27T01:00:00Z
@@ -175,6 +175,21 @@
Image SLES12-SP5-EC2-BYOS
+
+
+ Image SLES12-SP5-GCE-BYOS
+
+
+
+
+ Image SLES12-SP5-GCE-SAP-BYOS
+
+
+
+
+ Image SLES12-SP5-GCE-SAP-On-Demand
+
+
Image SLES12-SP5-SAP-Azure-LI-BYOS-Production
@@ -2328,6 +2343,39 @@
kernel-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-EC2-BYOS
+
+ kernel-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-BYOS
+
+
+ cluster-md-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ dlm-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ gfs2-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ kernel-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ ocfs2-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ cluster-md-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
+
+ dlm-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
+
+ gfs2-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
+
+ kernel-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
+
+ ocfs2-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
cluster-md-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-SAP-Azure-LI-BYOS-Production
@@ -4709,6 +4757,17 @@
Image SLES12-SP5-Azure-SAP-BYOS:kernel-default-4.12.14-122.225.1
Image SLES12-SP5-Azure-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.225.1
Image SLES12-SP5-EC2-BYOS:kernel-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-BYOS:kernel-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-BYOS:cluster-md-kmp-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-BYOS:dlm-kmp-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-BYOS:gfs2-kmp-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-BYOS:kernel-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:cluster-md-kmp-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:dlm-kmp-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:gfs2-kmp-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:kernel-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:ocfs2-kmp-default-4.12.14-122.225.1
Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:cluster-md-kmp-default-4.12.14-122.225.1
Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:dlm-kmp-default-4.12.14-122.225.1
Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:gfs2-kmp-default-4.12.14-122.225.1
skipping CVE-2024-27018 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-27017 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-27016 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-27015 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-27012 as CVE page is older than CVRF-CVE file.
--- /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2024-27011.xml 2024-10-16 01:26:50.206803000 +0200
+++ /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2024-27011.xml.new 2024-10-29 01:20:06.415069000 +0100
@@ -14,13 +14,13 @@
1
- 33
- 2024-10-15T23:26:49Z
+ 34
+ 2024-10-29T00:20:04Z
current
2024-05-03T23:09:36Z
- 2024-10-15T23:26:49Z
+ 2024-10-29T00:20:04Z
cve-database/bin/generate-cvrf-cve.pl
2020-12-27T01:00:00Z
@@ -146,6 +146,21 @@
Image SLES12-SP5-Azure-SAP-BYOS
+
+
+ Image SLES12-SP5-GCE-BYOS
+
+
+
+
+ Image SLES12-SP5-GCE-SAP-BYOS
+
+
+
+
+ Image SLES12-SP5-GCE-SAP-On-Demand
+
+
Image SLES15-SP5-Azure-Basic
@@ -1761,6 +1776,39 @@
ocfs2-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-Azure-SAP-BYOS
+
+ kernel-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-BYOS
+
+
+ cluster-md-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ dlm-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ gfs2-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ kernel-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ ocfs2-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ cluster-md-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
+
+ dlm-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
+
+ gfs2-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
+
+ kernel-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
+
+ ocfs2-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
kernel-azure-5.14.21-150500.33.66.1 as a component of Image SLES15-SP5-Azure-Basic
@@ -3555,6 +3603,17 @@
Image SLES12-SP5-Azure-SAP-BYOS:gfs2-kmp-default-4.12.14-122.228.1
Image SLES12-SP5-Azure-SAP-BYOS:kernel-default-4.12.14-122.228.1
Image SLES12-SP5-Azure-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.228.1
+ Image SLES12-SP5-GCE-BYOS:kernel-default-4.12.14-122.228.1
+ Image SLES12-SP5-GCE-SAP-BYOS:cluster-md-kmp-default-4.12.14-122.228.1
+ Image SLES12-SP5-GCE-SAP-BYOS:dlm-kmp-default-4.12.14-122.228.1
+ Image SLES12-SP5-GCE-SAP-BYOS:gfs2-kmp-default-4.12.14-122.228.1
+ Image SLES12-SP5-GCE-SAP-BYOS:kernel-default-4.12.14-122.228.1
+ Image SLES12-SP5-GCE-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.228.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:cluster-md-kmp-default-4.12.14-122.228.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:dlm-kmp-default-4.12.14-122.228.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:gfs2-kmp-default-4.12.14-122.228.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:kernel-default-4.12.14-122.228.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:ocfs2-kmp-default-4.12.14-122.228.1
Image SLES15-SP5-Azure-Basic:kernel-azure-5.14.21-150500.33.66.1
Image SLES15-SP5-Azure-Standard:kernel-azure-5.14.21-150500.33.66.1
Image SLES15-SP5-CHOST-BYOS-Aliyun:kernel-default-5.14.21-150500.55.80.2
skipping CVE-2024-27010 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-27009 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-27007 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-27006 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-27005 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-27004 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-27003 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-27002 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-27001 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-27000 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-26999 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-26998 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-26997 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-26995 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-26994 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-26992 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-26991 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-26990 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-26989 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-26988 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-26987 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-26986 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-26985 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-26984 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-26983 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-26982 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-26981 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-26980 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-26978 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-26977 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-26976 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-26975 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-26974 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-26972 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-26971 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-26970 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-26969 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-26968 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-26967 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-26966 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-26965 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-26964 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-26963 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-26962 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-26961 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-26960 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-26959 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-26956 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-26955 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-26954 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-26953 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-26952 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-26951 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-26950 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-26949 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-26948 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-26947 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-26946 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-26945 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-26943 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-26942 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-26941 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-26940 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-26939 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-26938 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-26937 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-26936 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-26935 as CVE page is older than CVRF-CVE file.
no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2024-26930
skipping CVE-2024-26933 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-26932 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-26931 as CVE page is older than CVRF-CVE file.
--- /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2024-26930.xml 2024-10-22 01:40:47.773772000 +0200
+++ /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2024-26930.xml.new 2024-10-29 01:20:12.846775000 +0100
@@ -14,13 +14,13 @@
1
- 73
- 2024-10-21T23:40:47Z
+ 74
+ 2024-10-29T00:20:12Z
current
2024-05-02T23:11:10Z
- 2024-10-21T23:40:47Z
+ 2024-10-29T00:20:12Z
cve-database/bin/generate-cvrf-cve.pl
2020-12-27T01:00:00Z
@@ -2305,18 +2305,30 @@
kernel-livepatch-5_14_21-150400_24_103-default-7-150400.2.1
+
+ kernel-livepatch-5_14_21-150400_24_108-default-10-150400.9.8.1
+
kernel-livepatch-5_14_21-150400_24_108-default-9-150400.9.8.1
kernel-livepatch-5_14_21-150400_24_111-default-7-150400.9.6.1
+
+ kernel-livepatch-5_14_21-150400_24_111-default-8-150400.9.6.1
+
kernel-livepatch-5_14_21-150400_24_116-default-7-150400.9.8.1
+
+ kernel-livepatch-5_14_21-150400_24_116-default-8-150400.9.8.1
+
kernel-livepatch-5_14_21-150400_24_119-default-6-150400.9.6.1
+
+ kernel-livepatch-5_14_21-150400_24_119-default-7-150400.9.6.1
+
kernel-livepatch-5_14_21-150400_24_122-default-1-150400.9.3.2
@@ -2359,12 +2371,18 @@
kernel-livepatch-5_14_21-150500_13_30-rt-8-150500.2.1
+
+ kernel-livepatch-5_14_21-150500_13_35-rt-10-150500.11.8.1
+
kernel-livepatch-5_14_21-150500_13_35-rt-9-150500.11.8.1
kernel-livepatch-5_14_21-150500_13_38-rt-7-150500.11.6.1
+
+ kernel-livepatch-5_14_21-150500_13_38-rt-8-150500.11.6.1
+
kernel-livepatch-5_14_21-150500_13_5-rt-14-150500.2.1
@@ -2392,12 +2410,18 @@
kernel-livepatch-5_14_21-150500_55_44-default-8-150500.2.1
+
+ kernel-livepatch-5_14_21-150500_55_49-default-10-150500.11.8.1
+
kernel-livepatch-5_14_21-150500_55_49-default-9-150500.11.8.1
kernel-livepatch-5_14_21-150500_55_52-default-7-150500.11.6.1
+
+ kernel-livepatch-5_14_21-150500_55_52-default-8-150500.11.6.1
+
kernel-livepatch-5_14_21-150500_55_68-default-1-150500.11.3.1
@@ -2695,6 +2719,9 @@
kgraft-patch-4_12_14-122_201-default-8-8.10.1
+
+ kgraft-patch-4_12_14-122_201-default-9-8.10.1
+
kgraft-patch-4_12_14-122_216-default-1-8.3.1
@@ -5338,6 +5365,33 @@
kernel-rt-5.14.21-150500.13.58.1 as a component of openSUSE Leap Micro 5.5
+
+ kgraft-patch-4_12_14-122_201-default-9-8.10.1 as a component of SUSE Linux Enterprise Live Patching 12 SP5
+
+
+ kernel-livepatch-5_14_21-150400_24_108-default-10-150400.9.8.1 as a component of SUSE Linux Enterprise Live Patching 15 SP4
+
+
+ kernel-livepatch-5_14_21-150400_24_111-default-8-150400.9.6.1 as a component of SUSE Linux Enterprise Live Patching 15 SP4
+
+
+ kernel-livepatch-5_14_21-150400_24_116-default-8-150400.9.8.1 as a component of SUSE Linux Enterprise Live Patching 15 SP4
+
+
+ kernel-livepatch-5_14_21-150400_24_119-default-7-150400.9.6.1 as a component of SUSE Linux Enterprise Live Patching 15 SP4
+
+
+ kernel-livepatch-5_14_21-150500_13_35-rt-10-150500.11.8.1 as a component of SUSE Linux Enterprise Live Patching 15 SP5
+
+
+ kernel-livepatch-5_14_21-150500_13_38-rt-8-150500.11.6.1 as a component of SUSE Linux Enterprise Live Patching 15 SP5
+
+
+ kernel-livepatch-5_14_21-150500_55_49-default-10-150500.11.8.1 as a component of SUSE Linux Enterprise Live Patching 15 SP5
+
+
+ kernel-livepatch-5_14_21-150500_55_52-default-8-150500.11.6.1 as a component of SUSE Linux Enterprise Live Patching 15 SP5
+
kernel-default as a component of SUSE Enterprise Storage 7.1
@@ -6653,6 +6707,17 @@
openSUSE Leap Micro 5.5:kernel-default-base-5.14.21-150500.55.68.1.150500.6.31.1
openSUSE Leap Micro 5.5:kernel-rt-5.14.21-150500.13.58.1
+
+ SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_201-default-9-8.10.1
+ SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_108-default-10-150400.9.8.1
+ SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_111-default-8-150400.9.6.1
+ SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_116-default-8-150400.9.8.1
+ SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_119-default-7-150400.9.6.1
+ SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_35-rt-10-150500.11.8.1
+ SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_38-rt-8-150500.11.6.1
+ SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_49-default-10-150500.11.8.1
+ SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_52-default-8-150500.11.6.1
+
SUSE Enterprise Storage 7.1:kernel-default
SUSE Enterprise Storage 7.1:kernel-default-devel
no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2024-26928
skipping CVE-2024-26929 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-26927 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-26926 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-26925 as CVE page is older than CVRF-CVE file.
--- /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2024-26924.xml 2024-10-22 01:40:54.107965000 +0200
+++ /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2024-26924.xml.new 2024-10-29 01:20:14.331200000 +0100
@@ -14,13 +14,13 @@
1
- 25
- 2024-10-21T23:40:53Z
+ 26
+ 2024-10-29T00:20:13Z
current
2024-04-26T23:09:31Z
- 2024-10-21T23:40:53Z
+ 2024-10-29T00:20:13Z
cve-database/bin/generate-cvrf-cve.pl
2020-12-27T01:00:00Z
@@ -113,6 +113,21 @@
Image SLES12-SP5-EC2-BYOS
+
+
+ Image SLES12-SP5-GCE-BYOS
+
+
+
+
+ Image SLES12-SP5-GCE-SAP-BYOS
+
+
+
+
+ Image SLES12-SP5-GCE-SAP-On-Demand
+
+
Image SLES12-SP5-SAP-Azure-LI-BYOS-Production
@@ -916,6 +931,39 @@
kernel-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-EC2-BYOS
+
+ kernel-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-BYOS
+
+
+ cluster-md-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ dlm-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ gfs2-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ kernel-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ ocfs2-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ cluster-md-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
+
+ dlm-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
+
+ gfs2-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
+
+ kernel-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
+
+ ocfs2-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
cluster-md-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-SAP-Azure-LI-BYOS-Production
@@ -1897,6 +1945,17 @@
Image SLES12-SP5-Azure-SAP-BYOS:kernel-default-4.12.14-122.225.1
Image SLES12-SP5-Azure-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.225.1
Image SLES12-SP5-EC2-BYOS:kernel-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-BYOS:kernel-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-BYOS:cluster-md-kmp-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-BYOS:dlm-kmp-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-BYOS:gfs2-kmp-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-BYOS:kernel-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:cluster-md-kmp-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:dlm-kmp-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:gfs2-kmp-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:kernel-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:ocfs2-kmp-default-4.12.14-122.225.1
Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:cluster-md-kmp-default-4.12.14-122.225.1
Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:dlm-kmp-default-4.12.14-122.225.1
Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:gfs2-kmp-default-4.12.14-122.225.1
no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2024-26923
--- /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2024-26923.xml 2024-10-18 01:23:04.434528000 +0200
+++ /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2024-26923.xml.new 2024-10-29 01:20:15.167140000 +0100
@@ -14,13 +14,13 @@
1
- 77
- 2024-10-17T23:23:03Z
+ 78
+ 2024-10-29T00:20:14Z
current
2024-04-26T23:09:31Z
- 2024-10-17T23:23:03Z
+ 2024-10-29T00:20:14Z
cve-database/bin/generate-cvrf-cve.pl
2020-12-27T01:00:00Z
@@ -3054,21 +3054,36 @@
kernel-livepatch-5_14_21-150400_24_103-default-7-150400.2.1
+
+ kernel-livepatch-5_14_21-150400_24_108-default-10-150400.9.8.1
+
kernel-livepatch-5_14_21-150400_24_108-default-9-150400.9.8.1
kernel-livepatch-5_14_21-150400_24_111-default-7-150400.9.6.1
+
+ kernel-livepatch-5_14_21-150400_24_111-default-8-150400.9.6.1
+
kernel-livepatch-5_14_21-150400_24_116-default-7-150400.9.8.1
+
+ kernel-livepatch-5_14_21-150400_24_116-default-8-150400.9.8.1
+
kernel-livepatch-5_14_21-150400_24_119-default-6-150400.9.6.1
+
+ kernel-livepatch-5_14_21-150400_24_119-default-7-150400.9.6.1
+
kernel-livepatch-5_14_21-150400_24_122-default-4-150400.9.6.1
+
+ kernel-livepatch-5_14_21-150400_24_122-default-5-150400.9.6.1
+
kernel-livepatch-5_14_21-150400_24_125-default-1-150400.9.3.1
@@ -3114,27 +3129,45 @@
kernel-livepatch-5_14_21-150500_13_30-rt-8-150500.2.1
+
+ kernel-livepatch-5_14_21-150500_13_35-rt-10-150500.11.8.1
+
kernel-livepatch-5_14_21-150500_13_35-rt-9-150500.11.8.1
kernel-livepatch-5_14_21-150500_13_38-rt-7-150500.11.6.1
+
+ kernel-livepatch-5_14_21-150500_13_38-rt-8-150500.11.6.1
+
kernel-livepatch-5_14_21-150500_13_47-rt-7-150500.11.6.1
+
+ kernel-livepatch-5_14_21-150500_13_47-rt-8-150500.11.6.1
+
kernel-livepatch-5_14_21-150500_13_5-rt-14-150500.2.1
kernel-livepatch-5_14_21-150500_13_52-rt-5-150500.11.8.1
+
+ kernel-livepatch-5_14_21-150500_13_52-rt-6-150500.11.8.1
+
kernel-livepatch-5_14_21-150500_13_55-rt-5-150500.11.6.1
+
+ kernel-livepatch-5_14_21-150500_13_55-rt-6-150500.11.6.1
+
kernel-livepatch-5_14_21-150500_13_58-rt-4-150500.11.6.1
+
+ kernel-livepatch-5_14_21-150500_13_58-rt-5-150500.11.6.1
+
kernel-livepatch-5_14_21-150500_13_61-rt-1-150500.11.3.1
@@ -3162,24 +3195,42 @@
kernel-livepatch-5_14_21-150500_55_44-default-8-150500.2.1
+
+ kernel-livepatch-5_14_21-150500_55_49-default-10-150500.11.8.1
+
kernel-livepatch-5_14_21-150500_55_49-default-9-150500.11.8.1
kernel-livepatch-5_14_21-150500_55_52-default-7-150500.11.6.1
+
+ kernel-livepatch-5_14_21-150500_55_52-default-8-150500.11.6.1
+
kernel-livepatch-5_14_21-150500_55_59-default-7-150500.11.10.1
+
+ kernel-livepatch-5_14_21-150500_55_59-default-8-150500.11.10.1
+
kernel-livepatch-5_14_21-150500_55_62-default-5-150500.11.6.1
+
+ kernel-livepatch-5_14_21-150500_55_62-default-6-150500.11.6.1
+
kernel-livepatch-5_14_21-150500_55_65-default-5-150500.11.6.1
+
+ kernel-livepatch-5_14_21-150500_55_65-default-6-150500.11.6.1
+
kernel-livepatch-5_14_21-150500_55_68-default-4-150500.11.6.1
+
+ kernel-livepatch-5_14_21-150500_55_68-default-5-150500.11.6.1
+
kernel-livepatch-5_14_21-150500_55_7-default-13-150500.2.1
@@ -3216,15 +3267,27 @@
kernel-livepatch-5_3_18-150200_24_183-default-8-150200.5.6.1
+
+ kernel-livepatch-5_3_18-150200_24_183-default-9-150200.5.6.1
+
kernel-livepatch-5_3_18-150200_24_188-default-7-150200.5.6.1
+
+ kernel-livepatch-5_3_18-150200_24_188-default-8-150200.5.6.1
+
kernel-livepatch-5_3_18-150200_24_191-default-6-150200.5.6.1
+
+ kernel-livepatch-5_3_18-150200_24_191-default-7-150200.5.6.1
+
kernel-livepatch-5_3_18-150200_24_194-default-3-150200.5.6.1
+
+ kernel-livepatch-5_3_18-150200_24_194-default-4-150200.5.6.1
+
kernel-livepatch-5_3_18-150200_24_197-default-1-150200.5.3.1
@@ -3258,15 +3321,27 @@
kernel-livepatch-5_3_18-150300_59_153-default-8-150300.7.6.1
+
+ kernel-livepatch-5_3_18-150300_59_153-default-9-150300.7.6.1
+
kernel-livepatch-5_3_18-150300_59_158-default-7-150300.7.6.1
+
+ kernel-livepatch-5_3_18-150300_59_158-default-8-150300.7.6.1
+
kernel-livepatch-5_3_18-150300_59_161-default-6-150300.7.6.1
+
+ kernel-livepatch-5_3_18-150300_59_161-default-7-150300.7.6.1
+
kernel-livepatch-5_3_18-150300_59_164-default-3-150300.7.6.1
+
+ kernel-livepatch-5_3_18-150300_59_164-default-4-150300.7.6.1
+
kernel-livepatch-5_3_18-150300_59_167-default-1-150300.7.3.1
@@ -3585,12 +3660,21 @@
kgraft-patch-4_12_14-122_201-default-8-8.10.1
+
+ kgraft-patch-4_12_14-122_201-default-9-8.10.1
+
kgraft-patch-4_12_14-122_216-default-6-8.6.1
+
+ kgraft-patch-4_12_14-122_216-default-7-8.6.1
+
kgraft-patch-4_12_14-122_219-default-3-8.6.1
+
+ kgraft-patch-4_12_14-122_219-default-4-8.6.1
+
kgraft-patch-4_12_14-122_222-default-1-8.3.1
@@ -7065,6 +7149,90 @@
kernel-rt-5.14.21-150500.13.61.1 as a component of openSUSE Leap Micro 5.5
+
+ kgraft-patch-4_12_14-122_201-default-9-8.10.1 as a component of SUSE Linux Enterprise Live Patching 12 SP5
+
+
+ kgraft-patch-4_12_14-122_216-default-7-8.6.1 as a component of SUSE Linux Enterprise Live Patching 12 SP5
+
+
+ kgraft-patch-4_12_14-122_219-default-4-8.6.1 as a component of SUSE Linux Enterprise Live Patching 12 SP5
+
+
+ kernel-livepatch-5_3_18-150200_24_183-default-9-150200.5.6.1 as a component of SUSE Linux Enterprise Live Patching 15 SP2
+
+
+ kernel-livepatch-5_3_18-150200_24_188-default-8-150200.5.6.1 as a component of SUSE Linux Enterprise Live Patching 15 SP2
+
+
+ kernel-livepatch-5_3_18-150200_24_191-default-7-150200.5.6.1 as a component of SUSE Linux Enterprise Live Patching 15 SP2
+
+
+ kernel-livepatch-5_3_18-150200_24_194-default-4-150200.5.6.1 as a component of SUSE Linux Enterprise Live Patching 15 SP2
+
+
+ kernel-livepatch-5_3_18-150300_59_153-default-9-150300.7.6.1 as a component of SUSE Linux Enterprise Live Patching 15 SP3
+
+
+ kernel-livepatch-5_3_18-150300_59_158-default-8-150300.7.6.1 as a component of SUSE Linux Enterprise Live Patching 15 SP3
+
+
+ kernel-livepatch-5_3_18-150300_59_161-default-7-150300.7.6.1 as a component of SUSE Linux Enterprise Live Patching 15 SP3
+
+
+ kernel-livepatch-5_3_18-150300_59_164-default-4-150300.7.6.1 as a component of SUSE Linux Enterprise Live Patching 15 SP3
+
+
+ kernel-livepatch-5_14_21-150400_24_108-default-10-150400.9.8.1 as a component of SUSE Linux Enterprise Live Patching 15 SP4
+
+
+ kernel-livepatch-5_14_21-150400_24_111-default-8-150400.9.6.1 as a component of SUSE Linux Enterprise Live Patching 15 SP4
+
+
+ kernel-livepatch-5_14_21-150400_24_116-default-8-150400.9.8.1 as a component of SUSE Linux Enterprise Live Patching 15 SP4
+
+
+ kernel-livepatch-5_14_21-150400_24_119-default-7-150400.9.6.1 as a component of SUSE Linux Enterprise Live Patching 15 SP4
+
+
+ kernel-livepatch-5_14_21-150400_24_122-default-5-150400.9.6.1 as a component of SUSE Linux Enterprise Live Patching 15 SP4
+
+
+ kernel-livepatch-5_14_21-150500_13_35-rt-10-150500.11.8.1 as a component of SUSE Linux Enterprise Live Patching 15 SP5
+
+
+ kernel-livepatch-5_14_21-150500_13_38-rt-8-150500.11.6.1 as a component of SUSE Linux Enterprise Live Patching 15 SP5
+
+
+ kernel-livepatch-5_14_21-150500_13_47-rt-8-150500.11.6.1 as a component of SUSE Linux Enterprise Live Patching 15 SP5
+
+
+ kernel-livepatch-5_14_21-150500_13_52-rt-6-150500.11.8.1 as a component of SUSE Linux Enterprise Live Patching 15 SP5
+
+
+ kernel-livepatch-5_14_21-150500_13_55-rt-6-150500.11.6.1 as a component of SUSE Linux Enterprise Live Patching 15 SP5
+
+
+ kernel-livepatch-5_14_21-150500_13_58-rt-5-150500.11.6.1 as a component of SUSE Linux Enterprise Live Patching 15 SP5
+
+
+ kernel-livepatch-5_14_21-150500_55_49-default-10-150500.11.8.1 as a component of SUSE Linux Enterprise Live Patching 15 SP5
+
+
+ kernel-livepatch-5_14_21-150500_55_52-default-8-150500.11.6.1 as a component of SUSE Linux Enterprise Live Patching 15 SP5
+
+
+ kernel-livepatch-5_14_21-150500_55_59-default-8-150500.11.10.1 as a component of SUSE Linux Enterprise Live Patching 15 SP5
+
+
+ kernel-livepatch-5_14_21-150500_55_62-default-6-150500.11.6.1 as a component of SUSE Linux Enterprise Live Patching 15 SP5
+
+
+ kernel-livepatch-5_14_21-150500_55_65-default-6-150500.11.6.1 as a component of SUSE Linux Enterprise Live Patching 15 SP5
+
+
+ kernel-livepatch-5_14_21-150500_55_68-default-5-150500.11.6.1 as a component of SUSE Linux Enterprise Live Patching 15 SP5
+
kernel-default as a component of SUSE Linux Enterprise Micro 5.0
@@ -8391,6 +8559,36 @@
openSUSE Leap Micro 5.5:kernel-default-base-5.14.21-150500.55.73.1.150500.6.33.8
openSUSE Leap Micro 5.5:kernel-rt-5.14.21-150500.13.61.1
+
+ SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_201-default-9-8.10.1
+ SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_216-default-7-8.6.1
+ SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-4-8.6.1
+ SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_183-default-9-150200.5.6.1
+ SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_188-default-8-150200.5.6.1
+ SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_191-default-7-150200.5.6.1
+ SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_194-default-4-150200.5.6.1
+ SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_153-default-9-150300.7.6.1
+ SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_158-default-8-150300.7.6.1
+ SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_161-default-7-150300.7.6.1
+ SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_164-default-4-150300.7.6.1
+ SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_108-default-10-150400.9.8.1
+ SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_111-default-8-150400.9.6.1
+ SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_116-default-8-150400.9.8.1
+ SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_119-default-7-150400.9.6.1
+ SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_122-default-5-150400.9.6.1
+ SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_35-rt-10-150500.11.8.1
+ SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_38-rt-8-150500.11.6.1
+ SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_47-rt-8-150500.11.6.1
+ SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_52-rt-6-150500.11.8.1
+ SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_55-rt-6-150500.11.6.1
+ SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-5-150500.11.6.1
+ SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_49-default-10-150500.11.8.1
+ SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_52-default-8-150500.11.6.1
+ SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_59-default-8-150500.11.10.1
+ SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-6-150500.11.6.1
+ SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_65-default-6-150500.11.6.1
+ SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_68-default-5-150500.11.6.1
+
chost:amazon/suse-sles-15-sp3-chost-byos-v20240807-hvm-ssd-x86_64
chost:amazon/suse-sles-15-sp3-chost-byos-v20240912-hvm-ssd-x86_64
no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2024-26921
--- /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2024-26920.xml 2024-10-14 01:24:45.044450000 +0200
+++ /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2024-26920.xml.new 2024-10-29 01:20:17.517981000 +0100
@@ -14,13 +14,13 @@
1
- 54
- 2024-10-13T23:24:44Z
+ 55
+ 2024-10-29T00:20:17Z
current
2024-06-07T23:12:24Z
- 2024-10-13T23:24:44Z
+ 2024-10-29T00:20:17Z
cve-database/bin/generate-cvrf-cve.pl
2020-12-27T01:00:00Z
@@ -2170,41 +2170,41 @@
ocfs2-kmp-default-4.12.14-122.219.1 as a component of Image SLES12-SP5-EC2-SAP-On-Demand
-
- kernel-default-4.12.14-122.219.1 as a component of Image SLES12-SP5-GCE-BYOS
+
+ kernel-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-BYOS
kernel-default-4.12.14-122.219.1 as a component of Image SLES12-SP5-GCE-On-Demand
-
- cluster-md-kmp-default-4.12.14-122.219.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+ cluster-md-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
-
- dlm-kmp-default-4.12.14-122.219.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+ dlm-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
-
- gfs2-kmp-default-4.12.14-122.219.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+ gfs2-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
-
- kernel-default-4.12.14-122.219.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+ kernel-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
-
- ocfs2-kmp-default-4.12.14-122.219.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+ ocfs2-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
-
- cluster-md-kmp-default-4.12.14-122.219.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
+ cluster-md-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
-
- dlm-kmp-default-4.12.14-122.219.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
+ dlm-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
-
- gfs2-kmp-default-4.12.14-122.219.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
+ gfs2-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
-
- kernel-default-4.12.14-122.219.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
+ kernel-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
-
- ocfs2-kmp-default-4.12.14-122.219.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
+ ocfs2-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
cluster-md-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-SAP-Azure-LI-BYOS-Production
@@ -3982,18 +3982,18 @@
Image SLES12-SP5-EC2-SAP-On-Demand:gfs2-kmp-default-4.12.14-122.219.1
Image SLES12-SP5-EC2-SAP-On-Demand:kernel-default-4.12.14-122.219.1
Image SLES12-SP5-EC2-SAP-On-Demand:ocfs2-kmp-default-4.12.14-122.219.1
- Image SLES12-SP5-GCE-BYOS:kernel-default-4.12.14-122.219.1
+ Image SLES12-SP5-GCE-BYOS:kernel-default-4.12.14-122.225.1
Image SLES12-SP5-GCE-On-Demand:kernel-default-4.12.14-122.219.1
- Image SLES12-SP5-GCE-SAP-BYOS:cluster-md-kmp-default-4.12.14-122.219.1
- Image SLES12-SP5-GCE-SAP-BYOS:dlm-kmp-default-4.12.14-122.219.1
- Image SLES12-SP5-GCE-SAP-BYOS:gfs2-kmp-default-4.12.14-122.219.1
- Image SLES12-SP5-GCE-SAP-BYOS:kernel-default-4.12.14-122.219.1
- Image SLES12-SP5-GCE-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.219.1
- Image SLES12-SP5-GCE-SAP-On-Demand:cluster-md-kmp-default-4.12.14-122.219.1
- Image SLES12-SP5-GCE-SAP-On-Demand:dlm-kmp-default-4.12.14-122.219.1
- Image SLES12-SP5-GCE-SAP-On-Demand:gfs2-kmp-default-4.12.14-122.219.1
- Image SLES12-SP5-GCE-SAP-On-Demand:kernel-default-4.12.14-122.219.1
- Image SLES12-SP5-GCE-SAP-On-Demand:ocfs2-kmp-default-4.12.14-122.219.1
+ Image SLES12-SP5-GCE-SAP-BYOS:cluster-md-kmp-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-BYOS:dlm-kmp-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-BYOS:gfs2-kmp-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-BYOS:kernel-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:cluster-md-kmp-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:dlm-kmp-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:gfs2-kmp-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:kernel-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:ocfs2-kmp-default-4.12.14-122.225.1
Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:cluster-md-kmp-default-4.12.14-122.225.1
Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:dlm-kmp-default-4.12.14-122.225.1
Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:gfs2-kmp-default-4.12.14-122.225.1
skipping CVE-2024-26919 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-26918 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-26917 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-26916 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-26915 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-26914 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-26913 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-26912 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-26911 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-26910 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-26909 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-26906 as CVE page is older than CVRF-CVE file.
no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2024-26903
skipping CVE-2024-26902 as CVE page is older than CVRF-CVE file.
no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2024-26898
skipping CVE-2024-26899 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-26897 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-26896 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-26895 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-26893 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-26892 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-26891 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-26890 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-26889 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-26888 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-26887 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-26886 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-26885 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-26883 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-26882 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-26881 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-26880 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-26879 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-26877 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-26876 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-26875 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-26874 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-26873 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-26872 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-26871 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-26870 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-26869 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-26868 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-26867 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-26866 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-26865 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-26864 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-26862 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-26861 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-26860 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-26859 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-26858 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-26856 as CVE page is older than CVRF-CVE file.
no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2024-26852
skipping CVE-2024-26854 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-26853 as CVE page is older than CVRF-CVE file.
--- /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2024-26852.xml 2024-10-17 01:20:49.372483000 +0200
+++ /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2024-26852.xml.new 2024-10-29 01:20:27.882019000 +0100
@@ -14,13 +14,13 @@
1
- 75
- 2024-10-16T23:20:48Z
+ 76
+ 2024-10-29T00:20:26Z
current
2024-04-18T23:08:59Z
- 2024-10-16T23:20:48Z
+ 2024-10-29T00:20:26Z
cve-database/bin/generate-cvrf-cve.pl
2020-12-27T01:00:00Z
@@ -2614,18 +2614,30 @@
kernel-livepatch-5_14_21-150400_24_103-default-6-150400.2.1
+
+ kernel-livepatch-5_14_21-150400_24_108-default-10-150400.9.8.1
+
kernel-livepatch-5_14_21-150400_24_108-default-9-150400.9.8.1
kernel-livepatch-5_14_21-150400_24_111-default-7-150400.9.6.1
+
+ kernel-livepatch-5_14_21-150400_24_111-default-8-150400.9.6.1
+
kernel-livepatch-5_14_21-150400_24_116-default-7-150400.9.8.1
+
+ kernel-livepatch-5_14_21-150400_24_116-default-8-150400.9.8.1
+
kernel-livepatch-5_14_21-150400_24_119-default-6-150400.9.6.1
+
+ kernel-livepatch-5_14_21-150400_24_119-default-7-150400.9.6.1
+
kernel-livepatch-5_14_21-150400_24_122-default-1-150400.9.3.2
@@ -2671,15 +2683,24 @@
kernel-livepatch-5_14_21-150500_13_30-rt-7-150500.2.1
+
+ kernel-livepatch-5_14_21-150500_13_35-rt-10-150500.11.8.1
+
kernel-livepatch-5_14_21-150500_13_35-rt-9-150500.11.8.1
kernel-livepatch-5_14_21-150500_13_38-rt-7-150500.11.6.1
+
+ kernel-livepatch-5_14_21-150500_13_38-rt-8-150500.11.6.1
+
kernel-livepatch-5_14_21-150500_13_47-rt-7-150500.11.6.1
+
+ kernel-livepatch-5_14_21-150500_13_47-rt-8-150500.11.6.1
+
kernel-livepatch-5_14_21-150500_13_5-rt-13-150500.2.1
@@ -2710,15 +2731,24 @@
kernel-livepatch-5_14_21-150500_55_44-default-7-150500.2.1
+
+ kernel-livepatch-5_14_21-150500_55_49-default-10-150500.11.8.1
+
kernel-livepatch-5_14_21-150500_55_49-default-9-150500.11.8.1
kernel-livepatch-5_14_21-150500_55_52-default-7-150500.11.6.1
+
+ kernel-livepatch-5_14_21-150500_55_52-default-8-150500.11.6.1
+
kernel-livepatch-5_14_21-150500_55_59-default-7-150500.11.10.1
+
+ kernel-livepatch-5_14_21-150500_55_59-default-8-150500.11.10.1
+
kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2
@@ -2755,9 +2785,15 @@
kernel-livepatch-5_3_18-150200_24_183-default-8-150200.5.6.1
+
+ kernel-livepatch-5_3_18-150200_24_183-default-9-150200.5.6.1
+
kernel-livepatch-5_3_18-150200_24_188-default-7-150200.5.6.1
+
+ kernel-livepatch-5_3_18-150200_24_188-default-8-150200.5.6.1
+
kernel-livepatch-5_3_18-150200_24_191-default-1-150200.5.3.1
@@ -2791,9 +2827,15 @@
kernel-livepatch-5_3_18-150300_59_153-default-8-150300.7.6.1
+
+ kernel-livepatch-5_3_18-150300_59_153-default-9-150300.7.6.1
+
kernel-livepatch-5_3_18-150300_59_158-default-7-150300.7.6.1
+
+ kernel-livepatch-5_3_18-150300_59_158-default-8-150300.7.6.1
+
kernel-livepatch-5_3_18-150300_59_161-default-1-150300.7.3.1
@@ -3055,6 +3097,9 @@
kgraft-patch-4_12_14-122_201-default-8-8.10.1
+
+ kgraft-patch-4_12_14-122_201-default-9-8.10.1
+
kgraft-patch-4_12_14-122_216-default-1-8.3.1
@@ -5761,6 +5806,51 @@
kernel-rt-5.14.21-150500.13.52.1 as a component of openSUSE Leap Micro 5.5
+
+ kgraft-patch-4_12_14-122_201-default-9-8.10.1 as a component of SUSE Linux Enterprise Live Patching 12 SP5
+
+
+ kernel-livepatch-5_3_18-150200_24_183-default-9-150200.5.6.1 as a component of SUSE Linux Enterprise Live Patching 15 SP2
+
+
+ kernel-livepatch-5_3_18-150200_24_188-default-8-150200.5.6.1 as a component of SUSE Linux Enterprise Live Patching 15 SP2
+
+
+ kernel-livepatch-5_3_18-150300_59_153-default-9-150300.7.6.1 as a component of SUSE Linux Enterprise Live Patching 15 SP3
+
+
+ kernel-livepatch-5_3_18-150300_59_158-default-8-150300.7.6.1 as a component of SUSE Linux Enterprise Live Patching 15 SP3
+
+
+ kernel-livepatch-5_14_21-150400_24_108-default-10-150400.9.8.1 as a component of SUSE Linux Enterprise Live Patching 15 SP4
+
+
+ kernel-livepatch-5_14_21-150400_24_111-default-8-150400.9.6.1 as a component of SUSE Linux Enterprise Live Patching 15 SP4
+
+
+ kernel-livepatch-5_14_21-150400_24_116-default-8-150400.9.8.1 as a component of SUSE Linux Enterprise Live Patching 15 SP4
+
+
+ kernel-livepatch-5_14_21-150400_24_119-default-7-150400.9.6.1 as a component of SUSE Linux Enterprise Live Patching 15 SP4
+
+
+ kernel-livepatch-5_14_21-150500_13_35-rt-10-150500.11.8.1 as a component of SUSE Linux Enterprise Live Patching 15 SP5
+
+
+ kernel-livepatch-5_14_21-150500_13_38-rt-8-150500.11.6.1 as a component of SUSE Linux Enterprise Live Patching 15 SP5
+
+
+ kernel-livepatch-5_14_21-150500_13_47-rt-8-150500.11.6.1 as a component of SUSE Linux Enterprise Live Patching 15 SP5
+
+
+ kernel-livepatch-5_14_21-150500_55_49-default-10-150500.11.8.1 as a component of SUSE Linux Enterprise Live Patching 15 SP5
+
+
+ kernel-livepatch-5_14_21-150500_55_52-default-8-150500.11.6.1 as a component of SUSE Linux Enterprise Live Patching 15 SP5
+
+
+ kernel-livepatch-5_14_21-150500_55_59-default-8-150500.11.10.1 as a component of SUSE Linux Enterprise Live Patching 15 SP5
+
kernel-default as a component of SUSE Linux Enterprise Micro 5.0
@@ -7001,6 +7091,23 @@
openSUSE Leap Micro 5.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2
openSUSE Leap Micro 5.5:kernel-rt-5.14.21-150500.13.52.1
+
+ SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_201-default-9-8.10.1
+ SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_183-default-9-150200.5.6.1
+ SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_188-default-8-150200.5.6.1
+ SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_153-default-9-150300.7.6.1
+ SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_158-default-8-150300.7.6.1
+ SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_108-default-10-150400.9.8.1
+ SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_111-default-8-150400.9.6.1
+ SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_116-default-8-150400.9.8.1
+ SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_119-default-7-150400.9.6.1
+ SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_35-rt-10-150500.11.8.1
+ SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_38-rt-8-150500.11.6.1
+ SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_47-rt-8-150500.11.6.1
+ SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_49-default-10-150500.11.8.1
+ SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_52-default-8-150500.11.6.1
+ SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_59-default-8-150500.11.10.1
+
SUSE Linux Enterprise Micro 5.5:kernel-source-rt
SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default
--- /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2024-26851.xml 2024-10-16 01:28:12.246504000 +0200
+++ /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2024-26851.xml.new 2024-10-29 01:20:28.501975000 +0100
@@ -14,13 +14,13 @@
1
- 34
- 2024-10-15T23:28:11Z
+ 35
+ 2024-10-29T00:20:28Z
current
2024-04-18T23:08:59Z
- 2024-10-15T23:28:11Z
+ 2024-10-29T00:20:28Z
cve-database/bin/generate-cvrf-cve.pl
2020-12-27T01:00:00Z
@@ -134,6 +134,21 @@
Image SLES12-SP5-Azure-SAP-BYOS
+
+
+ Image SLES12-SP5-GCE-BYOS
+
+
+
+
+ Image SLES12-SP5-GCE-SAP-BYOS
+
+
+
+
+ Image SLES12-SP5-GCE-SAP-On-Demand
+
+
Image SLES15-SP5-Azure-Basic
@@ -1759,6 +1774,39 @@
ocfs2-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-Azure-SAP-BYOS
+
+ kernel-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-BYOS
+
+
+ cluster-md-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ dlm-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ gfs2-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ kernel-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ ocfs2-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ cluster-md-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
+
+ dlm-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
+
+ gfs2-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
+
+ kernel-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
+
+ ocfs2-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
kernel-azure-5.14.21-150500.33.66.1 as a component of Image SLES15-SP5-Azure-Basic
@@ -3505,6 +3553,17 @@
Image SLES12-SP5-Azure-SAP-BYOS:gfs2-kmp-default-4.12.14-122.228.1
Image SLES12-SP5-Azure-SAP-BYOS:kernel-default-4.12.14-122.228.1
Image SLES12-SP5-Azure-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.228.1
+ Image SLES12-SP5-GCE-BYOS:kernel-default-4.12.14-122.228.1
+ Image SLES12-SP5-GCE-SAP-BYOS:cluster-md-kmp-default-4.12.14-122.228.1
+ Image SLES12-SP5-GCE-SAP-BYOS:dlm-kmp-default-4.12.14-122.228.1
+ Image SLES12-SP5-GCE-SAP-BYOS:gfs2-kmp-default-4.12.14-122.228.1
+ Image SLES12-SP5-GCE-SAP-BYOS:kernel-default-4.12.14-122.228.1
+ Image SLES12-SP5-GCE-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.228.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:cluster-md-kmp-default-4.12.14-122.228.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:dlm-kmp-default-4.12.14-122.228.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:gfs2-kmp-default-4.12.14-122.228.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:kernel-default-4.12.14-122.228.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:ocfs2-kmp-default-4.12.14-122.228.1
Image SLES15-SP5-Azure-Basic:kernel-azure-5.14.21-150500.33.66.1
Image SLES15-SP5-Azure-Standard:kernel-azure-5.14.21-150500.33.66.1
Image SLES15-SP5-CHOST-BYOS-Aliyun:kernel-default-5.14.21-150500.55.80.2
skipping CVE-2024-26850 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-26849 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-26848 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-26847 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-26844 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-26843 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-26841 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-26840 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-26839 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-26838 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-26837 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-26836 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-26835 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-26834 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-26833 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-26832 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-26831 as CVE page is older than CVRF-CVE file.
--- /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2024-26830.xml 2024-10-17 01:20:56.616611000 +0200
+++ /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2024-26830.xml.new 2024-10-29 01:20:30.864806000 +0100
@@ -14,13 +14,13 @@
1
- 44
- 2024-10-16T23:20:56Z
+ 45
+ 2024-10-29T00:20:30Z
current
2024-04-18T23:09:03Z
- 2024-10-16T23:20:56Z
+ 2024-10-29T00:20:30Z
cve-database/bin/generate-cvrf-cve.pl
2020-12-27T01:00:00Z
@@ -120,6 +120,21 @@
Image SLES12-SP5-EC2-BYOS
+
+
+ Image SLES12-SP5-GCE-BYOS
+
+
+
+
+ Image SLES12-SP5-GCE-SAP-BYOS
+
+
+
+
+ Image SLES12-SP5-GCE-SAP-On-Demand
+
+
Image SLES12-SP5-SAP-Azure-LI-BYOS-Production
@@ -1530,6 +1545,39 @@
kernel-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-EC2-BYOS
+
+ kernel-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-BYOS
+
+
+ cluster-md-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ dlm-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ gfs2-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ kernel-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ ocfs2-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ cluster-md-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
+
+ dlm-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
+
+ gfs2-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
+
+ kernel-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
+
+ ocfs2-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
cluster-md-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-SAP-Azure-LI-BYOS-Production
@@ -3121,6 +3169,17 @@
Image SLES12-SP5-Azure-SAP-BYOS:kernel-default-4.12.14-122.225.1
Image SLES12-SP5-Azure-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.225.1
Image SLES12-SP5-EC2-BYOS:kernel-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-BYOS:kernel-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-BYOS:cluster-md-kmp-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-BYOS:dlm-kmp-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-BYOS:gfs2-kmp-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-BYOS:kernel-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:cluster-md-kmp-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:dlm-kmp-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:gfs2-kmp-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:kernel-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:ocfs2-kmp-default-4.12.14-122.225.1
Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:cluster-md-kmp-default-4.12.14-122.225.1
Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:dlm-kmp-default-4.12.14-122.225.1
Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:gfs2-kmp-default-4.12.14-122.225.1
no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2024-26828
skipping CVE-2024-26829 as CVE page is older than CVRF-CVE file.
--- /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2024-26828.xml 2024-10-18 01:23:34.525998000 +0200
+++ /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2024-26828.xml.new 2024-10-29 01:20:31.693770000 +0100
@@ -14,13 +14,13 @@
1
- 68
- 2024-10-17T23:23:33Z
+ 69
+ 2024-10-29T00:20:31Z
current
2024-04-18T23:09:03Z
- 2024-10-17T23:23:33Z
+ 2024-10-29T00:20:31Z
cve-database/bin/generate-cvrf-cve.pl
2020-12-27T01:00:00Z
@@ -2580,18 +2580,30 @@
kernel-livepatch-5_14_21-150400_24_103-default-7-150400.2.1
+
+ kernel-livepatch-5_14_21-150400_24_108-default-10-150400.9.8.1
+
kernel-livepatch-5_14_21-150400_24_108-default-9-150400.9.8.1
kernel-livepatch-5_14_21-150400_24_111-default-7-150400.9.6.1
+
+ kernel-livepatch-5_14_21-150400_24_111-default-8-150400.9.6.1
+
kernel-livepatch-5_14_21-150400_24_116-default-7-150400.9.8.1
+
+ kernel-livepatch-5_14_21-150400_24_116-default-8-150400.9.8.1
+
kernel-livepatch-5_14_21-150400_24_119-default-6-150400.9.6.1
+
+ kernel-livepatch-5_14_21-150400_24_119-default-7-150400.9.6.1
+
kernel-livepatch-5_14_21-150400_24_122-default-1-150400.9.3.2
@@ -2637,24 +2649,39 @@
kernel-livepatch-5_14_21-150500_13_30-rt-8-150500.2.1
+
+ kernel-livepatch-5_14_21-150500_13_35-rt-10-150500.11.8.1
+
kernel-livepatch-5_14_21-150500_13_35-rt-9-150500.11.8.1
kernel-livepatch-5_14_21-150500_13_38-rt-7-150500.11.6.1
+
+ kernel-livepatch-5_14_21-150500_13_38-rt-8-150500.11.6.1
+
kernel-livepatch-5_14_21-150500_13_47-rt-7-150500.11.6.1
+
+ kernel-livepatch-5_14_21-150500_13_47-rt-8-150500.11.6.1
+
kernel-livepatch-5_14_21-150500_13_5-rt-14-150500.2.1
kernel-livepatch-5_14_21-150500_13_52-rt-5-150500.11.8.1
+
+ kernel-livepatch-5_14_21-150500_13_52-rt-6-150500.11.8.1
+
kernel-livepatch-5_14_21-150500_13_55-rt-5-150500.11.6.1
+
+ kernel-livepatch-5_14_21-150500_13_55-rt-6-150500.11.6.1
+
kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1
@@ -2682,21 +2709,36 @@
kernel-livepatch-5_14_21-150500_55_44-default-8-150500.2.1
+
+ kernel-livepatch-5_14_21-150500_55_49-default-10-150500.11.8.1
+
kernel-livepatch-5_14_21-150500_55_49-default-9-150500.11.8.1
kernel-livepatch-5_14_21-150500_55_52-default-7-150500.11.6.1
+
+ kernel-livepatch-5_14_21-150500_55_52-default-8-150500.11.6.1
+
kernel-livepatch-5_14_21-150500_55_59-default-7-150500.11.10.1
+
+ kernel-livepatch-5_14_21-150500_55_59-default-8-150500.11.10.1
+
kernel-livepatch-5_14_21-150500_55_62-default-5-150500.11.6.1
+
+ kernel-livepatch-5_14_21-150500_55_62-default-6-150500.11.6.1
+
kernel-livepatch-5_14_21-150500_55_65-default-5-150500.11.6.1
+
+ kernel-livepatch-5_14_21-150500_55_65-default-6-150500.11.6.1
+
kernel-livepatch-5_14_21-150500_55_68-default-1-150500.11.3.1
@@ -2733,12 +2775,21 @@
kernel-livepatch-5_3_18-150200_24_183-default-8-150200.5.6.1
+
+ kernel-livepatch-5_3_18-150200_24_183-default-9-150200.5.6.1
+
kernel-livepatch-5_3_18-150200_24_188-default-7-150200.5.6.1
+
+ kernel-livepatch-5_3_18-150200_24_188-default-8-150200.5.6.1
+
kernel-livepatch-5_3_18-150200_24_191-default-6-150200.5.6.1
+
+ kernel-livepatch-5_3_18-150200_24_191-default-7-150200.5.6.1
+
kernel-livepatch-5_3_18-150200_24_194-default-1-150200.5.3.1
@@ -2772,12 +2823,21 @@
kernel-livepatch-5_3_18-150300_59_153-default-8-150300.7.6.1
+
+ kernel-livepatch-5_3_18-150300_59_153-default-9-150300.7.6.1
+
kernel-livepatch-5_3_18-150300_59_158-default-7-150300.7.6.1
+
+ kernel-livepatch-5_3_18-150300_59_158-default-8-150300.7.6.1
+
kernel-livepatch-5_3_18-150300_59_161-default-6-150300.7.6.1
+
+ kernel-livepatch-5_3_18-150300_59_161-default-7-150300.7.6.1
+
kernel-livepatch-5_3_18-150300_59_164-default-1-150300.7.3.1
@@ -3036,9 +3096,15 @@
kgraft-patch-4_12_14-122_201-default-8-8.10.1
+
+ kgraft-patch-4_12_14-122_201-default-9-8.10.1
+
kgraft-patch-4_12_14-122_216-default-6-8.6.1
+
+ kgraft-patch-4_12_14-122_216-default-7-8.6.1
+
kgraft-patch-4_12_14-122_219-default-1-8.3.1
@@ -5793,6 +5859,72 @@
kernel-rt-5.14.21-150500.13.58.1 as a component of openSUSE Leap Micro 5.5
+
+ kgraft-patch-4_12_14-122_201-default-9-8.10.1 as a component of SUSE Linux Enterprise Live Patching 12 SP5
+
+
+ kgraft-patch-4_12_14-122_216-default-7-8.6.1 as a component of SUSE Linux Enterprise Live Patching 12 SP5
+
+
+ kernel-livepatch-5_3_18-150200_24_183-default-9-150200.5.6.1 as a component of SUSE Linux Enterprise Live Patching 15 SP2
+
+
+ kernel-livepatch-5_3_18-150200_24_188-default-8-150200.5.6.1 as a component of SUSE Linux Enterprise Live Patching 15 SP2
+
+
+ kernel-livepatch-5_3_18-150200_24_191-default-7-150200.5.6.1 as a component of SUSE Linux Enterprise Live Patching 15 SP2
+
+
+ kernel-livepatch-5_3_18-150300_59_153-default-9-150300.7.6.1 as a component of SUSE Linux Enterprise Live Patching 15 SP3
+
+
+ kernel-livepatch-5_3_18-150300_59_158-default-8-150300.7.6.1 as a component of SUSE Linux Enterprise Live Patching 15 SP3
+
+
+ kernel-livepatch-5_3_18-150300_59_161-default-7-150300.7.6.1 as a component of SUSE Linux Enterprise Live Patching 15 SP3
+
+
+ kernel-livepatch-5_14_21-150400_24_108-default-10-150400.9.8.1 as a component of SUSE Linux Enterprise Live Patching 15 SP4
+
+
+ kernel-livepatch-5_14_21-150400_24_111-default-8-150400.9.6.1 as a component of SUSE Linux Enterprise Live Patching 15 SP4
+
+
+ kernel-livepatch-5_14_21-150400_24_116-default-8-150400.9.8.1 as a component of SUSE Linux Enterprise Live Patching 15 SP4
+
+
+ kernel-livepatch-5_14_21-150400_24_119-default-7-150400.9.6.1 as a component of SUSE Linux Enterprise Live Patching 15 SP4
+
+
+ kernel-livepatch-5_14_21-150500_13_35-rt-10-150500.11.8.1 as a component of SUSE Linux Enterprise Live Patching 15 SP5
+
+
+ kernel-livepatch-5_14_21-150500_13_38-rt-8-150500.11.6.1 as a component of SUSE Linux Enterprise Live Patching 15 SP5
+
+
+ kernel-livepatch-5_14_21-150500_13_47-rt-8-150500.11.6.1 as a component of SUSE Linux Enterprise Live Patching 15 SP5
+
+
+ kernel-livepatch-5_14_21-150500_13_52-rt-6-150500.11.8.1 as a component of SUSE Linux Enterprise Live Patching 15 SP5
+
+
+ kernel-livepatch-5_14_21-150500_13_55-rt-6-150500.11.6.1 as a component of SUSE Linux Enterprise Live Patching 15 SP5
+
+
+ kernel-livepatch-5_14_21-150500_55_49-default-10-150500.11.8.1 as a component of SUSE Linux Enterprise Live Patching 15 SP5
+
+
+ kernel-livepatch-5_14_21-150500_55_52-default-8-150500.11.6.1 as a component of SUSE Linux Enterprise Live Patching 15 SP5
+
+
+ kernel-livepatch-5_14_21-150500_55_59-default-8-150500.11.10.1 as a component of SUSE Linux Enterprise Live Patching 15 SP5
+
+
+ kernel-livepatch-5_14_21-150500_55_62-default-6-150500.11.6.1 as a component of SUSE Linux Enterprise Live Patching 15 SP5
+
+
+ kernel-livepatch-5_14_21-150500_55_65-default-6-150500.11.6.1 as a component of SUSE Linux Enterprise Live Patching 15 SP5
+
kernel-default as a component of SUSE Linux Enterprise Micro 5.0
@@ -6910,6 +7042,30 @@
openSUSE Leap Micro 5.5:kernel-default-base-5.14.21-150500.55.68.1.150500.6.31.1
openSUSE Leap Micro 5.5:kernel-rt-5.14.21-150500.13.58.1
+
+ SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_201-default-9-8.10.1
+ SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_216-default-7-8.6.1
+ SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_183-default-9-150200.5.6.1
+ SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_188-default-8-150200.5.6.1
+ SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_191-default-7-150200.5.6.1
+ SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_153-default-9-150300.7.6.1
+ SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_158-default-8-150300.7.6.1
+ SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_161-default-7-150300.7.6.1
+ SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_108-default-10-150400.9.8.1
+ SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_111-default-8-150400.9.6.1
+ SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_116-default-8-150400.9.8.1
+ SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_119-default-7-150400.9.6.1
+ SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_35-rt-10-150500.11.8.1
+ SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_38-rt-8-150500.11.6.1
+ SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_47-rt-8-150500.11.6.1
+ SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_52-rt-6-150500.11.8.1
+ SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_55-rt-6-150500.11.6.1
+ SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_49-default-10-150500.11.8.1
+ SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_52-default-8-150500.11.6.1
+ SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_59-default-8-150500.11.10.1
+ SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-6-150500.11.6.1
+ SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_65-default-6-150500.11.6.1
+
SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default
SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel
no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2024-26816
skipping CVE-2024-26827 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-26826 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-26825 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-26824 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-26823 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-26822 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-26821 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-26820 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-26819 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-26818 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-26817 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-26815 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-26814 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-26813 as CVE page is older than CVRF-CVE file.
--- /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2024-26812.xml 2024-10-16 01:28:32.124466000 +0200
+++ /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2024-26812.xml.new 2024-10-29 01:20:33.369183000 +0100
@@ -14,13 +14,13 @@
1
- 36
- 2024-10-15T23:28:31Z
+ 37
+ 2024-10-29T00:20:32Z
current
2024-04-16T23:09:16Z
- 2024-10-15T23:28:31Z
+ 2024-10-29T00:20:32Z
cve-database/bin/generate-cvrf-cve.pl
2020-12-27T01:00:00Z
@@ -126,6 +126,21 @@
Image SLES12-SP5-Azure-SAP-BYOS
+
+
+ Image SLES12-SP5-GCE-BYOS
+
+
+
+
+ Image SLES12-SP5-GCE-SAP-BYOS
+
+
+
+
+ Image SLES12-SP5-GCE-SAP-On-Demand
+
+
Image SLES15-SP5-Azure-Basic
@@ -1676,6 +1691,39 @@
ocfs2-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-Azure-SAP-BYOS
+
+ kernel-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-BYOS
+
+
+ cluster-md-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ dlm-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ gfs2-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ kernel-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ ocfs2-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ cluster-md-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
+
+ dlm-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
+
+ gfs2-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
+
+ kernel-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
+
+ ocfs2-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
kernel-azure-5.14.21-150500.33.66.1 as a component of Image SLES15-SP5-Azure-Basic
@@ -3390,6 +3438,17 @@
Image SLES12-SP5-Azure-SAP-BYOS:gfs2-kmp-default-4.12.14-122.228.1
Image SLES12-SP5-Azure-SAP-BYOS:kernel-default-4.12.14-122.228.1
Image SLES12-SP5-Azure-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.228.1
+ Image SLES12-SP5-GCE-BYOS:kernel-default-4.12.14-122.228.1
+ Image SLES12-SP5-GCE-SAP-BYOS:cluster-md-kmp-default-4.12.14-122.228.1
+ Image SLES12-SP5-GCE-SAP-BYOS:dlm-kmp-default-4.12.14-122.228.1
+ Image SLES12-SP5-GCE-SAP-BYOS:gfs2-kmp-default-4.12.14-122.228.1
+ Image SLES12-SP5-GCE-SAP-BYOS:kernel-default-4.12.14-122.228.1
+ Image SLES12-SP5-GCE-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.228.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:cluster-md-kmp-default-4.12.14-122.228.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:dlm-kmp-default-4.12.14-122.228.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:gfs2-kmp-default-4.12.14-122.228.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:kernel-default-4.12.14-122.228.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:ocfs2-kmp-default-4.12.14-122.228.1
Image SLES15-SP5-Azure-Basic:kernel-azure-5.14.21-150500.33.66.1
Image SLES15-SP5-Azure-Standard:kernel-azure-5.14.21-150500.33.66.1
Image SLES15-SP5-CHOST-BYOS-Aliyun:kernel-default-5.14.21-150500.55.80.2
skipping CVE-2024-26811 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-26810 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-26809 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-26808 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-26807 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-26806 as CVE page is older than CVRF-CVE file.
no cpe found for SUSE Linux Enterprise Module for Confidential Computing Technical Preview 15 SP6 in CVE-2024-26804
skipping CVE-2024-26803 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-26802 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-26801 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-26800 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-26799 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-26798 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-26797 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-26796 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-26795 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-26794 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-26793 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-26792 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-26790 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-26789 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-26788 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-26787 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-26786 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-26785 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-26784 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-26783 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-26782 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-26781 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-26780 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-26779 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-26777 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-26776 as CVE page is older than CVRF-CVE file.
no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2024-26773
skipping CVE-2024-26771 as CVE page is older than CVRF-CVE file.
no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2024-26766
skipping CVE-2024-26769 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-26768 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-26767 as CVE page is older than CVRF-CVE file.
--- /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2024-26766.xml 2024-10-22 01:43:09.583870000 +0200
+++ /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2024-26766.xml.new 2024-10-29 01:20:48.137967000 +0100
@@ -14,13 +14,13 @@
1
- 63
- 2024-10-21T23:43:08Z
+ 64
+ 2024-10-29T00:20:47Z
current
2024-04-12T23:09:14Z
- 2024-10-21T23:43:08Z
+ 2024-10-29T00:20:47Z
cve-database/bin/generate-cvrf-cve.pl
2020-12-27T01:00:00Z
@@ -1906,15 +1906,24 @@
kernel-livepatch-5_14_21-150400_24_103-default-5-150400.2.1
+
+ kernel-livepatch-5_14_21-150400_24_108-default-10-150400.9.8.1
+
kernel-livepatch-5_14_21-150400_24_108-default-9-150400.9.8.1
kernel-livepatch-5_14_21-150400_24_111-default-7-150400.9.6.1
+
+ kernel-livepatch-5_14_21-150400_24_111-default-8-150400.9.6.1
+
kernel-livepatch-5_14_21-150400_24_116-default-7-150400.9.8.1
+
+ kernel-livepatch-5_14_21-150400_24_116-default-8-150400.9.8.1
+
kernel-livepatch-5_14_21-150400_24_119-default-1-150400.9.3.1
@@ -1963,6 +1972,9 @@
kernel-livepatch-5_14_21-150500_13_30-rt-6-150500.2.1
+
+ kernel-livepatch-5_14_21-150500_13_35-rt-10-150500.11.8.1
+
kernel-livepatch-5_14_21-150500_13_35-rt-9-150500.11.8.1
@@ -1993,6 +2005,9 @@
kernel-livepatch-5_14_21-150500_55_44-default-6-150500.2.1
+
+ kernel-livepatch-5_14_21-150500_55_49-default-10-150500.11.8.1
+
kernel-livepatch-5_14_21-150500_55_49-default-9-150500.11.8.1
@@ -3703,6 +3718,21 @@
kernel-rt-5.14.21-150500.13.52.1 as a component of openSUSE Leap Micro 5.5
+
+ kernel-livepatch-5_14_21-150400_24_108-default-10-150400.9.8.1 as a component of SUSE Linux Enterprise Live Patching 15 SP4
+
+
+ kernel-livepatch-5_14_21-150400_24_111-default-8-150400.9.6.1 as a component of SUSE Linux Enterprise Live Patching 15 SP4
+
+
+ kernel-livepatch-5_14_21-150400_24_116-default-8-150400.9.8.1 as a component of SUSE Linux Enterprise Live Patching 15 SP4
+
+
+ kernel-livepatch-5_14_21-150500_13_35-rt-10-150500.11.8.1 as a component of SUSE Linux Enterprise Live Patching 15 SP5
+
+
+ kernel-livepatch-5_14_21-150500_55_49-default-10-150500.11.8.1 as a component of SUSE Linux Enterprise Live Patching 15 SP5
+
kernel-default as a component of SUSE Enterprise Storage 7.1
@@ -4845,6 +4875,13 @@
openSUSE Leap Micro 5.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2
openSUSE Leap Micro 5.5:kernel-rt-5.14.21-150500.13.52.1
+
+ SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_108-default-10-150400.9.8.1
+ SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_111-default-8-150400.9.6.1
+ SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_116-default-8-150400.9.8.1
+ SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_35-rt-10-150500.11.8.1
+ SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_49-default-10-150500.11.8.1
+
SUSE Enterprise Storage 7.1:kernel-default
SUSE Enterprise Storage 7.1:kernel-default-devel
skipping CVE-2024-26764 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-26762 as CVE page is older than CVRF-CVE file.
no cpe found for SUSE Linux Enterprise Module for Confidential Computing Technical Preview 15 SP6 in CVE-2024-26759
skipping CVE-2024-26757 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-26756 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-26755 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-26753 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-26752 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-26751 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-26750 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-26749 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-26748 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-26747 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-26746 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-26745 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-26744 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-26743 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-26742 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-26741 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-26740 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-26739 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-26738 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-26737 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-26736 as CVE page is older than CVRF-CVE file.
--- /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2024-26735.xml 2024-10-16 01:29:09.550516000 +0200
+++ /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2024-26735.xml.new 2024-10-29 01:20:52.642162000 +0100
@@ -14,13 +14,13 @@
1
- 46
- 2024-10-15T23:29:09Z
+ 47
+ 2024-10-29T00:20:52Z
current
2024-04-05T23:08:41Z
- 2024-10-15T23:29:09Z
+ 2024-10-29T00:20:52Z
cve-database/bin/generate-cvrf-cve.pl
2020-12-27T01:00:00Z
@@ -119,6 +119,21 @@
Image SLES12-SP5-EC2-BYOS
+
+
+ Image SLES12-SP5-GCE-BYOS
+
+
+
+
+ Image SLES12-SP5-GCE-SAP-BYOS
+
+
+
+
+ Image SLES12-SP5-GCE-SAP-On-Demand
+
+
Image SLES12-SP5-SAP-Azure-LI-BYOS-Production
@@ -1909,6 +1924,39 @@
kernel-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-EC2-BYOS
+
+ kernel-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-BYOS
+
+
+ cluster-md-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ dlm-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ gfs2-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ kernel-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ ocfs2-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ cluster-md-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
+
+ dlm-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
+
+ gfs2-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
+
+ kernel-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
+
+ ocfs2-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
cluster-md-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-SAP-Azure-LI-BYOS-Production
@@ -3791,6 +3839,17 @@
Image SLES12-SP5-Azure-SAP-BYOS:kernel-default-4.12.14-122.225.1
Image SLES12-SP5-Azure-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.225.1
Image SLES12-SP5-EC2-BYOS:kernel-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-BYOS:kernel-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-BYOS:cluster-md-kmp-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-BYOS:dlm-kmp-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-BYOS:gfs2-kmp-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-BYOS:kernel-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:cluster-md-kmp-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:dlm-kmp-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:gfs2-kmp-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:kernel-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:ocfs2-kmp-default-4.12.14-122.225.1
Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:cluster-md-kmp-default-4.12.14-122.225.1
Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:dlm-kmp-default-4.12.14-122.225.1
Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:gfs2-kmp-default-4.12.14-122.225.1
no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2024-26733
skipping CVE-2024-26734 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-26732 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-26731 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-26730 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-26729 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-26728 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-26727 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-26726 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-26725 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-26724 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-26723 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-26722 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-26721 as CVE page is older than CVRF-CVE file.
no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2024-26704
skipping CVE-2024-26719 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-26718 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-26717 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-26716 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-26715 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-26714 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-26713 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-26712 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-26711 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-26710 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-26709 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-26708 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-26707 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-26706 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-26705 as CVE page is older than CVRF-CVE file.
no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2024-26689
skipping CVE-2024-26703 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-26702 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-26700 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-26699 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-26698 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-26697 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-26696 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-26695 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-26694 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-26693 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-26692 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-26691 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-26690 as CVE page is older than CVRF-CVE file.
no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2024-26687
skipping CVE-2024-26688 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-26685 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-26684 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-26683 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-26682 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-26681 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-26680 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-26678 as CVE page is older than CVRF-CVE file.
--- /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2024-26677.xml 2024-10-22 01:44:16.988839000 +0200
+++ /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2024-26677.xml.new 2024-10-29 01:20:59.336902000 +0100
@@ -14,13 +14,13 @@
1
- 39
- 2024-10-21T23:44:16Z
+ 40
+ 2024-10-29T00:20:58Z
current
2024-04-05T23:08:45Z
- 2024-10-21T23:44:16Z
+ 2024-10-29T00:20:58Z
cve-database/bin/generate-cvrf-cve.pl
2020-12-27T01:00:00Z
@@ -109,6 +109,21 @@
Image SLES12-SP5-Azure-SAP-BYOS
+
+
+ Image SLES12-SP5-GCE-BYOS
+
+
+
+
+ Image SLES12-SP5-GCE-SAP-BYOS
+
+
+
+
+ Image SLES12-SP5-GCE-SAP-On-Demand
+
+
Image SLES15-SP5-Azure-Basic
@@ -1696,6 +1711,39 @@
ocfs2-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-Azure-SAP-BYOS
+
+ kernel-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-BYOS
+
+
+ cluster-md-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ dlm-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ gfs2-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ kernel-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ ocfs2-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ cluster-md-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
+
+ dlm-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
+
+ gfs2-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
+
+ kernel-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
+
+ ocfs2-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
kernel-azure-5.14.21-150500.33.66.1 as a component of Image SLES15-SP5-Azure-Basic
@@ -3621,6 +3669,17 @@
Image SLES12-SP5-Azure-SAP-BYOS:gfs2-kmp-default-4.12.14-122.228.1
Image SLES12-SP5-Azure-SAP-BYOS:kernel-default-4.12.14-122.228.1
Image SLES12-SP5-Azure-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.228.1
+ Image SLES12-SP5-GCE-BYOS:kernel-default-4.12.14-122.228.1
+ Image SLES12-SP5-GCE-SAP-BYOS:cluster-md-kmp-default-4.12.14-122.228.1
+ Image SLES12-SP5-GCE-SAP-BYOS:dlm-kmp-default-4.12.14-122.228.1
+ Image SLES12-SP5-GCE-SAP-BYOS:gfs2-kmp-default-4.12.14-122.228.1
+ Image SLES12-SP5-GCE-SAP-BYOS:kernel-default-4.12.14-122.228.1
+ Image SLES12-SP5-GCE-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.228.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:cluster-md-kmp-default-4.12.14-122.228.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:dlm-kmp-default-4.12.14-122.228.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:gfs2-kmp-default-4.12.14-122.228.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:kernel-default-4.12.14-122.228.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:ocfs2-kmp-default-4.12.14-122.228.1
Image SLES15-SP5-Azure-Basic:kernel-azure-5.14.21-150500.33.66.1
Image SLES15-SP5-Azure-Standard:kernel-azure-5.14.21-150500.33.66.1
Image SLES15-SP5-CHOST-BYOS-Aliyun:kernel-default-5.14.21-150500.55.80.2
skipping CVE-2024-26676 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-26674 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-26673 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-26672 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-26670 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-26669 as CVE page is older than CVRF-CVE file.
--- /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2024-26668.xml 2024-10-16 01:29:38.733707000 +0200
+++ /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2024-26668.xml.new 2024-10-29 01:21:01.981278000 +0100
@@ -14,13 +14,13 @@
1
- 38
- 2024-10-15T23:29:38Z
+ 39
+ 2024-10-29T00:21:01Z
current
2024-04-04T23:08:40Z
- 2024-10-15T23:29:38Z
+ 2024-10-29T00:21:01Z
cve-database/bin/generate-cvrf-cve.pl
2020-12-27T01:00:00Z
@@ -111,6 +111,21 @@
Image SLES12-SP5-Azure-SAP-BYOS
+
+
+ Image SLES12-SP5-GCE-BYOS
+
+
+
+
+ Image SLES12-SP5-GCE-SAP-BYOS
+
+
+
+
+ Image SLES12-SP5-GCE-SAP-On-Demand
+
+
Image SLES15-SP5-Azure-Basic
@@ -1753,6 +1768,39 @@
ocfs2-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-Azure-SAP-BYOS
+
+ kernel-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-BYOS
+
+
+ cluster-md-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ dlm-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ gfs2-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ kernel-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ ocfs2-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ cluster-md-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
+
+ dlm-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
+
+ gfs2-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
+
+ kernel-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
+
+ ocfs2-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
kernel-azure-5.14.21-150500.33.66.1 as a component of Image SLES15-SP5-Azure-Basic
@@ -3539,6 +3587,17 @@
Image SLES12-SP5-Azure-SAP-BYOS:gfs2-kmp-default-4.12.14-122.228.1
Image SLES12-SP5-Azure-SAP-BYOS:kernel-default-4.12.14-122.228.1
Image SLES12-SP5-Azure-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.228.1
+ Image SLES12-SP5-GCE-BYOS:kernel-default-4.12.14-122.228.1
+ Image SLES12-SP5-GCE-SAP-BYOS:cluster-md-kmp-default-4.12.14-122.228.1
+ Image SLES12-SP5-GCE-SAP-BYOS:dlm-kmp-default-4.12.14-122.228.1
+ Image SLES12-SP5-GCE-SAP-BYOS:gfs2-kmp-default-4.12.14-122.228.1
+ Image SLES12-SP5-GCE-SAP-BYOS:kernel-default-4.12.14-122.228.1
+ Image SLES12-SP5-GCE-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.228.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:cluster-md-kmp-default-4.12.14-122.228.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:dlm-kmp-default-4.12.14-122.228.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:gfs2-kmp-default-4.12.14-122.228.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:kernel-default-4.12.14-122.228.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:ocfs2-kmp-default-4.12.14-122.228.1
Image SLES15-SP5-Azure-Basic:kernel-azure-5.14.21-150500.33.66.1
Image SLES15-SP5-Azure-Standard:kernel-azure-5.14.21-150500.33.66.1
Image SLES15-SP5-CHOST-BYOS-Aliyun:kernel-default-5.14.21-150500.55.80.2
skipping CVE-2024-26667 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-26666 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-26665 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-26664 as CVE page is older than CVRF-CVE file.
--- /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2024-26663.xml 2024-10-16 01:29:40.999860000 +0200
+++ /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2024-26663.xml.new 2024-10-29 01:21:03.061151000 +0100
@@ -14,13 +14,13 @@
1
- 51
- 2024-10-15T23:29:40Z
+ 52
+ 2024-10-29T00:21:02Z
current
2024-04-04T23:08:43Z
- 2024-10-15T23:29:40Z
+ 2024-10-29T00:21:02Z
cve-database/bin/generate-cvrf-cve.pl
2020-12-27T01:00:00Z
@@ -205,6 +205,21 @@
Image SLES12-SP5-EC2-BYOS
+
+
+ Image SLES12-SP5-GCE-BYOS
+
+
+
+
+ Image SLES12-SP5-GCE-SAP-BYOS
+
+
+
+
+ Image SLES12-SP5-GCE-SAP-On-Demand
+
+
Image SLES12-SP5-SAP-Azure-LI-BYOS-Production
@@ -2268,6 +2283,39 @@
kernel-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-EC2-BYOS
+
+ kernel-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-BYOS
+
+
+ cluster-md-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ dlm-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ gfs2-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ kernel-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ ocfs2-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ cluster-md-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
+
+ dlm-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
+
+ gfs2-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
+
+ kernel-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
+
+ ocfs2-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
cluster-md-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-SAP-Azure-LI-BYOS-Production
@@ -4538,6 +4586,17 @@
Image SLES12-SP5-Azure-SAP-BYOS:kernel-default-4.12.14-122.225.1
Image SLES12-SP5-Azure-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.225.1
Image SLES12-SP5-EC2-BYOS:kernel-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-BYOS:kernel-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-BYOS:cluster-md-kmp-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-BYOS:dlm-kmp-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-BYOS:gfs2-kmp-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-BYOS:kernel-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:cluster-md-kmp-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:dlm-kmp-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:gfs2-kmp-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:kernel-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:ocfs2-kmp-default-4.12.14-122.225.1
Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:cluster-md-kmp-default-4.12.14-122.225.1
Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:dlm-kmp-default-4.12.14-122.225.1
Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:gfs2-kmp-default-4.12.14-122.225.1
skipping CVE-2024-26662 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-26661 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-26660 as CVE page is older than CVRF-CVE file.
--- /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2024-26659.xml 2024-10-16 01:29:42.412795000 +0200
+++ /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2024-26659.xml.new 2024-10-29 01:21:03.812121000 +0100
@@ -14,13 +14,13 @@
1
- 51
- 2024-10-15T23:29:41Z
+ 52
+ 2024-10-29T00:21:03Z
current
2024-04-04T23:08:44Z
- 2024-10-15T23:29:41Z
+ 2024-10-29T00:21:03Z
cve-database/bin/generate-cvrf-cve.pl
2020-12-27T01:00:00Z
@@ -126,6 +126,21 @@
Image SLES12-SP5-EC2-BYOS
+
+
+ Image SLES12-SP5-GCE-BYOS
+
+
+
+
+ Image SLES12-SP5-GCE-SAP-BYOS
+
+
+
+
+ Image SLES12-SP5-GCE-SAP-On-Demand
+
+
Image SLES12-SP5-SAP-Azure-LI-BYOS-Production
@@ -1580,6 +1595,39 @@
kernel-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-EC2-BYOS
+
+ kernel-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-BYOS
+
+
+ cluster-md-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ dlm-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ gfs2-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ kernel-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ ocfs2-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ cluster-md-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
+
+ dlm-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
+
+ gfs2-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
+
+ kernel-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
+
+ ocfs2-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
cluster-md-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-SAP-Azure-LI-BYOS-Production
@@ -3197,6 +3245,17 @@
Image SLES12-SP5-Azure-SAP-BYOS:kernel-default-4.12.14-122.225.1
Image SLES12-SP5-Azure-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.225.1
Image SLES12-SP5-EC2-BYOS:kernel-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-BYOS:kernel-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-BYOS:cluster-md-kmp-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-BYOS:dlm-kmp-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-BYOS:gfs2-kmp-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-BYOS:kernel-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:cluster-md-kmp-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:dlm-kmp-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:gfs2-kmp-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:kernel-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:ocfs2-kmp-default-4.12.14-122.225.1
Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:cluster-md-kmp-default-4.12.14-122.225.1
Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:dlm-kmp-default-4.12.14-122.225.1
Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:gfs2-kmp-default-4.12.14-122.225.1
skipping CVE-2024-26658 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-26657 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-26656 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-26655 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-26654 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-26653 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-26652 as CVE page is older than CVRF-CVE file.
no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2024-26642
skipping CVE-2024-26649 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-26648 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-26647 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-26646 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-26645 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-26644 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-26643 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-26640 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-26639 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-26638 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-26637 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-26634 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-26632 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-26631 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-26630 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-26629 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-26627 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-26626 as CVE page is older than CVRF-CVE file.
no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2024-26622
skipping CVE-2024-26623 as CVE page is older than CVRF-CVE file.
--- /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2024-26622.xml 2024-10-22 01:44:58.473654000 +0200
+++ /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2024-26622.xml.new 2024-10-29 01:21:12.125136000 +0100
@@ -14,13 +14,13 @@
1
- 79
- 2024-10-21T23:44:58Z
+ 80
+ 2024-10-29T00:21:09Z
current
2024-03-05T00:08:55Z
- 2024-10-21T23:44:58Z
+ 2024-10-29T00:21:09Z
cve-database/bin/generate-cvrf-cve.pl
2020-12-27T01:00:00Z
@@ -2176,6 +2176,9 @@
kernel-livepatch-5_14_21-150400_24_103-default-4-150400.2.1
+
+ kernel-livepatch-5_14_21-150400_24_108-default-10-150400.9.8.1
+
kernel-livepatch-5_14_21-150400_24_108-default-9-150400.9.8.1
@@ -2233,6 +2236,9 @@
kernel-livepatch-5_14_21-150500_13_30-rt-5-150500.2.1
+
+ kernel-livepatch-5_14_21-150500_13_35-rt-10-150500.11.8.1
+
kernel-livepatch-5_14_21-150500_13_35-rt-9-150500.11.8.1
@@ -2266,6 +2272,9 @@
kernel-livepatch-5_14_21-150500_55_44-default-5-150500.2.1
+
+ kernel-livepatch-5_14_21-150500_55_49-default-10-150500.11.8.1
+
kernel-livepatch-5_14_21-150500_55_49-default-9-150500.11.8.1
@@ -4969,6 +4978,15 @@
kernel-rt-5.14.21-150500.13.38.1 as a component of openSUSE Leap Micro 5.5
+
+ kernel-livepatch-5_14_21-150400_24_108-default-10-150400.9.8.1 as a component of SUSE Linux Enterprise Live Patching 15 SP4
+
+
+ kernel-livepatch-5_14_21-150500_13_35-rt-10-150500.11.8.1 as a component of SUSE Linux Enterprise Live Patching 15 SP5
+
+
+ kernel-livepatch-5_14_21-150500_55_49-default-10-150500.11.8.1 as a component of SUSE Linux Enterprise Live Patching 15 SP5
+
kernel-default as a component of SUSE Linux Enterprise Micro 5.0
@@ -6132,6 +6150,11 @@
openSUSE Leap Micro 5.5:kernel-default-base-5.14.21-150500.55.52.1.150500.6.23.1
openSUSE Leap Micro 5.5:kernel-rt-5.14.21-150500.13.38.1
+
+ SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_108-default-10-150400.9.8.1
+ SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_35-rt-10-150500.11.8.1
+ SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_49-default-10-150500.11.8.1
+
SUSE Linux Enterprise Micro 5.0:kernel-default
SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default
skipping CVE-2024-26621 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-26620 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-26619 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-26618 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-26617 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-26616 as CVE page is older than CVRF-CVE file.
--- /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2024-26615.xml 2024-10-16 01:30:07.149448000 +0200
+++ /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2024-26615.xml.new 2024-10-29 01:21:13.172129000 +0100
@@ -14,13 +14,13 @@
1
- 49
- 2024-10-15T23:30:06Z
+ 50
+ 2024-10-29T00:21:12Z
current
2024-03-06T00:09:03Z
- 2024-10-15T23:30:06Z
+ 2024-10-29T00:21:12Z
cve-database/bin/generate-cvrf-cve.pl
2020-12-27T01:00:00Z
@@ -218,6 +218,21 @@
Image SLES12-SP5-EC2-BYOS
+
+
+ Image SLES12-SP5-GCE-BYOS
+
+
+
+
+ Image SLES12-SP5-GCE-SAP-BYOS
+
+
+
+
+ Image SLES12-SP5-GCE-SAP-On-Demand
+
+
Image SLES12-SP5-SAP-Azure-LI-BYOS-Production
@@ -2289,6 +2304,39 @@
kernel-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-EC2-BYOS
+
+ kernel-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-BYOS
+
+
+ cluster-md-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ dlm-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ gfs2-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ kernel-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ ocfs2-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ cluster-md-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
+
+ dlm-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
+
+ gfs2-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
+
+ kernel-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
+
+ ocfs2-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
cluster-md-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-SAP-Azure-LI-BYOS-Production
@@ -4665,6 +4713,17 @@
Image SLES12-SP5-Azure-SAP-BYOS:kernel-default-4.12.14-122.225.1
Image SLES12-SP5-Azure-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.225.1
Image SLES12-SP5-EC2-BYOS:kernel-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-BYOS:kernel-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-BYOS:cluster-md-kmp-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-BYOS:dlm-kmp-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-BYOS:gfs2-kmp-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-BYOS:kernel-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:cluster-md-kmp-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:dlm-kmp-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:gfs2-kmp-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:kernel-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:ocfs2-kmp-default-4.12.14-122.225.1
Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:cluster-md-kmp-default-4.12.14-122.225.1
Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:dlm-kmp-default-4.12.14-122.225.1
Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:gfs2-kmp-default-4.12.14-122.225.1
no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2024-26614
no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2024-26610
skipping CVE-2024-26613 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-26612 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-26611 as CVE page is older than CVRF-CVE file.
--- /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2024-26610.xml 2024-10-22 01:45:06.054749000 +0200
+++ /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2024-26610.xml.new 2024-10-29 01:21:16.039980000 +0100
@@ -14,13 +14,13 @@
1
- 69
- 2024-10-21T23:45:05Z
+ 70
+ 2024-10-29T00:21:15Z
current
2024-03-13T00:09:06Z
- 2024-10-21T23:45:05Z
+ 2024-10-29T00:21:15Z
cve-database/bin/generate-cvrf-cve.pl
2020-12-27T01:00:00Z
@@ -2156,15 +2156,24 @@
kernel-livepatch-5_14_21-150400_24_103-default-5-150400.2.1
+
+ kernel-livepatch-5_14_21-150400_24_108-default-10-150400.9.8.1
+
kernel-livepatch-5_14_21-150400_24_108-default-9-150400.9.8.1
kernel-livepatch-5_14_21-150400_24_111-default-7-150400.9.6.1
+
+ kernel-livepatch-5_14_21-150400_24_111-default-8-150400.9.6.1
+
kernel-livepatch-5_14_21-150400_24_116-default-7-150400.9.8.1
+
+ kernel-livepatch-5_14_21-150400_24_116-default-8-150400.9.8.1
+
kernel-livepatch-5_14_21-150400_24_119-default-1-150400.9.3.1
@@ -2216,15 +2225,24 @@
kernel-livepatch-5_14_21-150500_13_30-rt-6-150500.2.1
+
+ kernel-livepatch-5_14_21-150500_13_35-rt-10-150500.11.8.1
+
kernel-livepatch-5_14_21-150500_13_35-rt-9-150500.11.8.1
kernel-livepatch-5_14_21-150500_13_38-rt-7-150500.11.6.1
+
+ kernel-livepatch-5_14_21-150500_13_38-rt-8-150500.11.6.1
+
kernel-livepatch-5_14_21-150500_13_47-rt-7-150500.11.6.1
+
+ kernel-livepatch-5_14_21-150500_13_47-rt-8-150500.11.6.1
+
kernel-livepatch-5_14_21-150500_13_5-rt-12-150500.2.1
@@ -2255,15 +2273,24 @@
kernel-livepatch-5_14_21-150500_55_44-default-6-150500.2.1
+
+ kernel-livepatch-5_14_21-150500_55_49-default-10-150500.11.8.1
+
kernel-livepatch-5_14_21-150500_55_49-default-9-150500.11.8.1
kernel-livepatch-5_14_21-150500_55_52-default-7-150500.11.6.1
+
+ kernel-livepatch-5_14_21-150500_55_52-default-8-150500.11.6.1
+
kernel-livepatch-5_14_21-150500_55_59-default-7-150500.11.10.1
+
+ kernel-livepatch-5_14_21-150500_55_59-default-8-150500.11.10.1
+
kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2
@@ -2303,9 +2330,15 @@
kernel-livepatch-5_3_18-150300_59_153-default-8-150300.7.6.1
+
+ kernel-livepatch-5_3_18-150300_59_153-default-9-150300.7.6.1
+
kernel-livepatch-5_3_18-150300_59_158-default-7-150300.7.6.1
+
+ kernel-livepatch-5_3_18-150300_59_158-default-8-150300.7.6.1
+
kernel-livepatch-5_3_18-150300_59_161-default-1-150300.7.3.1
@@ -4523,6 +4556,39 @@
kernel-rt-5.14.21-150500.13.52.1 as a component of openSUSE Leap Micro 5.5
+
+ kernel-livepatch-5_3_18-150300_59_153-default-9-150300.7.6.1 as a component of SUSE Linux Enterprise Live Patching 15 SP3
+
+
+ kernel-livepatch-5_3_18-150300_59_158-default-8-150300.7.6.1 as a component of SUSE Linux Enterprise Live Patching 15 SP3
+
+
+ kernel-livepatch-5_14_21-150400_24_108-default-10-150400.9.8.1 as a component of SUSE Linux Enterprise Live Patching 15 SP4
+
+
+ kernel-livepatch-5_14_21-150400_24_111-default-8-150400.9.6.1 as a component of SUSE Linux Enterprise Live Patching 15 SP4
+
+
+ kernel-livepatch-5_14_21-150400_24_116-default-8-150400.9.8.1 as a component of SUSE Linux Enterprise Live Patching 15 SP4
+
+
+ kernel-livepatch-5_14_21-150500_13_35-rt-10-150500.11.8.1 as a component of SUSE Linux Enterprise Live Patching 15 SP5
+
+
+ kernel-livepatch-5_14_21-150500_13_38-rt-8-150500.11.6.1 as a component of SUSE Linux Enterprise Live Patching 15 SP5
+
+
+ kernel-livepatch-5_14_21-150500_13_47-rt-8-150500.11.6.1 as a component of SUSE Linux Enterprise Live Patching 15 SP5
+
+
+ kernel-livepatch-5_14_21-150500_55_49-default-10-150500.11.8.1 as a component of SUSE Linux Enterprise Live Patching 15 SP5
+
+
+ kernel-livepatch-5_14_21-150500_55_52-default-8-150500.11.6.1 as a component of SUSE Linux Enterprise Live Patching 15 SP5
+
+
+ kernel-livepatch-5_14_21-150500_55_59-default-8-150500.11.10.1 as a component of SUSE Linux Enterprise Live Patching 15 SP5
+
kernel-default as a component of SUSE Linux Enterprise High Performance Computing 12 SP5
@@ -5602,6 +5668,19 @@
openSUSE Leap Micro 5.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2
openSUSE Leap Micro 5.5:kernel-rt-5.14.21-150500.13.52.1
+
+ SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_153-default-9-150300.7.6.1
+ SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_158-default-8-150300.7.6.1
+ SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_108-default-10-150400.9.8.1
+ SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_111-default-8-150400.9.6.1
+ SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_116-default-8-150400.9.8.1
+ SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_35-rt-10-150500.11.8.1
+ SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_38-rt-8-150500.11.6.1
+ SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_47-rt-8-150500.11.6.1
+ SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_49-default-10-150500.11.8.1
+ SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_52-default-8-150500.11.6.1
+ SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_59-default-8-150500.11.10.1
+
SUSE Linux Enterprise High Performance Computing 12 SP5:kernel-default
SUSE Linux Enterprise High Performance Computing 12 SP5:kernel-source
no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2024-26585
skipping CVE-2024-26609 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-26608 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-26607 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-26606 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-26605 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-26604 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-26603 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-26602 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-26601 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-26600 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-26599 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-26598 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-26597 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-26596 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-26595 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-26594 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-26593 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-26592 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-26591 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-26590 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-26589 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-26588 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-26587 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-26586 as CVE page is older than CVRF-CVE file.
--- /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2024-26585.xml 2024-10-20 01:26:06.124954000 +0200
+++ /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2024-26585.xml.new 2024-10-29 01:21:17.454858000 +0100
@@ -14,13 +14,13 @@
1
- 79
- 2024-10-19T23:26:05Z
+ 80
+ 2024-10-29T00:21:16Z
current
2024-02-23T00:09:48Z
- 2024-10-19T23:26:05Z
+ 2024-10-29T00:21:16Z
cve-database/bin/generate-cvrf-cve.pl
2020-12-27T01:00:00Z
@@ -2337,6 +2337,9 @@
kernel-livepatch-5_14_21-150400_24_103-default-5-150400.2.1
+
+ kernel-livepatch-5_14_21-150400_24_108-default-10-150400.9.8.1
+
kernel-livepatch-5_14_21-150400_24_108-default-9-150400.9.8.1
@@ -2394,6 +2397,9 @@
kernel-livepatch-5_14_21-150500_13_30-rt-6-150500.2.1
+
+ kernel-livepatch-5_14_21-150500_13_35-rt-10-150500.11.8.1
+
kernel-livepatch-5_14_21-150500_13_35-rt-9-150500.11.8.1
@@ -2430,6 +2436,9 @@
kernel-livepatch-5_14_21-150500_55_44-default-6-150500.2.1
+
+ kernel-livepatch-5_14_21-150500_55_49-default-10-150500.11.8.1
+
kernel-livepatch-5_14_21-150500_55_49-default-9-150500.11.8.1
@@ -5469,6 +5478,15 @@
kernel-rt-5.14.21-150500.13.64.1 as a component of openSUSE Leap Micro 5.5
+
+ kernel-livepatch-5_14_21-150400_24_108-default-10-150400.9.8.1 as a component of SUSE Linux Enterprise Live Patching 15 SP4
+
+
+ kernel-livepatch-5_14_21-150500_13_35-rt-10-150500.11.8.1 as a component of SUSE Linux Enterprise Live Patching 15 SP5
+
+
+ kernel-livepatch-5_14_21-150500_55_49-default-10-150500.11.8.1 as a component of SUSE Linux Enterprise Live Patching 15 SP5
+
kernel-default as a component of SUSE CaaS Platform 4.0
@@ -5709,18 +5727,6 @@
kernel-default as a component of SUSE Linux Enterprise Server for SAP Applications 12 SP5
-
- kernel-default-base as a component of SUSE Linux Enterprise Server for SAP Applications 12 SP5
-
-
- kernel-default-devel as a component of SUSE Linux Enterprise Server for SAP Applications 12 SP5
-
-
- kernel-devel as a component of SUSE Linux Enterprise Server for SAP Applications 12 SP5
-
-
- kernel-macros as a component of SUSE Linux Enterprise Server for SAP Applications 12 SP5
-
kernel-source as a component of SUSE Linux Enterprise Server for SAP Applications 12 SP5
@@ -6757,6 +6763,11 @@
openSUSE Leap Micro 5.5:kernel-default-base-5.14.21-150500.55.52.1.150500.6.23.1
openSUSE Leap Micro 5.5:kernel-rt-5.14.21-150500.13.64.1
+
+ SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_108-default-10-150400.9.8.1
+ SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_35-rt-10-150500.11.8.1
+ SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_49-default-10-150500.11.8.1
+
SUSE CaaS Platform 4.0:kernel-default
SUSE CaaS Platform 4.0:kernel-default-base
@@ -6838,10 +6849,6 @@
SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros
SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source
SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default
- SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base
- SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel
- SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel
- SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros
SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source
SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default
SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base
skipping CVE-2024-26584 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-26583 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-26582 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-26581 as CVE page is older than CVRF-CVE file.
no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2024-26461
skipping CVE-2024-26464 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-26462 as CVE page is older than CVRF-CVE file.
no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2024-26458
no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2024-26308
skipping CVE-2024-26328 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-26327 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-26256 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-26130 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-25939 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-25744 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-25743 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-25742 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-25741 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-25740 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-25739 as CVE page is older than CVRF-CVE file.
no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2024-25710
no cpe found for SUSE Package Hub 15 SP5 in CVE-2024-25641
no cpe found for SUSE Package Hub 15 SP6 in CVE-2024-25641
no cpe found for SUSE Liberty Linux 7 LTSS in CVE-2024-25617
no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2024-25617
no cpe found for SUSE Package Hub 15 SP5 in CVE-2024-25583
skipping CVE-2024-25584 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-25580 as CVE page is older than CVRF-CVE file.
no cpe found for SUSE Package Hub 15 SP5 in CVE-2024-25446
no cpe found for SUSE Package Hub 15 SP5 in CVE-2024-25445
no cpe found for SUSE Package Hub 15 SP5 in CVE-2024-25443
no cpe found for SUSE Package Hub 15 SP5 in CVE-2024-25442
skipping CVE-2024-25260 as CVE page is older than CVRF-CVE file.
no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2024-25111
skipping CVE-2024-25112 as CVE page is older than CVRF-CVE file.
no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2024-25110
no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2024-25082
no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2024-25081
no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2024-25062
skipping CVE-2024-24986 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-24980 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-24974 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-24968 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-24864 as CVE page is older than CVRF-CVE file.
no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2024-24821
skipping CVE-2024-24860 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-24859 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-24858 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-24857 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-24855 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-24853 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-24826 as CVE page is older than CVRF-CVE file.
no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2024-24814
no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2024-24806
no cpe found for SUSE Package Hub 15 SP5 in CVE-2024-24792
no cpe found for SUSE Package Hub 15 SP6 in CVE-2024-24792
skipping CVE-2024-24795 as CVE page is older than CVRF-CVE file.
no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2024-24791
--- /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2024-24791.xml 2024-10-26 01:16:46.317248000 +0200
+++ /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2024-24791.xml.new 2024-10-29 01:21:37.591799000 +0100
@@ -14,13 +14,13 @@
1
- 25
- 2024-10-25T23:16:45Z
+ 26
+ 2024-10-29T00:21:37Z
current
2024-07-02T23:25:48Z
- 2024-10-25T23:16:45Z
+ 2024-10-29T00:21:37Z
cve-database/bin/generate-cvrf-cve.pl
2020-12-27T01:00:00Z
@@ -443,6 +443,24 @@
go1.22-libstd-1.22.5-1.1
+
+ go1.22-openssl-1.22.7.1-150000.1.3.1
+
+
+ go1.22-openssl-1.22.7.1-150600.13.3.1
+
+
+ go1.22-openssl-doc-1.22.7.1-150000.1.3.1
+
+
+ go1.22-openssl-doc-1.22.7.1-150600.13.3.1
+
+
+ go1.22-openssl-race-1.22.7.1-150000.1.3.1
+
+
+ go1.22-openssl-race-1.22.7.1-150600.13.3.1
+
go1.22-race-1.22.5-1.1
@@ -1058,6 +1076,42 @@
istioctl-zsh-completion-1.22.3-1.1 as a component of openSUSE Tumbleweed
+
+ go1.22-openssl-1.22.7.1-150000.1.3.1 as a component of SUSE Linux Enterprise Module for Development Tools 15 SP5
+
+
+ go1.22-openssl-doc-1.22.7.1-150000.1.3.1 as a component of SUSE Linux Enterprise Module for Development Tools 15 SP5
+
+
+ go1.22-openssl-race-1.22.7.1-150000.1.3.1 as a component of SUSE Linux Enterprise Module for Development Tools 15 SP5
+
+
+ go1.22-openssl-1.22.7.1-150600.13.3.1 as a component of SUSE Linux Enterprise Module for Development Tools 15 SP6
+
+
+ go1.22-openssl-doc-1.22.7.1-150600.13.3.1 as a component of SUSE Linux Enterprise Module for Development Tools 15 SP6
+
+
+ go1.22-openssl-race-1.22.7.1-150600.13.3.1 as a component of SUSE Linux Enterprise Module for Development Tools 15 SP6
+
+
+ go1.22-openssl-1.22.7.1-150000.1.3.1 as a component of openSUSE Leap 15.5
+
+
+ go1.22-openssl-doc-1.22.7.1-150000.1.3.1 as a component of openSUSE Leap 15.5
+
+
+ go1.22-openssl-race-1.22.7.1-150000.1.3.1 as a component of openSUSE Leap 15.5
+
+
+ go1.22-openssl-1.22.7.1-150600.13.3.1 as a component of openSUSE Leap 15.6
+
+
+ go1.22-openssl-doc-1.22.7.1-150600.13.3.1 as a component of openSUSE Leap 15.6
+
+
+ go1.22-openssl-race-1.22.7.1-150600.13.3.1 as a component of openSUSE Leap 15.6
+
go as a component of SUSE Enterprise Storage 7.1
@@ -1338,6 +1392,20 @@
openSUSE Tumbleweed:istioctl-bash-completion-1.22.3-1.1
openSUSE Tumbleweed:istioctl-zsh-completion-1.22.3-1.1
+
+ SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.22-openssl-1.22.7.1-150000.1.3.1
+ SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.22-openssl-doc-1.22.7.1-150000.1.3.1
+ SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.22-openssl-race-1.22.7.1-150000.1.3.1
+ SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.22-openssl-1.22.7.1-150600.13.3.1
+ SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.22-openssl-doc-1.22.7.1-150600.13.3.1
+ SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.22-openssl-race-1.22.7.1-150600.13.3.1
+ openSUSE Leap 15.5:go1.22-openssl-1.22.7.1-150000.1.3.1
+ openSUSE Leap 15.5:go1.22-openssl-doc-1.22.7.1-150000.1.3.1
+ openSUSE Leap 15.5:go1.22-openssl-race-1.22.7.1-150000.1.3.1
+ openSUSE Leap 15.6:go1.22-openssl-1.22.7.1-150600.13.3.1
+ openSUSE Leap 15.6:go1.22-openssl-doc-1.22.7.1-150600.13.3.1
+ openSUSE Leap 15.6:go1.22-openssl-race-1.22.7.1-150600.13.3.1
+
SUSE Enterprise Storage 7.1:go
SUSE Enterprise Storage 7.1:go-doc
no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2024-24790
--- /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2024-24790.xml 2024-10-26 01:16:46.962217000 +0200
+++ /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2024-24790.xml.new 2024-10-29 01:21:38.249793000 +0100
@@ -14,13 +14,13 @@
1
- 31
- 2024-10-25T23:16:46Z
+ 32
+ 2024-10-29T00:21:37Z
current
2024-06-05T23:10:51Z
- 2024-10-25T23:16:46Z
+ 2024-10-29T00:21:37Z
cve-database/bin/generate-cvrf-cve.pl
2020-12-27T01:00:00Z
@@ -390,6 +390,24 @@
go1.22-libstd-1.22.4-1.1
+
+ go1.22-openssl-1.22.7.1-150000.1.3.1
+
+
+ go1.22-openssl-1.22.7.1-150600.13.3.1
+
+
+ go1.22-openssl-doc-1.22.7.1-150000.1.3.1
+
+
+ go1.22-openssl-doc-1.22.7.1-150600.13.3.1
+
+
+ go1.22-openssl-race-1.22.7.1-150000.1.3.1
+
+
+ go1.22-openssl-race-1.22.7.1-150600.13.3.1
+
go1.22-race-1.22.4-1.1
@@ -828,6 +846,42 @@
kubelogin-0.1.4-1.1 as a component of openSUSE Tumbleweed
+
+ go1.22-openssl-1.22.7.1-150000.1.3.1 as a component of SUSE Linux Enterprise Module for Development Tools 15 SP5
+
+
+ go1.22-openssl-doc-1.22.7.1-150000.1.3.1 as a component of SUSE Linux Enterprise Module for Development Tools 15 SP5
+
+
+ go1.22-openssl-race-1.22.7.1-150000.1.3.1 as a component of SUSE Linux Enterprise Module for Development Tools 15 SP5
+
+
+ go1.22-openssl-1.22.7.1-150600.13.3.1 as a component of SUSE Linux Enterprise Module for Development Tools 15 SP6
+
+
+ go1.22-openssl-doc-1.22.7.1-150600.13.3.1 as a component of SUSE Linux Enterprise Module for Development Tools 15 SP6
+
+
+ go1.22-openssl-race-1.22.7.1-150600.13.3.1 as a component of SUSE Linux Enterprise Module for Development Tools 15 SP6
+
+
+ go1.22-openssl-1.22.7.1-150000.1.3.1 as a component of openSUSE Leap 15.5
+
+
+ go1.22-openssl-doc-1.22.7.1-150000.1.3.1 as a component of openSUSE Leap 15.5
+
+
+ go1.22-openssl-race-1.22.7.1-150000.1.3.1 as a component of openSUSE Leap 15.5
+
+
+ go1.22-openssl-1.22.7.1-150600.13.3.1 as a component of openSUSE Leap 15.6
+
+
+ go1.22-openssl-doc-1.22.7.1-150600.13.3.1 as a component of openSUSE Leap 15.6
+
+
+ go1.22-openssl-race-1.22.7.1-150600.13.3.1 as a component of openSUSE Leap 15.6
+
go as a component of SUSE Enterprise Storage 7.1
@@ -1103,6 +1157,20 @@
openSUSE Tumbleweed:helmfile-zsh-completion-0.166.0-1.1
openSUSE Tumbleweed:kubelogin-0.1.4-1.1
+
+ SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.22-openssl-1.22.7.1-150000.1.3.1
+ SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.22-openssl-doc-1.22.7.1-150000.1.3.1
+ SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.22-openssl-race-1.22.7.1-150000.1.3.1
+ SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.22-openssl-1.22.7.1-150600.13.3.1
+ SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.22-openssl-doc-1.22.7.1-150600.13.3.1
+ SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.22-openssl-race-1.22.7.1-150600.13.3.1
+ openSUSE Leap 15.5:go1.22-openssl-1.22.7.1-150000.1.3.1
+ openSUSE Leap 15.5:go1.22-openssl-doc-1.22.7.1-150000.1.3.1
+ openSUSE Leap 15.5:go1.22-openssl-race-1.22.7.1-150000.1.3.1
+ openSUSE Leap 15.6:go1.22-openssl-1.22.7.1-150600.13.3.1
+ openSUSE Leap 15.6:go1.22-openssl-doc-1.22.7.1-150600.13.3.1
+ openSUSE Leap 15.6:go1.22-openssl-race-1.22.7.1-150600.13.3.1
+
SUSE Enterprise Storage 7.1:go
SUSE Enterprise Storage 7.1:go-doc
no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2024-24789
--- /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2024-24789.xml 2024-10-26 01:16:47.552190000 +0200
+++ /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2024-24789.xml.new 2024-10-29 01:21:38.960774000 +0100
@@ -14,13 +14,13 @@
1
- 30
- 2024-10-25T23:16:47Z
+ 31
+ 2024-10-29T00:21:38Z
current
2024-06-05T23:10:51Z
- 2024-10-25T23:16:47Z
+ 2024-10-29T00:21:38Z
cve-database/bin/generate-cvrf-cve.pl
2020-12-27T01:00:00Z
@@ -441,6 +441,24 @@
go1.22-libstd-1.22.4-1.1
+
+ go1.22-openssl-1.22.7.1-150000.1.3.1
+
+
+ go1.22-openssl-1.22.7.1-150600.13.3.1
+
+
+ go1.22-openssl-doc-1.22.7.1-150000.1.3.1
+
+
+ go1.22-openssl-doc-1.22.7.1-150600.13.3.1
+
+
+ go1.22-openssl-race-1.22.7.1-150000.1.3.1
+
+
+ go1.22-openssl-race-1.22.7.1-150600.13.3.1
+
go1.22-race-1.22.4-1.1
@@ -1020,6 +1038,42 @@
go1.22-race-1.22.4-1.1 as a component of openSUSE Tumbleweed
+
+ go1.22-openssl-1.22.7.1-150000.1.3.1 as a component of SUSE Linux Enterprise Module for Development Tools 15 SP5
+
+
+ go1.22-openssl-doc-1.22.7.1-150000.1.3.1 as a component of SUSE Linux Enterprise Module for Development Tools 15 SP5
+
+
+ go1.22-openssl-race-1.22.7.1-150000.1.3.1 as a component of SUSE Linux Enterprise Module for Development Tools 15 SP5
+
+
+ go1.22-openssl-1.22.7.1-150600.13.3.1 as a component of SUSE Linux Enterprise Module for Development Tools 15 SP6
+
+
+ go1.22-openssl-doc-1.22.7.1-150600.13.3.1 as a component of SUSE Linux Enterprise Module for Development Tools 15 SP6
+
+
+ go1.22-openssl-race-1.22.7.1-150600.13.3.1 as a component of SUSE Linux Enterprise Module for Development Tools 15 SP6
+
+
+ go1.22-openssl-1.22.7.1-150000.1.3.1 as a component of openSUSE Leap 15.5
+
+
+ go1.22-openssl-doc-1.22.7.1-150000.1.3.1 as a component of openSUSE Leap 15.5
+
+
+ go1.22-openssl-race-1.22.7.1-150000.1.3.1 as a component of openSUSE Leap 15.5
+
+
+ go1.22-openssl-1.22.7.1-150600.13.3.1 as a component of openSUSE Leap 15.6
+
+
+ go1.22-openssl-doc-1.22.7.1-150600.13.3.1 as a component of openSUSE Leap 15.6
+
+
+ go1.22-openssl-race-1.22.7.1-150600.13.3.1 as a component of openSUSE Leap 15.6
+
go as a component of SUSE Enterprise Storage 7.1
@@ -1327,6 +1381,20 @@
openSUSE Tumbleweed:go1.22-libstd-1.22.4-1.1
openSUSE Tumbleweed:go1.22-race-1.22.4-1.1
+
+ SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.22-openssl-1.22.7.1-150000.1.3.1
+ SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.22-openssl-doc-1.22.7.1-150000.1.3.1
+ SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.22-openssl-race-1.22.7.1-150000.1.3.1
+ SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.22-openssl-1.22.7.1-150600.13.3.1
+ SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.22-openssl-doc-1.22.7.1-150600.13.3.1
+ SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.22-openssl-race-1.22.7.1-150600.13.3.1
+ openSUSE Leap 15.5:go1.22-openssl-1.22.7.1-150000.1.3.1
+ openSUSE Leap 15.5:go1.22-openssl-doc-1.22.7.1-150000.1.3.1
+ openSUSE Leap 15.5:go1.22-openssl-race-1.22.7.1-150000.1.3.1
+ openSUSE Leap 15.6:go1.22-openssl-1.22.7.1-150600.13.3.1
+ openSUSE Leap 15.6:go1.22-openssl-doc-1.22.7.1-150600.13.3.1
+ openSUSE Leap 15.6:go1.22-openssl-race-1.22.7.1-150600.13.3.1
+
SUSE Enterprise Storage 7.1:go
SUSE Enterprise Storage 7.1:go-doc
--- /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2024-24788.xml 2024-09-28 01:25:14.534867000 +0200
+++ /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2024-24788.xml.new 2024-10-29 01:21:39.615219000 +0100
@@ -14,13 +14,13 @@
1
- 16
- 2024-09-27T23:25:14Z
+ 17
+ 2024-10-29T00:21:39Z
current
2024-05-07T23:12:37Z
- 2024-09-27T23:25:14Z
+ 2024-10-29T00:21:39Z
cve-database/bin/generate-cvrf-cve.pl
2020-12-27T01:00:00Z
@@ -237,6 +237,24 @@
go1.22-libstd-1.22.3-1.1
+
+ go1.22-openssl-1.22.7.1-150000.1.3.1
+
+
+ go1.22-openssl-1.22.7.1-150600.13.3.1
+
+
+ go1.22-openssl-doc-1.22.7.1-150000.1.3.1
+
+
+ go1.22-openssl-doc-1.22.7.1-150600.13.3.1
+
+
+ go1.22-openssl-race-1.22.7.1-150000.1.3.1
+
+
+ go1.22-openssl-race-1.22.7.1-150600.13.3.1
+
go1.22-race
@@ -504,6 +522,42 @@
traefik2-2.11.5-1.1 as a component of openSUSE Tumbleweed
+
+ go1.22-openssl-1.22.7.1-150000.1.3.1 as a component of SUSE Linux Enterprise Module for Development Tools 15 SP5
+
+
+ go1.22-openssl-doc-1.22.7.1-150000.1.3.1 as a component of SUSE Linux Enterprise Module for Development Tools 15 SP5
+
+
+ go1.22-openssl-race-1.22.7.1-150000.1.3.1 as a component of SUSE Linux Enterprise Module for Development Tools 15 SP5
+
+
+ go1.22-openssl-1.22.7.1-150600.13.3.1 as a component of SUSE Linux Enterprise Module for Development Tools 15 SP6
+
+
+ go1.22-openssl-doc-1.22.7.1-150600.13.3.1 as a component of SUSE Linux Enterprise Module for Development Tools 15 SP6
+
+
+ go1.22-openssl-race-1.22.7.1-150600.13.3.1 as a component of SUSE Linux Enterprise Module for Development Tools 15 SP6
+
+
+ go1.22-openssl-1.22.7.1-150000.1.3.1 as a component of openSUSE Leap 15.5
+
+
+ go1.22-openssl-doc-1.22.7.1-150000.1.3.1 as a component of openSUSE Leap 15.5
+
+
+ go1.22-openssl-race-1.22.7.1-150000.1.3.1 as a component of openSUSE Leap 15.5
+
+
+ go1.22-openssl-1.22.7.1-150600.13.3.1 as a component of openSUSE Leap 15.6
+
+
+ go1.22-openssl-doc-1.22.7.1-150600.13.3.1 as a component of openSUSE Leap 15.6
+
+
+ go1.22-openssl-race-1.22.7.1-150600.13.3.1 as a component of openSUSE Leap 15.6
+
go1.21 as a component of SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS
@@ -662,6 +716,20 @@
openSUSE Tumbleweed:traefik-3.0.1-1.1
openSUSE Tumbleweed:traefik2-2.11.5-1.1
+
+ SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.22-openssl-1.22.7.1-150000.1.3.1
+ SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.22-openssl-doc-1.22.7.1-150000.1.3.1
+ SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.22-openssl-race-1.22.7.1-150000.1.3.1
+ SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.22-openssl-1.22.7.1-150600.13.3.1
+ SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.22-openssl-doc-1.22.7.1-150600.13.3.1
+ SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.22-openssl-race-1.22.7.1-150600.13.3.1
+ openSUSE Leap 15.5:go1.22-openssl-1.22.7.1-150000.1.3.1
+ openSUSE Leap 15.5:go1.22-openssl-doc-1.22.7.1-150000.1.3.1
+ openSUSE Leap 15.5:go1.22-openssl-race-1.22.7.1-150000.1.3.1
+ openSUSE Leap 15.6:go1.22-openssl-1.22.7.1-150600.13.3.1
+ openSUSE Leap 15.6:go1.22-openssl-doc-1.22.7.1-150600.13.3.1
+ openSUSE Leap 15.6:go1.22-openssl-race-1.22.7.1-150600.13.3.1
+
SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.21
SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.21-doc
no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2024-24787
--- /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2024-24787.xml 2024-10-26 01:16:48.427135000 +0200
+++ /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2024-24787.xml.new 2024-10-29 01:21:40.829136000 +0100
@@ -14,13 +14,13 @@
1
- 17
- 2024-10-25T23:16:48Z
+ 18
+ 2024-10-29T00:21:39Z
current
2024-05-07T23:12:37Z
- 2024-10-25T23:16:48Z
+ 2024-10-29T00:21:39Z
cve-database/bin/generate-cvrf-cve.pl
2020-12-27T01:00:00Z
@@ -295,6 +295,24 @@
go1.22-libstd-1.22.3-1.1
+
+ go1.22-openssl-1.22.7.1-150000.1.3.1
+
+
+ go1.22-openssl-1.22.7.1-150600.13.3.1
+
+
+ go1.22-openssl-doc-1.22.7.1-150000.1.3.1
+
+
+ go1.22-openssl-doc-1.22.7.1-150600.13.3.1
+
+
+ go1.22-openssl-race-1.22.7.1-150000.1.3.1
+
+
+ go1.22-openssl-race-1.22.7.1-150600.13.3.1
+
go1.22-race
@@ -556,6 +574,42 @@
go1.22-race-1.22.3-1.1 as a component of openSUSE Tumbleweed
+
+ go1.22-openssl-1.22.7.1-150000.1.3.1 as a component of SUSE Linux Enterprise Module for Development Tools 15 SP5
+
+
+ go1.22-openssl-doc-1.22.7.1-150000.1.3.1 as a component of SUSE Linux Enterprise Module for Development Tools 15 SP5
+
+
+ go1.22-openssl-race-1.22.7.1-150000.1.3.1 as a component of SUSE Linux Enterprise Module for Development Tools 15 SP5
+
+
+ go1.22-openssl-1.22.7.1-150600.13.3.1 as a component of SUSE Linux Enterprise Module for Development Tools 15 SP6
+
+
+ go1.22-openssl-doc-1.22.7.1-150600.13.3.1 as a component of SUSE Linux Enterprise Module for Development Tools 15 SP6
+
+
+ go1.22-openssl-race-1.22.7.1-150600.13.3.1 as a component of SUSE Linux Enterprise Module for Development Tools 15 SP6
+
+
+ go1.22-openssl-1.22.7.1-150000.1.3.1 as a component of openSUSE Leap 15.5
+
+
+ go1.22-openssl-doc-1.22.7.1-150000.1.3.1 as a component of openSUSE Leap 15.5
+
+
+ go1.22-openssl-race-1.22.7.1-150000.1.3.1 as a component of openSUSE Leap 15.5
+
+
+ go1.22-openssl-1.22.7.1-150600.13.3.1 as a component of openSUSE Leap 15.6
+
+
+ go1.22-openssl-doc-1.22.7.1-150600.13.3.1 as a component of openSUSE Leap 15.6
+
+
+ go1.22-openssl-race-1.22.7.1-150600.13.3.1 as a component of openSUSE Leap 15.6
+
go as a component of SUSE Enterprise Storage 7.1
@@ -937,6 +991,20 @@
openSUSE Tumbleweed:go1.22-libstd-1.22.3-1.1
openSUSE Tumbleweed:go1.22-race-1.22.3-1.1
+
+ SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.22-openssl-1.22.7.1-150000.1.3.1
+ SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.22-openssl-doc-1.22.7.1-150000.1.3.1
+ SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.22-openssl-race-1.22.7.1-150000.1.3.1
+ SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.22-openssl-1.22.7.1-150600.13.3.1
+ SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.22-openssl-doc-1.22.7.1-150600.13.3.1
+ SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.22-openssl-race-1.22.7.1-150600.13.3.1
+ openSUSE Leap 15.5:go1.22-openssl-1.22.7.1-150000.1.3.1
+ openSUSE Leap 15.5:go1.22-openssl-doc-1.22.7.1-150000.1.3.1
+ openSUSE Leap 15.5:go1.22-openssl-race-1.22.7.1-150000.1.3.1
+ openSUSE Leap 15.6:go1.22-openssl-1.22.7.1-150600.13.3.1
+ openSUSE Leap 15.6:go1.22-openssl-doc-1.22.7.1-150600.13.3.1
+ openSUSE Leap 15.6:go1.22-openssl-race-1.22.7.1-150600.13.3.1
+
SUSE Enterprise Storage 7.1:go
SUSE Enterprise Storage 7.1:go-doc
no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2024-24786
no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2024-24785
--- /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2024-24785.xml 2024-10-26 01:16:49.521100000 +0200
+++ /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2024-24785.xml.new 2024-10-29 01:21:44.951914000 +0100
@@ -14,13 +14,13 @@
1
- 18
- 2024-10-25T23:16:49Z
+ 19
+ 2024-10-29T00:21:44Z
current
2024-03-07T00:10:42Z
- 2024-10-25T23:16:49Z
+ 2024-10-29T00:21:44Z
cve-database/bin/generate-cvrf-cve.pl
2020-12-27T01:00:00Z
@@ -252,6 +252,24 @@
go1.22-libstd-1.22.1-1.1
+
+ go1.22-openssl-1.22.7.1-150000.1.3.1
+
+
+ go1.22-openssl-1.22.7.1-150600.13.3.1
+
+
+ go1.22-openssl-doc-1.22.7.1-150000.1.3.1
+
+
+ go1.22-openssl-doc-1.22.7.1-150600.13.3.1
+
+
+ go1.22-openssl-race-1.22.7.1-150000.1.3.1
+
+
+ go1.22-openssl-race-1.22.7.1-150600.13.3.1
+
go1.22-race-1.22.1-1.1
@@ -591,6 +609,42 @@
go1.22-race-1.22.1-1.1 as a component of openSUSE Tumbleweed
+
+ go1.22-openssl-1.22.7.1-150000.1.3.1 as a component of SUSE Linux Enterprise Module for Development Tools 15 SP5
+
+
+ go1.22-openssl-doc-1.22.7.1-150000.1.3.1 as a component of SUSE Linux Enterprise Module for Development Tools 15 SP5
+
+
+ go1.22-openssl-race-1.22.7.1-150000.1.3.1 as a component of SUSE Linux Enterprise Module for Development Tools 15 SP5
+
+
+ go1.22-openssl-1.22.7.1-150600.13.3.1 as a component of SUSE Linux Enterprise Module for Development Tools 15 SP6
+
+
+ go1.22-openssl-doc-1.22.7.1-150600.13.3.1 as a component of SUSE Linux Enterprise Module for Development Tools 15 SP6
+
+
+ go1.22-openssl-race-1.22.7.1-150600.13.3.1 as a component of SUSE Linux Enterprise Module for Development Tools 15 SP6
+
+
+ go1.22-openssl-1.22.7.1-150000.1.3.1 as a component of openSUSE Leap 15.5
+
+
+ go1.22-openssl-doc-1.22.7.1-150000.1.3.1 as a component of openSUSE Leap 15.5
+
+
+ go1.22-openssl-race-1.22.7.1-150000.1.3.1 as a component of openSUSE Leap 15.5
+
+
+ go1.22-openssl-1.22.7.1-150600.13.3.1 as a component of openSUSE Leap 15.6
+
+
+ go1.22-openssl-doc-1.22.7.1-150600.13.3.1 as a component of openSUSE Leap 15.6
+
+
+ go1.22-openssl-race-1.22.7.1-150600.13.3.1 as a component of openSUSE Leap 15.6
+
@@ -699,6 +753,20 @@
openSUSE Tumbleweed:go1.22-libstd-1.22.1-1.1
openSUSE Tumbleweed:go1.22-race-1.22.1-1.1
+
+ SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.22-openssl-1.22.7.1-150000.1.3.1
+ SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.22-openssl-doc-1.22.7.1-150000.1.3.1
+ SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.22-openssl-race-1.22.7.1-150000.1.3.1
+ SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.22-openssl-1.22.7.1-150600.13.3.1
+ SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.22-openssl-doc-1.22.7.1-150600.13.3.1
+ SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.22-openssl-race-1.22.7.1-150600.13.3.1
+ openSUSE Leap 15.5:go1.22-openssl-1.22.7.1-150000.1.3.1
+ openSUSE Leap 15.5:go1.22-openssl-doc-1.22.7.1-150000.1.3.1
+ openSUSE Leap 15.5:go1.22-openssl-race-1.22.7.1-150000.1.3.1
+ openSUSE Leap 15.6:go1.22-openssl-1.22.7.1-150600.13.3.1
+ openSUSE Leap 15.6:go1.22-openssl-doc-1.22.7.1-150600.13.3.1
+ openSUSE Leap 15.6:go1.22-openssl-race-1.22.7.1-150600.13.3.1
+
no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2024-24784
--- /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2024-24784.xml 2024-10-26 01:16:50.179054000 +0200
+++ /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2024-24784.xml.new 2024-10-29 01:21:46.308973000 +0100
@@ -14,13 +14,13 @@
1
- 20
- 2024-10-25T23:16:49Z
+ 21
+ 2024-10-29T00:21:45Z
current
2024-03-07T00:10:42Z
- 2024-10-25T23:16:49Z
+ 2024-10-29T00:21:45Z
cve-database/bin/generate-cvrf-cve.pl
2020-12-27T01:00:00Z
@@ -298,6 +298,24 @@
go1.22-libstd-1.22.1-1.1
+
+ go1.22-openssl-1.22.7.1-150000.1.3.1
+
+
+ go1.22-openssl-1.22.7.1-150600.13.3.1
+
+
+ go1.22-openssl-doc-1.22.7.1-150000.1.3.1
+
+
+ go1.22-openssl-doc-1.22.7.1-150600.13.3.1
+
+
+ go1.22-openssl-race-1.22.7.1-150000.1.3.1
+
+
+ go1.22-openssl-race-1.22.7.1-150600.13.3.1
+
go1.22-race-1.22.1-1.1
@@ -799,6 +817,42 @@
go1.22-race-1.22.1-1.1 as a component of openSUSE Tumbleweed
+
+ go1.22-openssl-1.22.7.1-150000.1.3.1 as a component of SUSE Linux Enterprise Module for Development Tools 15 SP5
+
+
+ go1.22-openssl-doc-1.22.7.1-150000.1.3.1 as a component of SUSE Linux Enterprise Module for Development Tools 15 SP5
+
+
+ go1.22-openssl-race-1.22.7.1-150000.1.3.1 as a component of SUSE Linux Enterprise Module for Development Tools 15 SP5
+
+
+ go1.22-openssl-1.22.7.1-150600.13.3.1 as a component of SUSE Linux Enterprise Module for Development Tools 15 SP6
+
+
+ go1.22-openssl-doc-1.22.7.1-150600.13.3.1 as a component of SUSE Linux Enterprise Module for Development Tools 15 SP6
+
+
+ go1.22-openssl-race-1.22.7.1-150600.13.3.1 as a component of SUSE Linux Enterprise Module for Development Tools 15 SP6
+
+
+ go1.22-openssl-1.22.7.1-150000.1.3.1 as a component of openSUSE Leap 15.5
+
+
+ go1.22-openssl-doc-1.22.7.1-150000.1.3.1 as a component of openSUSE Leap 15.5
+
+
+ go1.22-openssl-race-1.22.7.1-150000.1.3.1 as a component of openSUSE Leap 15.5
+
+
+ go1.22-openssl-1.22.7.1-150600.13.3.1 as a component of openSUSE Leap 15.6
+
+
+ go1.22-openssl-doc-1.22.7.1-150600.13.3.1 as a component of openSUSE Leap 15.6
+
+
+ go1.22-openssl-race-1.22.7.1-150600.13.3.1 as a component of openSUSE Leap 15.6
+
@@ -941,6 +995,20 @@
openSUSE Tumbleweed:go1.22-libstd-1.22.1-1.1
openSUSE Tumbleweed:go1.22-race-1.22.1-1.1
+
+ SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.22-openssl-1.22.7.1-150000.1.3.1
+ SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.22-openssl-doc-1.22.7.1-150000.1.3.1
+ SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.22-openssl-race-1.22.7.1-150000.1.3.1
+ SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.22-openssl-1.22.7.1-150600.13.3.1
+ SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.22-openssl-doc-1.22.7.1-150600.13.3.1
+ SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.22-openssl-race-1.22.7.1-150600.13.3.1
+ openSUSE Leap 15.5:go1.22-openssl-1.22.7.1-150000.1.3.1
+ openSUSE Leap 15.5:go1.22-openssl-doc-1.22.7.1-150000.1.3.1
+ openSUSE Leap 15.5:go1.22-openssl-race-1.22.7.1-150000.1.3.1
+ openSUSE Leap 15.6:go1.22-openssl-1.22.7.1-150600.13.3.1
+ openSUSE Leap 15.6:go1.22-openssl-doc-1.22.7.1-150600.13.3.1
+ openSUSE Leap 15.6:go1.22-openssl-race-1.22.7.1-150600.13.3.1
+
no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2024-24783
--- /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2024-24783.xml 2024-10-26 01:16:50.738034000 +0200
+++ /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2024-24783.xml.new 2024-10-29 01:21:47.713788000 +0100
@@ -14,13 +14,13 @@
1
- 23
- 2024-10-25T23:16:50Z
+ 24
+ 2024-10-29T00:21:46Z
current
2024-03-07T00:10:42Z
- 2024-10-25T23:16:50Z
+ 2024-10-29T00:21:46Z
cve-database/bin/generate-cvrf-cve.pl
2020-12-27T01:00:00Z
@@ -337,6 +337,24 @@
go1.22-libstd-1.22.1-1.1
+
+ go1.22-openssl-1.22.7.1-150000.1.3.1
+
+
+ go1.22-openssl-1.22.7.1-150600.13.3.1
+
+
+ go1.22-openssl-doc-1.22.7.1-150000.1.3.1
+
+
+ go1.22-openssl-doc-1.22.7.1-150600.13.3.1
+
+
+ go1.22-openssl-race-1.22.7.1-150000.1.3.1
+
+
+ go1.22-openssl-race-1.22.7.1-150600.13.3.1
+
go1.22-race-1.22.1-1.1
@@ -907,6 +925,42 @@
go1.22-race-1.22.1-1.1 as a component of openSUSE Tumbleweed
+
+ go1.22-openssl-1.22.7.1-150000.1.3.1 as a component of SUSE Linux Enterprise Module for Development Tools 15 SP5
+
+
+ go1.22-openssl-doc-1.22.7.1-150000.1.3.1 as a component of SUSE Linux Enterprise Module for Development Tools 15 SP5
+
+
+ go1.22-openssl-race-1.22.7.1-150000.1.3.1 as a component of SUSE Linux Enterprise Module for Development Tools 15 SP5
+
+
+ go1.22-openssl-1.22.7.1-150600.13.3.1 as a component of SUSE Linux Enterprise Module for Development Tools 15 SP6
+
+
+ go1.22-openssl-doc-1.22.7.1-150600.13.3.1 as a component of SUSE Linux Enterprise Module for Development Tools 15 SP6
+
+
+ go1.22-openssl-race-1.22.7.1-150600.13.3.1 as a component of SUSE Linux Enterprise Module for Development Tools 15 SP6
+
+
+ go1.22-openssl-1.22.7.1-150000.1.3.1 as a component of openSUSE Leap 15.5
+
+
+ go1.22-openssl-doc-1.22.7.1-150000.1.3.1 as a component of openSUSE Leap 15.5
+
+
+ go1.22-openssl-race-1.22.7.1-150000.1.3.1 as a component of openSUSE Leap 15.5
+
+
+ go1.22-openssl-1.22.7.1-150600.13.3.1 as a component of openSUSE Leap 15.6
+
+
+ go1.22-openssl-doc-1.22.7.1-150600.13.3.1 as a component of openSUSE Leap 15.6
+
+
+ go1.22-openssl-race-1.22.7.1-150600.13.3.1 as a component of openSUSE Leap 15.6
+
@@ -1063,6 +1117,20 @@
openSUSE Tumbleweed:go1.22-libstd-1.22.1-1.1
openSUSE Tumbleweed:go1.22-race-1.22.1-1.1
+
+ SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.22-openssl-1.22.7.1-150000.1.3.1
+ SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.22-openssl-doc-1.22.7.1-150000.1.3.1
+ SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.22-openssl-race-1.22.7.1-150000.1.3.1
+ SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.22-openssl-1.22.7.1-150600.13.3.1
+ SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.22-openssl-doc-1.22.7.1-150600.13.3.1
+ SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.22-openssl-race-1.22.7.1-150600.13.3.1
+ openSUSE Leap 15.5:go1.22-openssl-1.22.7.1-150000.1.3.1
+ openSUSE Leap 15.5:go1.22-openssl-doc-1.22.7.1-150000.1.3.1
+ openSUSE Leap 15.5:go1.22-openssl-race-1.22.7.1-150000.1.3.1
+ openSUSE Leap 15.6:go1.22-openssl-1.22.7.1-150600.13.3.1
+ openSUSE Leap 15.6:go1.22-openssl-doc-1.22.7.1-150600.13.3.1
+ openSUSE Leap 15.6:go1.22-openssl-race-1.22.7.1-150600.13.3.1
+
no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2024-24758
skipping CVE-2024-24577 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-24575 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-24549 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-24479 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-24478 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-24476 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-24474 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-24246 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-23984 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-23981 as CVE page is older than CVRF-CVE file.
no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2024-23848
skipping CVE-2024-23851 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-23850 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-23849 as CVE page is older than CVRF-CVE file.
no cpe found for SUSE Package Hub 15 SP5 in CVE-2024-23837
no cpe found for SUSE Package Hub 15 SP6 in CVE-2024-23837
no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2024-23829
skipping CVE-2024-23807 as CVE page is older than CVRF-CVE file.
no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2024-23653
skipping CVE-2024-23672 as CVE page is older than CVRF-CVE file.
no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2024-23652
no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2024-23651
no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2024-23638
notsure where SUSE Linux Enterprise Module for Package Hub 15 SP4 is contained?
no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2024-23334
no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2024-23307
--- /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2024-23307.xml 2024-10-17 01:22:46.279851000 +0200
+++ /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2024-23307.xml.new 2024-10-29 01:22:03.172979000 +0100
@@ -14,13 +14,13 @@
1
- 84
- 2024-10-16T23:22:45Z
+ 85
+ 2024-10-29T00:22:02Z
current
2024-01-26T00:08:56Z
- 2024-10-16T23:22:45Z
+ 2024-10-29T00:22:02Z
cve-database/bin/generate-cvrf-cve.pl
2020-12-27T01:00:00Z
@@ -2294,15 +2294,24 @@
kernel-livepatch-5_14_21-150400_24_103-default-7-150400.2.1
+
+ kernel-livepatch-5_14_21-150400_24_108-default-10-150400.9.8.1
+
kernel-livepatch-5_14_21-150400_24_108-default-9-150400.9.8.1
kernel-livepatch-5_14_21-150400_24_111-default-7-150400.9.6.1
+
+ kernel-livepatch-5_14_21-150400_24_111-default-8-150400.9.6.1
+
kernel-livepatch-5_14_21-150400_24_116-default-7-150400.9.8.1
+
+ kernel-livepatch-5_14_21-150400_24_116-default-8-150400.9.8.1
+
kernel-livepatch-5_14_21-150400_24_119-default-1-150400.9.3.1
@@ -2348,12 +2357,18 @@
kernel-livepatch-5_14_21-150500_13_30-rt-8-150500.2.1
+
+ kernel-livepatch-5_14_21-150500_13_35-rt-10-150500.11.8.1
+
kernel-livepatch-5_14_21-150500_13_35-rt-9-150500.11.8.1
kernel-livepatch-5_14_21-150500_13_38-rt-7-150500.11.6.1
+
+ kernel-livepatch-5_14_21-150500_13_38-rt-8-150500.11.6.1
+
kernel-livepatch-5_14_21-150500_13_47-rt-1-150500.11.3.1
@@ -2387,12 +2402,18 @@
kernel-livepatch-5_14_21-150500_55_44-default-8-150500.2.1
+
+ kernel-livepatch-5_14_21-150500_55_49-default-10-150500.11.8.1
+
kernel-livepatch-5_14_21-150500_55_49-default-9-150500.11.8.1
kernel-livepatch-5_14_21-150500_55_52-default-7-150500.11.6.1
+
+ kernel-livepatch-5_14_21-150500_55_52-default-8-150500.11.6.1
+
kernel-livepatch-5_14_21-150500_55_59-default-1-150500.11.7.1
@@ -2432,9 +2453,15 @@
kernel-livepatch-5_3_18-150200_24_183-default-8-150200.5.6.1
+
+ kernel-livepatch-5_3_18-150200_24_183-default-9-150200.5.6.1
+
kernel-livepatch-5_3_18-150200_24_188-default-7-150200.5.6.1
+
+ kernel-livepatch-5_3_18-150200_24_188-default-8-150200.5.6.1
+
kernel-livepatch-5_3_18-150200_24_191-default-1-150200.5.3.1
@@ -2468,9 +2495,15 @@
kernel-livepatch-5_3_18-150300_59_153-default-8-150300.7.6.1
+
+ kernel-livepatch-5_3_18-150300_59_153-default-9-150300.7.6.1
+
kernel-livepatch-5_3_18-150300_59_158-default-7-150300.7.6.1
+
+ kernel-livepatch-5_3_18-150300_59_158-default-8-150300.7.6.1
+
kernel-livepatch-5_3_18-150300_59_161-default-1-150300.7.3.1
@@ -2735,6 +2768,9 @@
kgraft-patch-4_12_14-122_201-default-8-8.10.1
+
+ kgraft-patch-4_12_14-122_201-default-9-8.10.1
+
kgraft-patch-4_12_14-122_216-default-1-8.3.1
@@ -5381,6 +5417,42 @@
kernel-source-vanilla-6.8.2-1.1 as a component of openSUSE Tumbleweed
+
+ kgraft-patch-4_12_14-122_201-default-9-8.10.1 as a component of SUSE Linux Enterprise Live Patching 12 SP5
+
+
+ kernel-livepatch-5_3_18-150200_24_183-default-9-150200.5.6.1 as a component of SUSE Linux Enterprise Live Patching 15 SP2
+
+
+ kernel-livepatch-5_3_18-150200_24_188-default-8-150200.5.6.1 as a component of SUSE Linux Enterprise Live Patching 15 SP2
+
+
+ kernel-livepatch-5_3_18-150300_59_153-default-9-150300.7.6.1 as a component of SUSE Linux Enterprise Live Patching 15 SP3
+
+
+ kernel-livepatch-5_3_18-150300_59_158-default-8-150300.7.6.1 as a component of SUSE Linux Enterprise Live Patching 15 SP3
+
+
+ kernel-livepatch-5_14_21-150400_24_108-default-10-150400.9.8.1 as a component of SUSE Linux Enterprise Live Patching 15 SP4
+
+
+ kernel-livepatch-5_14_21-150400_24_111-default-8-150400.9.6.1 as a component of SUSE Linux Enterprise Live Patching 15 SP4
+
+
+ kernel-livepatch-5_14_21-150400_24_116-default-8-150400.9.8.1 as a component of SUSE Linux Enterprise Live Patching 15 SP4
+
+
+ kernel-livepatch-5_14_21-150500_13_35-rt-10-150500.11.8.1 as a component of SUSE Linux Enterprise Live Patching 15 SP5
+
+
+ kernel-livepatch-5_14_21-150500_13_38-rt-8-150500.11.6.1 as a component of SUSE Linux Enterprise Live Patching 15 SP5
+
+
+ kernel-livepatch-5_14_21-150500_55_49-default-10-150500.11.8.1 as a component of SUSE Linux Enterprise Live Patching 15 SP5
+
+
+ kernel-livepatch-5_14_21-150500_55_52-default-8-150500.11.6.1 as a component of SUSE Linux Enterprise Live Patching 15 SP5
+
kernel-default as a component of SUSE Linux Enterprise Module for Basesystem 15 SP6
@@ -6465,6 +6537,20 @@
openSUSE Tumbleweed:kernel-source-6.8.2-1.1
openSUSE Tumbleweed:kernel-source-vanilla-6.8.2-1.1
+
+ SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_201-default-9-8.10.1
+ SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_183-default-9-150200.5.6.1
+ SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_188-default-8-150200.5.6.1
+ SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_153-default-9-150300.7.6.1
+ SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_158-default-8-150300.7.6.1
+ SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_108-default-10-150400.9.8.1
+ SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_111-default-8-150400.9.6.1
+ SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_116-default-8-150400.9.8.1
+ SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_35-rt-10-150500.11.8.1
+ SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_38-rt-8-150500.11.6.1
+ SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_49-default-10-150500.11.8.1
+ SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_52-default-8-150500.11.6.1
+
SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default
SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel
no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2024-23284
no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2024-23280
no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2024-23263
skipping CVE-2024-23271 as CVE page is older than CVRF-CVE file.
no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2024-23254
no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2024-23252
no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2024-23184
skipping CVE-2024-23226 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-23222 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-23213 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-23206 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-23196 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-23185 as CVE page is older than CVRF-CVE file.
no cpe found for SUSE Package Hub 15 SP5 in CVE-2024-23170
no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2024-22667
skipping CVE-2024-22705 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-22563 as CVE page is older than CVRF-CVE file.
no cpe found for SUSE Package Hub 15 SP5 in CVE-2024-22373
no cpe found for SUSE Package Hub 15 SP6 in CVE-2024-22373
skipping CVE-2024-22386 as CVE page is older than CVRF-CVE file.
no cpe found for SUSE Package Hub 15 SP5 in CVE-2024-22368
notsure where SUSE Linux Enterprise Module for Transactional Server 15 SP6 is contained?
notsure where SUSE Linux Enterprise Module for Transactional Server 15 SP5 is contained?
notsure where SUSE Linux Enterprise Module for Transactional Server 15 SP4 is contained?
no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2024-22232
no cpe found for SUSE Manager Client Tools for RHEL, Liberty and Clones 9-CLIENT-TOOLS in CVE-2024-22232
no cpe found for SUSE Manager Tools for SLE Micro 5 in CVE-2024-22232
skipping CVE-2024-22365 as CVE page is older than CVRF-CVE file.
no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2024-22231
no cpe found for SUSE Manager Client Tools for RHEL, Liberty and Clones 9-CLIENT-TOOLS in CVE-2024-22231
no cpe found for SUSE Manager Tools for SLE Micro 5 in CVE-2024-22231
no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2024-22201
no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2024-22195
no cpe found for SUSE Package Hub 15 SP5 in CVE-2024-22189
no cpe found for SUSE Package Hub 15 SP6 in CVE-2024-22189
no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2024-22099
skipping CVE-2024-22123 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-22122 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-22121 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-22120 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-22119 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-22116 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-22114 as CVE page is older than CVRF-CVE file.
No V5 entry found for CVE-2024-22036 / /home/securitybot/prod/cve-database/cvelistV5/cves/2024/22xxxx/CVE-2024-22036.json:No such file or directory
No V5 entry found for CVE-2024-22035 / /home/securitybot/prod/cve-database/cvelistV5/cves/2024/22xxxx/CVE-2024-22035.json:No such file or directory
no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2024-22034
no cpe found for SUSE Package Hub 15 SP5 in CVE-2024-22033
no cpe found for SUSE Package Hub 15 SP6 in CVE-2024-22033
no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2024-22025
skipping CVE-2024-22029 as CVE page is older than CVRF-CVE file.
no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2024-22020
no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2024-22019
no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2024-21892
skipping CVE-2024-21886 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-21885 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-21823 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-21810 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-21807 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-21806 as CVE page is older than CVRF-CVE file.
no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2024-21626
skipping CVE-2024-21733 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-21647 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-21646 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-21534 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-21263 as CVE page is older than CVRF-CVE file.
--- /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2024-21235.xml 2024-10-20 01:27:30.202592000 +0200
+++ /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2024-21235.xml.new 2024-10-29 01:22:27.604171000 +0100
@@ -14,13 +14,13 @@
1
- 4
- 2024-10-19T23:27:29Z
+ 5
+ 2024-10-29T00:22:27Z
current
2024-10-16T23:23:14Z
- 2024-10-19T23:27:29Z
+ 2024-10-29T00:22:27Z
cve-database/bin/generate-cvrf-cve.pl
2020-12-27T01:00:00Z
@@ -268,6 +268,11 @@
openSUSE Leap 15.6
+
+
+ openSUSE Tumbleweed
+
+
java-1.8.0-openjdk-1.8.0.432.b06-2.el8
@@ -352,6 +357,9 @@
java-11-openjdk
+
+ java-11-openjdk-11.0.25.0-1.1
+
java-11-openjdk-11.0.25.0.9-2.el8
@@ -364,6 +372,9 @@
java-11-openjdk-demo
+
+ java-11-openjdk-demo-11.0.25.0-1.1
+
java-11-openjdk-demo-11.0.25.0.9-2.el8
@@ -379,6 +390,9 @@
java-11-openjdk-devel
+
+ java-11-openjdk-devel-11.0.25.0-1.1
+
java-11-openjdk-devel-11.0.25.0.9-2.el8
@@ -397,6 +411,9 @@
java-11-openjdk-headless
+
+ java-11-openjdk-headless-11.0.25.0-1.1
+
java-11-openjdk-headless-11.0.25.0.9-2.el8
@@ -412,6 +429,9 @@
java-11-openjdk-javadoc
+
+ java-11-openjdk-javadoc-11.0.25.0-1.1
+
java-11-openjdk-javadoc-11.0.25.0.9-2.el8
@@ -427,6 +447,9 @@
java-11-openjdk-jmods
+
+ java-11-openjdk-jmods-11.0.25.0-1.1
+
java-11-openjdk-jmods-11.0.25.0.9-2.el8
@@ -445,6 +468,9 @@
java-11-openjdk-src
+
+ java-11-openjdk-src-11.0.25.0-1.1
+
java-11-openjdk-src-11.0.25.0.9-2.el8
@@ -1306,6 +1332,27 @@
java-21-openjdk-static-libs-slowdebug-21.0.5.0.10-3.el9 as a component of SUSE Liberty Linux 9
+
+ java-11-openjdk-11.0.25.0-1.1 as a component of openSUSE Tumbleweed
+
+
+ java-11-openjdk-demo-11.0.25.0-1.1 as a component of openSUSE Tumbleweed
+
+
+ java-11-openjdk-devel-11.0.25.0-1.1 as a component of openSUSE Tumbleweed
+
+
+ java-11-openjdk-headless-11.0.25.0-1.1 as a component of openSUSE Tumbleweed
+
+
+ java-11-openjdk-javadoc-11.0.25.0-1.1 as a component of openSUSE Tumbleweed
+
+
+ java-11-openjdk-jmods-11.0.25.0-1.1 as a component of openSUSE Tumbleweed
+
+
+ java-11-openjdk-src-11.0.25.0-1.1 as a component of openSUSE Tumbleweed
+
java-11-openjdk as a component of SUSE Linux Enterprise High Performance Computing 12 SP5
@@ -1957,39 +2004,12 @@
java-11-openjdk as a component of SUSE Linux Enterprise Server for SAP Applications 12 SP5
-
- java-11-openjdk-demo as a component of SUSE Linux Enterprise Server for SAP Applications 12 SP5
-
-
- java-11-openjdk-devel as a component of SUSE Linux Enterprise Server for SAP Applications 12 SP5
-
-
- java-11-openjdk-headless as a component of SUSE Linux Enterprise Server for SAP Applications 12 SP5
-
java-1_8_0-ibm as a component of SUSE Linux Enterprise Server for SAP Applications 12 SP5
-
- java-1_8_0-ibm-alsa as a component of SUSE Linux Enterprise Server for SAP Applications 12 SP5
-
-
- java-1_8_0-ibm-devel as a component of SUSE Linux Enterprise Server for SAP Applications 12 SP5
-
-
- java-1_8_0-ibm-plugin as a component of SUSE Linux Enterprise Server for SAP Applications 12 SP5
-
java-1_8_0-openjdk as a component of SUSE Linux Enterprise Server for SAP Applications 12 SP5
-
- java-1_8_0-openjdk-demo as a component of SUSE Linux Enterprise Server for SAP Applications 12 SP5
-
-
- java-1_8_0-openjdk-devel as a component of SUSE Linux Enterprise Server for SAP Applications 12 SP5
-
-
- java-1_8_0-openjdk-headless as a component of SUSE Linux Enterprise Server for SAP Applications 12 SP5
-
java-11-openjdk as a component of SUSE Linux Enterprise Server for SAP Applications 15 SP2
@@ -2623,6 +2643,13 @@
SUSE Liberty Linux 9:java-21-openjdk-static-libs-21.0.5.0.10-3.el9
SUSE Liberty Linux 9:java-21-openjdk-static-libs-fastdebug-21.0.5.0.10-3.el9
SUSE Liberty Linux 9:java-21-openjdk-static-libs-slowdebug-21.0.5.0.10-3.el9
+ openSUSE Tumbleweed:java-11-openjdk-11.0.25.0-1.1
+ openSUSE Tumbleweed:java-11-openjdk-demo-11.0.25.0-1.1
+ openSUSE Tumbleweed:java-11-openjdk-devel-11.0.25.0-1.1
+ openSUSE Tumbleweed:java-11-openjdk-headless-11.0.25.0-1.1
+ openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.25.0-1.1
+ openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.25.0-1.1
+ openSUSE Tumbleweed:java-11-openjdk-src-11.0.25.0-1.1
--- /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2024-21217.xml 2024-10-20 01:27:30.876173000 +0200
+++ /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2024-21217.xml.new 2024-10-29 01:22:28.474159000 +0100
@@ -14,13 +14,13 @@
1
- 4
- 2024-10-19T23:27:30Z
+ 5
+ 2024-10-29T00:22:27Z
current
2024-10-16T23:23:14Z
- 2024-10-19T23:27:30Z
+ 2024-10-29T00:22:27Z
cve-database/bin/generate-cvrf-cve.pl
2020-12-27T01:00:00Z
@@ -268,6 +268,11 @@
openSUSE Leap 15.6
+
+
+ openSUSE Tumbleweed
+
+
java-1.8.0-openjdk-1.8.0.432.b06-2.el8
@@ -352,6 +357,9 @@
java-11-openjdk
+
+ java-11-openjdk-11.0.25.0-1.1
+
java-11-openjdk-11.0.25.0.9-2.el8
@@ -364,6 +372,9 @@
java-11-openjdk-demo
+
+ java-11-openjdk-demo-11.0.25.0-1.1
+
java-11-openjdk-demo-11.0.25.0.9-2.el8
@@ -379,6 +390,9 @@
java-11-openjdk-devel
+
+ java-11-openjdk-devel-11.0.25.0-1.1
+
java-11-openjdk-devel-11.0.25.0.9-2.el8
@@ -397,6 +411,9 @@
java-11-openjdk-headless
+
+ java-11-openjdk-headless-11.0.25.0-1.1
+
java-11-openjdk-headless-11.0.25.0.9-2.el8
@@ -412,6 +429,9 @@
java-11-openjdk-javadoc
+
+ java-11-openjdk-javadoc-11.0.25.0-1.1
+
java-11-openjdk-javadoc-11.0.25.0.9-2.el8
@@ -427,6 +447,9 @@
java-11-openjdk-jmods
+
+ java-11-openjdk-jmods-11.0.25.0-1.1
+
java-11-openjdk-jmods-11.0.25.0.9-2.el8
@@ -445,6 +468,9 @@
java-11-openjdk-src
+
+ java-11-openjdk-src-11.0.25.0-1.1
+
java-11-openjdk-src-11.0.25.0.9-2.el8
@@ -1306,6 +1332,27 @@
java-21-openjdk-static-libs-slowdebug-21.0.5.0.10-3.el9 as a component of SUSE Liberty Linux 9
+
+ java-11-openjdk-11.0.25.0-1.1 as a component of openSUSE Tumbleweed
+
+
+ java-11-openjdk-demo-11.0.25.0-1.1 as a component of openSUSE Tumbleweed
+
+
+ java-11-openjdk-devel-11.0.25.0-1.1 as a component of openSUSE Tumbleweed
+
+
+ java-11-openjdk-headless-11.0.25.0-1.1 as a component of openSUSE Tumbleweed
+
+
+ java-11-openjdk-javadoc-11.0.25.0-1.1 as a component of openSUSE Tumbleweed
+
+
+ java-11-openjdk-jmods-11.0.25.0-1.1 as a component of openSUSE Tumbleweed
+
+
+ java-11-openjdk-src-11.0.25.0-1.1 as a component of openSUSE Tumbleweed
+
java-11-openjdk as a component of SUSE Linux Enterprise High Performance Computing 12 SP5
@@ -1957,39 +2004,12 @@
java-11-openjdk as a component of SUSE Linux Enterprise Server for SAP Applications 12 SP5
-
- java-11-openjdk-demo as a component of SUSE Linux Enterprise Server for SAP Applications 12 SP5
-
-
- java-11-openjdk-devel as a component of SUSE Linux Enterprise Server for SAP Applications 12 SP5
-
-
- java-11-openjdk-headless as a component of SUSE Linux Enterprise Server for SAP Applications 12 SP5
-
java-1_8_0-ibm as a component of SUSE Linux Enterprise Server for SAP Applications 12 SP5
-
- java-1_8_0-ibm-alsa as a component of SUSE Linux Enterprise Server for SAP Applications 12 SP5
-
-
- java-1_8_0-ibm-devel as a component of SUSE Linux Enterprise Server for SAP Applications 12 SP5
-
-
- java-1_8_0-ibm-plugin as a component of SUSE Linux Enterprise Server for SAP Applications 12 SP5
-
java-1_8_0-openjdk as a component of SUSE Linux Enterprise Server for SAP Applications 12 SP5
-
- java-1_8_0-openjdk-demo as a component of SUSE Linux Enterprise Server for SAP Applications 12 SP5
-
-
- java-1_8_0-openjdk-devel as a component of SUSE Linux Enterprise Server for SAP Applications 12 SP5
-
-
- java-1_8_0-openjdk-headless as a component of SUSE Linux Enterprise Server for SAP Applications 12 SP5
-
java-11-openjdk as a component of SUSE Linux Enterprise Server for SAP Applications 15 SP2
@@ -2623,6 +2643,13 @@
SUSE Liberty Linux 9:java-21-openjdk-static-libs-21.0.5.0.10-3.el9
SUSE Liberty Linux 9:java-21-openjdk-static-libs-fastdebug-21.0.5.0.10-3.el9
SUSE Liberty Linux 9:java-21-openjdk-static-libs-slowdebug-21.0.5.0.10-3.el9
+ openSUSE Tumbleweed:java-11-openjdk-11.0.25.0-1.1
+ openSUSE Tumbleweed:java-11-openjdk-demo-11.0.25.0-1.1
+ openSUSE Tumbleweed:java-11-openjdk-devel-11.0.25.0-1.1
+ openSUSE Tumbleweed:java-11-openjdk-headless-11.0.25.0-1.1
+ openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.25.0-1.1
+ openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.25.0-1.1
+ openSUSE Tumbleweed:java-11-openjdk-src-11.0.25.0-1.1
--- /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2024-21210.xml 2024-10-20 01:27:32.180966000 +0200
+++ /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2024-21210.xml.new 2024-10-29 01:22:29.506076000 +0100
@@ -14,13 +14,13 @@
1
- 4
- 2024-10-19T23:27:31Z
+ 5
+ 2024-10-29T00:22:29Z
current
2024-10-16T23:23:14Z
- 2024-10-19T23:27:31Z
+ 2024-10-29T00:22:29Z
cve-database/bin/generate-cvrf-cve.pl
2020-12-27T01:00:00Z
@@ -268,6 +268,11 @@
openSUSE Leap 15.6
+
+
+ openSUSE Tumbleweed
+
+
java-1.8.0-openjdk-1.8.0.432.b06-2.el8
@@ -376,6 +381,9 @@
java-11-openjdk
+
+ java-11-openjdk-11.0.25.0-1.1
+
java-11-openjdk-11.0.25.0.9-2.el8
@@ -388,6 +396,9 @@
java-11-openjdk-demo
+
+ java-11-openjdk-demo-11.0.25.0-1.1
+
java-11-openjdk-demo-11.0.25.0.9-2.el8
@@ -403,6 +414,9 @@
java-11-openjdk-devel
+
+ java-11-openjdk-devel-11.0.25.0-1.1
+
java-11-openjdk-devel-11.0.25.0.9-2.el8
@@ -421,6 +435,9 @@
java-11-openjdk-headless
+
+ java-11-openjdk-headless-11.0.25.0-1.1
+
java-11-openjdk-headless-11.0.25.0.9-2.el8
@@ -436,6 +453,9 @@
java-11-openjdk-javadoc
+
+ java-11-openjdk-javadoc-11.0.25.0-1.1
+
java-11-openjdk-javadoc-11.0.25.0.9-2.el8
@@ -451,6 +471,9 @@
java-11-openjdk-jmods
+
+ java-11-openjdk-jmods-11.0.25.0-1.1
+
java-11-openjdk-jmods-11.0.25.0.9-2.el8
@@ -469,6 +492,9 @@
java-11-openjdk-src
+
+ java-11-openjdk-src-11.0.25.0-1.1
+
java-11-openjdk-src-11.0.25.0.9-2.el8
@@ -1366,6 +1392,27 @@
java-21-openjdk-static-libs-slowdebug-21.0.5.0.10-3.el9 as a component of SUSE Liberty Linux 9
+
+ java-11-openjdk-11.0.25.0-1.1 as a component of openSUSE Tumbleweed
+
+
+ java-11-openjdk-demo-11.0.25.0-1.1 as a component of openSUSE Tumbleweed
+
+
+ java-11-openjdk-devel-11.0.25.0-1.1 as a component of openSUSE Tumbleweed
+
+
+ java-11-openjdk-headless-11.0.25.0-1.1 as a component of openSUSE Tumbleweed
+
+
+ java-11-openjdk-javadoc-11.0.25.0-1.1 as a component of openSUSE Tumbleweed
+
+
+ java-11-openjdk-jmods-11.0.25.0-1.1 as a component of openSUSE Tumbleweed
+
+
+ java-11-openjdk-src-11.0.25.0-1.1 as a component of openSUSE Tumbleweed
+
java-11-openjdk as a component of SUSE Linux Enterprise High Performance Computing 12 SP5
@@ -2140,51 +2187,15 @@
java-11-openjdk as a component of SUSE Linux Enterprise Server for SAP Applications 12 SP5
-
- java-11-openjdk-demo as a component of SUSE Linux Enterprise Server for SAP Applications 12 SP5
-
-
- java-11-openjdk-devel as a component of SUSE Linux Enterprise Server for SAP Applications 12 SP5
-
-
- java-11-openjdk-headless as a component of SUSE Linux Enterprise Server for SAP Applications 12 SP5
-
java-1_7_0-openjdk as a component of SUSE Linux Enterprise Server for SAP Applications 12 SP5
-
- java-1_7_0-openjdk-demo as a component of SUSE Linux Enterprise Server for SAP Applications 12 SP5
-
-
- java-1_7_0-openjdk-devel as a component of SUSE Linux Enterprise Server for SAP Applications 12 SP5
-
-
- java-1_7_0-openjdk-headless as a component of SUSE Linux Enterprise Server for SAP Applications 12 SP5
-
java-1_8_0-ibm as a component of SUSE Linux Enterprise Server for SAP Applications 12 SP5
-
- java-1_8_0-ibm-alsa as a component of SUSE Linux Enterprise Server for SAP Applications 12 SP5
-
-
- java-1_8_0-ibm-devel as a component of SUSE Linux Enterprise Server for SAP Applications 12 SP5
-
-
- java-1_8_0-ibm-plugin as a component of SUSE Linux Enterprise Server for SAP Applications 12 SP5
-
java-1_8_0-openjdk as a component of SUSE Linux Enterprise Server for SAP Applications 12 SP5
-
- java-1_8_0-openjdk-demo as a component of SUSE Linux Enterprise Server for SAP Applications 12 SP5
-
-
- java-1_8_0-openjdk-devel as a component of SUSE Linux Enterprise Server for SAP Applications 12 SP5
-
-
- java-1_8_0-openjdk-headless as a component of SUSE Linux Enterprise Server for SAP Applications 12 SP5
-
java-11-openjdk as a component of SUSE Linux Enterprise Server for SAP Applications 15 SP2
@@ -2914,6 +2925,13 @@
SUSE Liberty Linux 9:java-21-openjdk-static-libs-21.0.5.0.10-3.el9
SUSE Liberty Linux 9:java-21-openjdk-static-libs-fastdebug-21.0.5.0.10-3.el9
SUSE Liberty Linux 9:java-21-openjdk-static-libs-slowdebug-21.0.5.0.10-3.el9
+ openSUSE Tumbleweed:java-11-openjdk-11.0.25.0-1.1
+ openSUSE Tumbleweed:java-11-openjdk-demo-11.0.25.0-1.1
+ openSUSE Tumbleweed:java-11-openjdk-devel-11.0.25.0-1.1
+ openSUSE Tumbleweed:java-11-openjdk-headless-11.0.25.0-1.1
+ openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.25.0-1.1
+ openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.25.0-1.1
+ openSUSE Tumbleweed:java-11-openjdk-src-11.0.25.0-1.1
SUSE Linux Enterprise High Performance Computing 12 SP5:java-1_7_0-openjdk
@@ -2958,9 +2976,6 @@
SUSE Linux Enterprise Server Teradata 12 SP3-LTSS:java-1_7_0-openjdk
SUSE Linux Enterprise Server Teradata 12 SP3:java-1_7_0-openjdk
SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_0-openjdk
- SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_0-openjdk-demo
- SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_0-openjdk-devel
- SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_0-openjdk-headless
openSUSE Leap 15.5:java-10-openjdk
openSUSE Leap 15.5:java-10-openjdk-accessibility
openSUSE Leap 15.5:java-10-openjdk-demo
--- /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2024-21208.xml 2024-10-20 01:27:32.992946000 +0200
+++ /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2024-21208.xml.new 2024-10-29 01:22:30.459044000 +0100
@@ -14,13 +14,13 @@
1
- 4
- 2024-10-19T23:27:32Z
+ 5
+ 2024-10-29T00:22:29Z
current
2024-10-16T23:23:15Z
- 2024-10-19T23:27:32Z
+ 2024-10-29T00:22:29Z
cve-database/bin/generate-cvrf-cve.pl
2020-12-27T01:00:00Z
@@ -268,6 +268,11 @@
openSUSE Leap 15.6
+
+
+ openSUSE Tumbleweed
+
+
java-1.8.0-openjdk-1.8.0.432.b06-2.el8
@@ -376,6 +381,9 @@
java-11-openjdk
+
+ java-11-openjdk-11.0.25.0-1.1
+
java-11-openjdk-11.0.25.0.9-2.el8
@@ -388,6 +396,9 @@
java-11-openjdk-demo
+
+ java-11-openjdk-demo-11.0.25.0-1.1
+
java-11-openjdk-demo-11.0.25.0.9-2.el8
@@ -403,6 +414,9 @@
java-11-openjdk-devel
+
+ java-11-openjdk-devel-11.0.25.0-1.1
+
java-11-openjdk-devel-11.0.25.0.9-2.el8
@@ -421,6 +435,9 @@
java-11-openjdk-headless
+
+ java-11-openjdk-headless-11.0.25.0-1.1
+
java-11-openjdk-headless-11.0.25.0.9-2.el8
@@ -436,6 +453,9 @@
java-11-openjdk-javadoc
+
+ java-11-openjdk-javadoc-11.0.25.0-1.1
+
java-11-openjdk-javadoc-11.0.25.0.9-2.el8
@@ -451,6 +471,9 @@
java-11-openjdk-jmods
+
+ java-11-openjdk-jmods-11.0.25.0-1.1
+
java-11-openjdk-jmods-11.0.25.0.9-2.el8
@@ -469,6 +492,9 @@
java-11-openjdk-src
+
+ java-11-openjdk-src-11.0.25.0-1.1
+
java-11-openjdk-src-11.0.25.0.9-2.el8
@@ -1366,6 +1392,27 @@
java-21-openjdk-static-libs-slowdebug-21.0.5.0.10-3.el9 as a component of SUSE Liberty Linux 9
+
+ java-11-openjdk-11.0.25.0-1.1 as a component of openSUSE Tumbleweed
+
+
+ java-11-openjdk-demo-11.0.25.0-1.1 as a component of openSUSE Tumbleweed
+
+
+ java-11-openjdk-devel-11.0.25.0-1.1 as a component of openSUSE Tumbleweed
+
+
+ java-11-openjdk-headless-11.0.25.0-1.1 as a component of openSUSE Tumbleweed
+
+
+ java-11-openjdk-javadoc-11.0.25.0-1.1 as a component of openSUSE Tumbleweed
+
+
+ java-11-openjdk-jmods-11.0.25.0-1.1 as a component of openSUSE Tumbleweed
+
+
+ java-11-openjdk-src-11.0.25.0-1.1 as a component of openSUSE Tumbleweed
+
java-11-openjdk as a component of SUSE Linux Enterprise High Performance Computing 12 SP5
@@ -2140,51 +2187,15 @@
java-11-openjdk as a component of SUSE Linux Enterprise Server for SAP Applications 12 SP5
-
- java-11-openjdk-demo as a component of SUSE Linux Enterprise Server for SAP Applications 12 SP5
-
-
- java-11-openjdk-devel as a component of SUSE Linux Enterprise Server for SAP Applications 12 SP5
-
-
- java-11-openjdk-headless as a component of SUSE Linux Enterprise Server for SAP Applications 12 SP5
-
java-1_7_0-openjdk as a component of SUSE Linux Enterprise Server for SAP Applications 12 SP5
-
- java-1_7_0-openjdk-demo as a component of SUSE Linux Enterprise Server for SAP Applications 12 SP5
-
-
- java-1_7_0-openjdk-devel as a component of SUSE Linux Enterprise Server for SAP Applications 12 SP5
-
-
- java-1_7_0-openjdk-headless as a component of SUSE Linux Enterprise Server for SAP Applications 12 SP5
-
java-1_8_0-ibm as a component of SUSE Linux Enterprise Server for SAP Applications 12 SP5
-
- java-1_8_0-ibm-alsa as a component of SUSE Linux Enterprise Server for SAP Applications 12 SP5
-
-
- java-1_8_0-ibm-devel as a component of SUSE Linux Enterprise Server for SAP Applications 12 SP5
-
-
- java-1_8_0-ibm-plugin as a component of SUSE Linux Enterprise Server for SAP Applications 12 SP5
-
java-1_8_0-openjdk as a component of SUSE Linux Enterprise Server for SAP Applications 12 SP5
-
- java-1_8_0-openjdk-demo as a component of SUSE Linux Enterprise Server for SAP Applications 12 SP5
-
-
- java-1_8_0-openjdk-devel as a component of SUSE Linux Enterprise Server for SAP Applications 12 SP5
-
-
- java-1_8_0-openjdk-headless as a component of SUSE Linux Enterprise Server for SAP Applications 12 SP5
-
java-11-openjdk as a component of SUSE Linux Enterprise Server for SAP Applications 15 SP2
@@ -2914,6 +2925,13 @@
SUSE Liberty Linux 9:java-21-openjdk-static-libs-21.0.5.0.10-3.el9
SUSE Liberty Linux 9:java-21-openjdk-static-libs-fastdebug-21.0.5.0.10-3.el9
SUSE Liberty Linux 9:java-21-openjdk-static-libs-slowdebug-21.0.5.0.10-3.el9
+ openSUSE Tumbleweed:java-11-openjdk-11.0.25.0-1.1
+ openSUSE Tumbleweed:java-11-openjdk-demo-11.0.25.0-1.1
+ openSUSE Tumbleweed:java-11-openjdk-devel-11.0.25.0-1.1
+ openSUSE Tumbleweed:java-11-openjdk-headless-11.0.25.0-1.1
+ openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.25.0-1.1
+ openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.25.0-1.1
+ openSUSE Tumbleweed:java-11-openjdk-src-11.0.25.0-1.1
SUSE Linux Enterprise High Performance Computing 12 SP5:java-1_7_0-openjdk
@@ -2958,9 +2976,6 @@
SUSE Linux Enterprise Server Teradata 12 SP3-LTSS:java-1_7_0-openjdk
SUSE Linux Enterprise Server Teradata 12 SP3:java-1_7_0-openjdk
SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_0-openjdk
- SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_0-openjdk-demo
- SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_0-openjdk-devel
- SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_0-openjdk-headless
openSUSE Leap 15.5:java-10-openjdk
openSUSE Leap 15.5:java-10-openjdk-accessibility
openSUSE Leap 15.5:java-10-openjdk-demo
skipping CVE-2024-21147 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-21145 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-21144 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-21140 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-21138 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-21131 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-21096 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-21094 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-21085 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-21068 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-21012 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-21011 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-21005 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-21004 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-21003 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-21002 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-20955 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-20952 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-20945 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-20932 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-20926 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-20925 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-20923 as CVE page is older than CVRF-CVE file.
no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2024-20506
skipping CVE-2024-20921 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-20919 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-20918 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-20903 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-20697 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-20696 as CVE page is older than CVRF-CVE file.
no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2024-20505
no cpe found for SUSE Package Hub 15 SP5 in CVE-2024-10231
no cpe found for SUSE Package Hub 15 SP6 in CVE-2024-10231
--- /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2024-10231.xml 2024-10-26 01:17:33.080323000 +0200
+++ /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2024-10231.xml.new 2024-10-29 01:22:41.373966000 +0100
@@ -14,13 +14,13 @@
1
- 2
- 2024-10-25T23:17:32Z
+ 3
+ 2024-10-29T00:22:41Z
current
2024-10-23T23:17:00Z
- 2024-10-25T23:17:32Z
+ 2024-10-29T00:22:41Z
cve-database/bin/generate-cvrf-cve.pl
2020-12-27T01:00:00Z
@@ -33,17 +33,89 @@
+ https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/5PEJPFZ7F3SICZGHQRWBWYOGKITIYN67/
+ E-Mail link for openSUSE-SU-2024:0341-1
+
+
https://www.suse.com/support/security/rating/
SUSE Security Ratings
-
+
+
+
+ SUSE Package Hub 15 SP5
+
+
+
+
+ SUSE Package Hub 15 SP6
+
+
+
+
+ openSUSE Leap 15.5
+
+
+
+
+ openSUSE Leap 15.6
+
+
+
+ chromedriver-130.0.6723.69-bp155.2.132.1
+
+
+ chromedriver-130.0.6723.69-bp156.2.44.1
+
+
+ chromium-130.0.6723.69-bp155.2.132.1
+
+
+ chromium-130.0.6723.69-bp156.2.44.1
+
+
+ chromedriver-130.0.6723.69-bp155.2.132.1 as a component of SUSE Package Hub 15 SP5
+
+
+ chromium-130.0.6723.69-bp155.2.132.1 as a component of SUSE Package Hub 15 SP5
+
+
+ chromedriver-130.0.6723.69-bp156.2.44.1 as a component of SUSE Package Hub 15 SP6
+
+
+ chromium-130.0.6723.69-bp156.2.44.1 as a component of SUSE Package Hub 15 SP6
+
+
+ chromedriver-130.0.6723.69-bp155.2.132.1 as a component of openSUSE Leap 15.5
+
+
+ chromium-130.0.6723.69-bp155.2.132.1 as a component of openSUSE Leap 15.5
+
+
+ chromedriver-130.0.6723.69-bp156.2.44.1 as a component of openSUSE Leap 15.6
+
+
+ chromium-130.0.6723.69-bp156.2.44.1 as a component of openSUSE Leap 15.6
+
+
Type Confusion in V8 in Google Chrome prior to 130.0.6723.69 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)
CVE-2024-10231
-
+
+
+ SUSE Package Hub 15 SP5:chromedriver-130.0.6723.69-bp155.2.132.1
+ SUSE Package Hub 15 SP5:chromium-130.0.6723.69-bp155.2.132.1
+ SUSE Package Hub 15 SP6:chromedriver-130.0.6723.69-bp156.2.44.1
+ SUSE Package Hub 15 SP6:chromium-130.0.6723.69-bp156.2.44.1
+ openSUSE Leap 15.5:chromedriver-130.0.6723.69-bp155.2.132.1
+ openSUSE Leap 15.5:chromium-130.0.6723.69-bp155.2.132.1
+ openSUSE Leap 15.6:chromedriver-130.0.6723.69-bp156.2.44.1
+ openSUSE Leap 15.6:chromium-130.0.6723.69-bp156.2.44.1
+
+
important
no cpe found for SUSE Package Hub 15 SP5 in CVE-2024-10230
no cpe found for SUSE Package Hub 15 SP6 in CVE-2024-10230
--- /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2024-10230.xml 2024-10-26 01:17:33.679262000 +0200
+++ /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2024-10230.xml.new 2024-10-29 01:22:41.970928000 +0100
@@ -14,13 +14,13 @@
1
- 3
- 2024-10-25T23:17:33Z
+ 4
+ 2024-10-29T00:22:41Z
current
2024-10-23T23:17:00Z
- 2024-10-25T23:17:33Z
+ 2024-10-29T00:22:41Z
cve-database/bin/generate-cvrf-cve.pl
2020-12-27T01:00:00Z
@@ -33,17 +33,89 @@
+ https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/5PEJPFZ7F3SICZGHQRWBWYOGKITIYN67/
+ E-Mail link for openSUSE-SU-2024:0341-1
+
+
https://www.suse.com/support/security/rating/
SUSE Security Ratings
-
+
+
+
+ SUSE Package Hub 15 SP5
+
+
+
+
+ SUSE Package Hub 15 SP6
+
+
+
+
+ openSUSE Leap 15.5
+
+
+
+
+ openSUSE Leap 15.6
+
+
+
+ chromedriver-130.0.6723.69-bp155.2.132.1
+
+
+ chromedriver-130.0.6723.69-bp156.2.44.1
+
+
+ chromium-130.0.6723.69-bp155.2.132.1
+
+
+ chromium-130.0.6723.69-bp156.2.44.1
+
+
+ chromedriver-130.0.6723.69-bp155.2.132.1 as a component of SUSE Package Hub 15 SP5
+
+
+ chromium-130.0.6723.69-bp155.2.132.1 as a component of SUSE Package Hub 15 SP5
+
+
+ chromedriver-130.0.6723.69-bp156.2.44.1 as a component of SUSE Package Hub 15 SP6
+
+
+ chromium-130.0.6723.69-bp156.2.44.1 as a component of SUSE Package Hub 15 SP6
+
+
+ chromedriver-130.0.6723.69-bp155.2.132.1 as a component of openSUSE Leap 15.5
+
+
+ chromium-130.0.6723.69-bp155.2.132.1 as a component of openSUSE Leap 15.5
+
+
+ chromedriver-130.0.6723.69-bp156.2.44.1 as a component of openSUSE Leap 15.6
+
+
+ chromium-130.0.6723.69-bp156.2.44.1 as a component of openSUSE Leap 15.6
+
+
Type Confusion in V8 in Google Chrome prior to 130.0.6723.69 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)
CVE-2024-10230
-
+
+
+ SUSE Package Hub 15 SP5:chromedriver-130.0.6723.69-bp155.2.132.1
+ SUSE Package Hub 15 SP5:chromium-130.0.6723.69-bp155.2.132.1
+ SUSE Package Hub 15 SP6:chromedriver-130.0.6723.69-bp156.2.44.1
+ SUSE Package Hub 15 SP6:chromium-130.0.6723.69-bp156.2.44.1
+ openSUSE Leap 15.5:chromedriver-130.0.6723.69-bp155.2.132.1
+ openSUSE Leap 15.5:chromium-130.0.6723.69-bp155.2.132.1
+ openSUSE Leap 15.6:chromedriver-130.0.6723.69-bp156.2.44.1
+ openSUSE Leap 15.6:chromium-130.0.6723.69-bp156.2.44.1
+
+
important
no cpe found for SUSE Package Hub 15 SP5 in CVE-2024-10229
no cpe found for SUSE Package Hub 15 SP6 in CVE-2024-10229
--- /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2024-10229.xml 2024-10-26 01:17:34.241260000 +0200
+++ /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2024-10229.xml.new 2024-10-29 01:22:42.689886000 +0100
@@ -14,13 +14,13 @@
1
- 2
- 2024-10-25T23:17:33Z
+ 3
+ 2024-10-29T00:22:42Z
current
2024-10-23T23:17:00Z
- 2024-10-25T23:17:33Z
+ 2024-10-29T00:22:42Z
cve-database/bin/generate-cvrf-cve.pl
2020-12-27T01:00:00Z
@@ -33,17 +33,89 @@
+ https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/5PEJPFZ7F3SICZGHQRWBWYOGKITIYN67/
+ E-Mail link for openSUSE-SU-2024:0341-1
+
+
https://www.suse.com/support/security/rating/
SUSE Security Ratings
-
+
+
+
+ SUSE Package Hub 15 SP5
+
+
+
+
+ SUSE Package Hub 15 SP6
+
+
+
+
+ openSUSE Leap 15.5
+
+
+
+
+ openSUSE Leap 15.6
+
+
+
+ chromedriver-130.0.6723.69-bp155.2.132.1
+
+
+ chromedriver-130.0.6723.69-bp156.2.44.1
+
+
+ chromium-130.0.6723.69-bp155.2.132.1
+
+
+ chromium-130.0.6723.69-bp156.2.44.1
+
+
+ chromedriver-130.0.6723.69-bp155.2.132.1 as a component of SUSE Package Hub 15 SP5
+
+
+ chromium-130.0.6723.69-bp155.2.132.1 as a component of SUSE Package Hub 15 SP5
+
+
+ chromedriver-130.0.6723.69-bp156.2.44.1 as a component of SUSE Package Hub 15 SP6
+
+
+ chromium-130.0.6723.69-bp156.2.44.1 as a component of SUSE Package Hub 15 SP6
+
+
+ chromedriver-130.0.6723.69-bp155.2.132.1 as a component of openSUSE Leap 15.5
+
+
+ chromium-130.0.6723.69-bp155.2.132.1 as a component of openSUSE Leap 15.5
+
+
+ chromedriver-130.0.6723.69-bp156.2.44.1 as a component of openSUSE Leap 15.6
+
+
+ chromium-130.0.6723.69-bp156.2.44.1 as a component of openSUSE Leap 15.6
+
+
Inappropriate implementation in Extensions in Google Chrome prior to 130.0.6723.69 allowed a remote attacker to bypass site isolation via a crafted Chrome Extension. (Chromium security severity: High)
CVE-2024-10229
-
+
+
+ SUSE Package Hub 15 SP5:chromedriver-130.0.6723.69-bp155.2.132.1
+ SUSE Package Hub 15 SP5:chromium-130.0.6723.69-bp155.2.132.1
+ SUSE Package Hub 15 SP6:chromedriver-130.0.6723.69-bp156.2.44.1
+ SUSE Package Hub 15 SP6:chromium-130.0.6723.69-bp156.2.44.1
+ openSUSE Leap 15.5:chromedriver-130.0.6723.69-bp155.2.132.1
+ openSUSE Leap 15.5:chromium-130.0.6723.69-bp155.2.132.1
+ openSUSE Leap 15.6:chromedriver-130.0.6723.69-bp156.2.44.1
+ openSUSE Leap 15.6:chromium-130.0.6723.69-bp156.2.44.1
+
+
important
no cpe found for SUSE Package Hub 15 SP5 in CVE-2024-9966
no cpe found for SUSE Package Hub 15 SP6 in CVE-2024-9966
skipping CVE-2024-10041 as CVE page is older than CVRF-CVE file.
no cpe found for SUSE Package Hub 15 SP5 in CVE-2024-9954
no cpe found for SUSE Package Hub 15 SP6 in CVE-2024-9954
skipping CVE-2024-9965 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-9964 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-9963 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-9962 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-9961 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-9960 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-9959 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-9958 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-9957 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-9956 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-9955 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-9936 as CVE page is older than CVRF-CVE file.
no cpe found for SUSE Package Hub 15 SP5 in CVE-2024-9603
no cpe found for SUSE Package Hub 15 SP6 in CVE-2024-9603
skipping CVE-2024-9781 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-9780 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-9680 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-9676 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-9675 as CVE page is older than CVRF-CVE file.
no cpe found for SUSE Package Hub 15 SP5 in CVE-2024-9602
no cpe found for SUSE Package Hub 15 SP6 in CVE-2024-9602
No V5 entry found for CVE-2024-9370 / /home/securitybot/prod/cve-database/cvelistV5/cves/2024/9xxxx/CVE-2024-9370.json:No such file or directory
no cpe found for SUSE Package Hub 15 SP5 in CVE-2024-9370
no cpe found for SUSE Package Hub 15 SP6 in CVE-2024-9370
skipping CVE-2024-9407 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-9403 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-9402 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-9401 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-9400 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-9399 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-9398 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-9397 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-9396 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-9395 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-9394 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-9393 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-9392 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-9391 as CVE page is older than CVRF-CVE file.
No V5 entry found for CVE-2024-9369 / /home/securitybot/prod/cve-database/cvelistV5/cves/2024/9xxxx/CVE-2024-9369.json:No such file or directory
no cpe found for SUSE Package Hub 15 SP5 in CVE-2024-9369
no cpe found for SUSE Package Hub 15 SP6 in CVE-2024-9369
no cpe found for SUSE Linux Enterprise Server 12 SP5 LTSS Extended Security in CVE-2024-9287
no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2024-9287
skipping CVE-2024-9355 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-9341 as CVE page is older than CVRF-CVE file.
--- /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2024-9287.xml 2024-10-28 01:19:14.078959000 +0100
+++ /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2024-9287.xml.new 2024-10-29 01:22:45.590809000 +0100
@@ -14,13 +14,13 @@
1
- 4
- 2024-10-28T00:19:13Z
+ 5
+ 2024-10-29T00:22:45Z
current
2024-10-24T23:18:11Z
- 2024-10-28T00:19:13Z
+ 2024-10-29T00:22:45Z
cve-database/bin/generate-cvrf-cve.pl
2020-12-27T01:00:00Z
@@ -33,6 +33,10 @@
+ https://lists.suse.com/pipermail/sle-security-updates/2024-October/019680.html
+ E-Mail link for SUSE-SU-2024:3760-1
+
+
https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/NJFBQRJPO2RKRNCFXRZ7LBNZOD2J2TFB/
E-Mail link for openSUSE-SU-2024:14427-1
@@ -41,6 +45,10 @@
E-Mail link for openSUSE-SU-2024:14428-1
+ https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/SYTPGEX77JK2ZE34EQ72QVIKUVEAF7IU/
+ E-Mail link for openSUSE-SU-2024:14430-1
+
+
https://www.suse.com/support/security/rating/
SUSE Security Ratings
@@ -682,6 +690,15 @@
python39-tk-3.9.20-4.1
+
+ libpython3_6m1_0-3.6.15-150000.3.164.1 as a component of SUSE Linux Enterprise Micro 5.1
+
+
+ python3-3.6.15-150000.3.164.1 as a component of SUSE Linux Enterprise Micro 5.1
+
+
+ python3-base-3.6.15-150000.3.164.1 as a component of SUSE Linux Enterprise Micro 5.1
+
libpython3_6m1_0-3.6.15-6.118.1 as a component of SUSE Linux Enterprise Server 12 SP3-TERADATA
@@ -772,15 +789,6 @@
python39-tk-3.9.20-4.1 as a component of openSUSE Tumbleweed
-
- libpython3_6m1_0-3.6.15-150000.3.164.1 as a component of SUSE Linux Enterprise Micro 5.1
-
-
- python3-3.6.15-150000.3.164.1 as a component of SUSE Linux Enterprise Micro 5.1
-
-
- python3-base-3.6.15-150000.3.164.1 as a component of SUSE Linux Enterprise Micro 5.1
-
libpython3_6m1_0-3.6.15-150300.10.75.1 as a component of SUSE Linux Enterprise Micro 5.2
@@ -1159,9 +1167,6 @@
python311-tk as a component of SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS
-
- python3 as a component of SUSE Linux Enterprise Micro 5.1
-
python3 as a component of SUSE Linux Enterprise Micro 5.2
@@ -1992,6 +1997,9 @@
CVE-2024-9287
+ SUSE Linux Enterprise Micro 5.1:libpython3_6m1_0-3.6.15-150000.3.164.1
+ SUSE Linux Enterprise Micro 5.1:python3-3.6.15-150000.3.164.1
+ SUSE Linux Enterprise Micro 5.1:python3-base-3.6.15-150000.3.164.1
SUSE Linux Enterprise Server 12 SP3-TERADATA:libpython3_6m1_0-3.6.15-6.118.1
SUSE Linux Enterprise Server 12 SP3-TERADATA:python36-3.6.15-6.118.1
SUSE Linux Enterprise Server 12 SP3-TERADATA:python36-base-3.6.15-6.118.1
@@ -2024,9 +2032,6 @@
openSUSE Tumbleweed:python39-tk-3.9.20-4.1
- SUSE Linux Enterprise Micro 5.1:libpython3_6m1_0-3.6.15-150000.3.164.1
- SUSE Linux Enterprise Micro 5.1:python3-3.6.15-150000.3.164.1
- SUSE Linux Enterprise Micro 5.1:python3-base-3.6.15-150000.3.164.1
SUSE Linux Enterprise Micro 5.2:libpython3_6m1_0-3.6.15-150300.10.75.1
SUSE Linux Enterprise Micro 5.2:python3-3.6.15-150300.10.75.1
SUSE Linux Enterprise Micro 5.2:python3-base-3.6.15-150300.10.75.1
--- /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2024-9264.xml 2024-10-22 01:48:34.472811000 +0200
+++ /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2024-9264.xml.new 2024-10-29 01:22:46.164220000 +0100
@@ -14,13 +14,13 @@
1
- 1
- 2024-10-21T23:48:34Z
+ 2
+ 2024-10-29T00:22:45Z
current
2024-10-21T23:48:34Z
- 2024-10-21T23:48:34Z
+ 2024-10-29T00:22:45Z
cve-database/bin/generate-cvrf-cve.pl
2020-12-27T01:00:00Z
@@ -58,9 +58,20 @@
openSUSE Leap 15.6
+
+
+ openSUSE Tumbleweed
+
+
grafana
+
+ grafana-11.3.0-1.1
+
+
+ grafana-11.3.0-1.1 as a component of openSUSE Tumbleweed
+
grafana as a component of SUSE Linux Enterprise Module for Package Hub 15 SP5
@@ -80,6 +91,9 @@
CVE-2024-9264
+
+ openSUSE Tumbleweed:grafana-11.3.0-1.1
+
SUSE Linux Enterprise Module for Package Hub 15 SP5:grafana
SUSE Linux Enterprise Module for Package Hub 15 SP6:grafana
no cpe found for SUSE Package Hub 15 SP5 in CVE-2024-9122
no cpe found for SUSE Package Hub 15 SP6 in CVE-2024-9122
skipping CVE-2024-9143 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-9123 as CVE page is older than CVRF-CVE file.
no cpe found for SUSE Package Hub 15 SP5 in CVE-2024-9120
no cpe found for SUSE Package Hub 15 SP6 in CVE-2024-9120
skipping CVE-2024-9121 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-9026 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-9014 as CVE page is older than CVRF-CVE file.
No V5 entry found for CVE-2024-8928 / /home/securitybot/prod/cve-database/cvelistV5/cves/2024/8xxxx/CVE-2024-8928.json:No such file or directory
skipping CVE-2024-8927 as CVE page is older than CVRF-CVE file.
no cpe found for SUSE Package Hub 15 SP5 in CVE-2024-8909
no cpe found for SUSE Package Hub 15 SP6 in CVE-2024-8909
skipping CVE-2024-8925 as CVE page is older than CVRF-CVE file.
no cpe found for SUSE Package Hub 15 SP5 in CVE-2024-8908
no cpe found for SUSE Package Hub 15 SP6 in CVE-2024-8908
no cpe found for SUSE Package Hub 15 SP5 in CVE-2024-8907
no cpe found for SUSE Package Hub 15 SP6 in CVE-2024-8907
no cpe found for SUSE Package Hub 15 SP5 in CVE-2024-8906
no cpe found for SUSE Package Hub 15 SP6 in CVE-2024-8906
no cpe found for SUSE Package Hub 15 SP5 in CVE-2024-8905
no cpe found for SUSE Package Hub 15 SP6 in CVE-2024-8905
no cpe found for SUSE Package Hub 15 SP5 in CVE-2024-8904
no cpe found for SUSE Package Hub 15 SP6 in CVE-2024-8904
No V5 entry found for CVE-2024-8805 / /home/securitybot/prod/cve-database/cvelistV5/cves/2024/8xxxx/CVE-2024-8805.json:No such file or directory
skipping CVE-2024-8900 as CVE page is older than CVRF-CVE file.
no cpe found for SUSE Package Hub 15 SP5 in CVE-2024-8639
no cpe found for SUSE Package Hub 15 SP6 in CVE-2024-8639
no cpe found for openSUSE Leap 15.5 NonFree in CVE-2024-8639
no cpe found for openSUSE Leap 15.6 NonFree in CVE-2024-8639
skipping CVE-2024-8645 as CVE page is older than CVRF-CVE file.
no cpe found for SUSE Package Hub 15 SP5 in CVE-2024-8638
no cpe found for SUSE Package Hub 15 SP6 in CVE-2024-8638
no cpe found for openSUSE Leap 15.5 NonFree in CVE-2024-8638
no cpe found for openSUSE Leap 15.6 NonFree in CVE-2024-8638
no cpe found for SUSE Package Hub 15 SP5 in CVE-2024-8637
no cpe found for SUSE Package Hub 15 SP6 in CVE-2024-8637
no cpe found for openSUSE Leap 15.5 NonFree in CVE-2024-8637
no cpe found for openSUSE Leap 15.6 NonFree in CVE-2024-8637
no cpe found for SUSE Linux Enterprise Module for Confidential Computing Technical Preview 15 SP6 in CVE-2024-8612
skipping CVE-2024-8636 as CVE page is older than CVRF-CVE file.
no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2024-8508
no cpe found for SUSE Liberty Linux 7 LTSS in CVE-2024-8445
no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2024-8443
skipping CVE-2024-8394 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-8389 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-8388 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-8387 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-8386 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-8385 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-8384 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-8383 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-8382 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-8381 as CVE page is older than CVRF-CVE file.
no cpe found for SUSE Linux Enterprise Module for Confidential Computing Technical Preview 15 SP6 in CVE-2024-8354
skipping CVE-2024-8362 as CVE page is older than CVRF-CVE file.
no cpe found for SUSE Package Hub 15 SP5 in CVE-2024-8194
no cpe found for SUSE Package Hub 15 SP6 in CVE-2024-8194
skipping CVE-2024-8250 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-8235 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-8198 as CVE page is older than CVRF-CVE file.
no cpe found for SUSE Package Hub 15 SP5 in CVE-2024-8193
no cpe found for SUSE Package Hub 15 SP6 in CVE-2024-8193
skipping CVE-2024-8184 as CVE page is older than CVRF-CVE file.
--- /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2024-8118.xml 2024-09-28 01:26:22.952768000 +0200
+++ /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2024-8118.xml.new 2024-10-29 01:22:58.422169000 +0100
@@ -14,13 +14,13 @@
1
- 1
- 2024-09-27T23:26:22Z
+ 2
+ 2024-10-29T00:22:58Z
current
2024-09-27T23:26:22Z
- 2024-09-27T23:26:22Z
+ 2024-10-29T00:22:58Z
cve-database/bin/generate-cvrf-cve.pl
2020-12-27T01:00:00Z
@@ -58,9 +58,20 @@
openSUSE Leap 15.6
+
+
+ openSUSE Tumbleweed
+
+
grafana
+
+ grafana-11.3.0-1.1
+
+
+ grafana-11.3.0-1.1 as a component of openSUSE Tumbleweed
+
grafana as a component of SUSE Linux Enterprise Module for Package Hub 15 SP5
@@ -79,7 +90,11 @@
In Grafana, the wrong permission is applied to the alert rule write API endpoint, allowing users with permission to write external alert instances to also write alert rules.
CVE-2024-8118
-
+
+
+ openSUSE Tumbleweed:grafana-11.3.0-1.1
+
+
moderate
no cpe found for SUSE Linux Enterprise Installer Updates 15 SP5 in CVE-2024-8096
no cpe found for SUSE Linux Enterprise Installer Updates 15 SP5 in CVE-2024-8096
no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2024-8096
no cpe found for SUSE Linux Enterprise Installer Updates 15 SP5 in CVE-2024-8096
no cpe found for SUSE Linux Enterprise Installer Updates 15 SP5 in CVE-2024-8096
--- /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2024-8096.xml 2024-10-20 01:28:36.715573000 +0200
+++ /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2024-8096.xml.new 2024-10-29 01:22:59.624097000 +0100
@@ -14,13 +14,13 @@
1
- 23
- 2024-10-19T23:28:36Z
+ 24
+ 2024-10-29T00:22:58Z
current
2024-09-11T23:19:26Z
- 2024-10-19T23:28:36Z
+ 2024-10-29T00:22:58Z
cve-database/bin/generate-cvrf-cve.pl
2020-12-27T01:00:00Z
@@ -324,6 +324,21 @@
Image SLES12-SP5-EC2-BYOS
+
+
+ Image SLES12-SP5-GCE-BYOS
+
+
+
+
+ Image SLES12-SP5-GCE-SAP-BYOS
+
+
+
+
+ Image SLES12-SP5-GCE-SAP-On-Demand
+
+
Image SLES15-SP3-CHOST-BYOS-Aliyun
@@ -1696,6 +1711,24 @@
libcurl4-8.0.1-11.92.1 as a component of Image SLES12-SP5-EC2-BYOS
+
+ curl-8.0.1-11.92.1 as a component of Image SLES12-SP5-GCE-BYOS
+
+
+ libcurl4-8.0.1-11.92.1 as a component of Image SLES12-SP5-GCE-BYOS
+
+
+ curl-8.0.1-11.92.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ libcurl4-8.0.1-11.92.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ curl-8.0.1-11.92.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
+
+ libcurl4-8.0.1-11.92.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
curl-7.66.0-150200.4.78.1 as a component of Image SLES15-SP3-CHOST-BYOS-Aliyun
@@ -2620,12 +2653,6 @@
curl as a component of SUSE Linux Enterprise Server for SAP Applications 12 SP5
-
- libcurl4 as a component of SUSE Linux Enterprise Server for SAP Applications 12 SP5
-
-
- libcurl4-32bit as a component of SUSE Linux Enterprise Server for SAP Applications 12 SP5
-
curl as a component of SUSE Linux Enterprise Server for SAP Applications 15 SP2
@@ -2803,6 +2830,12 @@
Image SLES12-SP5-Azure-SAP-BYOS:libcurl4-8.0.1-11.92.1
Image SLES12-SP5-EC2-BYOS:curl-8.0.1-11.92.1
Image SLES12-SP5-EC2-BYOS:libcurl4-8.0.1-11.92.1
+ Image SLES12-SP5-GCE-BYOS:curl-8.0.1-11.92.1
+ Image SLES12-SP5-GCE-BYOS:libcurl4-8.0.1-11.92.1
+ Image SLES12-SP5-GCE-SAP-BYOS:curl-8.0.1-11.92.1
+ Image SLES12-SP5-GCE-SAP-BYOS:libcurl4-8.0.1-11.92.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:curl-8.0.1-11.92.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:libcurl4-8.0.1-11.92.1
Image SLES15-SP3-CHOST-BYOS-Aliyun:curl-7.66.0-150200.4.78.1
Image SLES15-SP3-CHOST-BYOS-Aliyun:libcurl4-7.66.0-150200.4.78.1
Image SLES15-SP3-CHOST-BYOS-Azure:curl-7.66.0-150200.4.78.1
no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2024-8088
--- /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2024-8088.xml 2024-10-19 01:30:41.673742000 +0200
+++ /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2024-8088.xml.new 2024-10-29 01:23:00.348103000 +0100
@@ -14,13 +14,13 @@
1
- 16
- 2024-10-18T23:30:41Z
+ 17
+ 2024-10-29T00:22:59Z
current
2024-08-24T23:24:12Z
- 2024-10-18T23:30:41Z
+ 2024-10-29T00:22:59Z
cve-database/bin/generate-cvrf-cve.pl
2020-12-27T01:00:00Z
@@ -449,6 +449,11 @@
SUSE Manager Proxy 4.3
+
+
+ SUSE Manager Proxy Module 4.3
+
+
SUSE Linux Enterprise Module for Public Cloud 15 SP4
@@ -465,6 +470,21 @@
SUSE Manager Server 4.3
+
+
+ SUSE Manager Server Module 4.3
+
+
+
+
+ SUSE Manager Tools 12
+
+
+
+
+ SUSE Manager Tools 15
+
+
openSUSE Leap 15.5
@@ -837,6 +857,24 @@
python313-x86-64-v3-3.13.0~rc1-3.1
+
+ python314-3.14.0~a1-1.1
+
+
+ python314-curses-3.14.0~a1-1.1
+
+
+ python314-dbm-3.14.0~a1-1.1
+
+
+ python314-idle-3.14.0~a1-1.1
+
+
+ python314-tk-3.14.0~a1-1.1
+
+
+ python314-x86-64-v3-3.14.0~a1-1.1
+
python36
@@ -912,6 +950,12 @@
venv-salt-minion
+
+ venv-salt-minion-3006.0-150000.3.67.1
+
+
+ venv-salt-minion-3006.0-3.65.1
+
libpython3_11-1_0-3.11.10-150600.3.6.1 as a component of Container bci/python:3.11.10-50.6
@@ -1896,6 +1940,24 @@
python313-x86-64-v3-3.13.0~rc1-3.1 as a component of openSUSE Tumbleweed
+
+ python314-3.14.0~a1-1.1 as a component of openSUSE Tumbleweed
+
+
+ python314-curses-3.14.0~a1-1.1 as a component of openSUSE Tumbleweed
+
+
+ python314-dbm-3.14.0~a1-1.1 as a component of openSUSE Tumbleweed
+
+
+ python314-idle-3.14.0~a1-1.1 as a component of openSUSE Tumbleweed
+
+
+ python314-tk-3.14.0~a1-1.1 as a component of openSUSE Tumbleweed
+
+
+ python314-x86-64-v3-3.14.0~a1-1.1 as a component of openSUSE Tumbleweed
+
python38-3.8.19-8.1 as a component of openSUSE Tumbleweed
@@ -1926,6 +1988,18 @@
python39-tk-3.9.19-7.1 as a component of openSUSE Tumbleweed
+
+ venv-salt-minion-3006.0-150000.3.67.1 as a component of SUSE Manager Proxy Module 4.3
+
+
+ venv-salt-minion-3006.0-150000.3.67.1 as a component of SUSE Manager Server Module 4.3
+
+
+ venv-salt-minion-3006.0-3.65.1 as a component of SUSE Manager Tools 12
+
+
+ venv-salt-minion-3006.0-150000.3.67.1 as a component of SUSE Manager Tools 15
+
python as a component of SUSE Linux Enterprise High Performance Computing 12 SP5
@@ -2322,33 +2396,9 @@
python as a component of SUSE Linux Enterprise Server for SAP Applications 12 SP5
-
- python-32bit as a component of SUSE Linux Enterprise Server for SAP Applications 12 SP5
-
-
- python-curses as a component of SUSE Linux Enterprise Server for SAP Applications 12 SP5
-
-
- python-demo as a component of SUSE Linux Enterprise Server for SAP Applications 12 SP5
-
-
- python-gdbm as a component of SUSE Linux Enterprise Server for SAP Applications 12 SP5
-
-
- python-idle as a component of SUSE Linux Enterprise Server for SAP Applications 12 SP5
-
-
- python-tk as a component of SUSE Linux Enterprise Server for SAP Applications 12 SP5
-
python3 as a component of SUSE Linux Enterprise Server for SAP Applications 12 SP5
-
- python3-curses as a component of SUSE Linux Enterprise Server for SAP Applications 12 SP5
-
-
- python3-tk as a component of SUSE Linux Enterprise Server for SAP Applications 12 SP5
-
python36 as a component of SUSE Linux Enterprise Server for SAP Applications 12 SP5
@@ -2916,6 +2966,12 @@
openSUSE Tumbleweed:python313-idle-3.13.0~rc1-3.1
openSUSE Tumbleweed:python313-tk-3.13.0~rc1-3.1
openSUSE Tumbleweed:python313-x86-64-v3-3.13.0~rc1-3.1
+ openSUSE Tumbleweed:python314-3.14.0~a1-1.1
+ openSUSE Tumbleweed:python314-curses-3.14.0~a1-1.1
+ openSUSE Tumbleweed:python314-dbm-3.14.0~a1-1.1
+ openSUSE Tumbleweed:python314-idle-3.14.0~a1-1.1
+ openSUSE Tumbleweed:python314-tk-3.14.0~a1-1.1
+ openSUSE Tumbleweed:python314-x86-64-v3-3.14.0~a1-1.1
openSUSE Tumbleweed:python38-3.8.19-8.1
openSUSE Tumbleweed:python38-curses-3.8.19-8.1
openSUSE Tumbleweed:python38-dbm-3.8.19-8.1
@@ -2927,6 +2983,12 @@
openSUSE Tumbleweed:python39-idle-3.9.19-7.1
openSUSE Tumbleweed:python39-tk-3.9.19-7.1
+
+ SUSE Manager Proxy Module 4.3:venv-salt-minion-3006.0-150000.3.67.1
+ SUSE Manager Server Module 4.3:venv-salt-minion-3006.0-150000.3.67.1
+ SUSE Manager Tools 12:venv-salt-minion-3006.0-3.65.1
+ SUSE Manager Tools 15:venv-salt-minion-3006.0-150000.3.67.1
+
SUSE Linux Enterprise High Performance Computing 12 SP5:python
SUSE Linux Enterprise High Performance Computing 12 SP5:python3
@@ -3058,15 +3120,7 @@
SUSE Linux Enterprise Server Teradata 12 SP3:python36
SUSE Linux Enterprise Server Teradata 15 SP4:python3
SUSE Linux Enterprise Server for SAP Applications 12 SP5:python
- SUSE Linux Enterprise Server for SAP Applications 12 SP5:python-32bit
- SUSE Linux Enterprise Server for SAP Applications 12 SP5:python-curses
- SUSE Linux Enterprise Server for SAP Applications 12 SP5:python-demo
- SUSE Linux Enterprise Server for SAP Applications 12 SP5:python-gdbm
- SUSE Linux Enterprise Server for SAP Applications 12 SP5:python-idle
- SUSE Linux Enterprise Server for SAP Applications 12 SP5:python-tk
SUSE Linux Enterprise Server for SAP Applications 12 SP5:python3
- SUSE Linux Enterprise Server for SAP Applications 12 SP5:python3-curses
- SUSE Linux Enterprise Server for SAP Applications 12 SP5:python3-tk
SUSE Linux Enterprise Server for SAP Applications 12 SP5:python36
SUSE Linux Enterprise Server for SAP Applications 15 SP2:python
SUSE Linux Enterprise Server for SAP Applications 15 SP2:python-curses
no cpe found for SUSE Package Hub 15 SP5 in CVE-2024-8035
no cpe found for SUSE Package Hub 15 SP6 in CVE-2024-8035
no cpe found for SUSE Package Hub 15 SP5 in CVE-2024-8034
no cpe found for SUSE Package Hub 15 SP6 in CVE-2024-8034
no cpe found for SUSE Package Hub 15 SP5 in CVE-2024-8033
no cpe found for SUSE Package Hub 15 SP6 in CVE-2024-8033
no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2024-8006
--- /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2024-8006.xml 2024-10-20 01:28:38.072087000 +0200
+++ /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2024-8006.xml.new 2024-10-29 01:23:02.055890000 +0100
@@ -14,13 +14,13 @@
1
- 19
- 2024-10-19T23:28:37Z
+ 20
+ 2024-10-29T00:23:01Z
current
2024-09-02T23:17:14Z
- 2024-10-19T23:28:37Z
+ 2024-10-29T00:23:01Z
cve-database/bin/generate-cvrf-cve.pl
2020-12-27T01:00:00Z
@@ -79,6 +79,21 @@
Container suse/sle-micro/5.5/toolbox:13.2-3.5.37
+
+
+ Image SLES12-SP5-GCE-BYOS
+
+
+
+
+ Image SLES12-SP5-GCE-SAP-BYOS
+
+
+
+
+ Image SLES12-SP5-GCE-SAP-On-Demand
+
+
Image SLES15-SP4-CHOST-BYOS
@@ -962,6 +977,15 @@
libpcap1-1.10.1-150400.3.3.2 as a component of Container suse/sle-micro/5.5/toolbox:13.2-3.5.37
+
+ libpcap1-1.8.1-10.6.1 as a component of Image SLES12-SP5-GCE-BYOS
+
+
+ libpcap1-1.8.1-10.6.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ libpcap1-1.8.1-10.6.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
libpcap1-1.10.1-150400.3.3.2 as a component of Image SLES15-SP4-CHOST-BYOS
@@ -1361,9 +1385,6 @@
libpcap as a component of SUSE Linux Enterprise Server Teradata 12 SP3-LTSS
-
- libpcap1 as a component of SUSE Linux Enterprise Server for SAP Applications 12 SP5
-
libpcap as a component of SUSE Linux Enterprise Server for SAP Applications 12 SP5
@@ -1434,6 +1455,9 @@
Container suse/sle-micro/5.3/toolbox:13.2-6.11.23:libpcap1-1.10.1-150400.3.3.2
Container suse/sle-micro/5.4/toolbox:13.2-5.19.24:libpcap1-1.10.1-150400.3.3.2
Container suse/sle-micro/5.5/toolbox:13.2-3.5.37:libpcap1-1.10.1-150400.3.3.2
+ Image SLES12-SP5-GCE-BYOS:libpcap1-1.8.1-10.6.1
+ Image SLES12-SP5-GCE-SAP-BYOS:libpcap1-1.8.1-10.6.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:libpcap1-1.8.1-10.6.1
Image SLES15-SP4-CHOST-BYOS:libpcap1-1.10.1-150400.3.3.2
Image SLES15-SP4-CHOST-BYOS-Aliyun:libpcap1-1.10.1-150400.3.3.2
Image SLES15-SP4-CHOST-BYOS-Azure:libpcap1-1.10.1-150400.3.3.2
no cpe found for SUSE Package Hub 15 SP5 in CVE-2024-7981
no cpe found for SUSE Package Hub 15 SP6 in CVE-2024-7981
no cpe found for SUSE Package Hub 15 SP5 in CVE-2024-7980
no cpe found for SUSE Package Hub 15 SP6 in CVE-2024-7980
no cpe found for SUSE Package Hub 15 SP5 in CVE-2024-7979
no cpe found for SUSE Package Hub 15 SP6 in CVE-2024-7979
no cpe found for SUSE Package Hub 15 SP5 in CVE-2024-7978
no cpe found for SUSE Package Hub 15 SP6 in CVE-2024-7978
no cpe found for SUSE Package Hub 15 SP5 in CVE-2024-7977
no cpe found for SUSE Package Hub 15 SP6 in CVE-2024-7977
no cpe found for SUSE Package Hub 15 SP5 in CVE-2024-7976
no cpe found for SUSE Package Hub 15 SP6 in CVE-2024-7976
no cpe found for SUSE Package Hub 15 SP5 in CVE-2024-7975
no cpe found for SUSE Package Hub 15 SP6 in CVE-2024-7975
no cpe found for SUSE Package Hub 15 SP5 in CVE-2024-7974
no cpe found for SUSE Package Hub 15 SP6 in CVE-2024-7974
no cpe found for SUSE Package Hub 15 SP5 in CVE-2024-7973
no cpe found for SUSE Package Hub 15 SP6 in CVE-2024-7973
no cpe found for SUSE Package Hub 15 SP5 in CVE-2024-7972
no cpe found for SUSE Package Hub 15 SP6 in CVE-2024-7972
no cpe found for SUSE Package Hub 15 SP5 in CVE-2024-7971
no cpe found for SUSE Package Hub 15 SP6 in CVE-2024-7971
no cpe found for openSUSE Leap 15.5 NonFree in CVE-2024-7971
no cpe found for openSUSE Leap 15.6 NonFree in CVE-2024-7971
no cpe found for SUSE Package Hub 15 SP5 in CVE-2024-7970
no cpe found for SUSE Package Hub 15 SP6 in CVE-2024-7970
no cpe found for SUSE Package Hub 15 SP5 in CVE-2024-7969
no cpe found for SUSE Package Hub 15 SP6 in CVE-2024-7969
no cpe found for SUSE Package Hub 15 SP5 in CVE-2024-7968
no cpe found for SUSE Package Hub 15 SP6 in CVE-2024-7968
no cpe found for SUSE Package Hub 15 SP5 in CVE-2024-7967
no cpe found for SUSE Package Hub 15 SP6 in CVE-2024-7967
no cpe found for SUSE Package Hub 15 SP5 in CVE-2024-7966
no cpe found for SUSE Package Hub 15 SP6 in CVE-2024-7966
no cpe found for SUSE Package Hub 15 SP5 in CVE-2024-7964
no cpe found for SUSE Package Hub 15 SP6 in CVE-2024-7964
skipping CVE-2024-7965 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-7730 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-7652 as CVE page is older than CVRF-CVE file.
no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2024-7592
--- /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2024-7592.xml 2024-10-26 01:17:59.412002000 +0200
+++ /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2024-7592.xml.new 2024-10-29 01:23:08.584063000 +0100
@@ -14,13 +14,13 @@
1
- 24
- 2024-10-25T23:17:58Z
+ 25
+ 2024-10-29T00:23:08Z
current
2024-08-22T23:22:05Z
- 2024-10-25T23:17:58Z
+ 2024-10-29T00:23:08Z
cve-database/bin/generate-cvrf-cve.pl
2020-12-27T01:00:00Z
@@ -207,6 +207,21 @@
Image SLES12-SP5-Azure-SAP-BYOS
+
+
+ Image SLES12-SP5-GCE-BYOS
+
+
+
+
+ Image SLES12-SP5-GCE-SAP-BYOS
+
+
+
+
+ Image SLES12-SP5-GCE-SAP-On-Demand
+
+
Image SLES15-SP4-SAP-Azure-LI-BYOS
@@ -688,6 +703,11 @@
SUSE Manager Proxy 4.3
+
+
+ SUSE Manager Proxy Module 4.3
+
+
SUSE Linux Enterprise Module for Public Cloud 15 SP4
@@ -704,6 +724,21 @@
SUSE Manager Server 4.3
+
+
+ SUSE Manager Server Module 4.3
+
+
+
+
+ SUSE Manager Tools 12
+
+
+
+
+ SUSE Manager Tools 15
+
+
openSUSE Leap 15.5
@@ -1394,6 +1429,24 @@
python313-x86-64-v3-3.13.0~rc2-1.1
+
+ python314-3.14.0~a1-1.1
+
+
+ python314-curses-3.14.0~a1-1.1
+
+
+ python314-dbm-3.14.0~a1-1.1
+
+
+ python314-idle-3.14.0~a1-1.1
+
+
+ python314-tk-3.14.0~a1-1.1
+
+
+ python314-x86-64-v3-3.14.0~a1-1.1
+
python36
@@ -1490,6 +1543,12 @@
venv-salt-minion
+
+ venv-salt-minion-3006.0-150000.3.67.1
+
+
+ venv-salt-minion-3006.0-3.65.1
+
libpython3_6m1_0-3.6.15-150300.10.72.1 as a component of Container bci/bci-base-fips:15.6.13.2
@@ -1667,6 +1726,57 @@
python36-base-3.6.15-61.1 as a component of Image SLES12-SP5-Azure-SAP-BYOS
+
+ libpython3_4m1_0-3.4.10-25.139.1 as a component of Image SLES12-SP5-GCE-BYOS
+
+
+ libpython3_6m1_0-3.6.15-61.1 as a component of Image SLES12-SP5-GCE-BYOS
+
+
+ python3-3.4.10-25.139.1 as a component of Image SLES12-SP5-GCE-BYOS
+
+
+ python3-base-3.4.10-25.139.1 as a component of Image SLES12-SP5-GCE-BYOS
+
+
+ python36-base-3.6.15-61.1 as a component of Image SLES12-SP5-GCE-BYOS
+
+
+ libpython3_4m1_0-3.4.10-25.139.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ libpython3_6m1_0-3.6.15-61.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ python3-3.4.10-25.139.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ python3-base-3.4.10-25.139.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ python3-curses-3.4.10-25.139.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ python36-base-3.6.15-61.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ libpython3_4m1_0-3.4.10-25.139.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
+
+ libpython3_6m1_0-3.6.15-61.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
+
+ python3-3.4.10-25.139.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
+
+ python3-base-3.4.10-25.139.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
+
+ python3-curses-3.4.10-25.139.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
+
+ python36-base-3.6.15-61.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
libpython3_6m1_0-3.6.15-150300.10.72.1 as a component of Image SLES15-SP4-SAP-Azure-LI-BYOS
@@ -3569,6 +3679,24 @@
python313-x86-64-v3-3.13.0~rc2-1.1 as a component of openSUSE Tumbleweed
+
+ python314-3.14.0~a1-1.1 as a component of openSUSE Tumbleweed
+
+
+ python314-curses-3.14.0~a1-1.1 as a component of openSUSE Tumbleweed
+
+
+ python314-dbm-3.14.0~a1-1.1 as a component of openSUSE Tumbleweed
+
+
+ python314-idle-3.14.0~a1-1.1 as a component of openSUSE Tumbleweed
+
+
+ python314-tk-3.14.0~a1-1.1 as a component of openSUSE Tumbleweed
+
+
+ python314-x86-64-v3-3.14.0~a1-1.1 as a component of openSUSE Tumbleweed
+
python39-3.9.20-2.1 as a component of openSUSE Tumbleweed
@@ -3584,6 +3712,18 @@
python39-tk-3.9.20-2.1 as a component of openSUSE Tumbleweed
+
+ venv-salt-minion-3006.0-150000.3.67.1 as a component of SUSE Manager Proxy Module 4.3
+
+
+ venv-salt-minion-3006.0-150000.3.67.1 as a component of SUSE Manager Server Module 4.3
+
+
+ venv-salt-minion-3006.0-3.65.1 as a component of SUSE Manager Tools 12
+
+
+ venv-salt-minion-3006.0-150000.3.67.1 as a component of SUSE Manager Tools 15
+
python as a component of SUSE Linux Enterprise High Performance Computing 12 SP5
@@ -4132,6 +4272,23 @@
Container suse/sles/15.7/libguestfs-tools:1.1.1.28.45:python3-base-3.6.15-150300.10.72.1
Image SLES12-SP5-Azure-SAP-BYOS:libpython3_6m1_0-3.6.15-61.1
Image SLES12-SP5-Azure-SAP-BYOS:python36-base-3.6.15-61.1
+ Image SLES12-SP5-GCE-BYOS:libpython3_4m1_0-3.4.10-25.139.1
+ Image SLES12-SP5-GCE-BYOS:libpython3_6m1_0-3.6.15-61.1
+ Image SLES12-SP5-GCE-BYOS:python3-3.4.10-25.139.1
+ Image SLES12-SP5-GCE-BYOS:python3-base-3.4.10-25.139.1
+ Image SLES12-SP5-GCE-BYOS:python36-base-3.6.15-61.1
+ Image SLES12-SP5-GCE-SAP-BYOS:libpython3_4m1_0-3.4.10-25.139.1
+ Image SLES12-SP5-GCE-SAP-BYOS:libpython3_6m1_0-3.6.15-61.1
+ Image SLES12-SP5-GCE-SAP-BYOS:python3-3.4.10-25.139.1
+ Image SLES12-SP5-GCE-SAP-BYOS:python3-base-3.4.10-25.139.1
+ Image SLES12-SP5-GCE-SAP-BYOS:python3-curses-3.4.10-25.139.1
+ Image SLES12-SP5-GCE-SAP-BYOS:python36-base-3.6.15-61.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:libpython3_4m1_0-3.4.10-25.139.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:libpython3_6m1_0-3.6.15-61.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:python3-3.4.10-25.139.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:python3-base-3.4.10-25.139.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:python3-curses-3.4.10-25.139.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:python36-base-3.6.15-61.1
Image SLES15-SP4-SAP-Azure-LI-BYOS:libpython3_6m1_0-3.6.15-150300.10.72.1
Image SLES15-SP4-SAP-Azure-LI-BYOS:python3-3.6.15-150300.10.72.1
Image SLES15-SP4-SAP-Azure-LI-BYOS:python3-base-3.6.15-150300.10.72.1
@@ -4766,12 +4923,24 @@
openSUSE Tumbleweed:python313-idle-3.13.0~rc2-1.1
openSUSE Tumbleweed:python313-tk-3.13.0~rc2-1.1
openSUSE Tumbleweed:python313-x86-64-v3-3.13.0~rc2-1.1
+ openSUSE Tumbleweed:python314-3.14.0~a1-1.1
+ openSUSE Tumbleweed:python314-curses-3.14.0~a1-1.1
+ openSUSE Tumbleweed:python314-dbm-3.14.0~a1-1.1
+ openSUSE Tumbleweed:python314-idle-3.14.0~a1-1.1
+ openSUSE Tumbleweed:python314-tk-3.14.0~a1-1.1
+ openSUSE Tumbleweed:python314-x86-64-v3-3.14.0~a1-1.1
openSUSE Tumbleweed:python39-3.9.20-2.1
openSUSE Tumbleweed:python39-curses-3.9.20-2.1
openSUSE Tumbleweed:python39-dbm-3.9.20-2.1
openSUSE Tumbleweed:python39-idle-3.9.20-2.1
openSUSE Tumbleweed:python39-tk-3.9.20-2.1
+
+ SUSE Manager Proxy Module 4.3:venv-salt-minion-3006.0-150000.3.67.1
+ SUSE Manager Server Module 4.3:venv-salt-minion-3006.0-150000.3.67.1
+ SUSE Manager Tools 12:venv-salt-minion-3006.0-3.65.1
+ SUSE Manager Tools 15:venv-salt-minion-3006.0-150000.3.67.1
+
chost:amazon/suse-sles-15-sp1-chost-byos-v20210304-hvm-ssd-x86_64
chost:amazon/suse-sles-15-sp1-chost-byos-v20220127-hvm-ssd-x86_64
no cpe found for SUSE Package Hub 15 SP5 in CVE-2024-7550
no cpe found for SUSE Package Hub 15 SP6 in CVE-2024-7550
skipping CVE-2024-7589 as CVE page is older than CVRF-CVE file.
no cpe found for SUSE Package Hub 15 SP5 in CVE-2024-7536
no cpe found for SUSE Package Hub 15 SP6 in CVE-2024-7536
no cpe found for SUSE Package Hub 15 SP5 in CVE-2024-7535
no cpe found for SUSE Package Hub 15 SP6 in CVE-2024-7535
no cpe found for SUSE Package Hub 15 SP5 in CVE-2024-7534
no cpe found for SUSE Package Hub 15 SP6 in CVE-2024-7534
no cpe found for SUSE Package Hub 15 SP5 in CVE-2024-7533
no cpe found for SUSE Package Hub 15 SP6 in CVE-2024-7533
no cpe found for SUSE Package Hub 15 SP5 in CVE-2024-7532
no cpe found for SUSE Package Hub 15 SP6 in CVE-2024-7532
no cpe found for SUSE Linux Enterprise Module for Confidential Computing Technical Preview 15 SP6 in CVE-2024-7409
skipping CVE-2024-7531 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-7530 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-7529 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-7528 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-7527 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-7526 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-7525 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-7524 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-7523 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-7522 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-7521 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-7520 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-7519 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-7518 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-7348 as CVE page is older than CVRF-CVE file.
no cpe found for SUSE Linux Enterprise Installer Updates 15 SP4 in CVE-2024-7264
no cpe found for SUSE Linux Enterprise Installer Updates 15 SP5 in CVE-2024-7264
no cpe found for SUSE Linux Enterprise Installer Updates 15 SP4 in CVE-2024-7264
no cpe found for SUSE Linux Enterprise Installer Updates 15 SP5 in CVE-2024-7264
no cpe found for SUSE Linux Enterprise Installer Updates 15 SP4 in CVE-2024-7264
no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2024-7264
no cpe found for SUSE Linux Enterprise Installer Updates 15 SP5 in CVE-2024-7264
no cpe found for SUSE Linux Enterprise Installer Updates 15 SP4 in CVE-2024-7264
no cpe found for SUSE Linux Enterprise Installer Updates 15 SP5 in CVE-2024-7264
no cpe found for SUSE Linux Enterprise Installer Updates 15 SP4 in CVE-2024-7264
no cpe found for SUSE Linux Enterprise Installer Updates 15 SP4 in CVE-2024-7264
no cpe found for SUSE Linux Enterprise Installer Updates 15 SP4 in CVE-2024-7264
--- /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2024-7264.xml 2024-10-22 01:49:24.218719000 +0200
+++ /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2024-7264.xml.new 2024-10-29 01:23:15.921292000 +0100
@@ -14,13 +14,13 @@
1
- 43
- 2024-10-21T23:49:23Z
+ 44
+ 2024-10-29T00:23:15Z
current
2024-07-31T23:17:42Z
- 2024-10-21T23:49:23Z
+ 2024-10-29T00:23:15Z
cve-database/bin/generate-cvrf-cve.pl
2020-12-27T01:00:00Z
@@ -415,6 +415,21 @@
Image SLES12-SP5-EC2-BYOS
+
+
+ Image SLES12-SP5-GCE-BYOS
+
+
+
+
+ Image SLES12-SP5-GCE-SAP-BYOS
+
+
+
+
+ Image SLES12-SP5-GCE-SAP-On-Demand
+
+
Image SLES12-SP5-SAP-Azure-LI-BYOS-Production
@@ -2165,6 +2180,24 @@
libcurl4-8.0.1-11.89.1 as a component of Image SLES12-SP5-EC2-BYOS
+
+ curl-8.0.1-11.89.1 as a component of Image SLES12-SP5-GCE-BYOS
+
+
+ libcurl4-8.0.1-11.89.1 as a component of Image SLES12-SP5-GCE-BYOS
+
+
+ curl-8.0.1-11.89.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ libcurl4-8.0.1-11.89.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ curl-8.0.1-11.89.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
+
+ libcurl4-8.0.1-11.89.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
curl-8.0.1-11.89.1 as a component of Image SLES12-SP5-SAP-Azure-LI-BYOS-Production
@@ -3673,6 +3706,12 @@
Image SLES12-SP5-Azure-SAP-BYOS:libcurl4-8.0.1-11.89.1
Image SLES12-SP5-EC2-BYOS:curl-8.0.1-11.89.1
Image SLES12-SP5-EC2-BYOS:libcurl4-8.0.1-11.89.1
+ Image SLES12-SP5-GCE-BYOS:curl-8.0.1-11.89.1
+ Image SLES12-SP5-GCE-BYOS:libcurl4-8.0.1-11.89.1
+ Image SLES12-SP5-GCE-SAP-BYOS:curl-8.0.1-11.89.1
+ Image SLES12-SP5-GCE-SAP-BYOS:libcurl4-8.0.1-11.89.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:curl-8.0.1-11.89.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:libcurl4-8.0.1-11.89.1
Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:curl-8.0.1-11.89.1
Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:libcurl4-8.0.1-11.89.1
Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production:curl-8.0.1-11.89.1
no cpe found for SUSE Package Hub 15 SP5 in CVE-2024-7256
no cpe found for SUSE Package Hub 15 SP6 in CVE-2024-7256
no cpe found for SUSE Package Hub 15 SP5 in CVE-2024-7255
no cpe found for SUSE Package Hub 15 SP6 in CVE-2024-7255
CVE-2024-7254: no packages for SUSE Linux Enterprise Module for Package Hub 15 SP5, but entry?
CVE-2024-7254: no packages for SUSE Linux Enterprise Module for Package Hub 15 SP6, but entry?
no cpe found for SUSE Linux Enterprise Installer Updates 15 SP4 in CVE-2024-7254
no cpe found for SUSE Linux Enterprise Installer Updates 15 SP5 in CVE-2024-7254
no cpe found for SUSE Linux Enterprise Installer Updates 15 SP4 in CVE-2024-7254
no cpe found for SUSE Linux Enterprise Installer Updates 15 SP5 in CVE-2024-7254
no cpe found for SUSE Linux Enterprise Installer Updates 15 SP4 in CVE-2024-7254
no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2024-7254
no cpe found for SUSE Linux Enterprise Installer Updates 15 SP5 in CVE-2024-7254
no cpe found for SUSE Linux Enterprise Installer Updates 15 SP4 in CVE-2024-7254
no cpe found for SUSE Linux Enterprise Installer Updates 15 SP5 in CVE-2024-7254
no cpe found for SUSE Linux Enterprise Installer Updates 15 SP4 in CVE-2024-7254
no cpe found for SUSE Linux Enterprise Installer Updates 15 SP4 in CVE-2024-7254
no cpe found for SUSE Linux Enterprise Installer Updates 15 SP4 in CVE-2024-7254
CVE-2024-7254: no packages for SUSE Linux Enterprise Module for Package Hub 15 SP5, but entry?
CVE-2024-7254: no packages for SUSE Linux Enterprise Module for Package Hub 15 SP6, but entry?
CVE-2024-7254: no packages for SUSE Linux Enterprise Module for Package Hub 15 SP5, but entry?
CVE-2024-7254: no packages for SUSE Linux Enterprise Module for Package Hub 15 SP6, but entry?
--- /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2024-7246.xml 2024-08-07 01:20:41.491412000 +0200
+++ /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2024-7246.xml.new 2024-10-29 01:23:17.819056000 +0100
@@ -14,13 +14,13 @@
1
- 1
- 2024-08-06T23:20:41Z
+ 2
+ 2024-10-29T00:23:17Z
current
2024-08-06T23:20:41Z
- 2024-08-06T23:20:41Z
+ 2024-10-29T00:23:17Z
cve-database/bin/generate-cvrf-cve.pl
2020-12-27T01:00:00Z
@@ -229,6 +229,9 @@
grpc as a component of SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS
+
+ grpc-devel as a component of SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS
+
libgrpc++1 as a component of SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS
@@ -250,6 +253,9 @@
grpc as a component of SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS
+
+ grpc-devel as a component of SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS
+
libgrpc++1 as a component of SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS
@@ -355,6 +361,9 @@
grpc as a component of SUSE Linux Enterprise Server 15 SP3-LTSS
+
+ grpc-devel as a component of SUSE Linux Enterprise Server 15 SP4-LTSS
+
libgrpc++1 as a component of SUSE Linux Enterprise Server 15 SP4-LTSS
@@ -388,6 +397,9 @@
grpc as a component of SUSE Linux Enterprise Server for SAP Applications 15 SP3
+
+ grpc-devel as a component of SUSE Linux Enterprise Server for SAP Applications 15 SP4
+
libgrpc++1 as a component of SUSE Linux Enterprise Server for SAP Applications 15 SP4
@@ -545,6 +557,7 @@
SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:libgrpc++1
SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:libgrpc8
SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:grpc
+ SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:grpc-devel
SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:libgrpc++1
SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:libgrpc++1_60
SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:libgrpc1_60
@@ -552,6 +565,7 @@
SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:libgrpc8
SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:libupb37
SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:grpc
+ SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:grpc-devel
SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:libgrpc++1
SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:libgrpc++1_60
SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:libgrpc1_60
@@ -587,6 +601,7 @@
SUSE Linux Enterprise Server 15 SP3-LTSS:libgrpc++1
SUSE Linux Enterprise Server 15 SP3-LTSS:libgrpc8
SUSE Linux Enterprise Server 15 SP4-LTSS:grpc
+ SUSE Linux Enterprise Server 15 SP4-LTSS:grpc-devel
SUSE Linux Enterprise Server 15 SP4-LTSS:libgrpc++1
SUSE Linux Enterprise Server 15 SP4-LTSS:libgrpc++1_60
SUSE Linux Enterprise Server 15 SP4-LTSS:libgrpc1_60
@@ -598,6 +613,7 @@
SUSE Linux Enterprise Server for SAP Applications 15 SP3:libgrpc++1
SUSE Linux Enterprise Server for SAP Applications 15 SP3:libgrpc8
SUSE Linux Enterprise Server for SAP Applications 15 SP4:grpc
+ SUSE Linux Enterprise Server for SAP Applications 15 SP4:grpc-devel
SUSE Linux Enterprise Server for SAP Applications 15 SP4:libgrpc++1
SUSE Linux Enterprise Server for SAP Applications 15 SP4:libgrpc++1_60
SUSE Linux Enterprise Server for SAP Applications 15 SP4:libgrpc1_60
no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2024-7055
skipping CVE-2024-7025 as CVE page is older than CVRF-CVE file.
no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2024-7006
--- /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2024-7006.xml 2024-10-20 01:29:06.940003000 +0200
+++ /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2024-7006.xml.new 2024-10-29 01:23:21.008888000 +0100
@@ -14,13 +14,13 @@
1
- 15
- 2024-10-19T23:29:06Z
+ 16
+ 2024-10-29T00:23:20Z
current
2024-08-06T23:20:42Z
- 2024-10-19T23:29:06Z
+ 2024-10-29T00:23:20Z
cve-database/bin/generate-cvrf-cve.pl
2020-12-27T01:00:00Z
@@ -60,6 +60,16 @@
Image SLES12-SP5-Azure-SAP-BYOS
+
+
+ Image SLES12-SP5-GCE-SAP-BYOS
+
+
+
+
+ Image SLES12-SP5-GCE-SAP-On-Demand
+
+
Image SLES12-SP5-SAP-Azure-LI-BYOS-Production
@@ -801,6 +811,12 @@
libtiff5-4.0.9-44.86.1 as a component of Image SLES12-SP5-Azure-SAP-BYOS
+
+ libtiff5-4.0.9-44.86.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ libtiff5-4.0.9-44.86.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
libtiff5-4.0.9-44.86.1 as a component of Image SLES12-SP5-SAP-Azure-LI-BYOS-Production
@@ -1194,12 +1210,6 @@
tiff as a component of SUSE Linux Enterprise Server Teradata 12 SP3-LTSS
-
- libtiff5 as a component of SUSE Linux Enterprise Server for SAP Applications 12 SP5
-
-
- libtiff5-32bit as a component of SUSE Linux Enterprise Server for SAP Applications 12 SP5
-
tiff as a component of SUSE Linux Enterprise Server for SAP Applications 12 SP5
@@ -1285,6 +1295,8 @@
Container suse/nginx:1.21-41.4:libtiff5-4.0.9-150000.45.47.1
Image SLES12-SP5-Azure-SAP-BYOS:libtiff5-4.0.9-44.86.1
+ Image SLES12-SP5-GCE-SAP-BYOS:libtiff5-4.0.9-44.86.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:libtiff5-4.0.9-44.86.1
Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:libtiff5-4.0.9-44.86.1
Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production:libtiff5-4.0.9-44.86.1
Image SLES15-SP3-SAP-BYOS-Azure:libtiff5-4.0.9-150000.45.47.1
no cpe found for SUSE Package Hub 15 SP5 in CVE-2024-7005
no cpe found for SUSE Package Hub 15 SP6 in CVE-2024-7005
no cpe found for SUSE Package Hub 15 SP5 in CVE-2024-7004
no cpe found for SUSE Package Hub 15 SP6 in CVE-2024-7004
no cpe found for SUSE Package Hub 15 SP5 in CVE-2024-7003
no cpe found for SUSE Package Hub 15 SP6 in CVE-2024-7003
no cpe found for SUSE Package Hub 15 SP5 in CVE-2024-7001
no cpe found for SUSE Package Hub 15 SP6 in CVE-2024-7001
no cpe found for SUSE Package Hub 15 SP5 in CVE-2024-7000
no cpe found for SUSE Package Hub 15 SP6 in CVE-2024-7000
no cpe found for SUSE Package Hub 15 SP5 in CVE-2024-6999
no cpe found for SUSE Package Hub 15 SP6 in CVE-2024-6999
no cpe found for SUSE Package Hub 15 SP5 in CVE-2024-6998
no cpe found for SUSE Package Hub 15 SP6 in CVE-2024-6998
no cpe found for SUSE Package Hub 15 SP5 in CVE-2024-6997
no cpe found for SUSE Package Hub 15 SP6 in CVE-2024-6997
no cpe found for SUSE Package Hub 15 SP5 in CVE-2024-6996
no cpe found for SUSE Package Hub 15 SP6 in CVE-2024-6996
no cpe found for SUSE Package Hub 15 SP5 in CVE-2024-6995
no cpe found for SUSE Package Hub 15 SP6 in CVE-2024-6995
no cpe found for SUSE Package Hub 15 SP5 in CVE-2024-6994
no cpe found for SUSE Package Hub 15 SP6 in CVE-2024-6994
No V5 entry found for CVE-2024-6993 / /home/securitybot/prod/cve-database/cvelistV5/cves/2024/6xxxx/CVE-2024-6993.json:No such file or directory
no cpe found for SUSE Package Hub 15 SP5 in CVE-2024-6993
no cpe found for SUSE Package Hub 15 SP6 in CVE-2024-6993
No V5 entry found for CVE-2024-6992 / /home/securitybot/prod/cve-database/cvelistV5/cves/2024/6xxxx/CVE-2024-6992.json:No such file or directory
no cpe found for SUSE Package Hub 15 SP5 in CVE-2024-6992
no cpe found for SUSE Package Hub 15 SP6 in CVE-2024-6992
no cpe found for SUSE Package Hub 15 SP5 in CVE-2024-6991
no cpe found for SUSE Package Hub 15 SP6 in CVE-2024-6991
no cpe found for SUSE Package Hub 15 SP5 in CVE-2024-6990
no cpe found for SUSE Package Hub 15 SP6 in CVE-2024-6990
no cpe found for SUSE Package Hub 15 SP5 in CVE-2024-6989
no cpe found for SUSE Package Hub 15 SP6 in CVE-2024-6989
no cpe found for SUSE Package Hub 15 SP5 in CVE-2024-6988
no cpe found for SUSE Package Hub 15 SP6 in CVE-2024-6988
no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2024-6923
--- /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2024-6923.xml 2024-10-26 01:18:16.469030000 +0200
+++ /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2024-6923.xml.new 2024-10-29 01:23:26.715092000 +0100
@@ -14,13 +14,13 @@
1
- 46
- 2024-10-25T23:18:15Z
+ 47
+ 2024-10-29T00:23:26Z
current
2024-08-05T23:18:01Z
- 2024-10-25T23:18:15Z
+ 2024-10-29T00:23:26Z
cve-database/bin/generate-cvrf-cve.pl
2020-12-27T01:00:00Z
@@ -254,6 +254,21 @@
Image SLES12-SP5-Azure-SAP-BYOS
+
+
+ Image SLES12-SP5-GCE-BYOS
+
+
+
+
+ Image SLES12-SP5-GCE-SAP-BYOS
+
+
+
+
+ Image SLES12-SP5-GCE-SAP-On-Demand
+
+
Image SLES15-SP4-SAP-Azure-LI-BYOS
@@ -868,6 +883,11 @@
SUSE Manager Proxy 4.3
+
+
+ SUSE Manager Proxy Module 4.3
+
+
SUSE Linux Enterprise Module for Public Cloud 15 SP4
@@ -884,6 +904,21 @@
SUSE Manager Server 4.3
+
+
+ SUSE Manager Server Module 4.3
+
+
+
+
+ SUSE Manager Tools 12
+
+
+
+
+ SUSE Manager Tools 15
+
+
openSUSE Leap 15.5
@@ -1697,6 +1732,24 @@
python313-x86-64-v3-3.13.0~rc1-1.1
+
+ python314-3.14.0~a1-1.1
+
+
+ python314-curses-3.14.0~a1-1.1
+
+
+ python314-dbm-3.14.0~a1-1.1
+
+
+ python314-idle-3.14.0~a1-1.1
+
+
+ python314-tk-3.14.0~a1-1.1
+
+
+ python314-x86-64-v3-3.14.0~a1-1.1
+
python36
@@ -1808,6 +1861,12 @@
venv-salt-minion
+
+ venv-salt-minion-3006.0-150000.3.67.1
+
+
+ venv-salt-minion-3006.0-3.65.1
+
libpython3_6m1_0-3.6.15-150300.10.72.1 as a component of Container bci/bci-base-fips:15.6.13.2
@@ -2075,6 +2134,57 @@
python36-base-3.6.15-61.1 as a component of Image SLES12-SP5-Azure-SAP-BYOS
+
+ libpython3_4m1_0-3.4.10-25.136.1 as a component of Image SLES12-SP5-GCE-BYOS
+
+
+ libpython3_6m1_0-3.6.15-61.1 as a component of Image SLES12-SP5-GCE-BYOS
+
+
+ python3-3.4.10-25.136.1 as a component of Image SLES12-SP5-GCE-BYOS
+
+
+ python3-base-3.4.10-25.136.1 as a component of Image SLES12-SP5-GCE-BYOS
+
+
+ python36-base-3.6.15-61.1 as a component of Image SLES12-SP5-GCE-BYOS
+
+
+ libpython3_4m1_0-3.4.10-25.136.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ libpython3_6m1_0-3.6.15-61.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ python3-3.4.10-25.136.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ python3-base-3.4.10-25.136.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ python3-curses-3.4.10-25.136.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ python36-base-3.6.15-61.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ libpython3_4m1_0-3.4.10-25.136.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
+
+ libpython3_6m1_0-3.6.15-61.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
+
+ python3-3.4.10-25.136.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
+
+ python3-base-3.4.10-25.136.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
+
+ python3-curses-3.4.10-25.136.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
+
+ python36-base-3.6.15-61.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
libpython3_6m1_0-3.6.15-150300.10.72.1 as a component of Image SLES15-SP4-SAP-Azure-LI-BYOS
@@ -4340,6 +4450,24 @@
python313-x86-64-v3-3.13.0~rc1-1.1 as a component of openSUSE Tumbleweed
+
+ python314-3.14.0~a1-1.1 as a component of openSUSE Tumbleweed
+
+
+ python314-curses-3.14.0~a1-1.1 as a component of openSUSE Tumbleweed
+
+
+ python314-dbm-3.14.0~a1-1.1 as a component of openSUSE Tumbleweed
+
+
+ python314-idle-3.14.0~a1-1.1 as a component of openSUSE Tumbleweed
+
+
+ python314-tk-3.14.0~a1-1.1 as a component of openSUSE Tumbleweed
+
+
+ python314-x86-64-v3-3.14.0~a1-1.1 as a component of openSUSE Tumbleweed
+
python38-3.8.19-7.1 as a component of openSUSE Tumbleweed
@@ -4370,6 +4498,18 @@
python39-tk-3.9.19-6.1 as a component of openSUSE Tumbleweed
+
+ venv-salt-minion-3006.0-150000.3.67.1 as a component of SUSE Manager Proxy Module 4.3
+
+
+ venv-salt-minion-3006.0-150000.3.67.1 as a component of SUSE Manager Server Module 4.3
+
+
+ venv-salt-minion-3006.0-3.65.1 as a component of SUSE Manager Tools 12
+
+
+ venv-salt-minion-3006.0-150000.3.67.1 as a component of SUSE Manager Tools 15
+
python as a component of SUSE Enterprise Storage 7.1
@@ -4763,6 +4903,23 @@
Image SLES12-SP5-Azure-SAP-BYOS:python3-base-3.4.10-25.136.1
Image SLES12-SP5-Azure-SAP-BYOS:python3-curses-3.4.10-25.136.1
Image SLES12-SP5-Azure-SAP-BYOS:python36-base-3.6.15-61.1
+ Image SLES12-SP5-GCE-BYOS:libpython3_4m1_0-3.4.10-25.136.1
+ Image SLES12-SP5-GCE-BYOS:libpython3_6m1_0-3.6.15-61.1
+ Image SLES12-SP5-GCE-BYOS:python3-3.4.10-25.136.1
+ Image SLES12-SP5-GCE-BYOS:python3-base-3.4.10-25.136.1
+ Image SLES12-SP5-GCE-BYOS:python36-base-3.6.15-61.1
+ Image SLES12-SP5-GCE-SAP-BYOS:libpython3_4m1_0-3.4.10-25.136.1
+ Image SLES12-SP5-GCE-SAP-BYOS:libpython3_6m1_0-3.6.15-61.1
+ Image SLES12-SP5-GCE-SAP-BYOS:python3-3.4.10-25.136.1
+ Image SLES12-SP5-GCE-SAP-BYOS:python3-base-3.4.10-25.136.1
+ Image SLES12-SP5-GCE-SAP-BYOS:python3-curses-3.4.10-25.136.1
+ Image SLES12-SP5-GCE-SAP-BYOS:python36-base-3.6.15-61.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:libpython3_4m1_0-3.4.10-25.136.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:libpython3_6m1_0-3.6.15-61.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:python3-3.4.10-25.136.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:python3-base-3.4.10-25.136.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:python3-curses-3.4.10-25.136.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:python36-base-3.6.15-61.1
Image SLES15-SP4-SAP-Azure-LI-BYOS:libpython3_6m1_0-3.6.15-150300.10.72.1
Image SLES15-SP4-SAP-Azure-LI-BYOS:python3-3.6.15-150300.10.72.1
Image SLES15-SP4-SAP-Azure-LI-BYOS:python3-base-3.6.15-150300.10.72.1
@@ -5518,6 +5675,12 @@
openSUSE Tumbleweed:python313-idle-3.13.0~rc1-1.1
openSUSE Tumbleweed:python313-tk-3.13.0~rc1-1.1
openSUSE Tumbleweed:python313-x86-64-v3-3.13.0~rc1-1.1
+ openSUSE Tumbleweed:python314-3.14.0~a1-1.1
+ openSUSE Tumbleweed:python314-curses-3.14.0~a1-1.1
+ openSUSE Tumbleweed:python314-dbm-3.14.0~a1-1.1
+ openSUSE Tumbleweed:python314-idle-3.14.0~a1-1.1
+ openSUSE Tumbleweed:python314-tk-3.14.0~a1-1.1
+ openSUSE Tumbleweed:python314-x86-64-v3-3.14.0~a1-1.1
openSUSE Tumbleweed:python38-3.8.19-7.1
openSUSE Tumbleweed:python38-curses-3.8.19-7.1
openSUSE Tumbleweed:python38-dbm-3.8.19-7.1
@@ -5529,6 +5692,12 @@
openSUSE Tumbleweed:python39-idle-3.9.19-6.1
openSUSE Tumbleweed:python39-tk-3.9.19-6.1
+
+ SUSE Manager Proxy Module 4.3:venv-salt-minion-3006.0-150000.3.67.1
+ SUSE Manager Server Module 4.3:venv-salt-minion-3006.0-150000.3.67.1
+ SUSE Manager Tools 12:venv-salt-minion-3006.0-3.65.1
+ SUSE Manager Tools 15:venv-salt-minion-3006.0-150000.3.67.1
+
SUSE Enterprise Storage 7.1:python
SUSE Enterprise Storage 7.1:python-tk
skipping CVE-2024-6874 as CVE page is older than CVRF-CVE file.
no cpe found for SUSE Package Hub 15 SP5 in CVE-2024-6779
no cpe found for SUSE Package Hub 15 SP6 in CVE-2024-6779
no cpe found for openSUSE Leap 15.5 NonFree in CVE-2024-6779
no cpe found for openSUSE Leap 15.6 NonFree in CVE-2024-6779
no cpe found for SUSE Package Hub 15 SP5 in CVE-2024-6778
no cpe found for SUSE Package Hub 15 SP6 in CVE-2024-6778
no cpe found for openSUSE Leap 15.5 NonFree in CVE-2024-6778
no cpe found for openSUSE Leap 15.6 NonFree in CVE-2024-6778
no cpe found for SUSE Package Hub 15 SP5 in CVE-2024-6777
no cpe found for SUSE Package Hub 15 SP6 in CVE-2024-6777
no cpe found for openSUSE Leap 15.5 NonFree in CVE-2024-6777
no cpe found for openSUSE Leap 15.6 NonFree in CVE-2024-6777
no cpe found for SUSE Package Hub 15 SP5 in CVE-2024-6776
no cpe found for SUSE Package Hub 15 SP6 in CVE-2024-6776
no cpe found for openSUSE Leap 15.5 NonFree in CVE-2024-6776
no cpe found for openSUSE Leap 15.6 NonFree in CVE-2024-6776
no cpe found for SUSE Package Hub 15 SP5 in CVE-2024-6775
no cpe found for SUSE Package Hub 15 SP6 in CVE-2024-6775
no cpe found for openSUSE Leap 15.5 NonFree in CVE-2024-6775
no cpe found for openSUSE Leap 15.6 NonFree in CVE-2024-6775
no cpe found for SUSE Package Hub 15 SP5 in CVE-2024-6774
no cpe found for SUSE Package Hub 15 SP6 in CVE-2024-6774
no cpe found for openSUSE Leap 15.5 NonFree in CVE-2024-6774
no cpe found for openSUSE Leap 15.6 NonFree in CVE-2024-6774
no cpe found for SUSE Package Hub 15 SP5 in CVE-2024-6773
no cpe found for SUSE Package Hub 15 SP6 in CVE-2024-6773
no cpe found for openSUSE Leap 15.5 NonFree in CVE-2024-6773
no cpe found for openSUSE Leap 15.6 NonFree in CVE-2024-6773
no cpe found for SUSE Package Hub 15 SP5 in CVE-2024-6772
no cpe found for SUSE Package Hub 15 SP6 in CVE-2024-6772
no cpe found for openSUSE Leap 15.5 NonFree in CVE-2024-6772
no cpe found for openSUSE Leap 15.6 NonFree in CVE-2024-6772
no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2024-6655
skipping CVE-2024-6716 as CVE page is older than CVRF-CVE file.
--- /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2024-6655.xml 2024-10-20 01:29:18.094008000 +0200
+++ /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2024-6655.xml.new 2024-10-29 01:23:31.289908000 +0100
@@ -14,13 +14,13 @@
1
- 27
- 2024-10-19T23:29:17Z
+ 28
+ 2024-10-29T00:23:30Z
current
2024-07-12T23:18:39Z
- 2024-10-19T23:29:17Z
+ 2024-10-29T00:23:30Z
cve-database/bin/generate-cvrf-cve.pl
2020-12-27T01:00:00Z
@@ -94,6 +94,16 @@
Image SLES12-SP5-EC2-SAP-On-Demand
+
+
+ Image SLES12-SP5-GCE-SAP-BYOS
+
+
+
+
+ Image SLES12-SP5-GCE-SAP-On-Demand
+
+
Image SLES12-SP5-SAP-Azure-LI-BYOS-Production
@@ -1602,6 +1612,18 @@
libgtk-2_0-0-2.24.31-9.9.1 as a component of Image SLES12-SP5-EC2-SAP-On-Demand
+
+ gtk2-tools-2.24.31-9.9.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ libgtk-2_0-0-2.24.31-9.9.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ gtk2-tools-2.24.31-9.9.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
+
+ libgtk-2_0-0-2.24.31-9.9.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
gtk2-tools-2.24.31-9.9.1 as a component of Image SLES12-SP5-SAP-Azure-LI-BYOS-Production
@@ -4053,48 +4075,9 @@
gtk3 as a component of SUSE Linux Enterprise Server for SAP Applications 12 SP4
-
- gtk2-data as a component of SUSE Linux Enterprise Server for SAP Applications 12 SP5
-
-
- gtk2-lang as a component of SUSE Linux Enterprise Server for SAP Applications 12 SP5
-
-
- gtk2-tools as a component of SUSE Linux Enterprise Server for SAP Applications 12 SP5
-
-
- gtk2-tools-32bit as a component of SUSE Linux Enterprise Server for SAP Applications 12 SP5
-
-
- libgtk-2_0-0 as a component of SUSE Linux Enterprise Server for SAP Applications 12 SP5
-
-
- libgtk-2_0-0-32bit as a component of SUSE Linux Enterprise Server for SAP Applications 12 SP5
-
gtk2 as a component of SUSE Linux Enterprise Server for SAP Applications 12 SP5
-
- gtk3-data as a component of SUSE Linux Enterprise Server for SAP Applications 12 SP5
-
-
- gtk3-lang as a component of SUSE Linux Enterprise Server for SAP Applications 12 SP5
-
-
- gtk3-tools as a component of SUSE Linux Enterprise Server for SAP Applications 12 SP5
-
-
- gtk3-tools-32bit as a component of SUSE Linux Enterprise Server for SAP Applications 12 SP5
-
-
- libgtk-3-0 as a component of SUSE Linux Enterprise Server for SAP Applications 12 SP5
-
-
- libgtk-3-0-32bit as a component of SUSE Linux Enterprise Server for SAP Applications 12 SP5
-
-
- typelib-1_0-Gtk-3_0 as a component of SUSE Linux Enterprise Server for SAP Applications 12 SP5
-
gtk3 as a component of SUSE Linux Enterprise Server for SAP Applications 12 SP5
@@ -4240,6 +4223,10 @@
Image SLES12-SP5-EC2-SAP-BYOS:libgtk-2_0-0-2.24.31-9.9.1
Image SLES12-SP5-EC2-SAP-On-Demand:gtk2-tools-2.24.31-9.9.1
Image SLES12-SP5-EC2-SAP-On-Demand:libgtk-2_0-0-2.24.31-9.9.1
+ Image SLES12-SP5-GCE-SAP-BYOS:gtk2-tools-2.24.31-9.9.1
+ Image SLES12-SP5-GCE-SAP-BYOS:libgtk-2_0-0-2.24.31-9.9.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:gtk2-tools-2.24.31-9.9.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:libgtk-2_0-0-2.24.31-9.9.1
Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:gtk2-tools-2.24.31-9.9.1
Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:gtk3-data-3.20.10-17.16.1
Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:gtk3-tools-3.20.10-17.16.1
No V5 entry found for CVE-2024-6597 / /home/securitybot/prod/cve-database/cvelistV5/cves/2024/6xxxx/CVE-2024-6597.json:No such file or directory
skipping CVE-2024-6615 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-6614 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-6613 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-6612 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-6611 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-6610 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-6609 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-6608 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-6607 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-6606 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-6605 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-6604 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-6603 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-6602 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-6601 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-6600 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-6519 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-6505 as CVE page is older than CVRF-CVE file.
no cpe found for SUSE Liberty Linux 7 LTSS in CVE-2024-6345
no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2024-6345
skipping CVE-2024-6472 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-6409 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-6387 as CVE page is older than CVRF-CVE file.
--- /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2024-6345.xml 2024-10-20 01:29:32.310656000 +0200
+++ /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2024-6345.xml.new 2024-10-29 01:23:33.627726000 +0100
@@ -14,13 +14,13 @@
1
- 36
- 2024-10-19T23:29:31Z
+ 37
+ 2024-10-29T00:23:33Z
current
2024-07-18T23:19:40Z
- 2024-10-19T23:29:31Z
+ 2024-10-29T00:23:33Z
cve-database/bin/generate-cvrf-cve.pl
2020-12-27T01:00:00Z
@@ -150,6 +150,21 @@
Image SLES12-SP5-EC2-BYOS
+
+
+ Image SLES12-SP5-GCE-BYOS
+
+
+
+
+ Image SLES12-SP5-GCE-SAP-BYOS
+
+
+
+
+ Image SLES12-SP5-GCE-SAP-On-Demand
+
+
Image SLES12-SP5-SAP-Azure-LI-BYOS-Production
@@ -1027,6 +1042,11 @@
SUSE Manager Proxy 4.3
+
+
+ SUSE Manager Proxy Module 4.3
+
+
SUSE Linux Enterprise Module for Public Cloud 15 SP4
@@ -1043,6 +1063,21 @@
SUSE Manager Server 4.3
+
+
+ SUSE Manager Server Module 4.3
+
+
+
+
+ SUSE Manager Tools 12
+
+
+
+
+ SUSE Manager Tools 15
+
+
openSUSE Leap 15.5
@@ -1751,6 +1786,12 @@
venv-salt-minion
+
+ venv-salt-minion-3006.0-150000.3.67.1
+
+
+ venv-salt-minion-3006.0-3.65.1
+
python3-setuptools-44.1.1-150400.9.9.1 as a component of Container bci/kiwi:9.24.43-10.4
@@ -1799,6 +1840,24 @@
python3-setuptools-40.6.2-4.24.1 as a component of Image SLES12-SP5-EC2-BYOS
+
+ python-setuptools-40.6.2-4.24.1 as a component of Image SLES12-SP5-GCE-BYOS
+
+
+ python3-setuptools-40.6.2-4.24.1 as a component of Image SLES12-SP5-GCE-BYOS
+
+
+ python-setuptools-40.6.2-4.24.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ python3-setuptools-40.6.2-4.24.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ python-setuptools-40.6.2-4.24.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
+
+ python3-setuptools-40.6.2-4.24.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
python-setuptools-40.6.2-4.24.1 as a component of Image SLES12-SP5-SAP-Azure-LI-BYOS-Production
@@ -2867,6 +2926,18 @@
python312-setuptools-wheel-72.1.0-1.1 as a component of openSUSE Tumbleweed
+
+ venv-salt-minion-3006.0-150000.3.67.1 as a component of SUSE Manager Proxy Module 4.3
+
+
+ venv-salt-minion-3006.0-150000.3.67.1 as a component of SUSE Manager Server Module 4.3
+
+
+ venv-salt-minion-3006.0-3.65.1 as a component of SUSE Manager Tools 12
+
+
+ venv-salt-minion-3006.0-150000.3.67.1 as a component of SUSE Manager Tools 15
+
python-setuptools as a component of SUSE Linux Enterprise Server 12 SP4-LTSS
@@ -2942,6 +3013,12 @@
Image SLES12-SP5-Azure-SAP-BYOS:python3-setuptools-40.6.2-4.24.1
Image SLES12-SP5-EC2-BYOS:python-setuptools-40.6.2-4.24.1
Image SLES12-SP5-EC2-BYOS:python3-setuptools-40.6.2-4.24.1
+ Image SLES12-SP5-GCE-BYOS:python-setuptools-40.6.2-4.24.1
+ Image SLES12-SP5-GCE-BYOS:python3-setuptools-40.6.2-4.24.1
+ Image SLES12-SP5-GCE-SAP-BYOS:python-setuptools-40.6.2-4.24.1
+ Image SLES12-SP5-GCE-SAP-BYOS:python3-setuptools-40.6.2-4.24.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:python-setuptools-40.6.2-4.24.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:python3-setuptools-40.6.2-4.24.1
Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:python-setuptools-40.6.2-4.24.1
Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:python3-setuptools-40.6.2-4.24.1
Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production:python-setuptools-40.6.2-4.24.1
@@ -3299,6 +3376,12 @@
openSUSE Tumbleweed:python312-setuptools-72.1.0-1.1
openSUSE Tumbleweed:python312-setuptools-wheel-72.1.0-1.1
+
+ SUSE Manager Proxy Module 4.3:venv-salt-minion-3006.0-150000.3.67.1
+ SUSE Manager Server Module 4.3:venv-salt-minion-3006.0-150000.3.67.1
+ SUSE Manager Tools 12:venv-salt-minion-3006.0-3.65.1
+ SUSE Manager Tools 15:venv-salt-minion-3006.0-150000.3.67.1
+
chost:amazon/suse-sles-15-sp3-chost-byos-v20240912-hvm-ssd-x86_64
chost:amazon/suse-sles-15-sp4-chost-byos-v20240912-hvm-ssd-x86_64
no cpe found for SUSE Package Hub 15 SP5 in CVE-2024-6293
no cpe found for SUSE Package Hub 15 SP6 in CVE-2024-6293
no cpe found for openSUSE Leap 15.5 NonFree in CVE-2024-6293
no cpe found for openSUSE Leap 15.6 NonFree in CVE-2024-6293
no cpe found for SUSE Package Hub 15 SP5 in CVE-2024-6292
no cpe found for SUSE Package Hub 15 SP6 in CVE-2024-6292
no cpe found for openSUSE Leap 15.5 NonFree in CVE-2024-6292
no cpe found for openSUSE Leap 15.6 NonFree in CVE-2024-6292
no cpe found for SUSE Package Hub 15 SP5 in CVE-2024-6291
no cpe found for SUSE Package Hub 15 SP6 in CVE-2024-6291
no cpe found for openSUSE Leap 15.5 NonFree in CVE-2024-6291
no cpe found for openSUSE Leap 15.6 NonFree in CVE-2024-6291
no cpe found for SUSE Package Hub 15 SP5 in CVE-2024-6290
no cpe found for SUSE Package Hub 15 SP6 in CVE-2024-6290
no cpe found for openSUSE Leap 15.5 NonFree in CVE-2024-6290
no cpe found for openSUSE Leap 15.6 NonFree in CVE-2024-6290
no cpe found for SUSE Package Hub 15 SP5 in CVE-2024-6257
no cpe found for SUSE Package Hub 15 SP6 in CVE-2024-6257
skipping CVE-2024-6239 as CVE page is older than CVRF-CVE file.
no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2024-6232
--- /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2024-6232.xml 2024-10-26 01:18:26.067054000 +0200
+++ /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2024-6232.xml.new 2024-10-29 01:23:37.787053000 +0100
@@ -14,13 +14,13 @@
1
- 26
- 2024-10-25T23:18:25Z
+ 27
+ 2024-10-29T00:23:36Z
current
2024-09-05T23:20:53Z
- 2024-10-25T23:18:25Z
+ 2024-10-29T00:23:36Z
cve-database/bin/generate-cvrf-cve.pl
2020-12-27T01:00:00Z
@@ -217,6 +217,21 @@
Container suse/sles/15.7/libguestfs-tools:1.1.1.28.45
+
+
+ Image SLES12-SP5-GCE-BYOS
+
+
+
+
+ Image SLES12-SP5-GCE-SAP-BYOS
+
+
+
+
+ Image SLES12-SP5-GCE-SAP-On-Demand
+
+
Image SLES15-SP4-SAP-Azure-LI-BYOS
@@ -1515,6 +1530,24 @@
python313-x86-64-v3-3.13.0~rc2-1.1
+
+ python314-3.14.0~a1-1.1
+
+
+ python314-curses-3.14.0~a1-1.1
+
+
+ python314-dbm-3.14.0~a1-1.1
+
+
+ python314-idle-3.14.0~a1-1.1
+
+
+ python314-tk-3.14.0~a1-1.1
+
+
+ python314-x86-64-v3-3.14.0~a1-1.1
+
python36
@@ -1797,6 +1830,57 @@
python3-base-3.6.15-150300.10.72.1 as a component of Container suse/sles/15.7/libguestfs-tools:1.1.1.28.45
+
+ libpython3_4m1_0-3.4.10-25.139.1 as a component of Image SLES12-SP5-GCE-BYOS
+
+
+ libpython3_6m1_0-3.6.15-67.1 as a component of Image SLES12-SP5-GCE-BYOS
+
+
+ python3-3.4.10-25.139.1 as a component of Image SLES12-SP5-GCE-BYOS
+
+
+ python3-base-3.4.10-25.139.1 as a component of Image SLES12-SP5-GCE-BYOS
+
+
+ python36-base-3.6.15-67.1 as a component of Image SLES12-SP5-GCE-BYOS
+
+
+ libpython3_4m1_0-3.4.10-25.139.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ libpython3_6m1_0-3.6.15-67.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ python3-3.4.10-25.139.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ python3-base-3.4.10-25.139.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ python3-curses-3.4.10-25.139.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ python36-base-3.6.15-67.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ libpython3_4m1_0-3.4.10-25.139.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
+
+ libpython3_6m1_0-3.6.15-67.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
+
+ python3-3.4.10-25.139.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
+
+ python3-base-3.4.10-25.139.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
+
+ python3-curses-3.4.10-25.139.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
+
+ python36-base-3.6.15-67.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
libpython3_6m1_0-3.6.15-150300.10.72.1 as a component of Image SLES15-SP4-SAP-Azure-LI-BYOS
@@ -3786,6 +3870,24 @@
python313-x86-64-v3-3.13.0~rc2-1.1 as a component of openSUSE Tumbleweed
+
+ python314-3.14.0~a1-1.1 as a component of openSUSE Tumbleweed
+
+
+ python314-curses-3.14.0~a1-1.1 as a component of openSUSE Tumbleweed
+
+
+ python314-dbm-3.14.0~a1-1.1 as a component of openSUSE Tumbleweed
+
+
+ python314-idle-3.14.0~a1-1.1 as a component of openSUSE Tumbleweed
+
+
+ python314-tk-3.14.0~a1-1.1 as a component of openSUSE Tumbleweed
+
+
+ python314-x86-64-v3-3.14.0~a1-1.1 as a component of openSUSE Tumbleweed
+
python38-3.8.20-1.1 as a component of openSUSE Tumbleweed
@@ -4397,6 +4499,23 @@
Container suse/sle-micro/5.5/toolbox:13.2-3.5.59:python3-base-3.6.15-150300.10.72.1
Container suse/sles/15.7/libguestfs-tools:1.1.1.28.45:libpython3_6m1_0-3.6.15-150300.10.72.1
Container suse/sles/15.7/libguestfs-tools:1.1.1.28.45:python3-base-3.6.15-150300.10.72.1
+ Image SLES12-SP5-GCE-BYOS:libpython3_4m1_0-3.4.10-25.139.1
+ Image SLES12-SP5-GCE-BYOS:libpython3_6m1_0-3.6.15-67.1
+ Image SLES12-SP5-GCE-BYOS:python3-3.4.10-25.139.1
+ Image SLES12-SP5-GCE-BYOS:python3-base-3.4.10-25.139.1
+ Image SLES12-SP5-GCE-BYOS:python36-base-3.6.15-67.1
+ Image SLES12-SP5-GCE-SAP-BYOS:libpython3_4m1_0-3.4.10-25.139.1
+ Image SLES12-SP5-GCE-SAP-BYOS:libpython3_6m1_0-3.6.15-67.1
+ Image SLES12-SP5-GCE-SAP-BYOS:python3-3.4.10-25.139.1
+ Image SLES12-SP5-GCE-SAP-BYOS:python3-base-3.4.10-25.139.1
+ Image SLES12-SP5-GCE-SAP-BYOS:python3-curses-3.4.10-25.139.1
+ Image SLES12-SP5-GCE-SAP-BYOS:python36-base-3.6.15-67.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:libpython3_4m1_0-3.4.10-25.139.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:libpython3_6m1_0-3.6.15-67.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:python3-3.4.10-25.139.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:python3-base-3.4.10-25.139.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:python3-curses-3.4.10-25.139.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:python36-base-3.6.15-67.1
Image SLES15-SP4-SAP-Azure-LI-BYOS:libpython3_6m1_0-3.6.15-150300.10.72.1
Image SLES15-SP4-SAP-Azure-LI-BYOS:python3-3.6.15-150300.10.72.1
Image SLES15-SP4-SAP-Azure-LI-BYOS:python3-base-3.6.15-150300.10.72.1
@@ -5060,6 +5179,12 @@
openSUSE Tumbleweed:python313-idle-3.13.0~rc2-1.1
openSUSE Tumbleweed:python313-tk-3.13.0~rc2-1.1
openSUSE Tumbleweed:python313-x86-64-v3-3.13.0~rc2-1.1
+ openSUSE Tumbleweed:python314-3.14.0~a1-1.1
+ openSUSE Tumbleweed:python314-curses-3.14.0~a1-1.1
+ openSUSE Tumbleweed:python314-dbm-3.14.0~a1-1.1
+ openSUSE Tumbleweed:python314-idle-3.14.0~a1-1.1
+ openSUSE Tumbleweed:python314-tk-3.14.0~a1-1.1
+ openSUSE Tumbleweed:python314-x86-64-v3-3.14.0~a1-1.1
openSUSE Tumbleweed:python38-3.8.20-1.1
openSUSE Tumbleweed:python38-curses-3.8.20-1.1
openSUSE Tumbleweed:python38-dbm-3.8.20-1.1
no cpe found for SUSE Package Hub 15 SP6 in CVE-2024-6126
skipping CVE-2024-6197 as CVE page is older than CVRF-CVE file.
no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2024-6119
no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2024-6104
no cpe found for SUSE Manager Tools for SLE Micro 5 in CVE-2024-6104
no cpe found for SUSE Package Hub 15 SP5 in CVE-2024-6104
no cpe found for SUSE Package Hub 15 SP6 in CVE-2024-6104
no cpe found for SUSE Package Hub 15 SP5 in CVE-2024-6103
no cpe found for SUSE Package Hub 15 SP6 in CVE-2024-6103
no cpe found for SUSE Package Hub 15 SP5 in CVE-2024-6102
no cpe found for SUSE Package Hub 15 SP6 in CVE-2024-6102
no cpe found for SUSE Package Hub 15 SP5 in CVE-2024-6101
no cpe found for SUSE Package Hub 15 SP6 in CVE-2024-6101
no cpe found for SUSE Package Hub 15 SP5 in CVE-2024-6100
no cpe found for SUSE Package Hub 15 SP6 in CVE-2024-6100
no cpe found for SUSE Liberty Linux 7 LTSS in CVE-2024-5953
no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2024-5953
--- /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2024-5953.xml 2024-09-27 01:23:31.967715000 +0200
+++ /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2024-5953.xml.new 2024-10-29 01:23:41.800836000 +0100
@@ -14,13 +14,13 @@
1
- 17
- 2024-09-26T23:23:31Z
+ 18
+ 2024-10-29T00:23:41Z
current
2024-06-13T23:19:00Z
- 2024-09-26T23:23:31Z
+ 2024-10-29T00:23:41Z
cve-database/bin/generate-cvrf-cve.pl
2020-12-27T01:00:00Z
@@ -221,6 +221,12 @@
389-ds-2.0.20~git9.5e2d637c-150400.3.42.3
+
+ 389-ds-2.2.10~git18.20ce9289-150500.3.24.1
+
+
+ 389-ds-2.2.10~git18.20ce9289-150600.8.10.1
+
389-ds-2.2.10~git2.345056d3-150500.3.21.1
@@ -275,6 +281,12 @@
389-ds-devel-2.0.20~git9.5e2d637c-150400.3.42.3
+
+ 389-ds-devel-2.2.10~git18.20ce9289-150500.3.24.1
+
+
+ 389-ds-devel-2.2.10~git18.20ce9289-150600.8.10.1
+
389-ds-devel-2.2.10~git2.345056d3-150500.3.21.1
@@ -287,6 +299,12 @@
389-ds-snmp
+
+ 389-ds-snmp-2.2.10~git18.20ce9289-150500.3.24.1
+
+
+ 389-ds-snmp-2.2.10~git18.20ce9289-150600.8.10.1
+
389-ds-snmp-2.2.10~git2.345056d3-150500.3.21.1
@@ -305,6 +323,12 @@
lib389-2.0.20~git9.5e2d637c-150400.3.42.3
+
+ lib389-2.2.10~git18.20ce9289-150500.3.24.1
+
+
+ lib389-2.2.10~git18.20ce9289-150600.8.10.1
+
lib389-2.2.10~git2.345056d3-150500.3.21.1
@@ -323,6 +347,12 @@
libsvrcore0-2.0.20~git9.5e2d637c-150400.3.42.3
+
+ libsvrcore0-2.2.10~git18.20ce9289-150500.3.24.1
+
+
+ libsvrcore0-2.2.10~git18.20ce9289-150600.8.10.1
+
libsvrcore0-2.2.10~git2.345056d3-150500.3.21.1
@@ -602,6 +632,60 @@
libsvrcore0-3.1.1~git0.aef1668-1.1 as a component of openSUSE Tumbleweed
+
+ 389-ds-2.2.10~git18.20ce9289-150500.3.24.1 as a component of SUSE Linux Enterprise Module for Server Applications 15 SP5
+
+
+ 389-ds-devel-2.2.10~git18.20ce9289-150500.3.24.1 as a component of SUSE Linux Enterprise Module for Server Applications 15 SP5
+
+
+ lib389-2.2.10~git18.20ce9289-150500.3.24.1 as a component of SUSE Linux Enterprise Module for Server Applications 15 SP5
+
+
+ libsvrcore0-2.2.10~git18.20ce9289-150500.3.24.1 as a component of SUSE Linux Enterprise Module for Server Applications 15 SP5
+
+
+ 389-ds-2.2.10~git18.20ce9289-150600.8.10.1 as a component of SUSE Linux Enterprise Module for Server Applications 15 SP6
+
+
+ 389-ds-devel-2.2.10~git18.20ce9289-150600.8.10.1 as a component of SUSE Linux Enterprise Module for Server Applications 15 SP6
+
+
+ lib389-2.2.10~git18.20ce9289-150600.8.10.1 as a component of SUSE Linux Enterprise Module for Server Applications 15 SP6
+
+
+ libsvrcore0-2.2.10~git18.20ce9289-150600.8.10.1 as a component of SUSE Linux Enterprise Module for Server Applications 15 SP6
+
+
+ 389-ds-2.2.10~git18.20ce9289-150500.3.24.1 as a component of openSUSE Leap 15.5
+
+
+ 389-ds-devel-2.2.10~git18.20ce9289-150500.3.24.1 as a component of openSUSE Leap 15.5
+
+
+ 389-ds-snmp-2.2.10~git18.20ce9289-150500.3.24.1 as a component of openSUSE Leap 15.5
+
+
+ lib389-2.2.10~git18.20ce9289-150500.3.24.1 as a component of openSUSE Leap 15.5
+
+
+ libsvrcore0-2.2.10~git18.20ce9289-150500.3.24.1 as a component of openSUSE Leap 15.5
+
+
+ 389-ds-2.2.10~git18.20ce9289-150600.8.10.1 as a component of openSUSE Leap 15.6
+
+
+ 389-ds-devel-2.2.10~git18.20ce9289-150600.8.10.1 as a component of openSUSE Leap 15.6
+
+
+ 389-ds-snmp-2.2.10~git18.20ce9289-150600.8.10.1 as a component of openSUSE Leap 15.6
+
+
+ lib389-2.2.10~git18.20ce9289-150600.8.10.1 as a component of openSUSE Leap 15.6
+
+
+ libsvrcore0-2.2.10~git18.20ce9289-150600.8.10.1 as a component of openSUSE Leap 15.6
+
389-ds as a component of SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS
@@ -759,6 +843,26 @@
openSUSE Tumbleweed:lib389-3.1.1~git0.aef1668-1.1
openSUSE Tumbleweed:libsvrcore0-3.1.1~git0.aef1668-1.1
+
+ SUSE Linux Enterprise Module for Server Applications 15 SP5:389-ds-2.2.10~git18.20ce9289-150500.3.24.1
+ SUSE Linux Enterprise Module for Server Applications 15 SP5:389-ds-devel-2.2.10~git18.20ce9289-150500.3.24.1
+ SUSE Linux Enterprise Module for Server Applications 15 SP5:lib389-2.2.10~git18.20ce9289-150500.3.24.1
+ SUSE Linux Enterprise Module for Server Applications 15 SP5:libsvrcore0-2.2.10~git18.20ce9289-150500.3.24.1
+ SUSE Linux Enterprise Module for Server Applications 15 SP6:389-ds-2.2.10~git18.20ce9289-150600.8.10.1
+ SUSE Linux Enterprise Module for Server Applications 15 SP6:389-ds-devel-2.2.10~git18.20ce9289-150600.8.10.1
+ SUSE Linux Enterprise Module for Server Applications 15 SP6:lib389-2.2.10~git18.20ce9289-150600.8.10.1
+ SUSE Linux Enterprise Module for Server Applications 15 SP6:libsvrcore0-2.2.10~git18.20ce9289-150600.8.10.1
+ openSUSE Leap 15.5:389-ds-2.2.10~git18.20ce9289-150500.3.24.1
+ openSUSE Leap 15.5:389-ds-devel-2.2.10~git18.20ce9289-150500.3.24.1
+ openSUSE Leap 15.5:389-ds-snmp-2.2.10~git18.20ce9289-150500.3.24.1
+ openSUSE Leap 15.5:lib389-2.2.10~git18.20ce9289-150500.3.24.1
+ openSUSE Leap 15.5:libsvrcore0-2.2.10~git18.20ce9289-150500.3.24.1
+ openSUSE Leap 15.6:389-ds-2.2.10~git18.20ce9289-150600.8.10.1
+ openSUSE Leap 15.6:389-ds-devel-2.2.10~git18.20ce9289-150600.8.10.1
+ openSUSE Leap 15.6:389-ds-snmp-2.2.10~git18.20ce9289-150600.8.10.1
+ openSUSE Leap 15.6:lib389-2.2.10~git18.20ce9289-150600.8.10.1
+ openSUSE Leap 15.6:libsvrcore0-2.2.10~git18.20ce9289-150600.8.10.1
+
no cpe found for SUSE Package Hub 15 SP5 in CVE-2024-5847
no cpe found for SUSE Package Hub 15 SP6 in CVE-2024-5847
no cpe found for openSUSE Leap 15.5 NonFree in CVE-2024-5847
no cpe found for openSUSE Leap 15.6 NonFree in CVE-2024-5847
no cpe found for SUSE Package Hub 15 SP5 in CVE-2024-5846
no cpe found for SUSE Package Hub 15 SP6 in CVE-2024-5846
no cpe found for openSUSE Leap 15.5 NonFree in CVE-2024-5846
no cpe found for openSUSE Leap 15.6 NonFree in CVE-2024-5846
no cpe found for SUSE Package Hub 15 SP5 in CVE-2024-5845
no cpe found for SUSE Package Hub 15 SP6 in CVE-2024-5845
no cpe found for openSUSE Leap 15.5 NonFree in CVE-2024-5845
no cpe found for openSUSE Leap 15.6 NonFree in CVE-2024-5845
no cpe found for SUSE Package Hub 15 SP5 in CVE-2024-5844
no cpe found for SUSE Package Hub 15 SP6 in CVE-2024-5844
no cpe found for openSUSE Leap 15.5 NonFree in CVE-2024-5844
no cpe found for openSUSE Leap 15.6 NonFree in CVE-2024-5844
no cpe found for SUSE Package Hub 15 SP5 in CVE-2024-5843
no cpe found for SUSE Package Hub 15 SP6 in CVE-2024-5843
no cpe found for openSUSE Leap 15.5 NonFree in CVE-2024-5843
no cpe found for openSUSE Leap 15.6 NonFree in CVE-2024-5843
no cpe found for SUSE Package Hub 15 SP5 in CVE-2024-5842
no cpe found for SUSE Package Hub 15 SP6 in CVE-2024-5842
no cpe found for openSUSE Leap 15.5 NonFree in CVE-2024-5842
no cpe found for openSUSE Leap 15.6 NonFree in CVE-2024-5842
no cpe found for SUSE Package Hub 15 SP5 in CVE-2024-5841
no cpe found for SUSE Package Hub 15 SP6 in CVE-2024-5841
no cpe found for openSUSE Leap 15.5 NonFree in CVE-2024-5841
no cpe found for openSUSE Leap 15.6 NonFree in CVE-2024-5841
no cpe found for SUSE Package Hub 15 SP5 in CVE-2024-5840
no cpe found for SUSE Package Hub 15 SP6 in CVE-2024-5840
no cpe found for openSUSE Leap 15.5 NonFree in CVE-2024-5840
no cpe found for openSUSE Leap 15.6 NonFree in CVE-2024-5840
no cpe found for SUSE Package Hub 15 SP5 in CVE-2024-5839
no cpe found for SUSE Package Hub 15 SP6 in CVE-2024-5839
no cpe found for openSUSE Leap 15.5 NonFree in CVE-2024-5839
no cpe found for openSUSE Leap 15.6 NonFree in CVE-2024-5839
no cpe found for SUSE Package Hub 15 SP5 in CVE-2024-5838
no cpe found for SUSE Package Hub 15 SP6 in CVE-2024-5838
no cpe found for openSUSE Leap 15.5 NonFree in CVE-2024-5838
no cpe found for openSUSE Leap 15.6 NonFree in CVE-2024-5838
no cpe found for SUSE Package Hub 15 SP5 in CVE-2024-5837
no cpe found for SUSE Package Hub 15 SP6 in CVE-2024-5837
no cpe found for openSUSE Leap 15.5 NonFree in CVE-2024-5837
no cpe found for openSUSE Leap 15.6 NonFree in CVE-2024-5837
no cpe found for SUSE Package Hub 15 SP5 in CVE-2024-5836
no cpe found for SUSE Package Hub 15 SP6 in CVE-2024-5836
no cpe found for openSUSE Leap 15.5 NonFree in CVE-2024-5836
no cpe found for openSUSE Leap 15.6 NonFree in CVE-2024-5836
no cpe found for SUSE Package Hub 15 SP5 in CVE-2024-5835
no cpe found for SUSE Package Hub 15 SP6 in CVE-2024-5835
no cpe found for openSUSE Leap 15.5 NonFree in CVE-2024-5835
no cpe found for openSUSE Leap 15.6 NonFree in CVE-2024-5835
no cpe found for SUSE Package Hub 15 SP5 in CVE-2024-5834
no cpe found for SUSE Package Hub 15 SP6 in CVE-2024-5834
no cpe found for openSUSE Leap 15.5 NonFree in CVE-2024-5834
no cpe found for openSUSE Leap 15.6 NonFree in CVE-2024-5834
no cpe found for SUSE Package Hub 15 SP5 in CVE-2024-5833
no cpe found for SUSE Package Hub 15 SP6 in CVE-2024-5833
no cpe found for openSUSE Leap 15.5 NonFree in CVE-2024-5833
no cpe found for openSUSE Leap 15.6 NonFree in CVE-2024-5833
no cpe found for SUSE Package Hub 15 SP5 in CVE-2024-5832
no cpe found for SUSE Package Hub 15 SP6 in CVE-2024-5832
no cpe found for openSUSE Leap 15.5 NonFree in CVE-2024-5832
no cpe found for openSUSE Leap 15.6 NonFree in CVE-2024-5832
no cpe found for SUSE Package Hub 15 SP5 in CVE-2024-5831
no cpe found for SUSE Package Hub 15 SP6 in CVE-2024-5831
no cpe found for openSUSE Leap 15.5 NonFree in CVE-2024-5831
no cpe found for openSUSE Leap 15.6 NonFree in CVE-2024-5831
no cpe found for SUSE Package Hub 15 SP5 in CVE-2024-5830
no cpe found for SUSE Package Hub 15 SP6 in CVE-2024-5830
no cpe found for openSUSE Leap 15.5 NonFree in CVE-2024-5830
no cpe found for openSUSE Leap 15.6 NonFree in CVE-2024-5830
no cpe found for SUSE Package Hub 15 SP5 in CVE-2024-5742
no cpe found for SUSE Package Hub 15 SP6 in CVE-2024-5742
skipping CVE-2024-5702 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-5701 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-5700 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-5699 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-5698 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-5697 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-5696 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-5695 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-5694 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-5693 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-5692 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-5691 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-5690 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-5688 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-5687 as CVE page is older than CVRF-CVE file.
no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2024-5642
--- /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2024-5642.xml 2024-10-26 01:18:36.136055000 +0200
+++ /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2024-5642.xml.new 2024-10-29 01:23:49.911976000 +0100
@@ -14,13 +14,13 @@
1
- 26
- 2024-10-25T23:18:35Z
+ 27
+ 2024-10-29T00:23:49Z
current
2024-07-01T23:17:22Z
- 2024-10-25T23:18:35Z
+ 2024-10-29T00:23:49Z
cve-database/bin/generate-cvrf-cve.pl
2020-12-27T01:00:00Z
@@ -154,6 +154,21 @@
Container suse/sles/15.7/libguestfs-tools:1.1.1.28.45
+
+
+ Image SLES12-SP5-GCE-BYOS
+
+
+
+
+ Image SLES12-SP5-GCE-SAP-BYOS
+
+
+
+
+ Image SLES12-SP5-GCE-SAP-On-Demand
+
+
Image SLES15-SP4-SAP-Azure-LI-BYOS
@@ -1327,6 +1342,24 @@
python3-base-3.6.15-150300.10.72.1 as a component of Container suse/sles/15.7/libguestfs-tools:1.1.1.28.45
+
+ libpython3_6m1_0-3.6.15-64.1 as a component of Image SLES12-SP5-GCE-BYOS
+
+
+ python36-base-3.6.15-64.1 as a component of Image SLES12-SP5-GCE-BYOS
+
+
+ libpython3_6m1_0-3.6.15-64.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ python36-base-3.6.15-64.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ libpython3_6m1_0-3.6.15-64.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
+
+ python36-base-3.6.15-64.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
libpython3_6m1_0-3.6.15-150300.10.72.1 as a component of Image SLES15-SP4-SAP-Azure-LI-BYOS
@@ -3079,6 +3112,12 @@
Container suse/sle-micro/5.5/toolbox:13.2-3.5.59:python3-base-3.6.15-150300.10.72.1
Container suse/sles/15.7/libguestfs-tools:1.1.1.28.45:libpython3_6m1_0-3.6.15-150300.10.72.1
Container suse/sles/15.7/libguestfs-tools:1.1.1.28.45:python3-base-3.6.15-150300.10.72.1
+ Image SLES12-SP5-GCE-BYOS:libpython3_6m1_0-3.6.15-64.1
+ Image SLES12-SP5-GCE-BYOS:python36-base-3.6.15-64.1
+ Image SLES12-SP5-GCE-SAP-BYOS:libpython3_6m1_0-3.6.15-64.1
+ Image SLES12-SP5-GCE-SAP-BYOS:python36-base-3.6.15-64.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:libpython3_6m1_0-3.6.15-64.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:python36-base-3.6.15-64.1
Image SLES15-SP4-SAP-Azure-LI-BYOS:libpython3_6m1_0-3.6.15-150300.10.72.1
Image SLES15-SP4-SAP-Azure-LI-BYOS:python3-3.6.15-150300.10.72.1
Image SLES15-SP4-SAP-Azure-LI-BYOS:python3-base-3.6.15-150300.10.72.1
no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2024-5569
--- /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2024-5569.xml 2024-10-19 01:31:48.493724000 +0200
+++ /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2024-5569.xml.new 2024-10-29 01:23:51.964796000 +0100
@@ -14,13 +14,13 @@
1
- 9
- 2024-10-18T23:31:48Z
+ 10
+ 2024-10-29T00:23:51Z
current
2024-07-09T23:18:07Z
- 2024-10-18T23:31:48Z
+ 2024-10-29T00:23:51Z
cve-database/bin/generate-cvrf-cve.pl
2020-12-27T01:00:00Z
@@ -486,6 +486,11 @@
SUSE Manager Proxy 4.3
+
+
+ SUSE Manager Proxy Module 4.3
+
+
SUSE Linux Enterprise Module for Public Cloud 15 SP4
@@ -502,6 +507,21 @@
SUSE Manager Server 4.3
+
+
+ SUSE Manager Server Module 4.3
+
+
+
+
+ SUSE Manager Tools 12
+
+
+
+
+ SUSE Manager Tools 15
+
+
openSUSE Leap 15.5
@@ -544,6 +564,12 @@
venv-salt-minion
+
+ venv-salt-minion-3006.0-150000.3.67.1
+
+
+ venv-salt-minion-3006.0-3.65.1
+
python311-zipp-3.15.0-150400.10.10.1 as a component of Image SLES15-SP4-BYOS
@@ -697,6 +723,18 @@
python312-zipp-3.19.2-2.1 as a component of openSUSE Tumbleweed
+
+ venv-salt-minion-3006.0-150000.3.67.1 as a component of SUSE Manager Proxy Module 4.3
+
+
+ venv-salt-minion-3006.0-150000.3.67.1 as a component of SUSE Manager Server Module 4.3
+
+
+ venv-salt-minion-3006.0-3.65.1 as a component of SUSE Manager Tools 12
+
+
+ venv-salt-minion-3006.0-150000.3.67.1 as a component of SUSE Manager Tools 15
+
python3-zipp as a component of SUSE Enterprise Storage 7.1
@@ -901,6 +939,12 @@
openSUSE Tumbleweed:python311-zipp-3.19.2-2.1
openSUSE Tumbleweed:python312-zipp-3.19.2-2.1
+
+ SUSE Manager Proxy Module 4.3:venv-salt-minion-3006.0-150000.3.67.1
+ SUSE Manager Server Module 4.3:venv-salt-minion-3006.0-150000.3.67.1
+ SUSE Manager Tools 12:venv-salt-minion-3006.0-3.65.1
+ SUSE Manager Tools 15:venv-salt-minion-3006.0-150000.3.67.1
+
SUSE Enterprise Storage 7.1:python-zipp
SUSE Enterprise Storage 7.1:python3-zipp
no cpe found for SUSE Liberty Linux 7 LTSS in CVE-2024-5564
no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2024-5564
no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2024-5535
--- /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2024-5535.xml 2024-10-22 01:50:21.727852000 +0200
+++ /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2024-5535.xml.new 2024-10-29 01:23:53.253209000 +0100
@@ -14,13 +14,13 @@
1
- 58
- 2024-10-21T23:50:20Z
+ 59
+ 2024-10-29T00:23:52Z
current
2024-06-29T17:14:25Z
- 2024-10-21T23:50:20Z
+ 2024-10-29T00:23:52Z
cve-database/bin/generate-cvrf-cve.pl
2020-12-27T01:00:00Z
@@ -641,6 +641,21 @@
Image SLES12-SP5-EC2-BYOS
+
+
+ Image SLES12-SP5-GCE-BYOS
+
+
+
+
+ Image SLES12-SP5-GCE-SAP-BYOS
+
+
+
+
+ Image SLES12-SP5-GCE-SAP-On-Demand
+
+
Image SLES12-SP5-SAP-Azure-LI-BYOS-Production
@@ -3095,6 +3110,33 @@
openssl-1_0_0-1.0.2p-3.95.1 as a component of Image SLES12-SP5-EC2-BYOS
+
+ libopenssl1_0_0-1.0.2p-3.95.1 as a component of Image SLES12-SP5-GCE-BYOS
+
+
+ libopenssl1_1-1.1.1d-2.110.2 as a component of Image SLES12-SP5-GCE-BYOS
+
+
+ openssl-1_0_0-1.0.2p-3.95.1 as a component of Image SLES12-SP5-GCE-BYOS
+
+
+ libopenssl1_0_0-1.0.2p-3.95.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ libopenssl1_1-1.1.1d-2.110.2 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ openssl-1_0_0-1.0.2p-3.95.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ libopenssl1_0_0-1.0.2p-3.95.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
+
+ libopenssl1_1-1.1.1d-2.110.2 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
+
+ openssl-1_0_0-1.0.2p-3.95.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
libopenssl1_0_0-1.0.2p-3.95.1 as a component of Image SLES12-SP5-SAP-Azure-LI-BYOS-Production
@@ -5947,6 +5989,15 @@
Image SLES12-SP5-EC2-BYOS:libopenssl1_0_0-1.0.2p-3.95.1
Image SLES12-SP5-EC2-BYOS:libopenssl1_1-1.1.1d-2.110.2
Image SLES12-SP5-EC2-BYOS:openssl-1_0_0-1.0.2p-3.95.1
+ Image SLES12-SP5-GCE-BYOS:libopenssl1_0_0-1.0.2p-3.95.1
+ Image SLES12-SP5-GCE-BYOS:libopenssl1_1-1.1.1d-2.110.2
+ Image SLES12-SP5-GCE-BYOS:openssl-1_0_0-1.0.2p-3.95.1
+ Image SLES12-SP5-GCE-SAP-BYOS:libopenssl1_0_0-1.0.2p-3.95.1
+ Image SLES12-SP5-GCE-SAP-BYOS:libopenssl1_1-1.1.1d-2.110.2
+ Image SLES12-SP5-GCE-SAP-BYOS:openssl-1_0_0-1.0.2p-3.95.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:libopenssl1_0_0-1.0.2p-3.95.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:libopenssl1_1-1.1.1d-2.110.2
+ Image SLES12-SP5-GCE-SAP-On-Demand:openssl-1_0_0-1.0.2p-3.95.1
Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:libopenssl1_0_0-1.0.2p-3.95.1
Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:libopenssl1_0_0-32bit-1.0.2p-3.95.1
Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:libopenssl1_1-1.1.1d-2.110.2
no cpe found for SUSE Package Hub 15 SP5 in CVE-2024-5499
no cpe found for SUSE Package Hub 15 SP6 in CVE-2024-5499
no cpe found for openSUSE Leap 15.5 NonFree in CVE-2024-5499
no cpe found for openSUSE Leap 15.6 NonFree in CVE-2024-5499
no cpe found for SUSE Package Hub 15 SP5 in CVE-2024-5498
no cpe found for SUSE Package Hub 15 SP6 in CVE-2024-5498
no cpe found for openSUSE Leap 15.5 NonFree in CVE-2024-5498
no cpe found for openSUSE Leap 15.6 NonFree in CVE-2024-5498
no cpe found for SUSE Package Hub 15 SP5 in CVE-2024-5497
no cpe found for SUSE Package Hub 15 SP6 in CVE-2024-5497
no cpe found for openSUSE Leap 15.5 NonFree in CVE-2024-5497
no cpe found for openSUSE Leap 15.6 NonFree in CVE-2024-5497
no cpe found for SUSE Package Hub 15 SP5 in CVE-2024-5496
no cpe found for SUSE Package Hub 15 SP6 in CVE-2024-5496
no cpe found for openSUSE Leap 15.5 NonFree in CVE-2024-5496
no cpe found for openSUSE Leap 15.6 NonFree in CVE-2024-5496
no cpe found for SUSE Package Hub 15 SP5 in CVE-2024-5495
no cpe found for SUSE Package Hub 15 SP6 in CVE-2024-5495
no cpe found for openSUSE Leap 15.5 NonFree in CVE-2024-5495
no cpe found for openSUSE Leap 15.6 NonFree in CVE-2024-5495
no cpe found for SUSE Package Hub 15 SP5 in CVE-2024-5494
no cpe found for SUSE Package Hub 15 SP6 in CVE-2024-5494
no cpe found for openSUSE Leap 15.5 NonFree in CVE-2024-5494
no cpe found for openSUSE Leap 15.6 NonFree in CVE-2024-5494
no cpe found for SUSE Package Hub 15 SP5 in CVE-2024-5493
no cpe found for SUSE Package Hub 15 SP6 in CVE-2024-5493
no cpe found for openSUSE Leap 15.5 NonFree in CVE-2024-5493
no cpe found for openSUSE Leap 15.6 NonFree in CVE-2024-5493
no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2024-5458
no cpe found for SUSE Package Hub 15 SP5 in CVE-2024-5458
no cpe found for SUSE Package Hub 15 SP5 in CVE-2024-5274
no cpe found for openSUSE Leap 15.5 NonFree in CVE-2024-5274
no cpe found for openSUSE Leap 15.6 NonFree in CVE-2024-5274
skipping CVE-2024-5197 as CVE page is older than CVRF-CVE file.
no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2024-5171
no cpe found for SUSE Package Hub 15 SP5 in CVE-2024-5160
no cpe found for SUSE Package Hub 15 SP5 in CVE-2024-5159
no cpe found for SUSE Package Hub 15 SP5 in CVE-2024-5158
no cpe found for SUSE Package Hub 15 SP5 in CVE-2024-5157
No V5 entry found for CVE-2024-4982 / /home/securitybot/prod/cve-database/cvelistV5/cves/2024/4xxxx/CVE-2024-4982.json:No such file or directory
No V5 entry found for CVE-2024-4981 / /home/securitybot/prod/cve-database/cvelistV5/cves/2024/4xxxx/CVE-2024-4981.json:No such file or directory
no cpe found for SUSE Package Hub 15 SP5 in CVE-2024-4950
no cpe found for SUSE Package Hub 15 SP5 in CVE-2024-4949
no cpe found for SUSE Package Hub 15 SP5 in CVE-2024-4948
no cpe found for SUSE Package Hub 15 SP5 in CVE-2024-4947
no cpe found for SUSE Package Hub 15 SP5 in CVE-2024-4761
skipping CVE-2024-4855 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-4854 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-4853 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-4778 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-4777 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-4776 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-4775 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-4774 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-4773 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-4772 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-4771 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-4770 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-4769 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-4768 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-4767 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-4766 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-4765 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-4764 as CVE page is older than CVRF-CVE file.
No V5 entry found for CVE-2024-4741 / /home/securitybot/prod/cve-database/cvelistV5/cves/2024/4xxxx/CVE-2024-4741.json:No such file or directory
no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2024-4741
no cpe found for SUSE Linux Enterprise Module for Confidential Computing Technical Preview 15 SP6 in CVE-2024-4693
no cpe found for openSUSE Leap 15.5 NonFree in CVE-2024-4671
no cpe found for openSUSE Leap 15.6 NonFree in CVE-2024-4671
skipping CVE-2024-4603 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-4558 as CVE page is older than CVRF-CVE file.
no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2024-4467
skipping CVE-2024-4453 as CVE page is older than CVRF-CVE file.
no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2024-4340
skipping CVE-2024-4367 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-4317 as CVE page is older than CVRF-CVE file.
no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2024-4216
skipping CVE-2024-4141 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-4076 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-4068 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-4067 as CVE page is older than CVRF-CVE file.
no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2024-4032
--- /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2024-4032.xml 2024-10-22 01:51:18.678708000 +0200
+++ /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2024-4032.xml.new 2024-10-29 01:24:10.120824000 +0100
@@ -14,13 +14,13 @@
1
- 62
- 2024-10-21T23:51:18Z
+ 63
+ 2024-10-29T00:24:09Z
current
2024-06-17T23:17:35Z
- 2024-10-21T23:51:18Z
+ 2024-10-29T00:24:09Z
cve-database/bin/generate-cvrf-cve.pl
2020-12-27T01:00:00Z
@@ -1666,6 +1666,11 @@
SUSE Manager Proxy 4.3
+
+
+ SUSE Manager Proxy Module 4.3
+
+
SUSE Linux Enterprise Module for Public Cloud 15 SP4
@@ -1682,6 +1687,21 @@
SUSE Manager Server 4.3
+
+
+ SUSE Manager Server Module 4.3
+
+
+
+
+ SUSE Manager Tools 12
+
+
+
+
+ SUSE Manager Tools 15
+
+
openSUSE Leap 15.5
@@ -2511,6 +2531,24 @@
python313-x86-64-v3-3.13.0~rc2-1.1
+
+ python314-3.14.0~a1-1.1
+
+
+ python314-curses-3.14.0~a1-1.1
+
+
+ python314-dbm-3.14.0~a1-1.1
+
+
+ python314-idle-3.14.0~a1-1.1
+
+
+ python314-tk-3.14.0~a1-1.1
+
+
+ python314-x86-64-v3-3.14.0~a1-1.1
+
python36
@@ -2637,6 +2675,12 @@
python39-tools-3.9.19-150300.4.46.1
+
+ venv-salt-minion-3006.0-150000.3.67.1
+
+
+ venv-salt-minion-3006.0-3.65.1
+
libpython3_6m1_0-3.6.15-150300.10.65.1 as a component of Container bci/bci-base-fips:15.5.4.1
@@ -3048,9 +3092,18 @@
python36-base-3.6.15-58.1 as a component of Image SLES12-SP5-EC2-SAP-On-Demand
+
+ libpython3_4m1_0-3.4.10-25.133.1 as a component of Image SLES12-SP5-GCE-BYOS
+
libpython3_6m1_0-3.6.15-58.1 as a component of Image SLES12-SP5-GCE-BYOS
+
+ python3-3.4.10-25.133.1 as a component of Image SLES12-SP5-GCE-BYOS
+
+
+ python3-base-3.4.10-25.133.1 as a component of Image SLES12-SP5-GCE-BYOS
+
python36-base-3.6.15-58.1 as a component of Image SLES12-SP5-GCE-BYOS
@@ -3060,15 +3113,39 @@
python36-base-3.6.15-58.1 as a component of Image SLES12-SP5-GCE-On-Demand
+
+ libpython3_4m1_0-3.4.10-25.133.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
libpython3_6m1_0-3.6.15-58.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+ python3-3.4.10-25.133.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ python3-base-3.4.10-25.133.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ python3-curses-3.4.10-25.133.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
python36-base-3.6.15-58.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+ libpython3_4m1_0-3.4.10-25.133.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
libpython3_6m1_0-3.6.15-58.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
+ python3-3.4.10-25.133.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
+
+ python3-base-3.4.10-25.133.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
+
+ python3-curses-3.4.10-25.133.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
python36-base-3.6.15-58.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
@@ -6972,6 +7049,24 @@
python313-x86-64-v3-3.13.0~rc2-1.1 as a component of openSUSE Tumbleweed
+
+ python314-3.14.0~a1-1.1 as a component of openSUSE Tumbleweed
+
+
+ python314-curses-3.14.0~a1-1.1 as a component of openSUSE Tumbleweed
+
+
+ python314-dbm-3.14.0~a1-1.1 as a component of openSUSE Tumbleweed
+
+
+ python314-idle-3.14.0~a1-1.1 as a component of openSUSE Tumbleweed
+
+
+ python314-tk-3.14.0~a1-1.1 as a component of openSUSE Tumbleweed
+
+
+ python314-x86-64-v3-3.14.0~a1-1.1 as a component of openSUSE Tumbleweed
+
python38-3.8.19-4.1 as a component of openSUSE Tumbleweed
@@ -7005,6 +7100,18 @@
python39-tk-3.9.19-3.1 as a component of openSUSE Tumbleweed
+
+ venv-salt-minion-3006.0-150000.3.67.1 as a component of SUSE Manager Proxy Module 4.3
+
+
+ venv-salt-minion-3006.0-150000.3.67.1 as a component of SUSE Manager Server Module 4.3
+
+
+ venv-salt-minion-3006.0-3.65.1 as a component of SUSE Manager Tools 12
+
+
+ venv-salt-minion-3006.0-150000.3.67.1 as a component of SUSE Manager Tools 15
+
python as a component of SUSE Enterprise Storage 7.1
@@ -7665,13 +7772,24 @@
Image SLES12-SP5-EC2-SAP-BYOS:python36-base-3.6.15-58.1
Image SLES12-SP5-EC2-SAP-On-Demand:libpython3_6m1_0-3.6.15-58.1
Image SLES12-SP5-EC2-SAP-On-Demand:python36-base-3.6.15-58.1
+ Image SLES12-SP5-GCE-BYOS:libpython3_4m1_0-3.4.10-25.133.1
Image SLES12-SP5-GCE-BYOS:libpython3_6m1_0-3.6.15-58.1
+ Image SLES12-SP5-GCE-BYOS:python3-3.4.10-25.133.1
+ Image SLES12-SP5-GCE-BYOS:python3-base-3.4.10-25.133.1
Image SLES12-SP5-GCE-BYOS:python36-base-3.6.15-58.1
Image SLES12-SP5-GCE-On-Demand:libpython3_6m1_0-3.6.15-58.1
Image SLES12-SP5-GCE-On-Demand:python36-base-3.6.15-58.1
+ Image SLES12-SP5-GCE-SAP-BYOS:libpython3_4m1_0-3.4.10-25.133.1
Image SLES12-SP5-GCE-SAP-BYOS:libpython3_6m1_0-3.6.15-58.1
+ Image SLES12-SP5-GCE-SAP-BYOS:python3-3.4.10-25.133.1
+ Image SLES12-SP5-GCE-SAP-BYOS:python3-base-3.4.10-25.133.1
+ Image SLES12-SP5-GCE-SAP-BYOS:python3-curses-3.4.10-25.133.1
Image SLES12-SP5-GCE-SAP-BYOS:python36-base-3.6.15-58.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:libpython3_4m1_0-3.4.10-25.133.1
Image SLES12-SP5-GCE-SAP-On-Demand:libpython3_6m1_0-3.6.15-58.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:python3-3.4.10-25.133.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:python3-base-3.4.10-25.133.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:python3-curses-3.4.10-25.133.1
Image SLES12-SP5-GCE-SAP-On-Demand:python36-base-3.6.15-58.1
Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:libpython3_4m1_0-3.4.10-25.133.1
Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:libpython3_6m1_0-3.6.15-58.1
@@ -8973,6 +9091,12 @@
openSUSE Tumbleweed:python313-idle-3.13.0~rc2-1.1
openSUSE Tumbleweed:python313-tk-3.13.0~rc2-1.1
openSUSE Tumbleweed:python313-x86-64-v3-3.13.0~rc2-1.1
+ openSUSE Tumbleweed:python314-3.14.0~a1-1.1
+ openSUSE Tumbleweed:python314-curses-3.14.0~a1-1.1
+ openSUSE Tumbleweed:python314-dbm-3.14.0~a1-1.1
+ openSUSE Tumbleweed:python314-idle-3.14.0~a1-1.1
+ openSUSE Tumbleweed:python314-tk-3.14.0~a1-1.1
+ openSUSE Tumbleweed:python314-x86-64-v3-3.14.0~a1-1.1
openSUSE Tumbleweed:python38-3.8.19-4.1
openSUSE Tumbleweed:python38-curses-3.8.19-4.1
openSUSE Tumbleweed:python38-dbm-3.8.19-4.1
@@ -8985,6 +9109,12 @@
openSUSE Tumbleweed:python39-idle-3.9.19-3.1
openSUSE Tumbleweed:python39-tk-3.9.19-3.1
+
+ SUSE Manager Proxy Module 4.3:venv-salt-minion-3006.0-150000.3.67.1
+ SUSE Manager Server Module 4.3:venv-salt-minion-3006.0-150000.3.67.1
+ SUSE Manager Tools 12:venv-salt-minion-3006.0-3.65.1
+ SUSE Manager Tools 15:venv-salt-minion-3006.0-150000.3.67.1
+
SUSE Enterprise Storage 7.1:python
SUSE Enterprise Storage 7.1:python-tk
--- /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2024-4030.xml 2024-10-22 01:51:19.427698000 +0200
+++ /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2024-4030.xml.new 2024-10-29 01:24:10.981784000 +0100
@@ -14,13 +14,13 @@
1
- 16
- 2024-10-21T23:51:19Z
+ 17
+ 2024-10-29T00:24:10Z
current
2024-06-29T17:14:45Z
- 2024-10-21T23:51:19Z
+ 2024-10-29T00:24:10Z
cve-database/bin/generate-cvrf-cve.pl
2020-12-27T01:00:00Z
@@ -610,6 +610,24 @@
python313-x86-64-v3-3.13.0~b3-1.1
+
+ python314-3.14.0~a1-1.1
+
+
+ python314-curses-3.14.0~a1-1.1
+
+
+ python314-dbm-3.14.0~a1-1.1
+
+
+ python314-idle-3.14.0~a1-1.1
+
+
+ python314-tk-3.14.0~a1-1.1
+
+
+ python314-x86-64-v3-3.14.0~a1-1.1
+
python36
@@ -823,6 +841,24 @@
python313-x86-64-v3-3.13.0~b3-1.1 as a component of openSUSE Tumbleweed
+
+ python314-3.14.0~a1-1.1 as a component of openSUSE Tumbleweed
+
+
+ python314-curses-3.14.0~a1-1.1 as a component of openSUSE Tumbleweed
+
+
+ python314-dbm-3.14.0~a1-1.1 as a component of openSUSE Tumbleweed
+
+
+ python314-idle-3.14.0~a1-1.1 as a component of openSUSE Tumbleweed
+
+
+ python314-tk-3.14.0~a1-1.1 as a component of openSUSE Tumbleweed
+
+
+ python314-x86-64-v3-3.14.0~a1-1.1 as a component of openSUSE Tumbleweed
+
python38-3.8.20-1.1 as a component of openSUSE Tumbleweed
@@ -1876,6 +1912,12 @@
openSUSE Tumbleweed:python313-idle-3.13.0~b3-1.1
openSUSE Tumbleweed:python313-tk-3.13.0~b3-1.1
openSUSE Tumbleweed:python313-x86-64-v3-3.13.0~b3-1.1
+ openSUSE Tumbleweed:python314-3.14.0~a1-1.1
+ openSUSE Tumbleweed:python314-curses-3.14.0~a1-1.1
+ openSUSE Tumbleweed:python314-dbm-3.14.0~a1-1.1
+ openSUSE Tumbleweed:python314-idle-3.14.0~a1-1.1
+ openSUSE Tumbleweed:python314-tk-3.14.0~a1-1.1
+ openSUSE Tumbleweed:python314-x86-64-v3-3.14.0~a1-1.1
openSUSE Tumbleweed:python38-3.8.20-1.1
openSUSE Tumbleweed:python38-curses-3.8.20-1.1
openSUSE Tumbleweed:python38-dbm-3.8.20-1.1
no cpe found for openSUSE Leap 15.5 NonFree in CVE-2024-3914
no cpe found for openSUSE Leap 15.6 NonFree in CVE-2024-3914
skipping CVE-2024-3933 as CVE page is older than CVRF-CVE file.
no cpe found for SUSE Liberty Linux 7 LTSS in CVE-2024-3864
no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2024-3864
no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2024-3863
no cpe found for SUSE Liberty Linux 7 LTSS in CVE-2024-3861
no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2024-3861
no cpe found for SUSE Liberty Linux 7 LTSS in CVE-2024-3859
no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2024-3859
no cpe found for SUSE Liberty Linux 7 LTSS in CVE-2024-3857
no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2024-3857
no cpe found for SUSE Liberty Linux 7 LTSS in CVE-2024-3854
no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2024-3854
no cpe found for SUSE Liberty Linux 7 LTSS in CVE-2024-3852
no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2024-3852
no cpe found for openSUSE Leap 15.5 NonFree in CVE-2024-3847
no cpe found for openSUSE Leap 15.6 NonFree in CVE-2024-3847
no cpe found for openSUSE Leap 15.5 NonFree in CVE-2024-3846
no cpe found for openSUSE Leap 15.6 NonFree in CVE-2024-3846
no cpe found for openSUSE Leap 15.5 NonFree in CVE-2024-3845
no cpe found for openSUSE Leap 15.6 NonFree in CVE-2024-3845
no cpe found for openSUSE Leap 15.5 NonFree in CVE-2024-3844
no cpe found for openSUSE Leap 15.6 NonFree in CVE-2024-3844
no cpe found for openSUSE Leap 15.5 NonFree in CVE-2024-3843
no cpe found for openSUSE Leap 15.6 NonFree in CVE-2024-3843
no cpe found for openSUSE Leap 15.5 NonFree in CVE-2024-3841
no cpe found for openSUSE Leap 15.6 NonFree in CVE-2024-3841
no cpe found for openSUSE Leap 15.5 NonFree in CVE-2024-3840
no cpe found for openSUSE Leap 15.6 NonFree in CVE-2024-3840
no cpe found for openSUSE Leap 15.5 NonFree in CVE-2024-3839
no cpe found for openSUSE Leap 15.6 NonFree in CVE-2024-3839
no cpe found for openSUSE Leap 15.5 NonFree in CVE-2024-3838
no cpe found for openSUSE Leap 15.6 NonFree in CVE-2024-3838
no cpe found for openSUSE Leap 15.5 NonFree in CVE-2024-3837
no cpe found for openSUSE Leap 15.6 NonFree in CVE-2024-3837
no cpe found for openSUSE Leap 15.5 NonFree in CVE-2024-3834
no cpe found for openSUSE Leap 15.6 NonFree in CVE-2024-3834
no cpe found for openSUSE Leap 15.5 NonFree in CVE-2024-3833
no cpe found for openSUSE Leap 15.6 NonFree in CVE-2024-3833
no cpe found for openSUSE Leap 15.5 NonFree in CVE-2024-3832
no cpe found for openSUSE Leap 15.6 NonFree in CVE-2024-3832
no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2024-3727
no cpe found for SUSE Package Hub 15 SP5 in CVE-2024-3727
no cpe found for SUSE Liberty Linux 7 LTSS in CVE-2024-3657
no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2024-3657
skipping CVE-2024-3708 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-3661 as CVE page is older than CVRF-CVE file.
--- /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2024-3657.xml 2024-09-17 01:25:13.650501000 +0200
+++ /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2024-3657.xml.new 2024-10-29 01:24:22.018193000 +0100
@@ -14,13 +14,13 @@
1
- 18
- 2024-09-16T23:25:13Z
+ 19
+ 2024-10-29T00:24:21Z
current
2024-05-28T23:13:43Z
- 2024-09-16T23:25:13Z
+ 2024-10-29T00:24:21Z
cve-database/bin/generate-cvrf-cve.pl
2020-12-27T01:00:00Z
@@ -218,6 +218,12 @@
389-ds-2.0.20~git9.5e2d637c-150400.3.42.3
+
+ 389-ds-2.2.10~git18.20ce9289-150500.3.24.1
+
+
+ 389-ds-2.2.10~git18.20ce9289-150600.8.10.1
+
389-ds-2.2.10~git2.345056d3-150500.3.21.1
@@ -269,6 +275,12 @@
389-ds-devel-2.0.20~git9.5e2d637c-150400.3.42.3
+
+ 389-ds-devel-2.2.10~git18.20ce9289-150500.3.24.1
+
+
+ 389-ds-devel-2.2.10~git18.20ce9289-150600.8.10.1
+
389-ds-devel-2.2.10~git2.345056d3-150500.3.21.1
@@ -281,6 +293,12 @@
389-ds-snmp
+
+ 389-ds-snmp-2.2.10~git18.20ce9289-150500.3.24.1
+
+
+ 389-ds-snmp-2.2.10~git18.20ce9289-150600.8.10.1
+
389-ds-snmp-2.2.10~git2.345056d3-150500.3.21.1
@@ -299,6 +317,12 @@
lib389-2.0.20~git9.5e2d637c-150400.3.42.3
+
+ lib389-2.2.10~git18.20ce9289-150500.3.24.1
+
+
+ lib389-2.2.10~git18.20ce9289-150600.8.10.1
+
lib389-2.2.10~git2.345056d3-150500.3.21.1
@@ -317,6 +341,12 @@
libsvrcore0-2.0.20~git9.5e2d637c-150400.3.42.3
+
+ libsvrcore0-2.2.10~git18.20ce9289-150500.3.24.1
+
+
+ libsvrcore0-2.2.10~git18.20ce9289-150600.8.10.1
+
libsvrcore0-2.2.10~git2.345056d3-150500.3.21.1
@@ -605,6 +635,60 @@
libsvrcore0-3.1.1~git0.aef1668-1.1 as a component of openSUSE Tumbleweed
+
+ 389-ds-2.2.10~git18.20ce9289-150500.3.24.1 as a component of SUSE Linux Enterprise Module for Server Applications 15 SP5
+
+
+ 389-ds-devel-2.2.10~git18.20ce9289-150500.3.24.1 as a component of SUSE Linux Enterprise Module for Server Applications 15 SP5
+
+
+ lib389-2.2.10~git18.20ce9289-150500.3.24.1 as a component of SUSE Linux Enterprise Module for Server Applications 15 SP5
+
+
+ libsvrcore0-2.2.10~git18.20ce9289-150500.3.24.1 as a component of SUSE Linux Enterprise Module for Server Applications 15 SP5
+
+
+ 389-ds-2.2.10~git18.20ce9289-150600.8.10.1 as a component of SUSE Linux Enterprise Module for Server Applications 15 SP6
+
+
+ 389-ds-devel-2.2.10~git18.20ce9289-150600.8.10.1 as a component of SUSE Linux Enterprise Module for Server Applications 15 SP6
+
+
+ lib389-2.2.10~git18.20ce9289-150600.8.10.1 as a component of SUSE Linux Enterprise Module for Server Applications 15 SP6
+
+
+ libsvrcore0-2.2.10~git18.20ce9289-150600.8.10.1 as a component of SUSE Linux Enterprise Module for Server Applications 15 SP6
+
+
+ 389-ds-2.2.10~git18.20ce9289-150500.3.24.1 as a component of openSUSE Leap 15.5
+
+
+ 389-ds-devel-2.2.10~git18.20ce9289-150500.3.24.1 as a component of openSUSE Leap 15.5
+
+
+ 389-ds-snmp-2.2.10~git18.20ce9289-150500.3.24.1 as a component of openSUSE Leap 15.5
+
+
+ lib389-2.2.10~git18.20ce9289-150500.3.24.1 as a component of openSUSE Leap 15.5
+
+
+ libsvrcore0-2.2.10~git18.20ce9289-150500.3.24.1 as a component of openSUSE Leap 15.5
+
+
+ 389-ds-2.2.10~git18.20ce9289-150600.8.10.1 as a component of openSUSE Leap 15.6
+
+
+ 389-ds-devel-2.2.10~git18.20ce9289-150600.8.10.1 as a component of openSUSE Leap 15.6
+
+
+ 389-ds-snmp-2.2.10~git18.20ce9289-150600.8.10.1 as a component of openSUSE Leap 15.6
+
+
+ lib389-2.2.10~git18.20ce9289-150600.8.10.1 as a component of openSUSE Leap 15.6
+
+
+ libsvrcore0-2.2.10~git18.20ce9289-150600.8.10.1 as a component of openSUSE Leap 15.6
+
389-ds as a component of SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS
@@ -765,6 +849,26 @@
openSUSE Tumbleweed:lib389-3.1.1~git0.aef1668-1.1
openSUSE Tumbleweed:libsvrcore0-3.1.1~git0.aef1668-1.1
+
+ SUSE Linux Enterprise Module for Server Applications 15 SP5:389-ds-2.2.10~git18.20ce9289-150500.3.24.1
+ SUSE Linux Enterprise Module for Server Applications 15 SP5:389-ds-devel-2.2.10~git18.20ce9289-150500.3.24.1
+ SUSE Linux Enterprise Module for Server Applications 15 SP5:lib389-2.2.10~git18.20ce9289-150500.3.24.1
+ SUSE Linux Enterprise Module for Server Applications 15 SP5:libsvrcore0-2.2.10~git18.20ce9289-150500.3.24.1
+ SUSE Linux Enterprise Module for Server Applications 15 SP6:389-ds-2.2.10~git18.20ce9289-150600.8.10.1
+ SUSE Linux Enterprise Module for Server Applications 15 SP6:389-ds-devel-2.2.10~git18.20ce9289-150600.8.10.1
+ SUSE Linux Enterprise Module for Server Applications 15 SP6:lib389-2.2.10~git18.20ce9289-150600.8.10.1
+ SUSE Linux Enterprise Module for Server Applications 15 SP6:libsvrcore0-2.2.10~git18.20ce9289-150600.8.10.1
+ openSUSE Leap 15.5:389-ds-2.2.10~git18.20ce9289-150500.3.24.1
+ openSUSE Leap 15.5:389-ds-devel-2.2.10~git18.20ce9289-150500.3.24.1
+ openSUSE Leap 15.5:389-ds-snmp-2.2.10~git18.20ce9289-150500.3.24.1
+ openSUSE Leap 15.5:lib389-2.2.10~git18.20ce9289-150500.3.24.1
+ openSUSE Leap 15.5:libsvrcore0-2.2.10~git18.20ce9289-150500.3.24.1
+ openSUSE Leap 15.6:389-ds-2.2.10~git18.20ce9289-150600.8.10.1
+ openSUSE Leap 15.6:389-ds-devel-2.2.10~git18.20ce9289-150600.8.10.1
+ openSUSE Leap 15.6:389-ds-snmp-2.2.10~git18.20ce9289-150600.8.10.1
+ openSUSE Leap 15.6:lib389-2.2.10~git18.20ce9289-150600.8.10.1
+ openSUSE Leap 15.6:libsvrcore0-2.2.10~git18.20ce9289-150600.8.10.1
+
no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2024-3651
--- /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2024-3651.xml 2024-10-19 01:32:25.192892000 +0200
+++ /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2024-3651.xml.new 2024-10-29 01:24:23.297129000 +0100
@@ -14,13 +14,13 @@
1
- 56
- 2024-10-18T23:32:24Z
+ 57
+ 2024-10-29T00:24:22Z
current
2024-04-16T23:11:31Z
- 2024-10-18T23:32:24Z
+ 2024-10-29T00:24:22Z
cve-database/bin/generate-cvrf-cve.pl
2020-12-27T01:00:00Z
@@ -1448,6 +1448,11 @@
SUSE Manager Proxy 4.3
+
+
+ SUSE Manager Proxy Module 4.3
+
+
SUSE Linux Enterprise Module for Public Cloud 15 SP4
@@ -1464,6 +1469,21 @@
SUSE Manager Server 4.3
+
+
+ SUSE Manager Server Module 4.3
+
+
+
+
+ SUSE Manager Tools 12
+
+
+
+
+ SUSE Manager Tools 15
+
+
SUSE OpenStack Cloud 8
@@ -1803,6 +1823,12 @@
venv-salt-minion
+
+ venv-salt-minion-3006.0-150000.3.67.1
+
+
+ venv-salt-minion-3006.0-3.65.1
+
python3-idna-2.6-150000.3.3.1 as a component of Container bci/kiwi:9.24.43-8.6
@@ -2805,6 +2831,18 @@
python312-idna-3.7-1.1 as a component of openSUSE Tumbleweed
+
+ venv-salt-minion-3006.0-150000.3.67.1 as a component of SUSE Manager Proxy Module 4.3
+
+
+ venv-salt-minion-3006.0-150000.3.67.1 as a component of SUSE Manager Server Module 4.3
+
+
+ venv-salt-minion-3006.0-3.65.1 as a component of SUSE Manager Tools 12
+
+
+ venv-salt-minion-3006.0-150000.3.67.1 as a component of SUSE Manager Tools 15
+
python-idna as a component of HPE Helion OpenStack 8
@@ -2916,9 +2954,6 @@
python-idna as a component of SUSE Linux Enterprise Server for SAP Applications 12 SP5
-
- python3-idna as a component of SUSE Linux Enterprise Server for SAP Applications 12 SP5
-
python2-idna as a component of SUSE Linux Enterprise Server for SAP Applications 15 SP2
@@ -3347,6 +3382,12 @@
openSUSE Tumbleweed:python311-idna-3.7-1.1
openSUSE Tumbleweed:python312-idna-3.7-1.1
+
+ SUSE Manager Proxy Module 4.3:venv-salt-minion-3006.0-150000.3.67.1
+ SUSE Manager Server Module 4.3:venv-salt-minion-3006.0-150000.3.67.1
+ SUSE Manager Tools 12:venv-salt-minion-3006.0-3.65.1
+ SUSE Manager Tools 15:venv-salt-minion-3006.0-150000.3.67.1
+
SUSE Linux Enterprise Module for Basesystem 15 SP6:python-idna
SUSE Linux Enterprise Module for Basesystem 15 SP6:python3-idna
skipping CVE-2024-3596 as CVE page is older than CVRF-CVE file.
No V5 entry found for CVE-2024-3447 / /home/securitybot/prod/cve-database/cvelistV5/cves/2024/3xxxx/CVE-2024-3447.json:No such file or directory
no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2024-3447
skipping CVE-2024-3508 as CVE page is older than CVRF-CVE file.
no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2024-3446
no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2024-3302
skipping CVE-2024-3219 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-3205 as CVE page is older than CVRF-CVE file.
no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2024-3177
no cpe found for SUSE Package Hub 15 SP5 in CVE-2024-3120
no cpe found for SUSE Package Hub 15 SP5 in CVE-2024-3119
no cpe found for SUSE Package Hub 15 SP5 in CVE-2024-3096
skipping CVE-2024-3094 as CVE page is older than CVRF-CVE file.
no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2024-2961
skipping CVE-2024-3019 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-2955 as CVE page is older than CVRF-CVE file.
no cpe found for openSUSE Leap 15.5 NonFree in CVE-2024-2887
no cpe found for openSUSE Leap 15.6 NonFree in CVE-2024-2887
no cpe found for openSUSE Leap 15.5 NonFree in CVE-2024-2886
no cpe found for openSUSE Leap 15.6 NonFree in CVE-2024-2886
no cpe found for openSUSE Leap 15.5 NonFree in CVE-2024-2885
no cpe found for openSUSE Leap 15.6 NonFree in CVE-2024-2885
no cpe found for openSUSE Leap 15.5 NonFree in CVE-2024-2883
no cpe found for openSUSE Leap 15.6 NonFree in CVE-2024-2883
no cpe found for SUSE Package Hub 15 SP5 in CVE-2024-2756
no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2024-2511
skipping CVE-2024-2616 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-2615 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-2614 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-2613 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-2612 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-2611 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-2610 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-2609 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-2608 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-2607 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-2606 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-2605 as CVE page is older than CVRF-CVE file.
--- /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2024-2511.xml 2024-10-22 01:52:16.992661000 +0200
+++ /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2024-2511.xml.new 2024-10-29 01:24:38.842877000 +0100
@@ -14,13 +14,13 @@
1
- 59
- 2024-10-21T23:52:16Z
+ 60
+ 2024-10-29T00:24:38Z
current
2024-04-09T23:10:23Z
- 2024-10-21T23:52:16Z
+ 2024-10-29T00:24:38Z
cve-database/bin/generate-cvrf-cve.pl
2020-12-27T01:00:00Z
@@ -375,6 +375,21 @@
Image SLES12-SP5-EC2-BYOS
+
+
+ Image SLES12-SP5-GCE-BYOS
+
+
+
+
+ Image SLES12-SP5-GCE-SAP-BYOS
+
+
+
+
+ Image SLES12-SP5-GCE-SAP-On-Demand
+
+
Image SLES12-SP5-SAP-Azure-LI-BYOS-Production
@@ -2384,6 +2399,15 @@
libopenssl1_1-1.1.1d-2.110.2 as a component of Image SLES12-SP5-EC2-BYOS
+
+ libopenssl1_1-1.1.1d-2.110.2 as a component of Image SLES12-SP5-GCE-BYOS
+
+
+ libopenssl1_1-1.1.1d-2.110.2 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ libopenssl1_1-1.1.1d-2.110.2 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
libopenssl1_1-1.1.1d-2.110.2 as a component of Image SLES12-SP5-SAP-Azure-LI-BYOS-Production
@@ -4948,6 +4972,9 @@
Image SLES12-SP5-Azure-BYOS:libopenssl1_1-1.1.1d-2.110.2
Image SLES12-SP5-Azure-SAP-BYOS:libopenssl1_1-1.1.1d-2.110.2
Image SLES12-SP5-EC2-BYOS:libopenssl1_1-1.1.1d-2.110.2
+ Image SLES12-SP5-GCE-BYOS:libopenssl1_1-1.1.1d-2.110.2
+ Image SLES12-SP5-GCE-SAP-BYOS:libopenssl1_1-1.1.1d-2.110.2
+ Image SLES12-SP5-GCE-SAP-On-Demand:libopenssl1_1-1.1.1d-2.110.2
Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:libopenssl1_1-1.1.1d-2.110.2
Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production:libopenssl1_1-1.1.1d-2.110.2
Image SLES15-SP2-SAP-Azure-LI-BYOS-Production:libopenssl1_1-1.1.1d-150200.11.88.1
skipping CVE-2024-2496 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-2494 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-2466 as CVE page is older than CVRF-CVE file.
no cpe found for SUSE Package Hub 15 SP5 in CVE-2024-2400
no cpe found for openSUSE Leap 15.5 NonFree in CVE-2024-2400
skipping CVE-2024-2398 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-2379 as CVE page is older than CVRF-CVE file.
no cpe found for SUSE Liberty Linux 7 LTSS in CVE-2024-2199
no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2024-2199
skipping CVE-2024-2312 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-2236 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-2201 as CVE page is older than CVRF-CVE file.
--- /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2024-2199.xml 2024-09-17 01:25:43.369460000 +0200
+++ /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2024-2199.xml.new 2024-10-29 01:24:42.494122000 +0100
@@ -14,13 +14,13 @@
1
- 18
- 2024-09-16T23:25:43Z
+ 19
+ 2024-10-29T00:24:42Z
current
2024-05-28T23:13:52Z
- 2024-09-16T23:25:43Z
+ 2024-10-29T00:24:42Z
cve-database/bin/generate-cvrf-cve.pl
2020-12-27T01:00:00Z
@@ -218,6 +218,12 @@
389-ds-2.0.20~git9.5e2d637c-150400.3.42.3
+
+ 389-ds-2.2.10~git18.20ce9289-150500.3.24.1
+
+
+ 389-ds-2.2.10~git18.20ce9289-150600.8.10.1
+
389-ds-2.2.10~git2.345056d3-150500.3.21.1
@@ -269,6 +275,12 @@
389-ds-devel-2.0.20~git9.5e2d637c-150400.3.42.3
+
+ 389-ds-devel-2.2.10~git18.20ce9289-150500.3.24.1
+
+
+ 389-ds-devel-2.2.10~git18.20ce9289-150600.8.10.1
+
389-ds-devel-2.2.10~git2.345056d3-150500.3.21.1
@@ -281,6 +293,12 @@
389-ds-snmp
+
+ 389-ds-snmp-2.2.10~git18.20ce9289-150500.3.24.1
+
+
+ 389-ds-snmp-2.2.10~git18.20ce9289-150600.8.10.1
+
389-ds-snmp-2.2.10~git2.345056d3-150500.3.21.1
@@ -299,6 +317,12 @@
lib389-2.0.20~git9.5e2d637c-150400.3.42.3
+
+ lib389-2.2.10~git18.20ce9289-150500.3.24.1
+
+
+ lib389-2.2.10~git18.20ce9289-150600.8.10.1
+
lib389-2.2.10~git2.345056d3-150500.3.21.1
@@ -317,6 +341,12 @@
libsvrcore0-2.0.20~git9.5e2d637c-150400.3.42.3
+
+ libsvrcore0-2.2.10~git18.20ce9289-150500.3.24.1
+
+
+ libsvrcore0-2.2.10~git18.20ce9289-150600.8.10.1
+
libsvrcore0-2.2.10~git2.345056d3-150500.3.21.1
@@ -605,6 +635,60 @@
libsvrcore0-3.1.1~git0.aef1668-1.1 as a component of openSUSE Tumbleweed
+
+ 389-ds-2.2.10~git18.20ce9289-150500.3.24.1 as a component of SUSE Linux Enterprise Module for Server Applications 15 SP5
+
+
+ 389-ds-devel-2.2.10~git18.20ce9289-150500.3.24.1 as a component of SUSE Linux Enterprise Module for Server Applications 15 SP5
+
+
+ lib389-2.2.10~git18.20ce9289-150500.3.24.1 as a component of SUSE Linux Enterprise Module for Server Applications 15 SP5
+
+
+ libsvrcore0-2.2.10~git18.20ce9289-150500.3.24.1 as a component of SUSE Linux Enterprise Module for Server Applications 15 SP5
+
+
+ 389-ds-2.2.10~git18.20ce9289-150600.8.10.1 as a component of SUSE Linux Enterprise Module for Server Applications 15 SP6
+
+
+ 389-ds-devel-2.2.10~git18.20ce9289-150600.8.10.1 as a component of SUSE Linux Enterprise Module for Server Applications 15 SP6
+
+
+ lib389-2.2.10~git18.20ce9289-150600.8.10.1 as a component of SUSE Linux Enterprise Module for Server Applications 15 SP6
+
+
+ libsvrcore0-2.2.10~git18.20ce9289-150600.8.10.1 as a component of SUSE Linux Enterprise Module for Server Applications 15 SP6
+
+
+ 389-ds-2.2.10~git18.20ce9289-150500.3.24.1 as a component of openSUSE Leap 15.5
+
+
+ 389-ds-devel-2.2.10~git18.20ce9289-150500.3.24.1 as a component of openSUSE Leap 15.5
+
+
+ 389-ds-snmp-2.2.10~git18.20ce9289-150500.3.24.1 as a component of openSUSE Leap 15.5
+
+
+ lib389-2.2.10~git18.20ce9289-150500.3.24.1 as a component of openSUSE Leap 15.5
+
+
+ libsvrcore0-2.2.10~git18.20ce9289-150500.3.24.1 as a component of openSUSE Leap 15.5
+
+
+ 389-ds-2.2.10~git18.20ce9289-150600.8.10.1 as a component of openSUSE Leap 15.6
+
+
+ 389-ds-devel-2.2.10~git18.20ce9289-150600.8.10.1 as a component of openSUSE Leap 15.6
+
+
+ 389-ds-snmp-2.2.10~git18.20ce9289-150600.8.10.1 as a component of openSUSE Leap 15.6
+
+
+ lib389-2.2.10~git18.20ce9289-150600.8.10.1 as a component of openSUSE Leap 15.6
+
+
+ libsvrcore0-2.2.10~git18.20ce9289-150600.8.10.1 as a component of openSUSE Leap 15.6
+
389-ds as a component of SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS
@@ -765,6 +849,26 @@
openSUSE Tumbleweed:lib389-3.1.1~git0.aef1668-1.1
openSUSE Tumbleweed:libsvrcore0-3.1.1~git0.aef1668-1.1
+
+ SUSE Linux Enterprise Module for Server Applications 15 SP5:389-ds-2.2.10~git18.20ce9289-150500.3.24.1
+ SUSE Linux Enterprise Module for Server Applications 15 SP5:389-ds-devel-2.2.10~git18.20ce9289-150500.3.24.1
+ SUSE Linux Enterprise Module for Server Applications 15 SP5:lib389-2.2.10~git18.20ce9289-150500.3.24.1
+ SUSE Linux Enterprise Module for Server Applications 15 SP5:libsvrcore0-2.2.10~git18.20ce9289-150500.3.24.1
+ SUSE Linux Enterprise Module for Server Applications 15 SP6:389-ds-2.2.10~git18.20ce9289-150600.8.10.1
+ SUSE Linux Enterprise Module for Server Applications 15 SP6:389-ds-devel-2.2.10~git18.20ce9289-150600.8.10.1
+ SUSE Linux Enterprise Module for Server Applications 15 SP6:lib389-2.2.10~git18.20ce9289-150600.8.10.1
+ SUSE Linux Enterprise Module for Server Applications 15 SP6:libsvrcore0-2.2.10~git18.20ce9289-150600.8.10.1
+ openSUSE Leap 15.5:389-ds-2.2.10~git18.20ce9289-150500.3.24.1
+ openSUSE Leap 15.5:389-ds-devel-2.2.10~git18.20ce9289-150500.3.24.1
+ openSUSE Leap 15.5:389-ds-snmp-2.2.10~git18.20ce9289-150500.3.24.1
+ openSUSE Leap 15.5:lib389-2.2.10~git18.20ce9289-150500.3.24.1
+ openSUSE Leap 15.5:libsvrcore0-2.2.10~git18.20ce9289-150500.3.24.1
+ openSUSE Leap 15.6:389-ds-2.2.10~git18.20ce9289-150600.8.10.1
+ openSUSE Leap 15.6:389-ds-devel-2.2.10~git18.20ce9289-150600.8.10.1
+ openSUSE Leap 15.6:389-ds-snmp-2.2.10~git18.20ce9289-150600.8.10.1
+ openSUSE Leap 15.6:lib389-2.2.10~git18.20ce9289-150600.8.10.1
+ openSUSE Leap 15.6:libsvrcore0-2.2.10~git18.20ce9289-150600.8.10.1
+
no cpe found for SUSE Package Hub 15 SP5 in CVE-2024-2176
skipping CVE-2024-2193 as CVE page is older than CVRF-CVE file.
no cpe found for SUSE Package Hub 15 SP5 in CVE-2024-2174
no cpe found for SUSE Package Hub 15 SP5 in CVE-2024-2173
no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2024-2044
skipping CVE-2024-2004 as CVE page is older than CVRF-CVE file.
no cpe found for SUSE Liberty Linux 7 LTSS in CVE-2024-1975
no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2024-1975
no cpe found for SUSE Manager Tools for SLE Micro 5 in CVE-2024-1975
--- /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2024-1975.xml 2024-10-20 01:31:02.996912000 +0200
+++ /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2024-1975.xml.new 2024-10-29 01:24:45.428983000 +0100
@@ -14,13 +14,13 @@
1
- 33
- 2024-10-19T23:31:02Z
+ 34
+ 2024-10-29T00:24:44Z
current
2024-07-25T23:23:59Z
- 2024-10-19T23:31:02Z
+ 2024-10-29T00:24:44Z
cve-database/bin/generate-cvrf-cve.pl
2020-12-27T01:00:00Z
@@ -101,6 +101,21 @@
Image SLES12-SP5-EC2-SAP-BYOS
+
+
+ Image SLES12-SP5-GCE-BYOS
+
+
+
+
+ Image SLES12-SP5-GCE-SAP-BYOS
+
+
+
+
+ Image SLES12-SP5-GCE-SAP-On-Demand
+
+
Image SLES12-SP5-SAP-Azure-LI-BYOS-Production
@@ -1887,6 +1902,87 @@
python-bind-9.11.22-3.57.1 as a component of Image SLES12-SP5-EC2-SAP-BYOS
+
+ bind-utils-9.11.22-3.57.1 as a component of Image SLES12-SP5-GCE-BYOS
+
+
+ libbind9-161-9.11.22-3.57.1 as a component of Image SLES12-SP5-GCE-BYOS
+
+
+ libdns1110-9.11.22-3.57.1 as a component of Image SLES12-SP5-GCE-BYOS
+
+
+ libirs161-9.11.22-3.57.1 as a component of Image SLES12-SP5-GCE-BYOS
+
+
+ libisc1107-9.11.22-3.57.1 as a component of Image SLES12-SP5-GCE-BYOS
+
+
+ libisccc161-9.11.22-3.57.1 as a component of Image SLES12-SP5-GCE-BYOS
+
+
+ libisccfg163-9.11.22-3.57.1 as a component of Image SLES12-SP5-GCE-BYOS
+
+
+ liblwres161-9.11.22-3.57.1 as a component of Image SLES12-SP5-GCE-BYOS
+
+
+ python-bind-9.11.22-3.57.1 as a component of Image SLES12-SP5-GCE-BYOS
+
+
+ bind-utils-9.11.22-3.57.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ libbind9-161-9.11.22-3.57.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ libdns1110-9.11.22-3.57.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ libirs161-9.11.22-3.57.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ libisc1107-9.11.22-3.57.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ libisccc161-9.11.22-3.57.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ libisccfg163-9.11.22-3.57.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ liblwres161-9.11.22-3.57.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ python-bind-9.11.22-3.57.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ bind-utils-9.11.22-3.57.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
+
+ libbind9-161-9.11.22-3.57.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
+
+ libdns1110-9.11.22-3.57.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
+
+ libirs161-9.11.22-3.57.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
+
+ libisc1107-9.11.22-3.57.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
+
+ libisccc161-9.11.22-3.57.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
+
+ libisccfg163-9.11.22-3.57.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
+
+ liblwres161-9.11.22-3.57.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
+
+ python-bind-9.11.22-3.57.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
bind-utils-9.11.22-3.57.1 as a component of Image SLES12-SP5-SAP-Azure-LI-BYOS-Production
@@ -4068,42 +4164,6 @@
bind as a component of SUSE Linux Enterprise Server for SAP Applications 12 SP5
-
- bind-chrootenv as a component of SUSE Linux Enterprise Server for SAP Applications 12 SP5
-
-
- bind-doc as a component of SUSE Linux Enterprise Server for SAP Applications 12 SP5
-
-
- bind-utils as a component of SUSE Linux Enterprise Server for SAP Applications 12 SP5
-
-
- libbind9-161 as a component of SUSE Linux Enterprise Server for SAP Applications 12 SP5
-
-
- libdns1110 as a component of SUSE Linux Enterprise Server for SAP Applications 12 SP5
-
-
- libirs161 as a component of SUSE Linux Enterprise Server for SAP Applications 12 SP5
-
-
- libisc1107 as a component of SUSE Linux Enterprise Server for SAP Applications 12 SP5
-
-
- libisc1107-32bit as a component of SUSE Linux Enterprise Server for SAP Applications 12 SP5
-
-
- libisccc161 as a component of SUSE Linux Enterprise Server for SAP Applications 12 SP5
-
-
- libisccfg163 as a component of SUSE Linux Enterprise Server for SAP Applications 12 SP5
-
-
- liblwres161 as a component of SUSE Linux Enterprise Server for SAP Applications 12 SP5
-
-
- python-bind as a component of SUSE Linux Enterprise Server for SAP Applications 12 SP5
-
@@ -4151,6 +4211,33 @@
Image SLES12-SP5-EC2-SAP-BYOS:libisccfg163-9.11.22-3.57.1
Image SLES12-SP5-EC2-SAP-BYOS:liblwres161-9.11.22-3.57.1
Image SLES12-SP5-EC2-SAP-BYOS:python-bind-9.11.22-3.57.1
+ Image SLES12-SP5-GCE-BYOS:bind-utils-9.11.22-3.57.1
+ Image SLES12-SP5-GCE-BYOS:libbind9-161-9.11.22-3.57.1
+ Image SLES12-SP5-GCE-BYOS:libdns1110-9.11.22-3.57.1
+ Image SLES12-SP5-GCE-BYOS:libirs161-9.11.22-3.57.1
+ Image SLES12-SP5-GCE-BYOS:libisc1107-9.11.22-3.57.1
+ Image SLES12-SP5-GCE-BYOS:libisccc161-9.11.22-3.57.1
+ Image SLES12-SP5-GCE-BYOS:libisccfg163-9.11.22-3.57.1
+ Image SLES12-SP5-GCE-BYOS:liblwres161-9.11.22-3.57.1
+ Image SLES12-SP5-GCE-BYOS:python-bind-9.11.22-3.57.1
+ Image SLES12-SP5-GCE-SAP-BYOS:bind-utils-9.11.22-3.57.1
+ Image SLES12-SP5-GCE-SAP-BYOS:libbind9-161-9.11.22-3.57.1
+ Image SLES12-SP5-GCE-SAP-BYOS:libdns1110-9.11.22-3.57.1
+ Image SLES12-SP5-GCE-SAP-BYOS:libirs161-9.11.22-3.57.1
+ Image SLES12-SP5-GCE-SAP-BYOS:libisc1107-9.11.22-3.57.1
+ Image SLES12-SP5-GCE-SAP-BYOS:libisccc161-9.11.22-3.57.1
+ Image SLES12-SP5-GCE-SAP-BYOS:libisccfg163-9.11.22-3.57.1
+ Image SLES12-SP5-GCE-SAP-BYOS:liblwres161-9.11.22-3.57.1
+ Image SLES12-SP5-GCE-SAP-BYOS:python-bind-9.11.22-3.57.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:bind-utils-9.11.22-3.57.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:libbind9-161-9.11.22-3.57.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:libdns1110-9.11.22-3.57.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:libirs161-9.11.22-3.57.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:libisc1107-9.11.22-3.57.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:libisccc161-9.11.22-3.57.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:libisccfg163-9.11.22-3.57.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:liblwres161-9.11.22-3.57.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:python-bind-9.11.22-3.57.1
Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:bind-utils-9.11.22-3.57.1
Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:libbind9-161-9.11.22-3.57.1
Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:libdns1110-9.11.22-3.57.1
no cpe found for SUSE Liberty Linux 7 LTSS in CVE-2024-1936
no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2024-1753
no cpe found for SUSE Liberty Linux 7 LTSS in CVE-2024-1737
no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2024-1737
no cpe found for SUSE Manager Tools for SLE Micro 5 in CVE-2024-1737
--- /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2024-1737.xml 2024-10-20 01:31:06.640752000 +0200
+++ /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2024-1737.xml.new 2024-10-29 01:24:49.341855000 +0100
@@ -14,13 +14,13 @@
1
- 32
- 2024-10-19T23:31:06Z
+ 33
+ 2024-10-29T00:24:48Z
current
2024-07-25T23:24:01Z
- 2024-10-19T23:31:06Z
+ 2024-10-29T00:24:48Z
cve-database/bin/generate-cvrf-cve.pl
2020-12-27T01:00:00Z
@@ -101,6 +101,21 @@
Image SLES12-SP5-EC2-SAP-BYOS
+
+
+ Image SLES12-SP5-GCE-BYOS
+
+
+
+
+ Image SLES12-SP5-GCE-SAP-BYOS
+
+
+
+
+ Image SLES12-SP5-GCE-SAP-On-Demand
+
+
Image SLES12-SP5-SAP-Azure-LI-BYOS-Production
@@ -1871,6 +1886,87 @@
python-bind-9.11.22-3.57.1 as a component of Image SLES12-SP5-EC2-SAP-BYOS
+
+ bind-utils-9.11.22-3.57.1 as a component of Image SLES12-SP5-GCE-BYOS
+
+
+ libbind9-161-9.11.22-3.57.1 as a component of Image SLES12-SP5-GCE-BYOS
+
+
+ libdns1110-9.11.22-3.57.1 as a component of Image SLES12-SP5-GCE-BYOS
+
+
+ libirs161-9.11.22-3.57.1 as a component of Image SLES12-SP5-GCE-BYOS
+
+
+ libisc1107-9.11.22-3.57.1 as a component of Image SLES12-SP5-GCE-BYOS
+
+
+ libisccc161-9.11.22-3.57.1 as a component of Image SLES12-SP5-GCE-BYOS
+
+
+ libisccfg163-9.11.22-3.57.1 as a component of Image SLES12-SP5-GCE-BYOS
+
+
+ liblwres161-9.11.22-3.57.1 as a component of Image SLES12-SP5-GCE-BYOS
+
+
+ python-bind-9.11.22-3.57.1 as a component of Image SLES12-SP5-GCE-BYOS
+
+
+ bind-utils-9.11.22-3.57.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ libbind9-161-9.11.22-3.57.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ libdns1110-9.11.22-3.57.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ libirs161-9.11.22-3.57.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ libisc1107-9.11.22-3.57.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ libisccc161-9.11.22-3.57.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ libisccfg163-9.11.22-3.57.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ liblwres161-9.11.22-3.57.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ python-bind-9.11.22-3.57.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ bind-utils-9.11.22-3.57.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
+
+ libbind9-161-9.11.22-3.57.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
+
+ libdns1110-9.11.22-3.57.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
+
+ libirs161-9.11.22-3.57.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
+
+ libisc1107-9.11.22-3.57.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
+
+ libisccc161-9.11.22-3.57.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
+
+ libisccfg163-9.11.22-3.57.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
+
+ liblwres161-9.11.22-3.57.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
+
+ python-bind-9.11.22-3.57.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
bind-utils-9.11.22-3.57.1 as a component of Image SLES12-SP5-SAP-Azure-LI-BYOS-Production
@@ -3995,42 +4091,6 @@
bind as a component of SUSE Linux Enterprise Server for SAP Applications 12 SP5
-
- bind-chrootenv as a component of SUSE Linux Enterprise Server for SAP Applications 12 SP5
-
-
- bind-doc as a component of SUSE Linux Enterprise Server for SAP Applications 12 SP5
-
-
- bind-utils as a component of SUSE Linux Enterprise Server for SAP Applications 12 SP5
-
-
- libbind9-161 as a component of SUSE Linux Enterprise Server for SAP Applications 12 SP5
-
-
- libdns1110 as a component of SUSE Linux Enterprise Server for SAP Applications 12 SP5
-
-
- libirs161 as a component of SUSE Linux Enterprise Server for SAP Applications 12 SP5
-
-
- libisc1107 as a component of SUSE Linux Enterprise Server for SAP Applications 12 SP5
-
-
- libisc1107-32bit as a component of SUSE Linux Enterprise Server for SAP Applications 12 SP5
-
-
- libisccc161 as a component of SUSE Linux Enterprise Server for SAP Applications 12 SP5
-
-
- libisccfg163 as a component of SUSE Linux Enterprise Server for SAP Applications 12 SP5
-
-
- liblwres161 as a component of SUSE Linux Enterprise Server for SAP Applications 12 SP5
-
-
- python-bind as a component of SUSE Linux Enterprise Server for SAP Applications 12 SP5
-
@@ -4078,6 +4138,33 @@
Image SLES12-SP5-EC2-SAP-BYOS:libisccfg163-9.11.22-3.57.1
Image SLES12-SP5-EC2-SAP-BYOS:liblwres161-9.11.22-3.57.1
Image SLES12-SP5-EC2-SAP-BYOS:python-bind-9.11.22-3.57.1
+ Image SLES12-SP5-GCE-BYOS:bind-utils-9.11.22-3.57.1
+ Image SLES12-SP5-GCE-BYOS:libbind9-161-9.11.22-3.57.1
+ Image SLES12-SP5-GCE-BYOS:libdns1110-9.11.22-3.57.1
+ Image SLES12-SP5-GCE-BYOS:libirs161-9.11.22-3.57.1
+ Image SLES12-SP5-GCE-BYOS:libisc1107-9.11.22-3.57.1
+ Image SLES12-SP5-GCE-BYOS:libisccc161-9.11.22-3.57.1
+ Image SLES12-SP5-GCE-BYOS:libisccfg163-9.11.22-3.57.1
+ Image SLES12-SP5-GCE-BYOS:liblwres161-9.11.22-3.57.1
+ Image SLES12-SP5-GCE-BYOS:python-bind-9.11.22-3.57.1
+ Image SLES12-SP5-GCE-SAP-BYOS:bind-utils-9.11.22-3.57.1
+ Image SLES12-SP5-GCE-SAP-BYOS:libbind9-161-9.11.22-3.57.1
+ Image SLES12-SP5-GCE-SAP-BYOS:libdns1110-9.11.22-3.57.1
+ Image SLES12-SP5-GCE-SAP-BYOS:libirs161-9.11.22-3.57.1
+ Image SLES12-SP5-GCE-SAP-BYOS:libisc1107-9.11.22-3.57.1
+ Image SLES12-SP5-GCE-SAP-BYOS:libisccc161-9.11.22-3.57.1
+ Image SLES12-SP5-GCE-SAP-BYOS:libisccfg163-9.11.22-3.57.1
+ Image SLES12-SP5-GCE-SAP-BYOS:liblwres161-9.11.22-3.57.1
+ Image SLES12-SP5-GCE-SAP-BYOS:python-bind-9.11.22-3.57.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:bind-utils-9.11.22-3.57.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:libbind9-161-9.11.22-3.57.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:libdns1110-9.11.22-3.57.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:libirs161-9.11.22-3.57.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:libisc1107-9.11.22-3.57.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:libisccc161-9.11.22-3.57.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:libisccfg163-9.11.22-3.57.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:liblwres161-9.11.22-3.57.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:python-bind-9.11.22-3.57.1
Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:bind-utils-9.11.22-3.57.1
Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:libbind9-161-9.11.22-3.57.1
Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:libdns1110-9.11.22-3.57.1
no cpe found for SUSE Package Hub 15 SP5 in CVE-2024-1676
no cpe found for SUSE Package Hub 15 SP5 in CVE-2024-1675
no cpe found for SUSE Package Hub 15 SP5 in CVE-2024-1674
no cpe found for SUSE Package Hub 15 SP5 in CVE-2024-1673
no cpe found for SUSE Package Hub 15 SP5 in CVE-2024-1672
no cpe found for SUSE Package Hub 15 SP5 in CVE-2024-1671
no cpe found for SUSE Package Hub 15 SP5 in CVE-2024-1670
no cpe found for SUSE Package Hub 15 SP5 in CVE-2024-1669
No V5 entry found for CVE-2024-1627 / /home/securitybot/prod/cve-database/cvelistV5/cves/2024/1xxxx/CVE-2024-1627.json:No such file or directory
no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2024-1597
skipping CVE-2024-1557 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-1556 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-1555 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-1554 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-1553 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-1552 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-1551 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-1550 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-1549 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-1548 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-1547 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-1546 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-1441 as CVE page is older than CVRF-CVE file.
no cpe found for SUSE Manager Tools Beta for SLE Micro 5 in CVE-2024-1313
no cpe found for SUSE Manager Tools for SLE Micro 5 in CVE-2024-1313
no cpe found for openSUSE Leap 15.5 NonFree in CVE-2024-1284
skipping CVE-2024-1312 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-1305 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-1298 as CVE page is older than CVRF-CVE file.
no cpe found for openSUSE Leap 15.5 NonFree in CVE-2024-1283
No V5 entry found for CVE-2024-1271 / /home/securitybot/prod/cve-database/cvelistV5/cves/2024/1xxxx/CVE-2024-1271.json:No such file or directory
skipping CVE-2024-1151 as CVE page is older than CVRF-CVE file.
no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2024-1135
no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2024-1086
no cpe found for openSUSE Leap 15.5 NonFree in CVE-2024-1077
skipping CVE-2024-1085 as CVE page is older than CVRF-CVE file.
no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2024-1062
skipping CVE-2024-1065 as CVE page is older than CVRF-CVE file.
no cpe found for openSUSE Leap 15.5 NonFree in CVE-2024-1060
no cpe found for openSUSE Leap 15.5 NonFree in CVE-2024-1059
skipping CVE-2024-1048 as CVE page is older than CVRF-CVE file.
no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2024-0985
skipping CVE-2024-1013 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-0914 as CVE page is older than CVRF-CVE file.
no cpe found for SUSE Package Hub 15 SP6 in CVE-2024-0874
no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2024-0841
skipping CVE-2024-0853 as CVE page is older than CVRF-CVE file.
No V5 entry found for CVE-2024-0793 / /home/securitybot/prod/cve-database/cvelistV5/cves/2024/0xxxx/CVE-2024-0793.json:No such file or directory
no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2024-0793
no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2024-0775
CVE-2024-0690: no packages for SUSE Manager Tools Beta for SLE Micro 5, but entry?
CVE-2024-0690: no packages for SUSE Manager Tools for SLE Micro 5, but entry?
CVE-2024-0690: no packages for SUSE Linux Enterprise Module for Package Hub 15 SP5, but entry?
CVE-2024-0690: no packages for SUSE Linux Enterprise Module for Package Hub 15 SP5, but entry?
CVE-2024-0690: no packages for SUSE Manager Tools Beta for SLE Micro 5, but entry?
CVE-2024-0690: no packages for SUSE Manager Tools for SLE Micro 5, but entry?
CVE-2024-0690: no packages for SUSE Linux Enterprise Module for Package Hub 15 SP5, but entry?
CVE-2024-0690: no packages for SUSE Manager Tools Beta for SLE Micro 5, but entry?
CVE-2024-0690: no packages for SUSE Manager Tools for SLE Micro 5, but entry?
skipping CVE-2024-0760 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-0755 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-0754 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-0753 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-0752 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-0751 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-0750 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-0749 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-0748 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-0747 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-0746 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-0745 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-0744 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-0743 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-0742 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-0741 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-0727 as CVE page is older than CVRF-CVE file.
no cpe found for SUSE Package Hub 15 SP5 in CVE-2024-0519
no cpe found for openSUSE Leap 15.5 NonFree in CVE-2024-0519
skipping CVE-2024-0684 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-0671 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-0646 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-0641 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-0639 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-0607 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-0584 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-0582 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-0567 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-0565 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-0564 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-0562 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-0553 as CVE page is older than CVRF-CVE file.
no cpe found for SUSE Package Hub 15 SP5 in CVE-2024-0518
no cpe found for openSUSE Leap 15.5 NonFree in CVE-2024-0518
no cpe found for SUSE Package Hub 15 SP5 in CVE-2024-0517
no cpe found for openSUSE Leap 15.5 NonFree in CVE-2024-0517
no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2024-0397
skipping CVE-2024-0450 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-0444 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-0443 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-0409 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-0408 as CVE page is older than CVRF-CVE file.
--- /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2024-0397.xml 2024-10-22 01:53:40.977741000 +0200
+++ /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2024-0397.xml.new 2024-10-29 01:25:07.842841000 +0100
@@ -14,13 +14,13 @@
1
- 56
- 2024-10-21T23:53:40Z
+ 57
+ 2024-10-29T00:25:07Z
current
2024-06-17T23:18:37Z
- 2024-10-21T23:53:40Z
+ 2024-10-29T00:25:07Z
cve-database/bin/generate-cvrf-cve.pl
2020-12-27T01:00:00Z
@@ -1640,6 +1640,11 @@
SUSE Manager Proxy 4.3
+
+
+ SUSE Manager Proxy Module 4.3
+
+
SUSE Linux Enterprise Module for Public Cloud 15 SP4
@@ -1656,6 +1661,21 @@
SUSE Manager Server 4.3
+
+
+ SUSE Manager Server Module 4.3
+
+
+
+
+ SUSE Manager Tools 12
+
+
+
+
+ SUSE Manager Tools 15
+
+
openSUSE Leap 15.5
@@ -2371,6 +2391,12 @@
python39-tools-3.9.19-150300.4.46.1
+
+ venv-salt-minion-3006.0-150000.3.67.1
+
+
+ venv-salt-minion-3006.0-3.65.1
+
libpython3_6m1_0-3.6.15-150300.10.65.1 as a component of Container bci/bci-base-fips:15.5.4.1
@@ -5884,6 +5910,18 @@
python39-tk-3.9.19-2.1 as a component of openSUSE Tumbleweed
+
+ venv-salt-minion-3006.0-150000.3.67.1 as a component of SUSE Manager Proxy Module 4.3
+
+
+ venv-salt-minion-3006.0-150000.3.67.1 as a component of SUSE Manager Server Module 4.3
+
+
+ venv-salt-minion-3006.0-3.65.1 as a component of SUSE Manager Tools 12
+
+
+ venv-salt-minion-3006.0-150000.3.67.1 as a component of SUSE Manager Tools 15
+
python as a component of SUSE Enterprise Storage 7.1
@@ -7687,6 +7725,12 @@
openSUSE Tumbleweed:python39-idle-3.9.19-2.1
openSUSE Tumbleweed:python39-tk-3.9.19-2.1
+
+ SUSE Manager Proxy Module 4.3:venv-salt-minion-3006.0-150000.3.67.1
+ SUSE Manager Server Module 4.3:venv-salt-minion-3006.0-150000.3.67.1
+ SUSE Manager Tools 12:venv-salt-minion-3006.0-3.65.1
+ SUSE Manager Tools 15:venv-salt-minion-3006.0-150000.3.67.1
+
SUSE Enterprise Storage 7.1:python
SUSE Enterprise Storage 7.1:python-tk
no cpe found for SUSE Package Hub 15 SP5 in CVE-2024-0333
skipping CVE-2024-0340 as CVE page is older than CVRF-CVE file.
no cpe found for SUSE Package Hub 15 SP5 in CVE-2024-0225
no cpe found for openSUSE Leap 15.5 NonFree in CVE-2024-0225
skipping CVE-2024-0232 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-0229 as CVE page is older than CVRF-CVE file.
no cpe found for SUSE Package Hub 15 SP5 in CVE-2024-0224
no cpe found for openSUSE Leap 15.5 NonFree in CVE-2024-0224
no cpe found for SUSE Package Hub 15 SP5 in CVE-2024-0223
no cpe found for openSUSE Leap 15.5 NonFree in CVE-2024-0223
no cpe found for SUSE Package Hub 15 SP5 in CVE-2024-0222
no cpe found for openSUSE Leap 15.5 NonFree in CVE-2024-0222
skipping CVE-2024-0217 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-0211 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-0210 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-0209 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-0208 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-0207 as CVE page is older than CVRF-CVE file.
skipping CVE-2024-0193 as CVE page is older than CVRF-CVE file.
Use of uninitialized value $mtime in numeric lt (<) at bin/generate-cvrf-cve.pl line 162.
Use of uninitialized value $mtime in numeric lt (<) at bin/generate-cvrf-cve.pl line 162.
Use of uninitialized value $mtime in numeric lt (<) at bin/generate-cvrf-cve.pl line 162.
no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2024-0092
no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2024-0091
no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2024-0090
no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2024-0075
no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2024-0074
no cpe found for SUSE Linux Enterprise Module for Confidential Computing Technical Preview 15 SP6 in CVE-2023-52915
skipping CVE-2023-52916 as CVE page is older than CVRF-CVE file.
--- /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2023-52915.xml 2024-10-16 01:35:33.450363000 +0200
+++ /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2023-52915.xml.new 2024-10-29 01:25:16.537102000 +0100
@@ -14,13 +14,13 @@
1
- 9
- 2024-10-15T23:35:32Z
+ 10
+ 2024-10-29T00:25:15Z
current
2024-09-06T23:27:25Z
- 2024-10-15T23:35:32Z
+ 2024-10-29T00:25:15Z
cve-database/bin/generate-cvrf-cve.pl
2020-12-27T01:00:00Z
@@ -88,6 +88,21 @@
Container suse/hpc/warewulf4-x86_64/sle-hpc-node:15.6.17.5.49
+
+
+ Image SLES12-SP5-GCE-BYOS
+
+
+
+
+ Image SLES12-SP5-GCE-SAP-BYOS
+
+
+
+
+ Image SLES12-SP5-GCE-SAP-On-Demand
+
+
SUSE Linux Enterprise Module for Basesystem 15 SP5
@@ -425,6 +440,253 @@
openSUSE Leap 15.6
+
+
+ SLES 15 SP1 CHOST Images for Amazon EC2 suse-sles-15-sp1-chost-byos-v20210304-hvm-ssd-x86_64
+ SLES 15 SP1 CHOST Images for Amazon EC2 suse-sles-15-sp1-chost-byos-v20220127-hvm-ssd-x86_64
+ SLES 15 SP1 CHOST Images for Amazon EC2 suse-sles-15-sp1-chost-byos-v20220715-hvm-ssd-x86_64
+
+
+ SLES 15 SP2 CHOST Images for Amazon EC2 suse-sles-15-sp2-chost-byos-v20210610-hvm-ssd-x86_64
+ SLES 15 SP2 CHOST Images for Amazon EC2 suse-sles-15-sp2-chost-byos-v20210722-hvm-ssd-x86_64
+ SLES 15 SP2 CHOST Images for Amazon EC2 suse-sles-15-sp2-chost-byos-v20210913-hvm-ssd-x86_64
+ SLES 15 SP2 CHOST Images for Amazon EC2 suse-sles-15-sp2-chost-byos-v20211025-hvm-ssd-x86_64
+ SLES 15 SP2 CHOST Images for Amazon EC2 suse-sles-15-sp2-chost-byos-v20220126-hvm-ssd-x86_64
+ SLES 15 SP2 CHOST Images for Amazon EC2 suse-sles-15-sp2-chost-byos-v20220718-hvm-ssd-x86_64
+
+
+ SLES 15 SP3 CHOST Images for Amazon EC2 suse-sles-15-sp3-chost-byos-v20210729-hvm-ssd-x86_64
+ SLES 15 SP3 CHOST Images for Amazon EC2 suse-sles-15-sp3-chost-byos-v20210827-hvm-ssd-x86_64
+ SLES 15 SP3 CHOST Images for Amazon EC2 suse-sles-15-sp3-chost-byos-v20210927-hvm-ssd-x86_64
+ SLES 15 SP3 CHOST Images for Amazon EC2 suse-sles-15-sp3-chost-byos-v20211004-hvm-ssd-x86_64
+ SLES 15 SP3 CHOST Images for Amazon EC2 suse-sles-15-sp3-chost-byos-v20211101-hvm-ssd-x86_64
+ SLES 15 SP3 CHOST Images for Amazon EC2 suse-sles-15-sp3-chost-byos-v20211202-hvm-ssd-x86_64
+ SLES 15 SP3 CHOST Images for Amazon EC2 suse-sles-15-sp3-chost-byos-v20220103-hvm-ssd-x86_64
+ SLES 15 SP3 CHOST Images for Amazon EC2 suse-sles-15-sp3-chost-byos-v20220126-hvm-ssd-x86_64
+ SLES 15 SP3 CHOST Images for Amazon EC2 suse-sles-15-sp3-chost-byos-v20220222-hvm-ssd-x86_64
+ SLES 15 SP3 CHOST Images for Amazon EC2 suse-sles-15-sp3-chost-byos-v20220310-hvm-ssd-x86_64
+ SLES 15 SP3 CHOST Images for Amazon EC2 suse-sles-15-sp3-chost-byos-v20220411-hvm-ssd-x86_64
+ SLES 15 SP3 CHOST Images for Amazon EC2 suse-sles-15-sp3-chost-byos-v20220510-hvm-ssd-x86_64
+ SLES 15 SP3 CHOST Images for Amazon EC2 suse-sles-15-sp3-chost-byos-v20220608-hvm-ssd-x86_64
+ SLES 15 SP3 CHOST Images for Amazon EC2 suse-sles-15-sp3-chost-byos-v20220708-hvm-ssd-x86_64
+ SLES 15 SP3 CHOST Images for Amazon EC2 suse-sles-15-sp3-chost-byos-v20220718-hvm-ssd-x86_64
+ SLES 15 SP3 CHOST Images for Amazon EC2 suse-sles-15-sp3-chost-byos-v20220818-hvm-ssd-x86_64
+ SLES 15 SP3 CHOST Images for Amazon EC2 suse-sles-15-sp3-chost-byos-v20220916-hvm-ssd-x86_64
+ SLES 15 SP3 CHOST Images for Amazon EC2 suse-sles-15-sp3-chost-byos-v20220921-hvm-ssd-x86_64
+ SLES 15 SP3 CHOST Images for Amazon EC2 suse-sles-15-sp3-chost-byos-v20221019-hvm-ssd-x86_64
+ SLES 15 SP3 CHOST Images for Amazon EC2 suse-sles-15-sp3-chost-byos-v20221119-hvm-ssd-x86_64
+ SLES 15 SP3 CHOST Images for Amazon EC2 suse-sles-15-sp3-chost-byos-v20221215-hvm-ssd-x86_64
+ SLES 15 SP3 CHOST Images for Amazon EC2 suse-sles-15-sp3-chost-byos-v20230313-hvm-ssd-x86_64
+ SLES 15 SP3 CHOST Images for Amazon EC2 suse-sles-15-sp3-chost-byos-v20230613-hvm-ssd-x86_64
+ SLES 15 SP3 CHOST Images for Amazon EC2 suse-sles-15-sp3-chost-byos-v20240807-hvm-ssd-x86_64
+ SLES 15 SP3 CHOST Images for Amazon EC2 suse-sles-15-sp3-chost-byos-v20240912-hvm-ssd-x86_64
+
+
+ SLES 15 SP4 CHOST Images for Amazon EC2 suse-sles-15-sp4-chost-byos-v20220718-hvm-ssd-x86_64
+ SLES 15 SP4 CHOST Images for Amazon EC2 suse-sles-15-sp4-chost-byos-v20220721-hvm-ssd-x86_64
+ SLES 15 SP4 CHOST Images for Amazon EC2 suse-sles-15-sp4-chost-byos-v20220819-hvm-ssd-x86_64
+ SLES 15 SP4 CHOST Images for Amazon EC2 suse-sles-15-sp4-chost-byos-v20220916-hvm-ssd-x86_64
+ SLES 15 SP4 CHOST Images for Amazon EC2 suse-sles-15-sp4-chost-byos-v20220923-hvm-ssd-x86_64
+ SLES 15 SP4 CHOST Images for Amazon EC2 suse-sles-15-sp4-chost-byos-v20221018-hvm-ssd-x86_64
+ SLES 15 SP4 CHOST Images for Amazon EC2 suse-sles-15-sp4-chost-byos-v20221118-hvm-ssd-x86_64
+ SLES 15 SP4 CHOST Images for Amazon EC2 suse-sles-15-sp4-chost-byos-v20221215-hvm-ssd-x86_64
+ SLES 15 SP4 CHOST Images for Amazon EC2 suse-sles-15-sp4-chost-byos-v20230111-hvm-ssd-x86_64
+ SLES 15 SP4 CHOST Images for Amazon EC2 suse-sles-15-sp4-chost-byos-v20230210-hvm-ssd-x86_64
+ SLES 15 SP4 CHOST Images for Amazon EC2 suse-sles-15-sp4-chost-byos-v20230310-hvm-ssd-x86_64
+ SLES 15 SP4 CHOST Images for Amazon EC2 suse-sles-15-sp4-chost-byos-v20230410-hvm-ssd-x86_64
+ SLES 15 SP4 CHOST Images for Amazon EC2 suse-sles-15-sp4-chost-byos-v20230510-hvm-ssd-x86_64
+ SLES 15 SP4 CHOST Images for Amazon EC2 suse-sles-15-sp4-chost-byos-v20230606-hvm-ssd-x86_64
+ SLES 15 SP4 CHOST Images for Amazon EC2 suse-sles-15-sp4-chost-byos-v20230704-hvm-ssd-x86_64
+ SLES 15 SP4 CHOST Images for Amazon EC2 suse-sles-15-sp4-chost-byos-v20230803-hvm-ssd-x86_64
+ SLES 15 SP4 CHOST Images for Amazon EC2 suse-sles-15-sp4-chost-byos-v20230901-hvm-ssd-x86_64
+ SLES 15 SP4 CHOST Images for Amazon EC2 suse-sles-15-sp4-chost-byos-v20230928-hvm-ssd-x86_64
+ SLES 15 SP4 CHOST Images for Amazon EC2 suse-sles-15-sp4-chost-byos-v20231027-hvm-ssd-x86_64
+ SLES 15 SP4 CHOST Images for Amazon EC2 suse-sles-15-sp4-chost-byos-v20231127-hvm-ssd-x86_64
+ SLES 15 SP4 CHOST Images for Amazon EC2 suse-sles-15-sp4-chost-byos-v20231212-hvm-ssd-x86_64
+ SLES 15 SP4 CHOST Images for Amazon EC2 suse-sles-15-sp4-chost-byos-v20240312-hvm-ssd-x86_64
+ SLES 15 SP4 CHOST Images for Amazon EC2 suse-sles-15-sp4-chost-byos-v20240612-hvm-ssd-x86_64
+ SLES 15 SP4 CHOST Images for Amazon EC2 suse-sles-15-sp4-chost-byos-v20240809-hvm-ssd-x86_64
+ SLES 15 SP4 CHOST Images for Amazon EC2 suse-sles-15-sp4-chost-byos-v20240912-hvm-ssd-x86_64
+
+
+ SLES 15 SP1 CHOST Images for Google sles-15-sp1-chost-byos-v20210202
+ SLES 15 SP1 CHOST Images for Google sles-15-sp1-chost-byos-v20210304
+ SLES 15 SP1 CHOST Images for Google sles-15-sp1-chost-byos-v20220127
+ SLES 15 SP1 CHOST Images for Google sles-15-sp1-chost-byos-v20220715-x86-64
+
+
+ SLES 15 SP2 CHOST Images for Google sles-15-sp2-chost-byos-v20210202
+ SLES 15 SP2 CHOST Images for Google sles-15-sp2-chost-byos-v20210304
+ SLES 15 SP2 CHOST Images for Google sles-15-sp2-chost-byos-v20210405
+ SLES 15 SP2 CHOST Images for Google sles-15-sp2-chost-byos-v20210506
+ SLES 15 SP2 CHOST Images for Google sles-15-sp2-chost-byos-v20210610
+ SLES 15 SP2 CHOST Images for Google sles-15-sp2-chost-byos-v20210722
+ SLES 15 SP2 CHOST Images for Google sles-15-sp2-chost-byos-v20210913
+ SLES 15 SP2 CHOST Images for Google sles-15-sp2-chost-byos-v20211025
+ SLES 15 SP2 CHOST Images for Google sles-15-sp2-chost-byos-v20220126
+ SLES 15 SP2 CHOST Images for Google sles-15-sp2-chost-byos-v20220718-x86-64
+
+
+ SLES 15 SP3 CHOST Images for Google sles-15-sp3-chost-byos-v20210729
+ SLES 15 SP3 CHOST Images for Google sles-15-sp3-chost-byos-v20210827
+ SLES 15 SP3 CHOST Images for Google sles-15-sp3-chost-byos-v20210927
+ SLES 15 SP3 CHOST Images for Google sles-15-sp3-chost-byos-v20211004
+ SLES 15 SP3 CHOST Images for Google sles-15-sp3-chost-byos-v20211101
+ SLES 15 SP3 CHOST Images for Google sles-15-sp3-chost-byos-v20211202
+ SLES 15 SP3 CHOST Images for Google sles-15-sp3-chost-byos-v20220103
+ SLES 15 SP3 CHOST Images for Google sles-15-sp3-chost-byos-v20220126
+ SLES 15 SP3 CHOST Images for Google sles-15-sp3-chost-byos-v20220222
+ SLES 15 SP3 CHOST Images for Google sles-15-sp3-chost-byos-v20220310
+ SLES 15 SP3 CHOST Images for Google sles-15-sp3-chost-byos-v20220411-x86-64
+ SLES 15 SP3 CHOST Images for Google sles-15-sp3-chost-byos-v20220510-x86-64
+ SLES 15 SP3 CHOST Images for Google sles-15-sp3-chost-byos-v20220608-x86-64
+ SLES 15 SP3 CHOST Images for Google sles-15-sp3-chost-byos-v20220708-x86-64
+ SLES 15 SP3 CHOST Images for Google sles-15-sp3-chost-byos-v20220718-x86-64
+ SLES 15 SP3 CHOST Images for Google sles-15-sp3-chost-byos-v20220818-x86-64
+ SLES 15 SP3 CHOST Images for Google sles-15-sp3-chost-byos-v20220916-x86-64
+ SLES 15 SP3 CHOST Images for Google sles-15-sp3-chost-byos-v20221019-x86-64
+ SLES 15 SP3 CHOST Images for Google sles-15-sp3-chost-byos-v20221118-x86-64
+ SLES 15 SP3 CHOST Images for Google sles-15-sp3-chost-byos-v20221215-x86-64
+ SLES 15 SP3 CHOST Images for Google sles-15-sp3-chost-byos-v20230313-x86-64
+ SLES 15 SP3 CHOST Images for Google sles-15-sp3-chost-byos-v20230613-x86-64
+ SLES 15 SP3 CHOST Images for Google sles-15-sp3-chost-byos-v20240807-x86-64
+ SLES 15 SP3 CHOST Images for Google sles-15-sp3-chost-byos-v20240912-x86-64
+
+
+ SLES 15 SP4 CHOST Images for Google sles-15-sp4-chost-byos-v20220718-x86-64
+ SLES 15 SP4 CHOST Images for Google sles-15-sp4-chost-byos-v20220721-x86-64
+ SLES 15 SP4 CHOST Images for Google sles-15-sp4-chost-byos-v20220818-x86-64
+ SLES 15 SP4 CHOST Images for Google sles-15-sp4-chost-byos-v20220916-x86-64
+ SLES 15 SP4 CHOST Images for Google sles-15-sp4-chost-byos-v20221018-x86-64
+ SLES 15 SP4 CHOST Images for Google sles-15-sp4-chost-byos-v20221118-x86-64
+ SLES 15 SP4 CHOST Images for Google sles-15-sp4-chost-byos-v20221215-arm64
+ SLES 15 SP4 CHOST Images for Google sles-15-sp4-chost-byos-v20221215-x86-64
+ SLES 15 SP4 CHOST Images for Google sles-15-sp4-chost-byos-v20230111-arm64
+ SLES 15 SP4 CHOST Images for Google sles-15-sp4-chost-byos-v20230111-x86-64
+ SLES 15 SP4 CHOST Images for Google sles-15-sp4-chost-byos-v20230210-arm64
+ SLES 15 SP4 CHOST Images for Google sles-15-sp4-chost-byos-v20230210-x86-64
+ SLES 15 SP4 CHOST Images for Google sles-15-sp4-chost-byos-v20230310-arm64
+ SLES 15 SP4 CHOST Images for Google sles-15-sp4-chost-byos-v20230310-x86-64
+ SLES 15 SP4 CHOST Images for Google sles-15-sp4-chost-byos-v20230410-arm64
+ SLES 15 SP4 CHOST Images for Google sles-15-sp4-chost-byos-v20230410-x86-64
+ SLES 15 SP4 CHOST Images for Google sles-15-sp4-chost-byos-v20230510-arm64
+ SLES 15 SP4 CHOST Images for Google sles-15-sp4-chost-byos-v20230510-x86-64
+ SLES 15 SP4 CHOST Images for Google sles-15-sp4-chost-byos-v20230606-arm64
+ SLES 15 SP4 CHOST Images for Google sles-15-sp4-chost-byos-v20230606-x86-64
+ SLES 15 SP4 CHOST Images for Google sles-15-sp4-chost-byos-v20230704-arm64
+ SLES 15 SP4 CHOST Images for Google sles-15-sp4-chost-byos-v20230704-x86-64
+ SLES 15 SP4 CHOST Images for Google sles-15-sp4-chost-byos-v20230804-arm64
+ SLES 15 SP4 CHOST Images for Google sles-15-sp4-chost-byos-v20230804-x86-64
+ SLES 15 SP4 CHOST Images for Google sles-15-sp4-chost-byos-v20230901-arm64
+ SLES 15 SP4 CHOST Images for Google sles-15-sp4-chost-byos-v20230901-x86-64
+ SLES 15 SP4 CHOST Images for Google sles-15-sp4-chost-byos-v20230928-arm64
+ SLES 15 SP4 CHOST Images for Google sles-15-sp4-chost-byos-v20230928-x86-64
+ SLES 15 SP4 CHOST Images for Google sles-15-sp4-chost-byos-v20231027-arm64
+ SLES 15 SP4 CHOST Images for Google sles-15-sp4-chost-byos-v20231027-x86-64
+ SLES 15 SP4 CHOST Images for Google sles-15-sp4-chost-byos-v20231127-arm64
+ SLES 15 SP4 CHOST Images for Google sles-15-sp4-chost-byos-v20231127-x86-64
+ SLES 15 SP4 CHOST Images for Google sles-15-sp4-chost-byos-v20231212-arm64
+ SLES 15 SP4 CHOST Images for Google sles-15-sp4-chost-byos-v20231212-x86-64
+ SLES 15 SP4 CHOST Images for Google sles-15-sp4-chost-byos-v20240312-arm64
+ SLES 15 SP4 CHOST Images for Google sles-15-sp4-chost-byos-v20240312-x86-64
+ SLES 15 SP4 CHOST Images for Google sles-15-sp4-chost-byos-v20240612-arm64
+ SLES 15 SP4 CHOST Images for Google sles-15-sp4-chost-byos-v20240612-x86-64
+ SLES 15 SP4 CHOST Images for Google sles-15-sp4-chost-byos-v20240809-arm64
+ SLES 15 SP4 CHOST Images for Google sles-15-sp4-chost-byos-v20240809-x86-64
+ SLES 15 SP4 CHOST Images for Google sles-15-sp4-chost-byos-v20240912-arm64
+ SLES 15 SP4 CHOST Images for Google sles-15-sp4-chost-byos-v20240912-x86-64
+
+
+ SLES 15 SP1 CHOST Images for Microsoft Azure suse-sles-15-sp1-chost-byos-v20210202
+ SLES 15 SP1 CHOST Images for Microsoft Azure suse-sles-15-sp1-chost-byos-v20210304
+ SLES 15 SP1 CHOST Images for Microsoft Azure suse-sles-15-sp1-chost-byos-v20220127
+ SLES 15 SP1 CHOST Images for Microsoft Azure suse-sles-15-sp1-chost-byos-v20220715-x86_64
+
+
+ SLES 15 SP2 CHOST Images for Microsoft Azure suse-sles-15-sp2-chost-byos-v20210202
+ SLES 15 SP2 CHOST Images for Microsoft Azure suse-sles-15-sp2-chost-byos-v20210304
+ SLES 15 SP2 CHOST Images for Microsoft Azure suse-sles-15-sp2-chost-byos-v20210405
+ SLES 15 SP2 CHOST Images for Microsoft Azure suse-sles-15-sp2-chost-byos-v20210506
+ SLES 15 SP2 CHOST Images for Microsoft Azure suse-sles-15-sp2-chost-byos-v20210610
+ SLES 15 SP2 CHOST Images for Microsoft Azure suse-sles-15-sp2-chost-byos-v20210722
+ SLES 15 SP2 CHOST Images for Microsoft Azure suse-sles-15-sp2-chost-byos-v20210913
+ SLES 15 SP2 CHOST Images for Microsoft Azure suse-sles-15-sp2-chost-byos-v20211025
+ SLES 15 SP2 CHOST Images for Microsoft Azure suse-sles-15-sp2-chost-byos-v20220126
+ SLES 15 SP2 CHOST Images for Microsoft Azure suse-sles-15-sp2-chost-byos-v20220718-x86_64
+
+
+ SLES 15 SP3 CHOST Images for Microsoft Azure suse-sles-15-sp3-chost-byos-v20210729
+ SLES 15 SP3 CHOST Images for Microsoft Azure suse-sles-15-sp3-chost-byos-v20210827
+ SLES 15 SP3 CHOST Images for Microsoft Azure suse-sles-15-sp3-chost-byos-v20210927
+ SLES 15 SP3 CHOST Images for Microsoft Azure suse-sles-15-sp3-chost-byos-v20211004
+ SLES 15 SP3 CHOST Images for Microsoft Azure suse-sles-15-sp3-chost-byos-v20211101
+ SLES 15 SP3 CHOST Images for Microsoft Azure suse-sles-15-sp3-chost-byos-v20211202
+ SLES 15 SP3 CHOST Images for Microsoft Azure suse-sles-15-sp3-chost-byos-v20220103
+ SLES 15 SP3 CHOST Images for Microsoft Azure suse-sles-15-sp3-chost-byos-v20220126
+ SLES 15 SP3 CHOST Images for Microsoft Azure suse-sles-15-sp3-chost-byos-v20220222
+ SLES 15 SP3 CHOST Images for Microsoft Azure suse-sles-15-sp3-chost-byos-v20220310
+ SLES 15 SP3 CHOST Images for Microsoft Azure suse-sles-15-sp3-chost-byos-v20220411-x86_64
+ SLES 15 SP3 CHOST Images for Microsoft Azure suse-sles-15-sp3-chost-byos-v20220510-x86_64
+ SLES 15 SP3 CHOST Images for Microsoft Azure suse-sles-15-sp3-chost-byos-v20220609-x86_64
+ SLES 15 SP3 CHOST Images for Microsoft Azure suse-sles-15-sp3-chost-byos-v20220708-x86_64
+ SLES 15 SP3 CHOST Images for Microsoft Azure suse-sles-15-sp3-chost-byos-v20220718-x86_64
+ SLES 15 SP3 CHOST Images for Microsoft Azure suse-sles-15-sp3-chost-byos-v20220818-x86_64
+ SLES 15 SP3 CHOST Images for Microsoft Azure suse-sles-15-sp3-chost-byos-v20220916-x86_64
+ SLES 15 SP3 CHOST Images for Microsoft Azure suse-sles-15-sp3-chost-byos-v20220921-x86_64
+ SLES 15 SP3 CHOST Images for Microsoft Azure suse-sles-15-sp3-chost-byos-v20221019-x86_64
+ SLES 15 SP3 CHOST Images for Microsoft Azure suse-sles-15-sp3-chost-byos-v20221119-x86_64
+ SLES 15 SP3 CHOST Images for Microsoft Azure suse-sles-15-sp3-chost-byos-v20221215-x86_64
+ SLES 15 SP3 CHOST Images for Microsoft Azure suse-sles-15-sp3-chost-byos-v20230313-x86_64
+ SLES 15 SP3 CHOST Images for Microsoft Azure suse-sles-15-sp3-chost-byos-v20230613-x86_64
+ SLES 15 SP3 CHOST Images for Microsoft Azure suse-sles-15-sp3-chost-byos-v20240807-x86_64
+ SLES 15 SP3 CHOST Images for Microsoft Azure suse-sles-15-sp3-chost-byos-v20240912-x86_64
+
+
+ SLES 15 SP4 CHOST Images for Microsoft Azure suse-sles-15-sp4-chost-byos-v20220718-x86_64
+ SLES 15 SP4 CHOST Images for Microsoft Azure suse-sles-15-sp4-chost-byos-v20220721-x86_64
+ SLES 15 SP4 CHOST Images for Microsoft Azure suse-sles-15-sp4-chost-byos-v20220819-x86_64
+ SLES 15 SP4 CHOST Images for Microsoft Azure suse-sles-15-sp4-chost-byos-v20220916-x86_64
+ SLES 15 SP4 CHOST Images for Microsoft Azure suse-sles-15-sp4-chost-byos-v20220923-x86_64
+ SLES 15 SP4 CHOST Images for Microsoft Azure suse-sles-15-sp4-chost-byos-v20221018-x86_64
+ SLES 15 SP4 CHOST Images for Microsoft Azure suse-sles-15-sp4-chost-byos-v20221118-x86_64
+ SLES 15 SP4 CHOST Images for Microsoft Azure suse-sles-15-sp4-chost-byos-v20221215-arm64
+ SLES 15 SP4 CHOST Images for Microsoft Azure suse-sles-15-sp4-chost-byos-v20221215-x86_64
+ SLES 15 SP4 CHOST Images for Microsoft Azure suse-sles-15-sp4-chost-byos-v20230111-arm64
+ SLES 15 SP4 CHOST Images for Microsoft Azure suse-sles-15-sp4-chost-byos-v20230111-x86_64
+ SLES 15 SP4 CHOST Images for Microsoft Azure suse-sles-15-sp4-chost-byos-v20230210-arm64
+ SLES 15 SP4 CHOST Images for Microsoft Azure suse-sles-15-sp4-chost-byos-v20230210-x86_64
+ SLES 15 SP4 CHOST Images for Microsoft Azure suse-sles-15-sp4-chost-byos-v20230310-arm64
+ SLES 15 SP4 CHOST Images for Microsoft Azure suse-sles-15-sp4-chost-byos-v20230310-x86_64
+ SLES 15 SP4 CHOST Images for Microsoft Azure suse-sles-15-sp4-chost-byos-v20230410-arm64
+ SLES 15 SP4 CHOST Images for Microsoft Azure suse-sles-15-sp4-chost-byos-v20230410-x86_64
+ SLES 15 SP4 CHOST Images for Microsoft Azure suse-sles-15-sp4-chost-byos-v20230510-arm64
+ SLES 15 SP4 CHOST Images for Microsoft Azure suse-sles-15-sp4-chost-byos-v20230510-x86_64
+ SLES 15 SP4 CHOST Images for Microsoft Azure suse-sles-15-sp4-chost-byos-v20230606-arm64
+ SLES 15 SP4 CHOST Images for Microsoft Azure suse-sles-15-sp4-chost-byos-v20230606-x86_64
+ SLES 15 SP4 CHOST Images for Microsoft Azure suse-sles-15-sp4-chost-byos-v20230704-arm64
+ SLES 15 SP4 CHOST Images for Microsoft Azure suse-sles-15-sp4-chost-byos-v20230704-x86_64
+ SLES 15 SP4 CHOST Images for Microsoft Azure suse-sles-15-sp4-chost-byos-v20230803-arm64
+ SLES 15 SP4 CHOST Images for Microsoft Azure suse-sles-15-sp4-chost-byos-v20230803-x86_64
+ SLES 15 SP4 CHOST Images for Microsoft Azure suse-sles-15-sp4-chost-byos-v20230901-arm64
+ SLES 15 SP4 CHOST Images for Microsoft Azure suse-sles-15-sp4-chost-byos-v20230901-x86_64
+ SLES 15 SP4 CHOST Images for Microsoft Azure suse-sles-15-sp4-chost-byos-v20230928-arm64
+ SLES 15 SP4 CHOST Images for Microsoft Azure suse-sles-15-sp4-chost-byos-v20230928-x86_64
+ SLES 15 SP4 CHOST Images for Microsoft Azure suse-sles-15-sp4-chost-byos-v20231027-arm64
+ SLES 15 SP4 CHOST Images for Microsoft Azure suse-sles-15-sp4-chost-byos-v20231027-x86_64
+ SLES 15 SP4 CHOST Images for Microsoft Azure suse-sles-15-sp4-chost-byos-v20231127-arm64
+ SLES 15 SP4 CHOST Images for Microsoft Azure suse-sles-15-sp4-chost-byos-v20231127-x86_64
+ SLES 15 SP4 CHOST Images for Microsoft Azure suse-sles-15-sp4-chost-byos-v20231212-arm64
+ SLES 15 SP4 CHOST Images for Microsoft Azure suse-sles-15-sp4-chost-byos-v20231212-x86_64
+ SLES 15 SP4 CHOST Images for Microsoft Azure suse-sles-15-sp4-chost-byos-v20240312-arm64
+ SLES 15 SP4 CHOST Images for Microsoft Azure suse-sles-15-sp4-chost-byos-v20240312-x86_64
+ SLES 15 SP4 CHOST Images for Microsoft Azure suse-sles-15-sp4-chost-byos-v20240612-arm64
+ SLES 15 SP4 CHOST Images for Microsoft Azure suse-sles-15-sp4-chost-byos-v20240612-x86_64
+ SLES 15 SP4 CHOST Images for Microsoft Azure suse-sles-15-sp4-chost-byos-v20240809-arm64
+ SLES 15 SP4 CHOST Images for Microsoft Azure suse-sles-15-sp4-chost-byos-v20240809-x86_64
+ SLES 15 SP4 CHOST Images for Microsoft Azure suse-sles-15-sp4-chost-byos-v20240912-arm64
+ SLES 15 SP4 CHOST Images for Microsoft Azure suse-sles-15-sp4-chost-byos-v20240912-x86_64
+
+
cluster-md-kmp-64kb-6.4.0-150600.23.25.1
@@ -953,6 +1215,39 @@
kernel-default-6.4.0-150600.23.25.1 as a component of Container suse/hpc/warewulf4-x86_64/sle-hpc-node:15.6.17.5.49
+
+ kernel-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-BYOS
+
+
+ cluster-md-kmp-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ dlm-kmp-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ gfs2-kmp-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ kernel-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ ocfs2-kmp-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ cluster-md-kmp-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
+
+ dlm-kmp-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
+
+ gfs2-kmp-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
+
+ kernel-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
+
+ ocfs2-kmp-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
cluster-md-kmp-default-4.12.14-122.231.1 as a component of SUSE Linux Enterprise High Availability Extension 12 SP5
@@ -2133,6 +2428,17 @@
Container bci/bci-sle15-kernel-module-devel:15.6.27.8:kernel-macros-6.4.0-150600.23.25.1
Container bci/bci-sle15-kernel-module-devel:15.6.27.8:kernel-syms-6.4.0-150600.23.25.1
Container suse/hpc/warewulf4-x86_64/sle-hpc-node:15.6.17.5.49:kernel-default-6.4.0-150600.23.25.1
+ Image SLES12-SP5-GCE-BYOS:kernel-default-4.12.14-122.231.1
+ Image SLES12-SP5-GCE-SAP-BYOS:cluster-md-kmp-default-4.12.14-122.231.1
+ Image SLES12-SP5-GCE-SAP-BYOS:dlm-kmp-default-4.12.14-122.231.1
+ Image SLES12-SP5-GCE-SAP-BYOS:gfs2-kmp-default-4.12.14-122.231.1
+ Image SLES12-SP5-GCE-SAP-BYOS:kernel-default-4.12.14-122.231.1
+ Image SLES12-SP5-GCE-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.231.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:cluster-md-kmp-default-4.12.14-122.231.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:dlm-kmp-default-4.12.14-122.231.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:gfs2-kmp-default-4.12.14-122.231.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:kernel-default-4.12.14-122.231.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:ocfs2-kmp-default-4.12.14-122.231.1
SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.231.1
SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.231.1
SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.231.1
@@ -2345,6 +2651,229 @@
SUSE Linux Enterprise Server 11 SP4 LTSS:kernel-default
SUSE Linux Enterprise Server 11 SP4 LTSS:kernel-source
+
+ chost:amazon/suse-sles-15-sp1-chost-byos-v20210304-hvm-ssd-x86_64
+ chost:amazon/suse-sles-15-sp1-chost-byos-v20220127-hvm-ssd-x86_64
+ chost:amazon/suse-sles-15-sp1-chost-byos-v20220715-hvm-ssd-x86_64
+ chost:amazon/suse-sles-15-sp2-chost-byos-v20210610-hvm-ssd-x86_64
+ chost:amazon/suse-sles-15-sp2-chost-byos-v20210722-hvm-ssd-x86_64
+ chost:amazon/suse-sles-15-sp2-chost-byos-v20210913-hvm-ssd-x86_64
+ chost:amazon/suse-sles-15-sp2-chost-byos-v20211025-hvm-ssd-x86_64
+ chost:amazon/suse-sles-15-sp2-chost-byos-v20220126-hvm-ssd-x86_64
+ chost:amazon/suse-sles-15-sp2-chost-byos-v20220718-hvm-ssd-x86_64
+ chost:amazon/suse-sles-15-sp3-chost-byos-v20210729-hvm-ssd-x86_64
+ chost:amazon/suse-sles-15-sp3-chost-byos-v20210827-hvm-ssd-x86_64
+ chost:amazon/suse-sles-15-sp3-chost-byos-v20210927-hvm-ssd-x86_64
+ chost:amazon/suse-sles-15-sp3-chost-byos-v20211004-hvm-ssd-x86_64
+ chost:amazon/suse-sles-15-sp3-chost-byos-v20211101-hvm-ssd-x86_64
+ chost:amazon/suse-sles-15-sp3-chost-byos-v20211202-hvm-ssd-x86_64
+ chost:amazon/suse-sles-15-sp3-chost-byos-v20220103-hvm-ssd-x86_64
+ chost:amazon/suse-sles-15-sp3-chost-byos-v20220126-hvm-ssd-x86_64
+ chost:amazon/suse-sles-15-sp3-chost-byos-v20220222-hvm-ssd-x86_64
+ chost:amazon/suse-sles-15-sp3-chost-byos-v20220310-hvm-ssd-x86_64
+ chost:amazon/suse-sles-15-sp3-chost-byos-v20220411-hvm-ssd-x86_64
+ chost:amazon/suse-sles-15-sp3-chost-byos-v20220510-hvm-ssd-x86_64
+ chost:amazon/suse-sles-15-sp3-chost-byos-v20220608-hvm-ssd-x86_64
+ chost:amazon/suse-sles-15-sp3-chost-byos-v20220708-hvm-ssd-x86_64
+ chost:amazon/suse-sles-15-sp3-chost-byos-v20220718-hvm-ssd-x86_64
+ chost:amazon/suse-sles-15-sp3-chost-byos-v20220818-hvm-ssd-x86_64
+ chost:amazon/suse-sles-15-sp3-chost-byos-v20220916-hvm-ssd-x86_64
+ chost:amazon/suse-sles-15-sp3-chost-byos-v20220921-hvm-ssd-x86_64
+ chost:amazon/suse-sles-15-sp3-chost-byos-v20221019-hvm-ssd-x86_64
+ chost:amazon/suse-sles-15-sp3-chost-byos-v20221119-hvm-ssd-x86_64
+ chost:amazon/suse-sles-15-sp3-chost-byos-v20221215-hvm-ssd-x86_64
+ chost:amazon/suse-sles-15-sp3-chost-byos-v20230313-hvm-ssd-x86_64
+ chost:amazon/suse-sles-15-sp3-chost-byos-v20230613-hvm-ssd-x86_64
+ chost:amazon/suse-sles-15-sp3-chost-byos-v20240807-hvm-ssd-x86_64
+ chost:amazon/suse-sles-15-sp3-chost-byos-v20240912-hvm-ssd-x86_64
+ chost:amazon/suse-sles-15-sp4-chost-byos-v20220718-hvm-ssd-x86_64
+ chost:amazon/suse-sles-15-sp4-chost-byos-v20220721-hvm-ssd-x86_64
+ chost:amazon/suse-sles-15-sp4-chost-byos-v20220819-hvm-ssd-x86_64
+ chost:amazon/suse-sles-15-sp4-chost-byos-v20220916-hvm-ssd-x86_64
+ chost:amazon/suse-sles-15-sp4-chost-byos-v20220923-hvm-ssd-x86_64
+ chost:amazon/suse-sles-15-sp4-chost-byos-v20221018-hvm-ssd-x86_64
+ chost:amazon/suse-sles-15-sp4-chost-byos-v20221118-hvm-ssd-x86_64
+ chost:amazon/suse-sles-15-sp4-chost-byos-v20221215-hvm-ssd-x86_64
+ chost:amazon/suse-sles-15-sp4-chost-byos-v20230111-hvm-ssd-x86_64
+ chost:amazon/suse-sles-15-sp4-chost-byos-v20230210-hvm-ssd-x86_64
+ chost:amazon/suse-sles-15-sp4-chost-byos-v20230310-hvm-ssd-x86_64
+ chost:amazon/suse-sles-15-sp4-chost-byos-v20230410-hvm-ssd-x86_64
+ chost:amazon/suse-sles-15-sp4-chost-byos-v20230510-hvm-ssd-x86_64
+ chost:amazon/suse-sles-15-sp4-chost-byos-v20230606-hvm-ssd-x86_64
+ chost:amazon/suse-sles-15-sp4-chost-byos-v20230704-hvm-ssd-x86_64
+ chost:amazon/suse-sles-15-sp4-chost-byos-v20230803-hvm-ssd-x86_64
+ chost:amazon/suse-sles-15-sp4-chost-byos-v20230901-hvm-ssd-x86_64
+ chost:amazon/suse-sles-15-sp4-chost-byos-v20230928-hvm-ssd-x86_64
+ chost:amazon/suse-sles-15-sp4-chost-byos-v20231027-hvm-ssd-x86_64
+ chost:amazon/suse-sles-15-sp4-chost-byos-v20231127-hvm-ssd-x86_64
+ chost:amazon/suse-sles-15-sp4-chost-byos-v20231212-hvm-ssd-x86_64
+ chost:amazon/suse-sles-15-sp4-chost-byos-v20240312-hvm-ssd-x86_64
+ chost:amazon/suse-sles-15-sp4-chost-byos-v20240612-hvm-ssd-x86_64
+ chost:amazon/suse-sles-15-sp4-chost-byos-v20240809-hvm-ssd-x86_64
+ chost:amazon/suse-sles-15-sp4-chost-byos-v20240912-hvm-ssd-x86_64
+ chost:google/sles-15-sp1-chost-byos-v20210202
+ chost:google/sles-15-sp1-chost-byos-v20210304
+ chost:google/sles-15-sp1-chost-byos-v20220127
+ chost:google/sles-15-sp1-chost-byos-v20220715-x86-64
+ chost:google/sles-15-sp2-chost-byos-v20210202
+ chost:google/sles-15-sp2-chost-byos-v20210304
+ chost:google/sles-15-sp2-chost-byos-v20210405
+ chost:google/sles-15-sp2-chost-byos-v20210506
+ chost:google/sles-15-sp2-chost-byos-v20210610
+ chost:google/sles-15-sp2-chost-byos-v20210722
+ chost:google/sles-15-sp2-chost-byos-v20210913
+ chost:google/sles-15-sp2-chost-byos-v20211025
+ chost:google/sles-15-sp2-chost-byos-v20220126
+ chost:google/sles-15-sp2-chost-byos-v20220718-x86-64
+ chost:google/sles-15-sp3-chost-byos-v20210729
+ chost:google/sles-15-sp3-chost-byos-v20210827
+ chost:google/sles-15-sp3-chost-byos-v20210927
+ chost:google/sles-15-sp3-chost-byos-v20211004
+ chost:google/sles-15-sp3-chost-byos-v20211101
+ chost:google/sles-15-sp3-chost-byos-v20211202
+ chost:google/sles-15-sp3-chost-byos-v20220103
+ chost:google/sles-15-sp3-chost-byos-v20220126
+ chost:google/sles-15-sp3-chost-byos-v20220222
+ chost:google/sles-15-sp3-chost-byos-v20220310
+ chost:google/sles-15-sp3-chost-byos-v20220411-x86-64
+ chost:google/sles-15-sp3-chost-byos-v20220510-x86-64
+ chost:google/sles-15-sp3-chost-byos-v20220608-x86-64
+ chost:google/sles-15-sp3-chost-byos-v20220708-x86-64
+ chost:google/sles-15-sp3-chost-byos-v20220718-x86-64
+ chost:google/sles-15-sp3-chost-byos-v20220818-x86-64
+ chost:google/sles-15-sp3-chost-byos-v20220916-x86-64
+ chost:google/sles-15-sp3-chost-byos-v20221019-x86-64
+ chost:google/sles-15-sp3-chost-byos-v20221118-x86-64
+ chost:google/sles-15-sp3-chost-byos-v20221215-x86-64
+ chost:google/sles-15-sp3-chost-byos-v20230313-x86-64
+ chost:google/sles-15-sp3-chost-byos-v20230613-x86-64
+ chost:google/sles-15-sp3-chost-byos-v20240807-x86-64
+ chost:google/sles-15-sp3-chost-byos-v20240912-x86-64
+ chost:google/sles-15-sp4-chost-byos-v20220718-x86-64
+ chost:google/sles-15-sp4-chost-byos-v20220721-x86-64
+ chost:google/sles-15-sp4-chost-byos-v20220818-x86-64
+ chost:google/sles-15-sp4-chost-byos-v20220916-x86-64
+ chost:google/sles-15-sp4-chost-byos-v20221018-x86-64
+ chost:google/sles-15-sp4-chost-byos-v20221118-x86-64
+ chost:google/sles-15-sp4-chost-byos-v20221215-arm64
+ chost:google/sles-15-sp4-chost-byos-v20221215-x86-64
+ chost:google/sles-15-sp4-chost-byos-v20230111-arm64
+ chost:google/sles-15-sp4-chost-byos-v20230111-x86-64
+ chost:google/sles-15-sp4-chost-byos-v20230210-arm64
+ chost:google/sles-15-sp4-chost-byos-v20230210-x86-64
+ chost:google/sles-15-sp4-chost-byos-v20230310-arm64
+ chost:google/sles-15-sp4-chost-byos-v20230310-x86-64
+ chost:google/sles-15-sp4-chost-byos-v20230410-arm64
+ chost:google/sles-15-sp4-chost-byos-v20230410-x86-64
+ chost:google/sles-15-sp4-chost-byos-v20230510-arm64
+ chost:google/sles-15-sp4-chost-byos-v20230510-x86-64
+ chost:google/sles-15-sp4-chost-byos-v20230606-arm64
+ chost:google/sles-15-sp4-chost-byos-v20230606-x86-64
+ chost:google/sles-15-sp4-chost-byos-v20230704-arm64
+ chost:google/sles-15-sp4-chost-byos-v20230704-x86-64
+ chost:google/sles-15-sp4-chost-byos-v20230804-arm64
+ chost:google/sles-15-sp4-chost-byos-v20230804-x86-64
+ chost:google/sles-15-sp4-chost-byos-v20230901-arm64
+ chost:google/sles-15-sp4-chost-byos-v20230901-x86-64
+ chost:google/sles-15-sp4-chost-byos-v20230928-arm64
+ chost:google/sles-15-sp4-chost-byos-v20230928-x86-64
+ chost:google/sles-15-sp4-chost-byos-v20231027-arm64
+ chost:google/sles-15-sp4-chost-byos-v20231027-x86-64
+ chost:google/sles-15-sp4-chost-byos-v20231127-arm64
+ chost:google/sles-15-sp4-chost-byos-v20231127-x86-64
+ chost:google/sles-15-sp4-chost-byos-v20231212-arm64
+ chost:google/sles-15-sp4-chost-byos-v20231212-x86-64
+ chost:google/sles-15-sp4-chost-byos-v20240312-arm64
+ chost:google/sles-15-sp4-chost-byos-v20240312-x86-64
+ chost:google/sles-15-sp4-chost-byos-v20240612-arm64
+ chost:google/sles-15-sp4-chost-byos-v20240612-x86-64
+ chost:google/sles-15-sp4-chost-byos-v20240809-arm64
+ chost:google/sles-15-sp4-chost-byos-v20240809-x86-64
+ chost:google/sles-15-sp4-chost-byos-v20240912-arm64
+ chost:google/sles-15-sp4-chost-byos-v20240912-x86-64
+ chost:microsoft/suse-sles-15-sp1-chost-byos-v20210202
+ chost:microsoft/suse-sles-15-sp1-chost-byos-v20210304
+ chost:microsoft/suse-sles-15-sp1-chost-byos-v20220127
+ chost:microsoft/suse-sles-15-sp1-chost-byos-v20220715-x86_64
+ chost:microsoft/suse-sles-15-sp2-chost-byos-v20210202
+ chost:microsoft/suse-sles-15-sp2-chost-byos-v20210304
+ chost:microsoft/suse-sles-15-sp2-chost-byos-v20210405
+ chost:microsoft/suse-sles-15-sp2-chost-byos-v20210506
+ chost:microsoft/suse-sles-15-sp2-chost-byos-v20210610
+ chost:microsoft/suse-sles-15-sp2-chost-byos-v20210722
+ chost:microsoft/suse-sles-15-sp2-chost-byos-v20210913
+ chost:microsoft/suse-sles-15-sp2-chost-byos-v20211025
+ chost:microsoft/suse-sles-15-sp2-chost-byos-v20220126
+ chost:microsoft/suse-sles-15-sp2-chost-byos-v20220718-x86_64
+ chost:microsoft/suse-sles-15-sp3-chost-byos-v20210729
+ chost:microsoft/suse-sles-15-sp3-chost-byos-v20210827
+ chost:microsoft/suse-sles-15-sp3-chost-byos-v20210927
+ chost:microsoft/suse-sles-15-sp3-chost-byos-v20211004
+ chost:microsoft/suse-sles-15-sp3-chost-byos-v20211101
+ chost:microsoft/suse-sles-15-sp3-chost-byos-v20211202
+ chost:microsoft/suse-sles-15-sp3-chost-byos-v20220103
+ chost:microsoft/suse-sles-15-sp3-chost-byos-v20220126
+ chost:microsoft/suse-sles-15-sp3-chost-byos-v20220222
+ chost:microsoft/suse-sles-15-sp3-chost-byos-v20220310
+ chost:microsoft/suse-sles-15-sp3-chost-byos-v20220411-x86_64
+ chost:microsoft/suse-sles-15-sp3-chost-byos-v20220510-x86_64
+ chost:microsoft/suse-sles-15-sp3-chost-byos-v20220609-x86_64
+ chost:microsoft/suse-sles-15-sp3-chost-byos-v20220708-x86_64
+ chost:microsoft/suse-sles-15-sp3-chost-byos-v20220718-x86_64
+ chost:microsoft/suse-sles-15-sp3-chost-byos-v20220818-x86_64
+ chost:microsoft/suse-sles-15-sp3-chost-byos-v20220916-x86_64
+ chost:microsoft/suse-sles-15-sp3-chost-byos-v20220921-x86_64
+ chost:microsoft/suse-sles-15-sp3-chost-byos-v20221019-x86_64
+ chost:microsoft/suse-sles-15-sp3-chost-byos-v20221119-x86_64
+ chost:microsoft/suse-sles-15-sp3-chost-byos-v20221215-x86_64
+ chost:microsoft/suse-sles-15-sp3-chost-byos-v20230313-x86_64
+ chost:microsoft/suse-sles-15-sp3-chost-byos-v20230613-x86_64
+ chost:microsoft/suse-sles-15-sp3-chost-byos-v20240807-x86_64
+ chost:microsoft/suse-sles-15-sp3-chost-byos-v20240912-x86_64
+ chost:microsoft/suse-sles-15-sp4-chost-byos-v20220718-x86_64
+ chost:microsoft/suse-sles-15-sp4-chost-byos-v20220721-x86_64
+ chost:microsoft/suse-sles-15-sp4-chost-byos-v20220819-x86_64
+ chost:microsoft/suse-sles-15-sp4-chost-byos-v20220916-x86_64
+ chost:microsoft/suse-sles-15-sp4-chost-byos-v20220923-x86_64
+ chost:microsoft/suse-sles-15-sp4-chost-byos-v20221018-x86_64
+ chost:microsoft/suse-sles-15-sp4-chost-byos-v20221118-x86_64
+ chost:microsoft/suse-sles-15-sp4-chost-byos-v20221215-arm64
+ chost:microsoft/suse-sles-15-sp4-chost-byos-v20221215-x86_64
+ chost:microsoft/suse-sles-15-sp4-chost-byos-v20230111-arm64
+ chost:microsoft/suse-sles-15-sp4-chost-byos-v20230111-x86_64
+ chost:microsoft/suse-sles-15-sp4-chost-byos-v20230210-arm64
+ chost:microsoft/suse-sles-15-sp4-chost-byos-v20230210-x86_64
+ chost:microsoft/suse-sles-15-sp4-chost-byos-v20230310-arm64
+ chost:microsoft/suse-sles-15-sp4-chost-byos-v20230310-x86_64
+ chost:microsoft/suse-sles-15-sp4-chost-byos-v20230410-arm64
+ chost:microsoft/suse-sles-15-sp4-chost-byos-v20230410-x86_64
+ chost:microsoft/suse-sles-15-sp4-chost-byos-v20230510-arm64
+ chost:microsoft/suse-sles-15-sp4-chost-byos-v20230510-x86_64
+ chost:microsoft/suse-sles-15-sp4-chost-byos-v20230606-arm64
+ chost:microsoft/suse-sles-15-sp4-chost-byos-v20230606-x86_64
+ chost:microsoft/suse-sles-15-sp4-chost-byos-v20230704-arm64
+ chost:microsoft/suse-sles-15-sp4-chost-byos-v20230704-x86_64
+ chost:microsoft/suse-sles-15-sp4-chost-byos-v20230803-arm64
+ chost:microsoft/suse-sles-15-sp4-chost-byos-v20230803-x86_64
+ chost:microsoft/suse-sles-15-sp4-chost-byos-v20230901-arm64
+ chost:microsoft/suse-sles-15-sp4-chost-byos-v20230901-x86_64
+ chost:microsoft/suse-sles-15-sp4-chost-byos-v20230928-arm64
+ chost:microsoft/suse-sles-15-sp4-chost-byos-v20230928-x86_64
+ chost:microsoft/suse-sles-15-sp4-chost-byos-v20231027-arm64
+ chost:microsoft/suse-sles-15-sp4-chost-byos-v20231027-x86_64
+ chost:microsoft/suse-sles-15-sp4-chost-byos-v20231127-arm64
+ chost:microsoft/suse-sles-15-sp4-chost-byos-v20231127-x86_64
+ chost:microsoft/suse-sles-15-sp4-chost-byos-v20231212-arm64
+ chost:microsoft/suse-sles-15-sp4-chost-byos-v20231212-x86_64
+ chost:microsoft/suse-sles-15-sp4-chost-byos-v20240312-arm64
+ chost:microsoft/suse-sles-15-sp4-chost-byos-v20240312-x86_64
+ chost:microsoft/suse-sles-15-sp4-chost-byos-v20240612-arm64
+ chost:microsoft/suse-sles-15-sp4-chost-byos-v20240612-x86_64
+ chost:microsoft/suse-sles-15-sp4-chost-byos-v20240809-arm64
+ chost:microsoft/suse-sles-15-sp4-chost-byos-v20240809-x86_64
+ chost:microsoft/suse-sles-15-sp4-chost-byos-v20240912-arm64
+ chost:microsoft/suse-sles-15-sp4-chost-byos-v20240912-x86_64
+
no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2023-52907
skipping CVE-2023-52914 as CVE page is older than CVRF-CVE file.
skipping CVE-2023-52913 as CVE page is older than CVRF-CVE file.
skipping CVE-2023-52912 as CVE page is older than CVRF-CVE file.
skipping CVE-2023-52911 as CVE page is older than CVRF-CVE file.
skipping CVE-2023-52910 as CVE page is older than CVRF-CVE file.
skipping CVE-2023-52909 as CVE page is older than CVRF-CVE file.
skipping CVE-2023-52908 as CVE page is older than CVRF-CVE file.
--- /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2023-52907.xml 2024-10-20 01:31:59.738954000 +0200
+++ /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2023-52907.xml.new 2024-10-29 01:25:17.361018000 +0100
@@ -14,13 +14,13 @@
1
- 25
- 2024-10-19T23:31:59Z
+ 26
+ 2024-10-29T00:25:16Z
current
2024-08-21T23:28:15Z
- 2024-10-19T23:31:59Z
+ 2024-10-29T00:25:16Z
cve-database/bin/generate-cvrf-cve.pl
2020-12-27T01:00:00Z
@@ -125,6 +125,21 @@
Image SLES12-SP5-Azure-SAP-BYOS
+
+
+ Image SLES12-SP5-GCE-BYOS
+
+
+
+
+ Image SLES12-SP5-GCE-SAP-BYOS
+
+
+
+
+ Image SLES12-SP5-GCE-SAP-On-Demand
+
+
Image SLES15-SP4-SAP-Azure-LI-BYOS
@@ -1386,6 +1401,39 @@
ocfs2-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-Azure-SAP-BYOS
+
+ kernel-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-BYOS
+
+
+ cluster-md-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ dlm-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ gfs2-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ kernel-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ ocfs2-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ cluster-md-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
+
+ dlm-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
+
+ gfs2-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
+
+ kernel-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
+
+ ocfs2-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
cluster-md-kmp-default-5.14.21-150400.24.133.2 as a component of Image SLES15-SP4-SAP-Azure-LI-BYOS
@@ -2827,6 +2875,17 @@
Image SLES12-SP5-Azure-SAP-BYOS:gfs2-kmp-default-4.12.14-122.228.1
Image SLES12-SP5-Azure-SAP-BYOS:kernel-default-4.12.14-122.228.1
Image SLES12-SP5-Azure-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.228.1
+ Image SLES12-SP5-GCE-BYOS:kernel-default-4.12.14-122.228.1
+ Image SLES12-SP5-GCE-SAP-BYOS:cluster-md-kmp-default-4.12.14-122.228.1
+ Image SLES12-SP5-GCE-SAP-BYOS:dlm-kmp-default-4.12.14-122.228.1
+ Image SLES12-SP5-GCE-SAP-BYOS:gfs2-kmp-default-4.12.14-122.228.1
+ Image SLES12-SP5-GCE-SAP-BYOS:kernel-default-4.12.14-122.228.1
+ Image SLES12-SP5-GCE-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.228.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:cluster-md-kmp-default-4.12.14-122.228.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:dlm-kmp-default-4.12.14-122.228.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:gfs2-kmp-default-4.12.14-122.228.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:kernel-default-4.12.14-122.228.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:ocfs2-kmp-default-4.12.14-122.228.1
Image SLES15-SP4-SAP-Azure-LI-BYOS:cluster-md-kmp-default-5.14.21-150400.24.133.2
Image SLES15-SP4-SAP-Azure-LI-BYOS:dlm-kmp-default-5.14.21-150400.24.133.2
Image SLES15-SP4-SAP-Azure-LI-BYOS:gfs2-kmp-default-5.14.21-150400.24.133.2
no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2023-52901
skipping CVE-2023-52906 as CVE page is older than CVRF-CVE file.
skipping CVE-2023-52905 as CVE page is older than CVRF-CVE file.
skipping CVE-2023-52904 as CVE page is older than CVRF-CVE file.
skipping CVE-2023-52903 as CVE page is older than CVRF-CVE file.
skipping CVE-2023-52902 as CVE page is older than CVRF-CVE file.
--- /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2023-52901.xml 2024-10-20 01:32:02.786824000 +0200
+++ /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2023-52901.xml.new 2024-10-29 01:25:18.090797000 +0100
@@ -14,13 +14,13 @@
1
- 22
- 2024-10-19T23:32:02Z
+ 23
+ 2024-10-29T00:25:17Z
current
2024-08-21T23:28:16Z
- 2024-10-19T23:32:02Z
+ 2024-10-29T00:25:17Z
cve-database/bin/generate-cvrf-cve.pl
2020-12-27T01:00:00Z
@@ -132,6 +132,21 @@
Image SLES12-SP5-Azure-SAP-BYOS
+
+
+ Image SLES12-SP5-GCE-BYOS
+
+
+
+
+ Image SLES12-SP5-GCE-SAP-BYOS
+
+
+
+
+ Image SLES12-SP5-GCE-SAP-On-Demand
+
+
Image SLES15-SP4-SAP-Azure-LI-BYOS
@@ -1393,6 +1408,39 @@
ocfs2-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-Azure-SAP-BYOS
+
+ kernel-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-BYOS
+
+
+ cluster-md-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ dlm-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ gfs2-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ kernel-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ ocfs2-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ cluster-md-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
+
+ dlm-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
+
+ gfs2-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
+
+ kernel-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
+
+ ocfs2-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
cluster-md-kmp-default-5.14.21-150400.24.133.2 as a component of Image SLES15-SP4-SAP-Azure-LI-BYOS
@@ -2692,18 +2740,6 @@
kernel-default as a component of SUSE Linux Enterprise Server for SAP Applications 12 SP5
-
- kernel-default-base as a component of SUSE Linux Enterprise Server for SAP Applications 12 SP5
-
-
- kernel-default-devel as a component of SUSE Linux Enterprise Server for SAP Applications 12 SP5
-
-
- kernel-devel as a component of SUSE Linux Enterprise Server for SAP Applications 12 SP5
-
-
- kernel-macros as a component of SUSE Linux Enterprise Server for SAP Applications 12 SP5
-
kernel-source as a component of SUSE Linux Enterprise Server for SAP Applications 12 SP5
@@ -2859,6 +2895,17 @@
Image SLES12-SP5-Azure-SAP-BYOS:gfs2-kmp-default-4.12.14-122.228.1
Image SLES12-SP5-Azure-SAP-BYOS:kernel-default-4.12.14-122.228.1
Image SLES12-SP5-Azure-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.228.1
+ Image SLES12-SP5-GCE-BYOS:kernel-default-4.12.14-122.228.1
+ Image SLES12-SP5-GCE-SAP-BYOS:cluster-md-kmp-default-4.12.14-122.228.1
+ Image SLES12-SP5-GCE-SAP-BYOS:dlm-kmp-default-4.12.14-122.228.1
+ Image SLES12-SP5-GCE-SAP-BYOS:gfs2-kmp-default-4.12.14-122.228.1
+ Image SLES12-SP5-GCE-SAP-BYOS:kernel-default-4.12.14-122.228.1
+ Image SLES12-SP5-GCE-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.228.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:cluster-md-kmp-default-4.12.14-122.228.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:dlm-kmp-default-4.12.14-122.228.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:gfs2-kmp-default-4.12.14-122.228.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:kernel-default-4.12.14-122.228.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:ocfs2-kmp-default-4.12.14-122.228.1
Image SLES15-SP4-SAP-Azure-LI-BYOS:cluster-md-kmp-default-5.14.21-150400.24.133.2
Image SLES15-SP4-SAP-Azure-LI-BYOS:dlm-kmp-default-5.14.21-150400.24.133.2
Image SLES15-SP4-SAP-Azure-LI-BYOS:gfs2-kmp-default-5.14.21-150400.24.133.2
@@ -3227,10 +3274,6 @@
SUSE Linux Enterprise Server 11 SP4 LTSS:kernel-default
SUSE Linux Enterprise Server 11 SP4 LTSS:kernel-source
SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default
- SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base
- SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel
- SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel
- SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros
SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source
openSUSE Leap 15.6:cluster-md-kmp-default
openSUSE Leap 15.6:dlm-kmp-default
no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2023-52893
skipping CVE-2023-52900 as CVE page is older than CVRF-CVE file.
skipping CVE-2023-52899 as CVE page is older than CVRF-CVE file.
skipping CVE-2023-52898 as CVE page is older than CVRF-CVE file.
skipping CVE-2023-52897 as CVE page is older than CVRF-CVE file.
skipping CVE-2023-52896 as CVE page is older than CVRF-CVE file.
skipping CVE-2023-52895 as CVE page is older than CVRF-CVE file.
skipping CVE-2023-52894 as CVE page is older than CVRF-CVE file.
--- /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2023-52893.xml 2024-10-20 01:32:07.176585000 +0200
+++ /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2023-52893.xml.new 2024-10-29 01:25:18.813714000 +0100
@@ -14,13 +14,13 @@
1
- 23
- 2024-10-19T23:32:06Z
+ 24
+ 2024-10-29T00:25:18Z
current
2024-08-21T23:28:19Z
- 2024-10-19T23:32:06Z
+ 2024-10-29T00:25:18Z
cve-database/bin/generate-cvrf-cve.pl
2020-12-27T01:00:00Z
@@ -109,6 +109,21 @@
Image SLES12-SP5-Azure-SAP-BYOS
+
+
+ Image SLES12-SP5-GCE-BYOS
+
+
+
+
+ Image SLES12-SP5-GCE-SAP-BYOS
+
+
+
+
+ Image SLES12-SP5-GCE-SAP-On-Demand
+
+
Image SLES15-SP4-SAP-Azure-LI-BYOS
@@ -1370,6 +1385,39 @@
ocfs2-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-Azure-SAP-BYOS
+
+ kernel-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-BYOS
+
+
+ cluster-md-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ dlm-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ gfs2-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ kernel-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ ocfs2-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ cluster-md-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
+
+ dlm-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
+
+ gfs2-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
+
+ kernel-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
+
+ ocfs2-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
cluster-md-kmp-default-5.14.21-150400.24.133.2 as a component of Image SLES15-SP4-SAP-Azure-LI-BYOS
@@ -2795,6 +2843,17 @@
Image SLES12-SP5-Azure-SAP-BYOS:gfs2-kmp-default-4.12.14-122.228.1
Image SLES12-SP5-Azure-SAP-BYOS:kernel-default-4.12.14-122.228.1
Image SLES12-SP5-Azure-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.228.1
+ Image SLES12-SP5-GCE-BYOS:kernel-default-4.12.14-122.228.1
+ Image SLES12-SP5-GCE-SAP-BYOS:cluster-md-kmp-default-4.12.14-122.228.1
+ Image SLES12-SP5-GCE-SAP-BYOS:dlm-kmp-default-4.12.14-122.228.1
+ Image SLES12-SP5-GCE-SAP-BYOS:gfs2-kmp-default-4.12.14-122.228.1
+ Image SLES12-SP5-GCE-SAP-BYOS:kernel-default-4.12.14-122.228.1
+ Image SLES12-SP5-GCE-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.228.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:cluster-md-kmp-default-4.12.14-122.228.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:dlm-kmp-default-4.12.14-122.228.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:gfs2-kmp-default-4.12.14-122.228.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:kernel-default-4.12.14-122.228.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:ocfs2-kmp-default-4.12.14-122.228.1
Image SLES15-SP4-SAP-Azure-LI-BYOS:cluster-md-kmp-default-5.14.21-150400.24.133.2
Image SLES15-SP4-SAP-Azure-LI-BYOS:dlm-kmp-default-5.14.21-150400.24.133.2
Image SLES15-SP4-SAP-Azure-LI-BYOS:gfs2-kmp-default-5.14.21-150400.24.133.2
no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2023-52885
skipping CVE-2023-52889 as CVE page is older than CVRF-CVE file.
skipping CVE-2023-52888 as CVE page is older than CVRF-CVE file.
skipping CVE-2023-52887 as CVE page is older than CVRF-CVE file.
skipping CVE-2023-52886 as CVE page is older than CVRF-CVE file.
--- /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2023-52885.xml 2024-10-20 01:32:10.032895000 +0200
+++ /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2023-52885.xml.new 2024-10-29 01:25:20.012180000 +0100
@@ -14,13 +14,13 @@
1
- 39
- 2024-10-19T23:32:09Z
+ 40
+ 2024-10-29T00:25:19Z
current
2024-07-15T23:16:11Z
- 2024-10-19T23:32:09Z
+ 2024-10-29T00:25:19Z
cve-database/bin/generate-cvrf-cve.pl
2020-12-27T01:00:00Z
@@ -230,6 +230,21 @@
Image SLES12-SP5-EC2-BYOS
+
+
+ Image SLES12-SP5-GCE-BYOS
+
+
+
+
+ Image SLES12-SP5-GCE-SAP-BYOS
+
+
+
+
+ Image SLES12-SP5-GCE-SAP-On-Demand
+
+
Image SLES12-SP5-SAP-Azure-LI-BYOS-Production
@@ -2443,6 +2458,39 @@
kernel-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-EC2-BYOS
+
+ kernel-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-BYOS
+
+
+ cluster-md-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ dlm-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ gfs2-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ kernel-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ ocfs2-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ cluster-md-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
+
+ dlm-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
+
+ gfs2-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
+
+ kernel-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
+
+ ocfs2-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
cluster-md-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-SAP-Azure-LI-BYOS-Production
@@ -4996,18 +5044,6 @@
kernel-default as a component of SUSE Linux Enterprise Server for SAP Applications 12 SP5
-
- kernel-default-base as a component of SUSE Linux Enterprise Server for SAP Applications 12 SP5
-
-
- kernel-default-devel as a component of SUSE Linux Enterprise Server for SAP Applications 12 SP5
-
-
- kernel-devel as a component of SUSE Linux Enterprise Server for SAP Applications 12 SP5
-
-
- kernel-macros as a component of SUSE Linux Enterprise Server for SAP Applications 12 SP5
-
kernel-source as a component of SUSE Linux Enterprise Server for SAP Applications 12 SP5
@@ -5121,6 +5157,17 @@
Image SLES12-SP5-Azure-SAP-BYOS:kernel-default-4.12.14-122.225.1
Image SLES12-SP5-Azure-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.225.1
Image SLES12-SP5-EC2-BYOS:kernel-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-BYOS:kernel-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-BYOS:cluster-md-kmp-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-BYOS:dlm-kmp-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-BYOS:gfs2-kmp-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-BYOS:kernel-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:cluster-md-kmp-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:dlm-kmp-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:gfs2-kmp-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:kernel-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:ocfs2-kmp-default-4.12.14-122.225.1
Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:cluster-md-kmp-default-4.12.14-122.225.1
Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:dlm-kmp-default-4.12.14-122.225.1
Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:gfs2-kmp-default-4.12.14-122.225.1
@@ -5944,10 +5991,6 @@
SUSE Linux Enterprise Server Teradata 12 SP3:kernel-default
SUSE Linux Enterprise Server Teradata 12 SP3:kernel-source
SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default
- SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base
- SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel
- SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel
- SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros
SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source
no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2023-52881
skipping CVE-2023-52884 as CVE page is older than CVRF-CVE file.
skipping CVE-2023-52883 as CVE page is older than CVRF-CVE file.
skipping CVE-2023-52882 as CVE page is older than CVRF-CVE file.
no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2023-52880
no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2023-52865
skipping CVE-2023-52879 as CVE page is older than CVRF-CVE file.
skipping CVE-2023-52878 as CVE page is older than CVRF-CVE file.
skipping CVE-2023-52877 as CVE page is older than CVRF-CVE file.
skipping CVE-2023-52876 as CVE page is older than CVRF-CVE file.
skipping CVE-2023-52875 as CVE page is older than CVRF-CVE file.
skipping CVE-2023-52874 as CVE page is older than CVRF-CVE file.
skipping CVE-2023-52873 as CVE page is older than CVRF-CVE file.
skipping CVE-2023-52872 as CVE page is older than CVRF-CVE file.
skipping CVE-2023-52871 as CVE page is older than CVRF-CVE file.
skipping CVE-2023-52870 as CVE page is older than CVRF-CVE file.
skipping CVE-2023-52869 as CVE page is older than CVRF-CVE file.
skipping CVE-2023-52868 as CVE page is older than CVRF-CVE file.
skipping CVE-2023-52867 as CVE page is older than CVRF-CVE file.
skipping CVE-2023-52866 as CVE page is older than CVRF-CVE file.
no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2023-52846
skipping CVE-2023-52864 as CVE page is older than CVRF-CVE file.
skipping CVE-2023-52863 as CVE page is older than CVRF-CVE file.
skipping CVE-2023-52862 as CVE page is older than CVRF-CVE file.
skipping CVE-2023-52861 as CVE page is older than CVRF-CVE file.
skipping CVE-2023-52860 as CVE page is older than CVRF-CVE file.
skipping CVE-2023-52859 as CVE page is older than CVRF-CVE file.
skipping CVE-2023-52858 as CVE page is older than CVRF-CVE file.
skipping CVE-2023-52857 as CVE page is older than CVRF-CVE file.
skipping CVE-2023-52856 as CVE page is older than CVRF-CVE file.
skipping CVE-2023-52855 as CVE page is older than CVRF-CVE file.
skipping CVE-2023-52854 as CVE page is older than CVRF-CVE file.
skipping CVE-2023-52853 as CVE page is older than CVRF-CVE file.
skipping CVE-2023-52852 as CVE page is older than CVRF-CVE file.
skipping CVE-2023-52851 as CVE page is older than CVRF-CVE file.
skipping CVE-2023-52850 as CVE page is older than CVRF-CVE file.
skipping CVE-2023-52849 as CVE page is older than CVRF-CVE file.
skipping CVE-2023-52848 as CVE page is older than CVRF-CVE file.
skipping CVE-2023-52847 as CVE page is older than CVRF-CVE file.
--- /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2023-52846.xml 2024-10-22 01:54:51.558569000 +0200
+++ /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2023-52846.xml.new 2024-10-29 01:25:22.588015000 +0100
@@ -14,13 +14,13 @@
1
- 62
- 2024-10-21T23:54:50Z
+ 63
+ 2024-10-29T00:25:22Z
current
2024-05-23T23:14:05Z
- 2024-10-21T23:54:50Z
+ 2024-10-29T00:25:22Z
cve-database/bin/generate-cvrf-cve.pl
2020-12-27T01:00:00Z
@@ -2273,21 +2273,36 @@
kernel-livepatch-5_14_21-150400_24_103-default-9-150400.2.2
+
+ kernel-livepatch-5_14_21-150400_24_108-default-10-150400.9.8.1
+
kernel-livepatch-5_14_21-150400_24_108-default-9-150400.9.8.1
kernel-livepatch-5_14_21-150400_24_111-default-7-150400.9.6.1
+
+ kernel-livepatch-5_14_21-150400_24_111-default-8-150400.9.6.1
+
kernel-livepatch-5_14_21-150400_24_116-default-7-150400.9.8.1
+
+ kernel-livepatch-5_14_21-150400_24_116-default-8-150400.9.8.1
+
kernel-livepatch-5_14_21-150400_24_119-default-6-150400.9.6.1
+
+ kernel-livepatch-5_14_21-150400_24_119-default-7-150400.9.6.1
+
kernel-livepatch-5_14_21-150400_24_122-default-4-150400.9.6.1
+
+ kernel-livepatch-5_14_21-150400_24_122-default-5-150400.9.6.1
+
kernel-livepatch-5_14_21-150400_24_125-default-1-150400.9.3.1
@@ -2321,24 +2336,42 @@
kernel-livepatch-5_14_21-150500_13_30-rt-10-150500.2.1
+
+ kernel-livepatch-5_14_21-150500_13_35-rt-10-150500.11.8.1
+
kernel-livepatch-5_14_21-150500_13_35-rt-9-150500.11.8.1
kernel-livepatch-5_14_21-150500_13_38-rt-7-150500.11.6.1
+
+ kernel-livepatch-5_14_21-150500_13_38-rt-8-150500.11.6.1
+
kernel-livepatch-5_14_21-150500_13_47-rt-7-150500.11.6.1
+
+ kernel-livepatch-5_14_21-150500_13_47-rt-8-150500.11.6.1
+
kernel-livepatch-5_14_21-150500_13_52-rt-5-150500.11.8.1
+
+ kernel-livepatch-5_14_21-150500_13_52-rt-6-150500.11.8.1
+
kernel-livepatch-5_14_21-150500_13_55-rt-5-150500.11.6.1
+
+ kernel-livepatch-5_14_21-150500_13_55-rt-6-150500.11.6.1
+
kernel-livepatch-5_14_21-150500_13_58-rt-4-150500.11.6.1
+
+ kernel-livepatch-5_14_21-150500_13_58-rt-5-150500.11.6.1
+
kernel-livepatch-5_14_21-150500_13_61-rt-1-150500.11.3.1
@@ -2360,30 +2393,51 @@
kernel-livepatch-5_14_21-150500_55_44-default-10-150500.2.2
+
+ kernel-livepatch-5_14_21-150500_55_49-default-10-150500.11.8.1
+
kernel-livepatch-5_14_21-150500_55_49-default-9-150500.11.8.1
kernel-livepatch-5_14_21-150500_55_52-default-7-150500.11.6.1
+
+ kernel-livepatch-5_14_21-150500_55_52-default-8-150500.11.6.1
+
kernel-livepatch-5_14_21-150500_55_59-default-7-150500.11.10.1
+
+ kernel-livepatch-5_14_21-150500_55_59-default-8-150500.11.10.1
+
kernel-livepatch-5_14_21-150500_55_62-default-5-150500.11.6.1
+
+ kernel-livepatch-5_14_21-150500_55_62-default-6-150500.11.6.1
+
kernel-livepatch-5_14_21-150500_55_65-default-5-150500.11.6.1
+
+ kernel-livepatch-5_14_21-150500_55_65-default-6-150500.11.6.1
+
kernel-livepatch-5_14_21-150500_55_68-default-4-150500.11.6.1
+
+ kernel-livepatch-5_14_21-150500_55_68-default-5-150500.11.6.1
+
kernel-livepatch-5_14_21-150500_55_73-default-1-150500.11.3.1
kernel-livepatch-6_4_0-150600_21-default-5-150600.1.1
+
+ kernel-livepatch-6_4_0-150600_21-default-6-150600.4.10.1
+
kernel-livepatch-6_4_0-150600_23_14-default-1-150600.13.3.2
@@ -4877,6 +4931,60 @@
kernel-rt-5.14.21-150500.13.61.1 as a component of openSUSE Leap Micro 5.5
+
+ kernel-livepatch-5_14_21-150400_24_108-default-10-150400.9.8.1 as a component of SUSE Linux Enterprise Live Patching 15 SP4
+
+
+ kernel-livepatch-5_14_21-150400_24_111-default-8-150400.9.6.1 as a component of SUSE Linux Enterprise Live Patching 15 SP4
+
+
+ kernel-livepatch-5_14_21-150400_24_116-default-8-150400.9.8.1 as a component of SUSE Linux Enterprise Live Patching 15 SP4
+
+
+ kernel-livepatch-5_14_21-150400_24_119-default-7-150400.9.6.1 as a component of SUSE Linux Enterprise Live Patching 15 SP4
+
+
+ kernel-livepatch-5_14_21-150400_24_122-default-5-150400.9.6.1 as a component of SUSE Linux Enterprise Live Patching 15 SP4
+
+
+ kernel-livepatch-5_14_21-150500_13_35-rt-10-150500.11.8.1 as a component of SUSE Linux Enterprise Live Patching 15 SP5
+
+
+ kernel-livepatch-5_14_21-150500_13_38-rt-8-150500.11.6.1 as a component of SUSE Linux Enterprise Live Patching 15 SP5
+
+
+ kernel-livepatch-5_14_21-150500_13_47-rt-8-150500.11.6.1 as a component of SUSE Linux Enterprise Live Patching 15 SP5
+
+
+ kernel-livepatch-5_14_21-150500_13_52-rt-6-150500.11.8.1 as a component of SUSE Linux Enterprise Live Patching 15 SP5
+
+
+ kernel-livepatch-5_14_21-150500_13_55-rt-6-150500.11.6.1 as a component of SUSE Linux Enterprise Live Patching 15 SP5
+
+
+ kernel-livepatch-5_14_21-150500_13_58-rt-5-150500.11.6.1 as a component of SUSE Linux Enterprise Live Patching 15 SP5
+
+
+ kernel-livepatch-5_14_21-150500_55_49-default-10-150500.11.8.1 as a component of SUSE Linux Enterprise Live Patching 15 SP5
+
+
+ kernel-livepatch-5_14_21-150500_55_52-default-8-150500.11.6.1 as a component of SUSE Linux Enterprise Live Patching 15 SP5
+
+
+ kernel-livepatch-5_14_21-150500_55_59-default-8-150500.11.10.1 as a component of SUSE Linux Enterprise Live Patching 15 SP5
+
+
+ kernel-livepatch-5_14_21-150500_55_62-default-6-150500.11.6.1 as a component of SUSE Linux Enterprise Live Patching 15 SP5
+
+
+ kernel-livepatch-5_14_21-150500_55_65-default-6-150500.11.6.1 as a component of SUSE Linux Enterprise Live Patching 15 SP5
+
+
+ kernel-livepatch-5_14_21-150500_55_68-default-5-150500.11.6.1 as a component of SUSE Linux Enterprise Live Patching 15 SP5
+
+
+ kernel-livepatch-6_4_0-150600_21-default-6-150600.4.10.1 as a component of SUSE Linux Enterprise Live Patching 15 SP6
+
kernel-default as a component of SUSE Enterprise Storage 7.1
@@ -6079,6 +6187,26 @@
openSUSE Leap Micro 5.5:kernel-default-base-5.14.21-150500.55.73.1.150500.6.33.8
openSUSE Leap Micro 5.5:kernel-rt-5.14.21-150500.13.61.1
+
+ SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_108-default-10-150400.9.8.1
+ SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_111-default-8-150400.9.6.1
+ SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_116-default-8-150400.9.8.1
+ SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_119-default-7-150400.9.6.1
+ SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_122-default-5-150400.9.6.1
+ SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_35-rt-10-150500.11.8.1
+ SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_38-rt-8-150500.11.6.1
+ SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_47-rt-8-150500.11.6.1
+ SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_52-rt-6-150500.11.8.1
+ SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_55-rt-6-150500.11.6.1
+ SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-5-150500.11.6.1
+ SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_49-default-10-150500.11.8.1
+ SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_52-default-8-150500.11.6.1
+ SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_59-default-8-150500.11.10.1
+ SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-6-150500.11.6.1
+ SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_65-default-6-150500.11.6.1
+ SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_68-default-5-150500.11.6.1
+ SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_21-default-6-150600.4.10.1
+
SUSE Enterprise Storage 7.1:kernel-default
SUSE Enterprise Storage 7.1:kernel-default-devel
skipping CVE-2023-52844 as CVE page is older than CVRF-CVE file.
skipping CVE-2023-52842 as CVE page is older than CVRF-CVE file.
skipping CVE-2023-52841 as CVE page is older than CVRF-CVE file.
skipping CVE-2023-52840 as CVE page is older than CVRF-CVE file.
skipping CVE-2023-52839 as CVE page is older than CVRF-CVE file.
skipping CVE-2023-52838 as CVE page is older than CVRF-CVE file.
skipping CVE-2023-52837 as CVE page is older than CVRF-CVE file.
skipping CVE-2023-52836 as CVE page is older than CVRF-CVE file.
no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2023-52834
skipping CVE-2023-52833 as CVE page is older than CVRF-CVE file.
skipping CVE-2023-52832 as CVE page is older than CVRF-CVE file.
skipping CVE-2023-52831 as CVE page is older than CVRF-CVE file.
skipping CVE-2023-52829 as CVE page is older than CVRF-CVE file.
skipping CVE-2023-52828 as CVE page is older than CVRF-CVE file.
skipping CVE-2023-52827 as CVE page is older than CVRF-CVE file.
skipping CVE-2023-52826 as CVE page is older than CVRF-CVE file.
skipping CVE-2023-52825 as CVE page is older than CVRF-CVE file.
skipping CVE-2023-52823 as CVE page is older than CVRF-CVE file.
skipping CVE-2023-52821 as CVE page is older than CVRF-CVE file.
no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2023-52818
skipping CVE-2023-52819 as CVE page is older than CVRF-CVE file.
skipping CVE-2023-52817 as CVE page is older than CVRF-CVE file.
skipping CVE-2023-52816 as CVE page is older than CVRF-CVE file.
skipping CVE-2023-52815 as CVE page is older than CVRF-CVE file.
skipping CVE-2023-52814 as CVE page is older than CVRF-CVE file.
skipping CVE-2023-52813 as CVE page is older than CVRF-CVE file.
skipping CVE-2023-52812 as CVE page is older than CVRF-CVE file.
skipping CVE-2023-52811 as CVE page is older than CVRF-CVE file.
skipping CVE-2023-52810 as CVE page is older than CVRF-CVE file.
skipping CVE-2023-52809 as CVE page is older than CVRF-CVE file.
skipping CVE-2023-52808 as CVE page is older than CVRF-CVE file.
skipping CVE-2023-52807 as CVE page is older than CVRF-CVE file.
skipping CVE-2023-52806 as CVE page is older than CVRF-CVE file.
skipping CVE-2023-52805 as CVE page is older than CVRF-CVE file.
skipping CVE-2023-52804 as CVE page is older than CVRF-CVE file.
skipping CVE-2023-52803 as CVE page is older than CVRF-CVE file.
skipping CVE-2023-52802 as CVE page is older than CVRF-CVE file.
skipping CVE-2023-52801 as CVE page is older than CVRF-CVE file.
skipping CVE-2023-52800 as CVE page is older than CVRF-CVE file.
skipping CVE-2023-52799 as CVE page is older than CVRF-CVE file.
skipping CVE-2023-52798 as CVE page is older than CVRF-CVE file.
skipping CVE-2023-52797 as CVE page is older than CVRF-CVE file.
skipping CVE-2023-52796 as CVE page is older than CVRF-CVE file.
skipping CVE-2023-52795 as CVE page is older than CVRF-CVE file.
skipping CVE-2023-52794 as CVE page is older than CVRF-CVE file.
skipping CVE-2023-52792 as CVE page is older than CVRF-CVE file.
skipping CVE-2023-52791 as CVE page is older than CVRF-CVE file.
skipping CVE-2023-52790 as CVE page is older than CVRF-CVE file.
skipping CVE-2023-52789 as CVE page is older than CVRF-CVE file.
skipping CVE-2023-52788 as CVE page is older than CVRF-CVE file.
skipping CVE-2023-52787 as CVE page is older than CVRF-CVE file.
skipping CVE-2023-52786 as CVE page is older than CVRF-CVE file.
skipping CVE-2023-52785 as CVE page is older than CVRF-CVE file.
no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2023-52766
skipping CVE-2023-52783 as CVE page is older than CVRF-CVE file.
skipping CVE-2023-52782 as CVE page is older than CVRF-CVE file.
skipping CVE-2023-52781 as CVE page is older than CVRF-CVE file.
skipping CVE-2023-52780 as CVE page is older than CVRF-CVE file.
skipping CVE-2023-52779 as CVE page is older than CVRF-CVE file.
skipping CVE-2023-52778 as CVE page is older than CVRF-CVE file.
skipping CVE-2023-52777 as CVE page is older than CVRF-CVE file.
skipping CVE-2023-52776 as CVE page is older than CVRF-CVE file.
skipping CVE-2023-52775 as CVE page is older than CVRF-CVE file.
skipping CVE-2023-52774 as CVE page is older than CVRF-CVE file.
skipping CVE-2023-52773 as CVE page is older than CVRF-CVE file.
skipping CVE-2023-52772 as CVE page is older than CVRF-CVE file.
skipping CVE-2023-52771 as CVE page is older than CVRF-CVE file.
skipping CVE-2023-52770 as CVE page is older than CVRF-CVE file.
skipping CVE-2023-52769 as CVE page is older than CVRF-CVE file.
skipping CVE-2023-52768 as CVE page is older than CVRF-CVE file.
skipping CVE-2023-52767 as CVE page is older than CVRF-CVE file.
--- /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2023-52766.xml 2024-10-20 01:33:03.272625000 +0200
+++ /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2023-52766.xml.new 2024-10-29 01:25:28.465764000 +0100
@@ -14,13 +14,13 @@
1
- 58
- 2024-10-19T23:33:02Z
+ 59
+ 2024-10-29T00:25:27Z
current
2024-06-07T23:16:39Z
- 2024-10-19T23:33:02Z
+ 2024-10-29T00:25:27Z
cve-database/bin/generate-cvrf-cve.pl
2020-12-27T01:00:00Z
@@ -5110,24 +5110,9 @@
kernel-default as a component of SUSE Linux Enterprise Server for SAP Applications 12 SP5
-
- kernel-default-base as a component of SUSE Linux Enterprise Server for SAP Applications 12 SP5
-
-
- kernel-default-devel as a component of SUSE Linux Enterprise Server for SAP Applications 12 SP5
-
-
- kernel-devel as a component of SUSE Linux Enterprise Server for SAP Applications 12 SP5
-
-
- kernel-macros as a component of SUSE Linux Enterprise Server for SAP Applications 12 SP5
-
kernel-source as a component of SUSE Linux Enterprise Server for SAP Applications 12 SP5
-
- kernel-devel-azure as a component of SUSE Linux Enterprise Server for SAP Applications 12 SP5
-
kernel-source-azure as a component of SUSE Linux Enterprise Server for SAP Applications 12 SP5
@@ -6100,11 +6085,6 @@
SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros
SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source
SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default
- SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base
- SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel
- SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel
- SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure
- SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros
SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source
SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure
SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default
skipping CVE-2023-52765 as CVE page is older than CVRF-CVE file.
skipping CVE-2023-52764 as CVE page is older than CVRF-CVE file.
skipping CVE-2023-52763 as CVE page is older than CVRF-CVE file.
skipping CVE-2023-52762 as CVE page is older than CVRF-CVE file.
skipping CVE-2023-52761 as CVE page is older than CVRF-CVE file.
skipping CVE-2023-52760 as CVE page is older than CVRF-CVE file.
skipping CVE-2023-52759 as CVE page is older than CVRF-CVE file.
no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2023-52756
skipping CVE-2023-52757 as CVE page is older than CVRF-CVE file.
no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2023-52754
skipping CVE-2023-52755 as CVE page is older than CVRF-CVE file.
no cpe found for SUSE Linux Enterprise Module for Confidential Computing Technical Preview 15 SP6 in CVE-2023-52752
no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2023-52752
skipping CVE-2023-52753 as CVE page is older than CVRF-CVE file.
--- /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2023-52752.xml 2024-10-22 01:56:06.361728000 +0200
+++ /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2023-52752.xml.new 2024-10-29 01:25:31.926038000 +0100
@@ -14,13 +14,13 @@
1
- 55
- 2024-10-21T23:56:05Z
+ 56
+ 2024-10-29T00:25:30Z
current
2024-05-28T23:14:37Z
- 2024-10-21T23:56:05Z
+ 2024-10-29T00:25:30Z
cve-database/bin/generate-cvrf-cve.pl
2020-12-27T01:00:00Z
@@ -2264,27 +2264,204 @@
kernel-kvmsmall-vdso-6.4.0-150600.23.25.1
+
+ kernel-livepatch-5_14_21-150400_24_100-default-13-150400.2.1
+
+
+ kernel-livepatch-5_14_21-150400_24_103-default-11-150400.2.1
+
+
+ kernel-livepatch-5_14_21-150400_24_108-default-10-150400.9.8.1
+
+
+ kernel-livepatch-5_14_21-150400_24_111-default-8-150400.9.6.1
+
+
+ kernel-livepatch-5_14_21-150400_24_116-default-8-150400.9.8.1
+
+
+ kernel-livepatch-5_14_21-150400_24_119-default-7-150400.9.6.1
+
+
+ kernel-livepatch-5_14_21-150400_24_122-default-5-150400.9.6.1
+
kernel-livepatch-5_14_21-150400_24_125-default-1-150400.9.3.1
+
+ kernel-livepatch-5_14_21-150400_24_88-default-15-150400.2.1
+
+
+ kernel-livepatch-5_14_21-150400_24_92-default-14-150400.2.1
+
+
+ kernel-livepatch-5_14_21-150400_24_97-default-13-150400.2.1
+
+
+ kernel-livepatch-5_14_21-150500_13_18-rt-15-150500.2.1
+
+
+ kernel-livepatch-5_14_21-150500_13_21-rt-14-150500.2.1
+
+
+ kernel-livepatch-5_14_21-150500_13_24-rt-14-150500.2.1
+
+
+ kernel-livepatch-5_14_21-150500_13_27-rt-13-150500.2.1
+
+
+ kernel-livepatch-5_14_21-150500_13_30-rt-12-150500.2.1
+
+
+ kernel-livepatch-5_14_21-150500_13_35-rt-10-150500.11.8.1
+
+
+ kernel-livepatch-5_14_21-150500_13_38-rt-8-150500.11.6.1
+
+
+ kernel-livepatch-5_14_21-150500_13_47-rt-8-150500.11.6.1
+
+
+ kernel-livepatch-5_14_21-150500_13_52-rt-6-150500.11.8.1
+
+
+ kernel-livepatch-5_14_21-150500_13_55-rt-6-150500.11.6.1
+
+
+ kernel-livepatch-5_14_21-150500_13_58-rt-5-150500.11.6.1
+
kernel-livepatch-5_14_21-150500_13_61-rt-1-150500.11.3.1
+
+ kernel-livepatch-5_14_21-150500_55_28-default-15-150500.2.1
+
+
+ kernel-livepatch-5_14_21-150500_55_31-default-14-150500.2.1
+
+
+ kernel-livepatch-5_14_21-150500_55_36-default-13-150500.2.1
+
+
+ kernel-livepatch-5_14_21-150500_55_39-default-13-150500.2.1
+
+
+ kernel-livepatch-5_14_21-150500_55_44-default-12-150500.2.1
+
+
+ kernel-livepatch-5_14_21-150500_55_49-default-10-150500.11.8.1
+
+
+ kernel-livepatch-5_14_21-150500_55_52-default-8-150500.11.6.1
+
+
+ kernel-livepatch-5_14_21-150500_55_59-default-8-150500.11.10.1
+
+
+ kernel-livepatch-5_14_21-150500_55_62-default-6-150500.11.6.1
+
+
+ kernel-livepatch-5_14_21-150500_55_65-default-6-150500.11.6.1
+
+
+ kernel-livepatch-5_14_21-150500_55_68-default-5-150500.11.6.1
+
kernel-livepatch-5_14_21-150500_55_73-default-1-150500.11.3.1
+
+ kernel-livepatch-5_3_18-150200_24_166-default-15-150200.2.1
+
+
+ kernel-livepatch-5_3_18-150200_24_169-default-15-150200.2.1
+
+
+ kernel-livepatch-5_3_18-150200_24_172-default-13-150200.2.1
+
+
+ kernel-livepatch-5_3_18-150200_24_175-default-14-150200.2.1
+
+
+ kernel-livepatch-5_3_18-150200_24_178-default-11-150200.2.1
+
+
+ kernel-livepatch-5_3_18-150200_24_183-default-9-150200.5.6.1
+
+
+ kernel-livepatch-5_3_18-150200_24_188-default-8-150200.5.6.1
+
+
+ kernel-livepatch-5_3_18-150200_24_191-default-7-150200.5.6.1
+
+
+ kernel-livepatch-5_3_18-150200_24_194-default-4-150200.5.6.1
+
kernel-livepatch-5_3_18-150200_24_197-default-1-150200.5.3.1
+
+ kernel-livepatch-5_3_18-150300_59_138-default-15-150300.2.1
+
+
+ kernel-livepatch-5_3_18-150300_59_141-default-14-150300.2.1
+
+
+ kernel-livepatch-5_3_18-150300_59_144-default-13-150300.2.1
+
+
+ kernel-livepatch-5_3_18-150300_59_147-default-13-150300.2.1
+
+
+ kernel-livepatch-5_3_18-150300_59_150-default-12-150300.2.1
+
+
+ kernel-livepatch-5_3_18-150300_59_153-default-9-150300.7.6.1
+
+
+ kernel-livepatch-5_3_18-150300_59_158-default-8-150300.7.6.1
+
+
+ kernel-livepatch-5_3_18-150300_59_161-default-7-150300.7.6.1
+
+
+ kernel-livepatch-5_3_18-150300_59_164-default-4-150300.7.6.1
+
kernel-livepatch-5_3_18-150300_59_167-default-1-150300.7.3.1
+
+ kernel-livepatch-6_4_0-150600_10_11-rt-2-150600.2.1
+
kernel-livepatch-6_4_0-150600_10_14-rt-1-150600.1.3.1
+
+ kernel-livepatch-6_4_0-150600_10_5-rt-4-150600.1.8.1
+
+
+ kernel-livepatch-6_4_0-150600_10_8-rt-2-150600.1.6.1
+
+
+ kernel-livepatch-6_4_0-150600_21-default-6-150600.4.10.1
+
+
+ kernel-livepatch-6_4_0-150600_23_14-default-4-150600.13.6.1
+
+
+ kernel-livepatch-6_4_0-150600_23_17-default-4-150600.13.6.1
+
+
+ kernel-livepatch-6_4_0-150600_23_22-default-2-150600.13.6.1
+
kernel-livepatch-6_4_0-150600_23_25-default-1-150600.13.3.1
+
+ kernel-livepatch-6_4_0-150600_23_7-default-4-150600.13.6.1
+
+
+ kernel-livepatch-6_4_0-150600_8-rt-5-150600.3.1
+
kernel-macros
@@ -2576,6 +2753,30 @@
kernel-zfcpdump-6.4.0-150600.23.25.1
+
+ kgraft-patch-4_12_14-122_179-default-14-2.1
+
+
+ kgraft-patch-4_12_14-122_183-default-14-2.1
+
+
+ kgraft-patch-4_12_14-122_186-default-13-2.1
+
+
+ kgraft-patch-4_12_14-122_189-default-12-2.1
+
+
+ kgraft-patch-4_12_14-122_194-default-10-2.1
+
+
+ kgraft-patch-4_12_14-122_201-default-9-8.10.1
+
+
+ kgraft-patch-4_12_14-122_216-default-7-8.6.1
+
+
+ kgraft-patch-4_12_14-122_219-default-4-8.6.1
+
kgraft-patch-4_12_14-122_222-default-1-8.3.1
@@ -3998,6 +4199,9 @@
kernel-default-livepatch-devel-6.4.0-150600.23.25.1 as a component of SUSE Linux Enterprise Live Patching 15 SP6
+
+ kernel-livepatch-6_4_0-150600_10_11-rt-2-150600.2.1 as a component of SUSE Linux Enterprise Live Patching 15 SP6
+
kernel-livepatch-6_4_0-150600_10_14-rt-1-150600.1.3.1 as a component of SUSE Linux Enterprise Live Patching 15 SP6
@@ -5417,6 +5621,204 @@
kernel-rt-5.14.21-150500.13.61.1 as a component of openSUSE Leap Micro 5.5
+
+ kgraft-patch-4_12_14-122_179-default-14-2.1 as a component of SUSE Linux Enterprise Live Patching 12 SP5
+
+
+ kgraft-patch-4_12_14-122_183-default-14-2.1 as a component of SUSE Linux Enterprise Live Patching 12 SP5
+
+
+ kgraft-patch-4_12_14-122_186-default-13-2.1 as a component of SUSE Linux Enterprise Live Patching 12 SP5
+
+
+ kgraft-patch-4_12_14-122_189-default-12-2.1 as a component of SUSE Linux Enterprise Live Patching 12 SP5
+
+
+ kgraft-patch-4_12_14-122_194-default-10-2.1 as a component of SUSE Linux Enterprise Live Patching 12 SP5
+
+
+ kgraft-patch-4_12_14-122_201-default-9-8.10.1 as a component of SUSE Linux Enterprise Live Patching 12 SP5
+
+
+ kgraft-patch-4_12_14-122_216-default-7-8.6.1 as a component of SUSE Linux Enterprise Live Patching 12 SP5
+
+
+ kgraft-patch-4_12_14-122_219-default-4-8.6.1 as a component of SUSE Linux Enterprise Live Patching 12 SP5
+
+
+ kernel-livepatch-5_3_18-150200_24_166-default-15-150200.2.1 as a component of SUSE Linux Enterprise Live Patching 15 SP2
+
+
+ kernel-livepatch-5_3_18-150200_24_169-default-15-150200.2.1 as a component of SUSE Linux Enterprise Live Patching 15 SP2
+
+
+ kernel-livepatch-5_3_18-150200_24_172-default-13-150200.2.1 as a component of SUSE Linux Enterprise Live Patching 15 SP2
+
+
+ kernel-livepatch-5_3_18-150200_24_175-default-14-150200.2.1 as a component of SUSE Linux Enterprise Live Patching 15 SP2
+
+
+ kernel-livepatch-5_3_18-150200_24_178-default-11-150200.2.1 as a component of SUSE Linux Enterprise Live Patching 15 SP2
+
+
+ kernel-livepatch-5_3_18-150200_24_183-default-9-150200.5.6.1 as a component of SUSE Linux Enterprise Live Patching 15 SP2
+
+
+ kernel-livepatch-5_3_18-150200_24_188-default-8-150200.5.6.1 as a component of SUSE Linux Enterprise Live Patching 15 SP2
+
+
+ kernel-livepatch-5_3_18-150200_24_191-default-7-150200.5.6.1 as a component of SUSE Linux Enterprise Live Patching 15 SP2
+
+
+ kernel-livepatch-5_3_18-150200_24_194-default-4-150200.5.6.1 as a component of SUSE Linux Enterprise Live Patching 15 SP2
+
+
+ kernel-livepatch-5_3_18-150300_59_138-default-15-150300.2.1 as a component of SUSE Linux Enterprise Live Patching 15 SP3
+
+
+ kernel-livepatch-5_3_18-150300_59_141-default-14-150300.2.1 as a component of SUSE Linux Enterprise Live Patching 15 SP3
+
+
+ kernel-livepatch-5_3_18-150300_59_144-default-13-150300.2.1 as a component of SUSE Linux Enterprise Live Patching 15 SP3
+
+
+ kernel-livepatch-5_3_18-150300_59_147-default-13-150300.2.1 as a component of SUSE Linux Enterprise Live Patching 15 SP3
+
+
+ kernel-livepatch-5_3_18-150300_59_150-default-12-150300.2.1 as a component of SUSE Linux Enterprise Live Patching 15 SP3
+
+
+ kernel-livepatch-5_3_18-150300_59_153-default-9-150300.7.6.1 as a component of SUSE Linux Enterprise Live Patching 15 SP3
+
+
+ kernel-livepatch-5_3_18-150300_59_158-default-8-150300.7.6.1 as a component of SUSE Linux Enterprise Live Patching 15 SP3
+
+
+ kernel-livepatch-5_3_18-150300_59_161-default-7-150300.7.6.1 as a component of SUSE Linux Enterprise Live Patching 15 SP3
+
+
+ kernel-livepatch-5_3_18-150300_59_164-default-4-150300.7.6.1 as a component of SUSE Linux Enterprise Live Patching 15 SP3
+
+
+ kernel-livepatch-5_14_21-150400_24_100-default-13-150400.2.1 as a component of SUSE Linux Enterprise Live Patching 15 SP4
+
+
+ kernel-livepatch-5_14_21-150400_24_103-default-11-150400.2.1 as a component of SUSE Linux Enterprise Live Patching 15 SP4
+
+
+ kernel-livepatch-5_14_21-150400_24_108-default-10-150400.9.8.1 as a component of SUSE Linux Enterprise Live Patching 15 SP4
+
+
+ kernel-livepatch-5_14_21-150400_24_111-default-8-150400.9.6.1 as a component of SUSE Linux Enterprise Live Patching 15 SP4
+
+
+ kernel-livepatch-5_14_21-150400_24_116-default-8-150400.9.8.1 as a component of SUSE Linux Enterprise Live Patching 15 SP4
+
+
+ kernel-livepatch-5_14_21-150400_24_119-default-7-150400.9.6.1 as a component of SUSE Linux Enterprise Live Patching 15 SP4
+
+
+ kernel-livepatch-5_14_21-150400_24_122-default-5-150400.9.6.1 as a component of SUSE Linux Enterprise Live Patching 15 SP4
+
+
+ kernel-livepatch-5_14_21-150400_24_88-default-15-150400.2.1 as a component of SUSE Linux Enterprise Live Patching 15 SP4
+
+
+ kernel-livepatch-5_14_21-150400_24_92-default-14-150400.2.1 as a component of SUSE Linux Enterprise Live Patching 15 SP4
+
+
+ kernel-livepatch-5_14_21-150400_24_97-default-13-150400.2.1 as a component of SUSE Linux Enterprise Live Patching 15 SP4
+
+
+ kernel-livepatch-5_14_21-150500_13_18-rt-15-150500.2.1 as a component of SUSE Linux Enterprise Live Patching 15 SP5
+
+
+ kernel-livepatch-5_14_21-150500_13_21-rt-14-150500.2.1 as a component of SUSE Linux Enterprise Live Patching 15 SP5
+
+
+ kernel-livepatch-5_14_21-150500_13_24-rt-14-150500.2.1 as a component of SUSE Linux Enterprise Live Patching 15 SP5
+
+
+ kernel-livepatch-5_14_21-150500_13_27-rt-13-150500.2.1 as a component of SUSE Linux Enterprise Live Patching 15 SP5
+
+
+ kernel-livepatch-5_14_21-150500_13_30-rt-12-150500.2.1 as a component of SUSE Linux Enterprise Live Patching 15 SP5
+
+
+ kernel-livepatch-5_14_21-150500_13_35-rt-10-150500.11.8.1 as a component of SUSE Linux Enterprise Live Patching 15 SP5
+
+
+ kernel-livepatch-5_14_21-150500_13_38-rt-8-150500.11.6.1 as a component of SUSE Linux Enterprise Live Patching 15 SP5
+
+
+ kernel-livepatch-5_14_21-150500_13_47-rt-8-150500.11.6.1 as a component of SUSE Linux Enterprise Live Patching 15 SP5
+
+
+ kernel-livepatch-5_14_21-150500_13_52-rt-6-150500.11.8.1 as a component of SUSE Linux Enterprise Live Patching 15 SP5
+
+
+ kernel-livepatch-5_14_21-150500_13_55-rt-6-150500.11.6.1 as a component of SUSE Linux Enterprise Live Patching 15 SP5
+
+
+ kernel-livepatch-5_14_21-150500_13_58-rt-5-150500.11.6.1 as a component of SUSE Linux Enterprise Live Patching 15 SP5
+
+
+ kernel-livepatch-5_14_21-150500_55_28-default-15-150500.2.1 as a component of SUSE Linux Enterprise Live Patching 15 SP5
+
+
+ kernel-livepatch-5_14_21-150500_55_31-default-14-150500.2.1 as a component of SUSE Linux Enterprise Live Patching 15 SP5
+
+
+ kernel-livepatch-5_14_21-150500_55_36-default-13-150500.2.1 as a component of SUSE Linux Enterprise Live Patching 15 SP5
+
+
+ kernel-livepatch-5_14_21-150500_55_39-default-13-150500.2.1 as a component of SUSE Linux Enterprise Live Patching 15 SP5
+
+
+ kernel-livepatch-5_14_21-150500_55_44-default-12-150500.2.1 as a component of SUSE Linux Enterprise Live Patching 15 SP5
+
+
+ kernel-livepatch-5_14_21-150500_55_49-default-10-150500.11.8.1 as a component of SUSE Linux Enterprise Live Patching 15 SP5
+
+
+ kernel-livepatch-5_14_21-150500_55_52-default-8-150500.11.6.1 as a component of SUSE Linux Enterprise Live Patching 15 SP5
+
+
+ kernel-livepatch-5_14_21-150500_55_59-default-8-150500.11.10.1 as a component of SUSE Linux Enterprise Live Patching 15 SP5
+
+
+ kernel-livepatch-5_14_21-150500_55_62-default-6-150500.11.6.1 as a component of SUSE Linux Enterprise Live Patching 15 SP5
+
+
+ kernel-livepatch-5_14_21-150500_55_65-default-6-150500.11.6.1 as a component of SUSE Linux Enterprise Live Patching 15 SP5
+
+
+ kernel-livepatch-5_14_21-150500_55_68-default-5-150500.11.6.1 as a component of SUSE Linux Enterprise Live Patching 15 SP5
+
+
+ kernel-livepatch-6_4_0-150600_10_5-rt-4-150600.1.8.1 as a component of SUSE Linux Enterprise Live Patching 15 SP6
+
+
+ kernel-livepatch-6_4_0-150600_10_8-rt-2-150600.1.6.1 as a component of SUSE Linux Enterprise Live Patching 15 SP6
+
+
+ kernel-livepatch-6_4_0-150600_21-default-6-150600.4.10.1 as a component of SUSE Linux Enterprise Live Patching 15 SP6
+
+
+ kernel-livepatch-6_4_0-150600_23_14-default-4-150600.13.6.1 as a component of SUSE Linux Enterprise Live Patching 15 SP6
+
+
+ kernel-livepatch-6_4_0-150600_23_17-default-4-150600.13.6.1 as a component of SUSE Linux Enterprise Live Patching 15 SP6
+
+
+ kernel-livepatch-6_4_0-150600_23_22-default-2-150600.13.6.1 as a component of SUSE Linux Enterprise Live Patching 15 SP6
+
+
+ kernel-livepatch-6_4_0-150600_23_7-default-4-150600.13.6.1 as a component of SUSE Linux Enterprise Live Patching 15 SP6
+
+
+ kernel-livepatch-6_4_0-150600_8-rt-5-150600.3.1 as a component of SUSE Linux Enterprise Live Patching 15 SP6
+
kernel-default as a component of SUSE Linux Enterprise High Performance Computing 12 SP5
@@ -6077,6 +6479,7 @@
SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_73-default-1-150500.11.3.1
SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.25.1
SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.25.1
+ SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_10_11-rt-2-150600.2.1
SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_10_14-rt-1-150600.1.3.1
SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_25-default-1-150600.13.3.1
SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.167.1
@@ -6551,6 +6954,74 @@
openSUSE Leap Micro 5.5:kernel-default-base-5.14.21-150500.55.73.1.150500.6.33.8
openSUSE Leap Micro 5.5:kernel-rt-5.14.21-150500.13.61.1
+
+ SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_179-default-14-2.1
+ SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_183-default-14-2.1
+ SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_186-default-13-2.1
+ SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_189-default-12-2.1
+ SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_194-default-10-2.1
+ SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_201-default-9-8.10.1
+ SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_216-default-7-8.6.1
+ SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-4-8.6.1
+ SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_166-default-15-150200.2.1
+ SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_169-default-15-150200.2.1
+ SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_172-default-13-150200.2.1
+ SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_175-default-14-150200.2.1
+ SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_178-default-11-150200.2.1
+ SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_183-default-9-150200.5.6.1
+ SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_188-default-8-150200.5.6.1
+ SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_191-default-7-150200.5.6.1
+ SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_194-default-4-150200.5.6.1
+ SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_138-default-15-150300.2.1
+ SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_141-default-14-150300.2.1
+ SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_144-default-13-150300.2.1
+ SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_147-default-13-150300.2.1
+ SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_150-default-12-150300.2.1
+ SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_153-default-9-150300.7.6.1
+ SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_158-default-8-150300.7.6.1
+ SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_161-default-7-150300.7.6.1
+ SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_164-default-4-150300.7.6.1
+ SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_100-default-13-150400.2.1
+ SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_103-default-11-150400.2.1
+ SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_108-default-10-150400.9.8.1
+ SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_111-default-8-150400.9.6.1
+ SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_116-default-8-150400.9.8.1
+ SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_119-default-7-150400.9.6.1
+ SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_122-default-5-150400.9.6.1
+ SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_88-default-15-150400.2.1
+ SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_92-default-14-150400.2.1
+ SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_97-default-13-150400.2.1
+ SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_18-rt-15-150500.2.1
+ SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_21-rt-14-150500.2.1
+ SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_24-rt-14-150500.2.1
+ SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_27-rt-13-150500.2.1
+ SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_30-rt-12-150500.2.1
+ SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_35-rt-10-150500.11.8.1
+ SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_38-rt-8-150500.11.6.1
+ SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_47-rt-8-150500.11.6.1
+ SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_52-rt-6-150500.11.8.1
+ SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_55-rt-6-150500.11.6.1
+ SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-5-150500.11.6.1
+ SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_28-default-15-150500.2.1
+ SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_31-default-14-150500.2.1
+ SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_36-default-13-150500.2.1
+ SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_39-default-13-150500.2.1
+ SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_44-default-12-150500.2.1
+ SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_49-default-10-150500.11.8.1
+ SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_52-default-8-150500.11.6.1
+ SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_59-default-8-150500.11.10.1
+ SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-6-150500.11.6.1
+ SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_65-default-6-150500.11.6.1
+ SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_68-default-5-150500.11.6.1
+ SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_10_5-rt-4-150600.1.8.1
+ SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_10_8-rt-2-150600.1.6.1
+ SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_21-default-6-150600.4.10.1
+ SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_14-default-4-150600.13.6.1
+ SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_17-default-4-150600.13.6.1
+ SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_22-default-2-150600.13.6.1
+ SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_7-default-4-150600.13.6.1
+ SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_8-rt-5-150600.3.1
+
SUSE Linux Enterprise High Performance Computing 12 SP5:kernel-default
SUSE Linux Enterprise High Performance Computing 12 SP5:kernel-source
no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2023-52743
skipping CVE-2023-52751 as CVE page is older than CVRF-CVE file.
skipping CVE-2023-52750 as CVE page is older than CVRF-CVE file.
skipping CVE-2023-52749 as CVE page is older than CVRF-CVE file.
skipping CVE-2023-52748 as CVE page is older than CVRF-CVE file.
skipping CVE-2023-52747 as CVE page is older than CVRF-CVE file.
skipping CVE-2023-52746 as CVE page is older than CVRF-CVE file.
skipping CVE-2023-52745 as CVE page is older than CVRF-CVE file.
skipping CVE-2023-52744 as CVE page is older than CVRF-CVE file.
--- /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2023-52743.xml 2024-10-22 01:56:14.660764000 +0200
+++ /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2023-52743.xml.new 2024-10-29 01:25:32.718013000 +0100
@@ -14,13 +14,13 @@
1
- 40
- 2024-10-21T23:56:14Z
+ 41
+ 2024-10-29T00:25:32Z
current
2024-05-22T23:14:28Z
- 2024-10-21T23:56:14Z
+ 2024-10-29T00:25:32Z
cve-database/bin/generate-cvrf-cve.pl
2020-12-27T01:00:00Z
@@ -171,6 +171,21 @@
Image SLES12-SP5-EC2-BYOS
+
+
+ Image SLES12-SP5-GCE-BYOS
+
+
+
+
+ Image SLES12-SP5-GCE-SAP-BYOS
+
+
+
+
+ Image SLES12-SP5-GCE-SAP-On-Demand
+
+
Image SLES12-SP5-SAP-Azure-LI-BYOS-Production
@@ -1965,6 +1980,39 @@
kernel-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-EC2-BYOS
+
+ kernel-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-BYOS
+
+
+ cluster-md-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ dlm-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ gfs2-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ kernel-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ ocfs2-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ cluster-md-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
+
+ dlm-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
+
+ gfs2-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
+
+ kernel-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
+
+ ocfs2-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
cluster-md-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-SAP-Azure-LI-BYOS-Production
@@ -4035,6 +4083,17 @@
Image SLES12-SP5-Azure-SAP-BYOS:kernel-default-4.12.14-122.225.1
Image SLES12-SP5-Azure-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.225.1
Image SLES12-SP5-EC2-BYOS:kernel-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-BYOS:kernel-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-BYOS:cluster-md-kmp-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-BYOS:dlm-kmp-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-BYOS:gfs2-kmp-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-BYOS:kernel-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:cluster-md-kmp-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:dlm-kmp-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:gfs2-kmp-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:kernel-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:ocfs2-kmp-default-4.12.14-122.225.1
Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:cluster-md-kmp-default-4.12.14-122.225.1
Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:dlm-kmp-default-4.12.14-122.225.1
Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:gfs2-kmp-default-4.12.14-122.225.1
skipping CVE-2023-52742 as CVE page is older than CVRF-CVE file.
skipping CVE-2023-52741 as CVE page is older than CVRF-CVE file.
skipping CVE-2023-52740 as CVE page is older than CVRF-CVE file.
skipping CVE-2023-52739 as CVE page is older than CVRF-CVE file.
skipping CVE-2023-52738 as CVE page is older than CVRF-CVE file.
skipping CVE-2023-52737 as CVE page is older than CVRF-CVE file.
skipping CVE-2023-52736 as CVE page is older than CVRF-CVE file.
skipping CVE-2023-52735 as CVE page is older than CVRF-CVE file.
skipping CVE-2023-52733 as CVE page is older than CVRF-CVE file.
skipping CVE-2023-52732 as CVE page is older than CVRF-CVE file.
skipping CVE-2023-52731 as CVE page is older than CVRF-CVE file.
skipping CVE-2023-52730 as CVE page is older than CVRF-CVE file.
no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2023-52708
skipping CVE-2023-52722 as CVE page is older than CVRF-CVE file.
--- /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2023-52708.xml 2024-10-17 01:27:34.694698000 +0200
+++ /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2023-52708.xml.new 2024-10-29 01:25:34.116973000 +0100
@@ -14,13 +14,13 @@
1
- 37
- 2024-10-16T23:27:34Z
+ 38
+ 2024-10-29T00:25:33Z
current
2024-05-28T23:14:42Z
- 2024-10-16T23:27:34Z
+ 2024-10-29T00:25:33Z
cve-database/bin/generate-cvrf-cve.pl
2020-12-27T01:00:00Z
@@ -109,6 +109,21 @@
Image SLES12-SP5-Azure-SAP-BYOS
+
+
+ Image SLES12-SP5-GCE-BYOS
+
+
+
+
+ Image SLES12-SP5-GCE-SAP-BYOS
+
+
+
+
+ Image SLES12-SP5-GCE-SAP-On-Demand
+
+
Image SLES15-SP4-BYOS
@@ -1902,6 +1917,39 @@
ocfs2-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-Azure-SAP-BYOS
+
+ kernel-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-BYOS
+
+
+ cluster-md-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ dlm-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ gfs2-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ kernel-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ ocfs2-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ cluster-md-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
+
+ dlm-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
+
+ gfs2-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
+
+ kernel-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
+
+ ocfs2-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
kernel-default-5.14.21-150400.24.122.2 as a component of Image SLES15-SP4-BYOS
@@ -3939,6 +3987,17 @@
Image SLES12-SP5-Azure-SAP-BYOS:gfs2-kmp-default-4.12.14-122.228.1
Image SLES12-SP5-Azure-SAP-BYOS:kernel-default-4.12.14-122.228.1
Image SLES12-SP5-Azure-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.228.1
+ Image SLES12-SP5-GCE-BYOS:kernel-default-4.12.14-122.228.1
+ Image SLES12-SP5-GCE-SAP-BYOS:cluster-md-kmp-default-4.12.14-122.228.1
+ Image SLES12-SP5-GCE-SAP-BYOS:dlm-kmp-default-4.12.14-122.228.1
+ Image SLES12-SP5-GCE-SAP-BYOS:gfs2-kmp-default-4.12.14-122.228.1
+ Image SLES12-SP5-GCE-SAP-BYOS:kernel-default-4.12.14-122.228.1
+ Image SLES12-SP5-GCE-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.228.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:cluster-md-kmp-default-4.12.14-122.228.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:dlm-kmp-default-4.12.14-122.228.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:gfs2-kmp-default-4.12.14-122.228.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:kernel-default-4.12.14-122.228.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:ocfs2-kmp-default-4.12.14-122.228.1
Image SLES15-SP4-BYOS:kernel-default-5.14.21-150400.24.122.2
Image SLES15-SP4-BYOS-Azure:kernel-default-5.14.21-150400.24.122.2
Image SLES15-SP4-BYOS-EC2:kernel-default-5.14.21-150400.24.122.2
skipping CVE-2023-52707 as CVE page is older than CVRF-CVE file.
skipping CVE-2023-52706 as CVE page is older than CVRF-CVE file.
skipping CVE-2023-52705 as CVE page is older than CVRF-CVE file.
skipping CVE-2023-52704 as CVE page is older than CVRF-CVE file.
skipping CVE-2023-52703 as CVE page is older than CVRF-CVE file.
skipping CVE-2023-52702 as CVE page is older than CVRF-CVE file.
skipping CVE-2023-52701 as CVE page is older than CVRF-CVE file.
skipping CVE-2023-52700 as CVE page is older than CVRF-CVE file.
skipping CVE-2023-52699 as CVE page is older than CVRF-CVE file.
skipping CVE-2023-52697 as CVE page is older than CVRF-CVE file.
skipping CVE-2023-52696 as CVE page is older than CVRF-CVE file.
skipping CVE-2023-52695 as CVE page is older than CVRF-CVE file.
skipping CVE-2023-52694 as CVE page is older than CVRF-CVE file.
skipping CVE-2023-52692 as CVE page is older than CVRF-CVE file.
skipping CVE-2023-52690 as CVE page is older than CVRF-CVE file.
skipping CVE-2023-52689 as CVE page is older than CVRF-CVE file.
skipping CVE-2023-52688 as CVE page is older than CVRF-CVE file.
skipping CVE-2023-52687 as CVE page is older than CVRF-CVE file.
skipping CVE-2023-52686 as CVE page is older than CVRF-CVE file.
skipping CVE-2023-52685 as CVE page is older than CVRF-CVE file.
skipping CVE-2023-52684 as CVE page is older than CVRF-CVE file.
skipping CVE-2023-52682 as CVE page is older than CVRF-CVE file.
skipping CVE-2023-52681 as CVE page is older than CVRF-CVE file.
skipping CVE-2023-52680 as CVE page is older than CVRF-CVE file.
skipping CVE-2023-52679 as CVE page is older than CVRF-CVE file.
skipping CVE-2023-52678 as CVE page is older than CVRF-CVE file.
skipping CVE-2023-52676 as CVE page is older than CVRF-CVE file.
skipping CVE-2023-52674 as CVE page is older than CVRF-CVE file.
skipping CVE-2023-52673 as CVE page is older than CVRF-CVE file.
skipping CVE-2023-52672 as CVE page is older than CVRF-CVE file.
skipping CVE-2023-52671 as CVE page is older than CVRF-CVE file.
skipping CVE-2023-52670 as CVE page is older than CVRF-CVE file.
--- /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2023-52669.xml 2024-10-16 01:37:23.596568000 +0200
+++ /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2023-52669.xml.new 2024-10-29 01:25:40.109150000 +0100
@@ -14,13 +14,13 @@
1
- 56
- 2024-10-15T23:37:23Z
+ 57
+ 2024-10-29T00:25:39Z
current
2024-05-20T23:12:52Z
- 2024-10-15T23:37:23Z
+ 2024-10-29T00:25:39Z
cve-database/bin/generate-cvrf-cve.pl
2020-12-27T01:00:00Z
@@ -171,6 +171,21 @@
Image SLES12-SP5-EC2-BYOS
+
+
+ Image SLES12-SP5-GCE-BYOS
+
+
+
+
+ Image SLES12-SP5-GCE-SAP-BYOS
+
+
+
+
+ Image SLES12-SP5-GCE-SAP-On-Demand
+
+
Image SLES12-SP5-SAP-Azure-LI-BYOS-Production
@@ -2273,6 +2288,39 @@
kernel-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-EC2-BYOS
+
+ kernel-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-BYOS
+
+
+ cluster-md-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ dlm-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ gfs2-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ kernel-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ ocfs2-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ cluster-md-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
+
+ dlm-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
+
+ gfs2-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
+
+ kernel-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
+
+ ocfs2-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
cluster-md-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-SAP-Azure-LI-BYOS-Production
@@ -4590,6 +4638,17 @@
Image SLES12-SP5-Azure-SAP-BYOS:kernel-default-4.12.14-122.225.1
Image SLES12-SP5-Azure-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.225.1
Image SLES12-SP5-EC2-BYOS:kernel-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-BYOS:kernel-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-BYOS:cluster-md-kmp-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-BYOS:dlm-kmp-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-BYOS:gfs2-kmp-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-BYOS:kernel-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:cluster-md-kmp-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:dlm-kmp-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:gfs2-kmp-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:kernel-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:ocfs2-kmp-default-4.12.14-122.225.1
Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:cluster-md-kmp-default-4.12.14-122.225.1
Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:dlm-kmp-default-4.12.14-122.225.1
Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:gfs2-kmp-default-4.12.14-122.225.1
skipping CVE-2023-52668 as CVE page is older than CVRF-CVE file.
skipping CVE-2023-52667 as CVE page is older than CVRF-CVE file.
skipping CVE-2023-52665 as CVE page is older than CVRF-CVE file.
skipping CVE-2023-52664 as CVE page is older than CVRF-CVE file.
skipping CVE-2023-52663 as CVE page is older than CVRF-CVE file.
skipping CVE-2023-52662 as CVE page is older than CVRF-CVE file.
skipping CVE-2023-52661 as CVE page is older than CVRF-CVE file.
skipping CVE-2023-52660 as CVE page is older than CVRF-CVE file.
skipping CVE-2023-52659 as CVE page is older than CVRF-CVE file.
skipping CVE-2023-52658 as CVE page is older than CVRF-CVE file.
skipping CVE-2023-52657 as CVE page is older than CVRF-CVE file.
skipping CVE-2023-52656 as CVE page is older than CVRF-CVE file.
skipping CVE-2023-52655 as CVE page is older than CVRF-CVE file.
skipping CVE-2023-52654 as CVE page is older than CVRF-CVE file.
skipping CVE-2023-52653 as CVE page is older than CVRF-CVE file.
skipping CVE-2023-52651 as CVE page is older than CVRF-CVE file.
skipping CVE-2023-52650 as CVE page is older than CVRF-CVE file.
skipping CVE-2023-52649 as CVE page is older than CVRF-CVE file.
skipping CVE-2023-52648 as CVE page is older than CVRF-CVE file.
skipping CVE-2023-52647 as CVE page is older than CVRF-CVE file.
skipping CVE-2023-52646 as CVE page is older than CVRF-CVE file.
skipping CVE-2023-52645 as CVE page is older than CVRF-CVE file.
skipping CVE-2023-52643 as CVE page is older than CVRF-CVE file.
skipping CVE-2023-52642 as CVE page is older than CVRF-CVE file.
skipping CVE-2023-52641 as CVE page is older than CVRF-CVE file.
skipping CVE-2023-52640 as CVE page is older than CVRF-CVE file.
skipping CVE-2023-52639 as CVE page is older than CVRF-CVE file.
skipping CVE-2023-52638 as CVE page is older than CVRF-CVE file.
skipping CVE-2023-52637 as CVE page is older than CVRF-CVE file.
skipping CVE-2023-52636 as CVE page is older than CVRF-CVE file.
skipping CVE-2023-52634 as CVE page is older than CVRF-CVE file.
skipping CVE-2023-52633 as CVE page is older than CVRF-CVE file.
skipping CVE-2023-52632 as CVE page is older than CVRF-CVE file.
skipping CVE-2023-52631 as CVE page is older than CVRF-CVE file.
skipping CVE-2023-52630 as CVE page is older than CVRF-CVE file.
skipping CVE-2023-52629 as CVE page is older than CVRF-CVE file.
skipping CVE-2023-52628 as CVE page is older than CVRF-CVE file.
skipping CVE-2023-52627 as CVE page is older than CVRF-CVE file.
skipping CVE-2023-52626 as CVE page is older than CVRF-CVE file.
skipping CVE-2023-52625 as CVE page is older than CVRF-CVE file.
skipping CVE-2023-52624 as CVE page is older than CVRF-CVE file.
--- /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2023-52623.xml 2024-10-17 01:28:00.199842000 +0200
+++ /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2023-52623.xml.new 2024-10-29 01:25:44.024941000 +0100
@@ -14,13 +14,13 @@
1
- 53
- 2024-10-16T23:27:59Z
+ 54
+ 2024-10-29T00:25:43Z
current
2024-03-28T00:12:09Z
- 2024-10-16T23:27:59Z
+ 2024-10-29T00:25:43Z
cve-database/bin/generate-cvrf-cve.pl
2020-12-27T01:00:00Z
@@ -169,6 +169,21 @@
Image SLES12-SP5-EC2-BYOS
+
+
+ Image SLES12-SP5-GCE-BYOS
+
+
+
+
+ Image SLES12-SP5-GCE-SAP-BYOS
+
+
+
+
+ Image SLES12-SP5-GCE-SAP-On-Demand
+
+
Image SLES12-SP5-SAP-Azure-LI-BYOS-Production
@@ -1633,6 +1648,39 @@
kernel-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-EC2-BYOS
+
+ kernel-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-BYOS
+
+
+ cluster-md-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ dlm-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ gfs2-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ kernel-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ ocfs2-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ cluster-md-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
+
+ dlm-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
+
+ gfs2-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
+
+ kernel-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
+
+ ocfs2-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
cluster-md-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-SAP-Azure-LI-BYOS-Production
@@ -3332,6 +3380,17 @@
Image SLES12-SP5-Azure-SAP-BYOS:kernel-default-4.12.14-122.225.1
Image SLES12-SP5-Azure-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.225.1
Image SLES12-SP5-EC2-BYOS:kernel-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-BYOS:kernel-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-BYOS:cluster-md-kmp-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-BYOS:dlm-kmp-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-BYOS:gfs2-kmp-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-BYOS:kernel-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:cluster-md-kmp-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:dlm-kmp-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:gfs2-kmp-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:kernel-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:ocfs2-kmp-default-4.12.14-122.225.1
Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:cluster-md-kmp-default-4.12.14-122.225.1
Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:dlm-kmp-default-4.12.14-122.225.1
Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:gfs2-kmp-default-4.12.14-122.225.1
skipping CVE-2023-52621 as CVE page is older than CVRF-CVE file.
skipping CVE-2023-52620 as CVE page is older than CVRF-CVE file.
--- /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2023-52619.xml 2024-10-16 01:37:42.040609000 +0200
+++ /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2023-52619.xml.new 2024-10-29 01:25:45.211875000 +0100
@@ -14,13 +14,13 @@
1
- 54
- 2024-10-15T23:37:41Z
+ 55
+ 2024-10-29T00:25:44Z
current
2024-03-19T00:10:20Z
- 2024-10-15T23:37:41Z
+ 2024-10-29T00:25:44Z
cve-database/bin/generate-cvrf-cve.pl
2020-12-27T01:00:00Z
@@ -123,6 +123,21 @@
Image SLES12-SP5-EC2-BYOS
+
+
+ Image SLES12-SP5-GCE-BYOS
+
+
+
+
+ Image SLES12-SP5-GCE-SAP-BYOS
+
+
+
+
+ Image SLES12-SP5-GCE-SAP-On-Demand
+
+
Image SLES12-SP5-SAP-Azure-LI-BYOS-Production
@@ -1584,6 +1599,39 @@
kernel-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-EC2-BYOS
+
+ kernel-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-BYOS
+
+
+ cluster-md-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ dlm-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ gfs2-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ kernel-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ ocfs2-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ cluster-md-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
+
+ dlm-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
+
+ gfs2-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
+
+ kernel-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
+
+ ocfs2-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
cluster-md-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-SAP-Azure-LI-BYOS-Production
@@ -3213,6 +3261,17 @@
Image SLES12-SP5-Azure-SAP-BYOS:kernel-default-4.12.14-122.225.1
Image SLES12-SP5-Azure-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.225.1
Image SLES12-SP5-EC2-BYOS:kernel-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-BYOS:kernel-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-BYOS:cluster-md-kmp-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-BYOS:dlm-kmp-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-BYOS:gfs2-kmp-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-BYOS:kernel-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:cluster-md-kmp-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:dlm-kmp-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:gfs2-kmp-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:kernel-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:ocfs2-kmp-default-4.12.14-122.225.1
Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:cluster-md-kmp-default-4.12.14-122.225.1
Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:dlm-kmp-default-4.12.14-122.225.1
Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:gfs2-kmp-default-4.12.14-122.225.1
skipping CVE-2023-52618 as CVE page is older than CVRF-CVE file.
skipping CVE-2023-52617 as CVE page is older than CVRF-CVE file.
skipping CVE-2023-52616 as CVE page is older than CVRF-CVE file.
--- /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2023-52615.xml 2024-10-16 01:37:44.729437000 +0200
+++ /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2023-52615.xml.new 2024-10-29 01:25:46.188818000 +0100
@@ -14,13 +14,13 @@
1
- 55
- 2024-10-15T23:37:44Z
+ 56
+ 2024-10-29T00:25:45Z
current
2024-03-19T00:10:21Z
- 2024-10-15T23:37:44Z
+ 2024-10-29T00:25:45Z
cve-database/bin/generate-cvrf-cve.pl
2020-12-27T01:00:00Z
@@ -117,6 +117,21 @@
Image SLES12-SP5-EC2-BYOS
+
+
+ Image SLES12-SP5-GCE-BYOS
+
+
+
+
+ Image SLES12-SP5-GCE-SAP-BYOS
+
+
+
+
+ Image SLES12-SP5-GCE-SAP-On-Demand
+
+
Image SLES12-SP5-SAP-Azure-LI-BYOS-Production
@@ -1602,6 +1617,39 @@
kernel-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-EC2-BYOS
+
+ kernel-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-BYOS
+
+
+ cluster-md-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ dlm-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ gfs2-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ kernel-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ ocfs2-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ cluster-md-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
+
+ dlm-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
+
+ gfs2-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
+
+ kernel-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
+
+ ocfs2-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
cluster-md-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-SAP-Azure-LI-BYOS-Production
@@ -3264,6 +3312,17 @@
Image SLES12-SP5-Azure-SAP-BYOS:kernel-default-4.12.14-122.225.1
Image SLES12-SP5-Azure-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.225.1
Image SLES12-SP5-EC2-BYOS:kernel-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-BYOS:kernel-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-BYOS:cluster-md-kmp-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-BYOS:dlm-kmp-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-BYOS:gfs2-kmp-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-BYOS:kernel-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:cluster-md-kmp-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:dlm-kmp-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:gfs2-kmp-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:kernel-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:ocfs2-kmp-default-4.12.14-122.225.1
Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:cluster-md-kmp-default-4.12.14-122.225.1
Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:dlm-kmp-default-4.12.14-122.225.1
Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:gfs2-kmp-default-4.12.14-122.225.1
skipping CVE-2023-52613 as CVE page is older than CVRF-CVE file.
--- /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2023-52612.xml 2024-10-16 01:37:45.811371000 +0200
+++ /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2023-52612.xml.new 2024-10-29 01:25:47.448737000 +0100
@@ -14,13 +14,13 @@
1
- 55
- 2024-10-15T23:37:45Z
+ 56
+ 2024-10-29T00:25:46Z
current
2024-03-19T00:10:21Z
- 2024-10-15T23:37:45Z
+ 2024-10-29T00:25:46Z
cve-database/bin/generate-cvrf-cve.pl
2020-12-27T01:00:00Z
@@ -113,6 +113,21 @@
Image SLES12-SP5-EC2-BYOS
+
+
+ Image SLES12-SP5-GCE-BYOS
+
+
+
+
+ Image SLES12-SP5-GCE-SAP-BYOS
+
+
+
+
+ Image SLES12-SP5-GCE-SAP-On-Demand
+
+
Image SLES12-SP5-SAP-Azure-LI-BYOS-Production
@@ -1533,6 +1548,39 @@
kernel-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-EC2-BYOS
+
+ kernel-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-BYOS
+
+
+ cluster-md-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ dlm-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ gfs2-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ kernel-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ ocfs2-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ cluster-md-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
+
+ dlm-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
+
+ gfs2-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
+
+ kernel-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
+
+ ocfs2-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
cluster-md-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-SAP-Azure-LI-BYOS-Production
@@ -3131,6 +3179,17 @@
Image SLES12-SP5-Azure-SAP-BYOS:kernel-default-4.12.14-122.225.1
Image SLES12-SP5-Azure-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.225.1
Image SLES12-SP5-EC2-BYOS:kernel-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-BYOS:kernel-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-BYOS:cluster-md-kmp-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-BYOS:dlm-kmp-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-BYOS:gfs2-kmp-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-BYOS:kernel-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:cluster-md-kmp-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:dlm-kmp-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:gfs2-kmp-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:kernel-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:ocfs2-kmp-default-4.12.14-122.225.1
Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:cluster-md-kmp-default-4.12.14-122.225.1
Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:dlm-kmp-default-4.12.14-122.225.1
Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:gfs2-kmp-default-4.12.14-122.225.1
no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2023-52607
skipping CVE-2023-52611 as CVE page is older than CVRF-CVE file.
skipping CVE-2023-52610 as CVE page is older than CVRF-CVE file.
skipping CVE-2023-52609 as CVE page is older than CVRF-CVE file.
skipping CVE-2023-52608 as CVE page is older than CVRF-CVE file.
no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2023-52597
skipping CVE-2023-52606 as CVE page is older than CVRF-CVE file.
skipping CVE-2023-52605 as CVE page is older than CVRF-CVE file.
skipping CVE-2023-52604 as CVE page is older than CVRF-CVE file.
skipping CVE-2023-52603 as CVE page is older than CVRF-CVE file.
skipping CVE-2023-52602 as CVE page is older than CVRF-CVE file.
skipping CVE-2023-52601 as CVE page is older than CVRF-CVE file.
skipping CVE-2023-52600 as CVE page is older than CVRF-CVE file.
skipping CVE-2023-52599 as CVE page is older than CVRF-CVE file.
skipping CVE-2023-52598 as CVE page is older than CVRF-CVE file.
skipping CVE-2023-52596 as CVE page is older than CVRF-CVE file.
skipping CVE-2023-52595 as CVE page is older than CVRF-CVE file.
--- /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2023-52594.xml 2024-10-17 01:28:06.304528000 +0200
+++ /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2023-52594.xml.new 2024-10-29 01:25:49.270137000 +0100
@@ -14,13 +14,13 @@
1
- 56
- 2024-10-16T23:28:05Z
+ 57
+ 2024-10-29T00:25:48Z
current
2024-03-07T00:11:40Z
- 2024-10-16T23:28:05Z
+ 2024-10-29T00:25:48Z
cve-database/bin/generate-cvrf-cve.pl
2020-12-27T01:00:00Z
@@ -129,6 +129,21 @@
Image SLES12-SP5-EC2-BYOS
+
+
+ Image SLES12-SP5-GCE-BYOS
+
+
+
+
+ Image SLES12-SP5-GCE-SAP-BYOS
+
+
+
+
+ Image SLES12-SP5-GCE-SAP-On-Demand
+
+
Image SLES12-SP5-SAP-Azure-LI-BYOS-Production
@@ -1614,6 +1629,39 @@
kernel-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-EC2-BYOS
+
+ kernel-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-BYOS
+
+
+ cluster-md-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ dlm-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ gfs2-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ kernel-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ ocfs2-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ cluster-md-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
+
+ dlm-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
+
+ gfs2-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
+
+ kernel-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
+
+ ocfs2-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
cluster-md-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-SAP-Azure-LI-BYOS-Production
@@ -3288,6 +3336,17 @@
Image SLES12-SP5-Azure-SAP-BYOS:kernel-default-4.12.14-122.225.1
Image SLES12-SP5-Azure-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.225.1
Image SLES12-SP5-EC2-BYOS:kernel-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-BYOS:kernel-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-BYOS:cluster-md-kmp-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-BYOS:dlm-kmp-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-BYOS:gfs2-kmp-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-BYOS:kernel-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:cluster-md-kmp-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:dlm-kmp-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:gfs2-kmp-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:kernel-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:ocfs2-kmp-default-4.12.14-122.225.1
Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:cluster-md-kmp-default-4.12.14-122.225.1
Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:dlm-kmp-default-4.12.14-122.225.1
Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:gfs2-kmp-default-4.12.14-122.225.1
skipping CVE-2023-52593 as CVE page is older than CVRF-CVE file.
skipping CVE-2023-52591 as CVE page is older than CVRF-CVE file.
skipping CVE-2023-52590 as CVE page is older than CVRF-CVE file.
skipping CVE-2023-52589 as CVE page is older than CVRF-CVE file.
skipping CVE-2023-52588 as CVE page is older than CVRF-CVE file.
skipping CVE-2023-52587 as CVE page is older than CVRF-CVE file.
skipping CVE-2023-52586 as CVE page is older than CVRF-CVE file.
skipping CVE-2023-52585 as CVE page is older than CVRF-CVE file.
skipping CVE-2023-52584 as CVE page is older than CVRF-CVE file.
skipping CVE-2023-52583 as CVE page is older than CVRF-CVE file.
skipping CVE-2023-52582 as CVE page is older than CVRF-CVE file.
skipping CVE-2023-52581 as CVE page is older than CVRF-CVE file.
skipping CVE-2023-52580 as CVE page is older than CVRF-CVE file.
skipping CVE-2023-52579 as CVE page is older than CVRF-CVE file.
skipping CVE-2023-52578 as CVE page is older than CVRF-CVE file.
skipping CVE-2023-52577 as CVE page is older than CVRF-CVE file.
skipping CVE-2023-52576 as CVE page is older than CVRF-CVE file.
skipping CVE-2023-52575 as CVE page is older than CVRF-CVE file.
skipping CVE-2023-52574 as CVE page is older than CVRF-CVE file.
skipping CVE-2023-52573 as CVE page is older than CVRF-CVE file.
skipping CVE-2023-52571 as CVE page is older than CVRF-CVE file.
skipping CVE-2023-52570 as CVE page is older than CVRF-CVE file.
skipping CVE-2023-52569 as CVE page is older than CVRF-CVE file.
skipping CVE-2023-52568 as CVE page is older than CVRF-CVE file.
skipping CVE-2023-52567 as CVE page is older than CVRF-CVE file.
skipping CVE-2023-52566 as CVE page is older than CVRF-CVE file.
skipping CVE-2023-52565 as CVE page is older than CVRF-CVE file.
skipping CVE-2023-52564 as CVE page is older than CVRF-CVE file.
skipping CVE-2023-52563 as CVE page is older than CVRF-CVE file.
skipping CVE-2023-52562 as CVE page is older than CVRF-CVE file.
skipping CVE-2023-52561 as CVE page is older than CVRF-CVE file.
skipping CVE-2023-52560 as CVE page is older than CVRF-CVE file.
skipping CVE-2023-52559 as CVE page is older than CVRF-CVE file.
skipping CVE-2023-52532 as CVE page is older than CVRF-CVE file.
skipping CVE-2023-52531 as CVE page is older than CVRF-CVE file.
skipping CVE-2023-52530 as CVE page is older than CVRF-CVE file.
skipping CVE-2023-52529 as CVE page is older than CVRF-CVE file.
skipping CVE-2023-52528 as CVE page is older than CVRF-CVE file.
no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2023-52524
skipping CVE-2023-52526 as CVE page is older than CVRF-CVE file.
skipping CVE-2023-52525 as CVE page is older than CVRF-CVE file.
skipping CVE-2023-52523 as CVE page is older than CVRF-CVE file.
skipping CVE-2023-52522 as CVE page is older than CVRF-CVE file.
skipping CVE-2023-52521 as CVE page is older than CVRF-CVE file.
skipping CVE-2023-52520 as CVE page is older than CVRF-CVE file.
skipping CVE-2023-52519 as CVE page is older than CVRF-CVE file.
skipping CVE-2023-52518 as CVE page is older than CVRF-CVE file.
skipping CVE-2023-52517 as CVE page is older than CVRF-CVE file.
skipping CVE-2023-52516 as CVE page is older than CVRF-CVE file.
skipping CVE-2023-52515 as CVE page is older than CVRF-CVE file.
no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2023-52502
skipping CVE-2023-52513 as CVE page is older than CVRF-CVE file.
skipping CVE-2023-52512 as CVE page is older than CVRF-CVE file.
skipping CVE-2023-52511 as CVE page is older than CVRF-CVE file.
skipping CVE-2023-52510 as CVE page is older than CVRF-CVE file.
skipping CVE-2023-52509 as CVE page is older than CVRF-CVE file.
skipping CVE-2023-52508 as CVE page is older than CVRF-CVE file.
skipping CVE-2023-52507 as CVE page is older than CVRF-CVE file.
skipping CVE-2023-52506 as CVE page is older than CVRF-CVE file.
skipping CVE-2023-52505 as CVE page is older than CVRF-CVE file.
skipping CVE-2023-52504 as CVE page is older than CVRF-CVE file.
skipping CVE-2023-52503 as CVE page is older than CVRF-CVE file.
--- /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2023-52502.xml 2024-10-17 01:28:16.169576000 +0200
+++ /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2023-52502.xml.new 2024-10-29 01:25:54.592920000 +0100
@@ -14,13 +14,13 @@
1
- 84
- 2024-10-16T23:28:15Z
+ 85
+ 2024-10-29T00:25:53Z
current
2024-03-05T00:10:21Z
- 2024-10-16T23:28:15Z
+ 2024-10-29T00:25:53Z
cve-database/bin/generate-cvrf-cve.pl
2020-12-27T01:00:00Z
@@ -2270,12 +2270,18 @@
kernel-livepatch-5_14_21-150400_24_103-default-5-150400.2.1
+
+ kernel-livepatch-5_14_21-150400_24_108-default-10-150400.9.8.1
+
kernel-livepatch-5_14_21-150400_24_108-default-9-150400.9.8.1
kernel-livepatch-5_14_21-150400_24_111-default-7-150400.9.6.1
+
+ kernel-livepatch-5_14_21-150400_24_111-default-8-150400.9.6.1
+
kernel-livepatch-5_14_21-150400_24_116-default-1-150400.9.5.1
@@ -2327,12 +2333,18 @@
kernel-livepatch-5_14_21-150500_13_30-rt-6-150500.2.1
+
+ kernel-livepatch-5_14_21-150500_13_35-rt-10-150500.11.8.1
+
kernel-livepatch-5_14_21-150500_13_35-rt-9-150500.11.8.1
kernel-livepatch-5_14_21-150500_13_38-rt-7-150500.11.6.1
+
+ kernel-livepatch-5_14_21-150500_13_38-rt-8-150500.11.6.1
+
kernel-livepatch-5_14_21-150500_13_47-rt-1-150500.11.3.1
@@ -2363,12 +2375,18 @@
kernel-livepatch-5_14_21-150500_55_44-default-6-150500.2.1
+
+ kernel-livepatch-5_14_21-150500_55_49-default-10-150500.11.8.1
+
kernel-livepatch-5_14_21-150500_55_49-default-9-150500.11.8.1
kernel-livepatch-5_14_21-150500_55_52-default-7-150500.11.6.1
+
+ kernel-livepatch-5_14_21-150500_55_52-default-8-150500.11.6.1
+
kernel-livepatch-5_14_21-150500_55_59-default-1-150500.11.7.1
@@ -5240,6 +5258,24 @@
kernel-rt-5.14.21-150500.13.47.1 as a component of openSUSE Leap Micro 5.5
+
+ kernel-livepatch-5_14_21-150400_24_108-default-10-150400.9.8.1 as a component of SUSE Linux Enterprise Live Patching 15 SP4
+
+
+ kernel-livepatch-5_14_21-150400_24_111-default-8-150400.9.6.1 as a component of SUSE Linux Enterprise Live Patching 15 SP4
+
+
+ kernel-livepatch-5_14_21-150500_13_35-rt-10-150500.11.8.1 as a component of SUSE Linux Enterprise Live Patching 15 SP5
+
+
+ kernel-livepatch-5_14_21-150500_13_38-rt-8-150500.11.6.1 as a component of SUSE Linux Enterprise Live Patching 15 SP5
+
+
+ kernel-livepatch-5_14_21-150500_55_49-default-10-150500.11.8.1 as a component of SUSE Linux Enterprise Live Patching 15 SP5
+
+
+ kernel-livepatch-5_14_21-150500_55_52-default-8-150500.11.6.1 as a component of SUSE Linux Enterprise Live Patching 15 SP5
+
kernel-default-livepatch as a component of SUSE Linux Enterprise Live Patching 15 SP6
@@ -6367,6 +6403,14 @@
openSUSE Leap Micro 5.5:kernel-default-base-5.14.21-150500.55.59.1.150500.6.25.7
openSUSE Leap Micro 5.5:kernel-rt-5.14.21-150500.13.47.1
+
+ SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_108-default-10-150400.9.8.1
+ SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_111-default-8-150400.9.6.1
+ SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_35-rt-10-150500.11.8.1
+ SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_38-rt-8-150500.11.6.1
+ SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_49-default-10-150500.11.8.1
+ SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_52-default-8-150500.11.6.1
+
SUSE Linux Enterprise Live Patching 15 SP6:kernel-default
SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch
skipping CVE-2023-52501 as CVE page is older than CVRF-CVE file.
skipping CVE-2023-52500 as CVE page is older than CVRF-CVE file.
skipping CVE-2023-52499 as CVE page is older than CVRF-CVE file.
skipping CVE-2023-52498 as CVE page is older than CVRF-CVE file.
skipping CVE-2023-52497 as CVE page is older than CVRF-CVE file.
skipping CVE-2023-52496 as CVE page is older than CVRF-CVE file.
skipping CVE-2023-52495 as CVE page is older than CVRF-CVE file.
skipping CVE-2023-52494 as CVE page is older than CVRF-CVE file.
skipping CVE-2023-52493 as CVE page is older than CVRF-CVE file.
skipping CVE-2023-52492 as CVE page is older than CVRF-CVE file.
skipping CVE-2023-52491 as CVE page is older than CVRF-CVE file.
skipping CVE-2023-52490 as CVE page is older than CVRF-CVE file.
skipping CVE-2023-52489 as CVE page is older than CVRF-CVE file.
skipping CVE-2023-52488 as CVE page is older than CVRF-CVE file.
skipping CVE-2023-52487 as CVE page is older than CVRF-CVE file.
skipping CVE-2023-52486 as CVE page is older than CVRF-CVE file.
skipping CVE-2023-52485 as CVE page is older than CVRF-CVE file.
skipping CVE-2023-52484 as CVE page is older than CVRF-CVE file.
skipping CVE-2023-52483 as CVE page is older than CVRF-CVE file.
skipping CVE-2023-52482 as CVE page is older than CVRF-CVE file.
skipping CVE-2023-52481 as CVE page is older than CVRF-CVE file.
skipping CVE-2023-52480 as CVE page is older than CVRF-CVE file.
skipping CVE-2023-52479 as CVE page is older than CVRF-CVE file.
skipping CVE-2023-52478 as CVE page is older than CVRF-CVE file.
skipping CVE-2023-52477 as CVE page is older than CVRF-CVE file.
skipping CVE-2023-52476 as CVE page is older than CVRF-CVE file.
skipping CVE-2023-52475 as CVE page is older than CVRF-CVE file.
skipping CVE-2023-52474 as CVE page is older than CVRF-CVE file.
skipping CVE-2023-52473 as CVE page is older than CVRF-CVE file.
skipping CVE-2023-52472 as CVE page is older than CVRF-CVE file.
skipping CVE-2023-52471 as CVE page is older than CVRF-CVE file.
skipping CVE-2023-52470 as CVE page is older than CVRF-CVE file.
skipping CVE-2023-52469 as CVE page is older than CVRF-CVE file.
skipping CVE-2023-52468 as CVE page is older than CVRF-CVE file.
skipping CVE-2023-52467 as CVE page is older than CVRF-CVE file.
skipping CVE-2023-52466 as CVE page is older than CVRF-CVE file.
skipping CVE-2023-52465 as CVE page is older than CVRF-CVE file.
skipping CVE-2023-52464 as CVE page is older than CVRF-CVE file.
skipping CVE-2023-52463 as CVE page is older than CVRF-CVE file.
skipping CVE-2023-52462 as CVE page is older than CVRF-CVE file.
skipping CVE-2023-52461 as CVE page is older than CVRF-CVE file.
skipping CVE-2023-52460 as CVE page is older than CVRF-CVE file.
skipping CVE-2023-52459 as CVE page is older than CVRF-CVE file.
skipping CVE-2023-52458 as CVE page is older than CVRF-CVE file.
skipping CVE-2023-52457 as CVE page is older than CVRF-CVE file.
skipping CVE-2023-52456 as CVE page is older than CVRF-CVE file.
skipping CVE-2023-52455 as CVE page is older than CVRF-CVE file.
skipping CVE-2023-52454 as CVE page is older than CVRF-CVE file.
skipping CVE-2023-52453 as CVE page is older than CVRF-CVE file.
skipping CVE-2023-52452 as CVE page is older than CVRF-CVE file.
skipping CVE-2023-52451 as CVE page is older than CVRF-CVE file.
skipping CVE-2023-52450 as CVE page is older than CVRF-CVE file.
skipping CVE-2023-52449 as CVE page is older than CVRF-CVE file.
skipping CVE-2023-52448 as CVE page is older than CVRF-CVE file.
skipping CVE-2023-52447 as CVE page is older than CVRF-CVE file.
skipping CVE-2023-52446 as CVE page is older than CVRF-CVE file.
skipping CVE-2023-52445 as CVE page is older than CVRF-CVE file.
skipping CVE-2023-52444 as CVE page is older than CVRF-CVE file.
skipping CVE-2023-52443 as CVE page is older than CVRF-CVE file.
skipping CVE-2023-52442 as CVE page is older than CVRF-CVE file.
skipping CVE-2023-52441 as CVE page is older than CVRF-CVE file.
skipping CVE-2023-52440 as CVE page is older than CVRF-CVE file.
skipping CVE-2023-52439 as CVE page is older than CVRF-CVE file.
skipping CVE-2023-52438 as CVE page is older than CVRF-CVE file.
skipping CVE-2023-52436 as CVE page is older than CVRF-CVE file.
--- /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2023-52435.xml 2024-10-16 01:38:19.503606000 +0200
+++ /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2023-52435.xml.new 2024-10-29 01:25:56.768743000 +0100
@@ -14,13 +14,13 @@
1
- 50
- 2024-10-15T23:38:18Z
+ 51
+ 2024-10-29T00:25:56Z
current
2024-02-22T00:10:02Z
- 2024-10-15T23:38:18Z
+ 2024-10-29T00:25:56Z
cve-database/bin/generate-cvrf-cve.pl
2020-12-27T01:00:00Z
@@ -239,6 +239,21 @@
Image SLES12-SP5-EC2-BYOS
+
+
+ Image SLES12-SP5-GCE-BYOS
+
+
+
+
+ Image SLES12-SP5-GCE-SAP-BYOS
+
+
+
+
+ Image SLES12-SP5-GCE-SAP-On-Demand
+
+
Image SLES12-SP5-SAP-Azure-LI-BYOS-Production
@@ -2260,6 +2275,39 @@
kernel-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-EC2-BYOS
+
+ kernel-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-BYOS
+
+
+ cluster-md-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ dlm-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ gfs2-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ kernel-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ ocfs2-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ cluster-md-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
+
+ dlm-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
+
+ gfs2-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
+
+ kernel-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
+
+ ocfs2-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
cluster-md-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-SAP-Azure-LI-BYOS-Production
@@ -4657,6 +4705,17 @@
Image SLES12-SP5-Azure-SAP-BYOS:kernel-default-4.12.14-122.225.1
Image SLES12-SP5-Azure-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.225.1
Image SLES12-SP5-EC2-BYOS:kernel-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-BYOS:kernel-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-BYOS:cluster-md-kmp-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-BYOS:dlm-kmp-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-BYOS:gfs2-kmp-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-BYOS:kernel-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:cluster-md-kmp-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:dlm-kmp-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:gfs2-kmp-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:kernel-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:ocfs2-kmp-default-4.12.14-122.225.1
Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:cluster-md-kmp-default-4.12.14-122.225.1
Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:dlm-kmp-default-4.12.14-122.225.1
Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:gfs2-kmp-default-4.12.14-122.225.1
no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2023-52425
skipping CVE-2023-52434 as CVE page is older than CVRF-CVE file.
skipping CVE-2023-52433 as CVE page is older than CVRF-CVE file.
skipping CVE-2023-52429 as CVE page is older than CVRF-CVE file.
skipping CVE-2023-52426 as CVE page is older than CVRF-CVE file.
--- /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2023-52425.xml 2024-10-27 01:19:41.266016000 +0200
+++ /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2023-52425.xml.new 2024-10-29 01:25:57.548223000 +0100
@@ -14,13 +14,13 @@
1
- 111
- 2024-10-26T23:19:40Z
+ 112
+ 2024-10-29T00:25:56Z
current
2024-02-06T00:09:50Z
- 2024-10-26T23:19:40Z
+ 2024-10-29T00:25:56Z
cve-database/bin/generate-cvrf-cve.pl
2020-12-27T01:00:00Z
@@ -2766,6 +2766,24 @@
python313-x86-64-v3-3.13.0~b3-1.1
+
+ python314-3.14.0~a1-1.1
+
+
+ python314-curses-3.14.0~a1-1.1
+
+
+ python314-dbm-3.14.0~a1-1.1
+
+
+ python314-idle-3.14.0~a1-1.1
+
+
+ python314-tk-3.14.0~a1-1.1
+
+
+ python314-x86-64-v3-3.14.0~a1-1.1
+
python36
@@ -3726,6 +3744,12 @@
python36-base-3.6.15-55.1 as a component of Image SLES12-SP5-EC2-SAP-On-Demand
+
+ expat-2.1.0-21.32.1 as a component of Image SLES12-SP5-GCE-BYOS
+
+
+ libexpat1-2.1.0-21.32.1 as a component of Image SLES12-SP5-GCE-BYOS
+
libpython2_7-1_0-2.7.18-33.32.1 as a component of Image SLES12-SP5-GCE-BYOS
@@ -3780,6 +3804,12 @@
python36-base-3.6.15-55.1 as a component of Image SLES12-SP5-GCE-On-Demand
+
+ expat-2.1.0-21.32.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ libexpat1-2.1.0-21.32.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
libpython2_7-1_0-2.7.18-33.32.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
@@ -3810,6 +3840,12 @@
python36-base-3.6.15-55.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+ expat-2.1.0-21.32.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
+
+ libexpat1-2.1.0-21.32.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
libpython2_7-1_0-2.7.18-33.32.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
@@ -9237,6 +9273,24 @@
python313-x86-64-v3-3.13.0~b3-1.1 as a component of openSUSE Tumbleweed
+
+ python314-3.14.0~a1-1.1 as a component of openSUSE Tumbleweed
+
+
+ python314-curses-3.14.0~a1-1.1 as a component of openSUSE Tumbleweed
+
+
+ python314-dbm-3.14.0~a1-1.1 as a component of openSUSE Tumbleweed
+
+
+ python314-idle-3.14.0~a1-1.1 as a component of openSUSE Tumbleweed
+
+
+ python314-tk-3.14.0~a1-1.1 as a component of openSUSE Tumbleweed
+
+
+ python314-x86-64-v3-3.14.0~a1-1.1 as a component of openSUSE Tumbleweed
+
python38-3.8.19-1.1 as a component of openSUSE Tumbleweed
@@ -10087,6 +10141,8 @@
Image SLES12-SP5-EC2-SAP-On-Demand:python3-base-3.4.10-25.127.1
Image SLES12-SP5-EC2-SAP-On-Demand:python3-curses-3.4.10-25.127.1
Image SLES12-SP5-EC2-SAP-On-Demand:python36-base-3.6.15-55.1
+ Image SLES12-SP5-GCE-BYOS:expat-2.1.0-21.32.1
+ Image SLES12-SP5-GCE-BYOS:libexpat1-2.1.0-21.32.1
Image SLES12-SP5-GCE-BYOS:libpython2_7-1_0-2.7.18-33.32.1
Image SLES12-SP5-GCE-BYOS:libpython3_4m1_0-3.4.10-25.127.1
Image SLES12-SP5-GCE-BYOS:libpython3_6m1_0-3.6.15-55.1
@@ -10105,6 +10161,8 @@
Image SLES12-SP5-GCE-On-Demand:python3-3.4.10-25.127.1
Image SLES12-SP5-GCE-On-Demand:python3-base-3.4.10-25.127.1
Image SLES12-SP5-GCE-On-Demand:python36-base-3.6.15-55.1
+ Image SLES12-SP5-GCE-SAP-BYOS:expat-2.1.0-21.32.1
+ Image SLES12-SP5-GCE-SAP-BYOS:libexpat1-2.1.0-21.32.1
Image SLES12-SP5-GCE-SAP-BYOS:libpython2_7-1_0-2.7.18-33.32.1
Image SLES12-SP5-GCE-SAP-BYOS:libpython3_4m1_0-3.4.10-25.127.1
Image SLES12-SP5-GCE-SAP-BYOS:libpython3_6m1_0-3.6.15-55.1
@@ -10115,6 +10173,8 @@
Image SLES12-SP5-GCE-SAP-BYOS:python3-base-3.4.10-25.127.1
Image SLES12-SP5-GCE-SAP-BYOS:python3-curses-3.4.10-25.127.1
Image SLES12-SP5-GCE-SAP-BYOS:python36-base-3.6.15-55.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:expat-2.1.0-21.32.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:libexpat1-2.1.0-21.32.1
Image SLES12-SP5-GCE-SAP-On-Demand:libpython2_7-1_0-2.7.18-33.32.1
Image SLES12-SP5-GCE-SAP-On-Demand:libpython3_4m1_0-3.4.10-25.127.1
Image SLES12-SP5-GCE-SAP-On-Demand:libpython3_6m1_0-3.6.15-55.1
@@ -11955,6 +12015,12 @@
openSUSE Tumbleweed:python313-idle-3.13.0~b3-1.1
openSUSE Tumbleweed:python313-tk-3.13.0~b3-1.1
openSUSE Tumbleweed:python313-x86-64-v3-3.13.0~b3-1.1
+ openSUSE Tumbleweed:python314-3.14.0~a1-1.1
+ openSUSE Tumbleweed:python314-curses-3.14.0~a1-1.1
+ openSUSE Tumbleweed:python314-dbm-3.14.0~a1-1.1
+ openSUSE Tumbleweed:python314-idle-3.14.0~a1-1.1
+ openSUSE Tumbleweed:python314-tk-3.14.0~a1-1.1
+ openSUSE Tumbleweed:python314-x86-64-v3-3.14.0~a1-1.1
openSUSE Tumbleweed:python38-3.8.19-1.1
openSUSE Tumbleweed:python38-curses-3.8.19-1.1
openSUSE Tumbleweed:python38-dbm-3.8.19-1.1
skipping CVE-2023-52424 as CVE page is older than CVRF-CVE file.
skipping CVE-2023-52356 as CVE page is older than CVRF-CVE file.
skipping CVE-2023-52355 as CVE page is older than CVRF-CVE file.
no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2023-52340
--- /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2023-52340.xml 2024-10-22 02:00:24.755583000 +0200
+++ /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2023-52340.xml.new 2024-10-29 01:25:59.577086000 +0100
@@ -14,13 +14,13 @@
1
- 84
- 2024-10-22T00:00:24Z
+ 85
+ 2024-10-29T00:25:58Z
current
2024-01-30T00:09:33Z
- 2024-10-22T00:00:24Z
+ 2024-10-29T00:25:58Z
cve-database/bin/generate-cvrf-cve.pl
2020-12-27T01:00:00Z
@@ -2308,6 +2308,9 @@
kernel-livepatch-5_14_21-150400_24_103-default-3-150400.2.1
+
+ kernel-livepatch-5_14_21-150400_24_108-default-10-150400.9.8.1
+
kernel-livepatch-5_14_21-150400_24_108-default-9-150400.9.8.1
@@ -2365,6 +2368,9 @@
kernel-livepatch-5_14_21-150500_13_30-rt-4-150500.2.1
+
+ kernel-livepatch-5_14_21-150500_13_35-rt-10-150500.11.8.1
+
kernel-livepatch-5_14_21-150500_13_35-rt-9-150500.11.8.1
@@ -2398,6 +2404,9 @@
kernel-livepatch-5_14_21-150500_55_44-default-4-150500.2.1
+
+ kernel-livepatch-5_14_21-150500_55_49-default-10-150500.11.8.1
+
kernel-livepatch-5_14_21-150500_55_49-default-9-150500.11.8.1
@@ -5452,6 +5461,15 @@
kernel-rt-5.14.21-150500.13.38.1 as a component of openSUSE Leap Micro 5.5
+
+ kernel-livepatch-5_14_21-150400_24_108-default-10-150400.9.8.1 as a component of SUSE Linux Enterprise Live Patching 15 SP4
+
+
+ kernel-livepatch-5_14_21-150500_13_35-rt-10-150500.11.8.1 as a component of SUSE Linux Enterprise Live Patching 15 SP5
+
+
+ kernel-livepatch-5_14_21-150500_55_49-default-10-150500.11.8.1 as a component of SUSE Linux Enterprise Live Patching 15 SP5
+
kernel-default as a component of SUSE CaaS Platform 4.0
@@ -6734,6 +6752,11 @@
openSUSE Leap Micro 5.5:kernel-default-base-5.14.21-150500.55.52.1.150500.6.23.1
openSUSE Leap Micro 5.5:kernel-rt-5.14.21-150500.13.38.1
+
+ SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_108-default-10-150400.9.8.1
+ SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_35-rt-10-150500.11.8.1
+ SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_49-default-10-150500.11.8.1
+
SUSE CaaS Platform 4.0:kernel-default
SUSE CaaS Platform 4.0:kernel-default-base
no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2023-52323
no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2023-52169
no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2023-52168
no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2023-52160
no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2023-51798
skipping CVE-2023-52071 as CVE page is older than CVRF-CVE file.
no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2023-51794
no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2023-51793
no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2023-51780
skipping CVE-2023-51782 as CVE page is older than CVRF-CVE file.
skipping CVE-2023-51781 as CVE page is older than CVRF-CVE file.
no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2023-51779
no cpe found for SUSE Package Hub 15 SP5 in CVE-2023-51766
skipping CVE-2023-51767 as CVE page is older than CVRF-CVE file.
no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2023-51764
no cpe found for SUSE Package Hub 15 SP5 in CVE-2023-51713
skipping CVE-2023-51714 as CVE page is older than CVRF-CVE file.
no cpe found for SUSE Package Hub 15 SP5 in CVE-2023-51448
skipping CVE-2023-51385 as CVE page is older than CVRF-CVE file.
skipping CVE-2023-51384 as CVE page is older than CVRF-CVE file.
skipping CVE-2023-51257 as CVE page is older than CVRF-CVE file.
no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2023-51043
no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2023-51042
no cpe found for SUSE Linux Enterprise Server 12 SP5 LTSS Extended Security in CVE-2023-50782
no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2023-50782
skipping CVE-2023-50868 as CVE page is older than CVRF-CVE file.
--- /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2023-50782.xml 2024-10-26 01:20:30.973028000 +0200
+++ /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2023-50782.xml.new 2024-10-29 01:26:19.214125000 +0100
@@ -14,13 +14,13 @@
1
- 15
- 2024-10-25T23:20:30Z
+ 16
+ 2024-10-29T00:26:18Z
current
2023-12-15T00:08:42Z
- 2024-10-25T23:20:30Z
+ 2024-10-29T00:26:18Z
cve-database/bin/generate-cvrf-cve.pl
2020-12-27T01:00:00Z
@@ -51,6 +51,21 @@
HPE Helion OpenStack 8
+
+
+ Image SLES12-SP5-GCE-BYOS
+
+
+
+
+ Image SLES12-SP5-GCE-SAP-BYOS
+
+
+
+
+ Image SLES12-SP5-GCE-SAP-On-Demand
+
+
SUSE CaaS Platform 4.0
@@ -579,6 +594,253 @@
openSUSE Tumbleweed
+
+
+ SLES 15 SP1 CHOST Images for Amazon EC2 suse-sles-15-sp1-chost-byos-v20210304-hvm-ssd-x86_64
+ SLES 15 SP1 CHOST Images for Amazon EC2 suse-sles-15-sp1-chost-byos-v20220127-hvm-ssd-x86_64
+ SLES 15 SP1 CHOST Images for Amazon EC2 suse-sles-15-sp1-chost-byos-v20220715-hvm-ssd-x86_64
+
+
+ SLES 15 SP2 CHOST Images for Amazon EC2 suse-sles-15-sp2-chost-byos-v20210610-hvm-ssd-x86_64
+ SLES 15 SP2 CHOST Images for Amazon EC2 suse-sles-15-sp2-chost-byos-v20210722-hvm-ssd-x86_64
+ SLES 15 SP2 CHOST Images for Amazon EC2 suse-sles-15-sp2-chost-byos-v20210913-hvm-ssd-x86_64
+ SLES 15 SP2 CHOST Images for Amazon EC2 suse-sles-15-sp2-chost-byos-v20211025-hvm-ssd-x86_64
+ SLES 15 SP2 CHOST Images for Amazon EC2 suse-sles-15-sp2-chost-byos-v20220126-hvm-ssd-x86_64
+ SLES 15 SP2 CHOST Images for Amazon EC2 suse-sles-15-sp2-chost-byos-v20220718-hvm-ssd-x86_64
+
+
+ SLES 15 SP3 CHOST Images for Amazon EC2 suse-sles-15-sp3-chost-byos-v20210729-hvm-ssd-x86_64
+ SLES 15 SP3 CHOST Images for Amazon EC2 suse-sles-15-sp3-chost-byos-v20210827-hvm-ssd-x86_64
+ SLES 15 SP3 CHOST Images for Amazon EC2 suse-sles-15-sp3-chost-byos-v20210927-hvm-ssd-x86_64
+ SLES 15 SP3 CHOST Images for Amazon EC2 suse-sles-15-sp3-chost-byos-v20211004-hvm-ssd-x86_64
+ SLES 15 SP3 CHOST Images for Amazon EC2 suse-sles-15-sp3-chost-byos-v20211101-hvm-ssd-x86_64
+ SLES 15 SP3 CHOST Images for Amazon EC2 suse-sles-15-sp3-chost-byos-v20211202-hvm-ssd-x86_64
+ SLES 15 SP3 CHOST Images for Amazon EC2 suse-sles-15-sp3-chost-byos-v20220103-hvm-ssd-x86_64
+ SLES 15 SP3 CHOST Images for Amazon EC2 suse-sles-15-sp3-chost-byos-v20220126-hvm-ssd-x86_64
+ SLES 15 SP3 CHOST Images for Amazon EC2 suse-sles-15-sp3-chost-byos-v20220222-hvm-ssd-x86_64
+ SLES 15 SP3 CHOST Images for Amazon EC2 suse-sles-15-sp3-chost-byos-v20220310-hvm-ssd-x86_64
+ SLES 15 SP3 CHOST Images for Amazon EC2 suse-sles-15-sp3-chost-byos-v20220411-hvm-ssd-x86_64
+ SLES 15 SP3 CHOST Images for Amazon EC2 suse-sles-15-sp3-chost-byos-v20220510-hvm-ssd-x86_64
+ SLES 15 SP3 CHOST Images for Amazon EC2 suse-sles-15-sp3-chost-byos-v20220608-hvm-ssd-x86_64
+ SLES 15 SP3 CHOST Images for Amazon EC2 suse-sles-15-sp3-chost-byos-v20220708-hvm-ssd-x86_64
+ SLES 15 SP3 CHOST Images for Amazon EC2 suse-sles-15-sp3-chost-byos-v20220718-hvm-ssd-x86_64
+ SLES 15 SP3 CHOST Images for Amazon EC2 suse-sles-15-sp3-chost-byos-v20220818-hvm-ssd-x86_64
+ SLES 15 SP3 CHOST Images for Amazon EC2 suse-sles-15-sp3-chost-byos-v20220916-hvm-ssd-x86_64
+ SLES 15 SP3 CHOST Images for Amazon EC2 suse-sles-15-sp3-chost-byos-v20220921-hvm-ssd-x86_64
+ SLES 15 SP3 CHOST Images for Amazon EC2 suse-sles-15-sp3-chost-byos-v20221019-hvm-ssd-x86_64
+ SLES 15 SP3 CHOST Images for Amazon EC2 suse-sles-15-sp3-chost-byos-v20221119-hvm-ssd-x86_64
+ SLES 15 SP3 CHOST Images for Amazon EC2 suse-sles-15-sp3-chost-byos-v20221215-hvm-ssd-x86_64
+ SLES 15 SP3 CHOST Images for Amazon EC2 suse-sles-15-sp3-chost-byos-v20230313-hvm-ssd-x86_64
+ SLES 15 SP3 CHOST Images for Amazon EC2 suse-sles-15-sp3-chost-byos-v20230613-hvm-ssd-x86_64
+ SLES 15 SP3 CHOST Images for Amazon EC2 suse-sles-15-sp3-chost-byos-v20240807-hvm-ssd-x86_64
+ SLES 15 SP3 CHOST Images for Amazon EC2 suse-sles-15-sp3-chost-byos-v20240912-hvm-ssd-x86_64
+
+
+ SLES 15 SP4 CHOST Images for Amazon EC2 suse-sles-15-sp4-chost-byos-v20220718-hvm-ssd-x86_64
+ SLES 15 SP4 CHOST Images for Amazon EC2 suse-sles-15-sp4-chost-byos-v20220721-hvm-ssd-x86_64
+ SLES 15 SP4 CHOST Images for Amazon EC2 suse-sles-15-sp4-chost-byos-v20220819-hvm-ssd-x86_64
+ SLES 15 SP4 CHOST Images for Amazon EC2 suse-sles-15-sp4-chost-byos-v20220916-hvm-ssd-x86_64
+ SLES 15 SP4 CHOST Images for Amazon EC2 suse-sles-15-sp4-chost-byos-v20220923-hvm-ssd-x86_64
+ SLES 15 SP4 CHOST Images for Amazon EC2 suse-sles-15-sp4-chost-byos-v20221018-hvm-ssd-x86_64
+ SLES 15 SP4 CHOST Images for Amazon EC2 suse-sles-15-sp4-chost-byos-v20221118-hvm-ssd-x86_64
+ SLES 15 SP4 CHOST Images for Amazon EC2 suse-sles-15-sp4-chost-byos-v20221215-hvm-ssd-x86_64
+ SLES 15 SP4 CHOST Images for Amazon EC2 suse-sles-15-sp4-chost-byos-v20230111-hvm-ssd-x86_64
+ SLES 15 SP4 CHOST Images for Amazon EC2 suse-sles-15-sp4-chost-byos-v20230210-hvm-ssd-x86_64
+ SLES 15 SP4 CHOST Images for Amazon EC2 suse-sles-15-sp4-chost-byos-v20230310-hvm-ssd-x86_64
+ SLES 15 SP4 CHOST Images for Amazon EC2 suse-sles-15-sp4-chost-byos-v20230410-hvm-ssd-x86_64
+ SLES 15 SP4 CHOST Images for Amazon EC2 suse-sles-15-sp4-chost-byos-v20230510-hvm-ssd-x86_64
+ SLES 15 SP4 CHOST Images for Amazon EC2 suse-sles-15-sp4-chost-byos-v20230606-hvm-ssd-x86_64
+ SLES 15 SP4 CHOST Images for Amazon EC2 suse-sles-15-sp4-chost-byos-v20230704-hvm-ssd-x86_64
+ SLES 15 SP4 CHOST Images for Amazon EC2 suse-sles-15-sp4-chost-byos-v20230803-hvm-ssd-x86_64
+ SLES 15 SP4 CHOST Images for Amazon EC2 suse-sles-15-sp4-chost-byos-v20230901-hvm-ssd-x86_64
+ SLES 15 SP4 CHOST Images for Amazon EC2 suse-sles-15-sp4-chost-byos-v20230928-hvm-ssd-x86_64
+ SLES 15 SP4 CHOST Images for Amazon EC2 suse-sles-15-sp4-chost-byos-v20231027-hvm-ssd-x86_64
+ SLES 15 SP4 CHOST Images for Amazon EC2 suse-sles-15-sp4-chost-byos-v20231127-hvm-ssd-x86_64
+ SLES 15 SP4 CHOST Images for Amazon EC2 suse-sles-15-sp4-chost-byos-v20231212-hvm-ssd-x86_64
+ SLES 15 SP4 CHOST Images for Amazon EC2 suse-sles-15-sp4-chost-byos-v20240312-hvm-ssd-x86_64
+ SLES 15 SP4 CHOST Images for Amazon EC2 suse-sles-15-sp4-chost-byos-v20240612-hvm-ssd-x86_64
+ SLES 15 SP4 CHOST Images for Amazon EC2 suse-sles-15-sp4-chost-byos-v20240809-hvm-ssd-x86_64
+ SLES 15 SP4 CHOST Images for Amazon EC2 suse-sles-15-sp4-chost-byos-v20240912-hvm-ssd-x86_64
+
+
+ SLES 15 SP1 CHOST Images for Google sles-15-sp1-chost-byos-v20210202
+ SLES 15 SP1 CHOST Images for Google sles-15-sp1-chost-byos-v20210304
+ SLES 15 SP1 CHOST Images for Google sles-15-sp1-chost-byos-v20220127
+ SLES 15 SP1 CHOST Images for Google sles-15-sp1-chost-byos-v20220715-x86-64
+
+
+ SLES 15 SP2 CHOST Images for Google sles-15-sp2-chost-byos-v20210202
+ SLES 15 SP2 CHOST Images for Google sles-15-sp2-chost-byos-v20210304
+ SLES 15 SP2 CHOST Images for Google sles-15-sp2-chost-byos-v20210405
+ SLES 15 SP2 CHOST Images for Google sles-15-sp2-chost-byos-v20210506
+ SLES 15 SP2 CHOST Images for Google sles-15-sp2-chost-byos-v20210610
+ SLES 15 SP2 CHOST Images for Google sles-15-sp2-chost-byos-v20210722
+ SLES 15 SP2 CHOST Images for Google sles-15-sp2-chost-byos-v20210913
+ SLES 15 SP2 CHOST Images for Google sles-15-sp2-chost-byos-v20211025
+ SLES 15 SP2 CHOST Images for Google sles-15-sp2-chost-byos-v20220126
+ SLES 15 SP2 CHOST Images for Google sles-15-sp2-chost-byos-v20220718-x86-64
+
+
+ SLES 15 SP3 CHOST Images for Google sles-15-sp3-chost-byos-v20210729
+ SLES 15 SP3 CHOST Images for Google sles-15-sp3-chost-byos-v20210827
+ SLES 15 SP3 CHOST Images for Google sles-15-sp3-chost-byos-v20210927
+ SLES 15 SP3 CHOST Images for Google sles-15-sp3-chost-byos-v20211004
+ SLES 15 SP3 CHOST Images for Google sles-15-sp3-chost-byos-v20211101
+ SLES 15 SP3 CHOST Images for Google sles-15-sp3-chost-byos-v20211202
+ SLES 15 SP3 CHOST Images for Google sles-15-sp3-chost-byos-v20220103
+ SLES 15 SP3 CHOST Images for Google sles-15-sp3-chost-byos-v20220126
+ SLES 15 SP3 CHOST Images for Google sles-15-sp3-chost-byos-v20220222
+ SLES 15 SP3 CHOST Images for Google sles-15-sp3-chost-byos-v20220310
+ SLES 15 SP3 CHOST Images for Google sles-15-sp3-chost-byos-v20220411-x86-64
+ SLES 15 SP3 CHOST Images for Google sles-15-sp3-chost-byos-v20220510-x86-64
+ SLES 15 SP3 CHOST Images for Google sles-15-sp3-chost-byos-v20220608-x86-64
+ SLES 15 SP3 CHOST Images for Google sles-15-sp3-chost-byos-v20220708-x86-64
+ SLES 15 SP3 CHOST Images for Google sles-15-sp3-chost-byos-v20220718-x86-64
+ SLES 15 SP3 CHOST Images for Google sles-15-sp3-chost-byos-v20220818-x86-64
+ SLES 15 SP3 CHOST Images for Google sles-15-sp3-chost-byos-v20220916-x86-64
+ SLES 15 SP3 CHOST Images for Google sles-15-sp3-chost-byos-v20221019-x86-64
+ SLES 15 SP3 CHOST Images for Google sles-15-sp3-chost-byos-v20221118-x86-64
+ SLES 15 SP3 CHOST Images for Google sles-15-sp3-chost-byos-v20221215-x86-64
+ SLES 15 SP3 CHOST Images for Google sles-15-sp3-chost-byos-v20230313-x86-64
+ SLES 15 SP3 CHOST Images for Google sles-15-sp3-chost-byos-v20230613-x86-64
+ SLES 15 SP3 CHOST Images for Google sles-15-sp3-chost-byos-v20240807-x86-64
+ SLES 15 SP3 CHOST Images for Google sles-15-sp3-chost-byos-v20240912-x86-64
+
+
+ SLES 15 SP4 CHOST Images for Google sles-15-sp4-chost-byos-v20220718-x86-64
+ SLES 15 SP4 CHOST Images for Google sles-15-sp4-chost-byos-v20220721-x86-64
+ SLES 15 SP4 CHOST Images for Google sles-15-sp4-chost-byos-v20220818-x86-64
+ SLES 15 SP4 CHOST Images for Google sles-15-sp4-chost-byos-v20220916-x86-64
+ SLES 15 SP4 CHOST Images for Google sles-15-sp4-chost-byos-v20221018-x86-64
+ SLES 15 SP4 CHOST Images for Google sles-15-sp4-chost-byos-v20221118-x86-64
+ SLES 15 SP4 CHOST Images for Google sles-15-sp4-chost-byos-v20221215-arm64
+ SLES 15 SP4 CHOST Images for Google sles-15-sp4-chost-byos-v20221215-x86-64
+ SLES 15 SP4 CHOST Images for Google sles-15-sp4-chost-byos-v20230111-arm64
+ SLES 15 SP4 CHOST Images for Google sles-15-sp4-chost-byos-v20230111-x86-64
+ SLES 15 SP4 CHOST Images for Google sles-15-sp4-chost-byos-v20230210-arm64
+ SLES 15 SP4 CHOST Images for Google sles-15-sp4-chost-byos-v20230210-x86-64
+ SLES 15 SP4 CHOST Images for Google sles-15-sp4-chost-byos-v20230310-arm64
+ SLES 15 SP4 CHOST Images for Google sles-15-sp4-chost-byos-v20230310-x86-64
+ SLES 15 SP4 CHOST Images for Google sles-15-sp4-chost-byos-v20230410-arm64
+ SLES 15 SP4 CHOST Images for Google sles-15-sp4-chost-byos-v20230410-x86-64
+ SLES 15 SP4 CHOST Images for Google sles-15-sp4-chost-byos-v20230510-arm64
+ SLES 15 SP4 CHOST Images for Google sles-15-sp4-chost-byos-v20230510-x86-64
+ SLES 15 SP4 CHOST Images for Google sles-15-sp4-chost-byos-v20230606-arm64
+ SLES 15 SP4 CHOST Images for Google sles-15-sp4-chost-byos-v20230606-x86-64
+ SLES 15 SP4 CHOST Images for Google sles-15-sp4-chost-byos-v20230704-arm64
+ SLES 15 SP4 CHOST Images for Google sles-15-sp4-chost-byos-v20230704-x86-64
+ SLES 15 SP4 CHOST Images for Google sles-15-sp4-chost-byos-v20230804-arm64
+ SLES 15 SP4 CHOST Images for Google sles-15-sp4-chost-byos-v20230804-x86-64
+ SLES 15 SP4 CHOST Images for Google sles-15-sp4-chost-byos-v20230901-arm64
+ SLES 15 SP4 CHOST Images for Google sles-15-sp4-chost-byos-v20230901-x86-64
+ SLES 15 SP4 CHOST Images for Google sles-15-sp4-chost-byos-v20230928-arm64
+ SLES 15 SP4 CHOST Images for Google sles-15-sp4-chost-byos-v20230928-x86-64
+ SLES 15 SP4 CHOST Images for Google sles-15-sp4-chost-byos-v20231027-arm64
+ SLES 15 SP4 CHOST Images for Google sles-15-sp4-chost-byos-v20231027-x86-64
+ SLES 15 SP4 CHOST Images for Google sles-15-sp4-chost-byos-v20231127-arm64
+ SLES 15 SP4 CHOST Images for Google sles-15-sp4-chost-byos-v20231127-x86-64
+ SLES 15 SP4 CHOST Images for Google sles-15-sp4-chost-byos-v20231212-arm64
+ SLES 15 SP4 CHOST Images for Google sles-15-sp4-chost-byos-v20231212-x86-64
+ SLES 15 SP4 CHOST Images for Google sles-15-sp4-chost-byos-v20240312-arm64
+ SLES 15 SP4 CHOST Images for Google sles-15-sp4-chost-byos-v20240312-x86-64
+ SLES 15 SP4 CHOST Images for Google sles-15-sp4-chost-byos-v20240612-arm64
+ SLES 15 SP4 CHOST Images for Google sles-15-sp4-chost-byos-v20240612-x86-64
+ SLES 15 SP4 CHOST Images for Google sles-15-sp4-chost-byos-v20240809-arm64
+ SLES 15 SP4 CHOST Images for Google sles-15-sp4-chost-byos-v20240809-x86-64
+ SLES 15 SP4 CHOST Images for Google sles-15-sp4-chost-byos-v20240912-arm64
+ SLES 15 SP4 CHOST Images for Google sles-15-sp4-chost-byos-v20240912-x86-64
+
+
+ SLES 15 SP1 CHOST Images for Microsoft Azure suse-sles-15-sp1-chost-byos-v20210202
+ SLES 15 SP1 CHOST Images for Microsoft Azure suse-sles-15-sp1-chost-byos-v20210304
+ SLES 15 SP1 CHOST Images for Microsoft Azure suse-sles-15-sp1-chost-byos-v20220127
+ SLES 15 SP1 CHOST Images for Microsoft Azure suse-sles-15-sp1-chost-byos-v20220715-x86_64
+
+
+ SLES 15 SP2 CHOST Images for Microsoft Azure suse-sles-15-sp2-chost-byos-v20210202
+ SLES 15 SP2 CHOST Images for Microsoft Azure suse-sles-15-sp2-chost-byos-v20210304
+ SLES 15 SP2 CHOST Images for Microsoft Azure suse-sles-15-sp2-chost-byos-v20210405
+ SLES 15 SP2 CHOST Images for Microsoft Azure suse-sles-15-sp2-chost-byos-v20210506
+ SLES 15 SP2 CHOST Images for Microsoft Azure suse-sles-15-sp2-chost-byos-v20210610
+ SLES 15 SP2 CHOST Images for Microsoft Azure suse-sles-15-sp2-chost-byos-v20210722
+ SLES 15 SP2 CHOST Images for Microsoft Azure suse-sles-15-sp2-chost-byos-v20210913
+ SLES 15 SP2 CHOST Images for Microsoft Azure suse-sles-15-sp2-chost-byos-v20211025
+ SLES 15 SP2 CHOST Images for Microsoft Azure suse-sles-15-sp2-chost-byos-v20220126
+ SLES 15 SP2 CHOST Images for Microsoft Azure suse-sles-15-sp2-chost-byos-v20220718-x86_64
+
+
+ SLES 15 SP3 CHOST Images for Microsoft Azure suse-sles-15-sp3-chost-byos-v20210729
+ SLES 15 SP3 CHOST Images for Microsoft Azure suse-sles-15-sp3-chost-byos-v20210827
+ SLES 15 SP3 CHOST Images for Microsoft Azure suse-sles-15-sp3-chost-byos-v20210927
+ SLES 15 SP3 CHOST Images for Microsoft Azure suse-sles-15-sp3-chost-byos-v20211004
+ SLES 15 SP3 CHOST Images for Microsoft Azure suse-sles-15-sp3-chost-byos-v20211101
+ SLES 15 SP3 CHOST Images for Microsoft Azure suse-sles-15-sp3-chost-byos-v20211202
+ SLES 15 SP3 CHOST Images for Microsoft Azure suse-sles-15-sp3-chost-byos-v20220103
+ SLES 15 SP3 CHOST Images for Microsoft Azure suse-sles-15-sp3-chost-byos-v20220126
+ SLES 15 SP3 CHOST Images for Microsoft Azure suse-sles-15-sp3-chost-byos-v20220222
+ SLES 15 SP3 CHOST Images for Microsoft Azure suse-sles-15-sp3-chost-byos-v20220310
+ SLES 15 SP3 CHOST Images for Microsoft Azure suse-sles-15-sp3-chost-byos-v20220411-x86_64
+ SLES 15 SP3 CHOST Images for Microsoft Azure suse-sles-15-sp3-chost-byos-v20220510-x86_64
+ SLES 15 SP3 CHOST Images for Microsoft Azure suse-sles-15-sp3-chost-byos-v20220609-x86_64
+ SLES 15 SP3 CHOST Images for Microsoft Azure suse-sles-15-sp3-chost-byos-v20220708-x86_64
+ SLES 15 SP3 CHOST Images for Microsoft Azure suse-sles-15-sp3-chost-byos-v20220718-x86_64
+ SLES 15 SP3 CHOST Images for Microsoft Azure suse-sles-15-sp3-chost-byos-v20220818-x86_64
+ SLES 15 SP3 CHOST Images for Microsoft Azure suse-sles-15-sp3-chost-byos-v20220916-x86_64
+ SLES 15 SP3 CHOST Images for Microsoft Azure suse-sles-15-sp3-chost-byos-v20220921-x86_64
+ SLES 15 SP3 CHOST Images for Microsoft Azure suse-sles-15-sp3-chost-byos-v20221019-x86_64
+ SLES 15 SP3 CHOST Images for Microsoft Azure suse-sles-15-sp3-chost-byos-v20221119-x86_64
+ SLES 15 SP3 CHOST Images for Microsoft Azure suse-sles-15-sp3-chost-byos-v20221215-x86_64
+ SLES 15 SP3 CHOST Images for Microsoft Azure suse-sles-15-sp3-chost-byos-v20230313-x86_64
+ SLES 15 SP3 CHOST Images for Microsoft Azure suse-sles-15-sp3-chost-byos-v20230613-x86_64
+ SLES 15 SP3 CHOST Images for Microsoft Azure suse-sles-15-sp3-chost-byos-v20240807-x86_64
+ SLES 15 SP3 CHOST Images for Microsoft Azure suse-sles-15-sp3-chost-byos-v20240912-x86_64
+
+
+ SLES 15 SP4 CHOST Images for Microsoft Azure suse-sles-15-sp4-chost-byos-v20220718-x86_64
+ SLES 15 SP4 CHOST Images for Microsoft Azure suse-sles-15-sp4-chost-byos-v20220721-x86_64
+ SLES 15 SP4 CHOST Images for Microsoft Azure suse-sles-15-sp4-chost-byos-v20220819-x86_64
+ SLES 15 SP4 CHOST Images for Microsoft Azure suse-sles-15-sp4-chost-byos-v20220916-x86_64
+ SLES 15 SP4 CHOST Images for Microsoft Azure suse-sles-15-sp4-chost-byos-v20220923-x86_64
+ SLES 15 SP4 CHOST Images for Microsoft Azure suse-sles-15-sp4-chost-byos-v20221018-x86_64
+ SLES 15 SP4 CHOST Images for Microsoft Azure suse-sles-15-sp4-chost-byos-v20221118-x86_64
+ SLES 15 SP4 CHOST Images for Microsoft Azure suse-sles-15-sp4-chost-byos-v20221215-arm64
+ SLES 15 SP4 CHOST Images for Microsoft Azure suse-sles-15-sp4-chost-byos-v20221215-x86_64
+ SLES 15 SP4 CHOST Images for Microsoft Azure suse-sles-15-sp4-chost-byos-v20230111-arm64
+ SLES 15 SP4 CHOST Images for Microsoft Azure suse-sles-15-sp4-chost-byos-v20230111-x86_64
+ SLES 15 SP4 CHOST Images for Microsoft Azure suse-sles-15-sp4-chost-byos-v20230210-arm64
+ SLES 15 SP4 CHOST Images for Microsoft Azure suse-sles-15-sp4-chost-byos-v20230210-x86_64
+ SLES 15 SP4 CHOST Images for Microsoft Azure suse-sles-15-sp4-chost-byos-v20230310-arm64
+ SLES 15 SP4 CHOST Images for Microsoft Azure suse-sles-15-sp4-chost-byos-v20230310-x86_64
+ SLES 15 SP4 CHOST Images for Microsoft Azure suse-sles-15-sp4-chost-byos-v20230410-arm64
+ SLES 15 SP4 CHOST Images for Microsoft Azure suse-sles-15-sp4-chost-byos-v20230410-x86_64
+ SLES 15 SP4 CHOST Images for Microsoft Azure suse-sles-15-sp4-chost-byos-v20230510-arm64
+ SLES 15 SP4 CHOST Images for Microsoft Azure suse-sles-15-sp4-chost-byos-v20230510-x86_64
+ SLES 15 SP4 CHOST Images for Microsoft Azure suse-sles-15-sp4-chost-byos-v20230606-arm64
+ SLES 15 SP4 CHOST Images for Microsoft Azure suse-sles-15-sp4-chost-byos-v20230606-x86_64
+ SLES 15 SP4 CHOST Images for Microsoft Azure suse-sles-15-sp4-chost-byos-v20230704-arm64
+ SLES 15 SP4 CHOST Images for Microsoft Azure suse-sles-15-sp4-chost-byos-v20230704-x86_64
+ SLES 15 SP4 CHOST Images for Microsoft Azure suse-sles-15-sp4-chost-byos-v20230803-arm64
+ SLES 15 SP4 CHOST Images for Microsoft Azure suse-sles-15-sp4-chost-byos-v20230803-x86_64
+ SLES 15 SP4 CHOST Images for Microsoft Azure suse-sles-15-sp4-chost-byos-v20230901-arm64
+ SLES 15 SP4 CHOST Images for Microsoft Azure suse-sles-15-sp4-chost-byos-v20230901-x86_64
+ SLES 15 SP4 CHOST Images for Microsoft Azure suse-sles-15-sp4-chost-byos-v20230928-arm64
+ SLES 15 SP4 CHOST Images for Microsoft Azure suse-sles-15-sp4-chost-byos-v20230928-x86_64
+ SLES 15 SP4 CHOST Images for Microsoft Azure suse-sles-15-sp4-chost-byos-v20231027-arm64
+ SLES 15 SP4 CHOST Images for Microsoft Azure suse-sles-15-sp4-chost-byos-v20231027-x86_64
+ SLES 15 SP4 CHOST Images for Microsoft Azure suse-sles-15-sp4-chost-byos-v20231127-arm64
+ SLES 15 SP4 CHOST Images for Microsoft Azure suse-sles-15-sp4-chost-byos-v20231127-x86_64
+ SLES 15 SP4 CHOST Images for Microsoft Azure suse-sles-15-sp4-chost-byos-v20231212-arm64
+ SLES 15 SP4 CHOST Images for Microsoft Azure suse-sles-15-sp4-chost-byos-v20231212-x86_64
+ SLES 15 SP4 CHOST Images for Microsoft Azure suse-sles-15-sp4-chost-byos-v20240312-arm64
+ SLES 15 SP4 CHOST Images for Microsoft Azure suse-sles-15-sp4-chost-byos-v20240312-x86_64
+ SLES 15 SP4 CHOST Images for Microsoft Azure suse-sles-15-sp4-chost-byos-v20240612-arm64
+ SLES 15 SP4 CHOST Images for Microsoft Azure suse-sles-15-sp4-chost-byos-v20240612-x86_64
+ SLES 15 SP4 CHOST Images for Microsoft Azure suse-sles-15-sp4-chost-byos-v20240809-arm64
+ SLES 15 SP4 CHOST Images for Microsoft Azure suse-sles-15-sp4-chost-byos-v20240809-x86_64
+ SLES 15 SP4 CHOST Images for Microsoft Azure suse-sles-15-sp4-chost-byos-v20240912-arm64
+ SLES 15 SP4 CHOST Images for Microsoft Azure suse-sles-15-sp4-chost-byos-v20240912-x86_64
+
+
compat-openssl098
@@ -900,6 +1162,15 @@
python311-cryptography
+
+ libopenssl1_1-1.1.1d-2.113.1 as a component of Image SLES12-SP5-GCE-BYOS
+
+
+ libopenssl1_1-1.1.1d-2.113.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ libopenssl1_1-1.1.1d-2.113.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
libopenssl1_1-1.1.1d-2.113.1 as a component of SUSE Linux Enterprise Server 12 SP5 LTSS Extended Security
@@ -3188,6 +3459,9 @@
CVE-2023-50782
+ Image SLES12-SP5-GCE-BYOS:libopenssl1_1-1.1.1d-2.113.1
+ Image SLES12-SP5-GCE-SAP-BYOS:libopenssl1_1-1.1.1d-2.113.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:libopenssl1_1-1.1.1d-2.113.1
SUSE Linux Enterprise Server 12 SP5 LTSS Extended Security:libopenssl1_1-1.1.1d-2.113.1
SUSE Linux Enterprise Server 12 SP5 LTSS Extended Security:libopenssl1_1-32bit-1.1.1d-2.113.1
SUSE Linux Enterprise Server 12 SP5 LTSS Extended Security:libopenssl1_1-hmac-1.1.1d-2.113.1
@@ -3595,6 +3869,229 @@
openSUSE Leap 15.6:python3-cryptography
openSUSE Leap 15.6:python311-cryptography
+
+ chost:amazon/suse-sles-15-sp1-chost-byos-v20210304-hvm-ssd-x86_64
+ chost:amazon/suse-sles-15-sp1-chost-byos-v20220127-hvm-ssd-x86_64
+ chost:amazon/suse-sles-15-sp1-chost-byos-v20220715-hvm-ssd-x86_64
+ chost:amazon/suse-sles-15-sp2-chost-byos-v20210610-hvm-ssd-x86_64
+ chost:amazon/suse-sles-15-sp2-chost-byos-v20210722-hvm-ssd-x86_64
+ chost:amazon/suse-sles-15-sp2-chost-byos-v20210913-hvm-ssd-x86_64
+ chost:amazon/suse-sles-15-sp2-chost-byos-v20211025-hvm-ssd-x86_64
+ chost:amazon/suse-sles-15-sp2-chost-byos-v20220126-hvm-ssd-x86_64
+ chost:amazon/suse-sles-15-sp2-chost-byos-v20220718-hvm-ssd-x86_64
+ chost:amazon/suse-sles-15-sp3-chost-byos-v20210729-hvm-ssd-x86_64
+ chost:amazon/suse-sles-15-sp3-chost-byos-v20210827-hvm-ssd-x86_64
+ chost:amazon/suse-sles-15-sp3-chost-byos-v20210927-hvm-ssd-x86_64
+ chost:amazon/suse-sles-15-sp3-chost-byos-v20211004-hvm-ssd-x86_64
+ chost:amazon/suse-sles-15-sp3-chost-byos-v20211101-hvm-ssd-x86_64
+ chost:amazon/suse-sles-15-sp3-chost-byos-v20211202-hvm-ssd-x86_64
+ chost:amazon/suse-sles-15-sp3-chost-byos-v20220103-hvm-ssd-x86_64
+ chost:amazon/suse-sles-15-sp3-chost-byos-v20220126-hvm-ssd-x86_64
+ chost:amazon/suse-sles-15-sp3-chost-byos-v20220222-hvm-ssd-x86_64
+ chost:amazon/suse-sles-15-sp3-chost-byos-v20220310-hvm-ssd-x86_64
+ chost:amazon/suse-sles-15-sp3-chost-byos-v20220411-hvm-ssd-x86_64
+ chost:amazon/suse-sles-15-sp3-chost-byos-v20220510-hvm-ssd-x86_64
+ chost:amazon/suse-sles-15-sp3-chost-byos-v20220608-hvm-ssd-x86_64
+ chost:amazon/suse-sles-15-sp3-chost-byos-v20220708-hvm-ssd-x86_64
+ chost:amazon/suse-sles-15-sp3-chost-byos-v20220718-hvm-ssd-x86_64
+ chost:amazon/suse-sles-15-sp3-chost-byos-v20220818-hvm-ssd-x86_64
+ chost:amazon/suse-sles-15-sp3-chost-byos-v20220916-hvm-ssd-x86_64
+ chost:amazon/suse-sles-15-sp3-chost-byos-v20220921-hvm-ssd-x86_64
+ chost:amazon/suse-sles-15-sp3-chost-byos-v20221019-hvm-ssd-x86_64
+ chost:amazon/suse-sles-15-sp3-chost-byos-v20221119-hvm-ssd-x86_64
+ chost:amazon/suse-sles-15-sp3-chost-byos-v20221215-hvm-ssd-x86_64
+ chost:amazon/suse-sles-15-sp3-chost-byos-v20230313-hvm-ssd-x86_64
+ chost:amazon/suse-sles-15-sp3-chost-byos-v20230613-hvm-ssd-x86_64
+ chost:amazon/suse-sles-15-sp3-chost-byos-v20240807-hvm-ssd-x86_64
+ chost:amazon/suse-sles-15-sp3-chost-byos-v20240912-hvm-ssd-x86_64
+ chost:amazon/suse-sles-15-sp4-chost-byos-v20220718-hvm-ssd-x86_64
+ chost:amazon/suse-sles-15-sp4-chost-byos-v20220721-hvm-ssd-x86_64
+ chost:amazon/suse-sles-15-sp4-chost-byos-v20220819-hvm-ssd-x86_64
+ chost:amazon/suse-sles-15-sp4-chost-byos-v20220916-hvm-ssd-x86_64
+ chost:amazon/suse-sles-15-sp4-chost-byos-v20220923-hvm-ssd-x86_64
+ chost:amazon/suse-sles-15-sp4-chost-byos-v20221018-hvm-ssd-x86_64
+ chost:amazon/suse-sles-15-sp4-chost-byos-v20221118-hvm-ssd-x86_64
+ chost:amazon/suse-sles-15-sp4-chost-byos-v20221215-hvm-ssd-x86_64
+ chost:amazon/suse-sles-15-sp4-chost-byos-v20230111-hvm-ssd-x86_64
+ chost:amazon/suse-sles-15-sp4-chost-byos-v20230210-hvm-ssd-x86_64
+ chost:amazon/suse-sles-15-sp4-chost-byos-v20230310-hvm-ssd-x86_64
+ chost:amazon/suse-sles-15-sp4-chost-byos-v20230410-hvm-ssd-x86_64
+ chost:amazon/suse-sles-15-sp4-chost-byos-v20230510-hvm-ssd-x86_64
+ chost:amazon/suse-sles-15-sp4-chost-byos-v20230606-hvm-ssd-x86_64
+ chost:amazon/suse-sles-15-sp4-chost-byos-v20230704-hvm-ssd-x86_64
+ chost:amazon/suse-sles-15-sp4-chost-byos-v20230803-hvm-ssd-x86_64
+ chost:amazon/suse-sles-15-sp4-chost-byos-v20230901-hvm-ssd-x86_64
+ chost:amazon/suse-sles-15-sp4-chost-byos-v20230928-hvm-ssd-x86_64
+ chost:amazon/suse-sles-15-sp4-chost-byos-v20231027-hvm-ssd-x86_64
+ chost:amazon/suse-sles-15-sp4-chost-byos-v20231127-hvm-ssd-x86_64
+ chost:amazon/suse-sles-15-sp4-chost-byos-v20231212-hvm-ssd-x86_64
+ chost:amazon/suse-sles-15-sp4-chost-byos-v20240312-hvm-ssd-x86_64
+ chost:amazon/suse-sles-15-sp4-chost-byos-v20240612-hvm-ssd-x86_64
+ chost:amazon/suse-sles-15-sp4-chost-byos-v20240809-hvm-ssd-x86_64
+ chost:amazon/suse-sles-15-sp4-chost-byos-v20240912-hvm-ssd-x86_64
+ chost:google/sles-15-sp1-chost-byos-v20210202
+ chost:google/sles-15-sp1-chost-byos-v20210304
+ chost:google/sles-15-sp1-chost-byos-v20220127
+ chost:google/sles-15-sp1-chost-byos-v20220715-x86-64
+ chost:google/sles-15-sp2-chost-byos-v20210202
+ chost:google/sles-15-sp2-chost-byos-v20210304
+ chost:google/sles-15-sp2-chost-byos-v20210405
+ chost:google/sles-15-sp2-chost-byos-v20210506
+ chost:google/sles-15-sp2-chost-byos-v20210610
+ chost:google/sles-15-sp2-chost-byos-v20210722
+ chost:google/sles-15-sp2-chost-byos-v20210913
+ chost:google/sles-15-sp2-chost-byos-v20211025
+ chost:google/sles-15-sp2-chost-byos-v20220126
+ chost:google/sles-15-sp2-chost-byos-v20220718-x86-64
+ chost:google/sles-15-sp3-chost-byos-v20210729
+ chost:google/sles-15-sp3-chost-byos-v20210827
+ chost:google/sles-15-sp3-chost-byos-v20210927
+ chost:google/sles-15-sp3-chost-byos-v20211004
+ chost:google/sles-15-sp3-chost-byos-v20211101
+ chost:google/sles-15-sp3-chost-byos-v20211202
+ chost:google/sles-15-sp3-chost-byos-v20220103
+ chost:google/sles-15-sp3-chost-byos-v20220126
+ chost:google/sles-15-sp3-chost-byos-v20220222
+ chost:google/sles-15-sp3-chost-byos-v20220310
+ chost:google/sles-15-sp3-chost-byos-v20220411-x86-64
+ chost:google/sles-15-sp3-chost-byos-v20220510-x86-64
+ chost:google/sles-15-sp3-chost-byos-v20220608-x86-64
+ chost:google/sles-15-sp3-chost-byos-v20220708-x86-64
+ chost:google/sles-15-sp3-chost-byos-v20220718-x86-64
+ chost:google/sles-15-sp3-chost-byos-v20220818-x86-64
+ chost:google/sles-15-sp3-chost-byos-v20220916-x86-64
+ chost:google/sles-15-sp3-chost-byos-v20221019-x86-64
+ chost:google/sles-15-sp3-chost-byos-v20221118-x86-64
+ chost:google/sles-15-sp3-chost-byos-v20221215-x86-64
+ chost:google/sles-15-sp3-chost-byos-v20230313-x86-64
+ chost:google/sles-15-sp3-chost-byos-v20230613-x86-64
+ chost:google/sles-15-sp3-chost-byos-v20240807-x86-64
+ chost:google/sles-15-sp3-chost-byos-v20240912-x86-64
+ chost:google/sles-15-sp4-chost-byos-v20220718-x86-64
+ chost:google/sles-15-sp4-chost-byos-v20220721-x86-64
+ chost:google/sles-15-sp4-chost-byos-v20220818-x86-64
+ chost:google/sles-15-sp4-chost-byos-v20220916-x86-64
+ chost:google/sles-15-sp4-chost-byos-v20221018-x86-64
+ chost:google/sles-15-sp4-chost-byos-v20221118-x86-64
+ chost:google/sles-15-sp4-chost-byos-v20221215-arm64
+ chost:google/sles-15-sp4-chost-byos-v20221215-x86-64
+ chost:google/sles-15-sp4-chost-byos-v20230111-arm64
+ chost:google/sles-15-sp4-chost-byos-v20230111-x86-64
+ chost:google/sles-15-sp4-chost-byos-v20230210-arm64
+ chost:google/sles-15-sp4-chost-byos-v20230210-x86-64
+ chost:google/sles-15-sp4-chost-byos-v20230310-arm64
+ chost:google/sles-15-sp4-chost-byos-v20230310-x86-64
+ chost:google/sles-15-sp4-chost-byos-v20230410-arm64
+ chost:google/sles-15-sp4-chost-byos-v20230410-x86-64
+ chost:google/sles-15-sp4-chost-byos-v20230510-arm64
+ chost:google/sles-15-sp4-chost-byos-v20230510-x86-64
+ chost:google/sles-15-sp4-chost-byos-v20230606-arm64
+ chost:google/sles-15-sp4-chost-byos-v20230606-x86-64
+ chost:google/sles-15-sp4-chost-byos-v20230704-arm64
+ chost:google/sles-15-sp4-chost-byos-v20230704-x86-64
+ chost:google/sles-15-sp4-chost-byos-v20230804-arm64
+ chost:google/sles-15-sp4-chost-byos-v20230804-x86-64
+ chost:google/sles-15-sp4-chost-byos-v20230901-arm64
+ chost:google/sles-15-sp4-chost-byos-v20230901-x86-64
+ chost:google/sles-15-sp4-chost-byos-v20230928-arm64
+ chost:google/sles-15-sp4-chost-byos-v20230928-x86-64
+ chost:google/sles-15-sp4-chost-byos-v20231027-arm64
+ chost:google/sles-15-sp4-chost-byos-v20231027-x86-64
+ chost:google/sles-15-sp4-chost-byos-v20231127-arm64
+ chost:google/sles-15-sp4-chost-byos-v20231127-x86-64
+ chost:google/sles-15-sp4-chost-byos-v20231212-arm64
+ chost:google/sles-15-sp4-chost-byos-v20231212-x86-64
+ chost:google/sles-15-sp4-chost-byos-v20240312-arm64
+ chost:google/sles-15-sp4-chost-byos-v20240312-x86-64
+ chost:google/sles-15-sp4-chost-byos-v20240612-arm64
+ chost:google/sles-15-sp4-chost-byos-v20240612-x86-64
+ chost:google/sles-15-sp4-chost-byos-v20240809-arm64
+ chost:google/sles-15-sp4-chost-byos-v20240809-x86-64
+ chost:google/sles-15-sp4-chost-byos-v20240912-arm64
+ chost:google/sles-15-sp4-chost-byos-v20240912-x86-64
+ chost:microsoft/suse-sles-15-sp1-chost-byos-v20210202
+ chost:microsoft/suse-sles-15-sp1-chost-byos-v20210304
+ chost:microsoft/suse-sles-15-sp1-chost-byos-v20220127
+ chost:microsoft/suse-sles-15-sp1-chost-byos-v20220715-x86_64
+ chost:microsoft/suse-sles-15-sp2-chost-byos-v20210202
+ chost:microsoft/suse-sles-15-sp2-chost-byos-v20210304
+ chost:microsoft/suse-sles-15-sp2-chost-byos-v20210405
+ chost:microsoft/suse-sles-15-sp2-chost-byos-v20210506
+ chost:microsoft/suse-sles-15-sp2-chost-byos-v20210610
+ chost:microsoft/suse-sles-15-sp2-chost-byos-v20210722
+ chost:microsoft/suse-sles-15-sp2-chost-byos-v20210913
+ chost:microsoft/suse-sles-15-sp2-chost-byos-v20211025
+ chost:microsoft/suse-sles-15-sp2-chost-byos-v20220126
+ chost:microsoft/suse-sles-15-sp2-chost-byos-v20220718-x86_64
+ chost:microsoft/suse-sles-15-sp3-chost-byos-v20210729
+ chost:microsoft/suse-sles-15-sp3-chost-byos-v20210827
+ chost:microsoft/suse-sles-15-sp3-chost-byos-v20210927
+ chost:microsoft/suse-sles-15-sp3-chost-byos-v20211004
+ chost:microsoft/suse-sles-15-sp3-chost-byos-v20211101
+ chost:microsoft/suse-sles-15-sp3-chost-byos-v20211202
+ chost:microsoft/suse-sles-15-sp3-chost-byos-v20220103
+ chost:microsoft/suse-sles-15-sp3-chost-byos-v20220126
+ chost:microsoft/suse-sles-15-sp3-chost-byos-v20220222
+ chost:microsoft/suse-sles-15-sp3-chost-byos-v20220310
+ chost:microsoft/suse-sles-15-sp3-chost-byos-v20220411-x86_64
+ chost:microsoft/suse-sles-15-sp3-chost-byos-v20220510-x86_64
+ chost:microsoft/suse-sles-15-sp3-chost-byos-v20220609-x86_64
+ chost:microsoft/suse-sles-15-sp3-chost-byos-v20220708-x86_64
+ chost:microsoft/suse-sles-15-sp3-chost-byos-v20220718-x86_64
+ chost:microsoft/suse-sles-15-sp3-chost-byos-v20220818-x86_64
+ chost:microsoft/suse-sles-15-sp3-chost-byos-v20220916-x86_64
+ chost:microsoft/suse-sles-15-sp3-chost-byos-v20220921-x86_64
+ chost:microsoft/suse-sles-15-sp3-chost-byos-v20221019-x86_64
+ chost:microsoft/suse-sles-15-sp3-chost-byos-v20221119-x86_64
+ chost:microsoft/suse-sles-15-sp3-chost-byos-v20221215-x86_64
+ chost:microsoft/suse-sles-15-sp3-chost-byos-v20230313-x86_64
+ chost:microsoft/suse-sles-15-sp3-chost-byos-v20230613-x86_64
+ chost:microsoft/suse-sles-15-sp3-chost-byos-v20240807-x86_64
+ chost:microsoft/suse-sles-15-sp3-chost-byos-v20240912-x86_64
+ chost:microsoft/suse-sles-15-sp4-chost-byos-v20220718-x86_64
+ chost:microsoft/suse-sles-15-sp4-chost-byos-v20220721-x86_64
+ chost:microsoft/suse-sles-15-sp4-chost-byos-v20220819-x86_64
+ chost:microsoft/suse-sles-15-sp4-chost-byos-v20220916-x86_64
+ chost:microsoft/suse-sles-15-sp4-chost-byos-v20220923-x86_64
+ chost:microsoft/suse-sles-15-sp4-chost-byos-v20221018-x86_64
+ chost:microsoft/suse-sles-15-sp4-chost-byos-v20221118-x86_64
+ chost:microsoft/suse-sles-15-sp4-chost-byos-v20221215-arm64
+ chost:microsoft/suse-sles-15-sp4-chost-byos-v20221215-x86_64
+ chost:microsoft/suse-sles-15-sp4-chost-byos-v20230111-arm64
+ chost:microsoft/suse-sles-15-sp4-chost-byos-v20230111-x86_64
+ chost:microsoft/suse-sles-15-sp4-chost-byos-v20230210-arm64
+ chost:microsoft/suse-sles-15-sp4-chost-byos-v20230210-x86_64
+ chost:microsoft/suse-sles-15-sp4-chost-byos-v20230310-arm64
+ chost:microsoft/suse-sles-15-sp4-chost-byos-v20230310-x86_64
+ chost:microsoft/suse-sles-15-sp4-chost-byos-v20230410-arm64
+ chost:microsoft/suse-sles-15-sp4-chost-byos-v20230410-x86_64
+ chost:microsoft/suse-sles-15-sp4-chost-byos-v20230510-arm64
+ chost:microsoft/suse-sles-15-sp4-chost-byos-v20230510-x86_64
+ chost:microsoft/suse-sles-15-sp4-chost-byos-v20230606-arm64
+ chost:microsoft/suse-sles-15-sp4-chost-byos-v20230606-x86_64
+ chost:microsoft/suse-sles-15-sp4-chost-byos-v20230704-arm64
+ chost:microsoft/suse-sles-15-sp4-chost-byos-v20230704-x86_64
+ chost:microsoft/suse-sles-15-sp4-chost-byos-v20230803-arm64
+ chost:microsoft/suse-sles-15-sp4-chost-byos-v20230803-x86_64
+ chost:microsoft/suse-sles-15-sp4-chost-byos-v20230901-arm64
+ chost:microsoft/suse-sles-15-sp4-chost-byos-v20230901-x86_64
+ chost:microsoft/suse-sles-15-sp4-chost-byos-v20230928-arm64
+ chost:microsoft/suse-sles-15-sp4-chost-byos-v20230928-x86_64
+ chost:microsoft/suse-sles-15-sp4-chost-byos-v20231027-arm64
+ chost:microsoft/suse-sles-15-sp4-chost-byos-v20231027-x86_64
+ chost:microsoft/suse-sles-15-sp4-chost-byos-v20231127-arm64
+ chost:microsoft/suse-sles-15-sp4-chost-byos-v20231127-x86_64
+ chost:microsoft/suse-sles-15-sp4-chost-byos-v20231212-arm64
+ chost:microsoft/suse-sles-15-sp4-chost-byos-v20231212-x86_64
+ chost:microsoft/suse-sles-15-sp4-chost-byos-v20240312-arm64
+ chost:microsoft/suse-sles-15-sp4-chost-byos-v20240312-x86_64
+ chost:microsoft/suse-sles-15-sp4-chost-byos-v20240612-arm64
+ chost:microsoft/suse-sles-15-sp4-chost-byos-v20240612-x86_64
+ chost:microsoft/suse-sles-15-sp4-chost-byos-v20240809-arm64
+ chost:microsoft/suse-sles-15-sp4-chost-byos-v20240809-x86_64
+ chost:microsoft/suse-sles-15-sp4-chost-byos-v20240912-arm64
+ chost:microsoft/suse-sles-15-sp4-chost-byos-v20240912-x86_64
+
skipping CVE-2023-50781 as CVE page is older than CVRF-CVE file.
no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2023-50711
no cpe found for SUSE Package Hub 15 SP5 in CVE-2023-50472
skipping CVE-2023-50495 as CVE page is older than CVRF-CVE file.
no cpe found for SUSE Package Hub 15 SP5 in CVE-2023-50471
no cpe found for SUSE Liberty Linux 7 LTSS in CVE-2023-50447
no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2023-50447
no cpe found for SUSE Package Hub 15 SP5 in CVE-2023-50447
no cpe found for SUSE Liberty Linux 7 LTSS in CVE-2023-50269
no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2023-50269
skipping CVE-2023-50431 as CVE page is older than CVRF-CVE file.
skipping CVE-2023-50387 as CVE page is older than CVRF-CVE file.
no cpe found for SUSE Package Hub 15 SP4 in CVE-2023-50255
no cpe found for SUSE Package Hub 15 SP5 in CVE-2023-50255
no cpe found for SUSE Package Hub 15 SP5 in CVE-2023-50250
skipping CVE-2023-50230 as CVE page is older than CVRF-CVE file.
skipping CVE-2023-50229 as CVE page is older than CVRF-CVE file.
skipping CVE-2023-50186 as CVE page is older than CVRF-CVE file.
no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2023-50010
no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2023-49994
no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2023-49993
no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2023-49992
no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2023-49991
no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2023-49990
no cpe found for SUSE Package Hub 15 SP5 in CVE-2023-49606
no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2023-49582
no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2023-49502
no cpe found for SUSE Package Hub 15 SP5 in CVE-2023-49295
no cpe found for SUSE Liberty Linux 7 LTSS in CVE-2023-49286
no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2023-49286
no cpe found for SUSE Liberty Linux 7 LTSS in CVE-2023-49285
no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2023-49285
no cpe found for SUSE Package Hub 15 SP4 in CVE-2023-49284
no cpe found for SUSE Package Hub 15 SP5 in CVE-2023-49284
skipping CVE-2023-49141 as CVE page is older than CVRF-CVE file.
no cpe found for SUSE Package Hub 15 SP5 in CVE-2023-49088
no cpe found for SUSE Package Hub 15 SP5 in CVE-2023-49086
no cpe found for SUSE Package Hub 15 SP5 in CVE-2023-49085
no cpe found for SUSE Package Hub 15 SP5 in CVE-2023-49084
skipping CVE-2023-49083 as CVE page is older than CVRF-CVE file.
no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2023-48795
no cpe found for SUSE Package Hub 15 SP4 in CVE-2023-48795
no cpe found for SUSE Package Hub 15 SP5 in CVE-2023-48795
no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2023-48706
skipping CVE-2023-48733 as CVE page is older than CVRF-CVE file.
CVE-2023-48368: no packages for SUSE Manager Proxy 4.3, but entry?
CVE-2023-48368: no packages for SUSE Linux Enterprise Module for Basesystem 15 SP5, but entry?
CVE-2023-48368: no packages for SUSE Manager Server 4.3, but entry?
CVE-2023-48368: no packages for SUSE Linux Enterprise Software Development Kit 12 SP5, but entry?
CVE-2023-48368: no packages for SUSE Linux Enterprise Workstation Extension 15 SP5, but entry?
CVE-2023-48368: no packages for SUSE Manager Retail Branch Server 4.3, but entry?
CVE-2023-48368: no packages for SUSE Linux Enterprise Module for Desktop Applications 15 SP6, but entry?
no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2023-48368
CVE-2023-48368: no packages for SUSE Linux Enterprise Module for Basesystem 15 SP5, but entry?
CVE-2023-48368: no packages for SUSE Linux Enterprise Module for Desktop Applications 15 SP6, but entry?
CVE-2023-48368: no packages for SUSE Linux Enterprise Software Development Kit 12 SP5, but entry?
CVE-2023-48368: no packages for SUSE Linux Enterprise Workstation Extension 15 SP5, but entry?
CVE-2023-48368: no packages for SUSE Manager Proxy 4.3, but entry?
CVE-2023-48368: no packages for SUSE Manager Retail Branch Server 4.3, but entry?
CVE-2023-48368: no packages for SUSE Manager Server 4.3, but entry?
CVE-2023-48368: no packages for SUSE Linux Enterprise Module for Basesystem 15 SP5, but entry?
CVE-2023-48368: no packages for SUSE Linux Enterprise Module for Desktop Applications 15 SP6, but entry?
CVE-2023-48368: no packages for SUSE Linux Enterprise Software Development Kit 12 SP5, but entry?
CVE-2023-48368: no packages for SUSE Linux Enterprise Workstation Extension 15 SP5, but entry?
CVE-2023-48368: no packages for SUSE Manager Proxy 4.3, but entry?
CVE-2023-48368: no packages for SUSE Manager Retail Branch Server 4.3, but entry?
CVE-2023-48368: no packages for SUSE Manager Server 4.3, but entry?
no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2023-48237
no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2023-48236
no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2023-48235
no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2023-48234
no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2023-48233
no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2023-48232
no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2023-48231
skipping CVE-2023-48161 as CVE page is older than CVRF-CVE file.
no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2023-47855
no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2023-47641
no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2023-47627
CVE-2023-47282: no packages for SUSE Linux Enterprise Module for Desktop Applications 15 SP6, but entry?
CVE-2023-47282: no packages for SUSE Manager Retail Branch Server 4.3, but entry?
CVE-2023-47282: no packages for SUSE Linux Enterprise Workstation Extension 15 SP5, but entry?
CVE-2023-47282: no packages for SUSE Linux Enterprise Software Development Kit 12 SP5, but entry?
CVE-2023-47282: no packages for SUSE Manager Server 4.3, but entry?
CVE-2023-47282: no packages for SUSE Linux Enterprise Module for Basesystem 15 SP5, but entry?
CVE-2023-47282: no packages for SUSE Manager Proxy 4.3, but entry?
no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2023-47282
CVE-2023-47282: no packages for SUSE Linux Enterprise Module for Basesystem 15 SP5, but entry?
CVE-2023-47282: no packages for SUSE Linux Enterprise Module for Desktop Applications 15 SP6, but entry?
CVE-2023-47282: no packages for SUSE Linux Enterprise Software Development Kit 12 SP5, but entry?
CVE-2023-47282: no packages for SUSE Linux Enterprise Workstation Extension 15 SP5, but entry?
CVE-2023-47282: no packages for SUSE Manager Proxy 4.3, but entry?
CVE-2023-47282: no packages for SUSE Manager Retail Branch Server 4.3, but entry?
CVE-2023-47282: no packages for SUSE Manager Server 4.3, but entry?
CVE-2023-47282: no packages for SUSE Linux Enterprise Module for Basesystem 15 SP5, but entry?
CVE-2023-47282: no packages for SUSE Linux Enterprise Module for Desktop Applications 15 SP6, but entry?
CVE-2023-47282: no packages for SUSE Linux Enterprise Software Development Kit 12 SP5, but entry?
CVE-2023-47282: no packages for SUSE Linux Enterprise Workstation Extension 15 SP5, but entry?
CVE-2023-47282: no packages for SUSE Manager Proxy 4.3, but entry?
CVE-2023-47282: no packages for SUSE Manager Retail Branch Server 4.3, but entry?
CVE-2023-47282: no packages for SUSE Manager Server 4.3, but entry?
no cpe found for SUSE Package Hub 15 SP5 in CVE-2023-47272
no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2023-47235
no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2023-47234
no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2023-47233
CVE-2023-47169: no packages for SUSE Manager Retail Branch Server 4.3, but entry?
CVE-2023-47169: no packages for SUSE Linux Enterprise Workstation Extension 15 SP5, but entry?
CVE-2023-47169: no packages for SUSE Linux Enterprise Module for Desktop Applications 15 SP6, but entry?
CVE-2023-47169: no packages for SUSE Linux Enterprise Module for Basesystem 15 SP5, but entry?
CVE-2023-47169: no packages for SUSE Linux Enterprise Software Development Kit 12 SP5, but entry?
CVE-2023-47169: no packages for SUSE Manager Server 4.3, but entry?
CVE-2023-47169: no packages for SUSE Manager Proxy 4.3, but entry?
no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2023-47169
CVE-2023-47169: no packages for SUSE Linux Enterprise Module for Basesystem 15 SP5, but entry?
CVE-2023-47169: no packages for SUSE Linux Enterprise Module for Desktop Applications 15 SP6, but entry?
CVE-2023-47169: no packages for SUSE Linux Enterprise Software Development Kit 12 SP5, but entry?
CVE-2023-47169: no packages for SUSE Linux Enterprise Workstation Extension 15 SP5, but entry?
CVE-2023-47169: no packages for SUSE Manager Proxy 4.3, but entry?
CVE-2023-47169: no packages for SUSE Manager Retail Branch Server 4.3, but entry?
CVE-2023-47169: no packages for SUSE Manager Server 4.3, but entry?
CVE-2023-47169: no packages for SUSE Linux Enterprise Module for Basesystem 15 SP5, but entry?
CVE-2023-47169: no packages for SUSE Linux Enterprise Module for Desktop Applications 15 SP6, but entry?
CVE-2023-47169: no packages for SUSE Linux Enterprise Software Development Kit 12 SP5, but entry?
CVE-2023-47169: no packages for SUSE Linux Enterprise Workstation Extension 15 SP5, but entry?
CVE-2023-47169: no packages for SUSE Manager Proxy 4.3, but entry?
CVE-2023-47169: no packages for SUSE Manager Retail Branch Server 4.3, but entry?
CVE-2023-47169: no packages for SUSE Manager Server 4.3, but entry?
skipping CVE-2023-47210 as CVE page is older than CVRF-CVE file.
no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2023-47108
skipping CVE-2023-47100 as CVE page is older than CVRF-CVE file.
skipping CVE-2023-47039 as CVE page is older than CVRF-CVE file.
skipping CVE-2023-47038 as CVE page is older than CVRF-CVE file.
skipping CVE-2023-46862 as CVE page is older than CVRF-CVE file.
no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2023-46848
skipping CVE-2023-46850 as CVE page is older than CVRF-CVE file.
skipping CVE-2023-46849 as CVE page is older than CVRF-CVE file.
no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2023-46847
no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2023-46846
no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2023-46839
skipping CVE-2023-46841 as CVE page is older than CVRF-CVE file.
skipping CVE-2023-46840 as CVE page is older than CVRF-CVE file.
no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2023-46836
skipping CVE-2023-46838 as CVE page is older than CVRF-CVE file.
no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2023-46835
no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2023-46809
skipping CVE-2023-46813 as CVE page is older than CVRF-CVE file.
no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2023-46737
skipping CVE-2023-46753 as CVE page is older than CVRF-CVE file.
skipping CVE-2023-46752 as CVE page is older than CVRF-CVE file.
skipping CVE-2023-46751 as CVE page is older than CVRF-CVE file.
no cpe found for SUSE Liberty Linux 7 LTSS in CVE-2023-46728
no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2023-46728
no cpe found for SUSE Liberty Linux 7 LTSS in CVE-2023-46724
no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2023-46724
skipping CVE-2023-46589 as CVE page is older than CVRF-CVE file.
skipping CVE-2023-46343 as CVE page is older than CVRF-CVE file.
no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2023-46316
no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2023-46246
no cpe found for SUSE Linux Enterprise Installer Updates 15 SP4 in CVE-2023-46228
no cpe found for SUSE Linux Enterprise Installer Updates 15 SP4 in CVE-2023-46228
no cpe found for SUSE Linux Enterprise Installer Updates 15 SP4 in CVE-2023-46228
no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2023-46228
no cpe found for SUSE Linux Enterprise Installer Updates 15 SP4 in CVE-2023-46228
no cpe found for SUSE Linux Enterprise Installer Updates 15 SP4 in CVE-2023-46228
no cpe found for SUSE Linux Enterprise Installer Updates 15 SP4 in CVE-2023-46228
no cpe found for SUSE Linux Enterprise Installer Updates 15 SP4 in CVE-2023-46228
no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2023-46137
skipping CVE-2023-46219 as CVE page is older than CVRF-CVE file.
skipping CVE-2023-46218 as CVE page is older than CVRF-CVE file.
skipping CVE-2023-46159 as CVE page is older than CVRF-CVE file.
no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2023-46136
no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2023-46122
no cpe found for SUSE Package Hub 15 SP5 in CVE-2023-46121
no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2023-46118
no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2023-46103
skipping CVE-2023-46051 as CVE page is older than CVRF-CVE file.
skipping CVE-2023-46049 as CVE page is older than CVRF-CVE file.
skipping CVE-2023-46048 as CVE page is older than CVRF-CVE file.
no cpe found for SUSE Package Hub 15 SP5 in CVE-2023-46009
skipping CVE-2023-45935 as CVE page is older than CVRF-CVE file.
skipping CVE-2023-45931 as CVE page is older than CVRF-CVE file.
skipping CVE-2023-45929 as CVE page is older than CVRF-CVE file.
skipping CVE-2023-45927 as CVE page is older than CVRF-CVE file.
skipping CVE-2023-45925 as CVE page is older than CVRF-CVE file.
no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2023-45922
--- /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2023-45922.xml 2024-10-20 01:36:35.068541000 +0200
+++ /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2023-45922.xml.new 2024-10-29 01:27:33.326195000 +0100
@@ -14,13 +14,13 @@
1
- 8
- 2024-10-19T23:36:34Z
+ 9
+ 2024-10-29T00:27:32Z
current
2024-03-28T00:13:31Z
- 2024-10-19T23:36:34Z
+ 2024-10-29T00:27:32Z
cve-database/bin/generate-cvrf-cve.pl
2020-12-27T01:00:00Z
@@ -54,6 +54,16 @@
+
+
+ Image SLES12-SP5-GCE-SAP-BYOS
+
+
+
+
+ Image SLES12-SP5-GCE-SAP-On-Demand
+
+
Image SLES15-SP4-SAP-Azure-LI-BYOS
@@ -334,6 +344,253 @@
openSUSE Leap Micro 5.5
+
+
+ SLES 15 SP1 CHOST Images for Amazon EC2 suse-sles-15-sp1-chost-byos-v20210304-hvm-ssd-x86_64
+ SLES 15 SP1 CHOST Images for Amazon EC2 suse-sles-15-sp1-chost-byos-v20220127-hvm-ssd-x86_64
+ SLES 15 SP1 CHOST Images for Amazon EC2 suse-sles-15-sp1-chost-byos-v20220715-hvm-ssd-x86_64
+
+
+ SLES 15 SP2 CHOST Images for Amazon EC2 suse-sles-15-sp2-chost-byos-v20210610-hvm-ssd-x86_64
+ SLES 15 SP2 CHOST Images for Amazon EC2 suse-sles-15-sp2-chost-byos-v20210722-hvm-ssd-x86_64
+ SLES 15 SP2 CHOST Images for Amazon EC2 suse-sles-15-sp2-chost-byos-v20210913-hvm-ssd-x86_64
+ SLES 15 SP2 CHOST Images for Amazon EC2 suse-sles-15-sp2-chost-byos-v20211025-hvm-ssd-x86_64
+ SLES 15 SP2 CHOST Images for Amazon EC2 suse-sles-15-sp2-chost-byos-v20220126-hvm-ssd-x86_64
+ SLES 15 SP2 CHOST Images for Amazon EC2 suse-sles-15-sp2-chost-byos-v20220718-hvm-ssd-x86_64
+
+
+ SLES 15 SP3 CHOST Images for Amazon EC2 suse-sles-15-sp3-chost-byos-v20210729-hvm-ssd-x86_64
+ SLES 15 SP3 CHOST Images for Amazon EC2 suse-sles-15-sp3-chost-byos-v20210827-hvm-ssd-x86_64
+ SLES 15 SP3 CHOST Images for Amazon EC2 suse-sles-15-sp3-chost-byos-v20210927-hvm-ssd-x86_64
+ SLES 15 SP3 CHOST Images for Amazon EC2 suse-sles-15-sp3-chost-byos-v20211004-hvm-ssd-x86_64
+ SLES 15 SP3 CHOST Images for Amazon EC2 suse-sles-15-sp3-chost-byos-v20211101-hvm-ssd-x86_64
+ SLES 15 SP3 CHOST Images for Amazon EC2 suse-sles-15-sp3-chost-byos-v20211202-hvm-ssd-x86_64
+ SLES 15 SP3 CHOST Images for Amazon EC2 suse-sles-15-sp3-chost-byos-v20220103-hvm-ssd-x86_64
+ SLES 15 SP3 CHOST Images for Amazon EC2 suse-sles-15-sp3-chost-byos-v20220126-hvm-ssd-x86_64
+ SLES 15 SP3 CHOST Images for Amazon EC2 suse-sles-15-sp3-chost-byos-v20220222-hvm-ssd-x86_64
+ SLES 15 SP3 CHOST Images for Amazon EC2 suse-sles-15-sp3-chost-byos-v20220310-hvm-ssd-x86_64
+ SLES 15 SP3 CHOST Images for Amazon EC2 suse-sles-15-sp3-chost-byos-v20220411-hvm-ssd-x86_64
+ SLES 15 SP3 CHOST Images for Amazon EC2 suse-sles-15-sp3-chost-byos-v20220510-hvm-ssd-x86_64
+ SLES 15 SP3 CHOST Images for Amazon EC2 suse-sles-15-sp3-chost-byos-v20220608-hvm-ssd-x86_64
+ SLES 15 SP3 CHOST Images for Amazon EC2 suse-sles-15-sp3-chost-byos-v20220708-hvm-ssd-x86_64
+ SLES 15 SP3 CHOST Images for Amazon EC2 suse-sles-15-sp3-chost-byos-v20220718-hvm-ssd-x86_64
+ SLES 15 SP3 CHOST Images for Amazon EC2 suse-sles-15-sp3-chost-byos-v20220818-hvm-ssd-x86_64
+ SLES 15 SP3 CHOST Images for Amazon EC2 suse-sles-15-sp3-chost-byos-v20220916-hvm-ssd-x86_64
+ SLES 15 SP3 CHOST Images for Amazon EC2 suse-sles-15-sp3-chost-byos-v20220921-hvm-ssd-x86_64
+ SLES 15 SP3 CHOST Images for Amazon EC2 suse-sles-15-sp3-chost-byos-v20221019-hvm-ssd-x86_64
+ SLES 15 SP3 CHOST Images for Amazon EC2 suse-sles-15-sp3-chost-byos-v20221119-hvm-ssd-x86_64
+ SLES 15 SP3 CHOST Images for Amazon EC2 suse-sles-15-sp3-chost-byos-v20221215-hvm-ssd-x86_64
+ SLES 15 SP3 CHOST Images for Amazon EC2 suse-sles-15-sp3-chost-byos-v20230313-hvm-ssd-x86_64
+ SLES 15 SP3 CHOST Images for Amazon EC2 suse-sles-15-sp3-chost-byos-v20230613-hvm-ssd-x86_64
+ SLES 15 SP3 CHOST Images for Amazon EC2 suse-sles-15-sp3-chost-byos-v20240807-hvm-ssd-x86_64
+ SLES 15 SP3 CHOST Images for Amazon EC2 suse-sles-15-sp3-chost-byos-v20240912-hvm-ssd-x86_64
+
+
+ SLES 15 SP4 CHOST Images for Amazon EC2 suse-sles-15-sp4-chost-byos-v20220718-hvm-ssd-x86_64
+ SLES 15 SP4 CHOST Images for Amazon EC2 suse-sles-15-sp4-chost-byos-v20220721-hvm-ssd-x86_64
+ SLES 15 SP4 CHOST Images for Amazon EC2 suse-sles-15-sp4-chost-byos-v20220819-hvm-ssd-x86_64
+ SLES 15 SP4 CHOST Images for Amazon EC2 suse-sles-15-sp4-chost-byos-v20220916-hvm-ssd-x86_64
+ SLES 15 SP4 CHOST Images for Amazon EC2 suse-sles-15-sp4-chost-byos-v20220923-hvm-ssd-x86_64
+ SLES 15 SP4 CHOST Images for Amazon EC2 suse-sles-15-sp4-chost-byos-v20221018-hvm-ssd-x86_64
+ SLES 15 SP4 CHOST Images for Amazon EC2 suse-sles-15-sp4-chost-byos-v20221118-hvm-ssd-x86_64
+ SLES 15 SP4 CHOST Images for Amazon EC2 suse-sles-15-sp4-chost-byos-v20221215-hvm-ssd-x86_64
+ SLES 15 SP4 CHOST Images for Amazon EC2 suse-sles-15-sp4-chost-byos-v20230111-hvm-ssd-x86_64
+ SLES 15 SP4 CHOST Images for Amazon EC2 suse-sles-15-sp4-chost-byos-v20230210-hvm-ssd-x86_64
+ SLES 15 SP4 CHOST Images for Amazon EC2 suse-sles-15-sp4-chost-byos-v20230310-hvm-ssd-x86_64
+ SLES 15 SP4 CHOST Images for Amazon EC2 suse-sles-15-sp4-chost-byos-v20230410-hvm-ssd-x86_64
+ SLES 15 SP4 CHOST Images for Amazon EC2 suse-sles-15-sp4-chost-byos-v20230510-hvm-ssd-x86_64
+ SLES 15 SP4 CHOST Images for Amazon EC2 suse-sles-15-sp4-chost-byos-v20230606-hvm-ssd-x86_64
+ SLES 15 SP4 CHOST Images for Amazon EC2 suse-sles-15-sp4-chost-byos-v20230704-hvm-ssd-x86_64
+ SLES 15 SP4 CHOST Images for Amazon EC2 suse-sles-15-sp4-chost-byos-v20230803-hvm-ssd-x86_64
+ SLES 15 SP4 CHOST Images for Amazon EC2 suse-sles-15-sp4-chost-byos-v20230901-hvm-ssd-x86_64
+ SLES 15 SP4 CHOST Images for Amazon EC2 suse-sles-15-sp4-chost-byos-v20230928-hvm-ssd-x86_64
+ SLES 15 SP4 CHOST Images for Amazon EC2 suse-sles-15-sp4-chost-byos-v20231027-hvm-ssd-x86_64
+ SLES 15 SP4 CHOST Images for Amazon EC2 suse-sles-15-sp4-chost-byos-v20231127-hvm-ssd-x86_64
+ SLES 15 SP4 CHOST Images for Amazon EC2 suse-sles-15-sp4-chost-byos-v20231212-hvm-ssd-x86_64
+ SLES 15 SP4 CHOST Images for Amazon EC2 suse-sles-15-sp4-chost-byos-v20240312-hvm-ssd-x86_64
+ SLES 15 SP4 CHOST Images for Amazon EC2 suse-sles-15-sp4-chost-byos-v20240612-hvm-ssd-x86_64
+ SLES 15 SP4 CHOST Images for Amazon EC2 suse-sles-15-sp4-chost-byos-v20240809-hvm-ssd-x86_64
+ SLES 15 SP4 CHOST Images for Amazon EC2 suse-sles-15-sp4-chost-byos-v20240912-hvm-ssd-x86_64
+
+
+ SLES 15 SP1 CHOST Images for Google sles-15-sp1-chost-byos-v20210202
+ SLES 15 SP1 CHOST Images for Google sles-15-sp1-chost-byos-v20210304
+ SLES 15 SP1 CHOST Images for Google sles-15-sp1-chost-byos-v20220127
+ SLES 15 SP1 CHOST Images for Google sles-15-sp1-chost-byos-v20220715-x86-64
+
+
+ SLES 15 SP2 CHOST Images for Google sles-15-sp2-chost-byos-v20210202
+ SLES 15 SP2 CHOST Images for Google sles-15-sp2-chost-byos-v20210304
+ SLES 15 SP2 CHOST Images for Google sles-15-sp2-chost-byos-v20210405
+ SLES 15 SP2 CHOST Images for Google sles-15-sp2-chost-byos-v20210506
+ SLES 15 SP2 CHOST Images for Google sles-15-sp2-chost-byos-v20210610
+ SLES 15 SP2 CHOST Images for Google sles-15-sp2-chost-byos-v20210722
+ SLES 15 SP2 CHOST Images for Google sles-15-sp2-chost-byos-v20210913
+ SLES 15 SP2 CHOST Images for Google sles-15-sp2-chost-byos-v20211025
+ SLES 15 SP2 CHOST Images for Google sles-15-sp2-chost-byos-v20220126
+ SLES 15 SP2 CHOST Images for Google sles-15-sp2-chost-byos-v20220718-x86-64
+
+
+ SLES 15 SP3 CHOST Images for Google sles-15-sp3-chost-byos-v20210729
+ SLES 15 SP3 CHOST Images for Google sles-15-sp3-chost-byos-v20210827
+ SLES 15 SP3 CHOST Images for Google sles-15-sp3-chost-byos-v20210927
+ SLES 15 SP3 CHOST Images for Google sles-15-sp3-chost-byos-v20211004
+ SLES 15 SP3 CHOST Images for Google sles-15-sp3-chost-byos-v20211101
+ SLES 15 SP3 CHOST Images for Google sles-15-sp3-chost-byos-v20211202
+ SLES 15 SP3 CHOST Images for Google sles-15-sp3-chost-byos-v20220103
+ SLES 15 SP3 CHOST Images for Google sles-15-sp3-chost-byos-v20220126
+ SLES 15 SP3 CHOST Images for Google sles-15-sp3-chost-byos-v20220222
+ SLES 15 SP3 CHOST Images for Google sles-15-sp3-chost-byos-v20220310
+ SLES 15 SP3 CHOST Images for Google sles-15-sp3-chost-byos-v20220411-x86-64
+ SLES 15 SP3 CHOST Images for Google sles-15-sp3-chost-byos-v20220510-x86-64
+ SLES 15 SP3 CHOST Images for Google sles-15-sp3-chost-byos-v20220608-x86-64
+ SLES 15 SP3 CHOST Images for Google sles-15-sp3-chost-byos-v20220708-x86-64
+ SLES 15 SP3 CHOST Images for Google sles-15-sp3-chost-byos-v20220718-x86-64
+ SLES 15 SP3 CHOST Images for Google sles-15-sp3-chost-byos-v20220818-x86-64
+ SLES 15 SP3 CHOST Images for Google sles-15-sp3-chost-byos-v20220916-x86-64
+ SLES 15 SP3 CHOST Images for Google sles-15-sp3-chost-byos-v20221019-x86-64
+ SLES 15 SP3 CHOST Images for Google sles-15-sp3-chost-byos-v20221118-x86-64
+ SLES 15 SP3 CHOST Images for Google sles-15-sp3-chost-byos-v20221215-x86-64
+ SLES 15 SP3 CHOST Images for Google sles-15-sp3-chost-byos-v20230313-x86-64
+ SLES 15 SP3 CHOST Images for Google sles-15-sp3-chost-byos-v20230613-x86-64
+ SLES 15 SP3 CHOST Images for Google sles-15-sp3-chost-byos-v20240807-x86-64
+ SLES 15 SP3 CHOST Images for Google sles-15-sp3-chost-byos-v20240912-x86-64
+
+
+ SLES 15 SP4 CHOST Images for Google sles-15-sp4-chost-byos-v20220718-x86-64
+ SLES 15 SP4 CHOST Images for Google sles-15-sp4-chost-byos-v20220721-x86-64
+ SLES 15 SP4 CHOST Images for Google sles-15-sp4-chost-byos-v20220818-x86-64
+ SLES 15 SP4 CHOST Images for Google sles-15-sp4-chost-byos-v20220916-x86-64
+ SLES 15 SP4 CHOST Images for Google sles-15-sp4-chost-byos-v20221018-x86-64
+ SLES 15 SP4 CHOST Images for Google sles-15-sp4-chost-byos-v20221118-x86-64
+ SLES 15 SP4 CHOST Images for Google sles-15-sp4-chost-byos-v20221215-arm64
+ SLES 15 SP4 CHOST Images for Google sles-15-sp4-chost-byos-v20221215-x86-64
+ SLES 15 SP4 CHOST Images for Google sles-15-sp4-chost-byos-v20230111-arm64
+ SLES 15 SP4 CHOST Images for Google sles-15-sp4-chost-byos-v20230111-x86-64
+ SLES 15 SP4 CHOST Images for Google sles-15-sp4-chost-byos-v20230210-arm64
+ SLES 15 SP4 CHOST Images for Google sles-15-sp4-chost-byos-v20230210-x86-64
+ SLES 15 SP4 CHOST Images for Google sles-15-sp4-chost-byos-v20230310-arm64
+ SLES 15 SP4 CHOST Images for Google sles-15-sp4-chost-byos-v20230310-x86-64
+ SLES 15 SP4 CHOST Images for Google sles-15-sp4-chost-byos-v20230410-arm64
+ SLES 15 SP4 CHOST Images for Google sles-15-sp4-chost-byos-v20230410-x86-64
+ SLES 15 SP4 CHOST Images for Google sles-15-sp4-chost-byos-v20230510-arm64
+ SLES 15 SP4 CHOST Images for Google sles-15-sp4-chost-byos-v20230510-x86-64
+ SLES 15 SP4 CHOST Images for Google sles-15-sp4-chost-byos-v20230606-arm64
+ SLES 15 SP4 CHOST Images for Google sles-15-sp4-chost-byos-v20230606-x86-64
+ SLES 15 SP4 CHOST Images for Google sles-15-sp4-chost-byos-v20230704-arm64
+ SLES 15 SP4 CHOST Images for Google sles-15-sp4-chost-byos-v20230704-x86-64
+ SLES 15 SP4 CHOST Images for Google sles-15-sp4-chost-byos-v20230804-arm64
+ SLES 15 SP4 CHOST Images for Google sles-15-sp4-chost-byos-v20230804-x86-64
+ SLES 15 SP4 CHOST Images for Google sles-15-sp4-chost-byos-v20230901-arm64
+ SLES 15 SP4 CHOST Images for Google sles-15-sp4-chost-byos-v20230901-x86-64
+ SLES 15 SP4 CHOST Images for Google sles-15-sp4-chost-byos-v20230928-arm64
+ SLES 15 SP4 CHOST Images for Google sles-15-sp4-chost-byos-v20230928-x86-64
+ SLES 15 SP4 CHOST Images for Google sles-15-sp4-chost-byos-v20231027-arm64
+ SLES 15 SP4 CHOST Images for Google sles-15-sp4-chost-byos-v20231027-x86-64
+ SLES 15 SP4 CHOST Images for Google sles-15-sp4-chost-byos-v20231127-arm64
+ SLES 15 SP4 CHOST Images for Google sles-15-sp4-chost-byos-v20231127-x86-64
+ SLES 15 SP4 CHOST Images for Google sles-15-sp4-chost-byos-v20231212-arm64
+ SLES 15 SP4 CHOST Images for Google sles-15-sp4-chost-byos-v20231212-x86-64
+ SLES 15 SP4 CHOST Images for Google sles-15-sp4-chost-byos-v20240312-arm64
+ SLES 15 SP4 CHOST Images for Google sles-15-sp4-chost-byos-v20240312-x86-64
+ SLES 15 SP4 CHOST Images for Google sles-15-sp4-chost-byos-v20240612-arm64
+ SLES 15 SP4 CHOST Images for Google sles-15-sp4-chost-byos-v20240612-x86-64
+ SLES 15 SP4 CHOST Images for Google sles-15-sp4-chost-byos-v20240809-arm64
+ SLES 15 SP4 CHOST Images for Google sles-15-sp4-chost-byos-v20240809-x86-64
+ SLES 15 SP4 CHOST Images for Google sles-15-sp4-chost-byos-v20240912-arm64
+ SLES 15 SP4 CHOST Images for Google sles-15-sp4-chost-byos-v20240912-x86-64
+
+
+ SLES 15 SP1 CHOST Images for Microsoft Azure suse-sles-15-sp1-chost-byos-v20210202
+ SLES 15 SP1 CHOST Images for Microsoft Azure suse-sles-15-sp1-chost-byos-v20210304
+ SLES 15 SP1 CHOST Images for Microsoft Azure suse-sles-15-sp1-chost-byos-v20220127
+ SLES 15 SP1 CHOST Images for Microsoft Azure suse-sles-15-sp1-chost-byos-v20220715-x86_64
+
+
+ SLES 15 SP2 CHOST Images for Microsoft Azure suse-sles-15-sp2-chost-byos-v20210202
+ SLES 15 SP2 CHOST Images for Microsoft Azure suse-sles-15-sp2-chost-byos-v20210304
+ SLES 15 SP2 CHOST Images for Microsoft Azure suse-sles-15-sp2-chost-byos-v20210405
+ SLES 15 SP2 CHOST Images for Microsoft Azure suse-sles-15-sp2-chost-byos-v20210506
+ SLES 15 SP2 CHOST Images for Microsoft Azure suse-sles-15-sp2-chost-byos-v20210610
+ SLES 15 SP2 CHOST Images for Microsoft Azure suse-sles-15-sp2-chost-byos-v20210722
+ SLES 15 SP2 CHOST Images for Microsoft Azure suse-sles-15-sp2-chost-byos-v20210913
+ SLES 15 SP2 CHOST Images for Microsoft Azure suse-sles-15-sp2-chost-byos-v20211025
+ SLES 15 SP2 CHOST Images for Microsoft Azure suse-sles-15-sp2-chost-byos-v20220126
+ SLES 15 SP2 CHOST Images for Microsoft Azure suse-sles-15-sp2-chost-byos-v20220718-x86_64
+
+
+ SLES 15 SP3 CHOST Images for Microsoft Azure suse-sles-15-sp3-chost-byos-v20210729
+ SLES 15 SP3 CHOST Images for Microsoft Azure suse-sles-15-sp3-chost-byos-v20210827
+ SLES 15 SP3 CHOST Images for Microsoft Azure suse-sles-15-sp3-chost-byos-v20210927
+ SLES 15 SP3 CHOST Images for Microsoft Azure suse-sles-15-sp3-chost-byos-v20211004
+ SLES 15 SP3 CHOST Images for Microsoft Azure suse-sles-15-sp3-chost-byos-v20211101
+ SLES 15 SP3 CHOST Images for Microsoft Azure suse-sles-15-sp3-chost-byos-v20211202
+ SLES 15 SP3 CHOST Images for Microsoft Azure suse-sles-15-sp3-chost-byos-v20220103
+ SLES 15 SP3 CHOST Images for Microsoft Azure suse-sles-15-sp3-chost-byos-v20220126
+ SLES 15 SP3 CHOST Images for Microsoft Azure suse-sles-15-sp3-chost-byos-v20220222
+ SLES 15 SP3 CHOST Images for Microsoft Azure suse-sles-15-sp3-chost-byos-v20220310
+ SLES 15 SP3 CHOST Images for Microsoft Azure suse-sles-15-sp3-chost-byos-v20220411-x86_64
+ SLES 15 SP3 CHOST Images for Microsoft Azure suse-sles-15-sp3-chost-byos-v20220510-x86_64
+ SLES 15 SP3 CHOST Images for Microsoft Azure suse-sles-15-sp3-chost-byos-v20220609-x86_64
+ SLES 15 SP3 CHOST Images for Microsoft Azure suse-sles-15-sp3-chost-byos-v20220708-x86_64
+ SLES 15 SP3 CHOST Images for Microsoft Azure suse-sles-15-sp3-chost-byos-v20220718-x86_64
+ SLES 15 SP3 CHOST Images for Microsoft Azure suse-sles-15-sp3-chost-byos-v20220818-x86_64
+ SLES 15 SP3 CHOST Images for Microsoft Azure suse-sles-15-sp3-chost-byos-v20220916-x86_64
+ SLES 15 SP3 CHOST Images for Microsoft Azure suse-sles-15-sp3-chost-byos-v20220921-x86_64
+ SLES 15 SP3 CHOST Images for Microsoft Azure suse-sles-15-sp3-chost-byos-v20221019-x86_64
+ SLES 15 SP3 CHOST Images for Microsoft Azure suse-sles-15-sp3-chost-byos-v20221119-x86_64
+ SLES 15 SP3 CHOST Images for Microsoft Azure suse-sles-15-sp3-chost-byos-v20221215-x86_64
+ SLES 15 SP3 CHOST Images for Microsoft Azure suse-sles-15-sp3-chost-byos-v20230313-x86_64
+ SLES 15 SP3 CHOST Images for Microsoft Azure suse-sles-15-sp3-chost-byos-v20230613-x86_64
+ SLES 15 SP3 CHOST Images for Microsoft Azure suse-sles-15-sp3-chost-byos-v20240807-x86_64
+ SLES 15 SP3 CHOST Images for Microsoft Azure suse-sles-15-sp3-chost-byos-v20240912-x86_64
+
+
+ SLES 15 SP4 CHOST Images for Microsoft Azure suse-sles-15-sp4-chost-byos-v20220718-x86_64
+ SLES 15 SP4 CHOST Images for Microsoft Azure suse-sles-15-sp4-chost-byos-v20220721-x86_64
+ SLES 15 SP4 CHOST Images for Microsoft Azure suse-sles-15-sp4-chost-byos-v20220819-x86_64
+ SLES 15 SP4 CHOST Images for Microsoft Azure suse-sles-15-sp4-chost-byos-v20220916-x86_64
+ SLES 15 SP4 CHOST Images for Microsoft Azure suse-sles-15-sp4-chost-byos-v20220923-x86_64
+ SLES 15 SP4 CHOST Images for Microsoft Azure suse-sles-15-sp4-chost-byos-v20221018-x86_64
+ SLES 15 SP4 CHOST Images for Microsoft Azure suse-sles-15-sp4-chost-byos-v20221118-x86_64
+ SLES 15 SP4 CHOST Images for Microsoft Azure suse-sles-15-sp4-chost-byos-v20221215-arm64
+ SLES 15 SP4 CHOST Images for Microsoft Azure suse-sles-15-sp4-chost-byos-v20221215-x86_64
+ SLES 15 SP4 CHOST Images for Microsoft Azure suse-sles-15-sp4-chost-byos-v20230111-arm64
+ SLES 15 SP4 CHOST Images for Microsoft Azure suse-sles-15-sp4-chost-byos-v20230111-x86_64
+ SLES 15 SP4 CHOST Images for Microsoft Azure suse-sles-15-sp4-chost-byos-v20230210-arm64
+ SLES 15 SP4 CHOST Images for Microsoft Azure suse-sles-15-sp4-chost-byos-v20230210-x86_64
+ SLES 15 SP4 CHOST Images for Microsoft Azure suse-sles-15-sp4-chost-byos-v20230310-arm64
+ SLES 15 SP4 CHOST Images for Microsoft Azure suse-sles-15-sp4-chost-byos-v20230310-x86_64
+ SLES 15 SP4 CHOST Images for Microsoft Azure suse-sles-15-sp4-chost-byos-v20230410-arm64
+ SLES 15 SP4 CHOST Images for Microsoft Azure suse-sles-15-sp4-chost-byos-v20230410-x86_64
+ SLES 15 SP4 CHOST Images for Microsoft Azure suse-sles-15-sp4-chost-byos-v20230510-arm64
+ SLES 15 SP4 CHOST Images for Microsoft Azure suse-sles-15-sp4-chost-byos-v20230510-x86_64
+ SLES 15 SP4 CHOST Images for Microsoft Azure suse-sles-15-sp4-chost-byos-v20230606-arm64
+ SLES 15 SP4 CHOST Images for Microsoft Azure suse-sles-15-sp4-chost-byos-v20230606-x86_64
+ SLES 15 SP4 CHOST Images for Microsoft Azure suse-sles-15-sp4-chost-byos-v20230704-arm64
+ SLES 15 SP4 CHOST Images for Microsoft Azure suse-sles-15-sp4-chost-byos-v20230704-x86_64
+ SLES 15 SP4 CHOST Images for Microsoft Azure suse-sles-15-sp4-chost-byos-v20230803-arm64
+ SLES 15 SP4 CHOST Images for Microsoft Azure suse-sles-15-sp4-chost-byos-v20230803-x86_64
+ SLES 15 SP4 CHOST Images for Microsoft Azure suse-sles-15-sp4-chost-byos-v20230901-arm64
+ SLES 15 SP4 CHOST Images for Microsoft Azure suse-sles-15-sp4-chost-byos-v20230901-x86_64
+ SLES 15 SP4 CHOST Images for Microsoft Azure suse-sles-15-sp4-chost-byos-v20230928-arm64
+ SLES 15 SP4 CHOST Images for Microsoft Azure suse-sles-15-sp4-chost-byos-v20230928-x86_64
+ SLES 15 SP4 CHOST Images for Microsoft Azure suse-sles-15-sp4-chost-byos-v20231027-arm64
+ SLES 15 SP4 CHOST Images for Microsoft Azure suse-sles-15-sp4-chost-byos-v20231027-x86_64
+ SLES 15 SP4 CHOST Images for Microsoft Azure suse-sles-15-sp4-chost-byos-v20231127-arm64
+ SLES 15 SP4 CHOST Images for Microsoft Azure suse-sles-15-sp4-chost-byos-v20231127-x86_64
+ SLES 15 SP4 CHOST Images for Microsoft Azure suse-sles-15-sp4-chost-byos-v20231212-arm64
+ SLES 15 SP4 CHOST Images for Microsoft Azure suse-sles-15-sp4-chost-byos-v20231212-x86_64
+ SLES 15 SP4 CHOST Images for Microsoft Azure suse-sles-15-sp4-chost-byos-v20240312-arm64
+ SLES 15 SP4 CHOST Images for Microsoft Azure suse-sles-15-sp4-chost-byos-v20240312-x86_64
+ SLES 15 SP4 CHOST Images for Microsoft Azure suse-sles-15-sp4-chost-byos-v20240612-arm64
+ SLES 15 SP4 CHOST Images for Microsoft Azure suse-sles-15-sp4-chost-byos-v20240612-x86_64
+ SLES 15 SP4 CHOST Images for Microsoft Azure suse-sles-15-sp4-chost-byos-v20240809-arm64
+ SLES 15 SP4 CHOST Images for Microsoft Azure suse-sles-15-sp4-chost-byos-v20240809-x86_64
+ SLES 15 SP4 CHOST Images for Microsoft Azure suse-sles-15-sp4-chost-byos-v20240912-arm64
+ SLES 15 SP4 CHOST Images for Microsoft Azure suse-sles-15-sp4-chost-byos-v20240912-x86_64
+
+
Mesa
@@ -1054,6 +1311,42 @@
libxatracker2-1.0.0-150600.83.3.1
+
+ Mesa-18.3.2-14.9.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ Mesa-dri-18.3.2-14.9.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ Mesa-libEGL1-18.3.2-14.9.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ Mesa-libGL1-18.3.2-14.9.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ Mesa-libglapi0-18.3.2-14.9.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ libgbm1-18.3.2-14.9.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ Mesa-18.3.2-14.9.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
+
+ Mesa-dri-18.3.2-14.9.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
+
+ Mesa-libEGL1-18.3.2-14.9.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
+
+ Mesa-libGL1-18.3.2-14.9.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
+
+ Mesa-libglapi0-18.3.2-14.9.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
+
+ libgbm1-18.3.2-14.9.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
libgbm1-21.2.4-150400.68.15.1 as a component of Image SLES15-SP4-SAP-Azure-LI-BYOS
@@ -2935,36 +3228,6 @@
Mesa as a component of SUSE Linux Enterprise Server for SAP Applications 12 SP5
-
- Mesa-32bit as a component of SUSE Linux Enterprise Server for SAP Applications 12 SP5
-
-
- Mesa-libEGL1 as a component of SUSE Linux Enterprise Server for SAP Applications 12 SP5
-
-
- Mesa-libEGL1-32bit as a component of SUSE Linux Enterprise Server for SAP Applications 12 SP5
-
-
- Mesa-libGL1 as a component of SUSE Linux Enterprise Server for SAP Applications 12 SP5
-
-
- Mesa-libGL1-32bit as a component of SUSE Linux Enterprise Server for SAP Applications 12 SP5
-
-
- Mesa-libGLESv2-2 as a component of SUSE Linux Enterprise Server for SAP Applications 12 SP5
-
-
- Mesa-libglapi0 as a component of SUSE Linux Enterprise Server for SAP Applications 12 SP5
-
-
- Mesa-libglapi0-32bit as a component of SUSE Linux Enterprise Server for SAP Applications 12 SP5
-
-
- libgbm1 as a component of SUSE Linux Enterprise Server for SAP Applications 12 SP5
-
-
- libgbm1-32bit as a component of SUSE Linux Enterprise Server for SAP Applications 12 SP5
-
Mesa as a component of SUSE Linux Enterprise Server for SAP Applications 15 SP2
@@ -3441,6 +3704,18 @@
CVE-2023-45922
+ Image SLES12-SP5-GCE-SAP-BYOS:Mesa-18.3.2-14.9.1
+ Image SLES12-SP5-GCE-SAP-BYOS:Mesa-dri-18.3.2-14.9.1
+ Image SLES12-SP5-GCE-SAP-BYOS:Mesa-libEGL1-18.3.2-14.9.1
+ Image SLES12-SP5-GCE-SAP-BYOS:Mesa-libGL1-18.3.2-14.9.1
+ Image SLES12-SP5-GCE-SAP-BYOS:Mesa-libglapi0-18.3.2-14.9.1
+ Image SLES12-SP5-GCE-SAP-BYOS:libgbm1-18.3.2-14.9.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:Mesa-18.3.2-14.9.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:Mesa-dri-18.3.2-14.9.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:Mesa-libEGL1-18.3.2-14.9.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:Mesa-libGL1-18.3.2-14.9.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:Mesa-libglapi0-18.3.2-14.9.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:libgbm1-18.3.2-14.9.1
Image SLES15-SP4-SAP-Azure-LI-BYOS:libgbm1-21.2.4-150400.68.15.1
Image SLES15-SP4-SAP-Azure-LI-BYOS-Production:libgbm1-21.2.4-150400.68.15.1
Image SLES15-SP4-SAP-Azure-VLI-BYOS:libgbm1-21.2.4-150400.68.15.1
@@ -3782,6 +4057,229 @@
openSUSE Leap Micro 5.5:Mesa-libglapi0-22.3.5-150500.77.5.1
openSUSE Leap Micro 5.5:libgbm1-22.3.5-150500.77.5.1
+
+ chost:amazon/suse-sles-15-sp1-chost-byos-v20210304-hvm-ssd-x86_64
+ chost:amazon/suse-sles-15-sp1-chost-byos-v20220127-hvm-ssd-x86_64
+ chost:amazon/suse-sles-15-sp1-chost-byos-v20220715-hvm-ssd-x86_64
+ chost:amazon/suse-sles-15-sp2-chost-byos-v20210610-hvm-ssd-x86_64
+ chost:amazon/suse-sles-15-sp2-chost-byos-v20210722-hvm-ssd-x86_64
+ chost:amazon/suse-sles-15-sp2-chost-byos-v20210913-hvm-ssd-x86_64
+ chost:amazon/suse-sles-15-sp2-chost-byos-v20211025-hvm-ssd-x86_64
+ chost:amazon/suse-sles-15-sp2-chost-byos-v20220126-hvm-ssd-x86_64
+ chost:amazon/suse-sles-15-sp2-chost-byos-v20220718-hvm-ssd-x86_64
+ chost:amazon/suse-sles-15-sp3-chost-byos-v20210729-hvm-ssd-x86_64
+ chost:amazon/suse-sles-15-sp3-chost-byos-v20210827-hvm-ssd-x86_64
+ chost:amazon/suse-sles-15-sp3-chost-byos-v20210927-hvm-ssd-x86_64
+ chost:amazon/suse-sles-15-sp3-chost-byos-v20211004-hvm-ssd-x86_64
+ chost:amazon/suse-sles-15-sp3-chost-byos-v20211101-hvm-ssd-x86_64
+ chost:amazon/suse-sles-15-sp3-chost-byos-v20211202-hvm-ssd-x86_64
+ chost:amazon/suse-sles-15-sp3-chost-byos-v20220103-hvm-ssd-x86_64
+ chost:amazon/suse-sles-15-sp3-chost-byos-v20220126-hvm-ssd-x86_64
+ chost:amazon/suse-sles-15-sp3-chost-byos-v20220222-hvm-ssd-x86_64
+ chost:amazon/suse-sles-15-sp3-chost-byos-v20220310-hvm-ssd-x86_64
+ chost:amazon/suse-sles-15-sp3-chost-byos-v20220411-hvm-ssd-x86_64
+ chost:amazon/suse-sles-15-sp3-chost-byos-v20220510-hvm-ssd-x86_64
+ chost:amazon/suse-sles-15-sp3-chost-byos-v20220608-hvm-ssd-x86_64
+ chost:amazon/suse-sles-15-sp3-chost-byos-v20220708-hvm-ssd-x86_64
+ chost:amazon/suse-sles-15-sp3-chost-byos-v20220718-hvm-ssd-x86_64
+ chost:amazon/suse-sles-15-sp3-chost-byos-v20220818-hvm-ssd-x86_64
+ chost:amazon/suse-sles-15-sp3-chost-byos-v20220916-hvm-ssd-x86_64
+ chost:amazon/suse-sles-15-sp3-chost-byos-v20220921-hvm-ssd-x86_64
+ chost:amazon/suse-sles-15-sp3-chost-byos-v20221019-hvm-ssd-x86_64
+ chost:amazon/suse-sles-15-sp3-chost-byos-v20221119-hvm-ssd-x86_64
+ chost:amazon/suse-sles-15-sp3-chost-byos-v20221215-hvm-ssd-x86_64
+ chost:amazon/suse-sles-15-sp3-chost-byos-v20230313-hvm-ssd-x86_64
+ chost:amazon/suse-sles-15-sp3-chost-byos-v20230613-hvm-ssd-x86_64
+ chost:amazon/suse-sles-15-sp3-chost-byos-v20240807-hvm-ssd-x86_64
+ chost:amazon/suse-sles-15-sp3-chost-byos-v20240912-hvm-ssd-x86_64
+ chost:amazon/suse-sles-15-sp4-chost-byos-v20220718-hvm-ssd-x86_64
+ chost:amazon/suse-sles-15-sp4-chost-byos-v20220721-hvm-ssd-x86_64
+ chost:amazon/suse-sles-15-sp4-chost-byos-v20220819-hvm-ssd-x86_64
+ chost:amazon/suse-sles-15-sp4-chost-byos-v20220916-hvm-ssd-x86_64
+ chost:amazon/suse-sles-15-sp4-chost-byos-v20220923-hvm-ssd-x86_64
+ chost:amazon/suse-sles-15-sp4-chost-byos-v20221018-hvm-ssd-x86_64
+ chost:amazon/suse-sles-15-sp4-chost-byos-v20221118-hvm-ssd-x86_64
+ chost:amazon/suse-sles-15-sp4-chost-byos-v20221215-hvm-ssd-x86_64
+ chost:amazon/suse-sles-15-sp4-chost-byos-v20230111-hvm-ssd-x86_64
+ chost:amazon/suse-sles-15-sp4-chost-byos-v20230210-hvm-ssd-x86_64
+ chost:amazon/suse-sles-15-sp4-chost-byos-v20230310-hvm-ssd-x86_64
+ chost:amazon/suse-sles-15-sp4-chost-byos-v20230410-hvm-ssd-x86_64
+ chost:amazon/suse-sles-15-sp4-chost-byos-v20230510-hvm-ssd-x86_64
+ chost:amazon/suse-sles-15-sp4-chost-byos-v20230606-hvm-ssd-x86_64
+ chost:amazon/suse-sles-15-sp4-chost-byos-v20230704-hvm-ssd-x86_64
+ chost:amazon/suse-sles-15-sp4-chost-byos-v20230803-hvm-ssd-x86_64
+ chost:amazon/suse-sles-15-sp4-chost-byos-v20230901-hvm-ssd-x86_64
+ chost:amazon/suse-sles-15-sp4-chost-byos-v20230928-hvm-ssd-x86_64
+ chost:amazon/suse-sles-15-sp4-chost-byos-v20231027-hvm-ssd-x86_64
+ chost:amazon/suse-sles-15-sp4-chost-byos-v20231127-hvm-ssd-x86_64
+ chost:amazon/suse-sles-15-sp4-chost-byos-v20231212-hvm-ssd-x86_64
+ chost:amazon/suse-sles-15-sp4-chost-byos-v20240312-hvm-ssd-x86_64
+ chost:amazon/suse-sles-15-sp4-chost-byos-v20240612-hvm-ssd-x86_64
+ chost:amazon/suse-sles-15-sp4-chost-byos-v20240809-hvm-ssd-x86_64
+ chost:amazon/suse-sles-15-sp4-chost-byos-v20240912-hvm-ssd-x86_64
+ chost:google/sles-15-sp1-chost-byos-v20210202
+ chost:google/sles-15-sp1-chost-byos-v20210304
+ chost:google/sles-15-sp1-chost-byos-v20220127
+ chost:google/sles-15-sp1-chost-byos-v20220715-x86-64
+ chost:google/sles-15-sp2-chost-byos-v20210202
+ chost:google/sles-15-sp2-chost-byos-v20210304
+ chost:google/sles-15-sp2-chost-byos-v20210405
+ chost:google/sles-15-sp2-chost-byos-v20210506
+ chost:google/sles-15-sp2-chost-byos-v20210610
+ chost:google/sles-15-sp2-chost-byos-v20210722
+ chost:google/sles-15-sp2-chost-byos-v20210913
+ chost:google/sles-15-sp2-chost-byos-v20211025
+ chost:google/sles-15-sp2-chost-byos-v20220126
+ chost:google/sles-15-sp2-chost-byos-v20220718-x86-64
+ chost:google/sles-15-sp3-chost-byos-v20210729
+ chost:google/sles-15-sp3-chost-byos-v20210827
+ chost:google/sles-15-sp3-chost-byos-v20210927
+ chost:google/sles-15-sp3-chost-byos-v20211004
+ chost:google/sles-15-sp3-chost-byos-v20211101
+ chost:google/sles-15-sp3-chost-byos-v20211202
+ chost:google/sles-15-sp3-chost-byos-v20220103
+ chost:google/sles-15-sp3-chost-byos-v20220126
+ chost:google/sles-15-sp3-chost-byos-v20220222
+ chost:google/sles-15-sp3-chost-byos-v20220310
+ chost:google/sles-15-sp3-chost-byos-v20220411-x86-64
+ chost:google/sles-15-sp3-chost-byos-v20220510-x86-64
+ chost:google/sles-15-sp3-chost-byos-v20220608-x86-64
+ chost:google/sles-15-sp3-chost-byos-v20220708-x86-64
+ chost:google/sles-15-sp3-chost-byos-v20220718-x86-64
+ chost:google/sles-15-sp3-chost-byos-v20220818-x86-64
+ chost:google/sles-15-sp3-chost-byos-v20220916-x86-64
+ chost:google/sles-15-sp3-chost-byos-v20221019-x86-64
+ chost:google/sles-15-sp3-chost-byos-v20221118-x86-64
+ chost:google/sles-15-sp3-chost-byos-v20221215-x86-64
+ chost:google/sles-15-sp3-chost-byos-v20230313-x86-64
+ chost:google/sles-15-sp3-chost-byos-v20230613-x86-64
+ chost:google/sles-15-sp3-chost-byos-v20240807-x86-64
+ chost:google/sles-15-sp3-chost-byos-v20240912-x86-64
+ chost:google/sles-15-sp4-chost-byos-v20220718-x86-64
+ chost:google/sles-15-sp4-chost-byos-v20220721-x86-64
+ chost:google/sles-15-sp4-chost-byos-v20220818-x86-64
+ chost:google/sles-15-sp4-chost-byos-v20220916-x86-64
+ chost:google/sles-15-sp4-chost-byos-v20221018-x86-64
+ chost:google/sles-15-sp4-chost-byos-v20221118-x86-64
+ chost:google/sles-15-sp4-chost-byos-v20221215-arm64
+ chost:google/sles-15-sp4-chost-byos-v20221215-x86-64
+ chost:google/sles-15-sp4-chost-byos-v20230111-arm64
+ chost:google/sles-15-sp4-chost-byos-v20230111-x86-64
+ chost:google/sles-15-sp4-chost-byos-v20230210-arm64
+ chost:google/sles-15-sp4-chost-byos-v20230210-x86-64
+ chost:google/sles-15-sp4-chost-byos-v20230310-arm64
+ chost:google/sles-15-sp4-chost-byos-v20230310-x86-64
+ chost:google/sles-15-sp4-chost-byos-v20230410-arm64
+ chost:google/sles-15-sp4-chost-byos-v20230410-x86-64
+ chost:google/sles-15-sp4-chost-byos-v20230510-arm64
+ chost:google/sles-15-sp4-chost-byos-v20230510-x86-64
+ chost:google/sles-15-sp4-chost-byos-v20230606-arm64
+ chost:google/sles-15-sp4-chost-byos-v20230606-x86-64
+ chost:google/sles-15-sp4-chost-byos-v20230704-arm64
+ chost:google/sles-15-sp4-chost-byos-v20230704-x86-64
+ chost:google/sles-15-sp4-chost-byos-v20230804-arm64
+ chost:google/sles-15-sp4-chost-byos-v20230804-x86-64
+ chost:google/sles-15-sp4-chost-byos-v20230901-arm64
+ chost:google/sles-15-sp4-chost-byos-v20230901-x86-64
+ chost:google/sles-15-sp4-chost-byos-v20230928-arm64
+ chost:google/sles-15-sp4-chost-byos-v20230928-x86-64
+ chost:google/sles-15-sp4-chost-byos-v20231027-arm64
+ chost:google/sles-15-sp4-chost-byos-v20231027-x86-64
+ chost:google/sles-15-sp4-chost-byos-v20231127-arm64
+ chost:google/sles-15-sp4-chost-byos-v20231127-x86-64
+ chost:google/sles-15-sp4-chost-byos-v20231212-arm64
+ chost:google/sles-15-sp4-chost-byos-v20231212-x86-64
+ chost:google/sles-15-sp4-chost-byos-v20240312-arm64
+ chost:google/sles-15-sp4-chost-byos-v20240312-x86-64
+ chost:google/sles-15-sp4-chost-byos-v20240612-arm64
+ chost:google/sles-15-sp4-chost-byos-v20240612-x86-64
+ chost:google/sles-15-sp4-chost-byos-v20240809-arm64
+ chost:google/sles-15-sp4-chost-byos-v20240809-x86-64
+ chost:google/sles-15-sp4-chost-byos-v20240912-arm64
+ chost:google/sles-15-sp4-chost-byos-v20240912-x86-64
+ chost:microsoft/suse-sles-15-sp1-chost-byos-v20210202
+ chost:microsoft/suse-sles-15-sp1-chost-byos-v20210304
+ chost:microsoft/suse-sles-15-sp1-chost-byos-v20220127
+ chost:microsoft/suse-sles-15-sp1-chost-byos-v20220715-x86_64
+ chost:microsoft/suse-sles-15-sp2-chost-byos-v20210202
+ chost:microsoft/suse-sles-15-sp2-chost-byos-v20210304
+ chost:microsoft/suse-sles-15-sp2-chost-byos-v20210405
+ chost:microsoft/suse-sles-15-sp2-chost-byos-v20210506
+ chost:microsoft/suse-sles-15-sp2-chost-byos-v20210610
+ chost:microsoft/suse-sles-15-sp2-chost-byos-v20210722
+ chost:microsoft/suse-sles-15-sp2-chost-byos-v20210913
+ chost:microsoft/suse-sles-15-sp2-chost-byos-v20211025
+ chost:microsoft/suse-sles-15-sp2-chost-byos-v20220126
+ chost:microsoft/suse-sles-15-sp2-chost-byos-v20220718-x86_64
+ chost:microsoft/suse-sles-15-sp3-chost-byos-v20210729
+ chost:microsoft/suse-sles-15-sp3-chost-byos-v20210827
+ chost:microsoft/suse-sles-15-sp3-chost-byos-v20210927
+ chost:microsoft/suse-sles-15-sp3-chost-byos-v20211004
+ chost:microsoft/suse-sles-15-sp3-chost-byos-v20211101
+ chost:microsoft/suse-sles-15-sp3-chost-byos-v20211202
+ chost:microsoft/suse-sles-15-sp3-chost-byos-v20220103
+ chost:microsoft/suse-sles-15-sp3-chost-byos-v20220126
+ chost:microsoft/suse-sles-15-sp3-chost-byos-v20220222
+ chost:microsoft/suse-sles-15-sp3-chost-byos-v20220310
+ chost:microsoft/suse-sles-15-sp3-chost-byos-v20220411-x86_64
+ chost:microsoft/suse-sles-15-sp3-chost-byos-v20220510-x86_64
+ chost:microsoft/suse-sles-15-sp3-chost-byos-v20220609-x86_64
+ chost:microsoft/suse-sles-15-sp3-chost-byos-v20220708-x86_64
+ chost:microsoft/suse-sles-15-sp3-chost-byos-v20220718-x86_64
+ chost:microsoft/suse-sles-15-sp3-chost-byos-v20220818-x86_64
+ chost:microsoft/suse-sles-15-sp3-chost-byos-v20220916-x86_64
+ chost:microsoft/suse-sles-15-sp3-chost-byos-v20220921-x86_64
+ chost:microsoft/suse-sles-15-sp3-chost-byos-v20221019-x86_64
+ chost:microsoft/suse-sles-15-sp3-chost-byos-v20221119-x86_64
+ chost:microsoft/suse-sles-15-sp3-chost-byos-v20221215-x86_64
+ chost:microsoft/suse-sles-15-sp3-chost-byos-v20230313-x86_64
+ chost:microsoft/suse-sles-15-sp3-chost-byos-v20230613-x86_64
+ chost:microsoft/suse-sles-15-sp3-chost-byos-v20240807-x86_64
+ chost:microsoft/suse-sles-15-sp3-chost-byos-v20240912-x86_64
+ chost:microsoft/suse-sles-15-sp4-chost-byos-v20220718-x86_64
+ chost:microsoft/suse-sles-15-sp4-chost-byos-v20220721-x86_64
+ chost:microsoft/suse-sles-15-sp4-chost-byos-v20220819-x86_64
+ chost:microsoft/suse-sles-15-sp4-chost-byos-v20220916-x86_64
+ chost:microsoft/suse-sles-15-sp4-chost-byos-v20220923-x86_64
+ chost:microsoft/suse-sles-15-sp4-chost-byos-v20221018-x86_64
+ chost:microsoft/suse-sles-15-sp4-chost-byos-v20221118-x86_64
+ chost:microsoft/suse-sles-15-sp4-chost-byos-v20221215-arm64
+ chost:microsoft/suse-sles-15-sp4-chost-byos-v20221215-x86_64
+ chost:microsoft/suse-sles-15-sp4-chost-byos-v20230111-arm64
+ chost:microsoft/suse-sles-15-sp4-chost-byos-v20230111-x86_64
+ chost:microsoft/suse-sles-15-sp4-chost-byos-v20230210-arm64
+ chost:microsoft/suse-sles-15-sp4-chost-byos-v20230210-x86_64
+ chost:microsoft/suse-sles-15-sp4-chost-byos-v20230310-arm64
+ chost:microsoft/suse-sles-15-sp4-chost-byos-v20230310-x86_64
+ chost:microsoft/suse-sles-15-sp4-chost-byos-v20230410-arm64
+ chost:microsoft/suse-sles-15-sp4-chost-byos-v20230410-x86_64
+ chost:microsoft/suse-sles-15-sp4-chost-byos-v20230510-arm64
+ chost:microsoft/suse-sles-15-sp4-chost-byos-v20230510-x86_64
+ chost:microsoft/suse-sles-15-sp4-chost-byos-v20230606-arm64
+ chost:microsoft/suse-sles-15-sp4-chost-byos-v20230606-x86_64
+ chost:microsoft/suse-sles-15-sp4-chost-byos-v20230704-arm64
+ chost:microsoft/suse-sles-15-sp4-chost-byos-v20230704-x86_64
+ chost:microsoft/suse-sles-15-sp4-chost-byos-v20230803-arm64
+ chost:microsoft/suse-sles-15-sp4-chost-byos-v20230803-x86_64
+ chost:microsoft/suse-sles-15-sp4-chost-byos-v20230901-arm64
+ chost:microsoft/suse-sles-15-sp4-chost-byos-v20230901-x86_64
+ chost:microsoft/suse-sles-15-sp4-chost-byos-v20230928-arm64
+ chost:microsoft/suse-sles-15-sp4-chost-byos-v20230928-x86_64
+ chost:microsoft/suse-sles-15-sp4-chost-byos-v20231027-arm64
+ chost:microsoft/suse-sles-15-sp4-chost-byos-v20231027-x86_64
+ chost:microsoft/suse-sles-15-sp4-chost-byos-v20231127-arm64
+ chost:microsoft/suse-sles-15-sp4-chost-byos-v20231127-x86_64
+ chost:microsoft/suse-sles-15-sp4-chost-byos-v20231212-arm64
+ chost:microsoft/suse-sles-15-sp4-chost-byos-v20231212-x86_64
+ chost:microsoft/suse-sles-15-sp4-chost-byos-v20240312-arm64
+ chost:microsoft/suse-sles-15-sp4-chost-byos-v20240312-x86_64
+ chost:microsoft/suse-sles-15-sp4-chost-byos-v20240612-arm64
+ chost:microsoft/suse-sles-15-sp4-chost-byos-v20240612-x86_64
+ chost:microsoft/suse-sles-15-sp4-chost-byos-v20240809-arm64
+ chost:microsoft/suse-sles-15-sp4-chost-byos-v20240809-x86_64
+ chost:microsoft/suse-sles-15-sp4-chost-byos-v20240912-arm64
+ chost:microsoft/suse-sles-15-sp4-chost-byos-v20240912-x86_64
+
no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2023-45919
--- /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2023-45919.xml 2024-10-20 01:36:35.967988000 +0200
+++ /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2023-45919.xml.new 2024-10-29 01:27:34.372129000 +0100
@@ -14,13 +14,13 @@
1
- 8
- 2024-10-19T23:36:35Z
+ 9
+ 2024-10-29T00:27:33Z
current
2024-03-28T00:13:32Z
- 2024-10-19T23:36:35Z
+ 2024-10-29T00:27:33Z
cve-database/bin/generate-cvrf-cve.pl
2020-12-27T01:00:00Z
@@ -54,6 +54,16 @@
+
+
+ Image SLES12-SP5-GCE-SAP-BYOS
+
+
+
+
+ Image SLES12-SP5-GCE-SAP-On-Demand
+
+
Image SLES15-SP4-SAP-Azure-LI-BYOS
@@ -334,6 +344,253 @@
openSUSE Leap Micro 5.5
+
+
+ SLES 15 SP1 CHOST Images for Amazon EC2 suse-sles-15-sp1-chost-byos-v20210304-hvm-ssd-x86_64
+ SLES 15 SP1 CHOST Images for Amazon EC2 suse-sles-15-sp1-chost-byos-v20220127-hvm-ssd-x86_64
+ SLES 15 SP1 CHOST Images for Amazon EC2 suse-sles-15-sp1-chost-byos-v20220715-hvm-ssd-x86_64
+
+
+ SLES 15 SP2 CHOST Images for Amazon EC2 suse-sles-15-sp2-chost-byos-v20210610-hvm-ssd-x86_64
+ SLES 15 SP2 CHOST Images for Amazon EC2 suse-sles-15-sp2-chost-byos-v20210722-hvm-ssd-x86_64
+ SLES 15 SP2 CHOST Images for Amazon EC2 suse-sles-15-sp2-chost-byos-v20210913-hvm-ssd-x86_64
+ SLES 15 SP2 CHOST Images for Amazon EC2 suse-sles-15-sp2-chost-byos-v20211025-hvm-ssd-x86_64
+ SLES 15 SP2 CHOST Images for Amazon EC2 suse-sles-15-sp2-chost-byos-v20220126-hvm-ssd-x86_64
+ SLES 15 SP2 CHOST Images for Amazon EC2 suse-sles-15-sp2-chost-byos-v20220718-hvm-ssd-x86_64
+
+
+ SLES 15 SP3 CHOST Images for Amazon EC2 suse-sles-15-sp3-chost-byos-v20210729-hvm-ssd-x86_64
+ SLES 15 SP3 CHOST Images for Amazon EC2 suse-sles-15-sp3-chost-byos-v20210827-hvm-ssd-x86_64
+ SLES 15 SP3 CHOST Images for Amazon EC2 suse-sles-15-sp3-chost-byos-v20210927-hvm-ssd-x86_64
+ SLES 15 SP3 CHOST Images for Amazon EC2 suse-sles-15-sp3-chost-byos-v20211004-hvm-ssd-x86_64
+ SLES 15 SP3 CHOST Images for Amazon EC2 suse-sles-15-sp3-chost-byos-v20211101-hvm-ssd-x86_64
+ SLES 15 SP3 CHOST Images for Amazon EC2 suse-sles-15-sp3-chost-byos-v20211202-hvm-ssd-x86_64
+ SLES 15 SP3 CHOST Images for Amazon EC2 suse-sles-15-sp3-chost-byos-v20220103-hvm-ssd-x86_64
+ SLES 15 SP3 CHOST Images for Amazon EC2 suse-sles-15-sp3-chost-byos-v20220126-hvm-ssd-x86_64
+ SLES 15 SP3 CHOST Images for Amazon EC2 suse-sles-15-sp3-chost-byos-v20220222-hvm-ssd-x86_64
+ SLES 15 SP3 CHOST Images for Amazon EC2 suse-sles-15-sp3-chost-byos-v20220310-hvm-ssd-x86_64
+ SLES 15 SP3 CHOST Images for Amazon EC2 suse-sles-15-sp3-chost-byos-v20220411-hvm-ssd-x86_64
+ SLES 15 SP3 CHOST Images for Amazon EC2 suse-sles-15-sp3-chost-byos-v20220510-hvm-ssd-x86_64
+ SLES 15 SP3 CHOST Images for Amazon EC2 suse-sles-15-sp3-chost-byos-v20220608-hvm-ssd-x86_64
+ SLES 15 SP3 CHOST Images for Amazon EC2 suse-sles-15-sp3-chost-byos-v20220708-hvm-ssd-x86_64
+ SLES 15 SP3 CHOST Images for Amazon EC2 suse-sles-15-sp3-chost-byos-v20220718-hvm-ssd-x86_64
+ SLES 15 SP3 CHOST Images for Amazon EC2 suse-sles-15-sp3-chost-byos-v20220818-hvm-ssd-x86_64
+ SLES 15 SP3 CHOST Images for Amazon EC2 suse-sles-15-sp3-chost-byos-v20220916-hvm-ssd-x86_64
+ SLES 15 SP3 CHOST Images for Amazon EC2 suse-sles-15-sp3-chost-byos-v20220921-hvm-ssd-x86_64
+ SLES 15 SP3 CHOST Images for Amazon EC2 suse-sles-15-sp3-chost-byos-v20221019-hvm-ssd-x86_64
+ SLES 15 SP3 CHOST Images for Amazon EC2 suse-sles-15-sp3-chost-byos-v20221119-hvm-ssd-x86_64
+ SLES 15 SP3 CHOST Images for Amazon EC2 suse-sles-15-sp3-chost-byos-v20221215-hvm-ssd-x86_64
+ SLES 15 SP3 CHOST Images for Amazon EC2 suse-sles-15-sp3-chost-byos-v20230313-hvm-ssd-x86_64
+ SLES 15 SP3 CHOST Images for Amazon EC2 suse-sles-15-sp3-chost-byos-v20230613-hvm-ssd-x86_64
+ SLES 15 SP3 CHOST Images for Amazon EC2 suse-sles-15-sp3-chost-byos-v20240807-hvm-ssd-x86_64
+ SLES 15 SP3 CHOST Images for Amazon EC2 suse-sles-15-sp3-chost-byos-v20240912-hvm-ssd-x86_64
+
+
+ SLES 15 SP4 CHOST Images for Amazon EC2 suse-sles-15-sp4-chost-byos-v20220718-hvm-ssd-x86_64
+ SLES 15 SP4 CHOST Images for Amazon EC2 suse-sles-15-sp4-chost-byos-v20220721-hvm-ssd-x86_64
+ SLES 15 SP4 CHOST Images for Amazon EC2 suse-sles-15-sp4-chost-byos-v20220819-hvm-ssd-x86_64
+ SLES 15 SP4 CHOST Images for Amazon EC2 suse-sles-15-sp4-chost-byos-v20220916-hvm-ssd-x86_64
+ SLES 15 SP4 CHOST Images for Amazon EC2 suse-sles-15-sp4-chost-byos-v20220923-hvm-ssd-x86_64
+ SLES 15 SP4 CHOST Images for Amazon EC2 suse-sles-15-sp4-chost-byos-v20221018-hvm-ssd-x86_64
+ SLES 15 SP4 CHOST Images for Amazon EC2 suse-sles-15-sp4-chost-byos-v20221118-hvm-ssd-x86_64
+ SLES 15 SP4 CHOST Images for Amazon EC2 suse-sles-15-sp4-chost-byos-v20221215-hvm-ssd-x86_64
+ SLES 15 SP4 CHOST Images for Amazon EC2 suse-sles-15-sp4-chost-byos-v20230111-hvm-ssd-x86_64
+ SLES 15 SP4 CHOST Images for Amazon EC2 suse-sles-15-sp4-chost-byos-v20230210-hvm-ssd-x86_64
+ SLES 15 SP4 CHOST Images for Amazon EC2 suse-sles-15-sp4-chost-byos-v20230310-hvm-ssd-x86_64
+ SLES 15 SP4 CHOST Images for Amazon EC2 suse-sles-15-sp4-chost-byos-v20230410-hvm-ssd-x86_64
+ SLES 15 SP4 CHOST Images for Amazon EC2 suse-sles-15-sp4-chost-byos-v20230510-hvm-ssd-x86_64
+ SLES 15 SP4 CHOST Images for Amazon EC2 suse-sles-15-sp4-chost-byos-v20230606-hvm-ssd-x86_64
+ SLES 15 SP4 CHOST Images for Amazon EC2 suse-sles-15-sp4-chost-byos-v20230704-hvm-ssd-x86_64
+ SLES 15 SP4 CHOST Images for Amazon EC2 suse-sles-15-sp4-chost-byos-v20230803-hvm-ssd-x86_64
+ SLES 15 SP4 CHOST Images for Amazon EC2 suse-sles-15-sp4-chost-byos-v20230901-hvm-ssd-x86_64
+ SLES 15 SP4 CHOST Images for Amazon EC2 suse-sles-15-sp4-chost-byos-v20230928-hvm-ssd-x86_64
+ SLES 15 SP4 CHOST Images for Amazon EC2 suse-sles-15-sp4-chost-byos-v20231027-hvm-ssd-x86_64
+ SLES 15 SP4 CHOST Images for Amazon EC2 suse-sles-15-sp4-chost-byos-v20231127-hvm-ssd-x86_64
+ SLES 15 SP4 CHOST Images for Amazon EC2 suse-sles-15-sp4-chost-byos-v20231212-hvm-ssd-x86_64
+ SLES 15 SP4 CHOST Images for Amazon EC2 suse-sles-15-sp4-chost-byos-v20240312-hvm-ssd-x86_64
+ SLES 15 SP4 CHOST Images for Amazon EC2 suse-sles-15-sp4-chost-byos-v20240612-hvm-ssd-x86_64
+ SLES 15 SP4 CHOST Images for Amazon EC2 suse-sles-15-sp4-chost-byos-v20240809-hvm-ssd-x86_64
+ SLES 15 SP4 CHOST Images for Amazon EC2 suse-sles-15-sp4-chost-byos-v20240912-hvm-ssd-x86_64
+
+
+ SLES 15 SP1 CHOST Images for Google sles-15-sp1-chost-byos-v20210202
+ SLES 15 SP1 CHOST Images for Google sles-15-sp1-chost-byos-v20210304
+ SLES 15 SP1 CHOST Images for Google sles-15-sp1-chost-byos-v20220127
+ SLES 15 SP1 CHOST Images for Google sles-15-sp1-chost-byos-v20220715-x86-64
+
+
+ SLES 15 SP2 CHOST Images for Google sles-15-sp2-chost-byos-v20210202
+ SLES 15 SP2 CHOST Images for Google sles-15-sp2-chost-byos-v20210304
+ SLES 15 SP2 CHOST Images for Google sles-15-sp2-chost-byos-v20210405
+ SLES 15 SP2 CHOST Images for Google sles-15-sp2-chost-byos-v20210506
+ SLES 15 SP2 CHOST Images for Google sles-15-sp2-chost-byos-v20210610
+ SLES 15 SP2 CHOST Images for Google sles-15-sp2-chost-byos-v20210722
+ SLES 15 SP2 CHOST Images for Google sles-15-sp2-chost-byos-v20210913
+ SLES 15 SP2 CHOST Images for Google sles-15-sp2-chost-byos-v20211025
+ SLES 15 SP2 CHOST Images for Google sles-15-sp2-chost-byos-v20220126
+ SLES 15 SP2 CHOST Images for Google sles-15-sp2-chost-byos-v20220718-x86-64
+
+
+ SLES 15 SP3 CHOST Images for Google sles-15-sp3-chost-byos-v20210729
+ SLES 15 SP3 CHOST Images for Google sles-15-sp3-chost-byos-v20210827
+ SLES 15 SP3 CHOST Images for Google sles-15-sp3-chost-byos-v20210927
+ SLES 15 SP3 CHOST Images for Google sles-15-sp3-chost-byos-v20211004
+ SLES 15 SP3 CHOST Images for Google sles-15-sp3-chost-byos-v20211101
+ SLES 15 SP3 CHOST Images for Google sles-15-sp3-chost-byos-v20211202
+ SLES 15 SP3 CHOST Images for Google sles-15-sp3-chost-byos-v20220103
+ SLES 15 SP3 CHOST Images for Google sles-15-sp3-chost-byos-v20220126
+ SLES 15 SP3 CHOST Images for Google sles-15-sp3-chost-byos-v20220222
+ SLES 15 SP3 CHOST Images for Google sles-15-sp3-chost-byos-v20220310
+ SLES 15 SP3 CHOST Images for Google sles-15-sp3-chost-byos-v20220411-x86-64
+ SLES 15 SP3 CHOST Images for Google sles-15-sp3-chost-byos-v20220510-x86-64
+ SLES 15 SP3 CHOST Images for Google sles-15-sp3-chost-byos-v20220608-x86-64
+ SLES 15 SP3 CHOST Images for Google sles-15-sp3-chost-byos-v20220708-x86-64
+ SLES 15 SP3 CHOST Images for Google sles-15-sp3-chost-byos-v20220718-x86-64
+ SLES 15 SP3 CHOST Images for Google sles-15-sp3-chost-byos-v20220818-x86-64
+ SLES 15 SP3 CHOST Images for Google sles-15-sp3-chost-byos-v20220916-x86-64
+ SLES 15 SP3 CHOST Images for Google sles-15-sp3-chost-byos-v20221019-x86-64
+ SLES 15 SP3 CHOST Images for Google sles-15-sp3-chost-byos-v20221118-x86-64
+ SLES 15 SP3 CHOST Images for Google sles-15-sp3-chost-byos-v20221215-x86-64
+ SLES 15 SP3 CHOST Images for Google sles-15-sp3-chost-byos-v20230313-x86-64
+ SLES 15 SP3 CHOST Images for Google sles-15-sp3-chost-byos-v20230613-x86-64
+ SLES 15 SP3 CHOST Images for Google sles-15-sp3-chost-byos-v20240807-x86-64
+ SLES 15 SP3 CHOST Images for Google sles-15-sp3-chost-byos-v20240912-x86-64
+
+
+ SLES 15 SP4 CHOST Images for Google sles-15-sp4-chost-byos-v20220718-x86-64
+ SLES 15 SP4 CHOST Images for Google sles-15-sp4-chost-byos-v20220721-x86-64
+ SLES 15 SP4 CHOST Images for Google sles-15-sp4-chost-byos-v20220818-x86-64
+ SLES 15 SP4 CHOST Images for Google sles-15-sp4-chost-byos-v20220916-x86-64
+ SLES 15 SP4 CHOST Images for Google sles-15-sp4-chost-byos-v20221018-x86-64
+ SLES 15 SP4 CHOST Images for Google sles-15-sp4-chost-byos-v20221118-x86-64
+ SLES 15 SP4 CHOST Images for Google sles-15-sp4-chost-byos-v20221215-arm64
+ SLES 15 SP4 CHOST Images for Google sles-15-sp4-chost-byos-v20221215-x86-64
+ SLES 15 SP4 CHOST Images for Google sles-15-sp4-chost-byos-v20230111-arm64
+ SLES 15 SP4 CHOST Images for Google sles-15-sp4-chost-byos-v20230111-x86-64
+ SLES 15 SP4 CHOST Images for Google sles-15-sp4-chost-byos-v20230210-arm64
+ SLES 15 SP4 CHOST Images for Google sles-15-sp4-chost-byos-v20230210-x86-64
+ SLES 15 SP4 CHOST Images for Google sles-15-sp4-chost-byos-v20230310-arm64
+ SLES 15 SP4 CHOST Images for Google sles-15-sp4-chost-byos-v20230310-x86-64
+ SLES 15 SP4 CHOST Images for Google sles-15-sp4-chost-byos-v20230410-arm64
+ SLES 15 SP4 CHOST Images for Google sles-15-sp4-chost-byos-v20230410-x86-64
+ SLES 15 SP4 CHOST Images for Google sles-15-sp4-chost-byos-v20230510-arm64
+ SLES 15 SP4 CHOST Images for Google sles-15-sp4-chost-byos-v20230510-x86-64
+ SLES 15 SP4 CHOST Images for Google sles-15-sp4-chost-byos-v20230606-arm64
+ SLES 15 SP4 CHOST Images for Google sles-15-sp4-chost-byos-v20230606-x86-64
+ SLES 15 SP4 CHOST Images for Google sles-15-sp4-chost-byos-v20230704-arm64
+ SLES 15 SP4 CHOST Images for Google sles-15-sp4-chost-byos-v20230704-x86-64
+ SLES 15 SP4 CHOST Images for Google sles-15-sp4-chost-byos-v20230804-arm64
+ SLES 15 SP4 CHOST Images for Google sles-15-sp4-chost-byos-v20230804-x86-64
+ SLES 15 SP4 CHOST Images for Google sles-15-sp4-chost-byos-v20230901-arm64
+ SLES 15 SP4 CHOST Images for Google sles-15-sp4-chost-byos-v20230901-x86-64
+ SLES 15 SP4 CHOST Images for Google sles-15-sp4-chost-byos-v20230928-arm64
+ SLES 15 SP4 CHOST Images for Google sles-15-sp4-chost-byos-v20230928-x86-64
+ SLES 15 SP4 CHOST Images for Google sles-15-sp4-chost-byos-v20231027-arm64
+ SLES 15 SP4 CHOST Images for Google sles-15-sp4-chost-byos-v20231027-x86-64
+ SLES 15 SP4 CHOST Images for Google sles-15-sp4-chost-byos-v20231127-arm64
+ SLES 15 SP4 CHOST Images for Google sles-15-sp4-chost-byos-v20231127-x86-64
+ SLES 15 SP4 CHOST Images for Google sles-15-sp4-chost-byos-v20231212-arm64
+ SLES 15 SP4 CHOST Images for Google sles-15-sp4-chost-byos-v20231212-x86-64
+ SLES 15 SP4 CHOST Images for Google sles-15-sp4-chost-byos-v20240312-arm64
+ SLES 15 SP4 CHOST Images for Google sles-15-sp4-chost-byos-v20240312-x86-64
+ SLES 15 SP4 CHOST Images for Google sles-15-sp4-chost-byos-v20240612-arm64
+ SLES 15 SP4 CHOST Images for Google sles-15-sp4-chost-byos-v20240612-x86-64
+ SLES 15 SP4 CHOST Images for Google sles-15-sp4-chost-byos-v20240809-arm64
+ SLES 15 SP4 CHOST Images for Google sles-15-sp4-chost-byos-v20240809-x86-64
+ SLES 15 SP4 CHOST Images for Google sles-15-sp4-chost-byos-v20240912-arm64
+ SLES 15 SP4 CHOST Images for Google sles-15-sp4-chost-byos-v20240912-x86-64
+
+
+ SLES 15 SP1 CHOST Images for Microsoft Azure suse-sles-15-sp1-chost-byos-v20210202
+ SLES 15 SP1 CHOST Images for Microsoft Azure suse-sles-15-sp1-chost-byos-v20210304
+ SLES 15 SP1 CHOST Images for Microsoft Azure suse-sles-15-sp1-chost-byos-v20220127
+ SLES 15 SP1 CHOST Images for Microsoft Azure suse-sles-15-sp1-chost-byos-v20220715-x86_64
+
+
+ SLES 15 SP2 CHOST Images for Microsoft Azure suse-sles-15-sp2-chost-byos-v20210202
+ SLES 15 SP2 CHOST Images for Microsoft Azure suse-sles-15-sp2-chost-byos-v20210304
+ SLES 15 SP2 CHOST Images for Microsoft Azure suse-sles-15-sp2-chost-byos-v20210405
+ SLES 15 SP2 CHOST Images for Microsoft Azure suse-sles-15-sp2-chost-byos-v20210506
+ SLES 15 SP2 CHOST Images for Microsoft Azure suse-sles-15-sp2-chost-byos-v20210610
+ SLES 15 SP2 CHOST Images for Microsoft Azure suse-sles-15-sp2-chost-byos-v20210722
+ SLES 15 SP2 CHOST Images for Microsoft Azure suse-sles-15-sp2-chost-byos-v20210913
+ SLES 15 SP2 CHOST Images for Microsoft Azure suse-sles-15-sp2-chost-byos-v20211025
+ SLES 15 SP2 CHOST Images for Microsoft Azure suse-sles-15-sp2-chost-byos-v20220126
+ SLES 15 SP2 CHOST Images for Microsoft Azure suse-sles-15-sp2-chost-byos-v20220718-x86_64
+
+
+ SLES 15 SP3 CHOST Images for Microsoft Azure suse-sles-15-sp3-chost-byos-v20210729
+ SLES 15 SP3 CHOST Images for Microsoft Azure suse-sles-15-sp3-chost-byos-v20210827
+ SLES 15 SP3 CHOST Images for Microsoft Azure suse-sles-15-sp3-chost-byos-v20210927
+ SLES 15 SP3 CHOST Images for Microsoft Azure suse-sles-15-sp3-chost-byos-v20211004
+ SLES 15 SP3 CHOST Images for Microsoft Azure suse-sles-15-sp3-chost-byos-v20211101
+ SLES 15 SP3 CHOST Images for Microsoft Azure suse-sles-15-sp3-chost-byos-v20211202
+ SLES 15 SP3 CHOST Images for Microsoft Azure suse-sles-15-sp3-chost-byos-v20220103
+ SLES 15 SP3 CHOST Images for Microsoft Azure suse-sles-15-sp3-chost-byos-v20220126
+ SLES 15 SP3 CHOST Images for Microsoft Azure suse-sles-15-sp3-chost-byos-v20220222
+ SLES 15 SP3 CHOST Images for Microsoft Azure suse-sles-15-sp3-chost-byos-v20220310
+ SLES 15 SP3 CHOST Images for Microsoft Azure suse-sles-15-sp3-chost-byos-v20220411-x86_64
+ SLES 15 SP3 CHOST Images for Microsoft Azure suse-sles-15-sp3-chost-byos-v20220510-x86_64
+ SLES 15 SP3 CHOST Images for Microsoft Azure suse-sles-15-sp3-chost-byos-v20220609-x86_64
+ SLES 15 SP3 CHOST Images for Microsoft Azure suse-sles-15-sp3-chost-byos-v20220708-x86_64
+ SLES 15 SP3 CHOST Images for Microsoft Azure suse-sles-15-sp3-chost-byos-v20220718-x86_64
+ SLES 15 SP3 CHOST Images for Microsoft Azure suse-sles-15-sp3-chost-byos-v20220818-x86_64
+ SLES 15 SP3 CHOST Images for Microsoft Azure suse-sles-15-sp3-chost-byos-v20220916-x86_64
+ SLES 15 SP3 CHOST Images for Microsoft Azure suse-sles-15-sp3-chost-byos-v20220921-x86_64
+ SLES 15 SP3 CHOST Images for Microsoft Azure suse-sles-15-sp3-chost-byos-v20221019-x86_64
+ SLES 15 SP3 CHOST Images for Microsoft Azure suse-sles-15-sp3-chost-byos-v20221119-x86_64
+ SLES 15 SP3 CHOST Images for Microsoft Azure suse-sles-15-sp3-chost-byos-v20221215-x86_64
+ SLES 15 SP3 CHOST Images for Microsoft Azure suse-sles-15-sp3-chost-byos-v20230313-x86_64
+ SLES 15 SP3 CHOST Images for Microsoft Azure suse-sles-15-sp3-chost-byos-v20230613-x86_64
+ SLES 15 SP3 CHOST Images for Microsoft Azure suse-sles-15-sp3-chost-byos-v20240807-x86_64
+ SLES 15 SP3 CHOST Images for Microsoft Azure suse-sles-15-sp3-chost-byos-v20240912-x86_64
+
+
+ SLES 15 SP4 CHOST Images for Microsoft Azure suse-sles-15-sp4-chost-byos-v20220718-x86_64
+ SLES 15 SP4 CHOST Images for Microsoft Azure suse-sles-15-sp4-chost-byos-v20220721-x86_64
+ SLES 15 SP4 CHOST Images for Microsoft Azure suse-sles-15-sp4-chost-byos-v20220819-x86_64
+ SLES 15 SP4 CHOST Images for Microsoft Azure suse-sles-15-sp4-chost-byos-v20220916-x86_64
+ SLES 15 SP4 CHOST Images for Microsoft Azure suse-sles-15-sp4-chost-byos-v20220923-x86_64
+ SLES 15 SP4 CHOST Images for Microsoft Azure suse-sles-15-sp4-chost-byos-v20221018-x86_64
+ SLES 15 SP4 CHOST Images for Microsoft Azure suse-sles-15-sp4-chost-byos-v20221118-x86_64
+ SLES 15 SP4 CHOST Images for Microsoft Azure suse-sles-15-sp4-chost-byos-v20221215-arm64
+ SLES 15 SP4 CHOST Images for Microsoft Azure suse-sles-15-sp4-chost-byos-v20221215-x86_64
+ SLES 15 SP4 CHOST Images for Microsoft Azure suse-sles-15-sp4-chost-byos-v20230111-arm64
+ SLES 15 SP4 CHOST Images for Microsoft Azure suse-sles-15-sp4-chost-byos-v20230111-x86_64
+ SLES 15 SP4 CHOST Images for Microsoft Azure suse-sles-15-sp4-chost-byos-v20230210-arm64
+ SLES 15 SP4 CHOST Images for Microsoft Azure suse-sles-15-sp4-chost-byos-v20230210-x86_64
+ SLES 15 SP4 CHOST Images for Microsoft Azure suse-sles-15-sp4-chost-byos-v20230310-arm64
+ SLES 15 SP4 CHOST Images for Microsoft Azure suse-sles-15-sp4-chost-byos-v20230310-x86_64
+ SLES 15 SP4 CHOST Images for Microsoft Azure suse-sles-15-sp4-chost-byos-v20230410-arm64
+ SLES 15 SP4 CHOST Images for Microsoft Azure suse-sles-15-sp4-chost-byos-v20230410-x86_64
+ SLES 15 SP4 CHOST Images for Microsoft Azure suse-sles-15-sp4-chost-byos-v20230510-arm64
+ SLES 15 SP4 CHOST Images for Microsoft Azure suse-sles-15-sp4-chost-byos-v20230510-x86_64
+ SLES 15 SP4 CHOST Images for Microsoft Azure suse-sles-15-sp4-chost-byos-v20230606-arm64
+ SLES 15 SP4 CHOST Images for Microsoft Azure suse-sles-15-sp4-chost-byos-v20230606-x86_64
+ SLES 15 SP4 CHOST Images for Microsoft Azure suse-sles-15-sp4-chost-byos-v20230704-arm64
+ SLES 15 SP4 CHOST Images for Microsoft Azure suse-sles-15-sp4-chost-byos-v20230704-x86_64
+ SLES 15 SP4 CHOST Images for Microsoft Azure suse-sles-15-sp4-chost-byos-v20230803-arm64
+ SLES 15 SP4 CHOST Images for Microsoft Azure suse-sles-15-sp4-chost-byos-v20230803-x86_64
+ SLES 15 SP4 CHOST Images for Microsoft Azure suse-sles-15-sp4-chost-byos-v20230901-arm64
+ SLES 15 SP4 CHOST Images for Microsoft Azure suse-sles-15-sp4-chost-byos-v20230901-x86_64
+ SLES 15 SP4 CHOST Images for Microsoft Azure suse-sles-15-sp4-chost-byos-v20230928-arm64
+ SLES 15 SP4 CHOST Images for Microsoft Azure suse-sles-15-sp4-chost-byos-v20230928-x86_64
+ SLES 15 SP4 CHOST Images for Microsoft Azure suse-sles-15-sp4-chost-byos-v20231027-arm64
+ SLES 15 SP4 CHOST Images for Microsoft Azure suse-sles-15-sp4-chost-byos-v20231027-x86_64
+ SLES 15 SP4 CHOST Images for Microsoft Azure suse-sles-15-sp4-chost-byos-v20231127-arm64
+ SLES 15 SP4 CHOST Images for Microsoft Azure suse-sles-15-sp4-chost-byos-v20231127-x86_64
+ SLES 15 SP4 CHOST Images for Microsoft Azure suse-sles-15-sp4-chost-byos-v20231212-arm64
+ SLES 15 SP4 CHOST Images for Microsoft Azure suse-sles-15-sp4-chost-byos-v20231212-x86_64
+ SLES 15 SP4 CHOST Images for Microsoft Azure suse-sles-15-sp4-chost-byos-v20240312-arm64
+ SLES 15 SP4 CHOST Images for Microsoft Azure suse-sles-15-sp4-chost-byos-v20240312-x86_64
+ SLES 15 SP4 CHOST Images for Microsoft Azure suse-sles-15-sp4-chost-byos-v20240612-arm64
+ SLES 15 SP4 CHOST Images for Microsoft Azure suse-sles-15-sp4-chost-byos-v20240612-x86_64
+ SLES 15 SP4 CHOST Images for Microsoft Azure suse-sles-15-sp4-chost-byos-v20240809-arm64
+ SLES 15 SP4 CHOST Images for Microsoft Azure suse-sles-15-sp4-chost-byos-v20240809-x86_64
+ SLES 15 SP4 CHOST Images for Microsoft Azure suse-sles-15-sp4-chost-byos-v20240912-arm64
+ SLES 15 SP4 CHOST Images for Microsoft Azure suse-sles-15-sp4-chost-byos-v20240912-x86_64
+
+
Mesa
@@ -1054,6 +1311,42 @@
libxatracker2-1.0.0-150600.83.3.1
+
+ Mesa-18.3.2-14.9.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ Mesa-dri-18.3.2-14.9.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ Mesa-libEGL1-18.3.2-14.9.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ Mesa-libGL1-18.3.2-14.9.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ Mesa-libglapi0-18.3.2-14.9.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ libgbm1-18.3.2-14.9.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ Mesa-18.3.2-14.9.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
+
+ Mesa-dri-18.3.2-14.9.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
+
+ Mesa-libEGL1-18.3.2-14.9.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
+
+ Mesa-libGL1-18.3.2-14.9.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
+
+ Mesa-libglapi0-18.3.2-14.9.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
+
+ libgbm1-18.3.2-14.9.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
libgbm1-21.2.4-150400.68.15.1 as a component of Image SLES15-SP4-SAP-Azure-LI-BYOS
@@ -2935,36 +3228,6 @@
Mesa as a component of SUSE Linux Enterprise Server for SAP Applications 12 SP5
-
- Mesa-32bit as a component of SUSE Linux Enterprise Server for SAP Applications 12 SP5
-
-
- Mesa-libEGL1 as a component of SUSE Linux Enterprise Server for SAP Applications 12 SP5
-
-
- Mesa-libEGL1-32bit as a component of SUSE Linux Enterprise Server for SAP Applications 12 SP5
-
-
- Mesa-libGL1 as a component of SUSE Linux Enterprise Server for SAP Applications 12 SP5
-
-
- Mesa-libGL1-32bit as a component of SUSE Linux Enterprise Server for SAP Applications 12 SP5
-
-
- Mesa-libGLESv2-2 as a component of SUSE Linux Enterprise Server for SAP Applications 12 SP5
-
-
- Mesa-libglapi0 as a component of SUSE Linux Enterprise Server for SAP Applications 12 SP5
-
-
- Mesa-libglapi0-32bit as a component of SUSE Linux Enterprise Server for SAP Applications 12 SP5
-
-
- libgbm1 as a component of SUSE Linux Enterprise Server for SAP Applications 12 SP5
-
-
- libgbm1-32bit as a component of SUSE Linux Enterprise Server for SAP Applications 12 SP5
-
Mesa as a component of SUSE Linux Enterprise Server for SAP Applications 15 SP2
@@ -3441,6 +3704,18 @@
CVE-2023-45919
+ Image SLES12-SP5-GCE-SAP-BYOS:Mesa-18.3.2-14.9.1
+ Image SLES12-SP5-GCE-SAP-BYOS:Mesa-dri-18.3.2-14.9.1
+ Image SLES12-SP5-GCE-SAP-BYOS:Mesa-libEGL1-18.3.2-14.9.1
+ Image SLES12-SP5-GCE-SAP-BYOS:Mesa-libGL1-18.3.2-14.9.1
+ Image SLES12-SP5-GCE-SAP-BYOS:Mesa-libglapi0-18.3.2-14.9.1
+ Image SLES12-SP5-GCE-SAP-BYOS:libgbm1-18.3.2-14.9.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:Mesa-18.3.2-14.9.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:Mesa-dri-18.3.2-14.9.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:Mesa-libEGL1-18.3.2-14.9.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:Mesa-libGL1-18.3.2-14.9.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:Mesa-libglapi0-18.3.2-14.9.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:libgbm1-18.3.2-14.9.1
Image SLES15-SP4-SAP-Azure-LI-BYOS:libgbm1-21.2.4-150400.68.15.1
Image SLES15-SP4-SAP-Azure-LI-BYOS-Production:libgbm1-21.2.4-150400.68.15.1
Image SLES15-SP4-SAP-Azure-VLI-BYOS:libgbm1-21.2.4-150400.68.15.1
@@ -3782,6 +4057,229 @@
openSUSE Leap Micro 5.5:Mesa-libglapi0-22.3.5-150500.77.5.1
openSUSE Leap Micro 5.5:libgbm1-22.3.5-150500.77.5.1
+
+ chost:amazon/suse-sles-15-sp1-chost-byos-v20210304-hvm-ssd-x86_64
+ chost:amazon/suse-sles-15-sp1-chost-byos-v20220127-hvm-ssd-x86_64
+ chost:amazon/suse-sles-15-sp1-chost-byos-v20220715-hvm-ssd-x86_64
+ chost:amazon/suse-sles-15-sp2-chost-byos-v20210610-hvm-ssd-x86_64
+ chost:amazon/suse-sles-15-sp2-chost-byos-v20210722-hvm-ssd-x86_64
+ chost:amazon/suse-sles-15-sp2-chost-byos-v20210913-hvm-ssd-x86_64
+ chost:amazon/suse-sles-15-sp2-chost-byos-v20211025-hvm-ssd-x86_64
+ chost:amazon/suse-sles-15-sp2-chost-byos-v20220126-hvm-ssd-x86_64
+ chost:amazon/suse-sles-15-sp2-chost-byos-v20220718-hvm-ssd-x86_64
+ chost:amazon/suse-sles-15-sp3-chost-byos-v20210729-hvm-ssd-x86_64
+ chost:amazon/suse-sles-15-sp3-chost-byos-v20210827-hvm-ssd-x86_64
+ chost:amazon/suse-sles-15-sp3-chost-byos-v20210927-hvm-ssd-x86_64
+ chost:amazon/suse-sles-15-sp3-chost-byos-v20211004-hvm-ssd-x86_64
+ chost:amazon/suse-sles-15-sp3-chost-byos-v20211101-hvm-ssd-x86_64
+ chost:amazon/suse-sles-15-sp3-chost-byos-v20211202-hvm-ssd-x86_64
+ chost:amazon/suse-sles-15-sp3-chost-byos-v20220103-hvm-ssd-x86_64
+ chost:amazon/suse-sles-15-sp3-chost-byos-v20220126-hvm-ssd-x86_64
+ chost:amazon/suse-sles-15-sp3-chost-byos-v20220222-hvm-ssd-x86_64
+ chost:amazon/suse-sles-15-sp3-chost-byos-v20220310-hvm-ssd-x86_64
+ chost:amazon/suse-sles-15-sp3-chost-byos-v20220411-hvm-ssd-x86_64
+ chost:amazon/suse-sles-15-sp3-chost-byos-v20220510-hvm-ssd-x86_64
+ chost:amazon/suse-sles-15-sp3-chost-byos-v20220608-hvm-ssd-x86_64
+ chost:amazon/suse-sles-15-sp3-chost-byos-v20220708-hvm-ssd-x86_64
+ chost:amazon/suse-sles-15-sp3-chost-byos-v20220718-hvm-ssd-x86_64
+ chost:amazon/suse-sles-15-sp3-chost-byos-v20220818-hvm-ssd-x86_64
+ chost:amazon/suse-sles-15-sp3-chost-byos-v20220916-hvm-ssd-x86_64
+ chost:amazon/suse-sles-15-sp3-chost-byos-v20220921-hvm-ssd-x86_64
+ chost:amazon/suse-sles-15-sp3-chost-byos-v20221019-hvm-ssd-x86_64
+ chost:amazon/suse-sles-15-sp3-chost-byos-v20221119-hvm-ssd-x86_64
+ chost:amazon/suse-sles-15-sp3-chost-byos-v20221215-hvm-ssd-x86_64
+ chost:amazon/suse-sles-15-sp3-chost-byos-v20230313-hvm-ssd-x86_64
+ chost:amazon/suse-sles-15-sp3-chost-byos-v20230613-hvm-ssd-x86_64
+ chost:amazon/suse-sles-15-sp3-chost-byos-v20240807-hvm-ssd-x86_64
+ chost:amazon/suse-sles-15-sp3-chost-byos-v20240912-hvm-ssd-x86_64
+ chost:amazon/suse-sles-15-sp4-chost-byos-v20220718-hvm-ssd-x86_64
+ chost:amazon/suse-sles-15-sp4-chost-byos-v20220721-hvm-ssd-x86_64
+ chost:amazon/suse-sles-15-sp4-chost-byos-v20220819-hvm-ssd-x86_64
+ chost:amazon/suse-sles-15-sp4-chost-byos-v20220916-hvm-ssd-x86_64
+ chost:amazon/suse-sles-15-sp4-chost-byos-v20220923-hvm-ssd-x86_64
+ chost:amazon/suse-sles-15-sp4-chost-byos-v20221018-hvm-ssd-x86_64
+ chost:amazon/suse-sles-15-sp4-chost-byos-v20221118-hvm-ssd-x86_64
+ chost:amazon/suse-sles-15-sp4-chost-byos-v20221215-hvm-ssd-x86_64
+ chost:amazon/suse-sles-15-sp4-chost-byos-v20230111-hvm-ssd-x86_64
+ chost:amazon/suse-sles-15-sp4-chost-byos-v20230210-hvm-ssd-x86_64
+ chost:amazon/suse-sles-15-sp4-chost-byos-v20230310-hvm-ssd-x86_64
+ chost:amazon/suse-sles-15-sp4-chost-byos-v20230410-hvm-ssd-x86_64
+ chost:amazon/suse-sles-15-sp4-chost-byos-v20230510-hvm-ssd-x86_64
+ chost:amazon/suse-sles-15-sp4-chost-byos-v20230606-hvm-ssd-x86_64
+ chost:amazon/suse-sles-15-sp4-chost-byos-v20230704-hvm-ssd-x86_64
+ chost:amazon/suse-sles-15-sp4-chost-byos-v20230803-hvm-ssd-x86_64
+ chost:amazon/suse-sles-15-sp4-chost-byos-v20230901-hvm-ssd-x86_64
+ chost:amazon/suse-sles-15-sp4-chost-byos-v20230928-hvm-ssd-x86_64
+ chost:amazon/suse-sles-15-sp4-chost-byos-v20231027-hvm-ssd-x86_64
+ chost:amazon/suse-sles-15-sp4-chost-byos-v20231127-hvm-ssd-x86_64
+ chost:amazon/suse-sles-15-sp4-chost-byos-v20231212-hvm-ssd-x86_64
+ chost:amazon/suse-sles-15-sp4-chost-byos-v20240312-hvm-ssd-x86_64
+ chost:amazon/suse-sles-15-sp4-chost-byos-v20240612-hvm-ssd-x86_64
+ chost:amazon/suse-sles-15-sp4-chost-byos-v20240809-hvm-ssd-x86_64
+ chost:amazon/suse-sles-15-sp4-chost-byos-v20240912-hvm-ssd-x86_64
+ chost:google/sles-15-sp1-chost-byos-v20210202
+ chost:google/sles-15-sp1-chost-byos-v20210304
+ chost:google/sles-15-sp1-chost-byos-v20220127
+ chost:google/sles-15-sp1-chost-byos-v20220715-x86-64
+ chost:google/sles-15-sp2-chost-byos-v20210202
+ chost:google/sles-15-sp2-chost-byos-v20210304
+ chost:google/sles-15-sp2-chost-byos-v20210405
+ chost:google/sles-15-sp2-chost-byos-v20210506
+ chost:google/sles-15-sp2-chost-byos-v20210610
+ chost:google/sles-15-sp2-chost-byos-v20210722
+ chost:google/sles-15-sp2-chost-byos-v20210913
+ chost:google/sles-15-sp2-chost-byos-v20211025
+ chost:google/sles-15-sp2-chost-byos-v20220126
+ chost:google/sles-15-sp2-chost-byos-v20220718-x86-64
+ chost:google/sles-15-sp3-chost-byos-v20210729
+ chost:google/sles-15-sp3-chost-byos-v20210827
+ chost:google/sles-15-sp3-chost-byos-v20210927
+ chost:google/sles-15-sp3-chost-byos-v20211004
+ chost:google/sles-15-sp3-chost-byos-v20211101
+ chost:google/sles-15-sp3-chost-byos-v20211202
+ chost:google/sles-15-sp3-chost-byos-v20220103
+ chost:google/sles-15-sp3-chost-byos-v20220126
+ chost:google/sles-15-sp3-chost-byos-v20220222
+ chost:google/sles-15-sp3-chost-byos-v20220310
+ chost:google/sles-15-sp3-chost-byos-v20220411-x86-64
+ chost:google/sles-15-sp3-chost-byos-v20220510-x86-64
+ chost:google/sles-15-sp3-chost-byos-v20220608-x86-64
+ chost:google/sles-15-sp3-chost-byos-v20220708-x86-64
+ chost:google/sles-15-sp3-chost-byos-v20220718-x86-64
+ chost:google/sles-15-sp3-chost-byos-v20220818-x86-64
+ chost:google/sles-15-sp3-chost-byos-v20220916-x86-64
+ chost:google/sles-15-sp3-chost-byos-v20221019-x86-64
+ chost:google/sles-15-sp3-chost-byos-v20221118-x86-64
+ chost:google/sles-15-sp3-chost-byos-v20221215-x86-64
+ chost:google/sles-15-sp3-chost-byos-v20230313-x86-64
+ chost:google/sles-15-sp3-chost-byos-v20230613-x86-64
+ chost:google/sles-15-sp3-chost-byos-v20240807-x86-64
+ chost:google/sles-15-sp3-chost-byos-v20240912-x86-64
+ chost:google/sles-15-sp4-chost-byos-v20220718-x86-64
+ chost:google/sles-15-sp4-chost-byos-v20220721-x86-64
+ chost:google/sles-15-sp4-chost-byos-v20220818-x86-64
+ chost:google/sles-15-sp4-chost-byos-v20220916-x86-64
+ chost:google/sles-15-sp4-chost-byos-v20221018-x86-64
+ chost:google/sles-15-sp4-chost-byos-v20221118-x86-64
+ chost:google/sles-15-sp4-chost-byos-v20221215-arm64
+ chost:google/sles-15-sp4-chost-byos-v20221215-x86-64
+ chost:google/sles-15-sp4-chost-byos-v20230111-arm64
+ chost:google/sles-15-sp4-chost-byos-v20230111-x86-64
+ chost:google/sles-15-sp4-chost-byos-v20230210-arm64
+ chost:google/sles-15-sp4-chost-byos-v20230210-x86-64
+ chost:google/sles-15-sp4-chost-byos-v20230310-arm64
+ chost:google/sles-15-sp4-chost-byos-v20230310-x86-64
+ chost:google/sles-15-sp4-chost-byos-v20230410-arm64
+ chost:google/sles-15-sp4-chost-byos-v20230410-x86-64
+ chost:google/sles-15-sp4-chost-byos-v20230510-arm64
+ chost:google/sles-15-sp4-chost-byos-v20230510-x86-64
+ chost:google/sles-15-sp4-chost-byos-v20230606-arm64
+ chost:google/sles-15-sp4-chost-byos-v20230606-x86-64
+ chost:google/sles-15-sp4-chost-byos-v20230704-arm64
+ chost:google/sles-15-sp4-chost-byos-v20230704-x86-64
+ chost:google/sles-15-sp4-chost-byos-v20230804-arm64
+ chost:google/sles-15-sp4-chost-byos-v20230804-x86-64
+ chost:google/sles-15-sp4-chost-byos-v20230901-arm64
+ chost:google/sles-15-sp4-chost-byos-v20230901-x86-64
+ chost:google/sles-15-sp4-chost-byos-v20230928-arm64
+ chost:google/sles-15-sp4-chost-byos-v20230928-x86-64
+ chost:google/sles-15-sp4-chost-byos-v20231027-arm64
+ chost:google/sles-15-sp4-chost-byos-v20231027-x86-64
+ chost:google/sles-15-sp4-chost-byos-v20231127-arm64
+ chost:google/sles-15-sp4-chost-byos-v20231127-x86-64
+ chost:google/sles-15-sp4-chost-byos-v20231212-arm64
+ chost:google/sles-15-sp4-chost-byos-v20231212-x86-64
+ chost:google/sles-15-sp4-chost-byos-v20240312-arm64
+ chost:google/sles-15-sp4-chost-byos-v20240312-x86-64
+ chost:google/sles-15-sp4-chost-byos-v20240612-arm64
+ chost:google/sles-15-sp4-chost-byos-v20240612-x86-64
+ chost:google/sles-15-sp4-chost-byos-v20240809-arm64
+ chost:google/sles-15-sp4-chost-byos-v20240809-x86-64
+ chost:google/sles-15-sp4-chost-byos-v20240912-arm64
+ chost:google/sles-15-sp4-chost-byos-v20240912-x86-64
+ chost:microsoft/suse-sles-15-sp1-chost-byos-v20210202
+ chost:microsoft/suse-sles-15-sp1-chost-byos-v20210304
+ chost:microsoft/suse-sles-15-sp1-chost-byos-v20220127
+ chost:microsoft/suse-sles-15-sp1-chost-byos-v20220715-x86_64
+ chost:microsoft/suse-sles-15-sp2-chost-byos-v20210202
+ chost:microsoft/suse-sles-15-sp2-chost-byos-v20210304
+ chost:microsoft/suse-sles-15-sp2-chost-byos-v20210405
+ chost:microsoft/suse-sles-15-sp2-chost-byos-v20210506
+ chost:microsoft/suse-sles-15-sp2-chost-byos-v20210610
+ chost:microsoft/suse-sles-15-sp2-chost-byos-v20210722
+ chost:microsoft/suse-sles-15-sp2-chost-byos-v20210913
+ chost:microsoft/suse-sles-15-sp2-chost-byos-v20211025
+ chost:microsoft/suse-sles-15-sp2-chost-byos-v20220126
+ chost:microsoft/suse-sles-15-sp2-chost-byos-v20220718-x86_64
+ chost:microsoft/suse-sles-15-sp3-chost-byos-v20210729
+ chost:microsoft/suse-sles-15-sp3-chost-byos-v20210827
+ chost:microsoft/suse-sles-15-sp3-chost-byos-v20210927
+ chost:microsoft/suse-sles-15-sp3-chost-byos-v20211004
+ chost:microsoft/suse-sles-15-sp3-chost-byos-v20211101
+ chost:microsoft/suse-sles-15-sp3-chost-byos-v20211202
+ chost:microsoft/suse-sles-15-sp3-chost-byos-v20220103
+ chost:microsoft/suse-sles-15-sp3-chost-byos-v20220126
+ chost:microsoft/suse-sles-15-sp3-chost-byos-v20220222
+ chost:microsoft/suse-sles-15-sp3-chost-byos-v20220310
+ chost:microsoft/suse-sles-15-sp3-chost-byos-v20220411-x86_64
+ chost:microsoft/suse-sles-15-sp3-chost-byos-v20220510-x86_64
+ chost:microsoft/suse-sles-15-sp3-chost-byos-v20220609-x86_64
+ chost:microsoft/suse-sles-15-sp3-chost-byos-v20220708-x86_64
+ chost:microsoft/suse-sles-15-sp3-chost-byos-v20220718-x86_64
+ chost:microsoft/suse-sles-15-sp3-chost-byos-v20220818-x86_64
+ chost:microsoft/suse-sles-15-sp3-chost-byos-v20220916-x86_64
+ chost:microsoft/suse-sles-15-sp3-chost-byos-v20220921-x86_64
+ chost:microsoft/suse-sles-15-sp3-chost-byos-v20221019-x86_64
+ chost:microsoft/suse-sles-15-sp3-chost-byos-v20221119-x86_64
+ chost:microsoft/suse-sles-15-sp3-chost-byos-v20221215-x86_64
+ chost:microsoft/suse-sles-15-sp3-chost-byos-v20230313-x86_64
+ chost:microsoft/suse-sles-15-sp3-chost-byos-v20230613-x86_64
+ chost:microsoft/suse-sles-15-sp3-chost-byos-v20240807-x86_64
+ chost:microsoft/suse-sles-15-sp3-chost-byos-v20240912-x86_64
+ chost:microsoft/suse-sles-15-sp4-chost-byos-v20220718-x86_64
+ chost:microsoft/suse-sles-15-sp4-chost-byos-v20220721-x86_64
+ chost:microsoft/suse-sles-15-sp4-chost-byos-v20220819-x86_64
+ chost:microsoft/suse-sles-15-sp4-chost-byos-v20220916-x86_64
+ chost:microsoft/suse-sles-15-sp4-chost-byos-v20220923-x86_64
+ chost:microsoft/suse-sles-15-sp4-chost-byos-v20221018-x86_64
+ chost:microsoft/suse-sles-15-sp4-chost-byos-v20221118-x86_64
+ chost:microsoft/suse-sles-15-sp4-chost-byos-v20221215-arm64
+ chost:microsoft/suse-sles-15-sp4-chost-byos-v20221215-x86_64
+ chost:microsoft/suse-sles-15-sp4-chost-byos-v20230111-arm64
+ chost:microsoft/suse-sles-15-sp4-chost-byos-v20230111-x86_64
+ chost:microsoft/suse-sles-15-sp4-chost-byos-v20230210-arm64
+ chost:microsoft/suse-sles-15-sp4-chost-byos-v20230210-x86_64
+ chost:microsoft/suse-sles-15-sp4-chost-byos-v20230310-arm64
+ chost:microsoft/suse-sles-15-sp4-chost-byos-v20230310-x86_64
+ chost:microsoft/suse-sles-15-sp4-chost-byos-v20230410-arm64
+ chost:microsoft/suse-sles-15-sp4-chost-byos-v20230410-x86_64
+ chost:microsoft/suse-sles-15-sp4-chost-byos-v20230510-arm64
+ chost:microsoft/suse-sles-15-sp4-chost-byos-v20230510-x86_64
+ chost:microsoft/suse-sles-15-sp4-chost-byos-v20230606-arm64
+ chost:microsoft/suse-sles-15-sp4-chost-byos-v20230606-x86_64
+ chost:microsoft/suse-sles-15-sp4-chost-byos-v20230704-arm64
+ chost:microsoft/suse-sles-15-sp4-chost-byos-v20230704-x86_64
+ chost:microsoft/suse-sles-15-sp4-chost-byos-v20230803-arm64
+ chost:microsoft/suse-sles-15-sp4-chost-byos-v20230803-x86_64
+ chost:microsoft/suse-sles-15-sp4-chost-byos-v20230901-arm64
+ chost:microsoft/suse-sles-15-sp4-chost-byos-v20230901-x86_64
+ chost:microsoft/suse-sles-15-sp4-chost-byos-v20230928-arm64
+ chost:microsoft/suse-sles-15-sp4-chost-byos-v20230928-x86_64
+ chost:microsoft/suse-sles-15-sp4-chost-byos-v20231027-arm64
+ chost:microsoft/suse-sles-15-sp4-chost-byos-v20231027-x86_64
+ chost:microsoft/suse-sles-15-sp4-chost-byos-v20231127-arm64
+ chost:microsoft/suse-sles-15-sp4-chost-byos-v20231127-x86_64
+ chost:microsoft/suse-sles-15-sp4-chost-byos-v20231212-arm64
+ chost:microsoft/suse-sles-15-sp4-chost-byos-v20231212-x86_64
+ chost:microsoft/suse-sles-15-sp4-chost-byos-v20240312-arm64
+ chost:microsoft/suse-sles-15-sp4-chost-byos-v20240312-x86_64
+ chost:microsoft/suse-sles-15-sp4-chost-byos-v20240612-arm64
+ chost:microsoft/suse-sles-15-sp4-chost-byos-v20240612-x86_64
+ chost:microsoft/suse-sles-15-sp4-chost-byos-v20240809-arm64
+ chost:microsoft/suse-sles-15-sp4-chost-byos-v20240809-x86_64
+ chost:microsoft/suse-sles-15-sp4-chost-byos-v20240912-arm64
+ chost:microsoft/suse-sles-15-sp4-chost-byos-v20240912-x86_64
+
--- /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2023-45918.xml 2024-10-19 01:38:41.106738000 +0200
+++ /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2023-45918.xml.new 2024-10-29 01:27:35.345070000 +0100
@@ -14,13 +14,13 @@
1
- 77
- 2024-10-18T23:38:40Z
+ 78
+ 2024-10-29T00:27:34Z
current
2024-02-20T00:10:24Z
- 2024-10-18T23:38:40Z
+ 2024-10-29T00:27:34Z
cve-database/bin/generate-cvrf-cve.pl
2020-12-27T01:00:00Z
@@ -28,7 +28,7 @@
CVE-2023-45918
- ncurses 6.4-20230610 has a NULL pointer dereference in tgetstr in tinfo/lib_termcap.c.
+ ** DISPUTED ** ncurses 6.4-20230610 has a NULL pointer dereference in tgetstr in tinfo/lib_termcap.c. NOTE: Multiple third parties have disputed this indicating upstream does not regard it as a security issue.
The CVRF data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
@@ -7053,36 +7053,6 @@
ncurses as a component of SUSE Linux Enterprise Server for SAP Applications 12 SP4
-
- libncurses5 as a component of SUSE Linux Enterprise Server for SAP Applications 12 SP5
-
-
- libncurses5-32bit as a component of SUSE Linux Enterprise Server for SAP Applications 12 SP5
-
-
- libncurses6 as a component of SUSE Linux Enterprise Server for SAP Applications 12 SP5
-
-
- libncurses6-32bit as a component of SUSE Linux Enterprise Server for SAP Applications 12 SP5
-
-
- ncurses-devel as a component of SUSE Linux Enterprise Server for SAP Applications 12 SP5
-
-
- ncurses-devel-32bit as a component of SUSE Linux Enterprise Server for SAP Applications 12 SP5
-
-
- ncurses-utils as a component of SUSE Linux Enterprise Server for SAP Applications 12 SP5
-
-
- tack as a component of SUSE Linux Enterprise Server for SAP Applications 12 SP5
-
-
- terminfo as a component of SUSE Linux Enterprise Server for SAP Applications 12 SP5
-
-
- terminfo-base as a component of SUSE Linux Enterprise Server for SAP Applications 12 SP5
-
ncurses as a component of SUSE Linux Enterprise Server for SAP Applications 12 SP5
@@ -7413,7 +7383,7 @@
- ncurses 6.4-20230610 has a NULL pointer dereference in tgetstr in tinfo/lib_termcap.c.
+ ** DISPUTED ** ncurses 6.4-20230610 has a NULL pointer dereference in tgetstr in tinfo/lib_termcap.c. NOTE: Multiple third parties have disputed this indicating upstream does not regard it as a security issue.
CVE-2023-45918
@@ -8796,17 +8766,7 @@
SUSE Linux Enterprise Server for SAP Applications 12 SP4:tack
SUSE Linux Enterprise Server for SAP Applications 12 SP4:terminfo
SUSE Linux Enterprise Server for SAP Applications 12 SP4:terminfo-base
- SUSE Linux Enterprise Server for SAP Applications 12 SP5:libncurses5
- SUSE Linux Enterprise Server for SAP Applications 12 SP5:libncurses5-32bit
- SUSE Linux Enterprise Server for SAP Applications 12 SP5:libncurses6
- SUSE Linux Enterprise Server for SAP Applications 12 SP5:libncurses6-32bit
SUSE Linux Enterprise Server for SAP Applications 12 SP5:ncurses
- SUSE Linux Enterprise Server for SAP Applications 12 SP5:ncurses-devel
- SUSE Linux Enterprise Server for SAP Applications 12 SP5:ncurses-devel-32bit
- SUSE Linux Enterprise Server for SAP Applications 12 SP5:ncurses-utils
- SUSE Linux Enterprise Server for SAP Applications 12 SP5:tack
- SUSE Linux Enterprise Server for SAP Applications 12 SP5:terminfo
- SUSE Linux Enterprise Server for SAP Applications 12 SP5:terminfo-base
SUSE OpenStack Cloud 9:libncurses5
SUSE OpenStack Cloud 9:libncurses5-32bit
SUSE OpenStack Cloud 9:libncurses6
no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2023-45913
--- /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2023-45913.xml 2024-10-20 01:36:36.492954000 +0200
+++ /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2023-45913.xml.new 2024-10-29 01:27:36.103070000 +0100
@@ -14,13 +14,13 @@
1
- 8
- 2024-10-19T23:36:36Z
+ 9
+ 2024-10-29T00:27:35Z
current
2024-03-28T00:13:33Z
- 2024-10-19T23:36:36Z
+ 2024-10-29T00:27:35Z
cve-database/bin/generate-cvrf-cve.pl
2020-12-27T01:00:00Z
@@ -54,6 +54,16 @@
+
+
+ Image SLES12-SP5-GCE-SAP-BYOS
+
+
+
+
+ Image SLES12-SP5-GCE-SAP-On-Demand
+
+
Image SLES15-SP4-SAP-Azure-LI-BYOS
@@ -334,6 +344,253 @@
openSUSE Leap Micro 5.5
+
+
+ SLES 15 SP1 CHOST Images for Amazon EC2 suse-sles-15-sp1-chost-byos-v20210304-hvm-ssd-x86_64
+ SLES 15 SP1 CHOST Images for Amazon EC2 suse-sles-15-sp1-chost-byos-v20220127-hvm-ssd-x86_64
+ SLES 15 SP1 CHOST Images for Amazon EC2 suse-sles-15-sp1-chost-byos-v20220715-hvm-ssd-x86_64
+
+
+ SLES 15 SP2 CHOST Images for Amazon EC2 suse-sles-15-sp2-chost-byos-v20210610-hvm-ssd-x86_64
+ SLES 15 SP2 CHOST Images for Amazon EC2 suse-sles-15-sp2-chost-byos-v20210722-hvm-ssd-x86_64
+ SLES 15 SP2 CHOST Images for Amazon EC2 suse-sles-15-sp2-chost-byos-v20210913-hvm-ssd-x86_64
+ SLES 15 SP2 CHOST Images for Amazon EC2 suse-sles-15-sp2-chost-byos-v20211025-hvm-ssd-x86_64
+ SLES 15 SP2 CHOST Images for Amazon EC2 suse-sles-15-sp2-chost-byos-v20220126-hvm-ssd-x86_64
+ SLES 15 SP2 CHOST Images for Amazon EC2 suse-sles-15-sp2-chost-byos-v20220718-hvm-ssd-x86_64
+
+
+ SLES 15 SP3 CHOST Images for Amazon EC2 suse-sles-15-sp3-chost-byos-v20210729-hvm-ssd-x86_64
+ SLES 15 SP3 CHOST Images for Amazon EC2 suse-sles-15-sp3-chost-byos-v20210827-hvm-ssd-x86_64
+ SLES 15 SP3 CHOST Images for Amazon EC2 suse-sles-15-sp3-chost-byos-v20210927-hvm-ssd-x86_64
+ SLES 15 SP3 CHOST Images for Amazon EC2 suse-sles-15-sp3-chost-byos-v20211004-hvm-ssd-x86_64
+ SLES 15 SP3 CHOST Images for Amazon EC2 suse-sles-15-sp3-chost-byos-v20211101-hvm-ssd-x86_64
+ SLES 15 SP3 CHOST Images for Amazon EC2 suse-sles-15-sp3-chost-byos-v20211202-hvm-ssd-x86_64
+ SLES 15 SP3 CHOST Images for Amazon EC2 suse-sles-15-sp3-chost-byos-v20220103-hvm-ssd-x86_64
+ SLES 15 SP3 CHOST Images for Amazon EC2 suse-sles-15-sp3-chost-byos-v20220126-hvm-ssd-x86_64
+ SLES 15 SP3 CHOST Images for Amazon EC2 suse-sles-15-sp3-chost-byos-v20220222-hvm-ssd-x86_64
+ SLES 15 SP3 CHOST Images for Amazon EC2 suse-sles-15-sp3-chost-byos-v20220310-hvm-ssd-x86_64
+ SLES 15 SP3 CHOST Images for Amazon EC2 suse-sles-15-sp3-chost-byos-v20220411-hvm-ssd-x86_64
+ SLES 15 SP3 CHOST Images for Amazon EC2 suse-sles-15-sp3-chost-byos-v20220510-hvm-ssd-x86_64
+ SLES 15 SP3 CHOST Images for Amazon EC2 suse-sles-15-sp3-chost-byos-v20220608-hvm-ssd-x86_64
+ SLES 15 SP3 CHOST Images for Amazon EC2 suse-sles-15-sp3-chost-byos-v20220708-hvm-ssd-x86_64
+ SLES 15 SP3 CHOST Images for Amazon EC2 suse-sles-15-sp3-chost-byos-v20220718-hvm-ssd-x86_64
+ SLES 15 SP3 CHOST Images for Amazon EC2 suse-sles-15-sp3-chost-byos-v20220818-hvm-ssd-x86_64
+ SLES 15 SP3 CHOST Images for Amazon EC2 suse-sles-15-sp3-chost-byos-v20220916-hvm-ssd-x86_64
+ SLES 15 SP3 CHOST Images for Amazon EC2 suse-sles-15-sp3-chost-byos-v20220921-hvm-ssd-x86_64
+ SLES 15 SP3 CHOST Images for Amazon EC2 suse-sles-15-sp3-chost-byos-v20221019-hvm-ssd-x86_64
+ SLES 15 SP3 CHOST Images for Amazon EC2 suse-sles-15-sp3-chost-byos-v20221119-hvm-ssd-x86_64
+ SLES 15 SP3 CHOST Images for Amazon EC2 suse-sles-15-sp3-chost-byos-v20221215-hvm-ssd-x86_64
+ SLES 15 SP3 CHOST Images for Amazon EC2 suse-sles-15-sp3-chost-byos-v20230313-hvm-ssd-x86_64
+ SLES 15 SP3 CHOST Images for Amazon EC2 suse-sles-15-sp3-chost-byos-v20230613-hvm-ssd-x86_64
+ SLES 15 SP3 CHOST Images for Amazon EC2 suse-sles-15-sp3-chost-byos-v20240807-hvm-ssd-x86_64
+ SLES 15 SP3 CHOST Images for Amazon EC2 suse-sles-15-sp3-chost-byos-v20240912-hvm-ssd-x86_64
+
+
+ SLES 15 SP4 CHOST Images for Amazon EC2 suse-sles-15-sp4-chost-byos-v20220718-hvm-ssd-x86_64
+ SLES 15 SP4 CHOST Images for Amazon EC2 suse-sles-15-sp4-chost-byos-v20220721-hvm-ssd-x86_64
+ SLES 15 SP4 CHOST Images for Amazon EC2 suse-sles-15-sp4-chost-byos-v20220819-hvm-ssd-x86_64
+ SLES 15 SP4 CHOST Images for Amazon EC2 suse-sles-15-sp4-chost-byos-v20220916-hvm-ssd-x86_64
+ SLES 15 SP4 CHOST Images for Amazon EC2 suse-sles-15-sp4-chost-byos-v20220923-hvm-ssd-x86_64
+ SLES 15 SP4 CHOST Images for Amazon EC2 suse-sles-15-sp4-chost-byos-v20221018-hvm-ssd-x86_64
+ SLES 15 SP4 CHOST Images for Amazon EC2 suse-sles-15-sp4-chost-byos-v20221118-hvm-ssd-x86_64
+ SLES 15 SP4 CHOST Images for Amazon EC2 suse-sles-15-sp4-chost-byos-v20221215-hvm-ssd-x86_64
+ SLES 15 SP4 CHOST Images for Amazon EC2 suse-sles-15-sp4-chost-byos-v20230111-hvm-ssd-x86_64
+ SLES 15 SP4 CHOST Images for Amazon EC2 suse-sles-15-sp4-chost-byos-v20230210-hvm-ssd-x86_64
+ SLES 15 SP4 CHOST Images for Amazon EC2 suse-sles-15-sp4-chost-byos-v20230310-hvm-ssd-x86_64
+ SLES 15 SP4 CHOST Images for Amazon EC2 suse-sles-15-sp4-chost-byos-v20230410-hvm-ssd-x86_64
+ SLES 15 SP4 CHOST Images for Amazon EC2 suse-sles-15-sp4-chost-byos-v20230510-hvm-ssd-x86_64
+ SLES 15 SP4 CHOST Images for Amazon EC2 suse-sles-15-sp4-chost-byos-v20230606-hvm-ssd-x86_64
+ SLES 15 SP4 CHOST Images for Amazon EC2 suse-sles-15-sp4-chost-byos-v20230704-hvm-ssd-x86_64
+ SLES 15 SP4 CHOST Images for Amazon EC2 suse-sles-15-sp4-chost-byos-v20230803-hvm-ssd-x86_64
+ SLES 15 SP4 CHOST Images for Amazon EC2 suse-sles-15-sp4-chost-byos-v20230901-hvm-ssd-x86_64
+ SLES 15 SP4 CHOST Images for Amazon EC2 suse-sles-15-sp4-chost-byos-v20230928-hvm-ssd-x86_64
+ SLES 15 SP4 CHOST Images for Amazon EC2 suse-sles-15-sp4-chost-byos-v20231027-hvm-ssd-x86_64
+ SLES 15 SP4 CHOST Images for Amazon EC2 suse-sles-15-sp4-chost-byos-v20231127-hvm-ssd-x86_64
+ SLES 15 SP4 CHOST Images for Amazon EC2 suse-sles-15-sp4-chost-byos-v20231212-hvm-ssd-x86_64
+ SLES 15 SP4 CHOST Images for Amazon EC2 suse-sles-15-sp4-chost-byos-v20240312-hvm-ssd-x86_64
+ SLES 15 SP4 CHOST Images for Amazon EC2 suse-sles-15-sp4-chost-byos-v20240612-hvm-ssd-x86_64
+ SLES 15 SP4 CHOST Images for Amazon EC2 suse-sles-15-sp4-chost-byos-v20240809-hvm-ssd-x86_64
+ SLES 15 SP4 CHOST Images for Amazon EC2 suse-sles-15-sp4-chost-byos-v20240912-hvm-ssd-x86_64
+
+
+ SLES 15 SP1 CHOST Images for Google sles-15-sp1-chost-byos-v20210202
+ SLES 15 SP1 CHOST Images for Google sles-15-sp1-chost-byos-v20210304
+ SLES 15 SP1 CHOST Images for Google sles-15-sp1-chost-byos-v20220127
+ SLES 15 SP1 CHOST Images for Google sles-15-sp1-chost-byos-v20220715-x86-64
+
+
+ SLES 15 SP2 CHOST Images for Google sles-15-sp2-chost-byos-v20210202
+ SLES 15 SP2 CHOST Images for Google sles-15-sp2-chost-byos-v20210304
+ SLES 15 SP2 CHOST Images for Google sles-15-sp2-chost-byos-v20210405
+ SLES 15 SP2 CHOST Images for Google sles-15-sp2-chost-byos-v20210506
+ SLES 15 SP2 CHOST Images for Google sles-15-sp2-chost-byos-v20210610
+ SLES 15 SP2 CHOST Images for Google sles-15-sp2-chost-byos-v20210722
+ SLES 15 SP2 CHOST Images for Google sles-15-sp2-chost-byos-v20210913
+ SLES 15 SP2 CHOST Images for Google sles-15-sp2-chost-byos-v20211025
+ SLES 15 SP2 CHOST Images for Google sles-15-sp2-chost-byos-v20220126
+ SLES 15 SP2 CHOST Images for Google sles-15-sp2-chost-byos-v20220718-x86-64
+
+
+ SLES 15 SP3 CHOST Images for Google sles-15-sp3-chost-byos-v20210729
+ SLES 15 SP3 CHOST Images for Google sles-15-sp3-chost-byos-v20210827
+ SLES 15 SP3 CHOST Images for Google sles-15-sp3-chost-byos-v20210927
+ SLES 15 SP3 CHOST Images for Google sles-15-sp3-chost-byos-v20211004
+ SLES 15 SP3 CHOST Images for Google sles-15-sp3-chost-byos-v20211101
+ SLES 15 SP3 CHOST Images for Google sles-15-sp3-chost-byos-v20211202
+ SLES 15 SP3 CHOST Images for Google sles-15-sp3-chost-byos-v20220103
+ SLES 15 SP3 CHOST Images for Google sles-15-sp3-chost-byos-v20220126
+ SLES 15 SP3 CHOST Images for Google sles-15-sp3-chost-byos-v20220222
+ SLES 15 SP3 CHOST Images for Google sles-15-sp3-chost-byos-v20220310
+ SLES 15 SP3 CHOST Images for Google sles-15-sp3-chost-byos-v20220411-x86-64
+ SLES 15 SP3 CHOST Images for Google sles-15-sp3-chost-byos-v20220510-x86-64
+ SLES 15 SP3 CHOST Images for Google sles-15-sp3-chost-byos-v20220608-x86-64
+ SLES 15 SP3 CHOST Images for Google sles-15-sp3-chost-byos-v20220708-x86-64
+ SLES 15 SP3 CHOST Images for Google sles-15-sp3-chost-byos-v20220718-x86-64
+ SLES 15 SP3 CHOST Images for Google sles-15-sp3-chost-byos-v20220818-x86-64
+ SLES 15 SP3 CHOST Images for Google sles-15-sp3-chost-byos-v20220916-x86-64
+ SLES 15 SP3 CHOST Images for Google sles-15-sp3-chost-byos-v20221019-x86-64
+ SLES 15 SP3 CHOST Images for Google sles-15-sp3-chost-byos-v20221118-x86-64
+ SLES 15 SP3 CHOST Images for Google sles-15-sp3-chost-byos-v20221215-x86-64
+ SLES 15 SP3 CHOST Images for Google sles-15-sp3-chost-byos-v20230313-x86-64
+ SLES 15 SP3 CHOST Images for Google sles-15-sp3-chost-byos-v20230613-x86-64
+ SLES 15 SP3 CHOST Images for Google sles-15-sp3-chost-byos-v20240807-x86-64
+ SLES 15 SP3 CHOST Images for Google sles-15-sp3-chost-byos-v20240912-x86-64
+
+
+ SLES 15 SP4 CHOST Images for Google sles-15-sp4-chost-byos-v20220718-x86-64
+ SLES 15 SP4 CHOST Images for Google sles-15-sp4-chost-byos-v20220721-x86-64
+ SLES 15 SP4 CHOST Images for Google sles-15-sp4-chost-byos-v20220818-x86-64
+ SLES 15 SP4 CHOST Images for Google sles-15-sp4-chost-byos-v20220916-x86-64
+ SLES 15 SP4 CHOST Images for Google sles-15-sp4-chost-byos-v20221018-x86-64
+ SLES 15 SP4 CHOST Images for Google sles-15-sp4-chost-byos-v20221118-x86-64
+ SLES 15 SP4 CHOST Images for Google sles-15-sp4-chost-byos-v20221215-arm64
+ SLES 15 SP4 CHOST Images for Google sles-15-sp4-chost-byos-v20221215-x86-64
+ SLES 15 SP4 CHOST Images for Google sles-15-sp4-chost-byos-v20230111-arm64
+ SLES 15 SP4 CHOST Images for Google sles-15-sp4-chost-byos-v20230111-x86-64
+ SLES 15 SP4 CHOST Images for Google sles-15-sp4-chost-byos-v20230210-arm64
+ SLES 15 SP4 CHOST Images for Google sles-15-sp4-chost-byos-v20230210-x86-64
+ SLES 15 SP4 CHOST Images for Google sles-15-sp4-chost-byos-v20230310-arm64
+ SLES 15 SP4 CHOST Images for Google sles-15-sp4-chost-byos-v20230310-x86-64
+ SLES 15 SP4 CHOST Images for Google sles-15-sp4-chost-byos-v20230410-arm64
+ SLES 15 SP4 CHOST Images for Google sles-15-sp4-chost-byos-v20230410-x86-64
+ SLES 15 SP4 CHOST Images for Google sles-15-sp4-chost-byos-v20230510-arm64
+ SLES 15 SP4 CHOST Images for Google sles-15-sp4-chost-byos-v20230510-x86-64
+ SLES 15 SP4 CHOST Images for Google sles-15-sp4-chost-byos-v20230606-arm64
+ SLES 15 SP4 CHOST Images for Google sles-15-sp4-chost-byos-v20230606-x86-64
+ SLES 15 SP4 CHOST Images for Google sles-15-sp4-chost-byos-v20230704-arm64
+ SLES 15 SP4 CHOST Images for Google sles-15-sp4-chost-byos-v20230704-x86-64
+ SLES 15 SP4 CHOST Images for Google sles-15-sp4-chost-byos-v20230804-arm64
+ SLES 15 SP4 CHOST Images for Google sles-15-sp4-chost-byos-v20230804-x86-64
+ SLES 15 SP4 CHOST Images for Google sles-15-sp4-chost-byos-v20230901-arm64
+ SLES 15 SP4 CHOST Images for Google sles-15-sp4-chost-byos-v20230901-x86-64
+ SLES 15 SP4 CHOST Images for Google sles-15-sp4-chost-byos-v20230928-arm64
+ SLES 15 SP4 CHOST Images for Google sles-15-sp4-chost-byos-v20230928-x86-64
+ SLES 15 SP4 CHOST Images for Google sles-15-sp4-chost-byos-v20231027-arm64
+ SLES 15 SP4 CHOST Images for Google sles-15-sp4-chost-byos-v20231027-x86-64
+ SLES 15 SP4 CHOST Images for Google sles-15-sp4-chost-byos-v20231127-arm64
+ SLES 15 SP4 CHOST Images for Google sles-15-sp4-chost-byos-v20231127-x86-64
+ SLES 15 SP4 CHOST Images for Google sles-15-sp4-chost-byos-v20231212-arm64
+ SLES 15 SP4 CHOST Images for Google sles-15-sp4-chost-byos-v20231212-x86-64
+ SLES 15 SP4 CHOST Images for Google sles-15-sp4-chost-byos-v20240312-arm64
+ SLES 15 SP4 CHOST Images for Google sles-15-sp4-chost-byos-v20240312-x86-64
+ SLES 15 SP4 CHOST Images for Google sles-15-sp4-chost-byos-v20240612-arm64
+ SLES 15 SP4 CHOST Images for Google sles-15-sp4-chost-byos-v20240612-x86-64
+ SLES 15 SP4 CHOST Images for Google sles-15-sp4-chost-byos-v20240809-arm64
+ SLES 15 SP4 CHOST Images for Google sles-15-sp4-chost-byos-v20240809-x86-64
+ SLES 15 SP4 CHOST Images for Google sles-15-sp4-chost-byos-v20240912-arm64
+ SLES 15 SP4 CHOST Images for Google sles-15-sp4-chost-byos-v20240912-x86-64
+
+
+ SLES 15 SP1 CHOST Images for Microsoft Azure suse-sles-15-sp1-chost-byos-v20210202
+ SLES 15 SP1 CHOST Images for Microsoft Azure suse-sles-15-sp1-chost-byos-v20210304
+ SLES 15 SP1 CHOST Images for Microsoft Azure suse-sles-15-sp1-chost-byos-v20220127
+ SLES 15 SP1 CHOST Images for Microsoft Azure suse-sles-15-sp1-chost-byos-v20220715-x86_64
+
+
+ SLES 15 SP2 CHOST Images for Microsoft Azure suse-sles-15-sp2-chost-byos-v20210202
+ SLES 15 SP2 CHOST Images for Microsoft Azure suse-sles-15-sp2-chost-byos-v20210304
+ SLES 15 SP2 CHOST Images for Microsoft Azure suse-sles-15-sp2-chost-byos-v20210405
+ SLES 15 SP2 CHOST Images for Microsoft Azure suse-sles-15-sp2-chost-byos-v20210506
+ SLES 15 SP2 CHOST Images for Microsoft Azure suse-sles-15-sp2-chost-byos-v20210610
+ SLES 15 SP2 CHOST Images for Microsoft Azure suse-sles-15-sp2-chost-byos-v20210722
+ SLES 15 SP2 CHOST Images for Microsoft Azure suse-sles-15-sp2-chost-byos-v20210913
+ SLES 15 SP2 CHOST Images for Microsoft Azure suse-sles-15-sp2-chost-byos-v20211025
+ SLES 15 SP2 CHOST Images for Microsoft Azure suse-sles-15-sp2-chost-byos-v20220126
+ SLES 15 SP2 CHOST Images for Microsoft Azure suse-sles-15-sp2-chost-byos-v20220718-x86_64
+
+
+ SLES 15 SP3 CHOST Images for Microsoft Azure suse-sles-15-sp3-chost-byos-v20210729
+ SLES 15 SP3 CHOST Images for Microsoft Azure suse-sles-15-sp3-chost-byos-v20210827
+ SLES 15 SP3 CHOST Images for Microsoft Azure suse-sles-15-sp3-chost-byos-v20210927
+ SLES 15 SP3 CHOST Images for Microsoft Azure suse-sles-15-sp3-chost-byos-v20211004
+ SLES 15 SP3 CHOST Images for Microsoft Azure suse-sles-15-sp3-chost-byos-v20211101
+ SLES 15 SP3 CHOST Images for Microsoft Azure suse-sles-15-sp3-chost-byos-v20211202
+ SLES 15 SP3 CHOST Images for Microsoft Azure suse-sles-15-sp3-chost-byos-v20220103
+ SLES 15 SP3 CHOST Images for Microsoft Azure suse-sles-15-sp3-chost-byos-v20220126
+ SLES 15 SP3 CHOST Images for Microsoft Azure suse-sles-15-sp3-chost-byos-v20220222
+ SLES 15 SP3 CHOST Images for Microsoft Azure suse-sles-15-sp3-chost-byos-v20220310
+ SLES 15 SP3 CHOST Images for Microsoft Azure suse-sles-15-sp3-chost-byos-v20220411-x86_64
+ SLES 15 SP3 CHOST Images for Microsoft Azure suse-sles-15-sp3-chost-byos-v20220510-x86_64
+ SLES 15 SP3 CHOST Images for Microsoft Azure suse-sles-15-sp3-chost-byos-v20220609-x86_64
+ SLES 15 SP3 CHOST Images for Microsoft Azure suse-sles-15-sp3-chost-byos-v20220708-x86_64
+ SLES 15 SP3 CHOST Images for Microsoft Azure suse-sles-15-sp3-chost-byos-v20220718-x86_64
+ SLES 15 SP3 CHOST Images for Microsoft Azure suse-sles-15-sp3-chost-byos-v20220818-x86_64
+ SLES 15 SP3 CHOST Images for Microsoft Azure suse-sles-15-sp3-chost-byos-v20220916-x86_64
+ SLES 15 SP3 CHOST Images for Microsoft Azure suse-sles-15-sp3-chost-byos-v20220921-x86_64
+ SLES 15 SP3 CHOST Images for Microsoft Azure suse-sles-15-sp3-chost-byos-v20221019-x86_64
+ SLES 15 SP3 CHOST Images for Microsoft Azure suse-sles-15-sp3-chost-byos-v20221119-x86_64
+ SLES 15 SP3 CHOST Images for Microsoft Azure suse-sles-15-sp3-chost-byos-v20221215-x86_64
+ SLES 15 SP3 CHOST Images for Microsoft Azure suse-sles-15-sp3-chost-byos-v20230313-x86_64
+ SLES 15 SP3 CHOST Images for Microsoft Azure suse-sles-15-sp3-chost-byos-v20230613-x86_64
+ SLES 15 SP3 CHOST Images for Microsoft Azure suse-sles-15-sp3-chost-byos-v20240807-x86_64
+ SLES 15 SP3 CHOST Images for Microsoft Azure suse-sles-15-sp3-chost-byos-v20240912-x86_64
+
+
+ SLES 15 SP4 CHOST Images for Microsoft Azure suse-sles-15-sp4-chost-byos-v20220718-x86_64
+ SLES 15 SP4 CHOST Images for Microsoft Azure suse-sles-15-sp4-chost-byos-v20220721-x86_64
+ SLES 15 SP4 CHOST Images for Microsoft Azure suse-sles-15-sp4-chost-byos-v20220819-x86_64
+ SLES 15 SP4 CHOST Images for Microsoft Azure suse-sles-15-sp4-chost-byos-v20220916-x86_64
+ SLES 15 SP4 CHOST Images for Microsoft Azure suse-sles-15-sp4-chost-byos-v20220923-x86_64
+ SLES 15 SP4 CHOST Images for Microsoft Azure suse-sles-15-sp4-chost-byos-v20221018-x86_64
+ SLES 15 SP4 CHOST Images for Microsoft Azure suse-sles-15-sp4-chost-byos-v20221118-x86_64
+ SLES 15 SP4 CHOST Images for Microsoft Azure suse-sles-15-sp4-chost-byos-v20221215-arm64
+ SLES 15 SP4 CHOST Images for Microsoft Azure suse-sles-15-sp4-chost-byos-v20221215-x86_64
+ SLES 15 SP4 CHOST Images for Microsoft Azure suse-sles-15-sp4-chost-byos-v20230111-arm64
+ SLES 15 SP4 CHOST Images for Microsoft Azure suse-sles-15-sp4-chost-byos-v20230111-x86_64
+ SLES 15 SP4 CHOST Images for Microsoft Azure suse-sles-15-sp4-chost-byos-v20230210-arm64
+ SLES 15 SP4 CHOST Images for Microsoft Azure suse-sles-15-sp4-chost-byos-v20230210-x86_64
+ SLES 15 SP4 CHOST Images for Microsoft Azure suse-sles-15-sp4-chost-byos-v20230310-arm64
+ SLES 15 SP4 CHOST Images for Microsoft Azure suse-sles-15-sp4-chost-byos-v20230310-x86_64
+ SLES 15 SP4 CHOST Images for Microsoft Azure suse-sles-15-sp4-chost-byos-v20230410-arm64
+ SLES 15 SP4 CHOST Images for Microsoft Azure suse-sles-15-sp4-chost-byos-v20230410-x86_64
+ SLES 15 SP4 CHOST Images for Microsoft Azure suse-sles-15-sp4-chost-byos-v20230510-arm64
+ SLES 15 SP4 CHOST Images for Microsoft Azure suse-sles-15-sp4-chost-byos-v20230510-x86_64
+ SLES 15 SP4 CHOST Images for Microsoft Azure suse-sles-15-sp4-chost-byos-v20230606-arm64
+ SLES 15 SP4 CHOST Images for Microsoft Azure suse-sles-15-sp4-chost-byos-v20230606-x86_64
+ SLES 15 SP4 CHOST Images for Microsoft Azure suse-sles-15-sp4-chost-byos-v20230704-arm64
+ SLES 15 SP4 CHOST Images for Microsoft Azure suse-sles-15-sp4-chost-byos-v20230704-x86_64
+ SLES 15 SP4 CHOST Images for Microsoft Azure suse-sles-15-sp4-chost-byos-v20230803-arm64
+ SLES 15 SP4 CHOST Images for Microsoft Azure suse-sles-15-sp4-chost-byos-v20230803-x86_64
+ SLES 15 SP4 CHOST Images for Microsoft Azure suse-sles-15-sp4-chost-byos-v20230901-arm64
+ SLES 15 SP4 CHOST Images for Microsoft Azure suse-sles-15-sp4-chost-byos-v20230901-x86_64
+ SLES 15 SP4 CHOST Images for Microsoft Azure suse-sles-15-sp4-chost-byos-v20230928-arm64
+ SLES 15 SP4 CHOST Images for Microsoft Azure suse-sles-15-sp4-chost-byos-v20230928-x86_64
+ SLES 15 SP4 CHOST Images for Microsoft Azure suse-sles-15-sp4-chost-byos-v20231027-arm64
+ SLES 15 SP4 CHOST Images for Microsoft Azure suse-sles-15-sp4-chost-byos-v20231027-x86_64
+ SLES 15 SP4 CHOST Images for Microsoft Azure suse-sles-15-sp4-chost-byos-v20231127-arm64
+ SLES 15 SP4 CHOST Images for Microsoft Azure suse-sles-15-sp4-chost-byos-v20231127-x86_64
+ SLES 15 SP4 CHOST Images for Microsoft Azure suse-sles-15-sp4-chost-byos-v20231212-arm64
+ SLES 15 SP4 CHOST Images for Microsoft Azure suse-sles-15-sp4-chost-byos-v20231212-x86_64
+ SLES 15 SP4 CHOST Images for Microsoft Azure suse-sles-15-sp4-chost-byos-v20240312-arm64
+ SLES 15 SP4 CHOST Images for Microsoft Azure suse-sles-15-sp4-chost-byos-v20240312-x86_64
+ SLES 15 SP4 CHOST Images for Microsoft Azure suse-sles-15-sp4-chost-byos-v20240612-arm64
+ SLES 15 SP4 CHOST Images for Microsoft Azure suse-sles-15-sp4-chost-byos-v20240612-x86_64
+ SLES 15 SP4 CHOST Images for Microsoft Azure suse-sles-15-sp4-chost-byos-v20240809-arm64
+ SLES 15 SP4 CHOST Images for Microsoft Azure suse-sles-15-sp4-chost-byos-v20240809-x86_64
+ SLES 15 SP4 CHOST Images for Microsoft Azure suse-sles-15-sp4-chost-byos-v20240912-arm64
+ SLES 15 SP4 CHOST Images for Microsoft Azure suse-sles-15-sp4-chost-byos-v20240912-x86_64
+
+
Mesa
@@ -1054,6 +1311,42 @@
libxatracker2-1.0.0-150600.83.3.1
+
+ Mesa-18.3.2-14.9.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ Mesa-dri-18.3.2-14.9.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ Mesa-libEGL1-18.3.2-14.9.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ Mesa-libGL1-18.3.2-14.9.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ Mesa-libglapi0-18.3.2-14.9.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ libgbm1-18.3.2-14.9.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ Mesa-18.3.2-14.9.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
+
+ Mesa-dri-18.3.2-14.9.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
+
+ Mesa-libEGL1-18.3.2-14.9.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
+
+ Mesa-libGL1-18.3.2-14.9.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
+
+ Mesa-libglapi0-18.3.2-14.9.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
+
+ libgbm1-18.3.2-14.9.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
libgbm1-21.2.4-150400.68.15.1 as a component of Image SLES15-SP4-SAP-Azure-LI-BYOS
@@ -2935,36 +3228,6 @@
Mesa as a component of SUSE Linux Enterprise Server for SAP Applications 12 SP5
-
- Mesa-32bit as a component of SUSE Linux Enterprise Server for SAP Applications 12 SP5
-
-
- Mesa-libEGL1 as a component of SUSE Linux Enterprise Server for SAP Applications 12 SP5
-
-
- Mesa-libEGL1-32bit as a component of SUSE Linux Enterprise Server for SAP Applications 12 SP5
-
-
- Mesa-libGL1 as a component of SUSE Linux Enterprise Server for SAP Applications 12 SP5
-
-
- Mesa-libGL1-32bit as a component of SUSE Linux Enterprise Server for SAP Applications 12 SP5
-
-
- Mesa-libGLESv2-2 as a component of SUSE Linux Enterprise Server for SAP Applications 12 SP5
-
-
- Mesa-libglapi0 as a component of SUSE Linux Enterprise Server for SAP Applications 12 SP5
-
-
- Mesa-libglapi0-32bit as a component of SUSE Linux Enterprise Server for SAP Applications 12 SP5
-
-
- libgbm1 as a component of SUSE Linux Enterprise Server for SAP Applications 12 SP5
-
-
- libgbm1-32bit as a component of SUSE Linux Enterprise Server for SAP Applications 12 SP5
-
Mesa as a component of SUSE Linux Enterprise Server for SAP Applications 15 SP2
@@ -3441,6 +3704,18 @@
CVE-2023-45913
+ Image SLES12-SP5-GCE-SAP-BYOS:Mesa-18.3.2-14.9.1
+ Image SLES12-SP5-GCE-SAP-BYOS:Mesa-dri-18.3.2-14.9.1
+ Image SLES12-SP5-GCE-SAP-BYOS:Mesa-libEGL1-18.3.2-14.9.1
+ Image SLES12-SP5-GCE-SAP-BYOS:Mesa-libGL1-18.3.2-14.9.1
+ Image SLES12-SP5-GCE-SAP-BYOS:Mesa-libglapi0-18.3.2-14.9.1
+ Image SLES12-SP5-GCE-SAP-BYOS:libgbm1-18.3.2-14.9.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:Mesa-18.3.2-14.9.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:Mesa-dri-18.3.2-14.9.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:Mesa-libEGL1-18.3.2-14.9.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:Mesa-libGL1-18.3.2-14.9.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:Mesa-libglapi0-18.3.2-14.9.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:libgbm1-18.3.2-14.9.1
Image SLES15-SP4-SAP-Azure-LI-BYOS:libgbm1-21.2.4-150400.68.15.1
Image SLES15-SP4-SAP-Azure-LI-BYOS-Production:libgbm1-21.2.4-150400.68.15.1
Image SLES15-SP4-SAP-Azure-VLI-BYOS:libgbm1-21.2.4-150400.68.15.1
@@ -3782,6 +4057,229 @@
openSUSE Leap Micro 5.5:Mesa-libglapi0-22.3.5-150500.77.5.1
openSUSE Leap Micro 5.5:libgbm1-22.3.5-150500.77.5.1
+
+ chost:amazon/suse-sles-15-sp1-chost-byos-v20210304-hvm-ssd-x86_64
+ chost:amazon/suse-sles-15-sp1-chost-byos-v20220127-hvm-ssd-x86_64
+ chost:amazon/suse-sles-15-sp1-chost-byos-v20220715-hvm-ssd-x86_64
+ chost:amazon/suse-sles-15-sp2-chost-byos-v20210610-hvm-ssd-x86_64
+ chost:amazon/suse-sles-15-sp2-chost-byos-v20210722-hvm-ssd-x86_64
+ chost:amazon/suse-sles-15-sp2-chost-byos-v20210913-hvm-ssd-x86_64
+ chost:amazon/suse-sles-15-sp2-chost-byos-v20211025-hvm-ssd-x86_64
+ chost:amazon/suse-sles-15-sp2-chost-byos-v20220126-hvm-ssd-x86_64
+ chost:amazon/suse-sles-15-sp2-chost-byos-v20220718-hvm-ssd-x86_64
+ chost:amazon/suse-sles-15-sp3-chost-byos-v20210729-hvm-ssd-x86_64
+ chost:amazon/suse-sles-15-sp3-chost-byos-v20210827-hvm-ssd-x86_64
+ chost:amazon/suse-sles-15-sp3-chost-byos-v20210927-hvm-ssd-x86_64
+ chost:amazon/suse-sles-15-sp3-chost-byos-v20211004-hvm-ssd-x86_64
+ chost:amazon/suse-sles-15-sp3-chost-byos-v20211101-hvm-ssd-x86_64
+ chost:amazon/suse-sles-15-sp3-chost-byos-v20211202-hvm-ssd-x86_64
+ chost:amazon/suse-sles-15-sp3-chost-byos-v20220103-hvm-ssd-x86_64
+ chost:amazon/suse-sles-15-sp3-chost-byos-v20220126-hvm-ssd-x86_64
+ chost:amazon/suse-sles-15-sp3-chost-byos-v20220222-hvm-ssd-x86_64
+ chost:amazon/suse-sles-15-sp3-chost-byos-v20220310-hvm-ssd-x86_64
+ chost:amazon/suse-sles-15-sp3-chost-byos-v20220411-hvm-ssd-x86_64
+ chost:amazon/suse-sles-15-sp3-chost-byos-v20220510-hvm-ssd-x86_64
+ chost:amazon/suse-sles-15-sp3-chost-byos-v20220608-hvm-ssd-x86_64
+ chost:amazon/suse-sles-15-sp3-chost-byos-v20220708-hvm-ssd-x86_64
+ chost:amazon/suse-sles-15-sp3-chost-byos-v20220718-hvm-ssd-x86_64
+ chost:amazon/suse-sles-15-sp3-chost-byos-v20220818-hvm-ssd-x86_64
+ chost:amazon/suse-sles-15-sp3-chost-byos-v20220916-hvm-ssd-x86_64
+ chost:amazon/suse-sles-15-sp3-chost-byos-v20220921-hvm-ssd-x86_64
+ chost:amazon/suse-sles-15-sp3-chost-byos-v20221019-hvm-ssd-x86_64
+ chost:amazon/suse-sles-15-sp3-chost-byos-v20221119-hvm-ssd-x86_64
+ chost:amazon/suse-sles-15-sp3-chost-byos-v20221215-hvm-ssd-x86_64
+ chost:amazon/suse-sles-15-sp3-chost-byos-v20230313-hvm-ssd-x86_64
+ chost:amazon/suse-sles-15-sp3-chost-byos-v20230613-hvm-ssd-x86_64
+ chost:amazon/suse-sles-15-sp3-chost-byos-v20240807-hvm-ssd-x86_64
+ chost:amazon/suse-sles-15-sp3-chost-byos-v20240912-hvm-ssd-x86_64
+ chost:amazon/suse-sles-15-sp4-chost-byos-v20220718-hvm-ssd-x86_64
+ chost:amazon/suse-sles-15-sp4-chost-byos-v20220721-hvm-ssd-x86_64
+ chost:amazon/suse-sles-15-sp4-chost-byos-v20220819-hvm-ssd-x86_64
+ chost:amazon/suse-sles-15-sp4-chost-byos-v20220916-hvm-ssd-x86_64
+ chost:amazon/suse-sles-15-sp4-chost-byos-v20220923-hvm-ssd-x86_64
+ chost:amazon/suse-sles-15-sp4-chost-byos-v20221018-hvm-ssd-x86_64
+ chost:amazon/suse-sles-15-sp4-chost-byos-v20221118-hvm-ssd-x86_64
+ chost:amazon/suse-sles-15-sp4-chost-byos-v20221215-hvm-ssd-x86_64
+ chost:amazon/suse-sles-15-sp4-chost-byos-v20230111-hvm-ssd-x86_64
+ chost:amazon/suse-sles-15-sp4-chost-byos-v20230210-hvm-ssd-x86_64
+ chost:amazon/suse-sles-15-sp4-chost-byos-v20230310-hvm-ssd-x86_64
+ chost:amazon/suse-sles-15-sp4-chost-byos-v20230410-hvm-ssd-x86_64
+ chost:amazon/suse-sles-15-sp4-chost-byos-v20230510-hvm-ssd-x86_64
+ chost:amazon/suse-sles-15-sp4-chost-byos-v20230606-hvm-ssd-x86_64
+ chost:amazon/suse-sles-15-sp4-chost-byos-v20230704-hvm-ssd-x86_64
+ chost:amazon/suse-sles-15-sp4-chost-byos-v20230803-hvm-ssd-x86_64
+ chost:amazon/suse-sles-15-sp4-chost-byos-v20230901-hvm-ssd-x86_64
+ chost:amazon/suse-sles-15-sp4-chost-byos-v20230928-hvm-ssd-x86_64
+ chost:amazon/suse-sles-15-sp4-chost-byos-v20231027-hvm-ssd-x86_64
+ chost:amazon/suse-sles-15-sp4-chost-byos-v20231127-hvm-ssd-x86_64
+ chost:amazon/suse-sles-15-sp4-chost-byos-v20231212-hvm-ssd-x86_64
+ chost:amazon/suse-sles-15-sp4-chost-byos-v20240312-hvm-ssd-x86_64
+ chost:amazon/suse-sles-15-sp4-chost-byos-v20240612-hvm-ssd-x86_64
+ chost:amazon/suse-sles-15-sp4-chost-byos-v20240809-hvm-ssd-x86_64
+ chost:amazon/suse-sles-15-sp4-chost-byos-v20240912-hvm-ssd-x86_64
+ chost:google/sles-15-sp1-chost-byos-v20210202
+ chost:google/sles-15-sp1-chost-byos-v20210304
+ chost:google/sles-15-sp1-chost-byos-v20220127
+ chost:google/sles-15-sp1-chost-byos-v20220715-x86-64
+ chost:google/sles-15-sp2-chost-byos-v20210202
+ chost:google/sles-15-sp2-chost-byos-v20210304
+ chost:google/sles-15-sp2-chost-byos-v20210405
+ chost:google/sles-15-sp2-chost-byos-v20210506
+ chost:google/sles-15-sp2-chost-byos-v20210610
+ chost:google/sles-15-sp2-chost-byos-v20210722
+ chost:google/sles-15-sp2-chost-byos-v20210913
+ chost:google/sles-15-sp2-chost-byos-v20211025
+ chost:google/sles-15-sp2-chost-byos-v20220126
+ chost:google/sles-15-sp2-chost-byos-v20220718-x86-64
+ chost:google/sles-15-sp3-chost-byos-v20210729
+ chost:google/sles-15-sp3-chost-byos-v20210827
+ chost:google/sles-15-sp3-chost-byos-v20210927
+ chost:google/sles-15-sp3-chost-byos-v20211004
+ chost:google/sles-15-sp3-chost-byos-v20211101
+ chost:google/sles-15-sp3-chost-byos-v20211202
+ chost:google/sles-15-sp3-chost-byos-v20220103
+ chost:google/sles-15-sp3-chost-byos-v20220126
+ chost:google/sles-15-sp3-chost-byos-v20220222
+ chost:google/sles-15-sp3-chost-byos-v20220310
+ chost:google/sles-15-sp3-chost-byos-v20220411-x86-64
+ chost:google/sles-15-sp3-chost-byos-v20220510-x86-64
+ chost:google/sles-15-sp3-chost-byos-v20220608-x86-64
+ chost:google/sles-15-sp3-chost-byos-v20220708-x86-64
+ chost:google/sles-15-sp3-chost-byos-v20220718-x86-64
+ chost:google/sles-15-sp3-chost-byos-v20220818-x86-64
+ chost:google/sles-15-sp3-chost-byos-v20220916-x86-64
+ chost:google/sles-15-sp3-chost-byos-v20221019-x86-64
+ chost:google/sles-15-sp3-chost-byos-v20221118-x86-64
+ chost:google/sles-15-sp3-chost-byos-v20221215-x86-64
+ chost:google/sles-15-sp3-chost-byos-v20230313-x86-64
+ chost:google/sles-15-sp3-chost-byos-v20230613-x86-64
+ chost:google/sles-15-sp3-chost-byos-v20240807-x86-64
+ chost:google/sles-15-sp3-chost-byos-v20240912-x86-64
+ chost:google/sles-15-sp4-chost-byos-v20220718-x86-64
+ chost:google/sles-15-sp4-chost-byos-v20220721-x86-64
+ chost:google/sles-15-sp4-chost-byos-v20220818-x86-64
+ chost:google/sles-15-sp4-chost-byos-v20220916-x86-64
+ chost:google/sles-15-sp4-chost-byos-v20221018-x86-64
+ chost:google/sles-15-sp4-chost-byos-v20221118-x86-64
+ chost:google/sles-15-sp4-chost-byos-v20221215-arm64
+ chost:google/sles-15-sp4-chost-byos-v20221215-x86-64
+ chost:google/sles-15-sp4-chost-byos-v20230111-arm64
+ chost:google/sles-15-sp4-chost-byos-v20230111-x86-64
+ chost:google/sles-15-sp4-chost-byos-v20230210-arm64
+ chost:google/sles-15-sp4-chost-byos-v20230210-x86-64
+ chost:google/sles-15-sp4-chost-byos-v20230310-arm64
+ chost:google/sles-15-sp4-chost-byos-v20230310-x86-64
+ chost:google/sles-15-sp4-chost-byos-v20230410-arm64
+ chost:google/sles-15-sp4-chost-byos-v20230410-x86-64
+ chost:google/sles-15-sp4-chost-byos-v20230510-arm64
+ chost:google/sles-15-sp4-chost-byos-v20230510-x86-64
+ chost:google/sles-15-sp4-chost-byos-v20230606-arm64
+ chost:google/sles-15-sp4-chost-byos-v20230606-x86-64
+ chost:google/sles-15-sp4-chost-byos-v20230704-arm64
+ chost:google/sles-15-sp4-chost-byos-v20230704-x86-64
+ chost:google/sles-15-sp4-chost-byos-v20230804-arm64
+ chost:google/sles-15-sp4-chost-byos-v20230804-x86-64
+ chost:google/sles-15-sp4-chost-byos-v20230901-arm64
+ chost:google/sles-15-sp4-chost-byos-v20230901-x86-64
+ chost:google/sles-15-sp4-chost-byos-v20230928-arm64
+ chost:google/sles-15-sp4-chost-byos-v20230928-x86-64
+ chost:google/sles-15-sp4-chost-byos-v20231027-arm64
+ chost:google/sles-15-sp4-chost-byos-v20231027-x86-64
+ chost:google/sles-15-sp4-chost-byos-v20231127-arm64
+ chost:google/sles-15-sp4-chost-byos-v20231127-x86-64
+ chost:google/sles-15-sp4-chost-byos-v20231212-arm64
+ chost:google/sles-15-sp4-chost-byos-v20231212-x86-64
+ chost:google/sles-15-sp4-chost-byos-v20240312-arm64
+ chost:google/sles-15-sp4-chost-byos-v20240312-x86-64
+ chost:google/sles-15-sp4-chost-byos-v20240612-arm64
+ chost:google/sles-15-sp4-chost-byos-v20240612-x86-64
+ chost:google/sles-15-sp4-chost-byos-v20240809-arm64
+ chost:google/sles-15-sp4-chost-byos-v20240809-x86-64
+ chost:google/sles-15-sp4-chost-byos-v20240912-arm64
+ chost:google/sles-15-sp4-chost-byos-v20240912-x86-64
+ chost:microsoft/suse-sles-15-sp1-chost-byos-v20210202
+ chost:microsoft/suse-sles-15-sp1-chost-byos-v20210304
+ chost:microsoft/suse-sles-15-sp1-chost-byos-v20220127
+ chost:microsoft/suse-sles-15-sp1-chost-byos-v20220715-x86_64
+ chost:microsoft/suse-sles-15-sp2-chost-byos-v20210202
+ chost:microsoft/suse-sles-15-sp2-chost-byos-v20210304
+ chost:microsoft/suse-sles-15-sp2-chost-byos-v20210405
+ chost:microsoft/suse-sles-15-sp2-chost-byos-v20210506
+ chost:microsoft/suse-sles-15-sp2-chost-byos-v20210610
+ chost:microsoft/suse-sles-15-sp2-chost-byos-v20210722
+ chost:microsoft/suse-sles-15-sp2-chost-byos-v20210913
+ chost:microsoft/suse-sles-15-sp2-chost-byos-v20211025
+ chost:microsoft/suse-sles-15-sp2-chost-byos-v20220126
+ chost:microsoft/suse-sles-15-sp2-chost-byos-v20220718-x86_64
+ chost:microsoft/suse-sles-15-sp3-chost-byos-v20210729
+ chost:microsoft/suse-sles-15-sp3-chost-byos-v20210827
+ chost:microsoft/suse-sles-15-sp3-chost-byos-v20210927
+ chost:microsoft/suse-sles-15-sp3-chost-byos-v20211004
+ chost:microsoft/suse-sles-15-sp3-chost-byos-v20211101
+ chost:microsoft/suse-sles-15-sp3-chost-byos-v20211202
+ chost:microsoft/suse-sles-15-sp3-chost-byos-v20220103
+ chost:microsoft/suse-sles-15-sp3-chost-byos-v20220126
+ chost:microsoft/suse-sles-15-sp3-chost-byos-v20220222
+ chost:microsoft/suse-sles-15-sp3-chost-byos-v20220310
+ chost:microsoft/suse-sles-15-sp3-chost-byos-v20220411-x86_64
+ chost:microsoft/suse-sles-15-sp3-chost-byos-v20220510-x86_64
+ chost:microsoft/suse-sles-15-sp3-chost-byos-v20220609-x86_64
+ chost:microsoft/suse-sles-15-sp3-chost-byos-v20220708-x86_64
+ chost:microsoft/suse-sles-15-sp3-chost-byos-v20220718-x86_64
+ chost:microsoft/suse-sles-15-sp3-chost-byos-v20220818-x86_64
+ chost:microsoft/suse-sles-15-sp3-chost-byos-v20220916-x86_64
+ chost:microsoft/suse-sles-15-sp3-chost-byos-v20220921-x86_64
+ chost:microsoft/suse-sles-15-sp3-chost-byos-v20221019-x86_64
+ chost:microsoft/suse-sles-15-sp3-chost-byos-v20221119-x86_64
+ chost:microsoft/suse-sles-15-sp3-chost-byos-v20221215-x86_64
+ chost:microsoft/suse-sles-15-sp3-chost-byos-v20230313-x86_64
+ chost:microsoft/suse-sles-15-sp3-chost-byos-v20230613-x86_64
+ chost:microsoft/suse-sles-15-sp3-chost-byos-v20240807-x86_64
+ chost:microsoft/suse-sles-15-sp3-chost-byos-v20240912-x86_64
+ chost:microsoft/suse-sles-15-sp4-chost-byos-v20220718-x86_64
+ chost:microsoft/suse-sles-15-sp4-chost-byos-v20220721-x86_64
+ chost:microsoft/suse-sles-15-sp4-chost-byos-v20220819-x86_64
+ chost:microsoft/suse-sles-15-sp4-chost-byos-v20220916-x86_64
+ chost:microsoft/suse-sles-15-sp4-chost-byos-v20220923-x86_64
+ chost:microsoft/suse-sles-15-sp4-chost-byos-v20221018-x86_64
+ chost:microsoft/suse-sles-15-sp4-chost-byos-v20221118-x86_64
+ chost:microsoft/suse-sles-15-sp4-chost-byos-v20221215-arm64
+ chost:microsoft/suse-sles-15-sp4-chost-byos-v20221215-x86_64
+ chost:microsoft/suse-sles-15-sp4-chost-byos-v20230111-arm64
+ chost:microsoft/suse-sles-15-sp4-chost-byos-v20230111-x86_64
+ chost:microsoft/suse-sles-15-sp4-chost-byos-v20230210-arm64
+ chost:microsoft/suse-sles-15-sp4-chost-byos-v20230210-x86_64
+ chost:microsoft/suse-sles-15-sp4-chost-byos-v20230310-arm64
+ chost:microsoft/suse-sles-15-sp4-chost-byos-v20230310-x86_64
+ chost:microsoft/suse-sles-15-sp4-chost-byos-v20230410-arm64
+ chost:microsoft/suse-sles-15-sp4-chost-byos-v20230410-x86_64
+ chost:microsoft/suse-sles-15-sp4-chost-byos-v20230510-arm64
+ chost:microsoft/suse-sles-15-sp4-chost-byos-v20230510-x86_64
+ chost:microsoft/suse-sles-15-sp4-chost-byos-v20230606-arm64
+ chost:microsoft/suse-sles-15-sp4-chost-byos-v20230606-x86_64
+ chost:microsoft/suse-sles-15-sp4-chost-byos-v20230704-arm64
+ chost:microsoft/suse-sles-15-sp4-chost-byos-v20230704-x86_64
+ chost:microsoft/suse-sles-15-sp4-chost-byos-v20230803-arm64
+ chost:microsoft/suse-sles-15-sp4-chost-byos-v20230803-x86_64
+ chost:microsoft/suse-sles-15-sp4-chost-byos-v20230901-arm64
+ chost:microsoft/suse-sles-15-sp4-chost-byos-v20230901-x86_64
+ chost:microsoft/suse-sles-15-sp4-chost-byos-v20230928-arm64
+ chost:microsoft/suse-sles-15-sp4-chost-byos-v20230928-x86_64
+ chost:microsoft/suse-sles-15-sp4-chost-byos-v20231027-arm64
+ chost:microsoft/suse-sles-15-sp4-chost-byos-v20231027-x86_64
+ chost:microsoft/suse-sles-15-sp4-chost-byos-v20231127-arm64
+ chost:microsoft/suse-sles-15-sp4-chost-byos-v20231127-x86_64
+ chost:microsoft/suse-sles-15-sp4-chost-byos-v20231212-arm64
+ chost:microsoft/suse-sles-15-sp4-chost-byos-v20231212-x86_64
+ chost:microsoft/suse-sles-15-sp4-chost-byos-v20240312-arm64
+ chost:microsoft/suse-sles-15-sp4-chost-byos-v20240312-x86_64
+ chost:microsoft/suse-sles-15-sp4-chost-byos-v20240612-arm64
+ chost:microsoft/suse-sles-15-sp4-chost-byos-v20240612-x86_64
+ chost:microsoft/suse-sles-15-sp4-chost-byos-v20240809-arm64
+ chost:microsoft/suse-sles-15-sp4-chost-byos-v20240809-x86_64
+ chost:microsoft/suse-sles-15-sp4-chost-byos-v20240912-arm64
+ chost:microsoft/suse-sles-15-sp4-chost-byos-v20240912-x86_64
+
no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2023-45897
skipping CVE-2023-45898 as CVE page is older than CVRF-CVE file.
no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2023-45871
skipping CVE-2023-45896 as CVE page is older than CVRF-CVE file.
skipping CVE-2023-45872 as CVE page is older than CVRF-CVE file.
skipping CVE-2023-45866 as CVE page is older than CVRF-CVE file.
skipping CVE-2023-45863 as CVE page is older than CVRF-CVE file.
skipping CVE-2023-45862 as CVE page is older than CVRF-CVE file.
skipping CVE-2023-45853 as CVE page is older than CVRF-CVE file.
no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2023-45803
no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2023-45745
skipping CVE-2023-45802 as CVE page is older than CVRF-CVE file.
no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2023-45733
no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2023-45648
no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2023-45290
skipping CVE-2023-45322 as CVE page is older than CVRF-CVE file.
--- /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2023-45290.xml 2024-10-26 01:21:28.640993000 +0200
+++ /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2023-45290.xml.new 2024-10-29 01:27:45.856038000 +0100
@@ -14,13 +14,13 @@
1
- 26
- 2024-10-25T23:21:28Z
+ 27
+ 2024-10-29T00:27:45Z
current
2024-03-07T00:13:09Z
- 2024-10-25T23:21:28Z
+ 2024-10-29T00:27:45Z
cve-database/bin/generate-cvrf-cve.pl
2020-12-27T01:00:00Z
@@ -317,6 +317,24 @@
go1.22-libstd-1.22.1-1.1
+
+ go1.22-openssl-1.22.7.1-150000.1.3.1
+
+
+ go1.22-openssl-1.22.7.1-150600.13.3.1
+
+
+ go1.22-openssl-doc-1.22.7.1-150000.1.3.1
+
+
+ go1.22-openssl-doc-1.22.7.1-150600.13.3.1
+
+
+ go1.22-openssl-race-1.22.7.1-150000.1.3.1
+
+
+ go1.22-openssl-race-1.22.7.1-150600.13.3.1
+
go1.22-race-1.22.1-1.1
@@ -869,6 +887,42 @@
go1.22-race-1.22.1-1.1 as a component of openSUSE Tumbleweed
+
+ go1.22-openssl-1.22.7.1-150000.1.3.1 as a component of SUSE Linux Enterprise Module for Development Tools 15 SP5
+
+
+ go1.22-openssl-doc-1.22.7.1-150000.1.3.1 as a component of SUSE Linux Enterprise Module for Development Tools 15 SP5
+
+
+ go1.22-openssl-race-1.22.7.1-150000.1.3.1 as a component of SUSE Linux Enterprise Module for Development Tools 15 SP5
+
+
+ go1.22-openssl-1.22.7.1-150600.13.3.1 as a component of SUSE Linux Enterprise Module for Development Tools 15 SP6
+
+
+ go1.22-openssl-doc-1.22.7.1-150600.13.3.1 as a component of SUSE Linux Enterprise Module for Development Tools 15 SP6
+
+
+ go1.22-openssl-race-1.22.7.1-150600.13.3.1 as a component of SUSE Linux Enterprise Module for Development Tools 15 SP6
+
+
+ go1.22-openssl-1.22.7.1-150000.1.3.1 as a component of openSUSE Leap 15.5
+
+
+ go1.22-openssl-doc-1.22.7.1-150000.1.3.1 as a component of openSUSE Leap 15.5
+
+
+ go1.22-openssl-race-1.22.7.1-150000.1.3.1 as a component of openSUSE Leap 15.5
+
+
+ go1.22-openssl-1.22.7.1-150600.13.3.1 as a component of openSUSE Leap 15.6
+
+
+ go1.22-openssl-doc-1.22.7.1-150600.13.3.1 as a component of openSUSE Leap 15.6
+
+
+ go1.22-openssl-race-1.22.7.1-150600.13.3.1 as a component of openSUSE Leap 15.6
+
@@ -1022,6 +1076,20 @@
openSUSE Tumbleweed:go1.22-libstd-1.22.1-1.1
openSUSE Tumbleweed:go1.22-race-1.22.1-1.1
+
+ SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.22-openssl-1.22.7.1-150000.1.3.1
+ SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.22-openssl-doc-1.22.7.1-150000.1.3.1
+ SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.22-openssl-race-1.22.7.1-150000.1.3.1
+ SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.22-openssl-1.22.7.1-150600.13.3.1
+ SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.22-openssl-doc-1.22.7.1-150600.13.3.1
+ SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.22-openssl-race-1.22.7.1-150600.13.3.1
+ openSUSE Leap 15.5:go1.22-openssl-1.22.7.1-150000.1.3.1
+ openSUSE Leap 15.5:go1.22-openssl-doc-1.22.7.1-150000.1.3.1
+ openSUSE Leap 15.5:go1.22-openssl-race-1.22.7.1-150000.1.3.1
+ openSUSE Leap 15.6:go1.22-openssl-1.22.7.1-150600.13.3.1
+ openSUSE Leap 15.6:go1.22-openssl-doc-1.22.7.1-150600.13.3.1
+ openSUSE Leap 15.6:go1.22-openssl-race-1.22.7.1-150600.13.3.1
+
no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2023-45289
--- /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2023-45289.xml 2024-10-26 01:21:29.267940000 +0200
+++ /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2023-45289.xml.new 2024-10-29 01:27:46.413036000 +0100
@@ -14,13 +14,13 @@
1
- 19
- 2024-10-25T23:21:28Z
+ 20
+ 2024-10-29T00:27:46Z
current
2024-03-07T00:13:10Z
- 2024-10-25T23:21:28Z
+ 2024-10-29T00:27:46Z
cve-database/bin/generate-cvrf-cve.pl
2020-12-27T01:00:00Z
@@ -258,6 +258,24 @@
go1.22-libstd-1.22.1-1.1
+
+ go1.22-openssl-1.22.7.1-150000.1.3.1
+
+
+ go1.22-openssl-1.22.7.1-150600.13.3.1
+
+
+ go1.22-openssl-doc-1.22.7.1-150000.1.3.1
+
+
+ go1.22-openssl-doc-1.22.7.1-150600.13.3.1
+
+
+ go1.22-openssl-race-1.22.7.1-150000.1.3.1
+
+
+ go1.22-openssl-race-1.22.7.1-150600.13.3.1
+
go1.22-race-1.22.1-1.1
@@ -603,6 +621,42 @@
go1.22-race-1.22.1-1.1 as a component of openSUSE Tumbleweed
+
+ go1.22-openssl-1.22.7.1-150000.1.3.1 as a component of SUSE Linux Enterprise Module for Development Tools 15 SP5
+
+
+ go1.22-openssl-doc-1.22.7.1-150000.1.3.1 as a component of SUSE Linux Enterprise Module for Development Tools 15 SP5
+
+
+ go1.22-openssl-race-1.22.7.1-150000.1.3.1 as a component of SUSE Linux Enterprise Module for Development Tools 15 SP5
+
+
+ go1.22-openssl-1.22.7.1-150600.13.3.1 as a component of SUSE Linux Enterprise Module for Development Tools 15 SP6
+
+
+ go1.22-openssl-doc-1.22.7.1-150600.13.3.1 as a component of SUSE Linux Enterprise Module for Development Tools 15 SP6
+
+
+ go1.22-openssl-race-1.22.7.1-150600.13.3.1 as a component of SUSE Linux Enterprise Module for Development Tools 15 SP6
+
+
+ go1.22-openssl-1.22.7.1-150000.1.3.1 as a component of openSUSE Leap 15.5
+
+
+ go1.22-openssl-doc-1.22.7.1-150000.1.3.1 as a component of openSUSE Leap 15.5
+
+
+ go1.22-openssl-race-1.22.7.1-150000.1.3.1 as a component of openSUSE Leap 15.5
+
+
+ go1.22-openssl-1.22.7.1-150600.13.3.1 as a component of openSUSE Leap 15.6
+
+
+ go1.22-openssl-doc-1.22.7.1-150600.13.3.1 as a component of openSUSE Leap 15.6
+
+
+ go1.22-openssl-race-1.22.7.1-150600.13.3.1 as a component of openSUSE Leap 15.6
+
@@ -713,6 +767,20 @@
openSUSE Tumbleweed:go1.22-libstd-1.22.1-1.1
openSUSE Tumbleweed:go1.22-race-1.22.1-1.1
+
+ SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.22-openssl-1.22.7.1-150000.1.3.1
+ SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.22-openssl-doc-1.22.7.1-150000.1.3.1
+ SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.22-openssl-race-1.22.7.1-150000.1.3.1
+ SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.22-openssl-1.22.7.1-150600.13.3.1
+ SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.22-openssl-doc-1.22.7.1-150600.13.3.1
+ SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.22-openssl-race-1.22.7.1-150600.13.3.1
+ openSUSE Leap 15.5:go1.22-openssl-1.22.7.1-150000.1.3.1
+ openSUSE Leap 15.5:go1.22-openssl-doc-1.22.7.1-150000.1.3.1
+ openSUSE Leap 15.5:go1.22-openssl-race-1.22.7.1-150000.1.3.1
+ openSUSE Leap 15.6:go1.22-openssl-1.22.7.1-150600.13.3.1
+ openSUSE Leap 15.6:go1.22-openssl-doc-1.22.7.1-150600.13.3.1
+ openSUSE Leap 15.6:go1.22-openssl-race-1.22.7.1-150600.13.3.1
+
no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2023-45288
--- /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2023-45288.xml 2024-10-26 01:21:29.983949000 +0200
+++ /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2023-45288.xml.new 2024-10-29 01:27:47.218980000 +0100
@@ -14,13 +14,13 @@
1
- 50
- 2024-10-25T23:21:29Z
+ 51
+ 2024-10-29T00:27:46Z
current
2024-04-04T23:12:13Z
- 2024-10-25T23:21:29Z
+ 2024-10-29T00:27:46Z
cve-database/bin/generate-cvrf-cve.pl
2020-12-27T01:00:00Z
@@ -1664,6 +1664,24 @@
go1.22-libstd-1.22.2-1.1
+
+ go1.22-openssl-1.22.7.1-150000.1.3.1
+
+
+ go1.22-openssl-1.22.7.1-150600.13.3.1
+
+
+ go1.22-openssl-doc-1.22.7.1-150000.1.3.1
+
+
+ go1.22-openssl-doc-1.22.7.1-150600.13.3.1
+
+
+ go1.22-openssl-race-1.22.7.1-150000.1.3.1
+
+
+ go1.22-openssl-race-1.22.7.1-150600.13.3.1
+
go1.22-race-1.22.2-1.1
@@ -3740,6 +3758,42 @@
traefik2-2.11.5-1.1 as a component of openSUSE Tumbleweed
+
+ go1.22-openssl-1.22.7.1-150000.1.3.1 as a component of SUSE Linux Enterprise Module for Development Tools 15 SP5
+
+
+ go1.22-openssl-doc-1.22.7.1-150000.1.3.1 as a component of SUSE Linux Enterprise Module for Development Tools 15 SP5
+
+
+ go1.22-openssl-race-1.22.7.1-150000.1.3.1 as a component of SUSE Linux Enterprise Module for Development Tools 15 SP5
+
+
+ go1.22-openssl-1.22.7.1-150600.13.3.1 as a component of SUSE Linux Enterprise Module for Development Tools 15 SP6
+
+
+ go1.22-openssl-doc-1.22.7.1-150600.13.3.1 as a component of SUSE Linux Enterprise Module for Development Tools 15 SP6
+
+
+ go1.22-openssl-race-1.22.7.1-150600.13.3.1 as a component of SUSE Linux Enterprise Module for Development Tools 15 SP6
+
+
+ go1.22-openssl-1.22.7.1-150000.1.3.1 as a component of openSUSE Leap 15.5
+
+
+ go1.22-openssl-doc-1.22.7.1-150000.1.3.1 as a component of openSUSE Leap 15.5
+
+
+ go1.22-openssl-race-1.22.7.1-150000.1.3.1 as a component of openSUSE Leap 15.5
+
+
+ go1.22-openssl-1.22.7.1-150600.13.3.1 as a component of openSUSE Leap 15.6
+
+
+ go1.22-openssl-doc-1.22.7.1-150600.13.3.1 as a component of openSUSE Leap 15.6
+
+
+ go1.22-openssl-race-1.22.7.1-150600.13.3.1 as a component of openSUSE Leap 15.6
+
kubernetes1.18-client as a component of SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS
@@ -4580,6 +4634,20 @@
openSUSE Tumbleweed:traefik-2.11.2-1.1
openSUSE Tumbleweed:traefik2-2.11.5-1.1
+
+ SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.22-openssl-1.22.7.1-150000.1.3.1
+ SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.22-openssl-doc-1.22.7.1-150000.1.3.1
+ SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.22-openssl-race-1.22.7.1-150000.1.3.1
+ SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.22-openssl-1.22.7.1-150600.13.3.1
+ SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.22-openssl-doc-1.22.7.1-150600.13.3.1
+ SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.22-openssl-race-1.22.7.1-150600.13.3.1
+ openSUSE Leap 15.5:go1.22-openssl-1.22.7.1-150000.1.3.1
+ openSUSE Leap 15.5:go1.22-openssl-doc-1.22.7.1-150000.1.3.1
+ openSUSE Leap 15.5:go1.22-openssl-race-1.22.7.1-150000.1.3.1
+ openSUSE Leap 15.6:go1.22-openssl-1.22.7.1-150600.13.3.1
+ openSUSE Leap 15.6:go1.22-openssl-doc-1.22.7.1-150600.13.3.1
+ openSUSE Leap 15.6:go1.22-openssl-race-1.22.7.1-150600.13.3.1
+
SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kubernetes1.18
SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kubernetes1.18-client
no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2023-45283
skipping CVE-2023-45285 as CVE page is older than CVRF-CVE file.
skipping CVE-2023-45284 as CVE page is older than CVRF-CVE file.
skipping CVE-2023-45237 as CVE page is older than CVRF-CVE file.
skipping CVE-2023-45236 as CVE page is older than CVRF-CVE file.
skipping CVE-2023-45235 as CVE page is older than CVRF-CVE file.
skipping CVE-2023-45234 as CVE page is older than CVRF-CVE file.
skipping CVE-2023-45233 as CVE page is older than CVRF-CVE file.
skipping CVE-2023-45232 as CVE page is older than CVRF-CVE file.
skipping CVE-2023-45231 as CVE page is older than CVRF-CVE file.
CVE-2023-45221: no packages for SUSE Manager Server 4.3, but entry?
CVE-2023-45221: no packages for SUSE Linux Enterprise Software Development Kit 12 SP5, but entry?
CVE-2023-45221: no packages for SUSE Linux Enterprise Module for Basesystem 15 SP5, but entry?
CVE-2023-45221: no packages for SUSE Manager Proxy 4.3, but entry?
CVE-2023-45221: no packages for SUSE Manager Retail Branch Server 4.3, but entry?
CVE-2023-45221: no packages for SUSE Linux Enterprise Workstation Extension 15 SP5, but entry?
CVE-2023-45221: no packages for SUSE Linux Enterprise Module for Desktop Applications 15 SP6, but entry?
no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2023-45221
CVE-2023-45221: no packages for SUSE Linux Enterprise Module for Basesystem 15 SP5, but entry?
CVE-2023-45221: no packages for SUSE Linux Enterprise Module for Desktop Applications 15 SP6, but entry?
CVE-2023-45221: no packages for SUSE Linux Enterprise Software Development Kit 12 SP5, but entry?
CVE-2023-45221: no packages for SUSE Linux Enterprise Workstation Extension 15 SP5, but entry?
CVE-2023-45221: no packages for SUSE Manager Proxy 4.3, but entry?
CVE-2023-45221: no packages for SUSE Manager Retail Branch Server 4.3, but entry?
CVE-2023-45221: no packages for SUSE Manager Server 4.3, but entry?
CVE-2023-45221: no packages for SUSE Linux Enterprise Module for Basesystem 15 SP5, but entry?
CVE-2023-45221: no packages for SUSE Linux Enterprise Module for Desktop Applications 15 SP6, but entry?
CVE-2023-45221: no packages for SUSE Linux Enterprise Software Development Kit 12 SP5, but entry?
CVE-2023-45221: no packages for SUSE Linux Enterprise Workstation Extension 15 SP5, but entry?
CVE-2023-45221: no packages for SUSE Manager Proxy 4.3, but entry?
CVE-2023-45221: no packages for SUSE Manager Retail Branch Server 4.3, but entry?
CVE-2023-45221: no packages for SUSE Manager Server 4.3, but entry?
skipping CVE-2023-45229 as CVE page is older than CVRF-CVE file.
no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2023-45145
no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2023-45143
no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2023-45142
no cpe found for SUSE Manager Tools for SLE Micro 5 in CVE-2023-45142
no cpe found for SUSE Package Hub 15 SP5 in CVE-2023-45142
no cpe found for SUSE Package Hub 15 SP6 in CVE-2023-45142
CVE-2023-44487: no packages for SUSE Linux Enterprise Module for Public Cloud 15 SP4, but entry?
CVE-2023-44487: no packages for SUSE Linux Enterprise Workstation Extension 15 SP5, but entry?
no cpe found for SUSE Linux Enterprise Installer Updates 15 SP4 in CVE-2023-44487
no cpe found for SUSE Linux Enterprise Installer Updates 15 SP5 in CVE-2023-44487
no cpe found for SUSE Linux Enterprise Installer Updates 15 SP4 in CVE-2023-44487
no cpe found for SUSE Linux Enterprise Installer Updates 15 SP5 in CVE-2023-44487
no cpe found for SUSE Linux Enterprise Installer Updates 15 SP4 in CVE-2023-44487
no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2023-44487
no cpe found for SUSE Linux Enterprise Installer Updates 15 SP5 in CVE-2023-44487
no cpe found for SUSE Linux Enterprise Installer Updates 15 SP4 in CVE-2023-44487
no cpe found for SUSE Linux Enterprise Installer Updates 15 SP5 in CVE-2023-44487
no cpe found for SUSE Linux Enterprise Installer Updates 15 SP4 in CVE-2023-44487
no cpe found for SUSE Linux Enterprise Installer Updates 15 SP4 in CVE-2023-44487
no cpe found for SUSE Linux Enterprise Installer Updates 15 SP4 in CVE-2023-44487
CVE-2023-44487: no packages for SUSE Linux Enterprise Module for Public Cloud 15 SP4, but entry?
CVE-2023-44487: no packages for SUSE Linux Enterprise Workstation Extension 15 SP5, but entry?
CVE-2023-44487: no packages for SUSE Linux Enterprise Module for Public Cloud 15 SP4, but entry?
CVE-2023-44487: no packages for SUSE Linux Enterprise Workstation Extension 15 SP5, but entry?
skipping CVE-2023-44488 as CVE page is older than CVRF-CVE file.
skipping CVE-2023-44466 as CVE page is older than CVRF-CVE file.
skipping CVE-2023-44446 as CVE page is older than CVRF-CVE file.
skipping CVE-2023-44431 as CVE page is older than CVRF-CVE file.
skipping CVE-2023-44429 as CVE page is older than CVRF-CVE file.
no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2023-44271
skipping CVE-2023-44398 as CVE page is older than CVRF-CVE file.
skipping CVE-2023-44387 as CVE page is older than CVRF-CVE file.
no cpe found for SUSE Package Hub 15 SP4 in CVE-2023-43907
no cpe found for SUSE Package Hub 15 SP5 in CVE-2023-43907
no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2023-43804
no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2023-43788
skipping CVE-2023-43789 as CVE page is older than CVRF-CVE file.
skipping CVE-2023-43787 as CVE page is older than CVRF-CVE file.
skipping CVE-2023-43786 as CVE page is older than CVRF-CVE file.
skipping CVE-2023-43785 as CVE page is older than CVRF-CVE file.
no cpe found for SUSE Package Hub 15 SP4 in CVE-2023-43665
no cpe found for SUSE Package Hub 15 SP5 in CVE-2023-43665
no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2023-43655
no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2023-43641
skipping CVE-2023-43622 as CVE page is older than CVRF-CVE file.
no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2023-43490
skipping CVE-2023-43361 as CVE page is older than CVRF-CVE file.
No V5 entry found for CVE-2023-43091 / /home/securitybot/prod/cve-database/cvelistV5/cves/2023/43xxxx/CVE-2023-43091.json:No such file or directory
skipping CVE-2023-43115 as CVE page is older than CVRF-CVE file.
skipping CVE-2023-43114 as CVE page is older than CVRF-CVE file.
no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2023-42956
skipping CVE-2023-43090 as CVE page is older than CVRF-CVE file.
skipping CVE-2023-43040 as CVE page is older than CVRF-CVE file.
no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2023-42950
no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2023-42852
skipping CVE-2023-42917 as CVE page is older than CVRF-CVE file.
skipping CVE-2023-42916 as CVE page is older than CVRF-CVE file.
skipping CVE-2023-42890 as CVE page is older than CVRF-CVE file.
skipping CVE-2023-42883 as CVE page is older than CVRF-CVE file.
no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2023-42843
no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2023-42822
skipping CVE-2023-42833 as CVE page is older than CVRF-CVE file.
no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2023-42795
skipping CVE-2023-42794 as CVE page is older than CVRF-CVE file.
skipping CVE-2023-42756 as CVE page is older than CVRF-CVE file.
no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2023-42754
skipping CVE-2023-42753 as CVE page is older than CVRF-CVE file.
skipping CVE-2023-42752 as CVE page is older than CVRF-CVE file.
skipping CVE-2023-42670 as CVE page is older than CVRF-CVE file.
skipping CVE-2023-42669 as CVE page is older than CVRF-CVE file.
skipping CVE-2023-42667 as CVE page is older than CVRF-CVE file.
no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2023-42465
skipping CVE-2023-42467 as CVE page is older than CVRF-CVE file.
skipping CVE-2023-42445 as CVE page is older than CVRF-CVE file.
no cpe found for SUSE Package Hub 15 SP5 in CVE-2023-42363
no cpe found for SUSE Package Hub 15 SP6 in CVE-2023-42363
no cpe found for SUSE Package Hub 15 SP4 in CVE-2023-42119
no cpe found for SUSE Package Hub 15 SP5 in CVE-2023-42119
no cpe found for SUSE Package Hub 15 SP4 in CVE-2023-42117
no cpe found for SUSE Package Hub 15 SP5 in CVE-2023-42117
no cpe found for SUSE Package Hub 15 SP4 in CVE-2023-42116
no cpe found for SUSE Package Hub 15 SP5 in CVE-2023-42116
no cpe found for SUSE Package Hub 15 SP4 in CVE-2023-42115
no cpe found for SUSE Package Hub 15 SP5 in CVE-2023-42115
no cpe found for SUSE Package Hub 15 SP4 in CVE-2023-42114
no cpe found for SUSE Package Hub 15 SP5 in CVE-2023-42114
no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2023-41983
skipping CVE-2023-41993 as CVE page is older than CVRF-CVE file.
skipping CVE-2023-41915 as CVE page is older than CVRF-CVE file.
skipping CVE-2023-41913 as CVE page is older than CVRF-CVE file.
no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2023-41900
skipping CVE-2023-41909 as CVE page is older than CVRF-CVE file.
no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2023-41419
skipping CVE-2023-41361 as CVE page is older than CVRF-CVE file.
skipping CVE-2023-41360 as CVE page is older than CVRF-CVE file.
skipping CVE-2023-41359 as CVE page is older than CVRF-CVE file.
skipping CVE-2023-41358 as CVE page is older than CVRF-CVE file.
skipping CVE-2023-41105 as CVE page is older than CVRF-CVE file.
skipping CVE-2023-41080 as CVE page is older than CVRF-CVE file.
skipping CVE-2023-41074 as CVE page is older than CVRF-CVE file.
no cpe found for SUSE Package Hub 15 SP4 in CVE-2023-41040
no cpe found for SUSE Package Hub 15 SP5 in CVE-2023-41040
No V5 entry found for CVE-2023-40782 / /home/securitybot/prod/cve-database/cvelistV5/cves/2023/40xxxx/CVE-2023-40782.json:No such file or directory
skipping CVE-2023-40791 as CVE page is older than CVRF-CVE file.
no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2023-40661
skipping CVE-2023-40745 as CVE page is older than CVRF-CVE file.
no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2023-40660
no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2023-40551
no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2023-40550
no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2023-40549
no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2023-40548
no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2023-40547
no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2023-40546
no cpe found for SUSE Package Hub 15 SP5 in CVE-2023-40533
no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2023-40477
no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2023-40359
skipping CVE-2023-40476 as CVE page is older than CVRF-CVE file.
skipping CVE-2023-40475 as CVE page is older than CVRF-CVE file.
skipping CVE-2023-40474 as CVE page is older than CVRF-CVE file.
skipping CVE-2023-40451 as CVE page is older than CVRF-CVE file.
skipping CVE-2023-40414 as CVE page is older than CVRF-CVE file.
skipping CVE-2023-40400 as CVE page is older than CVRF-CVE file.
skipping CVE-2023-40397 as CVE page is older than CVRF-CVE file.
skipping CVE-2023-40360 as CVE page is older than CVRF-CVE file.
no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2023-40305
no cpe found for SUSE Liberty Linux 7 LTSS in CVE-2023-40217
no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2023-40217
--- /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2023-40217.xml 2024-10-22 02:05:08.564148000 +0200
+++ /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2023-40217.xml.new 2024-10-29 01:28:33.196119000 +0100
@@ -14,13 +14,13 @@
1
- 108
- 2024-10-22T00:05:07Z
+ 109
+ 2024-10-29T00:28:32Z
current
2023-08-28T23:16:45Z
- 2024-10-22T00:05:07Z
+ 2024-10-29T00:28:32Z
cve-database/bin/generate-cvrf-cve.pl
2020-12-27T01:00:00Z
@@ -2977,6 +2977,24 @@
python313-x86-64-v3-3.13.0~b3-1.1
+
+ python314-3.14.0~a1-1.1
+
+
+ python314-curses-3.14.0~a1-1.1
+
+
+ python314-dbm-3.14.0~a1-1.1
+
+
+ python314-idle-3.14.0~a1-1.1
+
+
+ python314-tk-3.14.0~a1-1.1
+
+
+ python314-x86-64-v3-3.14.0~a1-1.1
+
python36
@@ -9538,6 +9556,24 @@
python313-x86-64-v3-3.13.0~b3-1.1 as a component of openSUSE Tumbleweed
+
+ python314-3.14.0~a1-1.1 as a component of openSUSE Tumbleweed
+
+
+ python314-curses-3.14.0~a1-1.1 as a component of openSUSE Tumbleweed
+
+
+ python314-dbm-3.14.0~a1-1.1 as a component of openSUSE Tumbleweed
+
+
+ python314-idle-3.14.0~a1-1.1 as a component of openSUSE Tumbleweed
+
+
+ python314-tk-3.14.0~a1-1.1 as a component of openSUSE Tumbleweed
+
+
+ python314-x86-64-v3-3.14.0~a1-1.1 as a component of openSUSE Tumbleweed
+
python38-3.8.18-1.1 as a component of openSUSE Tumbleweed
@@ -11979,6 +12015,12 @@
openSUSE Tumbleweed:python313-idle-3.13.0~b3-1.1
openSUSE Tumbleweed:python313-tk-3.13.0~b3-1.1
openSUSE Tumbleweed:python313-x86-64-v3-3.13.0~b3-1.1
+ openSUSE Tumbleweed:python314-3.14.0~a1-1.1
+ openSUSE Tumbleweed:python314-curses-3.14.0~a1-1.1
+ openSUSE Tumbleweed:python314-dbm-3.14.0~a1-1.1
+ openSUSE Tumbleweed:python314-idle-3.14.0~a1-1.1
+ openSUSE Tumbleweed:python314-tk-3.14.0~a1-1.1
+ openSUSE Tumbleweed:python314-x86-64-v3-3.14.0~a1-1.1
openSUSE Tumbleweed:python38-3.8.18-1.1
openSUSE Tumbleweed:python38-curses-3.8.18-1.1
openSUSE Tumbleweed:python38-dbm-3.8.18-1.1
no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2023-40184
skipping CVE-2023-40175 as CVE page is older than CVRF-CVE file.
no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2023-40167
no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2023-40030
skipping CVE-2023-39978 as CVE page is older than CVRF-CVE file.
skipping CVE-2023-39976 as CVE page is older than CVRF-CVE file.
skipping CVE-2023-39975 as CVE page is older than CVRF-CVE file.
skipping CVE-2023-39929 as CVE page is older than CVRF-CVE file.
skipping CVE-2023-39928 as CVE page is older than CVRF-CVE file.
skipping CVE-2023-39804 as CVE page is older than CVRF-CVE file.
skipping CVE-2023-39742 as CVE page is older than CVRF-CVE file.
no cpe found for SUSE Package Hub 15 SP4 in CVE-2023-39516
no cpe found for SUSE Package Hub 15 SP5 in CVE-2023-39516
skipping CVE-2023-39615 as CVE page is older than CVRF-CVE file.
skipping CVE-2023-39593 as CVE page is older than CVRF-CVE file.
no cpe found for SUSE Package Hub 15 SP4 in CVE-2023-39515
no cpe found for SUSE Package Hub 15 SP5 in CVE-2023-39515
no cpe found for SUSE Package Hub 15 SP4 in CVE-2023-39514
no cpe found for SUSE Package Hub 15 SP5 in CVE-2023-39514
no cpe found for SUSE Package Hub 15 SP4 in CVE-2023-39513
no cpe found for SUSE Package Hub 15 SP5 in CVE-2023-39513
no cpe found for SUSE Package Hub 15 SP4 in CVE-2023-39512
no cpe found for SUSE Package Hub 15 SP5 in CVE-2023-39512
no cpe found for SUSE Package Hub 15 SP4 in CVE-2023-39511
no cpe found for SUSE Package Hub 15 SP5 in CVE-2023-39511
no cpe found for SUSE Package Hub 15 SP4 in CVE-2023-39510
no cpe found for SUSE Package Hub 15 SP5 in CVE-2023-39510
skipping CVE-2023-39434 as CVE page is older than CVRF-CVE file.
skipping CVE-2023-39418 as CVE page is older than CVRF-CVE file.
skipping CVE-2023-39417 as CVE page is older than CVRF-CVE file.
no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2023-39368
no cpe found for SUSE Package Hub 15 SP4 in CVE-2023-39366
no cpe found for SUSE Package Hub 15 SP5 in CVE-2023-39366
no cpe found for SUSE Package Hub 15 SP4 in CVE-2023-39365
no cpe found for SUSE Package Hub 15 SP5 in CVE-2023-39365
no cpe found for SUSE Package Hub 15 SP4 in CVE-2023-39364
no cpe found for SUSE Package Hub 15 SP5 in CVE-2023-39364
no cpe found for SUSE Package Hub 15 SP4 in CVE-2023-39362
no cpe found for SUSE Package Hub 15 SP5 in CVE-2023-39362
no cpe found for SUSE Package Hub 15 SP4 in CVE-2023-39361
no cpe found for SUSE Package Hub 15 SP5 in CVE-2023-39361
no cpe found for SUSE Package Hub 15 SP4 in CVE-2023-39360
no cpe found for SUSE Package Hub 15 SP5 in CVE-2023-39360
no cpe found for SUSE Package Hub 15 SP4 in CVE-2023-39359
no cpe found for SUSE Package Hub 15 SP5 in CVE-2023-39359
no cpe found for SUSE Package Hub 15 SP4 in CVE-2023-39358
no cpe found for SUSE Package Hub 15 SP5 in CVE-2023-39358
no cpe found for SUSE Package Hub 15 SP4 in CVE-2023-39357
no cpe found for SUSE Package Hub 15 SP5 in CVE-2023-39357
no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2023-39333
no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2023-39325
skipping CVE-2023-39328 as CVE page is older than CVRF-CVE file.
skipping CVE-2023-39327 as CVE page is older than CVRF-CVE file.
skipping CVE-2023-39326 as CVE page is older than CVRF-CVE file.
no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2023-39322
skipping CVE-2023-39323 as CVE page is older than CVRF-CVE file.
no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2023-39321
no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2023-39320
skipping CVE-2023-39319 as CVE page is older than CVRF-CVE file.
skipping CVE-2023-39318 as CVE page is older than CVRF-CVE file.
no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2023-39198
no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2023-39194
skipping CVE-2023-39197 as CVE page is older than CVRF-CVE file.
no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2023-39193
no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2023-39192
no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2023-39189
skipping CVE-2023-39191 as CVE page is older than CVRF-CVE file.
skipping CVE-2023-39190 as CVE page is older than CVRF-CVE file.
skipping CVE-2023-39180 as CVE page is older than CVRF-CVE file.
skipping CVE-2023-39179 as CVE page is older than CVRF-CVE file.
skipping CVE-2023-39176 as CVE page is older than CVRF-CVE file.
no cpe found for SUSE Package Hub 15 SP5 in CVE-2023-39070
skipping CVE-2023-38898 as CVE page is older than CVRF-CVE file.
skipping CVE-2023-38802 as CVE page is older than CVRF-CVE file.
skipping CVE-2023-38709 as CVE page is older than CVRF-CVE file.
skipping CVE-2023-38633 as CVE page is older than CVRF-CVE file.
skipping CVE-2023-38611 as CVE page is older than CVRF-CVE file.
skipping CVE-2023-38600 as CVE page is older than CVRF-CVE file.
skipping CVE-2023-38599 as CVE page is older than CVRF-CVE file.
skipping CVE-2023-38597 as CVE page is older than CVRF-CVE file.
skipping CVE-2023-38595 as CVE page is older than CVRF-CVE file.
skipping CVE-2023-38594 as CVE page is older than CVRF-CVE file.
skipping CVE-2023-38592 as CVE page is older than CVRF-CVE file.
no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2023-38575
no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2023-38552
skipping CVE-2023-38572 as CVE page is older than CVRF-CVE file.
skipping CVE-2023-38560 as CVE page is older than CVRF-CVE file.
skipping CVE-2023-38559 as CVE page is older than CVRF-CVE file.
no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2023-38546
no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2023-38545
no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2023-38497
no cpe found for SUSE Package Hub 15 SP5 in CVE-2023-38496
no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2023-38470
skipping CVE-2023-38473 as CVE page is older than CVRF-CVE file.
skipping CVE-2023-38472 as CVE page is older than CVRF-CVE file.
skipping CVE-2023-38471 as CVE page is older than CVRF-CVE file.
no cpe found for SUSE Liberty Linux 7 LTSS in CVE-2023-38408
no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2023-38408
skipping CVE-2023-38469 as CVE page is older than CVRF-CVE file.
skipping CVE-2023-38432 as CVE page is older than CVRF-CVE file.
skipping CVE-2023-38431 as CVE page is older than CVRF-CVE file.
skipping CVE-2023-38430 as CVE page is older than CVRF-CVE file.
skipping CVE-2023-38429 as CVE page is older than CVRF-CVE file.
skipping CVE-2023-38428 as CVE page is older than CVRF-CVE file.
skipping CVE-2023-38427 as CVE page is older than CVRF-CVE file.
skipping CVE-2023-38426 as CVE page is older than CVRF-CVE file.
skipping CVE-2023-38417 as CVE page is older than CVRF-CVE file.
skipping CVE-2023-38409 as CVE page is older than CVRF-CVE file.
no cpe found for SUSE Liberty Linux 7 LTSS in CVE-2023-38403
skipping CVE-2023-38407 as CVE page is older than CVRF-CVE file.
skipping CVE-2023-38406 as CVE page is older than CVRF-CVE file.
no cpe found for SUSE Package Hub 15 SP4 in CVE-2023-38285
no cpe found for SUSE Package Hub 15 SP5 in CVE-2023-38285
skipping CVE-2023-38325 as CVE page is older than CVRF-CVE file.
skipping CVE-2023-38289 as CVE page is older than CVRF-CVE file.
skipping CVE-2023-38288 as CVE page is older than CVRF-CVE file.
no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2023-38264
no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2023-38253
no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2023-38252
no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2023-38201
no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2023-38200
skipping CVE-2023-38197 as CVE page is older than CVRF-CVE file.
skipping CVE-2023-38133 as CVE page is older than CVRF-CVE file.
no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2023-38039
No V5 entry found for CVE-2023-38037 / /home/securitybot/prod/cve-database/cvelistV5/cves/2023/38xxxx/CVE-2023-38037.json:No such file or directory
no cpe found for SUSE Package Hub 15 SP5 in CVE-2023-38037
skipping CVE-2023-37920 as CVE page is older than CVRF-CVE file.
no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2023-37464
skipping CVE-2023-37536 as CVE page is older than CVRF-CVE file.
no cpe found for SUSE Liberty Linux 7 LTSS in CVE-2023-37460
no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2023-37460
no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2023-37450
skipping CVE-2023-37453 as CVE page is older than CVRF-CVE file.
skipping CVE-2023-37369 as CVE page is older than CVRF-CVE file.
skipping CVE-2023-37329 as CVE page is older than CVRF-CVE file.
skipping CVE-2023-37328 as CVE page is older than CVRF-CVE file.
skipping CVE-2023-37327 as CVE page is older than CVRF-CVE file.
no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2023-37212
no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2023-37211
no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2023-37210
no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2023-37209
no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2023-37208
no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2023-37207
no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2023-37206
no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2023-37205
no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2023-37204
no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2023-37203
no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2023-37202
no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2023-37201
skipping CVE-2023-36664 as CVE page is older than CVRF-CVE file.
skipping CVE-2023-36661 as CVE page is older than CVRF-CVE file.
skipping CVE-2023-36660 as CVE page is older than CVRF-CVE file.
skipping CVE-2023-36632 as CVE page is older than CVRF-CVE file.
skipping CVE-2023-36617 as CVE page is older than CVRF-CVE file.
no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2023-36479
no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2023-36478
no cpe found for SUSE Package Hub 15 SP5 in CVE-2023-36274
no cpe found for SUSE Package Hub 15 SP5 in CVE-2023-36273
no cpe found for SUSE Package Hub 15 SP5 in CVE-2023-36272
no cpe found for SUSE Package Hub 15 SP5 in CVE-2023-36271
no cpe found for SUSE Package Hub 15 SP4 in CVE-2023-36193
no cpe found for SUSE Package Hub 15 SP5 in CVE-2023-36193
skipping CVE-2023-36268 as CVE page is older than CVRF-CVE file.
no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2023-36054
skipping CVE-2023-36191 as CVE page is older than CVRF-CVE file.
no cpe found for SUSE Package Hub 15 SP4 in CVE-2023-36053
no cpe found for SUSE Package Hub 15 SP5 in CVE-2023-36053
no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2023-35946
no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2023-35945
no cpe found for SUSE Package Hub 15 SP5 in CVE-2023-35934
no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2023-35828
skipping CVE-2023-35829 as CVE page is older than CVRF-CVE file.
skipping CVE-2023-35827 as CVE page is older than CVRF-CVE file.
skipping CVE-2023-35826 as CVE page is older than CVRF-CVE file.
no cpe found for SUSE Package Hub 15 SP5 in CVE-2023-35790
skipping CVE-2023-35824 as CVE page is older than CVRF-CVE file.
skipping CVE-2023-35823 as CVE page is older than CVRF-CVE file.
no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2023-35789
skipping CVE-2023-35788 as CVE page is older than CVRF-CVE file.
skipping CVE-2023-35074 as CVE page is older than CVRF-CVE file.
no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2023-35001
no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2023-34968
skipping CVE-2023-34981 as CVE page is older than CVRF-CVE file.
skipping CVE-2023-34969 as CVE page is older than CVRF-CVE file.
no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2023-34967
no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2023-34966
no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2023-34872
no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2023-34623
no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2023-34462
skipping CVE-2023-34475 as CVE page is older than CVRF-CVE file.
skipping CVE-2023-34474 as CVE page is older than CVRF-CVE file.
no cpe found for SUSE Package Hub 15 SP4 in CVE-2023-34432
no cpe found for SUSE Package Hub 15 SP5 in CVE-2023-34432
skipping CVE-2023-34417 as CVE page is older than CVRF-CVE file.
skipping CVE-2023-34416 as CVE page is older than CVRF-CVE file.
skipping CVE-2023-34415 as CVE page is older than CVRF-CVE file.
skipping CVE-2023-34414 as CVE page is older than CVRF-CVE file.
skipping CVE-2023-34410 as CVE page is older than CVRF-CVE file.
no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2023-34328
no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2023-34327
no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2023-34326
no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2023-34325
no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2023-34323
skipping CVE-2023-34324 as CVE page is older than CVRF-CVE file.
no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2023-34322
no cpe found for SUSE Package Hub 15 SP4 in CVE-2023-34318
no cpe found for SUSE Package Hub 15 SP5 in CVE-2023-34318
skipping CVE-2023-34320 as CVE page is older than CVRF-CVE file.
skipping CVE-2023-34319 as CVE page is older than CVRF-CVE file.
skipping CVE-2023-34256 as CVE page is older than CVRF-CVE file.
skipping CVE-2023-34255 as CVE page is older than CVRF-CVE file.
skipping CVE-2023-34241 as CVE page is older than CVRF-CVE file.
skipping CVE-2023-34153 as CVE page is older than CVRF-CVE file.
skipping CVE-2023-34151 as CVE page is older than CVRF-CVE file.
no cpe found for SUSE Liberty Linux 7 LTSS in CVE-2023-34059
no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2023-34059
no cpe found for SUSE Liberty Linux 7 LTSS in CVE-2023-34058
no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2023-34058
No V5 entry found for CVE-2023-34049 / /home/securitybot/prod/cve-database/cvelistV5/cves/2023/34xxxx/CVE-2023-34049.json:No such file or directory
no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2023-34049
no cpe found for SUSE Manager Client Tools for RHEL, Liberty and Clones 9-CLIENT-TOOLS in CVE-2023-34049
no cpe found for SUSE Manager Tools for SLE Micro 5 in CVE-2023-34049
no cpe found for SUSE Package Hub 15 SP5 in CVE-2023-33865
skipping CVE-2023-33953 as CVE page is older than CVRF-CVE file.
skipping CVE-2023-33952 as CVE page is older than CVRF-CVE file.
skipping CVE-2023-33951 as CVE page is older than CVRF-CVE file.
no cpe found for SUSE Package Hub 15 SP5 in CVE-2023-33864
no cpe found for SUSE Package Hub 15 SP5 in CVE-2023-33863
no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2023-33850
skipping CVE-2023-33595 as CVE page is older than CVRF-CVE file.
no cpe found for SUSE Package Hub 15 SP5 in CVE-2023-33476
skipping CVE-2023-33461 as CVE page is older than CVRF-CVE file.
skipping CVE-2023-33460 as CVE page is older than CVRF-CVE file.
skipping CVE-2023-33288 as CVE page is older than CVRF-CVE file.
skipping CVE-2023-33285 as CVE page is older than CVRF-CVE file.
skipping CVE-2023-33250 as CVE page is older than CVRF-CVE file.
skipping CVE-2023-33204 as CVE page is older than CVRF-CVE file.
skipping CVE-2023-33203 as CVE page is older than CVRF-CVE file.
no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2023-33201
no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2023-33199
no cpe found for SUSE Package Hub 15 SP4 in CVE-2023-32784
no cpe found for SUSE Package Hub 15 SP5 in CVE-2023-32784
skipping CVE-2023-32763 as CVE page is older than CVRF-CVE file.
skipping CVE-2023-32762 as CVE page is older than CVRF-CVE file.
skipping CVE-2023-32732 as CVE page is older than CVRF-CVE file.
skipping CVE-2023-32731 as CVE page is older than CVRF-CVE file.
skipping CVE-2023-32728 as CVE page is older than CVRF-CVE file.
skipping CVE-2023-32727 as CVE page is older than CVRF-CVE file.
skipping CVE-2023-32726 as CVE page is older than CVRF-CVE file.
skipping CVE-2023-32725 as CVE page is older than CVRF-CVE file.
skipping CVE-2023-32724 as CVE page is older than CVRF-CVE file.
skipping CVE-2023-32723 as CVE page is older than CVRF-CVE file.
skipping CVE-2023-32722 as CVE page is older than CVRF-CVE file.
skipping CVE-2023-32721 as CVE page is older than CVRF-CVE file.
skipping CVE-2023-32700 as CVE page is older than CVRF-CVE file.
no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2023-32681
skipping CVE-2023-32665 as CVE page is older than CVRF-CVE file.
no cpe found for SUSE Package Hub 15 SP4 in CVE-2023-32627
no cpe found for SUSE Package Hub 15 SP5 in CVE-2023-32627
skipping CVE-2023-32643 as CVE page is older than CVRF-CVE file.
skipping CVE-2023-32636 as CVE page is older than CVRF-CVE file.
skipping CVE-2023-32629 as CVE page is older than CVRF-CVE file.
no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2023-32573
no cpe found for SUSE Package Hub 15 SP4 in CVE-2023-32573
skipping CVE-2023-32611 as CVE page is older than CVRF-CVE file.
no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2023-32559
no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2023-32439
no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2023-32435
no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2023-32393
skipping CVE-2023-32409 as CVE page is older than CVRF-CVE file.
no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2023-32359
skipping CVE-2023-32373 as CVE page is older than CVRF-CVE file.
skipping CVE-2023-32370 as CVE page is older than CVRF-CVE file.
skipping CVE-2023-32360 as CVE page is older than CVRF-CVE file.
no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2023-32324
skipping CVE-2023-32258 as CVE page is older than CVRF-CVE file.
skipping CVE-2023-32257 as CVE page is older than CVRF-CVE file.
skipping CVE-2023-32256 as CVE page is older than CVRF-CVE file.
skipping CVE-2023-32255 as CVE page is older than CVRF-CVE file.
skipping CVE-2023-32254 as CVE page is older than CVRF-CVE file.
skipping CVE-2023-32253 as CVE page is older than CVRF-CVE file.
skipping CVE-2023-32252 as CVE page is older than CVRF-CVE file.
skipping CVE-2023-32251 as CVE page is older than CVRF-CVE file.
skipping CVE-2023-32250 as CVE page is older than CVRF-CVE file.
skipping CVE-2023-32249 as CVE page is older than CVRF-CVE file.
skipping CVE-2023-32248 as CVE page is older than CVRF-CVE file.
skipping CVE-2023-32247 as CVE page is older than CVRF-CVE file.
skipping CVE-2023-32246 as CVE page is older than CVRF-CVE file.
skipping CVE-2023-32233 as CVE page is older than CVRF-CVE file.
skipping CVE-2023-32215 as CVE page is older than CVRF-CVE file.
skipping CVE-2023-32214 as CVE page is older than CVRF-CVE file.
skipping CVE-2023-32213 as CVE page is older than CVRF-CVE file.
skipping CVE-2023-32212 as CVE page is older than CVRF-CVE file.
skipping CVE-2023-32211 as CVE page is older than CVRF-CVE file.
No V5 entry found for CVE-2023-32197 / /home/securitybot/prod/cve-database/cvelistV5/cves/2023/32xxxx/CVE-2023-32197.json:No such file or directory
skipping CVE-2023-32207 as CVE page is older than CVRF-CVE file.
skipping CVE-2023-32206 as CVE page is older than CVRF-CVE file.
skipping CVE-2023-32205 as CVE page is older than CVRF-CVE file.
no cpe found for SUSE Package Hub 15 SP4 in CVE-2023-32184
no cpe found for SUSE Package Hub 15 SP5 in CVE-2023-32184
no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2023-32181
skipping CVE-2023-32182 as CVE page is older than CVRF-CVE file.
no cpe found for SUSE Liberty Linux 7 LTSS in CVE-2023-32067
no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2023-32067
no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2023-32006
no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2023-32002
no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2023-32001
no cpe found for SUSE Package Hub 15 SP5 in CVE-2023-31794
skipping CVE-2023-31582 as CVE page is older than CVRF-CVE file.
skipping CVE-2023-31557 as CVE page is older than CVRF-CVE file.
skipping CVE-2023-31554 as CVE page is older than CVRF-CVE file.
no cpe found for SUSE Package Hub 15 SP4 in CVE-2023-31486
no cpe found for SUSE Package Hub 15 SP5 in CVE-2023-31486
no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2023-31484
no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2023-31436
skipping CVE-2023-31439 as CVE page is older than CVRF-CVE file.
skipping CVE-2023-31438 as CVE page is older than CVRF-CVE file.
skipping CVE-2023-31437 as CVE page is older than CVRF-CVE file.
skipping CVE-2023-31356 as CVE page is older than CVRF-CVE file.
no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2023-31147
skipping CVE-2023-31315 as CVE page is older than CVRF-CVE file.
skipping CVE-2023-31248 as CVE page is older than CVRF-CVE file.
no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2023-31130
no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2023-31124
no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2023-31122
no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2023-31085
no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2023-31084
skipping CVE-2023-31083 as CVE page is older than CVRF-CVE file.
skipping CVE-2023-31082 as CVE page is older than CVRF-CVE file.
skipping CVE-2023-31081 as CVE page is older than CVRF-CVE file.
no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2023-31022
no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2023-30861
no cpe found for SUSE Package Hub 15 SP4 in CVE-2023-30801
no cpe found for SUSE Package Hub 15 SP5 in CVE-2023-30801
no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2023-30630
skipping CVE-2023-30775 as CVE page is older than CVRF-CVE file.
skipping CVE-2023-30774 as CVE page is older than CVRF-CVE file.
skipping CVE-2023-30772 as CVE page is older than CVRF-CVE file.
CVE-2023-30608: no packages for Image SLES15-SP6, but entry?
CVE-2023-30608: no packages for Image SLES15-SP5-SAP-BYOS-Azure, but entry?
CVE-2023-30608: no packages for Image SLES15-SP5-BYOS-EC2, but entry?
CVE-2023-30608: no packages for Image SLES15-SP4-SAP-Hardened-BYOS-Azure, but entry?
CVE-2023-30608: no packages for SUSE Linux Enterprise Installer Updates 15 SP5, but entry?
CVE-2023-30608: no packages for Image SLES15-SP5-SAPCAL-Azure, but entry?
CVE-2023-30608: no packages for SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS, but entry?
CVE-2023-30608: no packages for Image SLES15-SP4-BYOS-Azure, but entry?
CVE-2023-30608: no packages for Image SLES15-SP4-Manager-Server-4-3-BYOS-EC2, but entry?
CVE-2023-30608: no packages for Image SLES15-SP4-SAP-Hardened-Azure, but entry?
CVE-2023-30608: no packages for SUSE Linux Enterprise Server for SAP Applications 15 SP4, but entry?
CVE-2023-30608: no packages for Image SLES15-SP4-HPC-BYOS-EC2, but entry?
CVE-2023-30608: no packages for openSUSE Leap Micro 5.4, but entry?
CVE-2023-30608: no packages for Image SLES15-SP6-HPC-Azure, but entry?
CVE-2023-30608: no packages for Image SLES15-SP4-SAP-BYOS-Azure, but entry?
CVE-2023-30608: no packages for Image SLES15-SP6-SAP-Azure, but entry?
CVE-2023-30608: no packages for Container bci/python:3.11-42.5, but entry?
CVE-2023-30608: no packages for Image SLES15-SP4-Manager-Server-4-3-BYOS-GCE, but entry?
CVE-2023-30608: no packages for Image SLES15-SP4-Manager-Server-4-3-BYOS-Azure, but entry?
CVE-2023-30608: no packages for Image SLES15-SP4-Hardened-BYOS, but entry?
CVE-2023-30608: no packages for SUSE Linux Enterprise Installer Updates 15 SP4, but entry?
CVE-2023-30608: no packages for Image SLES15-SP5-BYOS-Azure, but entry?
CVE-2023-30608: no packages for Image SLES15-SP4-SAP-Hardened-BYOS-EC2, but entry?
CVE-2023-30608: no packages for Image SLES15-SP6-HPC-BYOS-EC2, but entry?
CVE-2023-30608: no packages for Image SLES15-SP5-HPC-Azure, but entry?
CVE-2023-30608: no packages for Image SLES15-SP6-SAPCAL-Azure, but entry?
CVE-2023-30608: no packages for Image SLES15-SP4-Hardened-BYOS-GCE, but entry?
CVE-2023-30608: no packages for Image SLES15-SP4-HPC-BYOS-GCE, but entry?
CVE-2023-30608: no packages for Image SLES15-SP6-HPC-BYOS, but entry?
CVE-2023-30608: no packages for SUSE Manager Retail Branch Server 4.3, but entry?
CVE-2023-30608: no packages for Image SLES15-SP6-Azure-Basic, but entry?
CVE-2023-30608: no packages for Image SLES15-SP4-BYOS-EC2, but entry?
CVE-2023-30608: no packages for Image SLES15-SP5-Hardened-BYOS-Azure, but entry?
CVE-2023-30608: no packages for Image SLES15-SP5-SAP-Hardened-Azure, but entry?
CVE-2023-30608: no packages for SUSE Linux Enterprise Module for Python 3 15 SP6, but entry?
CVE-2023-30608: no packages for Image SLES15-SP5-SAP-Hardened-BYOS-EC2, but entry?
CVE-2023-30608: no packages for Image SLES15-SP4-SAP-EC2, but entry?
CVE-2023-30608: no packages for Image SLES15-SP6-SAP-Hardened-EC2, but entry?
CVE-2023-30608: no packages for SUSE Linux Enterprise Server 15 SP4-LTSS, but entry?
CVE-2023-30608: no packages for Image SLES15-SP5-SAPCAL-EC2, but entry?
CVE-2023-30608: no packages for Image SLES15-SP4-SAPCAL-Azure, but entry?
CVE-2023-30608: no packages for Image SLES15-SP6-HPC-EC2, but entry?
CVE-2023-30608: no packages for Image SLES15-SP4-Manager-Proxy-4-3-BYOS, but entry?
CVE-2023-30608: no packages for Image SLES15-SP4-SAPCAL-EC2, but entry?
CVE-2023-30608: no packages for Image SLES15-SP6-SAP-Hardened-BYOS-EC2, but entry?
CVE-2023-30608: no packages for Image SLES15-SP6-SAP-EC2, but entry?
CVE-2023-30608: no packages for Image SLES15-SP6-SAP-Hardened-Azure, but entry?
CVE-2023-30608: no packages for Image SLES15-SP4-SAP-GCE, but entry?
CVE-2023-30608: no packages for Image SLES15-SP4-Manager-Proxy-4-3-BYOS-GCE, but entry?
CVE-2023-30608: no packages for Image SLES15-SP5-SAP-BYOS-EC2, but entry?
CVE-2023-30608: no packages for Image SLES15-SP6-SAP-Hardened, but entry?
CVE-2023-30608: no packages for openSUSE Leap Micro 5.3, but entry?
CVE-2023-30608: no packages for Image SLES15-SP4-HPC-GCE, but entry?
CVE-2023-30608: no packages for Image SLES15-SP6-BYOS-EC2, but entry?
CVE-2023-30608: no packages for Image SLES15-SP5-SAP-Hardened-BYOS-Azure, but entry?
CVE-2023-30608: no packages for SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS, but entry?
CVE-2023-30608: no packages for Image SLES15-SP4-Manager-Proxy-4-3-BYOS-Azure, but entry?
CVE-2023-30608: no packages for Image SLES15-SP4-Manager-Proxy-4-3-BYOS-EC2, but entry?
CVE-2023-30608: no packages for Image SLES15-SP4-CHOST-BYOS-SAP-CCloud, but entry?
CVE-2023-30608: no packages for SUSE Linux Enterprise Micro 5.3, but entry?
CVE-2023-30608: no packages for SUSE Manager Proxy 4.3, but entry?
CVE-2023-30608: no packages for Image SLES15-SP4-SAP-BYOS-EC2, but entry?
CVE-2023-30608: no packages for Image SLES15-SP4-SAP-Azure, but entry?
CVE-2023-30608: no packages for Image SLES15-SP6-SAP-BYOS-EC2, but entry?
CVE-2023-30608: no packages for Image SLES15-SP6-BYOS-Azure, but entry?
CVE-2023-30608: no packages for Image SLES15-SP4-SAP-Hardened-BYOS, but entry?
CVE-2023-30608: no packages for Image SLES15-SP4-Hardened-BYOS-EC2, but entry?
CVE-2023-30608: no packages for Image SLES15-SP4-HPC-BYOS-Azure, but entry?
CVE-2023-30608: no packages for Image SLES15-SP4-Manager-Server-4-3-EC2-llc, but entry?
CVE-2023-30608: no packages for Image SLES15-SP4-Manager-Server-4-3, but entry?
CVE-2023-30608: no packages for Image SLES15-SP4-SAP, but entry?
CVE-2023-30608: no packages for Image SLES15-SP4-Manager-Server-4-3-BYOS, but entry?
CVE-2023-30608: no packages for SUSE Manager Server 4.3, but entry?
CVE-2023-30608: no packages for SUSE Linux Enterprise Micro 5.4, but entry?
CVE-2023-30608: no packages for Image SLES15-SP6-SAP-Hardened-BYOS, but entry?
CVE-2023-30608: no packages for Image SLES15-SP4-BYOS-GCE, but entry?
CVE-2023-30608: no packages for Image SLES15-SP6-BYOS, but entry?
CVE-2023-30608: no packages for Image SLES15-SP6-SAP-BYOS, but entry?
CVE-2023-30608: no packages for openSUSE Leap Micro 5.5, but entry?
CVE-2023-30608: no packages for Image SLES15-SP6-Hardened-BYOS-Azure, but entry?
CVE-2023-30608: no packages for Image SLES15-SP4-SAPCAL-GCE, but entry?
CVE-2023-30608: no packages for Image SLES15-SP6-EC2, but entry?
CVE-2023-30608: no packages for Image SLES15-SP5-Azure-Standard, but entry?
CVE-2023-30608: no packages for Image SLES15-SP6-Azure-Standard, but entry?
CVE-2023-30608: no packages for Image SLES15-SP6-SAP, but entry?
CVE-2023-30608: no packages for Image SLES15-SP4-SAP-Hardened, but entry?
CVE-2023-30608: no packages for Image SLES15-SP4-BYOS, but entry?
CVE-2023-30608: no packages for Image SLES15-SP6-SAPCAL, but entry?
CVE-2023-30608: no packages for Image SLES15-SP4-HPC-BYOS, but entry?
CVE-2023-30608: no packages for Image SLES15-SP5-EC2, but entry?
CVE-2023-30608: no packages for Image SLES15-SP6-Hardened-BYOS, but entry?
CVE-2023-30608: no packages for Image SLES15-SP6-Hardened-BYOS-EC2, but entry?
CVE-2023-30608: no packages for Image SLES15-SP4-Manager-Server-4-3-EC2-ltd, but entry?
CVE-2023-30608: no packages for Image SLES15-SP6-SAP-Hardened-BYOS-Azure, but entry?
CVE-2023-30608: no packages for Image SLES15-SP4-Hardened-BYOS-Azure, but entry?
CVE-2023-30608: no packages for Image SLES15-SP4-SAP-BYOS, but entry?
CVE-2023-30608: no packages for Image SLES15-SP6-HPC-BYOS-Azure, but entry?
CVE-2023-30608: no packages for Image SLES15-SP5-Azure-Basic, but entry?
CVE-2023-30608: no packages for Image SLES15-SP4-Manager-Server-4-3-Azure-llc, but entry?
CVE-2023-30608: no packages for Container bci/python:3, but entry?
CVE-2023-30608: no packages for Image SLES15-SP5-HPC-BYOS-Azure, but entry?
CVE-2023-30608: no packages for Image SLES15-SP6-EC2-ECS-HVM, but entry?
CVE-2023-30608: no packages for Image SLES15-SP4-HPC-EC2, but entry?
CVE-2023-30608: no packages for Image SLES15-SP6-SAPCAL-EC2, but entry?
CVE-2023-30608: no packages for Image SLES15-SP5-HPC-BYOS-EC2, but entry?
CVE-2023-30608: no packages for Image SLES15-SP4-SAPCAL, but entry?
CVE-2023-30608: no packages for Image SLES15-SP4-Micro-5-4-BYOS-Azure, but entry?
CVE-2023-30608: no packages for SUSE Linux Enterprise Module for Development Tools 15 SP5, but entry?
CVE-2023-30608: no packages for SUSE Linux Enterprise Micro 5.5, but entry?
CVE-2023-30608: no packages for Image SLES15-SP6-SAP-BYOS-Azure, but entry?
CVE-2023-30608: no packages for SUSE Linux Enterprise Module for Python 3 15 SP5, but entry?
CVE-2023-30608: no packages for Image SLES15-SP4-Manager-Server-4-3-Azure-ltd, but entry?
CVE-2023-30608: no packages for Image SLES15-SP6-HPC, but entry?
no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2023-30608
CVE-2023-30608: no packages for Container bci/python:3, but entry?
CVE-2023-30608: no packages for Container bci/python:3.11-42.5, but entry?
CVE-2023-30608: no packages for Image SLES15-SP4-BYOS, but entry?
CVE-2023-30608: no packages for Image SLES15-SP4-BYOS-Azure, but entry?
CVE-2023-30608: no packages for Image SLES15-SP4-BYOS-EC2, but entry?
CVE-2023-30608: no packages for Image SLES15-SP4-BYOS-GCE, but entry?
CVE-2023-30608: no packages for Image SLES15-SP4-CHOST-BYOS-SAP-CCloud, but entry?
CVE-2023-30608: no packages for Image SLES15-SP4-HPC-BYOS, but entry?
CVE-2023-30608: no packages for Image SLES15-SP4-HPC-BYOS-Azure, but entry?
CVE-2023-30608: no packages for Image SLES15-SP4-HPC-BYOS-EC2, but entry?
CVE-2023-30608: no packages for Image SLES15-SP4-HPC-BYOS-GCE, but entry?
CVE-2023-30608: no packages for Image SLES15-SP4-HPC-EC2, but entry?
CVE-2023-30608: no packages for Image SLES15-SP4-HPC-GCE, but entry?
CVE-2023-30608: no packages for Image SLES15-SP4-Hardened-BYOS, but entry?
CVE-2023-30608: no packages for Image SLES15-SP4-Hardened-BYOS-Azure, but entry?
CVE-2023-30608: no packages for Image SLES15-SP4-Hardened-BYOS-EC2, but entry?
CVE-2023-30608: no packages for Image SLES15-SP4-Hardened-BYOS-GCE, but entry?
CVE-2023-30608: no packages for Image SLES15-SP4-Manager-Proxy-4-3-BYOS, but entry?
CVE-2023-30608: no packages for Image SLES15-SP4-Manager-Proxy-4-3-BYOS-Azure, but entry?
CVE-2023-30608: no packages for Image SLES15-SP4-Manager-Proxy-4-3-BYOS-EC2, but entry?
CVE-2023-30608: no packages for Image SLES15-SP4-Manager-Proxy-4-3-BYOS-GCE, but entry?
CVE-2023-30608: no packages for Image SLES15-SP4-Manager-Server-4-3, but entry?
CVE-2023-30608: no packages for Image SLES15-SP4-Manager-Server-4-3-Azure-llc, but entry?
CVE-2023-30608: no packages for Image SLES15-SP4-Manager-Server-4-3-Azure-ltd, but entry?
CVE-2023-30608: no packages for Image SLES15-SP4-Manager-Server-4-3-BYOS, but entry?
CVE-2023-30608: no packages for Image SLES15-SP4-Manager-Server-4-3-BYOS-Azure, but entry?
CVE-2023-30608: no packages for Image SLES15-SP4-Manager-Server-4-3-BYOS-EC2, but entry?
CVE-2023-30608: no packages for Image SLES15-SP4-Manager-Server-4-3-BYOS-GCE, but entry?
CVE-2023-30608: no packages for Image SLES15-SP4-Manager-Server-4-3-EC2-llc, but entry?
CVE-2023-30608: no packages for Image SLES15-SP4-Manager-Server-4-3-EC2-ltd, but entry?
CVE-2023-30608: no packages for Image SLES15-SP4-Micro-5-4-BYOS-Azure, but entry?
CVE-2023-30608: no packages for Image SLES15-SP4-SAP, but entry?
CVE-2023-30608: no packages for Image SLES15-SP4-SAP-Azure, but entry?
CVE-2023-30608: no packages for Image SLES15-SP4-SAP-BYOS, but entry?
CVE-2023-30608: no packages for Image SLES15-SP4-SAP-BYOS-Azure, but entry?
CVE-2023-30608: no packages for Image SLES15-SP4-SAP-BYOS-EC2, but entry?
CVE-2023-30608: no packages for Image SLES15-SP4-SAP-EC2, but entry?
CVE-2023-30608: no packages for Image SLES15-SP4-SAP-GCE, but entry?
CVE-2023-30608: no packages for Image SLES15-SP4-SAP-Hardened, but entry?
CVE-2023-30608: no packages for Image SLES15-SP4-SAP-Hardened-Azure, but entry?
CVE-2023-30608: no packages for Image SLES15-SP4-SAP-Hardened-BYOS, but entry?
CVE-2023-30608: no packages for Image SLES15-SP4-SAP-Hardened-BYOS-Azure, but entry?
CVE-2023-30608: no packages for Image SLES15-SP4-SAP-Hardened-BYOS-EC2, but entry?
CVE-2023-30608: no packages for Image SLES15-SP4-SAPCAL, but entry?
CVE-2023-30608: no packages for Image SLES15-SP4-SAPCAL-Azure, but entry?
CVE-2023-30608: no packages for Image SLES15-SP4-SAPCAL-EC2, but entry?
CVE-2023-30608: no packages for Image SLES15-SP4-SAPCAL-GCE, but entry?
CVE-2023-30608: no packages for Image SLES15-SP5-Azure-Basic, but entry?
CVE-2023-30608: no packages for Image SLES15-SP5-Azure-Standard, but entry?
CVE-2023-30608: no packages for Image SLES15-SP5-BYOS-Azure, but entry?
CVE-2023-30608: no packages for Image SLES15-SP5-BYOS-EC2, but entry?
CVE-2023-30608: no packages for Image SLES15-SP5-EC2, but entry?
CVE-2023-30608: no packages for Image SLES15-SP5-HPC-Azure, but entry?
CVE-2023-30608: no packages for Image SLES15-SP5-HPC-BYOS-Azure, but entry?
CVE-2023-30608: no packages for Image SLES15-SP5-HPC-BYOS-EC2, but entry?
CVE-2023-30608: no packages for Image SLES15-SP5-Hardened-BYOS-Azure, but entry?
CVE-2023-30608: no packages for Image SLES15-SP5-SAP-BYOS-Azure, but entry?
CVE-2023-30608: no packages for Image SLES15-SP5-SAP-BYOS-EC2, but entry?
CVE-2023-30608: no packages for Image SLES15-SP5-SAP-Hardened-Azure, but entry?
CVE-2023-30608: no packages for Image SLES15-SP5-SAP-Hardened-BYOS-Azure, but entry?
CVE-2023-30608: no packages for Image SLES15-SP5-SAP-Hardened-BYOS-EC2, but entry?
CVE-2023-30608: no packages for Image SLES15-SP5-SAPCAL-Azure, but entry?
CVE-2023-30608: no packages for Image SLES15-SP5-SAPCAL-EC2, but entry?
CVE-2023-30608: no packages for Image SLES15-SP6, but entry?
CVE-2023-30608: no packages for Image SLES15-SP6-Azure-Basic, but entry?
CVE-2023-30608: no packages for Image SLES15-SP6-Azure-Standard, but entry?
CVE-2023-30608: no packages for Image SLES15-SP6-BYOS, but entry?
CVE-2023-30608: no packages for Image SLES15-SP6-BYOS-Azure, but entry?
CVE-2023-30608: no packages for Image SLES15-SP6-BYOS-EC2, but entry?
CVE-2023-30608: no packages for Image SLES15-SP6-EC2, but entry?
CVE-2023-30608: no packages for Image SLES15-SP6-EC2-ECS-HVM, but entry?
CVE-2023-30608: no packages for Image SLES15-SP6-HPC, but entry?
CVE-2023-30608: no packages for Image SLES15-SP6-HPC-Azure, but entry?
CVE-2023-30608: no packages for Image SLES15-SP6-HPC-BYOS, but entry?
CVE-2023-30608: no packages for Image SLES15-SP6-HPC-BYOS-Azure, but entry?
CVE-2023-30608: no packages for Image SLES15-SP6-HPC-BYOS-EC2, but entry?
CVE-2023-30608: no packages for Image SLES15-SP6-HPC-EC2, but entry?
CVE-2023-30608: no packages for Image SLES15-SP6-Hardened-BYOS, but entry?
CVE-2023-30608: no packages for Image SLES15-SP6-Hardened-BYOS-Azure, but entry?
CVE-2023-30608: no packages for Image SLES15-SP6-Hardened-BYOS-EC2, but entry?
CVE-2023-30608: no packages for Image SLES15-SP6-SAP, but entry?
CVE-2023-30608: no packages for Image SLES15-SP6-SAP-Azure, but entry?
CVE-2023-30608: no packages for Image SLES15-SP6-SAP-BYOS, but entry?
CVE-2023-30608: no packages for Image SLES15-SP6-SAP-BYOS-Azure, but entry?
CVE-2023-30608: no packages for Image SLES15-SP6-SAP-BYOS-EC2, but entry?
CVE-2023-30608: no packages for Image SLES15-SP6-SAP-EC2, but entry?
CVE-2023-30608: no packages for Image SLES15-SP6-SAP-Hardened, but entry?
CVE-2023-30608: no packages for Image SLES15-SP6-SAP-Hardened-Azure, but entry?
CVE-2023-30608: no packages for Image SLES15-SP6-SAP-Hardened-BYOS, but entry?
CVE-2023-30608: no packages for Image SLES15-SP6-SAP-Hardened-BYOS-Azure, but entry?
CVE-2023-30608: no packages for Image SLES15-SP6-SAP-Hardened-BYOS-EC2, but entry?
CVE-2023-30608: no packages for Image SLES15-SP6-SAP-Hardened-EC2, but entry?
CVE-2023-30608: no packages for Image SLES15-SP6-SAPCAL, but entry?
CVE-2023-30608: no packages for Image SLES15-SP6-SAPCAL-Azure, but entry?
CVE-2023-30608: no packages for Image SLES15-SP6-SAPCAL-EC2, but entry?
CVE-2023-30608: no packages for SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS, but entry?
CVE-2023-30608: no packages for SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS, but entry?
CVE-2023-30608: no packages for SUSE Linux Enterprise Installer Updates 15 SP4, but entry?
CVE-2023-30608: no packages for SUSE Linux Enterprise Installer Updates 15 SP5, but entry?
CVE-2023-30608: no packages for SUSE Linux Enterprise Micro 5.3, but entry?
CVE-2023-30608: no packages for SUSE Linux Enterprise Micro 5.4, but entry?
CVE-2023-30608: no packages for SUSE Linux Enterprise Micro 5.5, but entry?
CVE-2023-30608: no packages for SUSE Linux Enterprise Module for Development Tools 15 SP5, but entry?
CVE-2023-30608: no packages for SUSE Linux Enterprise Module for Python 3 15 SP5, but entry?
CVE-2023-30608: no packages for SUSE Linux Enterprise Module for Python 3 15 SP6, but entry?
CVE-2023-30608: no packages for SUSE Linux Enterprise Server 15 SP4-LTSS, but entry?
CVE-2023-30608: no packages for SUSE Linux Enterprise Server for SAP Applications 15 SP4, but entry?
CVE-2023-30608: no packages for SUSE Manager Proxy 4.3, but entry?
CVE-2023-30608: no packages for SUSE Manager Retail Branch Server 4.3, but entry?
CVE-2023-30608: no packages for SUSE Manager Server 4.3, but entry?
CVE-2023-30608: no packages for openSUSE Leap Micro 5.3, but entry?
CVE-2023-30608: no packages for openSUSE Leap Micro 5.4, but entry?
CVE-2023-30608: no packages for openSUSE Leap Micro 5.5, but entry?
CVE-2023-30608: no packages for Container bci/python:3, but entry?
CVE-2023-30608: no packages for Container bci/python:3.11-42.5, but entry?
CVE-2023-30608: no packages for Image SLES15-SP4-BYOS, but entry?
CVE-2023-30608: no packages for Image SLES15-SP4-BYOS-Azure, but entry?
CVE-2023-30608: no packages for Image SLES15-SP4-BYOS-EC2, but entry?
CVE-2023-30608: no packages for Image SLES15-SP4-BYOS-GCE, but entry?
CVE-2023-30608: no packages for Image SLES15-SP4-CHOST-BYOS-SAP-CCloud, but entry?
CVE-2023-30608: no packages for Image SLES15-SP4-HPC-BYOS, but entry?
CVE-2023-30608: no packages for Image SLES15-SP4-HPC-BYOS-Azure, but entry?
CVE-2023-30608: no packages for Image SLES15-SP4-HPC-BYOS-EC2, but entry?
CVE-2023-30608: no packages for Image SLES15-SP4-HPC-BYOS-GCE, but entry?
CVE-2023-30608: no packages for Image SLES15-SP4-HPC-EC2, but entry?
CVE-2023-30608: no packages for Image SLES15-SP4-HPC-GCE, but entry?
CVE-2023-30608: no packages for Image SLES15-SP4-Hardened-BYOS, but entry?
CVE-2023-30608: no packages for Image SLES15-SP4-Hardened-BYOS-Azure, but entry?
CVE-2023-30608: no packages for Image SLES15-SP4-Hardened-BYOS-EC2, but entry?
CVE-2023-30608: no packages for Image SLES15-SP4-Hardened-BYOS-GCE, but entry?
CVE-2023-30608: no packages for Image SLES15-SP4-Manager-Proxy-4-3-BYOS, but entry?
CVE-2023-30608: no packages for Image SLES15-SP4-Manager-Proxy-4-3-BYOS-Azure, but entry?
CVE-2023-30608: no packages for Image SLES15-SP4-Manager-Proxy-4-3-BYOS-EC2, but entry?
CVE-2023-30608: no packages for Image SLES15-SP4-Manager-Proxy-4-3-BYOS-GCE, but entry?
CVE-2023-30608: no packages for Image SLES15-SP4-Manager-Server-4-3, but entry?
CVE-2023-30608: no packages for Image SLES15-SP4-Manager-Server-4-3-Azure-llc, but entry?
CVE-2023-30608: no packages for Image SLES15-SP4-Manager-Server-4-3-Azure-ltd, but entry?
CVE-2023-30608: no packages for Image SLES15-SP4-Manager-Server-4-3-BYOS, but entry?
CVE-2023-30608: no packages for Image SLES15-SP4-Manager-Server-4-3-BYOS-Azure, but entry?
CVE-2023-30608: no packages for Image SLES15-SP4-Manager-Server-4-3-BYOS-EC2, but entry?
CVE-2023-30608: no packages for Image SLES15-SP4-Manager-Server-4-3-BYOS-GCE, but entry?
CVE-2023-30608: no packages for Image SLES15-SP4-Manager-Server-4-3-EC2-llc, but entry?
CVE-2023-30608: no packages for Image SLES15-SP4-Manager-Server-4-3-EC2-ltd, but entry?
CVE-2023-30608: no packages for Image SLES15-SP4-Micro-5-4-BYOS-Azure, but entry?
CVE-2023-30608: no packages for Image SLES15-SP4-SAP, but entry?
CVE-2023-30608: no packages for Image SLES15-SP4-SAP-Azure, but entry?
CVE-2023-30608: no packages for Image SLES15-SP4-SAP-BYOS, but entry?
CVE-2023-30608: no packages for Image SLES15-SP4-SAP-BYOS-Azure, but entry?
CVE-2023-30608: no packages for Image SLES15-SP4-SAP-BYOS-EC2, but entry?
CVE-2023-30608: no packages for Image SLES15-SP4-SAP-EC2, but entry?
CVE-2023-30608: no packages for Image SLES15-SP4-SAP-GCE, but entry?
CVE-2023-30608: no packages for Image SLES15-SP4-SAP-Hardened, but entry?
CVE-2023-30608: no packages for Image SLES15-SP4-SAP-Hardened-Azure, but entry?
CVE-2023-30608: no packages for Image SLES15-SP4-SAP-Hardened-BYOS, but entry?
CVE-2023-30608: no packages for Image SLES15-SP4-SAP-Hardened-BYOS-Azure, but entry?
CVE-2023-30608: no packages for Image SLES15-SP4-SAP-Hardened-BYOS-EC2, but entry?
CVE-2023-30608: no packages for Image SLES15-SP4-SAPCAL, but entry?
CVE-2023-30608: no packages for Image SLES15-SP4-SAPCAL-Azure, but entry?
CVE-2023-30608: no packages for Image SLES15-SP4-SAPCAL-EC2, but entry?
CVE-2023-30608: no packages for Image SLES15-SP4-SAPCAL-GCE, but entry?
CVE-2023-30608: no packages for Image SLES15-SP5-Azure-Basic, but entry?
CVE-2023-30608: no packages for Image SLES15-SP5-Azure-Standard, but entry?
CVE-2023-30608: no packages for Image SLES15-SP5-BYOS-Azure, but entry?
CVE-2023-30608: no packages for Image SLES15-SP5-BYOS-EC2, but entry?
CVE-2023-30608: no packages for Image SLES15-SP5-EC2, but entry?
CVE-2023-30608: no packages for Image SLES15-SP5-HPC-Azure, but entry?
CVE-2023-30608: no packages for Image SLES15-SP5-HPC-BYOS-Azure, but entry?
CVE-2023-30608: no packages for Image SLES15-SP5-HPC-BYOS-EC2, but entry?
CVE-2023-30608: no packages for Image SLES15-SP5-Hardened-BYOS-Azure, but entry?
CVE-2023-30608: no packages for Image SLES15-SP5-SAP-BYOS-Azure, but entry?
CVE-2023-30608: no packages for Image SLES15-SP5-SAP-BYOS-EC2, but entry?
CVE-2023-30608: no packages for Image SLES15-SP5-SAP-Hardened-Azure, but entry?
CVE-2023-30608: no packages for Image SLES15-SP5-SAP-Hardened-BYOS-Azure, but entry?
CVE-2023-30608: no packages for Image SLES15-SP5-SAP-Hardened-BYOS-EC2, but entry?
CVE-2023-30608: no packages for Image SLES15-SP5-SAPCAL-Azure, but entry?
CVE-2023-30608: no packages for Image SLES15-SP5-SAPCAL-EC2, but entry?
CVE-2023-30608: no packages for Image SLES15-SP6, but entry?
CVE-2023-30608: no packages for Image SLES15-SP6-Azure-Basic, but entry?
CVE-2023-30608: no packages for Image SLES15-SP6-Azure-Standard, but entry?
CVE-2023-30608: no packages for Image SLES15-SP6-BYOS, but entry?
CVE-2023-30608: no packages for Image SLES15-SP6-BYOS-Azure, but entry?
CVE-2023-30608: no packages for Image SLES15-SP6-BYOS-EC2, but entry?
CVE-2023-30608: no packages for Image SLES15-SP6-EC2, but entry?
CVE-2023-30608: no packages for Image SLES15-SP6-EC2-ECS-HVM, but entry?
CVE-2023-30608: no packages for Image SLES15-SP6-HPC, but entry?
CVE-2023-30608: no packages for Image SLES15-SP6-HPC-Azure, but entry?
CVE-2023-30608: no packages for Image SLES15-SP6-HPC-BYOS, but entry?
CVE-2023-30608: no packages for Image SLES15-SP6-HPC-BYOS-Azure, but entry?
CVE-2023-30608: no packages for Image SLES15-SP6-HPC-BYOS-EC2, but entry?
CVE-2023-30608: no packages for Image SLES15-SP6-HPC-EC2, but entry?
CVE-2023-30608: no packages for Image SLES15-SP6-Hardened-BYOS, but entry?
CVE-2023-30608: no packages for Image SLES15-SP6-Hardened-BYOS-Azure, but entry?
CVE-2023-30608: no packages for Image SLES15-SP6-Hardened-BYOS-EC2, but entry?
CVE-2023-30608: no packages for Image SLES15-SP6-SAP, but entry?
CVE-2023-30608: no packages for Image SLES15-SP6-SAP-Azure, but entry?
CVE-2023-30608: no packages for Image SLES15-SP6-SAP-BYOS, but entry?
CVE-2023-30608: no packages for Image SLES15-SP6-SAP-BYOS-Azure, but entry?
CVE-2023-30608: no packages for Image SLES15-SP6-SAP-BYOS-EC2, but entry?
CVE-2023-30608: no packages for Image SLES15-SP6-SAP-EC2, but entry?
CVE-2023-30608: no packages for Image SLES15-SP6-SAP-Hardened, but entry?
CVE-2023-30608: no packages for Image SLES15-SP6-SAP-Hardened-Azure, but entry?
CVE-2023-30608: no packages for Image SLES15-SP6-SAP-Hardened-BYOS, but entry?
CVE-2023-30608: no packages for Image SLES15-SP6-SAP-Hardened-BYOS-Azure, but entry?
CVE-2023-30608: no packages for Image SLES15-SP6-SAP-Hardened-BYOS-EC2, but entry?
CVE-2023-30608: no packages for Image SLES15-SP6-SAP-Hardened-EC2, but entry?
CVE-2023-30608: no packages for Image SLES15-SP6-SAPCAL, but entry?
CVE-2023-30608: no packages for Image SLES15-SP6-SAPCAL-Azure, but entry?
CVE-2023-30608: no packages for Image SLES15-SP6-SAPCAL-EC2, but entry?
CVE-2023-30608: no packages for SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS, but entry?
CVE-2023-30608: no packages for SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS, but entry?
CVE-2023-30608: no packages for SUSE Linux Enterprise Installer Updates 15 SP4, but entry?
CVE-2023-30608: no packages for SUSE Linux Enterprise Installer Updates 15 SP5, but entry?
CVE-2023-30608: no packages for SUSE Linux Enterprise Micro 5.3, but entry?
CVE-2023-30608: no packages for SUSE Linux Enterprise Micro 5.4, but entry?
CVE-2023-30608: no packages for SUSE Linux Enterprise Micro 5.5, but entry?
CVE-2023-30608: no packages for SUSE Linux Enterprise Module for Development Tools 15 SP5, but entry?
CVE-2023-30608: no packages for SUSE Linux Enterprise Module for Python 3 15 SP5, but entry?
CVE-2023-30608: no packages for SUSE Linux Enterprise Module for Python 3 15 SP6, but entry?
CVE-2023-30608: no packages for SUSE Linux Enterprise Server 15 SP4-LTSS, but entry?
CVE-2023-30608: no packages for SUSE Linux Enterprise Server for SAP Applications 15 SP4, but entry?
CVE-2023-30608: no packages for SUSE Manager Proxy 4.3, but entry?
CVE-2023-30608: no packages for SUSE Manager Retail Branch Server 4.3, but entry?
CVE-2023-30608: no packages for SUSE Manager Server 4.3, but entry?
CVE-2023-30608: no packages for openSUSE Leap Micro 5.3, but entry?
CVE-2023-30608: no packages for openSUSE Leap Micro 5.4, but entry?
CVE-2023-30608: no packages for openSUSE Leap Micro 5.5, but entry?
CVE-2023-30608: no packages for SUSE Linux Enterprise Installer Updates 15 SP4, but entry?
CVE-2023-30608: no packages for SUSE Linux Enterprise Installer Updates 15 SP5, but entry?
no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2023-30590
no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2023-30589
no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2023-30588
no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2023-30585
no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2023-30581
no cpe found for SUSE Package Hub 15 SP4 in CVE-2023-30577
no cpe found for SUSE Package Hub 15 SP5 in CVE-2023-30577
no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2023-30551
no cpe found for SUSE Package Hub 15 SP5 in CVE-2023-30549
no cpe found for SUSE Package Hub 15 SP4 in CVE-2023-30534
no cpe found for SUSE Package Hub 15 SP5 in CVE-2023-30534
no cpe found for SUSE Package Hub 15 SP6 in CVE-2023-30464
no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2023-30441
skipping CVE-2023-30456 as CVE page is older than CVRF-CVE file.
no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2023-30079
skipping CVE-2023-30086 as CVE page is older than CVRF-CVE file.
no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2023-30078
skipping CVE-2023-29942 as CVE page is older than CVRF-CVE file.
skipping CVE-2023-29941 as CVE page is older than CVRF-CVE file.
skipping CVE-2023-29939 as CVE page is older than CVRF-CVE file.
skipping CVE-2023-29935 as CVE page is older than CVRF-CVE file.
skipping CVE-2023-29934 as CVE page is older than CVRF-CVE file.
skipping CVE-2023-29933 as CVE page is older than CVRF-CVE file.
skipping CVE-2023-29932 as CVE page is older than CVRF-CVE file.
no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2023-29659
skipping CVE-2023-29552 as CVE page is older than CVRF-CVE file.
no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2023-29550
no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2023-29548
no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2023-29545
no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2023-29542
no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2023-29541
no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2023-29539
no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2023-29536
no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2023-29535
no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2023-29533
skipping CVE-2023-29534 as CVE page is older than CVRF-CVE file.
no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2023-29532
no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2023-29531
no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2023-29483
skipping CVE-2023-29499 as CVE page is older than CVRF-CVE file.
skipping CVE-2023-29491 as CVE page is older than CVRF-CVE file.
skipping CVE-2023-29469 as CVE page is older than CVRF-CVE file.
skipping CVE-2023-29457 as CVE page is older than CVRF-CVE file.
skipping CVE-2023-29456 as CVE page is older than CVRF-CVE file.
skipping CVE-2023-29455 as CVE page is older than CVRF-CVE file.
skipping CVE-2023-29454 as CVE page is older than CVRF-CVE file.
skipping CVE-2023-29452 as CVE page is older than CVRF-CVE file.
skipping CVE-2023-29451 as CVE page is older than CVRF-CVE file.
no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2023-29405
skipping CVE-2023-29449 as CVE page is older than CVRF-CVE file.
skipping CVE-2023-29409 as CVE page is older than CVRF-CVE file.
skipping CVE-2023-29408 as CVE page is older than CVRF-CVE file.
skipping CVE-2023-29407 as CVE page is older than CVRF-CVE file.
skipping CVE-2023-29406 as CVE page is older than CVRF-CVE file.
no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2023-29404
no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2023-29403
no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2023-29402
no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2023-29400
no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2023-29383
skipping CVE-2023-29007 as CVE page is older than CVRF-CVE file.
no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2023-28938
no cpe found for SUSE Package Hub 15 SP4 in CVE-2023-28882
no cpe found for SUSE Package Hub 15 SP5 in CVE-2023-28882
no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2023-28859
skipping CVE-2023-28879 as CVE page is older than CVRF-CVE file.
skipping CVE-2023-28866 as CVE page is older than CVRF-CVE file.
no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2023-28858
no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2023-28856
no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2023-28842
no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2023-28841
no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2023-28840
no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2023-28736
skipping CVE-2023-28756 as CVE page is older than CVRF-CVE file.
skipping CVE-2023-28755 as CVE page is older than CVRF-CVE file.
skipping CVE-2023-28746 as CVE page is older than CVRF-CVE file.
skipping CVE-2023-28709 as CVE page is older than CVRF-CVE file.
skipping CVE-2023-28708 as CVE page is older than CVRF-CVE file.
no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2023-28642
no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2023-28625
no cpe found for SUSE Package Hub 15 SP4 in CVE-2023-28488
no cpe found for SUSE Package Hub 15 SP5 in CVE-2023-28488
skipping CVE-2023-28531 as CVE page is older than CVRF-CVE file.
no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2023-28487
no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2023-28486
no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2023-28466
skipping CVE-2023-28484 as CVE page is older than CVRF-CVE file.
no cpe found for SUSE Package Hub 15 SP6 in CVE-2023-28452
skipping CVE-2023-28464 as CVE page is older than CVRF-CVE file.
no cpe found for SUSE Package Hub 15 SP4 in CVE-2023-28371
skipping CVE-2023-28410 as CVE page is older than CVRF-CVE file.
no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2023-28370
no cpe found for SUSE Manager Client Tools for RHEL, Liberty and Clones 9-CLIENT-TOOLS in CVE-2023-28370
no cpe found for SUSE Manager Tools for SLE Micro 5 in CVE-2023-28370
no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2023-28322
skipping CVE-2023-28362 as CVE page is older than CVRF-CVE file.
skipping CVE-2023-28328 as CVE page is older than CVRF-CVE file.
skipping CVE-2023-28327 as CVE page is older than CVRF-CVE file.
no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2023-28321
no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2023-28320
no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2023-28319
skipping CVE-2023-28205 as CVE page is older than CVRF-CVE file.
skipping CVE-2023-28204 as CVE page is older than CVRF-CVE file.
skipping CVE-2023-28198 as CVE page is older than CVRF-CVE file.
skipping CVE-2023-28177 as CVE page is older than CVRF-CVE file.
skipping CVE-2023-28176 as CVE page is older than CVRF-CVE file.
skipping CVE-2023-28164 as CVE page is older than CVRF-CVE file.
skipping CVE-2023-28163 as CVE page is older than CVRF-CVE file.
skipping CVE-2023-28162 as CVE page is older than CVRF-CVE file.
skipping CVE-2023-28161 as CVE page is older than CVRF-CVE file.
skipping CVE-2023-28160 as CVE page is older than CVRF-CVE file.
skipping CVE-2023-28159 as CVE page is older than CVRF-CVE file.
skipping CVE-2023-28120 as CVE page is older than CVRF-CVE file.
skipping CVE-2023-28101 as CVE page is older than CVRF-CVE file.
skipping CVE-2023-28100 as CVE page is older than CVRF-CVE file.
skipping CVE-2023-27986 as CVE page is older than CVRF-CVE file.
skipping CVE-2023-27985 as CVE page is older than CVRF-CVE file.
skipping CVE-2023-27954 as CVE page is older than CVRF-CVE file.
skipping CVE-2023-27932 as CVE page is older than CVRF-CVE file.
no cpe found for SUSE Package Hub 15 SP4 in CVE-2023-27786
no cpe found for SUSE Package Hub 15 SP5 in CVE-2023-27786
no cpe found for SUSE Package Hub 15 SP4 in CVE-2023-27783
no cpe found for SUSE Package Hub 15 SP5 in CVE-2023-27783
no cpe found for SUSE Package Hub 15 SP4 in CVE-2023-27586
no cpe found for SUSE Package Hub 15 SP5 in CVE-2023-27586
skipping CVE-2023-27655 as CVE page is older than CVRF-CVE file.
no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2023-27561
no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2023-27530
skipping CVE-2023-27539 as CVE page is older than CVRF-CVE file.
skipping CVE-2023-27538 as CVE page is older than CVRF-CVE file.
skipping CVE-2023-27537 as CVE page is older than CVRF-CVE file.
skipping CVE-2023-27536 as CVE page is older than CVRF-CVE file.
skipping CVE-2023-27535 as CVE page is older than CVRF-CVE file.
skipping CVE-2023-27534 as CVE page is older than CVRF-CVE file.
skipping CVE-2023-27533 as CVE page is older than CVRF-CVE file.
no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2023-27522
skipping CVE-2023-27478 as CVE page is older than CVRF-CVE file.
no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2023-27320
skipping CVE-2023-27371 as CVE page is older than CVRF-CVE file.
skipping CVE-2023-27349 as CVE page is older than CVRF-CVE file.
no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2023-27043
--- /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2023-27043.xml 2024-10-22 02:13:22.339843000 +0200
+++ /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2023-27043.xml.new 2024-10-29 01:31:52.836105000 +0100
@@ -14,13 +14,13 @@
1
- 122
- 2024-10-22T00:13:21Z
+ 123
+ 2024-10-29T00:31:51Z
current
2023-04-19T23:17:17Z
- 2024-10-22T00:13:21Z
+ 2024-10-29T00:31:51Z
cve-database/bin/generate-cvrf-cve.pl
2020-12-27T01:00:00Z
@@ -2793,6 +2793,24 @@
python313-x86-64-v3-3.13.0~b3-1.1
+
+ python314-3.14.0~a1-1.1
+
+
+ python314-curses-3.14.0~a1-1.1
+
+
+ python314-dbm-3.14.0~a1-1.1
+
+
+ python314-idle-3.14.0~a1-1.1
+
+
+ python314-tk-3.14.0~a1-1.1
+
+
+ python314-x86-64-v3-3.14.0~a1-1.1
+
python36-3.6.15-52.1
@@ -7866,6 +7884,24 @@
python313-x86-64-v3-3.13.0~b3-1.1 as a component of openSUSE Tumbleweed
+
+ python314-3.14.0~a1-1.1 as a component of openSUSE Tumbleweed
+
+
+ python314-curses-3.14.0~a1-1.1 as a component of openSUSE Tumbleweed
+
+
+ python314-dbm-3.14.0~a1-1.1 as a component of openSUSE Tumbleweed
+
+
+ python314-idle-3.14.0~a1-1.1 as a component of openSUSE Tumbleweed
+
+
+ python314-tk-3.14.0~a1-1.1 as a component of openSUSE Tumbleweed
+
+
+ python314-x86-64-v3-3.14.0~a1-1.1 as a component of openSUSE Tumbleweed
+
python38-3.8.17-2.1 as a component of openSUSE Tumbleweed
@@ -10091,6 +10127,12 @@
openSUSE Tumbleweed:python313-idle-3.13.0~b3-1.1
openSUSE Tumbleweed:python313-tk-3.13.0~b3-1.1
openSUSE Tumbleweed:python313-x86-64-v3-3.13.0~b3-1.1
+ openSUSE Tumbleweed:python314-3.14.0~a1-1.1
+ openSUSE Tumbleweed:python314-curses-3.14.0~a1-1.1
+ openSUSE Tumbleweed:python314-dbm-3.14.0~a1-1.1
+ openSUSE Tumbleweed:python314-idle-3.14.0~a1-1.1
+ openSUSE Tumbleweed:python314-tk-3.14.0~a1-1.1
+ openSUSE Tumbleweed:python314-x86-64-v3-3.14.0~a1-1.1
openSUSE Tumbleweed:python38-3.8.17-2.1
openSUSE Tumbleweed:python38-curses-3.8.17-2.1
openSUSE Tumbleweed:python38-dbm-3.8.17-2.1
no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2023-26964
no cpe found for SUSE Package Hub 15 SP6 in CVE-2023-26964
skipping CVE-2023-26966 as CVE page is older than CVRF-CVE file.
skipping CVE-2023-26965 as CVE page is older than CVRF-CVE file.
skipping CVE-2023-26938 as CVE page is older than CVRF-CVE file.
skipping CVE-2023-26937 as CVE page is older than CVRF-CVE file.
skipping CVE-2023-26936 as CVE page is older than CVRF-CVE file.
skipping CVE-2023-26935 as CVE page is older than CVRF-CVE file.
skipping CVE-2023-26934 as CVE page is older than CVRF-CVE file.
skipping CVE-2023-26931 as CVE page is older than CVRF-CVE file.
skipping CVE-2023-26930 as CVE page is older than CVRF-CVE file.
skipping CVE-2023-26924 as CVE page is older than CVRF-CVE file.
no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2023-26768
skipping CVE-2023-26785 as CVE page is older than CVRF-CVE file.
skipping CVE-2023-26769 as CVE page is older than CVRF-CVE file.
skipping CVE-2023-26767 as CVE page is older than CVRF-CVE file.
skipping CVE-2023-26607 as CVE page is older than CVRF-CVE file.
skipping CVE-2023-26606 as CVE page is older than CVRF-CVE file.
skipping CVE-2023-26605 as CVE page is older than CVRF-CVE file.
skipping CVE-2023-26604 as CVE page is older than CVRF-CVE file.
no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2023-26545
skipping CVE-2023-26555 as CVE page is older than CVRF-CVE file.
skipping CVE-2023-26554 as CVE page is older than CVRF-CVE file.
skipping CVE-2023-26553 as CVE page is older than CVRF-CVE file.
skipping CVE-2023-26552 as CVE page is older than CVRF-CVE file.
skipping CVE-2023-26551 as CVE page is older than CVRF-CVE file.
skipping CVE-2023-26544 as CVE page is older than CVRF-CVE file.
no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2023-26484
no cpe found for SUSE Package Hub 15 SP4 in CVE-2023-26437
no cpe found for SUSE Package Hub 15 SP5 in CVE-2023-26437
skipping CVE-2023-26463 as CVE page is older than CVRF-CVE file.
no cpe found for SUSE Package Hub 15 SP5 in CVE-2023-26157
skipping CVE-2023-26242 as CVE page is older than CVRF-CVE file.
no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2023-26112
skipping CVE-2023-26083 as CVE page is older than CVRF-CVE file.
no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2023-26049
no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2023-26048
no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2023-25809
skipping CVE-2023-25815 as CVE page is older than CVRF-CVE file.
no cpe found for SUSE Package Hub 15 SP3 in CVE-2023-25727
no cpe found for SUSE Package Hub 15 SP4 in CVE-2023-25727
skipping CVE-2023-25775 as CVE page is older than CVRF-CVE file.
skipping CVE-2023-25752 as CVE page is older than CVRF-CVE file.
skipping CVE-2023-25751 as CVE page is older than CVRF-CVE file.
skipping CVE-2023-25750 as CVE page is older than CVRF-CVE file.
skipping CVE-2023-25749 as CVE page is older than CVRF-CVE file.
skipping CVE-2023-25748 as CVE page is older than CVRF-CVE file.
skipping CVE-2023-25747 as CVE page is older than CVRF-CVE file.
skipping CVE-2023-25746 as CVE page is older than CVRF-CVE file.
skipping CVE-2023-25745 as CVE page is older than CVRF-CVE file.
skipping CVE-2023-25744 as CVE page is older than CVRF-CVE file.
skipping CVE-2023-25743 as CVE page is older than CVRF-CVE file.
skipping CVE-2023-25742 as CVE page is older than CVRF-CVE file.
skipping CVE-2023-25741 as CVE page is older than CVRF-CVE file.
skipping CVE-2023-25740 as CVE page is older than CVRF-CVE file.
skipping CVE-2023-25739 as CVE page is older than CVRF-CVE file.
skipping CVE-2023-25738 as CVE page is older than CVRF-CVE file.
skipping CVE-2023-25737 as CVE page is older than CVRF-CVE file.
skipping CVE-2023-25736 as CVE page is older than CVRF-CVE file.
skipping CVE-2023-25735 as CVE page is older than CVRF-CVE file.
skipping CVE-2023-25734 as CVE page is older than CVRF-CVE file.
skipping CVE-2023-25733 as CVE page is older than CVRF-CVE file.
skipping CVE-2023-25732 as CVE page is older than CVRF-CVE file.
skipping CVE-2023-25731 as CVE page is older than CVRF-CVE file.
skipping CVE-2023-25730 as CVE page is older than CVRF-CVE file.
skipping CVE-2023-25729 as CVE page is older than CVRF-CVE file.
skipping CVE-2023-25728 as CVE page is older than CVRF-CVE file.
skipping CVE-2023-25690 as CVE page is older than CVRF-CVE file.
no cpe found for SUSE Package Hub 15 SP4 in CVE-2023-25579
skipping CVE-2023-25652 as CVE page is older than CVRF-CVE file.
skipping CVE-2023-25588 as CVE page is older than CVRF-CVE file.
skipping CVE-2023-25587 as CVE page is older than CVRF-CVE file.
skipping CVE-2023-25586 as CVE page is older than CVRF-CVE file.
skipping CVE-2023-25585 as CVE page is older than CVRF-CVE file.
skipping CVE-2023-25584 as CVE page is older than CVRF-CVE file.
no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2023-25577
no cpe found for SUSE Package Hub 15 SP4 in CVE-2023-25567
no cpe found for SUSE Package Hub 15 SP4 in CVE-2023-25566
no cpe found for SUSE Package Hub 15 SP4 in CVE-2023-25565
no cpe found for SUSE Package Hub 15 SP4 in CVE-2023-25564
no cpe found for SUSE Package Hub 15 SP4 in CVE-2023-25563
skipping CVE-2023-25435 as CVE page is older than CVRF-CVE file.
skipping CVE-2023-25434 as CVE page is older than CVRF-CVE file.
skipping CVE-2023-25433 as CVE page is older than CVRF-CVE file.
skipping CVE-2023-25363 as CVE page is older than CVRF-CVE file.
skipping CVE-2023-25362 as CVE page is older than CVRF-CVE file.
skipping CVE-2023-25361 as CVE page is older than CVRF-CVE file.
skipping CVE-2023-25360 as CVE page is older than CVRF-CVE file.
skipping CVE-2023-25358 as CVE page is older than CVRF-CVE file.
no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2023-25193
no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2023-25180
no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2023-25173
no cpe found for SUSE Package Hub 15 SP4 in CVE-2023-25165
no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2023-25155
no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2023-25153
skipping CVE-2023-25139 as CVE page is older than CVRF-CVE file.
skipping CVE-2023-25136 as CVE page is older than CVRF-CVE file.
skipping CVE-2023-25012 as CVE page is older than CVRF-CVE file.
skipping CVE-2023-24998 as CVE page is older than CVRF-CVE file.
no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2023-24807
no cpe found for SUSE Package Hub 15 SP4 in CVE-2023-24785
skipping CVE-2023-24805 as CVE page is older than CVRF-CVE file.
no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2023-24607
CVE-2023-24580: no packages for SUSE Package Hub 15 SP5, but entry?
CVE-2023-24580: no packages for openSUSE Leap 15.5, but entry?
no cpe found for SUSE Package Hub 15 SP4 in CVE-2023-24580
CVE-2023-24580: no packages for SUSE Package Hub 15 SP5, but entry?
CVE-2023-24580: no packages for openSUSE Leap 15.5, but entry?
CVE-2023-24580: no packages for SUSE Package Hub 15 SP5, but entry?
CVE-2023-24580: no packages for openSUSE Leap 15.5, but entry?
skipping CVE-2023-24593 as CVE page is older than CVRF-CVE file.
no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2023-24540
no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2023-24539
no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2023-24538
no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2023-24537
no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2023-24536
no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2023-24534
no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2023-24532
no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2023-24329
--- /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2023-24329.xml 2024-10-14 01:46:36.000527000 +0200
+++ /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2023-24329.xml.new 2024-10-29 01:32:30.334158000 +0100
@@ -14,13 +14,13 @@
1
- 137
- 2024-10-13T23:46:35Z
+ 138
+ 2024-10-29T00:32:29Z
current
2023-02-21T00:16:57Z
- 2024-10-13T23:46:35Z
+ 2024-10-29T00:32:29Z
cve-database/bin/generate-cvrf-cve.pl
2020-12-27T01:00:00Z
@@ -3200,6 +3200,24 @@
python313-x86-64-v3-3.13.0~b3-1.1
+
+ python314-3.14.0~a1-1.1
+
+
+ python314-curses-3.14.0~a1-1.1
+
+
+ python314-dbm-3.14.0~a1-1.1
+
+
+ python314-idle-3.14.0~a1-1.1
+
+
+ python314-tk-3.14.0~a1-1.1
+
+
+ python314-x86-64-v3-3.14.0~a1-1.1
+
python36
@@ -10625,6 +10643,24 @@
python313-x86-64-v3-3.13.0~b3-1.1 as a component of openSUSE Tumbleweed
+
+ python314-3.14.0~a1-1.1 as a component of openSUSE Tumbleweed
+
+
+ python314-curses-3.14.0~a1-1.1 as a component of openSUSE Tumbleweed
+
+
+ python314-dbm-3.14.0~a1-1.1 as a component of openSUSE Tumbleweed
+
+
+ python314-idle-3.14.0~a1-1.1 as a component of openSUSE Tumbleweed
+
+
+ python314-tk-3.14.0~a1-1.1 as a component of openSUSE Tumbleweed
+
+
+ python314-x86-64-v3-3.14.0~a1-1.1 as a component of openSUSE Tumbleweed
+
python38-3.8.16-5.1 as a component of openSUSE Tumbleweed
@@ -13132,6 +13168,12 @@
openSUSE Tumbleweed:python313-idle-3.13.0~b3-1.1
openSUSE Tumbleweed:python313-tk-3.13.0~b3-1.1
openSUSE Tumbleweed:python313-x86-64-v3-3.13.0~b3-1.1
+ openSUSE Tumbleweed:python314-3.14.0~a1-1.1
+ openSUSE Tumbleweed:python314-curses-3.14.0~a1-1.1
+ openSUSE Tumbleweed:python314-dbm-3.14.0~a1-1.1
+ openSUSE Tumbleweed:python314-idle-3.14.0~a1-1.1
+ openSUSE Tumbleweed:python314-tk-3.14.0~a1-1.1
+ openSUSE Tumbleweed:python314-x86-64-v3-3.14.0~a1-1.1
openSUSE Tumbleweed:python38-3.8.16-5.1
openSUSE Tumbleweed:python38-32bit-3.8.16-5.1
openSUSE Tumbleweed:python38-curses-3.8.16-5.1
no cpe found for SUSE Package Hub 15 SP3 in CVE-2023-24056
no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2023-24023
skipping CVE-2023-24039 as CVE page is older than CVRF-CVE file.
no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2023-24021
CVE-2023-23969: no packages for SUSE Package Hub 15 SP5, but entry?
no cpe found for SUSE Package Hub 15 SP4 in CVE-2023-23969
CVE-2023-23969: no packages for SUSE Package Hub 15 SP5, but entry?
CVE-2023-23969: no packages for SUSE Package Hub 15 SP5, but entry?
skipping CVE-2023-23946 as CVE page is older than CVRF-CVE file.
no cpe found for SUSE Package Hub 15 SP4 in CVE-2023-23942
no cpe found for SUSE Package Hub 15 SP5 in CVE-2023-23942
no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2023-23936
no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2023-23920
skipping CVE-2023-23931 as CVE page is older than CVRF-CVE file.
no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2023-23919
no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2023-23918
no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2023-23908
skipping CVE-2023-23916 as CVE page is older than CVRF-CVE file.
skipping CVE-2023-23915 as CVE page is older than CVRF-CVE file.
skipping CVE-2023-23914 as CVE page is older than CVRF-CVE file.
skipping CVE-2023-23913 as CVE page is older than CVRF-CVE file.
skipping CVE-2023-23606 as CVE page is older than CVRF-CVE file.
skipping CVE-2023-23605 as CVE page is older than CVRF-CVE file.
skipping CVE-2023-23604 as CVE page is older than CVRF-CVE file.
skipping CVE-2023-23603 as CVE page is older than CVRF-CVE file.
skipping CVE-2023-23602 as CVE page is older than CVRF-CVE file.
skipping CVE-2023-23601 as CVE page is older than CVRF-CVE file.
skipping CVE-2023-23600 as CVE page is older than CVRF-CVE file.
skipping CVE-2023-23599 as CVE page is older than CVRF-CVE file.
skipping CVE-2023-23598 as CVE page is older than CVRF-CVE file.
skipping CVE-2023-23597 as CVE page is older than CVRF-CVE file.
no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2023-23583
skipping CVE-2023-23586 as CVE page is older than CVRF-CVE file.
no cpe found for SUSE Package Hub 15 SP4 in CVE-2023-23457
skipping CVE-2023-23559 as CVE page is older than CVRF-CVE file.
skipping CVE-2023-23529 as CVE page is older than CVRF-CVE file.
skipping CVE-2023-23518 as CVE page is older than CVRF-CVE file.
skipping CVE-2023-23517 as CVE page is older than CVRF-CVE file.
no cpe found for SUSE Package Hub 15 SP4 in CVE-2023-23456
no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2023-23455
no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2023-23454
skipping CVE-2023-23039 as CVE page is older than CVRF-CVE file.
skipping CVE-2023-23006 as CVE page is older than CVRF-CVE file.
skipping CVE-2023-23005 as CVE page is older than CVRF-CVE file.
skipping CVE-2023-23004 as CVE page is older than CVRF-CVE file.
skipping CVE-2023-23003 as CVE page is older than CVRF-CVE file.
skipping CVE-2023-23002 as CVE page is older than CVRF-CVE file.
skipping CVE-2023-23001 as CVE page is older than CVRF-CVE file.
skipping CVE-2023-23000 as CVE page is older than CVRF-CVE file.
skipping CVE-2023-22999 as CVE page is older than CVRF-CVE file.
skipping CVE-2023-22998 as CVE page is older than CVRF-CVE file.
skipping CVE-2023-22997 as CVE page is older than CVRF-CVE file.
skipping CVE-2023-22996 as CVE page is older than CVRF-CVE file.
skipping CVE-2023-22995 as CVE page is older than CVRF-CVE file.
no cpe found for SUSE Liberty Linux 7 LTSS in CVE-2023-22809
no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2023-22809
skipping CVE-2023-22799 as CVE page is older than CVRF-CVE file.
skipping CVE-2023-22796 as CVE page is older than CVRF-CVE file.
skipping CVE-2023-22795 as CVE page is older than CVRF-CVE file.
skipping CVE-2023-22792 as CVE page is older than CVRF-CVE file.
skipping CVE-2023-22745 as CVE page is older than CVRF-CVE file.
skipping CVE-2023-22742 as CVE page is older than CVRF-CVE file.
CVE-2023-22656: no packages for SUSE Linux Enterprise Module for Desktop Applications 15 SP6, but entry?
CVE-2023-22656: no packages for SUSE Manager Retail Branch Server 4.3, but entry?
CVE-2023-22656: no packages for SUSE Linux Enterprise Workstation Extension 15 SP5, but entry?
CVE-2023-22656: no packages for SUSE Linux Enterprise Module for Basesystem 15 SP5, but entry?
CVE-2023-22656: no packages for SUSE Linux Enterprise Software Development Kit 12 SP5, but entry?
CVE-2023-22656: no packages for SUSE Manager Server 4.3, but entry?
CVE-2023-22656: no packages for SUSE Manager Proxy 4.3, but entry?
no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2023-22656
CVE-2023-22656: no packages for SUSE Linux Enterprise Module for Basesystem 15 SP5, but entry?
CVE-2023-22656: no packages for SUSE Linux Enterprise Module for Desktop Applications 15 SP6, but entry?
CVE-2023-22656: no packages for SUSE Linux Enterprise Software Development Kit 12 SP5, but entry?
CVE-2023-22656: no packages for SUSE Linux Enterprise Workstation Extension 15 SP5, but entry?
CVE-2023-22656: no packages for SUSE Manager Proxy 4.3, but entry?
CVE-2023-22656: no packages for SUSE Manager Retail Branch Server 4.3, but entry?
CVE-2023-22656: no packages for SUSE Manager Server 4.3, but entry?
CVE-2023-22656: no packages for SUSE Linux Enterprise Module for Basesystem 15 SP5, but entry?
CVE-2023-22656: no packages for SUSE Linux Enterprise Module for Desktop Applications 15 SP6, but entry?
CVE-2023-22656: no packages for SUSE Linux Enterprise Software Development Kit 12 SP5, but entry?
CVE-2023-22656: no packages for SUSE Linux Enterprise Workstation Extension 15 SP5, but entry?
CVE-2023-22656: no packages for SUSE Manager Proxy 4.3, but entry?
CVE-2023-22656: no packages for SUSE Manager Retail Branch Server 4.3, but entry?
CVE-2023-22656: no packages for SUSE Manager Server 4.3, but entry?
no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2023-22655
no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2023-22652
no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2023-22643
no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2023-22486
skipping CVE-2023-22490 as CVE page is older than CVRF-CVE file.
no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2023-22458
no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2023-22313
no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2023-22084
skipping CVE-2023-22081 as CVE page is older than CVRF-CVE file.
skipping CVE-2023-22067 as CVE page is older than CVRF-CVE file.
skipping CVE-2023-22051 as CVE page is older than CVRF-CVE file.
skipping CVE-2023-22049 as CVE page is older than CVRF-CVE file.
skipping CVE-2023-22045 as CVE page is older than CVRF-CVE file.
skipping CVE-2023-22044 as CVE page is older than CVRF-CVE file.
skipping CVE-2023-22043 as CVE page is older than CVRF-CVE file.
skipping CVE-2023-22041 as CVE page is older than CVRF-CVE file.
skipping CVE-2023-22036 as CVE page is older than CVRF-CVE file.
skipping CVE-2023-22033 as CVE page is older than CVRF-CVE file.
skipping CVE-2023-22025 as CVE page is older than CVRF-CVE file.
skipping CVE-2023-22024 as CVE page is older than CVRF-CVE file.
skipping CVE-2023-22006 as CVE page is older than CVRF-CVE file.
skipping CVE-2023-21968 as CVE page is older than CVRF-CVE file.
skipping CVE-2023-21967 as CVE page is older than CVRF-CVE file.
skipping CVE-2023-21954 as CVE page is older than CVRF-CVE file.
skipping CVE-2023-21939 as CVE page is older than CVRF-CVE file.
skipping CVE-2023-21938 as CVE page is older than CVRF-CVE file.
skipping CVE-2023-21937 as CVE page is older than CVRF-CVE file.
skipping CVE-2023-21930 as CVE page is older than CVRF-CVE file.
skipping CVE-2023-21843 as CVE page is older than CVRF-CVE file.
skipping CVE-2023-21835 as CVE page is older than CVRF-CVE file.
skipping CVE-2023-21830 as CVE page is older than CVRF-CVE file.
skipping CVE-2023-21636 as CVE page is older than CVRF-CVE file.
no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2023-20900
skipping CVE-2023-21400 as CVE page is older than CVRF-CVE file.
skipping CVE-2023-21264 as CVE page is older than CVRF-CVE file.
skipping CVE-2023-21106 as CVE page is older than CVRF-CVE file.
skipping CVE-2023-21102 as CVE page is older than CVRF-CVE file.
skipping CVE-2023-20941 as CVE page is older than CVRF-CVE file.
no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2023-20898
no cpe found for SUSE Manager Client Tools for RHEL, Liberty and Clones 9-CLIENT-TOOLS in CVE-2023-20898
no cpe found for SUSE Manager Tools for SLE Micro 5 in CVE-2023-20898
no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2023-20897
no cpe found for SUSE Manager Client Tools for RHEL, Liberty and Clones 9-CLIENT-TOOLS in CVE-2023-20897
no cpe found for SUSE Manager Tools for SLE Micro 5 in CVE-2023-20897
no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2023-20867
no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2023-20593
no cpe found for SUSE Liberty Linux 7 LTSS in CVE-2023-20592
no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2023-20592
no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2023-20588
skipping CVE-2023-20584 as CVE page is older than CVRF-CVE file.
skipping CVE-2023-20583 as CVE page is older than CVRF-CVE file.
skipping CVE-2023-20573 as CVE page is older than CVRF-CVE file.
skipping CVE-2023-20569 as CVE page is older than CVRF-CVE file.
skipping CVE-2023-20566 as CVE page is older than CVRF-CVE file.
skipping CVE-2023-20533 as CVE page is older than CVRF-CVE file.
skipping CVE-2023-20526 as CVE page is older than CVRF-CVE file.
skipping CVE-2023-20521 as CVE page is older than CVRF-CVE file.
skipping CVE-2023-20519 as CVE page is older than CVRF-CVE file.
no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2023-20197
no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2023-20052
no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2023-20032
no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2023-7256
--- /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2023-7256.xml 2024-10-20 01:44:30.897597000 +0200
+++ /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2023-7256.xml.new 2024-10-29 01:33:29.609036000 +0100
@@ -14,13 +14,13 @@
1
- 20
- 2024-10-19T23:44:30Z
+ 21
+ 2024-10-29T00:33:29Z
current
2024-09-02T23:26:00Z
- 2024-10-19T23:44:30Z
+ 2024-10-29T00:33:29Z
cve-database/bin/generate-cvrf-cve.pl
2020-12-27T01:00:00Z
@@ -79,6 +79,21 @@
Container suse/sle-micro/5.5/toolbox:13.2-3.5.37
+
+
+ Image SLES12-SP5-GCE-BYOS
+
+
+
+
+ Image SLES12-SP5-GCE-SAP-BYOS
+
+
+
+
+ Image SLES12-SP5-GCE-SAP-On-Demand
+
+
Image SLES15-SP4-CHOST-BYOS
@@ -962,6 +977,15 @@
libpcap1-1.10.1-150400.3.3.2 as a component of Container suse/sle-micro/5.5/toolbox:13.2-3.5.37
+
+ libpcap1-1.8.1-10.6.1 as a component of Image SLES12-SP5-GCE-BYOS
+
+
+ libpcap1-1.8.1-10.6.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ libpcap1-1.8.1-10.6.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
libpcap1-1.10.1-150400.3.3.2 as a component of Image SLES15-SP4-CHOST-BYOS
@@ -1361,9 +1385,6 @@
libpcap as a component of SUSE Linux Enterprise Server Teradata 12 SP3-LTSS
-
- libpcap1 as a component of SUSE Linux Enterprise Server for SAP Applications 12 SP5
-
libpcap as a component of SUSE Linux Enterprise Server for SAP Applications 12 SP5
@@ -1434,6 +1455,9 @@
Container suse/sle-micro/5.3/toolbox:13.2-6.11.23:libpcap1-1.10.1-150400.3.3.2
Container suse/sle-micro/5.4/toolbox:13.2-5.19.24:libpcap1-1.10.1-150400.3.3.2
Container suse/sle-micro/5.5/toolbox:13.2-3.5.37:libpcap1-1.10.1-150400.3.3.2
+ Image SLES12-SP5-GCE-BYOS:libpcap1-1.8.1-10.6.1
+ Image SLES12-SP5-GCE-SAP-BYOS:libpcap1-1.8.1-10.6.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:libpcap1-1.8.1-10.6.1
Image SLES15-SP4-CHOST-BYOS:libpcap1-1.10.1-150400.3.3.2
Image SLES15-SP4-CHOST-BYOS-Aliyun:libpcap1-1.10.1-150400.3.3.2
Image SLES15-SP4-CHOST-BYOS-Azure:libpcap1-1.10.1-150400.3.3.2
No V5 entry found for CVE-2023-7217 / /home/securitybot/prod/cve-database/cvelistV5/cves/2023/7xxxx/CVE-2023-7217.json:No such file or directory
skipping CVE-2023-7216 as CVE page is older than CVRF-CVE file.
skipping CVE-2023-7207 as CVE page is older than CVRF-CVE file.
skipping CVE-2023-7192 as CVE page is older than CVRF-CVE file.
No V5 entry found for CVE-2023-7122 / /home/securitybot/prod/cve-database/cvelistV5/cves/2023/7xxxx/CVE-2023-7122.json:No such file or directory
no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2023-7101
skipping CVE-2023-7104 as CVE page is older than CVRF-CVE file.
no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2023-7042
no cpe found for SUSE Package Hub 15 SP5 in CVE-2023-7024
no cpe found for openSUSE Leap 15.5 NonFree in CVE-2023-7024
no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2023-6932
skipping CVE-2023-7008 as CVE page is older than CVRF-CVE file.
no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2023-6931
no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2023-6918
skipping CVE-2023-6917 as CVE page is older than CVRF-CVE file.
skipping CVE-2023-6915 as CVE page is older than CVRF-CVE file.
no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2023-6867
no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2023-6865
no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2023-6864
no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2023-6863
no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2023-6862
no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2023-6861
no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2023-6860
no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2023-6859
no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2023-6858
no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2023-6857
no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2023-6856
skipping CVE-2023-6817 as CVE page is older than CVRF-CVE file.
skipping CVE-2023-6816 as CVE page is older than CVRF-CVE file.
skipping CVE-2023-6780 as CVE page is older than CVRF-CVE file.
skipping CVE-2023-6779 as CVE page is older than CVRF-CVE file.
no cpe found for SUSE Package Hub 15 SP5 in CVE-2023-6707
no cpe found for openSUSE Leap 15.5 NonFree in CVE-2023-6707
no cpe found for SUSE Package Hub 15 SP5 in CVE-2023-6706
no cpe found for openSUSE Leap 15.5 NonFree in CVE-2023-6706
no cpe found for SUSE Package Hub 15 SP5 in CVE-2023-6705
no cpe found for openSUSE Leap 15.5 NonFree in CVE-2023-6705
no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2023-6704
no cpe found for SUSE Package Hub 15 SP5 in CVE-2023-6704
no cpe found for openSUSE Leap 15.5 NonFree in CVE-2023-6704
no cpe found for SUSE Package Hub 15 SP5 in CVE-2023-6703
no cpe found for openSUSE Leap 15.5 NonFree in CVE-2023-6703
no cpe found for SUSE Package Hub 15 SP5 in CVE-2023-6702
no cpe found for openSUSE Leap 15.5 NonFree in CVE-2023-6702
no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2023-6683
skipping CVE-2023-6693 as CVE page is older than CVRF-CVE file.
no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2023-6610
skipping CVE-2023-6679 as CVE page is older than CVRF-CVE file.
skipping CVE-2023-6622 as CVE page is older than CVRF-CVE file.
No V5 entry found for CVE-2023-6605 / /home/securitybot/prod/cve-database/cvelistV5/cves/2023/6xxxx/CVE-2023-6605.json:No such file or directory
skipping CVE-2023-6606 as CVE page is older than CVRF-CVE file.
No V5 entry found for CVE-2023-6604 / /home/securitybot/prod/cve-database/cvelistV5/cves/2023/6xxxx/CVE-2023-6604.json:No such file or directory
No V5 entry found for CVE-2023-6603 / /home/securitybot/prod/cve-database/cvelistV5/cves/2023/6xxxx/CVE-2023-6603.json:No such file or directory
No V5 entry found for CVE-2023-6602 / /home/securitybot/prod/cve-database/cvelistV5/cves/2023/6xxxx/CVE-2023-6602.json:No such file or directory
No V5 entry found for CVE-2023-6601 / /home/securitybot/prod/cve-database/cvelistV5/cves/2023/6xxxx/CVE-2023-6601.json:No such file or directory
no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2023-6597
no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2023-6546
skipping CVE-2023-6560 as CVE page is older than CVRF-CVE file.
--- /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2023-6546.xml 2024-10-22 02:18:37.397814000 +0200
+++ /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2023-6546.xml.new 2024-10-29 01:33:48.899059000 +0100
@@ -14,13 +14,13 @@
1
- 70
- 2024-10-22T00:18:36Z
+ 71
+ 2024-10-29T00:33:48Z
current
2023-12-23T00:17:29Z
- 2024-10-22T00:18:36Z
+ 2024-10-29T00:33:48Z
cve-database/bin/generate-cvrf-cve.pl
2020-12-27T01:00:00Z
@@ -2132,12 +2132,18 @@
kernel-livepatch-5_14_21-150400_24_103-default-5-150400.2.1
+
+ kernel-livepatch-5_14_21-150400_24_108-default-10-150400.9.8.1
+
kernel-livepatch-5_14_21-150400_24_108-default-9-150400.9.8.1
kernel-livepatch-5_14_21-150400_24_111-default-7-150400.9.6.1
+
+ kernel-livepatch-5_14_21-150400_24_111-default-8-150400.9.6.1
+
kernel-livepatch-5_14_21-150400_24_60-default-14-150400.2.1
@@ -2186,12 +2192,18 @@
kernel-livepatch-5_14_21-150500_13_30-rt-6-150500.2.1
+
+ kernel-livepatch-5_14_21-150500_13_35-rt-10-150500.11.8.1
+
kernel-livepatch-5_14_21-150500_13_35-rt-9-150500.11.8.1
kernel-livepatch-5_14_21-150500_13_38-rt-7-150500.11.6.1
+
+ kernel-livepatch-5_14_21-150500_13_38-rt-8-150500.11.6.1
+
kernel-livepatch-5_14_21-150500_13_5-rt-12-150500.2.1
@@ -2219,12 +2231,18 @@
kernel-livepatch-5_14_21-150500_55_44-default-6-150500.2.1
+
+ kernel-livepatch-5_14_21-150500_55_49-default-10-150500.11.8.1
+
kernel-livepatch-5_14_21-150500_55_49-default-9-150500.11.8.1
kernel-livepatch-5_14_21-150500_55_52-default-7-150500.11.6.1
+
+ kernel-livepatch-5_14_21-150500_55_52-default-8-150500.11.6.1
+
kernel-livepatch-5_14_21-150500_55_7-default-11-150500.2.1
@@ -2261,6 +2279,9 @@
kernel-livepatch-5_3_18-150200_24_183-default-8-150200.5.6.1
+
+ kernel-livepatch-5_3_18-150200_24_183-default-9-150200.5.6.1
+
kernel-livepatch-5_3_18-150300_59_121-default-14-150300.2.1
@@ -2294,6 +2315,9 @@
kernel-livepatch-5_3_18-150300_59_153-default-8-150300.7.6.1
+
+ kernel-livepatch-5_3_18-150300_59_153-default-9-150300.7.6.1
+
kernel-macros
@@ -2480,6 +2504,9 @@
kgraft-patch-4_12_14-122_201-default-8-8.10.1
+
+ kgraft-patch-4_12_14-122_201-default-9-8.10.1
+
kselftests-kmp-64kb-5.14.21-150500.55.44.1
@@ -4394,6 +4421,33 @@
kernel-rt-5.14.21-150500.13.30.1 as a component of openSUSE Leap Micro 5.5
+
+ kgraft-patch-4_12_14-122_201-default-9-8.10.1 as a component of SUSE Linux Enterprise Live Patching 12 SP5
+
+
+ kernel-livepatch-5_3_18-150200_24_183-default-9-150200.5.6.1 as a component of SUSE Linux Enterprise Live Patching 15 SP2
+
+
+ kernel-livepatch-5_3_18-150300_59_153-default-9-150300.7.6.1 as a component of SUSE Linux Enterprise Live Patching 15 SP3
+
+
+ kernel-livepatch-5_14_21-150400_24_108-default-10-150400.9.8.1 as a component of SUSE Linux Enterprise Live Patching 15 SP4
+
+
+ kernel-livepatch-5_14_21-150400_24_111-default-8-150400.9.6.1 as a component of SUSE Linux Enterprise Live Patching 15 SP4
+
+
+ kernel-livepatch-5_14_21-150500_13_35-rt-10-150500.11.8.1 as a component of SUSE Linux Enterprise Live Patching 15 SP5
+
+
+ kernel-livepatch-5_14_21-150500_13_38-rt-8-150500.11.6.1 as a component of SUSE Linux Enterprise Live Patching 15 SP5
+
+
+ kernel-livepatch-5_14_21-150500_55_49-default-10-150500.11.8.1 as a component of SUSE Linux Enterprise Live Patching 15 SP5
+
+
+ kernel-livepatch-5_14_21-150500_55_52-default-8-150500.11.6.1 as a component of SUSE Linux Enterprise Live Patching 15 SP5
+
kernel-default as a component of SUSE CaaS Platform 4.0
@@ -5577,6 +5631,17 @@
openSUSE Leap Micro 5.5:kernel-default-base-5.14.21-150500.55.44.1.150500.6.19.2
openSUSE Leap Micro 5.5:kernel-rt-5.14.21-150500.13.30.1
+
+ SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_201-default-9-8.10.1
+ SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_183-default-9-150200.5.6.1
+ SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_153-default-9-150300.7.6.1
+ SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_108-default-10-150400.9.8.1
+ SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_111-default-8-150400.9.6.1
+ SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_35-rt-10-150500.11.8.1
+ SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_38-rt-8-150500.11.6.1
+ SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_49-default-10-150500.11.8.1
+ SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_52-default-8-150500.11.6.1
+
SUSE CaaS Platform 4.0:kernel-default
SUSE CaaS Platform 4.0:kernel-default-base
no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2023-6536
no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2023-6531
skipping CVE-2023-6535 as CVE page is older than CVRF-CVE file.
--- /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2023-6531.xml 2024-10-22 02:18:40.072703000 +0200
+++ /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2023-6531.xml.new 2024-10-29 01:33:50.983926000 +0100
@@ -14,13 +14,13 @@
1
- 102
- 2024-10-22T00:18:39Z
+ 103
+ 2024-10-29T00:33:50Z
current
2023-12-30T00:16:05Z
- 2024-10-22T00:18:39Z
+ 2024-10-29T00:33:50Z
cve-database/bin/generate-cvrf-cve.pl
2020-12-27T01:00:00Z
@@ -2320,6 +2320,9 @@
kernel-livepatch-5_3_18-150200_24_183-default-8-150200.5.6.1
+
+ kernel-livepatch-5_3_18-150200_24_183-default-9-150200.5.6.1
+
kernel-livepatch-5_3_18-150200_24_188-default-1-150200.5.3.3
@@ -2365,6 +2368,9 @@
kernel-livepatch-5_3_18-150300_59_153-default-8-150300.7.6.1
+
+ kernel-livepatch-5_3_18-150300_59_153-default-9-150300.7.6.1
+
kernel-livepatch-5_3_18-150300_59_158-default-1-150300.7.3.5
@@ -5017,6 +5023,12 @@
kernel-rt-5.14.21-150500.13.58.1 as a component of openSUSE Leap Micro 5.5
+
+ kernel-livepatch-5_3_18-150200_24_183-default-9-150200.5.6.1 as a component of SUSE Linux Enterprise Live Patching 15 SP2
+
+
+ kernel-livepatch-5_3_18-150300_59_153-default-9-150300.7.6.1 as a component of SUSE Linux Enterprise Live Patching 15 SP3
+
kernel-default as a component of SUSE CaaS Platform 4.0
@@ -6295,6 +6307,10 @@
openSUSE Leap Micro 5.5:kernel-default-base-5.14.21-150500.55.68.1.150500.6.31.1
openSUSE Leap Micro 5.5:kernel-rt-5.14.21-150500.13.58.1
+
+ SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_183-default-9-150200.5.6.1
+ SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_153-default-9-150300.7.6.1
+
SUSE CaaS Platform 4.0:kernel-default
SUSE CaaS Platform 4.0:kernel-default-base
no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2023-6516
no cpe found for SUSE Manager Tools for SLE Micro 5 in CVE-2023-6516
no cpe found for SUSE Package Hub 15 SP5 in CVE-2023-6512
no cpe found for SUSE Package Hub 15 SP5 in CVE-2023-6511
no cpe found for SUSE Package Hub 15 SP5 in CVE-2023-6510
no cpe found for SUSE Package Hub 15 SP5 in CVE-2023-6509
no cpe found for SUSE Package Hub 15 SP5 in CVE-2023-6508
skipping CVE-2023-6507 as CVE page is older than CVRF-CVE file.
skipping CVE-2023-6478 as CVE page is older than CVRF-CVE file.
no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2023-6377
no cpe found for SUSE Package Hub 15 SP4 in CVE-2023-6351
no cpe found for SUSE Package Hub 15 SP5 in CVE-2023-6351
no cpe found for openSUSE Leap 15.5 NonFree in CVE-2023-6351
skipping CVE-2023-6356 as CVE page is older than CVRF-CVE file.
no cpe found for SUSE Package Hub 15 SP4 in CVE-2023-6350
no cpe found for SUSE Package Hub 15 SP5 in CVE-2023-6350
no cpe found for openSUSE Leap 15.5 NonFree in CVE-2023-6350
no cpe found for SUSE Package Hub 15 SP4 in CVE-2023-6348
no cpe found for SUSE Package Hub 15 SP5 in CVE-2023-6348
no cpe found for openSUSE Leap 15.5 NonFree in CVE-2023-6348
skipping CVE-2023-6349 as CVE page is older than CVRF-CVE file.
no cpe found for SUSE Package Hub 15 SP4 in CVE-2023-6347
no cpe found for SUSE Package Hub 15 SP5 in CVE-2023-6347
no cpe found for openSUSE Leap 15.5 NonFree in CVE-2023-6347
no cpe found for SUSE Package Hub 15 SP4 in CVE-2023-6346
no cpe found for SUSE Package Hub 15 SP5 in CVE-2023-6346
no cpe found for openSUSE Leap 15.5 NonFree in CVE-2023-6346
no cpe found for SUSE Package Hub 15 SP4 in CVE-2023-6345
no cpe found for SUSE Package Hub 15 SP5 in CVE-2023-6345
no cpe found for openSUSE Leap 15.5 NonFree in CVE-2023-6345
skipping CVE-2023-6277 as CVE page is older than CVRF-CVE file.
skipping CVE-2023-6270 as CVE page is older than CVRF-CVE file.
--- /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2023-6247.xml 2024-10-22 02:18:57.874763000 +0200
+++ /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2023-6247.xml.new 2024-10-29 01:33:56.896107000 +0100
@@ -14,13 +14,13 @@
1
- 3
- 2024-10-22T00:18:57Z
+ 4
+ 2024-10-29T00:33:56Z
current
2024-03-01T00:17:43Z
- 2024-10-22T00:18:57Z
+ 2024-10-29T00:33:56Z
cve-database/bin/generate-cvrf-cve.pl
2020-12-27T01:00:00Z
@@ -499,7 +499,7 @@
- low
+ moderate
skipping CVE-2023-6246 as CVE page is older than CVRF-CVE file.
skipping CVE-2023-6238 as CVE page is older than CVRF-CVE file.
skipping CVE-2023-6237 as CVE page is older than CVRF-CVE file.
skipping CVE-2023-6228 as CVE page is older than CVRF-CVE file.
no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2023-6212
no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2023-6209
no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2023-6208
no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2023-6207
no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2023-6206
no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2023-6205
no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2023-6204
skipping CVE-2023-6200 as CVE page is older than CVRF-CVE file.
CVE-2023-6152: no packages for SUSE Linux Enterprise Server 12 SP5, but entry?
CVE-2023-6152: no packages for SUSE Manager Proxy Module 4.3, but entry?
CVE-2023-6152: no packages for SUSE Manager Tools for SLE Micro 5, but entry?
CVE-2023-6152: no packages for SUSE Manager Tools Beta for SLE Micro 5, but entry?
CVE-2023-6152: no packages for Container suse/manager/5.0/x86_64/server-attestation:5.0.0-rc.3.1, but entry?
CVE-2023-6152: no packages for Container suse/manager/5.0/x86_64/server:5.0.0-rc.4.56, but entry?
CVE-2023-6152: no packages for SUSE Linux Enterprise Server for SAP Applications 12 SP5, but entry?
CVE-2023-6152: no packages for SUSE Linux Enterprise Server 12 SP3-LTSS-TERADATA, but entry?
CVE-2023-6152: no packages for SUSE Linux Enterprise Server 12 SP3-TERADATA, but entry?
CVE-2023-6152: no packages for Container suse/manager/5.0/x86_64/server-attestation:5.0.0-rc.3.1, but entry?
CVE-2023-6152: no packages for Container suse/manager/5.0/x86_64/server:5.0.0-rc.4.56, but entry?
CVE-2023-6152: no packages for SUSE Linux Enterprise Server 12 SP3-LTSS-TERADATA, but entry?
CVE-2023-6152: no packages for SUSE Linux Enterprise Server 12 SP3-TERADATA, but entry?
CVE-2023-6152: no packages for SUSE Linux Enterprise Server 12 SP5, but entry?
CVE-2023-6152: no packages for SUSE Linux Enterprise Server for SAP Applications 12 SP5, but entry?
CVE-2023-6152: no packages for SUSE Manager Proxy Module 4.3, but entry?
CVE-2023-6152: no packages for SUSE Manager Tools Beta for SLE Micro 5, but entry?
CVE-2023-6152: no packages for SUSE Manager Tools for SLE Micro 5, but entry?
CVE-2023-6152: no packages for Container suse/manager/5.0/x86_64/server-attestation:5.0.0-rc.3.1, but entry?
CVE-2023-6152: no packages for Container suse/manager/5.0/x86_64/server:5.0.0-rc.4.56, but entry?
CVE-2023-6152: no packages for SUSE Linux Enterprise Server 12 SP3-LTSS-TERADATA, but entry?
CVE-2023-6152: no packages for SUSE Linux Enterprise Server 12 SP3-TERADATA, but entry?
CVE-2023-6152: no packages for SUSE Linux Enterprise Server 12 SP5, but entry?
CVE-2023-6152: no packages for SUSE Linux Enterprise Server for SAP Applications 12 SP5, but entry?
CVE-2023-6152: no packages for SUSE Manager Proxy Module 4.3, but entry?
CVE-2023-6152: no packages for SUSE Manager Tools Beta for SLE Micro 5, but entry?
CVE-2023-6152: no packages for SUSE Manager Tools for SLE Micro 5, but entry?
skipping CVE-2023-6176 as CVE page is older than CVRF-CVE file.
skipping CVE-2023-6175 as CVE page is older than CVRF-CVE file.
skipping CVE-2023-6174 as CVE page is older than CVRF-CVE file.
no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2023-6121
skipping CVE-2023-6129 as CVE page is older than CVRF-CVE file.
no cpe found for SUSE Package Hub 15 SP4 in CVE-2023-6112
no cpe found for SUSE Package Hub 15 SP5 in CVE-2023-6112
no cpe found for openSUSE Leap 15.5 NonFree in CVE-2023-6112
skipping CVE-2023-6111 as CVE page is older than CVRF-CVE file.
no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2023-6040
No V5 entry found for CVE-2023-6031 / /home/securitybot/prod/cve-database/cvelistV5/cves/2023/6xxxx/CVE-2023-6031.json:No such file or directory
skipping CVE-2023-6039 as CVE page is older than CVRF-CVE file.
no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2023-6004
no cpe found for SUSE Package Hub 15 SP4 in CVE-2023-5997
no cpe found for SUSE Package Hub 15 SP5 in CVE-2023-5997
no cpe found for openSUSE Leap 15.5 NonFree in CVE-2023-5997
no cpe found for SUSE Package Hub 15 SP4 in CVE-2023-5996
no cpe found for SUSE Package Hub 15 SP5 in CVE-2023-5996
skipping CVE-2023-5981 as CVE page is older than CVRF-CVE file.
skipping CVE-2023-5972 as CVE page is older than CVRF-CVE file.
no cpe found for SUSE Package Hub 15 SP4 in CVE-2023-5859
no cpe found for SUSE Package Hub 15 SP5 in CVE-2023-5859
skipping CVE-2023-5870 as CVE page is older than CVRF-CVE file.
skipping CVE-2023-5869 as CVE page is older than CVRF-CVE file.
skipping CVE-2023-5868 as CVE page is older than CVRF-CVE file.
no cpe found for SUSE Package Hub 15 SP4 in CVE-2023-5858
no cpe found for SUSE Package Hub 15 SP5 in CVE-2023-5858
no cpe found for SUSE Package Hub 15 SP4 in CVE-2023-5857
no cpe found for SUSE Package Hub 15 SP5 in CVE-2023-5857
no cpe found for SUSE Package Hub 15 SP4 in CVE-2023-5856
no cpe found for SUSE Package Hub 15 SP5 in CVE-2023-5856
no cpe found for SUSE Package Hub 15 SP4 in CVE-2023-5855
no cpe found for SUSE Package Hub 15 SP5 in CVE-2023-5855
no cpe found for SUSE Package Hub 15 SP4 in CVE-2023-5854
no cpe found for SUSE Package Hub 15 SP5 in CVE-2023-5854
no cpe found for SUSE Package Hub 15 SP4 in CVE-2023-5853
no cpe found for SUSE Package Hub 15 SP5 in CVE-2023-5853
no cpe found for SUSE Package Hub 15 SP4 in CVE-2023-5852
no cpe found for SUSE Package Hub 15 SP5 in CVE-2023-5852
no cpe found for SUSE Package Hub 15 SP4 in CVE-2023-5851
no cpe found for SUSE Package Hub 15 SP5 in CVE-2023-5851
no cpe found for SUSE Package Hub 15 SP4 in CVE-2023-5850
no cpe found for SUSE Package Hub 15 SP5 in CVE-2023-5850
no cpe found for SUSE Package Hub 15 SP4 in CVE-2023-5849
no cpe found for SUSE Package Hub 15 SP5 in CVE-2023-5849
CVE-2023-5764: no packages for SUSE Manager Tools Beta for SLE Micro 5, but entry?
CVE-2023-5764: no packages for SUSE Manager Tools for SLE Micro 5, but entry?
CVE-2023-5764: no packages for SUSE Linux Enterprise Module for Package Hub 15 SP5, but entry?
CVE-2023-5764: no packages for SUSE Linux Enterprise Module for Package Hub 15 SP5, but entry?
CVE-2023-5764: no packages for SUSE Manager Tools Beta for SLE Micro 5, but entry?
CVE-2023-5764: no packages for SUSE Manager Tools for SLE Micro 5, but entry?
CVE-2023-5764: no packages for SUSE Linux Enterprise Module for Package Hub 15 SP5, but entry?
CVE-2023-5764: no packages for SUSE Manager Tools Beta for SLE Micro 5, but entry?
CVE-2023-5764: no packages for SUSE Manager Tools for SLE Micro 5, but entry?
skipping CVE-2023-5841 as CVE page is older than CVRF-CVE file.
skipping CVE-2023-5824 as CVE page is older than CVRF-CVE file.
no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2023-5752
no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2023-5717
skipping CVE-2023-5732 as CVE page is older than CVRF-CVE file.
skipping CVE-2023-5731 as CVE page is older than CVRF-CVE file.
skipping CVE-2023-5730 as CVE page is older than CVRF-CVE file.
skipping CVE-2023-5729 as CVE page is older than CVRF-CVE file.
skipping CVE-2023-5728 as CVE page is older than CVRF-CVE file.
skipping CVE-2023-5727 as CVE page is older than CVRF-CVE file.
skipping CVE-2023-5726 as CVE page is older than CVRF-CVE file.
skipping CVE-2023-5725 as CVE page is older than CVRF-CVE file.
skipping CVE-2023-5724 as CVE page is older than CVRF-CVE file.
skipping CVE-2023-5723 as CVE page is older than CVRF-CVE file.
skipping CVE-2023-5722 as CVE page is older than CVRF-CVE file.
skipping CVE-2023-5721 as CVE page is older than CVRF-CVE file.
no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2023-5679
no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2023-5676
skipping CVE-2023-5678 as CVE page is older than CVRF-CVE file.
skipping CVE-2023-5633 as CVE page is older than CVRF-CVE file.
no cpe found for SUSE Package Hub 15 SP5 in CVE-2023-5631
skipping CVE-2023-5574 as CVE page is older than CVRF-CVE file.
skipping CVE-2023-5568 as CVE page is older than CVRF-CVE file.
no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2023-5557
no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2023-5535
no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2023-5517
no cpe found for SUSE Manager Tools for SLE Micro 5 in CVE-2023-5517
no cpe found for SUSE Package Hub 15 SP4 in CVE-2023-5487
no cpe found for SUSE Package Hub 15 SP5 in CVE-2023-5487
no cpe found for openSUSE Leap 15.5 NonFree in CVE-2023-5487
no cpe found for SUSE Package Hub 15 SP4 in CVE-2023-5486
no cpe found for SUSE Package Hub 15 SP5 in CVE-2023-5486
no cpe found for openSUSE Leap 15.5 NonFree in CVE-2023-5486
no cpe found for SUSE Package Hub 15 SP4 in CVE-2023-5485
no cpe found for SUSE Package Hub 15 SP5 in CVE-2023-5485
no cpe found for openSUSE Leap 15.5 NonFree in CVE-2023-5485
no cpe found for SUSE Package Hub 15 SP4 in CVE-2023-5484
no cpe found for SUSE Package Hub 15 SP5 in CVE-2023-5484
no cpe found for openSUSE Leap 15.5 NonFree in CVE-2023-5484
no cpe found for SUSE Package Hub 15 SP4 in CVE-2023-5483
no cpe found for SUSE Package Hub 15 SP5 in CVE-2023-5483
no cpe found for openSUSE Leap 15.5 NonFree in CVE-2023-5483
no cpe found for SUSE Package Hub 15 SP4 in CVE-2023-5482
no cpe found for SUSE Package Hub 15 SP5 in CVE-2023-5482
no cpe found for SUSE Package Hub 15 SP4 in CVE-2023-5481
no cpe found for SUSE Package Hub 15 SP5 in CVE-2023-5481
no cpe found for openSUSE Leap 15.5 NonFree in CVE-2023-5481
no cpe found for SUSE Package Hub 15 SP4 in CVE-2023-5480
no cpe found for SUSE Package Hub 15 SP5 in CVE-2023-5480
no cpe found for SUSE Package Hub 15 SP4 in CVE-2023-5479
no cpe found for SUSE Package Hub 15 SP5 in CVE-2023-5479
no cpe found for openSUSE Leap 15.5 NonFree in CVE-2023-5479
no cpe found for SUSE Package Hub 15 SP4 in CVE-2023-5478
no cpe found for SUSE Package Hub 15 SP5 in CVE-2023-5478
no cpe found for openSUSE Leap 15.5 NonFree in CVE-2023-5478
no cpe found for SUSE Package Hub 15 SP4 in CVE-2023-5477
no cpe found for SUSE Package Hub 15 SP5 in CVE-2023-5477
no cpe found for openSUSE Leap 15.5 NonFree in CVE-2023-5477
no cpe found for SUSE Package Hub 15 SP4 in CVE-2023-5476
no cpe found for SUSE Package Hub 15 SP5 in CVE-2023-5476
no cpe found for openSUSE Leap 15.5 NonFree in CVE-2023-5476
no cpe found for SUSE Package Hub 15 SP4 in CVE-2023-5475
no cpe found for SUSE Package Hub 15 SP5 in CVE-2023-5475
no cpe found for openSUSE Leap 15.5 NonFree in CVE-2023-5475
no cpe found for SUSE Package Hub 15 SP4 in CVE-2023-5474
no cpe found for SUSE Package Hub 15 SP5 in CVE-2023-5474
no cpe found for openSUSE Leap 15.5 NonFree in CVE-2023-5474
no cpe found for SUSE Package Hub 15 SP4 in CVE-2023-5473
no cpe found for SUSE Package Hub 15 SP5 in CVE-2023-5473
no cpe found for openSUSE Leap 15.5 NonFree in CVE-2023-5473
no cpe found for SUSE Package Hub 15 SP4 in CVE-2023-5472
no cpe found for SUSE Package Hub 15 SP5 in CVE-2023-5472
no cpe found for openSUSE Leap 15.5 NonFree in CVE-2023-5472
no cpe found for SUSE Liberty Linux 7 LTSS in CVE-2023-5455
no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2023-5441
no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2023-5380
skipping CVE-2023-5388 as CVE page is older than CVRF-CVE file.
no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2023-5366
skipping CVE-2023-5371 as CVE page is older than CVRF-CVE file.
skipping CVE-2023-5367 as CVE page is older than CVRF-CVE file.
no cpe found for SUSE Package Hub 15 SP5 in CVE-2023-5346
skipping CVE-2023-5363 as CVE page is older than CVRF-CVE file.
no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2023-5344
skipping CVE-2023-5345 as CVE page is older than CVRF-CVE file.
skipping CVE-2023-5341 as CVE page is older than CVRF-CVE file.
no cpe found for SUSE Package Hub 15 SP4 in CVE-2023-5218
no cpe found for SUSE Package Hub 15 SP5 in CVE-2023-5218
no cpe found for openSUSE Leap 15.5 NonFree in CVE-2023-5218
skipping CVE-2023-5217 as CVE page is older than CVRF-CVE file.
skipping CVE-2023-5197 as CVE page is older than CVRF-CVE file.
skipping CVE-2023-5187 as CVE page is older than CVRF-CVE file.
skipping CVE-2023-5186 as CVE page is older than CVRF-CVE file.
skipping CVE-2023-5178 as CVE page is older than CVRF-CVE file.
skipping CVE-2023-5176 as CVE page is older than CVRF-CVE file.
skipping CVE-2023-5175 as CVE page is older than CVRF-CVE file.
skipping CVE-2023-5174 as CVE page is older than CVRF-CVE file.
skipping CVE-2023-5173 as CVE page is older than CVRF-CVE file.
skipping CVE-2023-5172 as CVE page is older than CVRF-CVE file.
skipping CVE-2023-5171 as CVE page is older than CVRF-CVE file.
skipping CVE-2023-5170 as CVE page is older than CVRF-CVE file.
skipping CVE-2023-5169 as CVE page is older than CVRF-CVE file.
skipping CVE-2023-5168 as CVE page is older than CVRF-CVE file.
skipping CVE-2023-5158 as CVE page is older than CVRF-CVE file.
skipping CVE-2023-5157 as CVE page is older than CVRF-CVE file.
skipping CVE-2023-5156 as CVE page is older than CVRF-CVE file.
skipping CVE-2023-5129 as CVE page is older than CVRF-CVE file.
skipping CVE-2023-5090 as CVE page is older than CVRF-CVE file.
skipping CVE-2023-5088 as CVE page is older than CVRF-CVE file.
no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2023-4921
no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2023-4881
skipping CVE-2023-4911 as CVE page is older than CVRF-CVE file.
skipping CVE-2023-4909 as CVE page is older than CVRF-CVE file.
skipping CVE-2023-4908 as CVE page is older than CVRF-CVE file.
skipping CVE-2023-4907 as CVE page is older than CVRF-CVE file.
skipping CVE-2023-4906 as CVE page is older than CVRF-CVE file.
skipping CVE-2023-4905 as CVE page is older than CVRF-CVE file.
skipping CVE-2023-4904 as CVE page is older than CVRF-CVE file.
skipping CVE-2023-4903 as CVE page is older than CVRF-CVE file.
skipping CVE-2023-4902 as CVE page is older than CVRF-CVE file.
skipping CVE-2023-4901 as CVE page is older than CVRF-CVE file.
skipping CVE-2023-4900 as CVE page is older than CVRF-CVE file.
no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2023-4875
no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2023-4874
skipping CVE-2023-4863 as CVE page is older than CVRF-CVE file.
skipping CVE-2023-4813 as CVE page is older than CVRF-CVE file.
skipping CVE-2023-4807 as CVE page is older than CVRF-CVE file.
skipping CVE-2023-4806 as CVE page is older than CVRF-CVE file.
skipping CVE-2023-4785 as CVE page is older than CVRF-CVE file.
no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2023-4781
no cpe found for SUSE Package Hub 15 SP4 in CVE-2023-4764
no cpe found for SUSE Package Hub 15 SP5 in CVE-2023-4764
no cpe found for SUSE Package Hub 15 SP4 in CVE-2023-4763
no cpe found for SUSE Package Hub 15 SP5 in CVE-2023-4763
no cpe found for SUSE Package Hub 15 SP4 in CVE-2023-4762
no cpe found for SUSE Package Hub 15 SP5 in CVE-2023-4762
no cpe found for SUSE Package Hub 15 SP4 in CVE-2023-4761
no cpe found for SUSE Package Hub 15 SP5 in CVE-2023-4761
no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2023-4759
no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2023-4752
no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2023-4750
skipping CVE-2023-4751 as CVE page is older than CVRF-CVE file.
no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2023-4738
no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2023-4735
skipping CVE-2023-4736 as CVE page is older than CVRF-CVE file.
no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2023-4734
no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2023-4733
no cpe found for SUSE Liberty Linux 7 LTSS in CVE-2023-4727
skipping CVE-2023-4732 as CVE page is older than CVRF-CVE file.
no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2023-4693
no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2023-4692
no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2023-4641
no cpe found for SUSE Liberty Linux 7 LTSS in CVE-2023-4623
no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2023-4623
no cpe found for SUSE Liberty Linux 7 LTSS in CVE-2023-4622
no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2023-4622
no cpe found for SUSE Package Hub 15 SP4 in CVE-2023-4572
no cpe found for SUSE Package Hub 15 SP5 in CVE-2023-4572
no cpe found for openSUSE Leap 15.5 NonFree in CVE-2023-4572
skipping CVE-2023-4611 as CVE page is older than CVRF-CVE file.
skipping CVE-2023-4610 as CVE page is older than CVRF-CVE file.
skipping CVE-2023-4585 as CVE page is older than CVRF-CVE file.
skipping CVE-2023-4584 as CVE page is older than CVRF-CVE file.
skipping CVE-2023-4583 as CVE page is older than CVRF-CVE file.
skipping CVE-2023-4582 as CVE page is older than CVRF-CVE file.
skipping CVE-2023-4581 as CVE page is older than CVRF-CVE file.
skipping CVE-2023-4580 as CVE page is older than CVRF-CVE file.
skipping CVE-2023-4579 as CVE page is older than CVRF-CVE file.
skipping CVE-2023-4578 as CVE page is older than CVRF-CVE file.
skipping CVE-2023-4577 as CVE page is older than CVRF-CVE file.
skipping CVE-2023-4576 as CVE page is older than CVRF-CVE file.
skipping CVE-2023-4575 as CVE page is older than CVRF-CVE file.
skipping CVE-2023-4574 as CVE page is older than CVRF-CVE file.
skipping CVE-2023-4573 as CVE page is older than CVRF-CVE file.
skipping CVE-2023-4569 as CVE page is older than CVRF-CVE file.
skipping CVE-2023-4563 as CVE page is older than CVRF-CVE file.
no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2023-4513
skipping CVE-2023-4527 as CVE page is older than CVRF-CVE file.
no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2023-4512
no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2023-4511
no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2023-4459
skipping CVE-2023-4504 as CVE page is older than CVRF-CVE file.
skipping CVE-2023-4458 as CVE page is older than CVRF-CVE file.
no cpe found for SUSE Package Hub 15 SP4 in CVE-2023-4431
no cpe found for SUSE Package Hub 15 SP5 in CVE-2023-4431
no cpe found for SUSE Package Hub 15 SP4 in CVE-2023-4430
no cpe found for SUSE Package Hub 15 SP5 in CVE-2023-4430
no cpe found for SUSE Package Hub 15 SP4 in CVE-2023-4429
no cpe found for SUSE Package Hub 15 SP5 in CVE-2023-4429
no cpe found for SUSE Package Hub 15 SP4 in CVE-2023-4428
no cpe found for SUSE Package Hub 15 SP5 in CVE-2023-4428
no cpe found for SUSE Package Hub 15 SP4 in CVE-2023-4427
no cpe found for SUSE Package Hub 15 SP5 in CVE-2023-4427
skipping CVE-2023-4421 as CVE page is older than CVRF-CVE file.
no cpe found for SUSE Liberty Linux 7 LTSS in CVE-2023-4408
no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2023-4408
no cpe found for SUSE Manager Tools for SLE Micro 5 in CVE-2023-4408
no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2023-4387
skipping CVE-2023-4394 as CVE page is older than CVRF-CVE file.
skipping CVE-2023-4389 as CVE page is older than CVRF-CVE file.
no cpe found for SUSE Package Hub 15 SP4 in CVE-2023-4368
no cpe found for SUSE Package Hub 15 SP5 in CVE-2023-4368
no cpe found for openSUSE Leap 15.5 NonFree in CVE-2023-4368
no cpe found for SUSE Package Hub 15 SP4 in CVE-2023-4367
no cpe found for SUSE Package Hub 15 SP5 in CVE-2023-4367
no cpe found for openSUSE Leap 15.5 NonFree in CVE-2023-4367
no cpe found for SUSE Package Hub 15 SP4 in CVE-2023-4366
no cpe found for SUSE Package Hub 15 SP5 in CVE-2023-4366
no cpe found for openSUSE Leap 15.5 NonFree in CVE-2023-4366
no cpe found for SUSE Package Hub 15 SP4 in CVE-2023-4365
no cpe found for SUSE Package Hub 15 SP5 in CVE-2023-4365
no cpe found for openSUSE Leap 15.5 NonFree in CVE-2023-4365
no cpe found for SUSE Package Hub 15 SP4 in CVE-2023-4364
no cpe found for SUSE Package Hub 15 SP5 in CVE-2023-4364
no cpe found for openSUSE Leap 15.5 NonFree in CVE-2023-4364
no cpe found for SUSE Package Hub 15 SP4 in CVE-2023-4363
no cpe found for SUSE Package Hub 15 SP5 in CVE-2023-4363
no cpe found for openSUSE Leap 15.5 NonFree in CVE-2023-4363
no cpe found for SUSE Package Hub 15 SP4 in CVE-2023-4362
no cpe found for SUSE Package Hub 15 SP5 in CVE-2023-4362
no cpe found for openSUSE Leap 15.5 NonFree in CVE-2023-4362
no cpe found for SUSE Package Hub 15 SP4 in CVE-2023-4361
no cpe found for SUSE Package Hub 15 SP5 in CVE-2023-4361
no cpe found for openSUSE Leap 15.5 NonFree in CVE-2023-4361
no cpe found for SUSE Package Hub 15 SP4 in CVE-2023-4360
no cpe found for SUSE Package Hub 15 SP5 in CVE-2023-4360
no cpe found for openSUSE Leap 15.5 NonFree in CVE-2023-4360
no cpe found for SUSE Package Hub 15 SP4 in CVE-2023-4359
no cpe found for SUSE Package Hub 15 SP5 in CVE-2023-4359
no cpe found for openSUSE Leap 15.5 NonFree in CVE-2023-4359
no cpe found for SUSE Package Hub 15 SP4 in CVE-2023-4358
no cpe found for SUSE Package Hub 15 SP5 in CVE-2023-4358
no cpe found for openSUSE Leap 15.5 NonFree in CVE-2023-4358
no cpe found for SUSE Package Hub 15 SP4 in CVE-2023-4357
no cpe found for SUSE Package Hub 15 SP5 in CVE-2023-4357
no cpe found for openSUSE Leap 15.5 NonFree in CVE-2023-4357
no cpe found for SUSE Package Hub 15 SP4 in CVE-2023-4356
no cpe found for SUSE Package Hub 15 SP5 in CVE-2023-4356
no cpe found for openSUSE Leap 15.5 NonFree in CVE-2023-4356
no cpe found for SUSE Package Hub 15 SP4 in CVE-2023-4355
no cpe found for SUSE Package Hub 15 SP5 in CVE-2023-4355
no cpe found for openSUSE Leap 15.5 NonFree in CVE-2023-4355
no cpe found for SUSE Package Hub 15 SP4 in CVE-2023-4354
no cpe found for SUSE Package Hub 15 SP5 in CVE-2023-4354
no cpe found for openSUSE Leap 15.5 NonFree in CVE-2023-4354
no cpe found for SUSE Package Hub 15 SP4 in CVE-2023-4353
no cpe found for SUSE Package Hub 15 SP5 in CVE-2023-4353
no cpe found for openSUSE Leap 15.5 NonFree in CVE-2023-4353
no cpe found for SUSE Package Hub 15 SP4 in CVE-2023-4352
no cpe found for SUSE Package Hub 15 SP5 in CVE-2023-4352
no cpe found for openSUSE Leap 15.5 NonFree in CVE-2023-4352
no cpe found for SUSE Package Hub 15 SP4 in CVE-2023-4351
no cpe found for SUSE Package Hub 15 SP5 in CVE-2023-4351
no cpe found for openSUSE Leap 15.5 NonFree in CVE-2023-4351
no cpe found for SUSE Package Hub 15 SP4 in CVE-2023-4350
no cpe found for SUSE Package Hub 15 SP5 in CVE-2023-4350
no cpe found for openSUSE Leap 15.5 NonFree in CVE-2023-4350
no cpe found for SUSE Package Hub 15 SP4 in CVE-2023-4349
no cpe found for SUSE Package Hub 15 SP5 in CVE-2023-4349
no cpe found for openSUSE Leap 15.5 NonFree in CVE-2023-4349
skipping CVE-2023-4273 as CVE page is older than CVRF-CVE file.
no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2023-4244
skipping CVE-2023-4236 as CVE page is older than CVRF-CVE file.
no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2023-4218
no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2023-4128
skipping CVE-2023-4205 as CVE page is older than CVRF-CVE file.
skipping CVE-2023-4194 as CVE page is older than CVRF-CVE file.
skipping CVE-2023-4156 as CVE page is older than CVRF-CVE file.
skipping CVE-2023-4155 as CVE page is older than CVRF-CVE file.
skipping CVE-2023-4154 as CVE page is older than CVRF-CVE file.
skipping CVE-2023-4147 as CVE page is older than CVRF-CVE file.
skipping CVE-2023-4135 as CVE page is older than CVRF-CVE file.
skipping CVE-2023-4134 as CVE page is older than CVRF-CVE file.
skipping CVE-2023-4133 as CVE page is older than CVRF-CVE file.
skipping CVE-2023-4132 as CVE page is older than CVRF-CVE file.
no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2023-4091
no cpe found for SUSE Package Hub 15 SP4 in CVE-2023-4078
no cpe found for SUSE Package Hub 15 SP5 in CVE-2023-4078
no cpe found for openSUSE Leap 15.5 NonFree in CVE-2023-4078
no cpe found for SUSE Package Hub 15 SP4 in CVE-2023-4077
no cpe found for SUSE Package Hub 15 SP5 in CVE-2023-4077
no cpe found for openSUSE Leap 15.5 NonFree in CVE-2023-4077
no cpe found for SUSE Package Hub 15 SP4 in CVE-2023-4076
no cpe found for SUSE Package Hub 15 SP5 in CVE-2023-4076
no cpe found for openSUSE Leap 15.5 NonFree in CVE-2023-4076
no cpe found for SUSE Package Hub 15 SP4 in CVE-2023-4075
no cpe found for SUSE Package Hub 15 SP5 in CVE-2023-4075
no cpe found for openSUSE Leap 15.5 NonFree in CVE-2023-4075
no cpe found for SUSE Package Hub 15 SP4 in CVE-2023-4074
no cpe found for SUSE Package Hub 15 SP5 in CVE-2023-4074
no cpe found for openSUSE Leap 15.5 NonFree in CVE-2023-4074
no cpe found for SUSE Package Hub 15 SP4 in CVE-2023-4073
no cpe found for SUSE Package Hub 15 SP5 in CVE-2023-4073
no cpe found for openSUSE Leap 15.5 NonFree in CVE-2023-4073
no cpe found for SUSE Package Hub 15 SP4 in CVE-2023-4072
no cpe found for SUSE Package Hub 15 SP5 in CVE-2023-4072
no cpe found for openSUSE Leap 15.5 NonFree in CVE-2023-4072
no cpe found for SUSE Package Hub 15 SP4 in CVE-2023-4071
no cpe found for SUSE Package Hub 15 SP5 in CVE-2023-4071
no cpe found for openSUSE Leap 15.5 NonFree in CVE-2023-4071
no cpe found for SUSE Package Hub 15 SP4 in CVE-2023-4070
no cpe found for SUSE Package Hub 15 SP5 in CVE-2023-4070
no cpe found for openSUSE Leap 15.5 NonFree in CVE-2023-4070
no cpe found for SUSE Package Hub 15 SP4 in CVE-2023-4069
no cpe found for SUSE Package Hub 15 SP5 in CVE-2023-4069
no cpe found for openSUSE Leap 15.5 NonFree in CVE-2023-4069
no cpe found for SUSE Package Hub 15 SP4 in CVE-2023-4068
no cpe found for SUSE Package Hub 15 SP5 in CVE-2023-4068
no cpe found for openSUSE Leap 15.5 NonFree in CVE-2023-4068
no cpe found for SUSE Linux Enterprise Installer Updates 15 SP1 in CVE-2023-4039
no cpe found for SUSE Linux Enterprise Installer Updates 15 SP2 in CVE-2023-4039
no cpe found for SUSE Linux Enterprise Installer Updates 15 SP3 in CVE-2023-4039
no cpe found for SUSE Linux Enterprise Installer Updates 15 SP1 in CVE-2023-4039
no cpe found for SUSE Linux Enterprise Installer Updates 15 SP2 in CVE-2023-4039
no cpe found for SUSE Linux Enterprise Installer Updates 15 SP3 in CVE-2023-4039
no cpe found for SUSE Linux Enterprise Installer Updates 15 SP4 in CVE-2023-4039
no cpe found for SUSE Linux Enterprise Installer Updates 15 SP5 in CVE-2023-4039
no cpe found for SUSE Linux Enterprise Installer Updates 15 SP1 in CVE-2023-4039
no cpe found for SUSE Linux Enterprise Installer Updates 15 SP2 in CVE-2023-4039
no cpe found for SUSE Linux Enterprise Installer Updates 15 SP3 in CVE-2023-4039
no cpe found for SUSE Linux Enterprise Installer Updates 15 SP4 in CVE-2023-4039
no cpe found for SUSE Linux Enterprise Installer Updates 15 SP5 in CVE-2023-4039
no cpe found for SUSE Linux Enterprise Installer Updates 15 SP1 in CVE-2023-4039
no cpe found for SUSE Linux Enterprise Installer Updates 15 SP2 in CVE-2023-4039
no cpe found for SUSE Linux Enterprise Installer Updates 15 SP3 in CVE-2023-4039
no cpe found for SUSE Linux Enterprise Installer Updates 15 SP4 in CVE-2023-4039
no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2023-4039
no cpe found for SUSE Linux Enterprise Installer Updates 15 SP5 in CVE-2023-4039
no cpe found for SUSE Linux Enterprise Installer Updates 15 SP1 in CVE-2023-4039
no cpe found for SUSE Linux Enterprise Installer Updates 15 SP2 in CVE-2023-4039
no cpe found for SUSE Linux Enterprise Installer Updates 15 SP3 in CVE-2023-4039
no cpe found for SUSE Linux Enterprise Installer Updates 15 SP4 in CVE-2023-4039
no cpe found for SUSE Linux Enterprise Installer Updates 15 SP5 in CVE-2023-4039
no cpe found for SUSE Linux Enterprise Installer Updates 15 SP1 in CVE-2023-4039
no cpe found for SUSE Linux Enterprise Installer Updates 15 SP2 in CVE-2023-4039
no cpe found for SUSE Linux Enterprise Installer Updates 15 SP3 in CVE-2023-4039
no cpe found for SUSE Linux Enterprise Installer Updates 15 SP4 in CVE-2023-4039
no cpe found for SUSE Linux Enterprise Installer Updates 15 SP1 in CVE-2023-4039
no cpe found for SUSE Linux Enterprise Installer Updates 15 SP2 in CVE-2023-4039
no cpe found for SUSE Linux Enterprise Installer Updates 15 SP3 in CVE-2023-4039
no cpe found for SUSE Linux Enterprise Installer Updates 15 SP4 in CVE-2023-4039
no cpe found for SUSE Linux Enterprise Installer Updates 15 SP1 in CVE-2023-4039
no cpe found for SUSE Linux Enterprise Installer Updates 15 SP2 in CVE-2023-4039
no cpe found for SUSE Linux Enterprise Installer Updates 15 SP3 in CVE-2023-4039
no cpe found for SUSE Linux Enterprise Installer Updates 15 SP4 in CVE-2023-4039
skipping CVE-2023-4058 as CVE page is older than CVRF-CVE file.
skipping CVE-2023-4057 as CVE page is older than CVRF-CVE file.
skipping CVE-2023-4056 as CVE page is older than CVRF-CVE file.
skipping CVE-2023-4055 as CVE page is older than CVRF-CVE file.
skipping CVE-2023-4054 as CVE page is older than CVRF-CVE file.
skipping CVE-2023-4053 as CVE page is older than CVRF-CVE file.
skipping CVE-2023-4052 as CVE page is older than CVRF-CVE file.
skipping CVE-2023-4051 as CVE page is older than CVRF-CVE file.
skipping CVE-2023-4050 as CVE page is older than CVRF-CVE file.
skipping CVE-2023-4049 as CVE page is older than CVRF-CVE file.
skipping CVE-2023-4048 as CVE page is older than CVRF-CVE file.
skipping CVE-2023-4047 as CVE page is older than CVRF-CVE file.
skipping CVE-2023-4046 as CVE page is older than CVRF-CVE file.
skipping CVE-2023-4045 as CVE page is older than CVRF-CVE file.
skipping CVE-2023-4042 as CVE page is older than CVRF-CVE file.
skipping CVE-2023-4016 as CVE page is older than CVRF-CVE file.
skipping CVE-2023-4015 as CVE page is older than CVRF-CVE file.
skipping CVE-2023-4004 as CVE page is older than CVRF-CVE file.
--- /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2023-3978.xml 2024-07-27 01:27:19.684942000 +0200
+++ /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2023-3978.xml.new 2024-10-29 01:35:13.620147000 +0100
@@ -14,13 +14,13 @@
1
- 4
- 2024-07-26T23:27:19Z
+ 5
+ 2024-10-29T00:35:13Z
current
2023-08-03T23:17:55Z
- 2024-07-26T23:27:19Z
+ 2024-10-29T00:35:13Z
cve-database/bin/generate-cvrf-cve.pl
2020-12-27T01:00:00Z
@@ -131,6 +131,11 @@
SUSE Linux Enterprise Module for Package Hub 15 SP5
+
+
+ SUSE Linux Enterprise Module for Package Hub 15 SP6
+
+
SUSE Linux Enterprise Module for Public Cloud 15 SP1
@@ -212,6 +217,11 @@
SUSE Linux Enterprise Module for Containers 15 SP4
+
+
+ SUSE Manager Proxy Module 4.3
+
+
SUSE Linux Enterprise Module for Public Cloud 15 SP1
@@ -242,6 +252,31 @@
SUSE Linux Enterprise Module for Containers 15 SP4
+
+
+ SUSE Manager Server Module 4.3
+
+
+
+
+ SUSE Manager Tools 12
+
+
+
+
+ SUSE Manager Tools 15
+
+
+
+
+ openSUSE Leap 15.5
+
+
+
+
+ openSUSE Leap 15.6
+
+
openSUSE Tumbleweed
@@ -253,6 +288,45 @@
golang-github-lusitaniae-apache_exporter-1.0.8-1.1
+
+ golang-github-lusitaniae-apache_exporter-1.0.8-1.24.3
+
+
+ golang-github-lusitaniae-apache_exporter-1.0.8-150000.1.23.3
+
+
+ golang-github-prometheus-promu-0.16.0-1.21.3
+
+
+ golang-github-prometheus-promu-0.16.0-150000.3.21.4
+
+
+ mgr-daemon-4.3.11-1.53.2
+
+
+ mgr-daemon-4.3.11-150000.1.53.5
+
+
+ mgrctl-0.1.23-1.13.2
+
+
+ mgrctl-0.1.23-150000.1.13.3
+
+
+ mgrctl-bash-completion-0.1.23-1.13.2
+
+
+ mgrctl-bash-completion-0.1.23-150000.1.13.3
+
+
+ mgrctl-lang-0.1.23-150000.1.13.3
+
+
+ mgrctl-zsh-completion-0.1.23-1.13.2
+
+
+ mgrctl-zsh-completion-0.1.23-150000.1.13.3
+
podman-4.6.1-5.el9
@@ -271,6 +345,57 @@
podman-tests-4.6.1-5.el9
+
+ python2-spacewalk-check-4.3.21-52.104.2
+
+
+ python2-spacewalk-client-setup-4.3.21-52.104.2
+
+
+ python2-spacewalk-client-tools-4.3.21-52.104.2
+
+
+ python2-uyuni-common-libs-5.0.5-1.45.2
+
+
+ python3-spacewalk-check-4.3.21-150000.3.97.4
+
+
+ python3-spacewalk-client-setup-4.3.21-150000.3.97.4
+
+
+ python3-spacewalk-client-tools-4.3.21-150000.3.97.4
+
+
+ python3-uyuni-common-libs-5.0.5-150000.1.45.3
+
+
+ spacecmd-5.0.10-150000.3.127.3
+
+
+ spacecmd-5.0.10-38.150.2
+
+
+ spacewalk-check-4.3.21-150000.3.97.4
+
+
+ spacewalk-check-4.3.21-52.104.2
+
+
+ spacewalk-client-setup-4.3.21-150000.3.97.4
+
+
+ spacewalk-client-setup-4.3.21-52.104.2
+
+
+ spacewalk-client-tools-4.3.21-150000.3.97.4
+
+
+ spacewalk-client-tools-4.3.21-52.104.2
+
+
+ wire-0.6.0-150000.1.17.4
+
yq
@@ -295,6 +420,126 @@
golang-github-lusitaniae-apache_exporter-1.0.8-1.1 as a component of openSUSE Tumbleweed
+
+ golang-github-prometheus-promu-0.16.0-150000.3.21.4 as a component of SUSE Linux Enterprise Module for Package Hub 15 SP5
+
+
+ golang-github-prometheus-promu-0.16.0-150000.3.21.4 as a component of SUSE Linux Enterprise Module for Package Hub 15 SP6
+
+
+ golang-github-lusitaniae-apache_exporter-1.0.8-150000.1.23.3 as a component of SUSE Manager Proxy Module 4.3
+
+
+ golang-github-lusitaniae-apache_exporter-1.0.8-150000.1.23.3 as a component of SUSE Manager Server Module 4.3
+
+
+ golang-github-lusitaniae-apache_exporter-1.0.8-1.24.3 as a component of SUSE Manager Tools 12
+
+
+ golang-github-prometheus-promu-0.16.0-1.21.3 as a component of SUSE Manager Tools 12
+
+
+ mgr-daemon-4.3.11-1.53.2 as a component of SUSE Manager Tools 12
+
+
+ mgrctl-0.1.23-1.13.2 as a component of SUSE Manager Tools 12
+
+
+ mgrctl-bash-completion-0.1.23-1.13.2 as a component of SUSE Manager Tools 12
+
+
+ mgrctl-zsh-completion-0.1.23-1.13.2 as a component of SUSE Manager Tools 12
+
+
+ python2-spacewalk-check-4.3.21-52.104.2 as a component of SUSE Manager Tools 12
+
+
+ python2-spacewalk-client-setup-4.3.21-52.104.2 as a component of SUSE Manager Tools 12
+
+
+ python2-spacewalk-client-tools-4.3.21-52.104.2 as a component of SUSE Manager Tools 12
+
+
+ python2-uyuni-common-libs-5.0.5-1.45.2 as a component of SUSE Manager Tools 12
+
+
+ spacecmd-5.0.10-38.150.2 as a component of SUSE Manager Tools 12
+
+
+ spacewalk-check-4.3.21-52.104.2 as a component of SUSE Manager Tools 12
+
+
+ spacewalk-client-setup-4.3.21-52.104.2 as a component of SUSE Manager Tools 12
+
+
+ spacewalk-client-tools-4.3.21-52.104.2 as a component of SUSE Manager Tools 12
+
+
+ golang-github-lusitaniae-apache_exporter-1.0.8-150000.1.23.3 as a component of SUSE Manager Tools 15
+
+
+ mgr-daemon-4.3.11-150000.1.53.5 as a component of SUSE Manager Tools 15
+
+
+ mgrctl-0.1.23-150000.1.13.3 as a component of SUSE Manager Tools 15
+
+
+ mgrctl-bash-completion-0.1.23-150000.1.13.3 as a component of SUSE Manager Tools 15
+
+
+ mgrctl-lang-0.1.23-150000.1.13.3 as a component of SUSE Manager Tools 15
+
+
+ mgrctl-zsh-completion-0.1.23-150000.1.13.3 as a component of SUSE Manager Tools 15
+
+
+ python3-spacewalk-check-4.3.21-150000.3.97.4 as a component of SUSE Manager Tools 15
+
+
+ python3-spacewalk-client-setup-4.3.21-150000.3.97.4 as a component of SUSE Manager Tools 15
+
+
+ python3-spacewalk-client-tools-4.3.21-150000.3.97.4 as a component of SUSE Manager Tools 15
+
+
+ python3-uyuni-common-libs-5.0.5-150000.1.45.3 as a component of SUSE Manager Tools 15
+
+
+ spacecmd-5.0.10-150000.3.127.3 as a component of SUSE Manager Tools 15
+
+
+ spacewalk-check-4.3.21-150000.3.97.4 as a component of SUSE Manager Tools 15
+
+
+ spacewalk-client-setup-4.3.21-150000.3.97.4 as a component of SUSE Manager Tools 15
+
+
+ spacewalk-client-tools-4.3.21-150000.3.97.4 as a component of SUSE Manager Tools 15
+
+
+ golang-github-lusitaniae-apache_exporter-1.0.8-150000.1.23.3 as a component of openSUSE Leap 15.5
+
+
+ golang-github-prometheus-promu-0.16.0-150000.3.21.4 as a component of openSUSE Leap 15.5
+
+
+ spacecmd-5.0.10-150000.3.127.3 as a component of openSUSE Leap 15.5
+
+
+ wire-0.6.0-150000.1.17.4 as a component of openSUSE Leap 15.5
+
+
+ golang-github-lusitaniae-apache_exporter-1.0.8-150000.1.23.3 as a component of openSUSE Leap 15.6
+
+
+ golang-github-prometheus-promu-0.16.0-150000.3.21.4 as a component of openSUSE Leap 15.6
+
+
+ spacecmd-5.0.10-150000.3.127.3 as a component of openSUSE Leap 15.6
+
+
+ wire-0.6.0-150000.1.17.4 as a component of openSUSE Leap 15.6
+
cni as a component of SUSE CaaS Platform 4.0
@@ -377,6 +622,48 @@
SUSE Liberty Linux 9:podman-tests-4.6.1-5.el9
openSUSE Tumbleweed:golang-github-lusitaniae-apache_exporter-1.0.8-1.1
+
+ SUSE Linux Enterprise Module for Package Hub 15 SP5:golang-github-prometheus-promu-0.16.0-150000.3.21.4
+ SUSE Linux Enterprise Module for Package Hub 15 SP6:golang-github-prometheus-promu-0.16.0-150000.3.21.4
+ SUSE Manager Proxy Module 4.3:golang-github-lusitaniae-apache_exporter-1.0.8-150000.1.23.3
+ SUSE Manager Server Module 4.3:golang-github-lusitaniae-apache_exporter-1.0.8-150000.1.23.3
+ SUSE Manager Tools 12:golang-github-lusitaniae-apache_exporter-1.0.8-1.24.3
+ SUSE Manager Tools 12:golang-github-prometheus-promu-0.16.0-1.21.3
+ SUSE Manager Tools 12:mgr-daemon-4.3.11-1.53.2
+ SUSE Manager Tools 12:mgrctl-0.1.23-1.13.2
+ SUSE Manager Tools 12:mgrctl-bash-completion-0.1.23-1.13.2
+ SUSE Manager Tools 12:mgrctl-zsh-completion-0.1.23-1.13.2
+ SUSE Manager Tools 12:python2-spacewalk-check-4.3.21-52.104.2
+ SUSE Manager Tools 12:python2-spacewalk-client-setup-4.3.21-52.104.2
+ SUSE Manager Tools 12:python2-spacewalk-client-tools-4.3.21-52.104.2
+ SUSE Manager Tools 12:python2-uyuni-common-libs-5.0.5-1.45.2
+ SUSE Manager Tools 12:spacecmd-5.0.10-38.150.2
+ SUSE Manager Tools 12:spacewalk-check-4.3.21-52.104.2
+ SUSE Manager Tools 12:spacewalk-client-setup-4.3.21-52.104.2
+ SUSE Manager Tools 12:spacewalk-client-tools-4.3.21-52.104.2
+ SUSE Manager Tools 15:golang-github-lusitaniae-apache_exporter-1.0.8-150000.1.23.3
+ SUSE Manager Tools 15:mgr-daemon-4.3.11-150000.1.53.5
+ SUSE Manager Tools 15:mgrctl-0.1.23-150000.1.13.3
+ SUSE Manager Tools 15:mgrctl-bash-completion-0.1.23-150000.1.13.3
+ SUSE Manager Tools 15:mgrctl-lang-0.1.23-150000.1.13.3
+ SUSE Manager Tools 15:mgrctl-zsh-completion-0.1.23-150000.1.13.3
+ SUSE Manager Tools 15:python3-spacewalk-check-4.3.21-150000.3.97.4
+ SUSE Manager Tools 15:python3-spacewalk-client-setup-4.3.21-150000.3.97.4
+ SUSE Manager Tools 15:python3-spacewalk-client-tools-4.3.21-150000.3.97.4
+ SUSE Manager Tools 15:python3-uyuni-common-libs-5.0.5-150000.1.45.3
+ SUSE Manager Tools 15:spacecmd-5.0.10-150000.3.127.3
+ SUSE Manager Tools 15:spacewalk-check-4.3.21-150000.3.97.4
+ SUSE Manager Tools 15:spacewalk-client-setup-4.3.21-150000.3.97.4
+ SUSE Manager Tools 15:spacewalk-client-tools-4.3.21-150000.3.97.4
+ openSUSE Leap 15.5:golang-github-lusitaniae-apache_exporter-1.0.8-150000.1.23.3
+ openSUSE Leap 15.5:golang-github-prometheus-promu-0.16.0-150000.3.21.4
+ openSUSE Leap 15.5:spacecmd-5.0.10-150000.3.127.3
+ openSUSE Leap 15.5:wire-0.6.0-150000.1.17.4
+ openSUSE Leap 15.6:golang-github-lusitaniae-apache_exporter-1.0.8-150000.1.23.3
+ openSUSE Leap 15.6:golang-github-prometheus-promu-0.16.0-150000.3.21.4
+ openSUSE Leap 15.6:spacecmd-5.0.10-150000.3.127.3
+ openSUSE Leap 15.6:wire-0.6.0-150000.1.17.4
+
SUSE CaaS Platform 4.0:cni
SUSE Enterprise Storage 7.1:cni
No V5 entry found for CVE-2023-3976 / /home/securitybot/prod/cve-database/cvelistV5/cves/2023/3xxxx/CVE-2023-3976.json:No such file or directory
skipping CVE-2023-3966 as CVE page is older than CVRF-CVE file.
skipping CVE-2023-3961 as CVE page is older than CVRF-CVE file.
skipping CVE-2023-3896 as CVE page is older than CVRF-CVE file.
no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2023-3863
skipping CVE-2023-3867 as CVE page is older than CVRF-CVE file.
skipping CVE-2023-3866 as CVE page is older than CVRF-CVE file.
skipping CVE-2023-3865 as CVE page is older than CVRF-CVE file.
no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2023-3824
no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2023-3823
no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2023-3776
skipping CVE-2023-3817 as CVE page is older than CVRF-CVE file.
skipping CVE-2023-3812 as CVE page is older than CVRF-CVE file.
skipping CVE-2023-3777 as CVE page is older than CVRF-CVE file.
no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2023-3772
skipping CVE-2023-3773 as CVE page is older than CVRF-CVE file.
skipping CVE-2023-3758 as CVE page is older than CVRF-CVE file.
skipping CVE-2023-3750 as CVE page is older than CVRF-CVE file.
no cpe found for SUSE Package Hub 15 SP4 in CVE-2023-3740
no cpe found for SUSE Package Hub 15 SP5 in CVE-2023-3740
skipping CVE-2023-3745 as CVE page is older than CVRF-CVE file.
no cpe found for SUSE Package Hub 15 SP4 in CVE-2023-3738
no cpe found for SUSE Package Hub 15 SP5 in CVE-2023-3738
no cpe found for SUSE Package Hub 15 SP4 in CVE-2023-3737
no cpe found for SUSE Package Hub 15 SP5 in CVE-2023-3737
no cpe found for SUSE Package Hub 15 SP4 in CVE-2023-3736
no cpe found for SUSE Package Hub 15 SP5 in CVE-2023-3736
no cpe found for SUSE Package Hub 15 SP4 in CVE-2023-3735
no cpe found for SUSE Package Hub 15 SP5 in CVE-2023-3735
no cpe found for SUSE Package Hub 15 SP4 in CVE-2023-3734
no cpe found for SUSE Package Hub 15 SP5 in CVE-2023-3734
no cpe found for SUSE Package Hub 15 SP4 in CVE-2023-3733
no cpe found for SUSE Package Hub 15 SP5 in CVE-2023-3733
no cpe found for SUSE Package Hub 15 SP4 in CVE-2023-3732
no cpe found for SUSE Package Hub 15 SP5 in CVE-2023-3732
no cpe found for SUSE Package Hub 15 SP4 in CVE-2023-3730
no cpe found for SUSE Package Hub 15 SP5 in CVE-2023-3730
no cpe found for SUSE Package Hub 15 SP4 in CVE-2023-3728
no cpe found for SUSE Package Hub 15 SP5 in CVE-2023-3728
no cpe found for SUSE Package Hub 15 SP4 in CVE-2023-3727
no cpe found for SUSE Package Hub 15 SP5 in CVE-2023-3727
skipping CVE-2023-3649 as CVE page is older than CVRF-CVE file.
skipping CVE-2023-3648 as CVE page is older than CVRF-CVE file.
skipping CVE-2023-3640 as CVE page is older than CVRF-CVE file.
no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2023-3611
skipping CVE-2023-3618 as CVE page is older than CVRF-CVE file.
no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2023-3609
skipping CVE-2023-3610 as CVE page is older than CVRF-CVE file.
skipping CVE-2023-3603 as CVE page is older than CVRF-CVE file.
skipping CVE-2023-3600 as CVE page is older than CVRF-CVE file.
no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2023-3567
skipping CVE-2023-3576 as CVE page is older than CVRF-CVE file.
no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2023-3482
skipping CVE-2023-3446 as CVE page is older than CVRF-CVE file.
skipping CVE-2023-3439 as CVE page is older than CVRF-CVE file.
skipping CVE-2023-3436 as CVE page is older than CVRF-CVE file.
no cpe found for SUSE Package Hub 15 SP4 in CVE-2023-3422
no cpe found for SUSE Package Hub 15 SP5 in CVE-2023-3422
no cpe found for openSUSE Leap 15.5 NonFree in CVE-2023-3422
skipping CVE-2023-3428 as CVE page is older than CVRF-CVE file.
no cpe found for SUSE Package Hub 15 SP4 in CVE-2023-3421
no cpe found for SUSE Package Hub 15 SP5 in CVE-2023-3421
no cpe found for openSUSE Leap 15.5 NonFree in CVE-2023-3421
no cpe found for SUSE Package Hub 15 SP4 in CVE-2023-3420
no cpe found for SUSE Package Hub 15 SP5 in CVE-2023-3420
no cpe found for openSUSE Leap 15.5 NonFree in CVE-2023-3420
no cpe found for SUSE Liberty Linux 7 LTSS in CVE-2023-3341
no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2023-3341
no cpe found for SUSE Manager Tools for SLE Micro 5 in CVE-2023-3341
skipping CVE-2023-3390 as CVE page is older than CVRF-CVE file.
skipping CVE-2023-3389 as CVE page is older than CVRF-CVE file.
skipping CVE-2023-3359 as CVE page is older than CVRF-CVE file.
skipping CVE-2023-3358 as CVE page is older than CVRF-CVE file.
skipping CVE-2023-3357 as CVE page is older than CVRF-CVE file.
skipping CVE-2023-3355 as CVE page is older than CVRF-CVE file.
skipping CVE-2023-3354 as CVE page is older than CVRF-CVE file.
skipping CVE-2023-3347 as CVE page is older than CVRF-CVE file.
no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2023-3268
skipping CVE-2023-3326 as CVE page is older than CVRF-CVE file.
skipping CVE-2023-3316 as CVE page is older than CVRF-CVE file.
skipping CVE-2023-3312 as CVE page is older than CVRF-CVE file.
skipping CVE-2023-3301 as CVE page is older than CVRF-CVE file.
skipping CVE-2023-3297 as CVE page is older than CVRF-CVE file.
skipping CVE-2023-3269 as CVE page is older than CVRF-CVE file.
no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2023-3247
skipping CVE-2023-3255 as CVE page is older than CVRF-CVE file.
no cpe found for SUSE Package Hub 15 SP4 in CVE-2023-3217
no cpe found for SUSE Package Hub 15 SP5 in CVE-2023-3217
skipping CVE-2023-3220 as CVE page is older than CVRF-CVE file.
no cpe found for SUSE Package Hub 15 SP4 in CVE-2023-3216
no cpe found for SUSE Package Hub 15 SP5 in CVE-2023-3216
no cpe found for SUSE Package Hub 15 SP4 in CVE-2023-3215
no cpe found for SUSE Package Hub 15 SP5 in CVE-2023-3215
no cpe found for SUSE Package Hub 15 SP4 in CVE-2023-3214
no cpe found for SUSE Package Hub 15 SP5 in CVE-2023-3214
skipping CVE-2023-3212 as CVE page is older than CVRF-CVE file.
skipping CVE-2023-3195 as CVE page is older than CVRF-CVE file.
skipping CVE-2023-3180 as CVE page is older than CVRF-CVE file.
skipping CVE-2023-3164 as CVE page is older than CVRF-CVE file.
skipping CVE-2023-3161 as CVE page is older than CVRF-CVE file.
skipping CVE-2023-3153 as CVE page is older than CVRF-CVE file.
skipping CVE-2023-3141 as CVE page is older than CVRF-CVE file.
skipping CVE-2023-3138 as CVE page is older than CVRF-CVE file.
skipping CVE-2023-3128 as CVE page is older than CVRF-CVE file.
skipping CVE-2023-3117 as CVE page is older than CVRF-CVE file.
no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2023-3111
no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2023-3090
skipping CVE-2023-3108 as CVE page is older than CVRF-CVE file.
skipping CVE-2023-3106 as CVE page is older than CVRF-CVE file.
no cpe found for SUSE Package Hub 15 SP4 in CVE-2023-3079
no cpe found for SUSE Package Hub 15 SP5 in CVE-2023-3079
no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2023-3019
skipping CVE-2023-3044 as CVE page is older than CVRF-CVE file.
skipping CVE-2023-3022 as CVE page is older than CVRF-CVE file.
no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2023-2985
skipping CVE-2023-3006 as CVE page is older than CVRF-CVE file.
no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2023-2977
no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2023-2953
skipping CVE-2023-2976 as CVE page is older than CVRF-CVE file.
skipping CVE-2023-2975 as CVE page is older than CVRF-CVE file.
no cpe found for SUSE Package Hub 15 SP4 in CVE-2023-2941
skipping CVE-2023-2952 as CVE page is older than CVRF-CVE file.
no cpe found for SUSE Package Hub 15 SP4 in CVE-2023-2940
no cpe found for SUSE Package Hub 15 SP4 in CVE-2023-2939
no cpe found for SUSE Package Hub 15 SP4 in CVE-2023-2938
no cpe found for SUSE Package Hub 15 SP4 in CVE-2023-2937
no cpe found for SUSE Package Hub 15 SP4 in CVE-2023-2936
no cpe found for SUSE Package Hub 15 SP4 in CVE-2023-2935
no cpe found for SUSE Package Hub 15 SP4 in CVE-2023-2934
no cpe found for SUSE Package Hub 15 SP4 in CVE-2023-2933
no cpe found for SUSE Package Hub 15 SP4 in CVE-2023-2932
no cpe found for SUSE Package Hub 15 SP4 in CVE-2023-2931
no cpe found for SUSE Package Hub 15 SP4 in CVE-2023-2930
no cpe found for SUSE Package Hub 15 SP4 in CVE-2023-2929
no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2023-2906
skipping CVE-2023-2911 as CVE page is older than CVRF-CVE file.
skipping CVE-2023-2908 as CVE page is older than CVRF-CVE file.
skipping CVE-2023-2898 as CVE page is older than CVRF-CVE file.
skipping CVE-2023-2879 as CVE page is older than CVRF-CVE file.
no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2023-2861
no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2023-2860
no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2023-2859
no cpe found for SUSE Manager Tools Beta for SLE Micro 5 in CVE-2023-2801
skipping CVE-2023-2858 as CVE page is older than CVRF-CVE file.
skipping CVE-2023-2857 as CVE page is older than CVRF-CVE file.
skipping CVE-2023-2856 as CVE page is older than CVRF-CVE file.
skipping CVE-2023-2855 as CVE page is older than CVRF-CVE file.
skipping CVE-2023-2854 as CVE page is older than CVRF-CVE file.
skipping CVE-2023-2829 as CVE page is older than CVRF-CVE file.
skipping CVE-2023-2828 as CVE page is older than CVRF-CVE file.
skipping CVE-2023-2804 as CVE page is older than CVRF-CVE file.
no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2023-2728
skipping CVE-2023-2731 as CVE page is older than CVRF-CVE file.
no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2023-2727
no cpe found for SUSE Package Hub 15 SP4 in CVE-2023-2726
no cpe found for openSUSE Leap 15.5 NonFree in CVE-2023-2726
no cpe found for SUSE Package Hub 15 SP4 in CVE-2023-2725
no cpe found for openSUSE Leap 15.5 NonFree in CVE-2023-2725
no cpe found for SUSE Package Hub 15 SP4 in CVE-2023-2724
no cpe found for openSUSE Leap 15.5 NonFree in CVE-2023-2724
no cpe found for SUSE Package Hub 15 SP4 in CVE-2023-2723
no cpe found for openSUSE Leap 15.5 NonFree in CVE-2023-2723
no cpe found for SUSE Package Hub 15 SP4 in CVE-2023-2722
no cpe found for openSUSE Leap 15.5 NonFree in CVE-2023-2722
no cpe found for SUSE Package Hub 15 SP4 in CVE-2023-2721
no cpe found for openSUSE Leap 15.5 NonFree in CVE-2023-2721
skipping CVE-2023-2700 as CVE page is older than CVRF-CVE file.
skipping CVE-2023-2680 as CVE page is older than CVRF-CVE file.
no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2023-2650
skipping CVE-2023-2664 as CVE page is older than CVRF-CVE file.
skipping CVE-2023-2663 as CVE page is older than CVRF-CVE file.
skipping CVE-2023-2662 as CVE page is older than CVRF-CVE file.
--- /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2023-2650.xml 2024-10-22 02:25:39.721683000 +0200
+++ /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2023-2650.xml.new 2024-10-29 01:35:49.346738000 +0100
@@ -14,13 +14,13 @@
1
- 136
- 2024-10-22T00:25:39Z
+ 137
+ 2024-10-29T00:35:48Z
current
2023-05-30T23:22:08Z
- 2024-10-22T00:25:39Z
+ 2024-10-29T00:35:48Z
cve-database/bin/generate-cvrf-cve.pl
2020-12-27T01:00:00Z
@@ -3206,6 +3206,24 @@
python313-x86-64-v3-3.13.0~b3-1.1
+
+ python314-3.14.0~a1-1.1
+
+
+ python314-curses-3.14.0~a1-1.1
+
+
+ python314-dbm-3.14.0~a1-1.1
+
+
+ python314-idle-3.14.0~a1-1.1
+
+
+ python314-tk-3.14.0~a1-1.1
+
+
+ python314-x86-64-v3-3.14.0~a1-1.1
+
python38-3.8.17-1.2
@@ -6743,6 +6761,24 @@
python313-x86-64-v3-3.13.0~b3-1.1 as a component of openSUSE Tumbleweed
+
+ python314-3.14.0~a1-1.1 as a component of openSUSE Tumbleweed
+
+
+ python314-curses-3.14.0~a1-1.1 as a component of openSUSE Tumbleweed
+
+
+ python314-dbm-3.14.0~a1-1.1 as a component of openSUSE Tumbleweed
+
+
+ python314-idle-3.14.0~a1-1.1 as a component of openSUSE Tumbleweed
+
+
+ python314-tk-3.14.0~a1-1.1 as a component of openSUSE Tumbleweed
+
+
+ python314-x86-64-v3-3.14.0~a1-1.1 as a component of openSUSE Tumbleweed
+
python38-3.8.17-1.2 as a component of openSUSE Tumbleweed
@@ -8365,6 +8401,12 @@
openSUSE Tumbleweed:python313-idle-3.13.0~b3-1.1
openSUSE Tumbleweed:python313-tk-3.13.0~b3-1.1
openSUSE Tumbleweed:python313-x86-64-v3-3.13.0~b3-1.1
+ openSUSE Tumbleweed:python314-3.14.0~a1-1.1
+ openSUSE Tumbleweed:python314-curses-3.14.0~a1-1.1
+ openSUSE Tumbleweed:python314-dbm-3.14.0~a1-1.1
+ openSUSE Tumbleweed:python314-idle-3.14.0~a1-1.1
+ openSUSE Tumbleweed:python314-tk-3.14.0~a1-1.1
+ openSUSE Tumbleweed:python314-x86-64-v3-3.14.0~a1-1.1
openSUSE Tumbleweed:python38-3.8.17-1.2
openSUSE Tumbleweed:python38-32bit-3.8.17-1.2
openSUSE Tumbleweed:python38-curses-3.8.17-1.2
no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2023-2610
skipping CVE-2023-2612 as CVE page is older than CVRF-CVE file.
no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2023-2609
no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2023-2597
skipping CVE-2023-2603 as CVE page is older than CVRF-CVE file.
skipping CVE-2023-2602 as CVE page is older than CVRF-CVE file.
skipping CVE-2023-2598 as CVE page is older than CVRF-CVE file.
skipping CVE-2023-2593 as CVE page is older than CVRF-CVE file.
no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2023-2513
no cpe found for SUSE Package Hub 15 SP4 in CVE-2023-2468
skipping CVE-2023-2491 as CVE page is older than CVRF-CVE file.
skipping CVE-2023-2483 as CVE page is older than CVRF-CVE file.
no cpe found for SUSE Package Hub 15 SP4 in CVE-2023-2467
no cpe found for SUSE Package Hub 15 SP4 in CVE-2023-2466
no cpe found for SUSE Package Hub 15 SP4 in CVE-2023-2465
no cpe found for SUSE Package Hub 15 SP4 in CVE-2023-2464
no cpe found for SUSE Package Hub 15 SP4 in CVE-2023-2463
no cpe found for SUSE Package Hub 15 SP4 in CVE-2023-2462
no cpe found for SUSE Package Hub 15 SP4 in CVE-2023-2461
no cpe found for SUSE Package Hub 15 SP4 in CVE-2023-2460
no cpe found for SUSE Package Hub 15 SP4 in CVE-2023-2459
skipping CVE-2023-2455 as CVE page is older than CVRF-CVE file.
skipping CVE-2023-2454 as CVE page is older than CVRF-CVE file.
no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2023-2426
skipping CVE-2023-2430 as CVE page is older than CVRF-CVE file.
no cpe found for SUSE Package Hub 15 SP4 in CVE-2023-2312
no cpe found for SUSE Package Hub 15 SP5 in CVE-2023-2312
no cpe found for openSUSE Leap 15.5 NonFree in CVE-2023-2312
no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2023-2283
no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2023-2255
skipping CVE-2023-2269 as CVE page is older than CVRF-CVE file.
no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2023-2253
skipping CVE-2023-2248 as CVE page is older than CVRF-CVE file.
skipping CVE-2023-2236 as CVE page is older than CVRF-CVE file.
skipping CVE-2023-2235 as CVE page is older than CVRF-CVE file.
skipping CVE-2023-2222 as CVE page is older than CVRF-CVE file.
skipping CVE-2023-2203 as CVE page is older than CVRF-CVE file.
no cpe found for SUSE Manager Tools Beta for SLE Micro 5 in CVE-2023-2183
no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2023-2176
skipping CVE-2023-2177 as CVE page is older than CVRF-CVE file.
--- /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2023-2176.xml 2024-10-14 01:52:06.326164000 +0200
+++ /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2023-2176.xml.new 2024-10-29 01:36:05.208912000 +0100
@@ -14,13 +14,13 @@
1
- 97
- 2024-10-13T23:52:05Z
+ 98
+ 2024-10-29T00:36:04Z
current
2023-04-19T23:18:17Z
- 2024-10-13T23:52:05Z
+ 2024-10-29T00:36:04Z
cve-database/bin/generate-cvrf-cve.pl
2020-12-27T01:00:00Z
@@ -3462,41 +3462,41 @@
ocfs2-kmp-default-4.12.14-122.162.1 as a component of Image SLES12-SP5-EC2-SAP-On-Demand
-
- kernel-default-4.12.14-122.162.1 as a component of Image SLES12-SP5-GCE-BYOS
+
+ kernel-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-BYOS
kernel-default-4.12.14-122.162.1 as a component of Image SLES12-SP5-GCE-On-Demand
-
- cluster-md-kmp-default-4.12.14-122.162.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+ cluster-md-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
-
- dlm-kmp-default-4.12.14-122.162.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+ dlm-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
-
- gfs2-kmp-default-4.12.14-122.162.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+ gfs2-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
-
- kernel-default-4.12.14-122.162.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+ kernel-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
-
- ocfs2-kmp-default-4.12.14-122.162.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+ ocfs2-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
-
- cluster-md-kmp-default-4.12.14-122.162.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
+ cluster-md-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
-
- dlm-kmp-default-4.12.14-122.162.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
+ dlm-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
-
- gfs2-kmp-default-4.12.14-122.162.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
+ gfs2-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
-
- kernel-default-4.12.14-122.162.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
+ kernel-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
-
- ocfs2-kmp-default-4.12.14-122.162.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
+ ocfs2-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
cluster-md-kmp-default-4.12.14-122.162.1 as a component of Image SLES12-SP5-SAP-Azure-LI-BYOS-Production
@@ -6827,18 +6827,18 @@
Image SLES12-SP5-EC2-SAP-On-Demand:gfs2-kmp-default-4.12.14-122.162.1
Image SLES12-SP5-EC2-SAP-On-Demand:kernel-default-4.12.14-122.162.1
Image SLES12-SP5-EC2-SAP-On-Demand:ocfs2-kmp-default-4.12.14-122.162.1
- Image SLES12-SP5-GCE-BYOS:kernel-default-4.12.14-122.162.1
+ Image SLES12-SP5-GCE-BYOS:kernel-default-4.12.14-122.228.1
Image SLES12-SP5-GCE-On-Demand:kernel-default-4.12.14-122.162.1
- Image SLES12-SP5-GCE-SAP-BYOS:cluster-md-kmp-default-4.12.14-122.162.1
- Image SLES12-SP5-GCE-SAP-BYOS:dlm-kmp-default-4.12.14-122.162.1
- Image SLES12-SP5-GCE-SAP-BYOS:gfs2-kmp-default-4.12.14-122.162.1
- Image SLES12-SP5-GCE-SAP-BYOS:kernel-default-4.12.14-122.162.1
- Image SLES12-SP5-GCE-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.162.1
- Image SLES12-SP5-GCE-SAP-On-Demand:cluster-md-kmp-default-4.12.14-122.162.1
- Image SLES12-SP5-GCE-SAP-On-Demand:dlm-kmp-default-4.12.14-122.162.1
- Image SLES12-SP5-GCE-SAP-On-Demand:gfs2-kmp-default-4.12.14-122.162.1
- Image SLES12-SP5-GCE-SAP-On-Demand:kernel-default-4.12.14-122.162.1
- Image SLES12-SP5-GCE-SAP-On-Demand:ocfs2-kmp-default-4.12.14-122.162.1
+ Image SLES12-SP5-GCE-SAP-BYOS:cluster-md-kmp-default-4.12.14-122.228.1
+ Image SLES12-SP5-GCE-SAP-BYOS:dlm-kmp-default-4.12.14-122.228.1
+ Image SLES12-SP5-GCE-SAP-BYOS:gfs2-kmp-default-4.12.14-122.228.1
+ Image SLES12-SP5-GCE-SAP-BYOS:kernel-default-4.12.14-122.228.1
+ Image SLES12-SP5-GCE-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.228.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:cluster-md-kmp-default-4.12.14-122.228.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:dlm-kmp-default-4.12.14-122.228.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:gfs2-kmp-default-4.12.14-122.228.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:kernel-default-4.12.14-122.228.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:ocfs2-kmp-default-4.12.14-122.228.1
Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:cluster-md-kmp-default-4.12.14-122.162.1
Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:dlm-kmp-default-4.12.14-122.162.1
Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:gfs2-kmp-default-4.12.14-122.162.1
no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2023-2162
skipping CVE-2023-2166 as CVE page is older than CVRF-CVE file.
skipping CVE-2023-2163 as CVE page is older than CVRF-CVE file.
no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2023-2137
no cpe found for SUSE Package Hub 15 SP4 in CVE-2023-2137
no cpe found for openSUSE Leap 15.5 NonFree in CVE-2023-2137
skipping CVE-2023-2157 as CVE page is older than CVRF-CVE file.
skipping CVE-2023-2156 as CVE page is older than CVRF-CVE file.
no cpe found for SUSE Package Hub 15 SP4 in CVE-2023-2136
no cpe found for openSUSE Leap 15.5 NonFree in CVE-2023-2136
no cpe found for SUSE Package Hub 15 SP4 in CVE-2023-2135
no cpe found for openSUSE Leap 15.5 NonFree in CVE-2023-2135
no cpe found for SUSE Package Hub 15 SP4 in CVE-2023-2134
no cpe found for openSUSE Leap 15.5 NonFree in CVE-2023-2134
no cpe found for SUSE Package Hub 15 SP4 in CVE-2023-2133
no cpe found for openSUSE Leap 15.5 NonFree in CVE-2023-2133
no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2023-2124
no cpe found for SUSE Package Hub 15 SP4 in CVE-2023-2033
no cpe found for openSUSE Leap 15.5 NonFree in CVE-2023-2033
no cpe found for SUSE Liberty Linux 7 LTSS in CVE-2023-1999
no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2023-1999
skipping CVE-2023-2019 as CVE page is older than CVRF-CVE file.
skipping CVE-2023-2008 as CVE page is older than CVRF-CVE file.
skipping CVE-2023-2007 as CVE page is older than CVRF-CVE file.
skipping CVE-2023-2006 as CVE page is older than CVRF-CVE file.
skipping CVE-2023-2004 as CVE page is older than CVRF-CVE file.
skipping CVE-2023-2002 as CVE page is older than CVRF-CVE file.
no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2023-1990
skipping CVE-2023-1998 as CVE page is older than CVRF-CVE file.
skipping CVE-2023-1994 as CVE page is older than CVRF-CVE file.
skipping CVE-2023-1993 as CVE page is older than CVRF-CVE file.
skipping CVE-2023-1992 as CVE page is older than CVRF-CVE file.
no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2023-1989
no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2023-1945
skipping CVE-2023-1981 as CVE page is older than CVRF-CVE file.
skipping CVE-2023-1972 as CVE page is older than CVRF-CVE file.
skipping CVE-2023-1916 as CVE page is older than CVRF-CVE file.
skipping CVE-2023-1906 as CVE page is older than CVRF-CVE file.
no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2023-1859
skipping CVE-2023-1872 as CVE page is older than CVRF-CVE file.
no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2023-1855
no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2023-1829
skipping CVE-2023-1838 as CVE page is older than CVRF-CVE file.
--- /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2023-1829.xml 2024-10-19 01:51:28.110533000 +0200
+++ /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2023-1829.xml.new 2024-10-29 01:36:13.553972000 +0100
@@ -14,13 +14,13 @@
1
- 147
- 2024-10-18T23:51:27Z
+ 148
+ 2024-10-29T00:36:12Z
current
2023-04-12T23:15:34Z
- 2024-10-18T23:51:27Z
+ 2024-10-29T00:36:12Z
cve-database/bin/generate-cvrf-cve.pl
2020-12-27T01:00:00Z
@@ -3050,12 +3050,21 @@
kernel-livepatch-5_3_18-150200_24_183-default-8-150200.5.6.1
+
+ kernel-livepatch-5_3_18-150200_24_183-default-9-150200.5.6.1
+
kernel-livepatch-5_3_18-150200_24_188-default-7-150200.5.6.1
+
+ kernel-livepatch-5_3_18-150200_24_188-default-8-150200.5.6.1
+
kernel-livepatch-5_3_18-150200_24_191-default-6-150200.5.6.1
+
+ kernel-livepatch-5_3_18-150200_24_191-default-7-150200.5.6.1
+
kernel-livepatch-5_3_18-150200_24_194-default-1-150200.5.3.1
@@ -3110,12 +3119,21 @@
kernel-livepatch-5_3_18-150300_59_153-default-8-150300.7.6.1
+
+ kernel-livepatch-5_3_18-150300_59_153-default-9-150300.7.6.1
+
kernel-livepatch-5_3_18-150300_59_158-default-7-150300.7.6.1
+
+ kernel-livepatch-5_3_18-150300_59_158-default-8-150300.7.6.1
+
kernel-livepatch-5_3_18-150300_59_161-default-6-150300.7.6.1
+
+ kernel-livepatch-5_3_18-150300_59_161-default-7-150300.7.6.1
+
kernel-livepatch-5_3_18-150300_59_164-default-1-150300.7.3.1
@@ -3440,9 +3458,15 @@
kgraft-patch-4_12_14-122_201-default-8-8.10.1
+
+ kgraft-patch-4_12_14-122_201-default-9-8.10.1
+
kgraft-patch-4_12_14-122_216-default-6-8.6.1
+
+ kgraft-patch-4_12_14-122_216-default-7-8.6.1
+
kgraft-patch-4_12_14-122_219-default-1-8.3.1
@@ -7262,6 +7286,30 @@
suse-module-tools-scriptlets-16.0.36-1.1 as a component of openSUSE Tumbleweed
+
+ kgraft-patch-4_12_14-122_201-default-9-8.10.1 as a component of SUSE Linux Enterprise Live Patching 12 SP5
+
+
+ kgraft-patch-4_12_14-122_216-default-7-8.6.1 as a component of SUSE Linux Enterprise Live Patching 12 SP5
+
+
+ kernel-livepatch-5_3_18-150200_24_183-default-9-150200.5.6.1 as a component of SUSE Linux Enterprise Live Patching 15 SP2
+
+
+ kernel-livepatch-5_3_18-150200_24_188-default-8-150200.5.6.1 as a component of SUSE Linux Enterprise Live Patching 15 SP2
+
+
+ kernel-livepatch-5_3_18-150200_24_191-default-7-150200.5.6.1 as a component of SUSE Linux Enterprise Live Patching 15 SP2
+
+
+ kernel-livepatch-5_3_18-150300_59_153-default-9-150300.7.6.1 as a component of SUSE Linux Enterprise Live Patching 15 SP3
+
+
+ kernel-livepatch-5_3_18-150300_59_158-default-8-150300.7.6.1 as a component of SUSE Linux Enterprise Live Patching 15 SP3
+
+
+ kernel-livepatch-5_3_18-150300_59_161-default-7-150300.7.6.1 as a component of SUSE Linux Enterprise Live Patching 15 SP3
+
kernel-default as a component of SUSE Linux Enterprise Server 11 SP3 for Teradata
@@ -7403,18 +7451,6 @@
kernel-default as a component of SUSE Linux Enterprise Server for SAP Applications 12 SP5
-
- kernel-default-base as a component of SUSE Linux Enterprise Server for SAP Applications 12 SP5
-
-
- kernel-default-devel as a component of SUSE Linux Enterprise Server for SAP Applications 12 SP5
-
-
- kernel-devel as a component of SUSE Linux Enterprise Server for SAP Applications 12 SP5
-
-
- kernel-macros as a component of SUSE Linux Enterprise Server for SAP Applications 12 SP5
-
kernel-source as a component of SUSE Linux Enterprise Server for SAP Applications 12 SP5
@@ -8797,6 +8833,16 @@
openSUSE Tumbleweed:suse-module-tools-16.0.36-1.1
openSUSE Tumbleweed:suse-module-tools-scriptlets-16.0.36-1.1
+
+ SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_201-default-9-8.10.1
+ SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_216-default-7-8.6.1
+ SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_183-default-9-150200.5.6.1
+ SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_188-default-8-150200.5.6.1
+ SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_191-default-7-150200.5.6.1
+ SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_153-default-9-150300.7.6.1
+ SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_158-default-8-150300.7.6.1
+ SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_161-default-7-150300.7.6.1
+
SUSE Linux Enterprise Server 11 SP3 for Teradata:kernel-default
SUSE Linux Enterprise Server 11 SP3 for Teradata:kernel-source
@@ -8826,10 +8872,6 @@
SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros
SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source
SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default
- SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base
- SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel
- SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel
- SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros
SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source
SUSE OpenStack Cloud 9:kernel-default
SUSE OpenStack Cloud 9:kernel-default-base
no cpe found for SUSE Package Hub 15 SP4 in CVE-2023-1823
no cpe found for SUSE Package Hub 15 SP4 in CVE-2023-1822
no cpe found for SUSE Package Hub 15 SP4 in CVE-2023-1821
no cpe found for SUSE Package Hub 15 SP4 in CVE-2023-1820
no cpe found for SUSE Package Hub 15 SP4 in CVE-2023-1819
no cpe found for SUSE Package Hub 15 SP4 in CVE-2023-1818
no cpe found for SUSE Package Hub 15 SP4 in CVE-2023-1817
no cpe found for SUSE Package Hub 15 SP4 in CVE-2023-1816
no cpe found for SUSE Package Hub 15 SP4 in CVE-2023-1815
no cpe found for SUSE Package Hub 15 SP4 in CVE-2023-1814
no cpe found for SUSE Package Hub 15 SP4 in CVE-2023-1813
no cpe found for SUSE Package Hub 15 SP4 in CVE-2023-1812
no cpe found for SUSE Package Hub 15 SP4 in CVE-2023-1811
no cpe found for SUSE Package Hub 15 SP4 in CVE-2023-1810
no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2023-1786
no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2023-1729
no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2023-1667
skipping CVE-2023-1670 as CVE page is older than CVRF-CVE file.
skipping CVE-2023-1668 as CVE page is older than CVRF-CVE file.
no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2023-1637
skipping CVE-2023-1652 as CVE page is older than CVRF-CVE file.
skipping CVE-2023-1611 as CVE page is older than CVRF-CVE file.
skipping CVE-2023-1601 as CVE page is older than CVRF-CVE file.
skipping CVE-2023-1583 as CVE page is older than CVRF-CVE file.
skipping CVE-2023-1582 as CVE page is older than CVRF-CVE file.
skipping CVE-2023-1579 as CVE page is older than CVRF-CVE file.
no cpe found for SUSE Package Hub 15 SP4 in CVE-2023-1534
no cpe found for openSUSE Leap 15.5 NonFree in CVE-2023-1534
skipping CVE-2023-1544 as CVE page is older than CVRF-CVE file.
no cpe found for SUSE Package Hub 15 SP4 in CVE-2023-1533
no cpe found for openSUSE Leap 15.5 NonFree in CVE-2023-1533
no cpe found for SUSE Package Hub 15 SP4 in CVE-2023-1532
no cpe found for openSUSE Leap 15.5 NonFree in CVE-2023-1532
no cpe found for SUSE Package Hub 15 SP4 in CVE-2023-1531
no cpe found for openSUSE Leap 15.5 NonFree in CVE-2023-1531
no cpe found for SUSE Package Hub 15 SP4 in CVE-2023-1530
no cpe found for openSUSE Leap 15.5 NonFree in CVE-2023-1530
no cpe found for SUSE Package Hub 15 SP4 in CVE-2023-1529
no cpe found for openSUSE Leap 15.5 NonFree in CVE-2023-1529
no cpe found for SUSE Package Hub 15 SP4 in CVE-2023-1528
no cpe found for openSUSE Leap 15.5 NonFree in CVE-2023-1528
No V5 entry found for CVE-2023-1521 / /home/securitybot/prod/cve-database/cvelistV5/cves/2023/1xxxx/CVE-2023-1521.json:No such file or directory
no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2023-1521
skipping CVE-2023-1513 as CVE page is older than CVRF-CVE file.
skipping CVE-2023-1476 as CVE page is older than CVRF-CVE file.
CVE-2023-1410: no packages for Image SLES15-SP2-SAP-BYOS-GCE, but entry?
CVE-2023-1410: no packages for SUSE Manager Tools Beta for SLE Micro 5, but entry?
CVE-2023-1410: no packages for Image SLES15-SP2-SAP-BYOS-Azure, but entry?
CVE-2023-1410: no packages for SUSE Manager Proxy Module 4.2, but entry?
CVE-2023-1410: no packages for SUSE Manager Tools for SLE Micro 5, but entry?
CVE-2023-1410: no packages for SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS, but entry?
CVE-2023-1410: no packages for SUSE Linux Enterprise Server 15 SP2-LTSS, but entry?
CVE-2023-1410: no packages for Image SLES15-SP1-SAP-Azure-VLI-BYOS-Production, but entry?
CVE-2023-1410: no packages for Image SLES15-SP2-SAP-Azure, but entry?
CVE-2023-1410: no packages for Image SLES15-SP2-SAP-Azure-LI-BYOS-Production, but entry?
CVE-2023-1410: no packages for SUSE Linux Enterprise Server for SAP Applications 15 SP1, but entry?
CVE-2023-1410: no packages for SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS, but entry?
CVE-2023-1410: no packages for Image SLES15-SP2-HPC-BYOS-Azure, but entry?
CVE-2023-1410: no packages for Image SLES15-SP1-SAP-Azure-LI-BYOS-Production, but entry?
CVE-2023-1410: no packages for Image SLES15-SP2-SAP-GCE, but entry?
CVE-2023-1410: no packages for SUSE Enterprise Storage 7, but entry?
CVE-2023-1410: no packages for Image SLES15-SP2-SAP-EC2-HVM, but entry?
CVE-2023-1410: no packages for Image SLES15-SP2-BYOS-Azure, but entry?
CVE-2023-1410: no packages for SUSE Manager Proxy Module 4.3, but entry?
CVE-2023-1410: no packages for SUSE Linux Enterprise Server 15 SP1-LTSS, but entry?
CVE-2023-1410: no packages for SUSE Linux Enterprise Server for SAP Applications 15 SP2, but entry?
CVE-2023-1410: no packages for Image SLES15-SP2-SAP-Azure-VLI-BYOS-Production, but entry?
CVE-2023-1410: no packages for Image SLES15-SP2-SAP-BYOS-EC2-HVM, but entry?
CVE-2023-1410: no packages for SUSE CaaS Platform 4.0, but entry?
CVE-2023-1410: no packages for Image SLES15-SP1-SAP-Azure-LI-BYOS-Production, but entry?
CVE-2023-1410: no packages for Image SLES15-SP1-SAP-Azure-VLI-BYOS-Production, but entry?
CVE-2023-1410: no packages for Image SLES15-SP2-BYOS-Azure, but entry?
CVE-2023-1410: no packages for Image SLES15-SP2-HPC-BYOS-Azure, but entry?
CVE-2023-1410: no packages for Image SLES15-SP2-SAP-Azure, but entry?
CVE-2023-1410: no packages for Image SLES15-SP2-SAP-Azure-LI-BYOS-Production, but entry?
CVE-2023-1410: no packages for Image SLES15-SP2-SAP-Azure-VLI-BYOS-Production, but entry?
CVE-2023-1410: no packages for Image SLES15-SP2-SAP-BYOS-Azure, but entry?
CVE-2023-1410: no packages for Image SLES15-SP2-SAP-BYOS-EC2-HVM, but entry?
CVE-2023-1410: no packages for Image SLES15-SP2-SAP-BYOS-GCE, but entry?
CVE-2023-1410: no packages for Image SLES15-SP2-SAP-EC2-HVM, but entry?
CVE-2023-1410: no packages for Image SLES15-SP2-SAP-GCE, but entry?
CVE-2023-1410: no packages for SUSE CaaS Platform 4.0, but entry?
CVE-2023-1410: no packages for SUSE Enterprise Storage 7, but entry?
CVE-2023-1410: no packages for SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS, but entry?
CVE-2023-1410: no packages for SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS, but entry?
CVE-2023-1410: no packages for SUSE Linux Enterprise Server 15 SP1-LTSS, but entry?
CVE-2023-1410: no packages for SUSE Linux Enterprise Server 15 SP2-LTSS, but entry?
CVE-2023-1410: no packages for SUSE Linux Enterprise Server for SAP Applications 15 SP1, but entry?
CVE-2023-1410: no packages for SUSE Linux Enterprise Server for SAP Applications 15 SP2, but entry?
CVE-2023-1410: no packages for SUSE Manager Proxy Module 4.2, but entry?
CVE-2023-1410: no packages for SUSE Manager Proxy Module 4.3, but entry?
CVE-2023-1410: no packages for SUSE Manager Tools Beta for SLE Micro 5, but entry?
CVE-2023-1410: no packages for SUSE Manager Tools for SLE Micro 5, but entry?
CVE-2023-1410: no packages for Image SLES15-SP1-SAP-Azure-LI-BYOS-Production, but entry?
CVE-2023-1410: no packages for Image SLES15-SP1-SAP-Azure-VLI-BYOS-Production, but entry?
CVE-2023-1410: no packages for Image SLES15-SP2-BYOS-Azure, but entry?
CVE-2023-1410: no packages for Image SLES15-SP2-HPC-BYOS-Azure, but entry?
CVE-2023-1410: no packages for Image SLES15-SP2-SAP-Azure, but entry?
CVE-2023-1410: no packages for Image SLES15-SP2-SAP-Azure-LI-BYOS-Production, but entry?
CVE-2023-1410: no packages for Image SLES15-SP2-SAP-Azure-VLI-BYOS-Production, but entry?
CVE-2023-1410: no packages for Image SLES15-SP2-SAP-BYOS-Azure, but entry?
CVE-2023-1410: no packages for Image SLES15-SP2-SAP-BYOS-EC2-HVM, but entry?
CVE-2023-1410: no packages for Image SLES15-SP2-SAP-BYOS-GCE, but entry?
CVE-2023-1410: no packages for Image SLES15-SP2-SAP-EC2-HVM, but entry?
CVE-2023-1410: no packages for Image SLES15-SP2-SAP-GCE, but entry?
CVE-2023-1410: no packages for SUSE CaaS Platform 4.0, but entry?
CVE-2023-1410: no packages for SUSE Enterprise Storage 7, but entry?
CVE-2023-1410: no packages for SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS, but entry?
CVE-2023-1410: no packages for SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS, but entry?
CVE-2023-1410: no packages for SUSE Linux Enterprise Server 15 SP1-LTSS, but entry?
CVE-2023-1410: no packages for SUSE Linux Enterprise Server 15 SP2-LTSS, but entry?
CVE-2023-1410: no packages for SUSE Linux Enterprise Server for SAP Applications 15 SP1, but entry?
CVE-2023-1410: no packages for SUSE Linux Enterprise Server for SAP Applications 15 SP2, but entry?
CVE-2023-1410: no packages for SUSE Manager Proxy Module 4.2, but entry?
CVE-2023-1410: no packages for SUSE Manager Proxy Module 4.3, but entry?
CVE-2023-1410: no packages for SUSE Manager Tools Beta for SLE Micro 5, but entry?
CVE-2023-1410: no packages for SUSE Manager Tools for SLE Micro 5, but entry?
CVE-2023-1387: no packages for Image SLES15-SP2-SAP-BYOS-Azure, but entry?
CVE-2023-1387: no packages for SUSE Manager Proxy Module 4.2, but entry?
CVE-2023-1387: no packages for SUSE Manager Tools for SLE Micro 5, but entry?
CVE-2023-1387: no packages for Image SLES15-SP2-SAP-BYOS-GCE, but entry?
CVE-2023-1387: no packages for SUSE Manager Tools Beta for SLE Micro 5, but entry?
CVE-2023-1387: no packages for Image SLES15-SP1-SAP-Azure-VLI-BYOS-Production, but entry?
CVE-2023-1387: no packages for Image SLES15-SP2-SAP-Azure, but entry?
CVE-2023-1387: no packages for Image SLES15-SP2-SAP-Azure-LI-BYOS-Production, but entry?
CVE-2023-1387: no packages for SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS, but entry?
CVE-2023-1387: no packages for SUSE Linux Enterprise Server 15 SP2-LTSS, but entry?
CVE-2023-1387: no packages for SUSE Enterprise Storage 7, but entry?
CVE-2023-1387: no packages for Image SLES15-SP2-SAP-EC2-HVM, but entry?
CVE-2023-1387: no packages for SUSE Linux Enterprise Server for SAP Applications 15 SP1, but entry?
CVE-2023-1387: no packages for SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS, but entry?
CVE-2023-1387: no packages for Image SLES15-SP2-HPC-BYOS-Azure, but entry?
CVE-2023-1387: no packages for Image SLES15-SP1-SAP-Azure-LI-BYOS-Production, but entry?
CVE-2023-1387: no packages for Image SLES15-SP2-SAP-GCE, but entry?
CVE-2023-1387: no packages for Image SLES15-SP2-SAP-Azure-VLI-BYOS-Production, but entry?
CVE-2023-1387: no packages for Image SLES15-SP2-SAP-BYOS-EC2-HVM, but entry?
CVE-2023-1387: no packages for SUSE CaaS Platform 4.0, but entry?
CVE-2023-1387: no packages for Image SLES15-SP2-BYOS-Azure, but entry?
CVE-2023-1387: no packages for SUSE Manager Proxy Module 4.3, but entry?
CVE-2023-1387: no packages for SUSE Linux Enterprise Server 15 SP1-LTSS, but entry?
CVE-2023-1387: no packages for SUSE Linux Enterprise Server for SAP Applications 15 SP2, but entry?
CVE-2023-1387: no packages for Image SLES15-SP1-SAP-Azure-LI-BYOS-Production, but entry?
CVE-2023-1387: no packages for Image SLES15-SP1-SAP-Azure-VLI-BYOS-Production, but entry?
CVE-2023-1387: no packages for Image SLES15-SP2-BYOS-Azure, but entry?
CVE-2023-1387: no packages for Image SLES15-SP2-HPC-BYOS-Azure, but entry?
CVE-2023-1387: no packages for Image SLES15-SP2-SAP-Azure, but entry?
CVE-2023-1387: no packages for Image SLES15-SP2-SAP-Azure-LI-BYOS-Production, but entry?
CVE-2023-1387: no packages for Image SLES15-SP2-SAP-Azure-VLI-BYOS-Production, but entry?
CVE-2023-1387: no packages for Image SLES15-SP2-SAP-BYOS-Azure, but entry?
CVE-2023-1387: no packages for Image SLES15-SP2-SAP-BYOS-EC2-HVM, but entry?
CVE-2023-1387: no packages for Image SLES15-SP2-SAP-BYOS-GCE, but entry?
CVE-2023-1387: no packages for Image SLES15-SP2-SAP-EC2-HVM, but entry?
CVE-2023-1387: no packages for Image SLES15-SP2-SAP-GCE, but entry?
CVE-2023-1387: no packages for SUSE CaaS Platform 4.0, but entry?
CVE-2023-1387: no packages for SUSE Enterprise Storage 7, but entry?
CVE-2023-1387: no packages for SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS, but entry?
CVE-2023-1387: no packages for SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS, but entry?
CVE-2023-1387: no packages for SUSE Linux Enterprise Server 15 SP1-LTSS, but entry?
CVE-2023-1387: no packages for SUSE Linux Enterprise Server 15 SP2-LTSS, but entry?
CVE-2023-1387: no packages for SUSE Linux Enterprise Server for SAP Applications 15 SP1, but entry?
CVE-2023-1387: no packages for SUSE Linux Enterprise Server for SAP Applications 15 SP2, but entry?
CVE-2023-1387: no packages for SUSE Manager Proxy Module 4.2, but entry?
CVE-2023-1387: no packages for SUSE Manager Proxy Module 4.3, but entry?
CVE-2023-1387: no packages for SUSE Manager Tools Beta for SLE Micro 5, but entry?
CVE-2023-1387: no packages for SUSE Manager Tools for SLE Micro 5, but entry?
CVE-2023-1387: no packages for Image SLES15-SP1-SAP-Azure-LI-BYOS-Production, but entry?
CVE-2023-1387: no packages for Image SLES15-SP1-SAP-Azure-VLI-BYOS-Production, but entry?
CVE-2023-1387: no packages for Image SLES15-SP2-BYOS-Azure, but entry?
CVE-2023-1387: no packages for Image SLES15-SP2-HPC-BYOS-Azure, but entry?
CVE-2023-1387: no packages for Image SLES15-SP2-SAP-Azure, but entry?
CVE-2023-1387: no packages for Image SLES15-SP2-SAP-Azure-LI-BYOS-Production, but entry?
CVE-2023-1387: no packages for Image SLES15-SP2-SAP-Azure-VLI-BYOS-Production, but entry?
CVE-2023-1387: no packages for Image SLES15-SP2-SAP-BYOS-Azure, but entry?
CVE-2023-1387: no packages for Image SLES15-SP2-SAP-BYOS-EC2-HVM, but entry?
CVE-2023-1387: no packages for Image SLES15-SP2-SAP-BYOS-GCE, but entry?
CVE-2023-1387: no packages for Image SLES15-SP2-SAP-EC2-HVM, but entry?
CVE-2023-1387: no packages for Image SLES15-SP2-SAP-GCE, but entry?
CVE-2023-1387: no packages for SUSE CaaS Platform 4.0, but entry?
CVE-2023-1387: no packages for SUSE Enterprise Storage 7, but entry?
CVE-2023-1387: no packages for SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS, but entry?
CVE-2023-1387: no packages for SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS, but entry?
CVE-2023-1387: no packages for SUSE Linux Enterprise Server 15 SP1-LTSS, but entry?
CVE-2023-1387: no packages for SUSE Linux Enterprise Server 15 SP2-LTSS, but entry?
CVE-2023-1387: no packages for SUSE Linux Enterprise Server for SAP Applications 15 SP1, but entry?
CVE-2023-1387: no packages for SUSE Linux Enterprise Server for SAP Applications 15 SP2, but entry?
CVE-2023-1387: no packages for SUSE Manager Proxy Module 4.2, but entry?
CVE-2023-1387: no packages for SUSE Manager Proxy Module 4.3, but entry?
CVE-2023-1387: no packages for SUSE Manager Tools Beta for SLE Micro 5, but entry?
CVE-2023-1387: no packages for SUSE Manager Tools for SLE Micro 5, but entry?
skipping CVE-2023-1393 as CVE page is older than CVRF-CVE file.
skipping CVE-2023-1390 as CVE page is older than CVRF-CVE file.
no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2023-1355
skipping CVE-2023-1382 as CVE page is older than CVRF-CVE file.
skipping CVE-2023-1380 as CVE page is older than CVRF-CVE file.
skipping CVE-2023-1350 as CVE page is older than CVRF-CVE file.
no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2023-1264
skipping CVE-2023-1295 as CVE page is older than CVRF-CVE file.
skipping CVE-2023-1289 as CVE page is older than CVRF-CVE file.
skipping CVE-2023-1281 as CVE page is older than CVRF-CVE file.
no cpe found for SUSE Package Hub 15 SP4 in CVE-2023-1236
no cpe found for openSUSE Leap 15.5 NonFree in CVE-2023-1236
skipping CVE-2023-1255 as CVE page is older than CVRF-CVE file.
skipping CVE-2023-1252 as CVE page is older than CVRF-CVE file.
skipping CVE-2023-1249 as CVE page is older than CVRF-CVE file.
no cpe found for SUSE Package Hub 15 SP4 in CVE-2023-1235
no cpe found for openSUSE Leap 15.5 NonFree in CVE-2023-1235
no cpe found for SUSE Package Hub 15 SP4 in CVE-2023-1234
no cpe found for openSUSE Leap 15.5 NonFree in CVE-2023-1234
no cpe found for SUSE Package Hub 15 SP4 in CVE-2023-1233
no cpe found for openSUSE Leap 15.5 NonFree in CVE-2023-1233
no cpe found for SUSE Package Hub 15 SP4 in CVE-2023-1232
no cpe found for openSUSE Leap 15.5 NonFree in CVE-2023-1232
no cpe found for SUSE Package Hub 15 SP4 in CVE-2023-1231
no cpe found for openSUSE Leap 15.5 NonFree in CVE-2023-1231
no cpe found for SUSE Package Hub 15 SP4 in CVE-2023-1230
no cpe found for openSUSE Leap 15.5 NonFree in CVE-2023-1230
no cpe found for SUSE Package Hub 15 SP4 in CVE-2023-1229
no cpe found for openSUSE Leap 15.5 NonFree in CVE-2023-1229
no cpe found for SUSE Package Hub 15 SP4 in CVE-2023-1228
no cpe found for openSUSE Leap 15.5 NonFree in CVE-2023-1228
no cpe found for SUSE Package Hub 15 SP4 in CVE-2023-1227
no cpe found for openSUSE Leap 15.5 NonFree in CVE-2023-1227
no cpe found for SUSE Package Hub 15 SP4 in CVE-2023-1226
no cpe found for openSUSE Leap 15.5 NonFree in CVE-2023-1226
no cpe found for SUSE Package Hub 15 SP4 in CVE-2023-1225
no cpe found for openSUSE Leap 15.5 NonFree in CVE-2023-1225
no cpe found for SUSE Package Hub 15 SP4 in CVE-2023-1224
no cpe found for openSUSE Leap 15.5 NonFree in CVE-2023-1224
no cpe found for SUSE Package Hub 15 SP4 in CVE-2023-1223
no cpe found for openSUSE Leap 15.5 NonFree in CVE-2023-1223
no cpe found for SUSE Package Hub 15 SP4 in CVE-2023-1222
no cpe found for openSUSE Leap 15.5 NonFree in CVE-2023-1222
no cpe found for SUSE Package Hub 15 SP4 in CVE-2023-1221
no cpe found for openSUSE Leap 15.5 NonFree in CVE-2023-1221
no cpe found for SUSE Package Hub 15 SP4 in CVE-2023-1220
no cpe found for openSUSE Leap 15.5 NonFree in CVE-2023-1220
no cpe found for SUSE Package Hub 15 SP4 in CVE-2023-1219
no cpe found for openSUSE Leap 15.5 NonFree in CVE-2023-1219
no cpe found for SUSE Package Hub 15 SP4 in CVE-2023-1218
no cpe found for openSUSE Leap 15.5 NonFree in CVE-2023-1218
no cpe found for SUSE Package Hub 15 SP4 in CVE-2023-1217
no cpe found for openSUSE Leap 15.5 NonFree in CVE-2023-1217
no cpe found for SUSE Package Hub 15 SP4 in CVE-2023-1216
no cpe found for openSUSE Leap 15.5 NonFree in CVE-2023-1216
no cpe found for SUSE Package Hub 15 SP4 in CVE-2023-1215
no cpe found for openSUSE Leap 15.5 NonFree in CVE-2023-1215
no cpe found for SUSE Package Hub 15 SP4 in CVE-2023-1214
no cpe found for openSUSE Leap 15.5 NonFree in CVE-2023-1214
no cpe found for SUSE Package Hub 15 SP4 in CVE-2023-1213
no cpe found for openSUSE Leap 15.5 NonFree in CVE-2023-1213
skipping CVE-2023-1206 as CVE page is older than CVRF-CVE file.
skipping CVE-2023-1195 as CVE page is older than CVRF-CVE file.
skipping CVE-2023-1194 as CVE page is older than CVRF-CVE file.
skipping CVE-2023-1193 as CVE page is older than CVRF-CVE file.
skipping CVE-2023-1192 as CVE page is older than CVRF-CVE file.
no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2023-1127
skipping CVE-2023-1161 as CVE page is older than CVRF-CVE file.
no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2023-1118
no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2023-1095
no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2023-1077
skipping CVE-2023-1079 as CVE page is older than CVRF-CVE file.
skipping CVE-2023-1078 as CVE page is older than CVRF-CVE file.
skipping CVE-2023-1076 as CVE page is older than CVRF-CVE file.
skipping CVE-2023-1075 as CVE page is older than CVRF-CVE file.
skipping CVE-2023-1074 as CVE page is older than CVRF-CVE file.
no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2023-1018
skipping CVE-2023-1032 as CVE page is older than CVRF-CVE file.
no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2023-1017
no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2023-0950
no cpe found for SUSE Package Hub 15 SP4 in CVE-2023-0941
no cpe found for openSUSE Leap 15.5 NonFree in CVE-2023-0941
no cpe found for SUSE Package Hub 15 SP4 in CVE-2023-0933
no cpe found for openSUSE Leap 15.5 NonFree in CVE-2023-0933
no cpe found for SUSE Package Hub 15 SP4 in CVE-2023-0932
no cpe found for openSUSE Leap 15.5 NonFree in CVE-2023-0932
no cpe found for SUSE Package Hub 15 SP4 in CVE-2023-0931
no cpe found for openSUSE Leap 15.5 NonFree in CVE-2023-0931
no cpe found for SUSE Package Hub 15 SP4 in CVE-2023-0930
no cpe found for openSUSE Leap 15.5 NonFree in CVE-2023-0930
no cpe found for SUSE Package Hub 15 SP4 in CVE-2023-0929
no cpe found for openSUSE Leap 15.5 NonFree in CVE-2023-0929
no cpe found for SUSE Package Hub 15 SP4 in CVE-2023-0928
no cpe found for openSUSE Leap 15.5 NonFree in CVE-2023-0928
no cpe found for SUSE Package Hub 15 SP4 in CVE-2023-0927
no cpe found for openSUSE Leap 15.5 NonFree in CVE-2023-0927
no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2023-0922
no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2023-0778
skipping CVE-2023-0804 as CVE page is older than CVRF-CVE file.
skipping CVE-2023-0803 as CVE page is older than CVRF-CVE file.
skipping CVE-2023-0802 as CVE page is older than CVRF-CVE file.
skipping CVE-2023-0801 as CVE page is older than CVRF-CVE file.
skipping CVE-2023-0800 as CVE page is older than CVRF-CVE file.
skipping CVE-2023-0799 as CVE page is older than CVRF-CVE file.
skipping CVE-2023-0798 as CVE page is older than CVRF-CVE file.
skipping CVE-2023-0797 as CVE page is older than CVRF-CVE file.
skipping CVE-2023-0796 as CVE page is older than CVRF-CVE file.
skipping CVE-2023-0795 as CVE page is older than CVRF-CVE file.
no cpe found for SUSE Package Hub 15 SP4 in CVE-2023-0705
no cpe found for openSUSE Leap 15.5 NonFree in CVE-2023-0705
skipping CVE-2023-0767 as CVE page is older than CVRF-CVE file.
no cpe found for SUSE Package Hub 15 SP4 in CVE-2023-0704
no cpe found for openSUSE Leap 15.5 NonFree in CVE-2023-0704
no cpe found for SUSE Package Hub 15 SP4 in CVE-2023-0703
no cpe found for openSUSE Leap 15.5 NonFree in CVE-2023-0703
no cpe found for SUSE Package Hub 15 SP4 in CVE-2023-0702
no cpe found for openSUSE Leap 15.5 NonFree in CVE-2023-0702
no cpe found for SUSE Package Hub 15 SP4 in CVE-2023-0701
no cpe found for openSUSE Leap 15.5 NonFree in CVE-2023-0701
no cpe found for SUSE Package Hub 15 SP4 in CVE-2023-0700
no cpe found for openSUSE Leap 15.5 NonFree in CVE-2023-0700
no cpe found for SUSE Package Hub 15 SP4 in CVE-2023-0699
no cpe found for openSUSE Leap 15.5 NonFree in CVE-2023-0699
no cpe found for SUSE Package Hub 15 SP4 in CVE-2023-0698
no cpe found for openSUSE Leap 15.5 NonFree in CVE-2023-0698
no cpe found for SUSE Package Hub 15 SP4 in CVE-2023-0697
no cpe found for openSUSE Leap 15.5 NonFree in CVE-2023-0697
no cpe found for SUSE Package Hub 15 SP4 in CVE-2023-0696
no cpe found for openSUSE Leap 15.5 NonFree in CVE-2023-0696
skipping CVE-2023-0687 as CVE page is older than CVRF-CVE file.
no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2023-0662
skipping CVE-2023-0668 as CVE page is older than CVRF-CVE file.
skipping CVE-2023-0667 as CVE page is older than CVRF-CVE file.
skipping CVE-2023-0666 as CVE page is older than CVRF-CVE file.
skipping CVE-2023-0664 as CVE page is older than CVRF-CVE file.
no cpe found for SUSE Manager Tools Beta for SLE Micro 5 in CVE-2023-0594
skipping CVE-2023-0616 as CVE page is older than CVRF-CVE file.
skipping CVE-2023-0615 as CVE page is older than CVRF-CVE file.
skipping CVE-2023-0614 as CVE page is older than CVRF-CVE file.
skipping CVE-2023-0597 as CVE page is older than CVRF-CVE file.
no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2023-0590
no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2023-0568
no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2023-0567
CVE-2023-0507: no packages for SUSE Manager Tools Beta for SLE Micro 5, but entry?
CVE-2023-0507: no packages for SUSE Manager Tools Beta for SLE Micro 5, but entry?
CVE-2023-0507: no packages for SUSE Manager Tools Beta for SLE Micro 5, but entry?
no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2023-0494
no cpe found for SUSE Package Hub 15 SP4 in CVE-2023-0474
no cpe found for openSUSE Leap 15.5 NonFree in CVE-2023-0474
no cpe found for SUSE Package Hub 15 SP4 in CVE-2023-0473
no cpe found for openSUSE Leap 15.5 NonFree in CVE-2023-0473
no cpe found for SUSE Package Hub 15 SP4 in CVE-2023-0472
no cpe found for openSUSE Leap 15.5 NonFree in CVE-2023-0472
no cpe found for SUSE Package Hub 15 SP4 in CVE-2023-0471
no cpe found for openSUSE Leap 15.5 NonFree in CVE-2023-0471
skipping CVE-2023-0469 as CVE page is older than CVRF-CVE file.
skipping CVE-2023-0468 as CVE page is older than CVRF-CVE file.
skipping CVE-2023-0466 as CVE page is older than CVRF-CVE file.
skipping CVE-2023-0465 as CVE page is older than CVRF-CVE file.
skipping CVE-2023-0464 as CVE page is older than CVRF-CVE file.
skipping CVE-2023-0461 as CVE page is older than CVRF-CVE file.
skipping CVE-2023-0459 as CVE page is older than CVRF-CVE file.
skipping CVE-2023-0458 as CVE page is older than CVRF-CVE file.
skipping CVE-2023-0433 as CVE page is older than CVRF-CVE file.
no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2023-0394
skipping CVE-2023-0417 as CVE page is older than CVRF-CVE file.
skipping CVE-2023-0416 as CVE page is older than CVRF-CVE file.
skipping CVE-2023-0415 as CVE page is older than CVRF-CVE file.
skipping CVE-2023-0414 as CVE page is older than CVRF-CVE file.
skipping CVE-2023-0413 as CVE page is older than CVRF-CVE file.
skipping CVE-2023-0412 as CVE page is older than CVRF-CVE file.
skipping CVE-2023-0411 as CVE page is older than CVRF-CVE file.
skipping CVE-2023-0401 as CVE page is older than CVRF-CVE file.
no cpe found for SUSE Package Hub 15 SP4 in CVE-2023-0341
skipping CVE-2023-0386 as CVE page is older than CVRF-CVE file.
skipping CVE-2023-0361 as CVE page is older than CVRF-CVE file.
no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2023-0330
no cpe found for SUSE Liberty Linux 7 LTSS in CVE-2023-0286
no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2023-0286
skipping CVE-2023-0288 as CVE page is older than CVRF-CVE file.
--- /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2023-0286.xml 2024-10-22 02:30:03.404835000 +0200
+++ /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2023-0286.xml.new 2024-10-29 01:37:03.174872000 +0100
@@ -14,13 +14,13 @@
1
- 127
- 2024-10-22T00:30:02Z
+ 128
+ 2024-10-29T00:37:02Z
current
2023-02-08T00:24:04Z
- 2024-10-22T00:30:02Z
+ 2024-10-29T00:37:02Z
cve-database/bin/generate-cvrf-cve.pl
2020-12-27T01:00:00Z
@@ -2805,6 +2805,24 @@
python313-x86-64-v3-3.13.0~b3-1.1
+
+ python314-3.14.0~a1-1.1
+
+
+ python314-curses-3.14.0~a1-1.1
+
+
+ python314-dbm-3.14.0~a1-1.1
+
+
+ python314-idle-3.14.0~a1-1.1
+
+
+ python314-tk-3.14.0~a1-1.1
+
+
+ python314-x86-64-v3-3.14.0~a1-1.1
+
python38-3.8.17-1.2
@@ -5967,6 +5985,24 @@
python313-x86-64-v3-3.13.0~b3-1.1 as a component of openSUSE Tumbleweed
+
+ python314-3.14.0~a1-1.1 as a component of openSUSE Tumbleweed
+
+
+ python314-curses-3.14.0~a1-1.1 as a component of openSUSE Tumbleweed
+
+
+ python314-dbm-3.14.0~a1-1.1 as a component of openSUSE Tumbleweed
+
+
+ python314-idle-3.14.0~a1-1.1 as a component of openSUSE Tumbleweed
+
+
+ python314-tk-3.14.0~a1-1.1 as a component of openSUSE Tumbleweed
+
+
+ python314-x86-64-v3-3.14.0~a1-1.1 as a component of openSUSE Tumbleweed
+
python38-3.8.17-1.2 as a component of openSUSE Tumbleweed
@@ -7316,6 +7352,12 @@
openSUSE Tumbleweed:python313-idle-3.13.0~b3-1.1
openSUSE Tumbleweed:python313-tk-3.13.0~b3-1.1
openSUSE Tumbleweed:python313-x86-64-v3-3.13.0~b3-1.1
+ openSUSE Tumbleweed:python314-3.14.0~a1-1.1
+ openSUSE Tumbleweed:python314-curses-3.14.0~a1-1.1
+ openSUSE Tumbleweed:python314-dbm-3.14.0~a1-1.1
+ openSUSE Tumbleweed:python314-idle-3.14.0~a1-1.1
+ openSUSE Tumbleweed:python314-tk-3.14.0~a1-1.1
+ openSUSE Tumbleweed:python314-x86-64-v3-3.14.0~a1-1.1
openSUSE Tumbleweed:python38-3.8.17-1.2
openSUSE Tumbleweed:python38-32bit-3.8.17-1.2
openSUSE Tumbleweed:python38-curses-3.8.17-1.2
skipping CVE-2023-0266 as CVE page is older than CVRF-CVE file.
no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2023-0241
skipping CVE-2023-0240 as CVE page is older than CVRF-CVE file.
skipping CVE-2023-0225 as CVE page is older than CVRF-CVE file.
skipping CVE-2023-0217 as CVE page is older than CVRF-CVE file.
skipping CVE-2023-0216 as CVE page is older than CVRF-CVE file.
skipping CVE-2023-0215 as CVE page is older than CVRF-CVE file.
skipping CVE-2023-0210 as CVE page is older than CVRF-CVE file.
no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2023-0160
skipping CVE-2023-0179 as CVE page is older than CVRF-CVE file.
no cpe found for SUSE Package Hub 15 SP4 in CVE-2023-0141
no cpe found for SUSE Package Hub 15 SP4 in CVE-2023-0140
no cpe found for SUSE Package Hub 15 SP4 in CVE-2023-0139
no cpe found for SUSE Package Hub 15 SP4 in CVE-2023-0138
no cpe found for SUSE Package Hub 15 SP4 in CVE-2023-0137
no cpe found for SUSE Package Hub 15 SP4 in CVE-2023-0136
no cpe found for SUSE Package Hub 15 SP4 in CVE-2023-0134
no cpe found for SUSE Package Hub 15 SP4 in CVE-2023-0133
no cpe found for SUSE Package Hub 15 SP4 in CVE-2023-0132
no cpe found for SUSE Package Hub 15 SP4 in CVE-2023-0131
no cpe found for SUSE Package Hub 15 SP4 in CVE-2023-0130
no cpe found for SUSE Package Hub 15 SP4 in CVE-2023-0129
no cpe found for SUSE Package Hub 15 SP4 in CVE-2023-0128
skipping CVE-2023-0122 as CVE page is older than CVRF-CVE file.
skipping CVE-2023-0054 as CVE page is older than CVRF-CVE file.
skipping CVE-2023-0051 as CVE page is older than CVRF-CVE file.
skipping CVE-2023-0049 as CVE page is older than CVRF-CVE file.
skipping CVE-2023-0045 as CVE page is older than CVRF-CVE file.
skipping CVE-2023-0030 as CVE page is older than CVRF-CVE file.
no entry found for CVE-2022-219862 / /home/securitybot/prod/cve-database/cvelist/2022/219xxxx/CVE-2022-219862.json:No such file or directory
No V5 entry found for CVE-2022-219862 / /home/securitybot/prod/cve-database/cvelistV5/cves/2022/219xxxx/CVE-2022-219862.json:No such file or directory
--- /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2022-49015.xml 2024-10-23 01:29:01.753772000 +0200
+++ /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2022-49015.xml.new 2024-10-29 01:37:22.408881000 +0100
@@ -14,13 +14,13 @@
1
- 2
- 2024-10-22T23:29:01Z
+ 3
+ 2024-10-29T00:37:21Z
current
2024-10-22T00:30:55Z
- 2024-10-22T23:29:01Z
+ 2024-10-29T00:37:21Z
cve-database/bin/generate-cvrf-cve.pl
2020-12-27T01:00:00Z
@@ -64,11 +64,6 @@
SUSE Linux Enterprise High Availability Extension 12 SP5
-
-
- SUSE Linux Enterprise Module for Public Cloud 12
-
-
SUSE Linux Enterprise High Performance Computing 12 SP5
@@ -201,35 +196,17 @@
SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE
-
-
- SUSE Linux Enterprise Module for Public Cloud 12
-
-
SUSE Linux Enterprise Server 12 SP2-LTSS
-
-
- SUSE Linux Enterprise Module for Public Cloud 12
-
-
-
-
- SUSE Linux Enterprise Module for Public Cloud 12
-
-
SUSE Linux Enterprise Server 12 SP4-LTSS
-
- SUSE Linux Enterprise Module for Public Cloud 12
-
SUSE Linux Enterprise Server 12 SP5
@@ -307,25 +284,7 @@
SUSE Linux Enterprise Server Teradata 15 SP4
-
-
- SUSE Linux Enterprise Module for Public Cloud 12
-
-
-
-
- SUSE Linux Enterprise Module for Public Cloud 12
-
-
-
-
- SUSE Linux Enterprise Module for Public Cloud 12
-
-
-
- SUSE Linux Enterprise Module for Public Cloud 12
-
SUSE Linux Enterprise Server for SAP Applications 12 SP5
@@ -764,12 +723,6 @@
kernel-source as a component of SUSE Linux Enterprise Module for Development Tools 15 SP6
-
- kernel-default as a component of SUSE Linux Enterprise Module for Public Cloud 12
-
-
- kernel-source as a component of SUSE Linux Enterprise Module for Public Cloud 12
-
kernel-devel-azure as a component of SUSE Linux Enterprise Module for Public Cloud 15 SP5
skipping CVE-2022-49001 as CVE page is older than CVRF-CVE file.
skipping CVE-2022-49000 as CVE page is older than CVRF-CVE file.
skipping CVE-2022-48999 as CVE page is older than CVRF-CVE file.
skipping CVE-2022-48998 as CVE page is older than CVRF-CVE file.
skipping CVE-2022-48994 as CVE page is older than CVRF-CVE file.
skipping CVE-2022-48991 as CVE page is older than CVRF-CVE file.
skipping CVE-2022-48988 as CVE page is older than CVRF-CVE file.
skipping CVE-2022-48987 as CVE page is older than CVRF-CVE file.
skipping CVE-2022-48986 as CVE page is older than CVRF-CVE file.
skipping CVE-2022-48985 as CVE page is older than CVRF-CVE file.
skipping CVE-2022-48949 as CVE page is older than CVRF-CVE file.
skipping CVE-2022-48948 as CVE page is older than CVRF-CVE file.
no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2022-48945
--- /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2022-48945.xml 2024-10-20 01:49:55.065627000 +0200
+++ /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2022-48945.xml.new 2024-10-29 01:37:48.214026000 +0100
@@ -14,13 +14,13 @@
1
- 12
- 2024-10-19T23:49:54Z
+ 13
+ 2024-10-29T00:37:47Z
current
2024-09-23T23:49:08Z
- 2024-10-19T23:49:54Z
+ 2024-10-29T00:37:47Z
cve-database/bin/generate-cvrf-cve.pl
2020-12-27T01:00:00Z
@@ -139,6 +139,21 @@
Container suse/sle-micro/rt-5.5:2.0.4-4.5.211
+
+
+ Image SLES12-SP5-GCE-BYOS
+
+
+
+
+ Image SLES12-SP5-GCE-SAP-BYOS
+
+
+
+
+ Image SLES12-SP5-GCE-SAP-On-Demand
+
+
Image SLES15-SP4-SAP-Azure-LI-BYOS
@@ -1499,6 +1514,39 @@
kernel-rt-5.14.21-150500.13.73.1 as a component of Container suse/sle-micro/rt-5.5:2.0.4-4.5.211
+
+ kernel-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-BYOS
+
+
+ cluster-md-kmp-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ dlm-kmp-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ gfs2-kmp-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ kernel-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ ocfs2-kmp-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ cluster-md-kmp-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
+
+ dlm-kmp-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
+
+ gfs2-kmp-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
+
+ kernel-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
+
+ ocfs2-kmp-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
cluster-md-kmp-default-5.14.21-150400.24.136.1 as a component of Image SLES15-SP4-SAP-Azure-LI-BYOS
@@ -3121,6 +3169,17 @@
Container suse/sle-micro-rancher/5.4:latest:kernel-default-5.14.21-150400.24.136.1
Container suse/sle-micro/kvm-5.5:2.0.4-3.5.197:kernel-default-base-5.14.21-150500.55.83.1.150500.6.37.1
Container suse/sle-micro/rt-5.5:2.0.4-4.5.211:kernel-rt-5.14.21-150500.13.73.1
+ Image SLES12-SP5-GCE-BYOS:kernel-default-4.12.14-122.231.1
+ Image SLES12-SP5-GCE-SAP-BYOS:cluster-md-kmp-default-4.12.14-122.231.1
+ Image SLES12-SP5-GCE-SAP-BYOS:dlm-kmp-default-4.12.14-122.231.1
+ Image SLES12-SP5-GCE-SAP-BYOS:gfs2-kmp-default-4.12.14-122.231.1
+ Image SLES12-SP5-GCE-SAP-BYOS:kernel-default-4.12.14-122.231.1
+ Image SLES12-SP5-GCE-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.231.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:cluster-md-kmp-default-4.12.14-122.231.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:dlm-kmp-default-4.12.14-122.231.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:gfs2-kmp-default-4.12.14-122.231.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:kernel-default-4.12.14-122.231.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:ocfs2-kmp-default-4.12.14-122.231.1
Image SLES15-SP4-SAP-Azure-LI-BYOS:cluster-md-kmp-default-5.14.21-150400.24.136.1
Image SLES15-SP4-SAP-Azure-LI-BYOS:dlm-kmp-default-5.14.21-150400.24.136.1
Image SLES15-SP4-SAP-Azure-LI-BYOS:gfs2-kmp-default-5.14.21-150400.24.136.1
no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2022-48943
skipping CVE-2022-48944 as CVE page is older than CVRF-CVE file.
--- /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2022-48943.xml 2024-10-20 01:49:56.594534000 +0200
+++ /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2022-48943.xml.new 2024-10-29 01:37:48.925989000 +0100
@@ -14,13 +14,13 @@
1
- 26
- 2024-10-19T23:49:56Z
+ 27
+ 2024-10-29T00:37:48Z
current
2024-08-22T23:38:31Z
- 2024-10-19T23:49:56Z
+ 2024-10-29T00:37:48Z
cve-database/bin/generate-cvrf-cve.pl
2020-12-27T01:00:00Z
@@ -131,6 +131,21 @@
Container suse/sle-micro/rt-5.5:2.0.4-4.5.160
+
+
+ Image SLES12-SP5-GCE-BYOS
+
+
+
+
+ Image SLES12-SP5-GCE-SAP-BYOS
+
+
+
+
+ Image SLES12-SP5-GCE-SAP-On-Demand
+
+
Image SLES15-SP4-SAP-Azure-LI-BYOS
@@ -1377,6 +1392,39 @@
kernel-rt-5.14.21-150500.13.67.3 as a component of Container suse/sle-micro/rt-5.5:2.0.4-4.5.160
+
+ kernel-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-BYOS
+
+
+ cluster-md-kmp-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ dlm-kmp-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ gfs2-kmp-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ kernel-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ ocfs2-kmp-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ cluster-md-kmp-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
+
+ dlm-kmp-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
+
+ gfs2-kmp-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
+
+ kernel-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
+
+ ocfs2-kmp-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
cluster-md-kmp-default-5.14.21-150400.24.133.2 as a component of Image SLES15-SP4-SAP-Azure-LI-BYOS
@@ -2830,6 +2878,17 @@
Container suse/sle-micro-rancher/5.4:latest:kernel-default-5.14.21-150400.24.133.2
Container suse/sle-micro/kvm-5.5:2.0.4-3.5.184:kernel-default-base-5.14.21-150500.55.80.2.150500.6.35.6
Container suse/sle-micro/rt-5.5:2.0.4-4.5.160:kernel-rt-5.14.21-150500.13.67.3
+ Image SLES12-SP5-GCE-BYOS:kernel-default-4.12.14-122.231.1
+ Image SLES12-SP5-GCE-SAP-BYOS:cluster-md-kmp-default-4.12.14-122.231.1
+ Image SLES12-SP5-GCE-SAP-BYOS:dlm-kmp-default-4.12.14-122.231.1
+ Image SLES12-SP5-GCE-SAP-BYOS:gfs2-kmp-default-4.12.14-122.231.1
+ Image SLES12-SP5-GCE-SAP-BYOS:kernel-default-4.12.14-122.231.1
+ Image SLES12-SP5-GCE-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.231.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:cluster-md-kmp-default-4.12.14-122.231.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:dlm-kmp-default-4.12.14-122.231.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:gfs2-kmp-default-4.12.14-122.231.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:kernel-default-4.12.14-122.231.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:ocfs2-kmp-default-4.12.14-122.231.1
Image SLES15-SP4-SAP-Azure-LI-BYOS:cluster-md-kmp-default-5.14.21-150400.24.133.2
Image SLES15-SP4-SAP-Azure-LI-BYOS:dlm-kmp-default-5.14.21-150400.24.133.2
Image SLES15-SP4-SAP-Azure-LI-BYOS:gfs2-kmp-default-5.14.21-150400.24.133.2
no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2022-48938
skipping CVE-2022-48942 as CVE page is older than CVRF-CVE file.
skipping CVE-2022-48941 as CVE page is older than CVRF-CVE file.
skipping CVE-2022-48940 as CVE page is older than CVRF-CVE file.
skipping CVE-2022-48939 as CVE page is older than CVRF-CVE file.
--- /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2022-48938.xml 2024-10-20 01:49:59.373888000 +0200
+++ /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2022-48938.xml.new 2024-10-29 01:37:49.786943000 +0100
@@ -14,13 +14,13 @@
1
- 22
- 2024-10-19T23:49:58Z
+ 23
+ 2024-10-29T00:37:49Z
current
2024-08-22T23:38:32Z
- 2024-10-19T23:49:58Z
+ 2024-10-29T00:37:49Z
cve-database/bin/generate-cvrf-cve.pl
2020-12-27T01:00:00Z
@@ -110,6 +110,21 @@
Image SLES12-SP5-Azure-SAP-BYOS
+
+
+ Image SLES12-SP5-GCE-BYOS
+
+
+
+
+ Image SLES12-SP5-GCE-SAP-BYOS
+
+
+
+
+ Image SLES12-SP5-GCE-SAP-On-Demand
+
+
Image SLES15-SP4-SAP-Azure-LI-BYOS
@@ -1373,6 +1388,39 @@
ocfs2-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-Azure-SAP-BYOS
+
+ kernel-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-BYOS
+
+
+ cluster-md-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ dlm-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ gfs2-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ kernel-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ ocfs2-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ cluster-md-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
+
+ dlm-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
+
+ gfs2-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
+
+ kernel-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
+
+ ocfs2-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
cluster-md-kmp-default-5.14.21-150400.24.133.2 as a component of Image SLES15-SP4-SAP-Azure-LI-BYOS
@@ -2663,18 +2711,6 @@
kernel-default as a component of SUSE Linux Enterprise Server for SAP Applications 12 SP5
-
- kernel-default-base as a component of SUSE Linux Enterprise Server for SAP Applications 12 SP5
-
-
- kernel-default-devel as a component of SUSE Linux Enterprise Server for SAP Applications 12 SP5
-
-
- kernel-devel as a component of SUSE Linux Enterprise Server for SAP Applications 12 SP5
-
-
- kernel-macros as a component of SUSE Linux Enterprise Server for SAP Applications 12 SP5
-
kernel-source as a component of SUSE Linux Enterprise Server for SAP Applications 12 SP5
@@ -2808,6 +2844,17 @@
Image SLES12-SP5-Azure-SAP-BYOS:gfs2-kmp-default-4.12.14-122.228.1
Image SLES12-SP5-Azure-SAP-BYOS:kernel-default-4.12.14-122.228.1
Image SLES12-SP5-Azure-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.228.1
+ Image SLES12-SP5-GCE-BYOS:kernel-default-4.12.14-122.228.1
+ Image SLES12-SP5-GCE-SAP-BYOS:cluster-md-kmp-default-4.12.14-122.228.1
+ Image SLES12-SP5-GCE-SAP-BYOS:dlm-kmp-default-4.12.14-122.228.1
+ Image SLES12-SP5-GCE-SAP-BYOS:gfs2-kmp-default-4.12.14-122.228.1
+ Image SLES12-SP5-GCE-SAP-BYOS:kernel-default-4.12.14-122.228.1
+ Image SLES12-SP5-GCE-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.228.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:cluster-md-kmp-default-4.12.14-122.228.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:dlm-kmp-default-4.12.14-122.228.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:gfs2-kmp-default-4.12.14-122.228.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:kernel-default-4.12.14-122.228.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:ocfs2-kmp-default-4.12.14-122.228.1
Image SLES15-SP4-SAP-Azure-LI-BYOS:cluster-md-kmp-default-5.14.21-150400.24.133.2
Image SLES15-SP4-SAP-Azure-LI-BYOS:dlm-kmp-default-5.14.21-150400.24.133.2
Image SLES15-SP4-SAP-Azure-LI-BYOS:gfs2-kmp-default-5.14.21-150400.24.133.2
@@ -3177,10 +3224,6 @@
SUSE Linux Enterprise Server 11 SP4 LTSS:kernel-source
SUSE Linux Enterprise Server Teradata 15 SP4:kernel-source-azure
SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default
- SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base
- SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel
- SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel
- SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros
SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source
openSUSE Leap 15.6:cluster-md-kmp-default
openSUSE Leap 15.6:dlm-kmp-default
no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2022-48931
skipping CVE-2022-48937 as CVE page is older than CVRF-CVE file.
skipping CVE-2022-48936 as CVE page is older than CVRF-CVE file.
skipping CVE-2022-48935 as CVE page is older than CVRF-CVE file.
skipping CVE-2022-48934 as CVE page is older than CVRF-CVE file.
skipping CVE-2022-48933 as CVE page is older than CVRF-CVE file.
skipping CVE-2022-48932 as CVE page is older than CVRF-CVE file.
--- /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2022-48931.xml 2024-10-20 01:50:03.479675000 +0200
+++ /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2022-48931.xml.new 2024-10-29 01:37:50.737909000 +0100
@@ -14,13 +14,13 @@
1
- 21
- 2024-10-19T23:50:03Z
+ 22
+ 2024-10-29T00:37:50Z
current
2024-08-22T23:38:34Z
- 2024-10-19T23:50:03Z
+ 2024-10-29T00:37:50Z
cve-database/bin/generate-cvrf-cve.pl
2020-12-27T01:00:00Z
@@ -130,6 +130,21 @@
Image SLES12-SP5-Azure-SAP-BYOS
+
+
+ Image SLES12-SP5-GCE-BYOS
+
+
+
+
+ Image SLES12-SP5-GCE-SAP-BYOS
+
+
+
+
+ Image SLES12-SP5-GCE-SAP-On-Demand
+
+
Image SLES15-SP4-SAP-Azure-LI-BYOS
@@ -1368,6 +1383,39 @@
ocfs2-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-Azure-SAP-BYOS
+
+ kernel-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-BYOS
+
+
+ cluster-md-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ dlm-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ gfs2-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ kernel-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ ocfs2-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ cluster-md-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
+
+ dlm-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
+
+ gfs2-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
+
+ kernel-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
+
+ ocfs2-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
cluster-md-kmp-default-5.14.21-150400.24.133.2 as a component of Image SLES15-SP4-SAP-Azure-LI-BYOS
@@ -2607,18 +2655,6 @@
kernel-default as a component of SUSE Linux Enterprise Server for SAP Applications 12 SP5
-
- kernel-default-base as a component of SUSE Linux Enterprise Server for SAP Applications 12 SP5
-
-
- kernel-default-devel as a component of SUSE Linux Enterprise Server for SAP Applications 12 SP5
-
-
- kernel-devel as a component of SUSE Linux Enterprise Server for SAP Applications 12 SP5
-
-
- kernel-macros as a component of SUSE Linux Enterprise Server for SAP Applications 12 SP5
-
kernel-source as a component of SUSE Linux Enterprise Server for SAP Applications 12 SP5
@@ -2772,6 +2808,17 @@
Image SLES12-SP5-Azure-SAP-BYOS:gfs2-kmp-default-4.12.14-122.228.1
Image SLES12-SP5-Azure-SAP-BYOS:kernel-default-4.12.14-122.228.1
Image SLES12-SP5-Azure-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.228.1
+ Image SLES12-SP5-GCE-BYOS:kernel-default-4.12.14-122.228.1
+ Image SLES12-SP5-GCE-SAP-BYOS:cluster-md-kmp-default-4.12.14-122.228.1
+ Image SLES12-SP5-GCE-SAP-BYOS:dlm-kmp-default-4.12.14-122.228.1
+ Image SLES12-SP5-GCE-SAP-BYOS:gfs2-kmp-default-4.12.14-122.228.1
+ Image SLES12-SP5-GCE-SAP-BYOS:kernel-default-4.12.14-122.228.1
+ Image SLES12-SP5-GCE-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.228.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:cluster-md-kmp-default-4.12.14-122.228.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:dlm-kmp-default-4.12.14-122.228.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:gfs2-kmp-default-4.12.14-122.228.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:kernel-default-4.12.14-122.228.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:ocfs2-kmp-default-4.12.14-122.228.1
Image SLES15-SP4-SAP-Azure-LI-BYOS:cluster-md-kmp-default-5.14.21-150400.24.133.2
Image SLES15-SP4-SAP-Azure-LI-BYOS:dlm-kmp-default-5.14.21-150400.24.133.2
Image SLES15-SP4-SAP-Azure-LI-BYOS:gfs2-kmp-default-5.14.21-150400.24.133.2
@@ -3130,10 +3177,6 @@
SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-devel-azure
SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-source-azure
SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default
- SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base
- SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel
- SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel
- SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros
SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source
openSUSE Leap 15.6:cluster-md-kmp-default
openSUSE Leap 15.6:dlm-kmp-default
no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2022-48930
--- /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2022-48930.xml 2024-10-20 01:50:04.080631000 +0200
+++ /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2022-48930.xml.new 2024-10-29 01:37:51.678882000 +0100
@@ -14,13 +14,13 @@
1
- 23
- 2024-10-19T23:50:03Z
+ 24
+ 2024-10-29T00:37:51Z
current
2024-08-22T23:38:35Z
- 2024-10-19T23:50:03Z
+ 2024-10-29T00:37:51Z
cve-database/bin/generate-cvrf-cve.pl
2020-12-27T01:00:00Z
@@ -119,6 +119,21 @@
Image SLES12-SP5-Azure-SAP-BYOS
+
+
+ Image SLES12-SP5-GCE-BYOS
+
+
+
+
+ Image SLES12-SP5-GCE-SAP-BYOS
+
+
+
+
+ Image SLES12-SP5-GCE-SAP-On-Demand
+
+
Image SLES15-SP4-SAP-Azure-LI-BYOS
@@ -1447,6 +1462,39 @@
ocfs2-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-Azure-SAP-BYOS
+
+ kernel-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-BYOS
+
+
+ cluster-md-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ dlm-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ gfs2-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ kernel-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ ocfs2-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ cluster-md-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
+
+ dlm-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
+
+ gfs2-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
+
+ kernel-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
+
+ ocfs2-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
cluster-md-kmp-default-5.14.21-150400.24.133.2 as a component of Image SLES15-SP4-SAP-Azure-LI-BYOS
@@ -2896,18 +2944,6 @@
kernel-default as a component of SUSE Linux Enterprise Server for SAP Applications 12 SP5
-
- kernel-default-base as a component of SUSE Linux Enterprise Server for SAP Applications 12 SP5
-
-
- kernel-default-devel as a component of SUSE Linux Enterprise Server for SAP Applications 12 SP5
-
-
- kernel-devel as a component of SUSE Linux Enterprise Server for SAP Applications 12 SP5
-
-
- kernel-macros as a component of SUSE Linux Enterprise Server for SAP Applications 12 SP5
-
kernel-source as a component of SUSE Linux Enterprise Server for SAP Applications 12 SP5
@@ -3038,6 +3074,17 @@
Image SLES12-SP5-Azure-SAP-BYOS:gfs2-kmp-default-4.12.14-122.228.1
Image SLES12-SP5-Azure-SAP-BYOS:kernel-default-4.12.14-122.228.1
Image SLES12-SP5-Azure-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.228.1
+ Image SLES12-SP5-GCE-BYOS:kernel-default-4.12.14-122.228.1
+ Image SLES12-SP5-GCE-SAP-BYOS:cluster-md-kmp-default-4.12.14-122.228.1
+ Image SLES12-SP5-GCE-SAP-BYOS:dlm-kmp-default-4.12.14-122.228.1
+ Image SLES12-SP5-GCE-SAP-BYOS:gfs2-kmp-default-4.12.14-122.228.1
+ Image SLES12-SP5-GCE-SAP-BYOS:kernel-default-4.12.14-122.228.1
+ Image SLES12-SP5-GCE-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.228.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:cluster-md-kmp-default-4.12.14-122.228.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:dlm-kmp-default-4.12.14-122.228.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:gfs2-kmp-default-4.12.14-122.228.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:kernel-default-4.12.14-122.228.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:ocfs2-kmp-default-4.12.14-122.228.1
Image SLES15-SP4-SAP-Azure-LI-BYOS:cluster-md-kmp-default-5.14.21-150400.24.133.2
Image SLES15-SP4-SAP-Azure-LI-BYOS:dlm-kmp-default-5.14.21-150400.24.133.2
Image SLES15-SP4-SAP-Azure-LI-BYOS:gfs2-kmp-default-5.14.21-150400.24.133.2
@@ -3486,10 +3533,6 @@
SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-source
SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default
SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default
- SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base
- SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel
- SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel
- SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros
SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source
SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default
SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel
no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2022-48925
skipping CVE-2022-48929 as CVE page is older than CVRF-CVE file.
skipping CVE-2022-48928 as CVE page is older than CVRF-CVE file.
skipping CVE-2022-48927 as CVE page is older than CVRF-CVE file.
skipping CVE-2022-48926 as CVE page is older than CVRF-CVE file.
--- /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2022-48925.xml 2024-10-20 01:50:07.225489000 +0200
+++ /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2022-48925.xml.new 2024-10-29 01:37:52.533813000 +0100
@@ -14,13 +14,13 @@
1
- 22
- 2024-10-19T23:50:06Z
+ 23
+ 2024-10-29T00:37:51Z
current
2024-08-22T23:38:36Z
- 2024-10-19T23:50:06Z
+ 2024-10-29T00:37:51Z
cve-database/bin/generate-cvrf-cve.pl
2020-12-27T01:00:00Z
@@ -165,6 +165,21 @@
Image SLES12-SP5-Azure-SAP-BYOS
+
+
+ Image SLES12-SP5-GCE-BYOS
+
+
+
+
+ Image SLES12-SP5-GCE-SAP-BYOS
+
+
+
+
+ Image SLES12-SP5-GCE-SAP-On-Demand
+
+
Image SLES15-SP4-SAP-Azure-LI-BYOS
@@ -1565,6 +1580,39 @@
ocfs2-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-Azure-SAP-BYOS
+
+ kernel-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-BYOS
+
+
+ cluster-md-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ dlm-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ gfs2-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ kernel-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ ocfs2-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ cluster-md-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
+
+ dlm-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
+
+ gfs2-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
+
+ kernel-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
+
+ ocfs2-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
cluster-md-kmp-default-5.14.21-150400.24.133.2 as a component of Image SLES15-SP4-SAP-Azure-LI-BYOS
@@ -3113,18 +3161,6 @@
kernel-default as a component of SUSE Linux Enterprise Server for SAP Applications 12 SP5
-
- kernel-default-base as a component of SUSE Linux Enterprise Server for SAP Applications 12 SP5
-
-
- kernel-default-devel as a component of SUSE Linux Enterprise Server for SAP Applications 12 SP5
-
-
- kernel-devel as a component of SUSE Linux Enterprise Server for SAP Applications 12 SP5
-
-
- kernel-macros as a component of SUSE Linux Enterprise Server for SAP Applications 12 SP5
-
kernel-source as a component of SUSE Linux Enterprise Server for SAP Applications 12 SP5
@@ -3279,6 +3315,17 @@
Image SLES12-SP5-Azure-SAP-BYOS:gfs2-kmp-default-4.12.14-122.228.1
Image SLES12-SP5-Azure-SAP-BYOS:kernel-default-4.12.14-122.228.1
Image SLES12-SP5-Azure-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.228.1
+ Image SLES12-SP5-GCE-BYOS:kernel-default-4.12.14-122.228.1
+ Image SLES12-SP5-GCE-SAP-BYOS:cluster-md-kmp-default-4.12.14-122.228.1
+ Image SLES12-SP5-GCE-SAP-BYOS:dlm-kmp-default-4.12.14-122.228.1
+ Image SLES12-SP5-GCE-SAP-BYOS:gfs2-kmp-default-4.12.14-122.228.1
+ Image SLES12-SP5-GCE-SAP-BYOS:kernel-default-4.12.14-122.228.1
+ Image SLES12-SP5-GCE-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.228.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:cluster-md-kmp-default-4.12.14-122.228.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:dlm-kmp-default-4.12.14-122.228.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:gfs2-kmp-default-4.12.14-122.228.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:kernel-default-4.12.14-122.228.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:ocfs2-kmp-default-4.12.14-122.228.1
Image SLES15-SP4-SAP-Azure-LI-BYOS:cluster-md-kmp-default-5.14.21-150400.24.133.2
Image SLES15-SP4-SAP-Azure-LI-BYOS:dlm-kmp-default-5.14.21-150400.24.133.2
Image SLES15-SP4-SAP-Azure-LI-BYOS:gfs2-kmp-default-5.14.21-150400.24.133.2
skipping CVE-2022-48924 as CVE page is older than CVRF-CVE file.
skipping CVE-2022-48923 as CVE page is older than CVRF-CVE file.
skipping CVE-2022-48922 as CVE page is older than CVRF-CVE file.
skipping CVE-2022-48921 as CVE page is older than CVRF-CVE file.
--- /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2022-48920.xml 2024-10-16 01:54:31.824542000 +0200
+++ /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2022-48920.xml.new 2024-10-29 01:37:53.545762000 +0100
@@ -14,13 +14,13 @@
1
- 20
- 2024-10-15T23:54:31Z
+ 21
+ 2024-10-29T00:37:52Z
current
2024-08-22T23:38:37Z
- 2024-10-15T23:54:31Z
+ 2024-10-29T00:37:52Z
cve-database/bin/generate-cvrf-cve.pl
2020-12-27T01:00:00Z
@@ -158,6 +158,21 @@
Image SLES12-SP5-Azure-SAP-BYOS
+
+
+ Image SLES12-SP5-GCE-BYOS
+
+
+
+
+ Image SLES12-SP5-GCE-SAP-BYOS
+
+
+
+
+ Image SLES12-SP5-GCE-SAP-On-Demand
+
+
Image SLES15-SP5-Azure-Basic
@@ -1322,6 +1337,39 @@
ocfs2-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-Azure-SAP-BYOS
+
+ kernel-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-BYOS
+
+
+ cluster-md-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ dlm-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ gfs2-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ kernel-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ ocfs2-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ cluster-md-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
+
+ dlm-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
+
+ gfs2-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
+
+ kernel-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
+
+ ocfs2-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
kernel-azure-5.14.21-150500.33.66.1 as a component of Image SLES15-SP5-Azure-Basic
@@ -2635,6 +2683,17 @@
Image SLES12-SP5-Azure-SAP-BYOS:gfs2-kmp-default-4.12.14-122.228.1
Image SLES12-SP5-Azure-SAP-BYOS:kernel-default-4.12.14-122.228.1
Image SLES12-SP5-Azure-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.228.1
+ Image SLES12-SP5-GCE-BYOS:kernel-default-4.12.14-122.228.1
+ Image SLES12-SP5-GCE-SAP-BYOS:cluster-md-kmp-default-4.12.14-122.228.1
+ Image SLES12-SP5-GCE-SAP-BYOS:dlm-kmp-default-4.12.14-122.228.1
+ Image SLES12-SP5-GCE-SAP-BYOS:gfs2-kmp-default-4.12.14-122.228.1
+ Image SLES12-SP5-GCE-SAP-BYOS:kernel-default-4.12.14-122.228.1
+ Image SLES12-SP5-GCE-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.228.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:cluster-md-kmp-default-4.12.14-122.228.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:dlm-kmp-default-4.12.14-122.228.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:gfs2-kmp-default-4.12.14-122.228.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:kernel-default-4.12.14-122.228.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:ocfs2-kmp-default-4.12.14-122.228.1
Image SLES15-SP5-Azure-Basic:kernel-azure-5.14.21-150500.33.66.1
Image SLES15-SP5-Azure-Standard:kernel-azure-5.14.21-150500.33.66.1
Image SLES15-SP5-CHOST-BYOS-Aliyun:kernel-default-5.14.21-150500.55.80.2
no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2022-48919
--- /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2022-48919.xml 2024-10-20 01:50:10.678786000 +0200
+++ /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2022-48919.xml.new 2024-10-29 01:37:54.384711000 +0100
@@ -14,13 +14,13 @@
1
- 27
- 2024-10-19T23:50:10Z
+ 28
+ 2024-10-29T00:37:53Z
current
2024-08-22T23:38:37Z
- 2024-10-19T23:50:10Z
+ 2024-10-29T00:37:53Z
cve-database/bin/generate-cvrf-cve.pl
2020-12-27T01:00:00Z
@@ -185,6 +185,21 @@
Image SLES12-SP5-Azure-SAP-BYOS
+
+
+ Image SLES12-SP5-GCE-BYOS
+
+
+
+
+ Image SLES12-SP5-GCE-SAP-BYOS
+
+
+
+
+ Image SLES12-SP5-GCE-SAP-On-Demand
+
+
Image SLES15-SP4-SAP-Azure-LI-BYOS
@@ -1637,6 +1652,39 @@
ocfs2-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-Azure-SAP-BYOS
+
+ kernel-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-BYOS
+
+
+ cluster-md-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ dlm-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ gfs2-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ kernel-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ ocfs2-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ cluster-md-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
+
+ dlm-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
+
+ gfs2-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
+
+ kernel-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
+
+ ocfs2-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
cluster-md-kmp-default-5.14.21-150400.24.133.2 as a component of Image SLES15-SP4-SAP-Azure-LI-BYOS
@@ -3248,18 +3296,6 @@
kernel-default as a component of SUSE Linux Enterprise Server for SAP Applications 12 SP5
-
- kernel-default-base as a component of SUSE Linux Enterprise Server for SAP Applications 12 SP5
-
-
- kernel-default-devel as a component of SUSE Linux Enterprise Server for SAP Applications 12 SP5
-
-
- kernel-devel as a component of SUSE Linux Enterprise Server for SAP Applications 12 SP5
-
-
- kernel-macros as a component of SUSE Linux Enterprise Server for SAP Applications 12 SP5
-
kernel-source as a component of SUSE Linux Enterprise Server for SAP Applications 12 SP5
@@ -3430,6 +3466,17 @@
Image SLES12-SP5-Azure-SAP-BYOS:gfs2-kmp-default-4.12.14-122.228.1
Image SLES12-SP5-Azure-SAP-BYOS:kernel-default-4.12.14-122.228.1
Image SLES12-SP5-Azure-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.228.1
+ Image SLES12-SP5-GCE-BYOS:kernel-default-4.12.14-122.228.1
+ Image SLES12-SP5-GCE-SAP-BYOS:cluster-md-kmp-default-4.12.14-122.228.1
+ Image SLES12-SP5-GCE-SAP-BYOS:dlm-kmp-default-4.12.14-122.228.1
+ Image SLES12-SP5-GCE-SAP-BYOS:gfs2-kmp-default-4.12.14-122.228.1
+ Image SLES12-SP5-GCE-SAP-BYOS:kernel-default-4.12.14-122.228.1
+ Image SLES12-SP5-GCE-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.228.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:cluster-md-kmp-default-4.12.14-122.228.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:dlm-kmp-default-4.12.14-122.228.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:gfs2-kmp-default-4.12.14-122.228.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:kernel-default-4.12.14-122.228.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:ocfs2-kmp-default-4.12.14-122.228.1
Image SLES15-SP4-SAP-Azure-LI-BYOS:cluster-md-kmp-default-5.14.21-150400.24.133.2
Image SLES15-SP4-SAP-Azure-LI-BYOS:dlm-kmp-default-5.14.21-150400.24.133.2
Image SLES15-SP4-SAP-Azure-LI-BYOS:gfs2-kmp-default-5.14.21-150400.24.133.2
@@ -3939,10 +3986,6 @@
SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default
SUSE Linux Enterprise Server Teradata 15 SP4:kernel-source-azure
SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default
- SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base
- SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel
- SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel
- SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros
SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source
SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default
SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel
no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2022-48911
skipping CVE-2022-48918 as CVE page is older than CVRF-CVE file.
skipping CVE-2022-48917 as CVE page is older than CVRF-CVE file.
skipping CVE-2022-48916 as CVE page is older than CVRF-CVE file.
skipping CVE-2022-48915 as CVE page is older than CVRF-CVE file.
skipping CVE-2022-48914 as CVE page is older than CVRF-CVE file.
skipping CVE-2022-48913 as CVE page is older than CVRF-CVE file.
skipping CVE-2022-48912 as CVE page is older than CVRF-CVE file.
--- /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2022-48911.xml 2024-10-20 01:50:15.847547000 +0200
+++ /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2022-48911.xml.new 2024-10-29 01:37:55.486119000 +0100
@@ -14,13 +14,13 @@
1
- 13
- 2024-10-19T23:50:15Z
+ 14
+ 2024-10-29T00:37:54Z
current
2024-08-22T23:38:40Z
- 2024-10-19T23:50:15Z
+ 2024-10-29T00:37:54Z
cve-database/bin/generate-cvrf-cve.pl
2020-12-27T01:00:00Z
@@ -123,6 +123,21 @@
Container suse/sle-micro/rt-5.5:2.0.4-4.5.211
+
+
+ Image SLES12-SP5-GCE-BYOS
+
+
+
+
+ Image SLES12-SP5-GCE-SAP-BYOS
+
+
+
+
+ Image SLES12-SP5-GCE-SAP-On-Demand
+
+
Image SLES15-SP4-SAP-Azure-LI-BYOS
@@ -1478,6 +1493,39 @@
kernel-rt-5.14.21-150500.13.73.1 as a component of Container suse/sle-micro/rt-5.5:2.0.4-4.5.211
+
+ kernel-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-BYOS
+
+
+ cluster-md-kmp-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ dlm-kmp-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ gfs2-kmp-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ kernel-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ ocfs2-kmp-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ cluster-md-kmp-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
+
+ dlm-kmp-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
+
+ gfs2-kmp-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
+
+ kernel-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
+
+ ocfs2-kmp-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
cluster-md-kmp-default-5.14.21-150400.24.136.1 as a component of Image SLES15-SP4-SAP-Azure-LI-BYOS
@@ -3033,6 +3081,17 @@
Container suse/sle-micro-rancher/5.4:latest:kernel-default-5.14.21-150400.24.136.1
Container suse/sle-micro/kvm-5.5:2.0.4-3.5.197:kernel-default-base-5.14.21-150500.55.83.1.150500.6.37.1
Container suse/sle-micro/rt-5.5:2.0.4-4.5.211:kernel-rt-5.14.21-150500.13.73.1
+ Image SLES12-SP5-GCE-BYOS:kernel-default-4.12.14-122.231.1
+ Image SLES12-SP5-GCE-SAP-BYOS:cluster-md-kmp-default-4.12.14-122.231.1
+ Image SLES12-SP5-GCE-SAP-BYOS:dlm-kmp-default-4.12.14-122.231.1
+ Image SLES12-SP5-GCE-SAP-BYOS:gfs2-kmp-default-4.12.14-122.231.1
+ Image SLES12-SP5-GCE-SAP-BYOS:kernel-default-4.12.14-122.231.1
+ Image SLES12-SP5-GCE-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.231.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:cluster-md-kmp-default-4.12.14-122.231.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:dlm-kmp-default-4.12.14-122.231.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:gfs2-kmp-default-4.12.14-122.231.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:kernel-default-4.12.14-122.231.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:ocfs2-kmp-default-4.12.14-122.231.1
Image SLES15-SP4-SAP-Azure-LI-BYOS:cluster-md-kmp-default-5.14.21-150400.24.136.1
Image SLES15-SP4-SAP-Azure-LI-BYOS:dlm-kmp-default-5.14.21-150400.24.136.1
Image SLES15-SP4-SAP-Azure-LI-BYOS:gfs2-kmp-default-5.14.21-150400.24.136.1
--- /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2022-48910.xml 2024-10-16 01:54:33.790472000 +0200
+++ /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2022-48910.xml.new 2024-10-29 01:37:56.333084000 +0100
@@ -14,13 +14,13 @@
1
- 20
- 2024-10-15T23:54:33Z
+ 21
+ 2024-10-29T00:37:55Z
current
2024-08-22T23:38:40Z
- 2024-10-15T23:54:33Z
+ 2024-10-29T00:37:55Z
cve-database/bin/generate-cvrf-cve.pl
2020-12-27T01:00:00Z
@@ -129,6 +129,21 @@
Image SLES12-SP5-Azure-SAP-BYOS
+
+
+ Image SLES12-SP5-GCE-BYOS
+
+
+
+
+ Image SLES12-SP5-GCE-SAP-BYOS
+
+
+
+
+ Image SLES12-SP5-GCE-SAP-On-Demand
+
+
Image SLES15-SP5-Azure-Basic
@@ -1293,6 +1308,39 @@
ocfs2-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-Azure-SAP-BYOS
+
+ kernel-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-BYOS
+
+
+ cluster-md-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ dlm-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ gfs2-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ kernel-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ ocfs2-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ cluster-md-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
+
+ dlm-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
+
+ gfs2-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
+
+ kernel-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
+
+ ocfs2-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
kernel-azure-5.14.21-150500.33.66.1 as a component of Image SLES15-SP5-Azure-Basic
@@ -2577,6 +2625,17 @@
Image SLES12-SP5-Azure-SAP-BYOS:gfs2-kmp-default-4.12.14-122.228.1
Image SLES12-SP5-Azure-SAP-BYOS:kernel-default-4.12.14-122.228.1
Image SLES12-SP5-Azure-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.228.1
+ Image SLES12-SP5-GCE-BYOS:kernel-default-4.12.14-122.228.1
+ Image SLES12-SP5-GCE-SAP-BYOS:cluster-md-kmp-default-4.12.14-122.228.1
+ Image SLES12-SP5-GCE-SAP-BYOS:dlm-kmp-default-4.12.14-122.228.1
+ Image SLES12-SP5-GCE-SAP-BYOS:gfs2-kmp-default-4.12.14-122.228.1
+ Image SLES12-SP5-GCE-SAP-BYOS:kernel-default-4.12.14-122.228.1
+ Image SLES12-SP5-GCE-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.228.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:cluster-md-kmp-default-4.12.14-122.228.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:dlm-kmp-default-4.12.14-122.228.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:gfs2-kmp-default-4.12.14-122.228.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:kernel-default-4.12.14-122.228.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:ocfs2-kmp-default-4.12.14-122.228.1
Image SLES15-SP5-Azure-Basic:kernel-azure-5.14.21-150500.33.66.1
Image SLES15-SP5-Azure-Standard:kernel-azure-5.14.21-150500.33.66.1
Image SLES15-SP5-CHOST-BYOS-Aliyun:kernel-default-5.14.21-150500.55.80.2
no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2022-48905
skipping CVE-2022-48909 as CVE page is older than CVRF-CVE file.
skipping CVE-2022-48908 as CVE page is older than CVRF-CVE file.
skipping CVE-2022-48907 as CVE page is older than CVRF-CVE file.
skipping CVE-2022-48906 as CVE page is older than CVRF-CVE file.
--- /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2022-48905.xml 2024-10-20 01:50:19.051901000 +0200
+++ /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2022-48905.xml.new 2024-10-29 01:37:57.045062000 +0100
@@ -14,13 +14,13 @@
1
- 21
- 2024-10-19T23:50:18Z
+ 22
+ 2024-10-29T00:37:56Z
current
2024-08-22T23:38:41Z
- 2024-10-19T23:50:18Z
+ 2024-10-29T00:37:56Z
cve-database/bin/generate-cvrf-cve.pl
2020-12-27T01:00:00Z
@@ -117,6 +117,21 @@
Image SLES12-SP5-Azure-SAP-BYOS
+
+
+ Image SLES12-SP5-GCE-BYOS
+
+
+
+
+ Image SLES12-SP5-GCE-SAP-BYOS
+
+
+
+
+ Image SLES12-SP5-GCE-SAP-On-Demand
+
+
Image SLES15-SP4-SAP-Azure-LI-BYOS
@@ -1450,6 +1465,39 @@
ocfs2-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-Azure-SAP-BYOS
+
+ kernel-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-BYOS
+
+
+ cluster-md-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ dlm-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ gfs2-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ kernel-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ ocfs2-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ cluster-md-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
+
+ dlm-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
+
+ gfs2-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
+
+ kernel-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
+
+ ocfs2-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
cluster-md-kmp-default-5.14.21-150400.24.133.2 as a component of Image SLES15-SP4-SAP-Azure-LI-BYOS
@@ -2905,18 +2953,6 @@
kernel-default as a component of SUSE Linux Enterprise Server for SAP Applications 12 SP5
-
- kernel-default-base as a component of SUSE Linux Enterprise Server for SAP Applications 12 SP5
-
-
- kernel-default-devel as a component of SUSE Linux Enterprise Server for SAP Applications 12 SP5
-
-
- kernel-devel as a component of SUSE Linux Enterprise Server for SAP Applications 12 SP5
-
-
- kernel-macros as a component of SUSE Linux Enterprise Server for SAP Applications 12 SP5
-
kernel-source as a component of SUSE Linux Enterprise Server for SAP Applications 12 SP5
@@ -3045,6 +3081,17 @@
Image SLES12-SP5-Azure-SAP-BYOS:gfs2-kmp-default-4.12.14-122.228.1
Image SLES12-SP5-Azure-SAP-BYOS:kernel-default-4.12.14-122.228.1
Image SLES12-SP5-Azure-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.228.1
+ Image SLES12-SP5-GCE-BYOS:kernel-default-4.12.14-122.228.1
+ Image SLES12-SP5-GCE-SAP-BYOS:cluster-md-kmp-default-4.12.14-122.228.1
+ Image SLES12-SP5-GCE-SAP-BYOS:dlm-kmp-default-4.12.14-122.228.1
+ Image SLES12-SP5-GCE-SAP-BYOS:gfs2-kmp-default-4.12.14-122.228.1
+ Image SLES12-SP5-GCE-SAP-BYOS:kernel-default-4.12.14-122.228.1
+ Image SLES12-SP5-GCE-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.228.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:cluster-md-kmp-default-4.12.14-122.228.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:dlm-kmp-default-4.12.14-122.228.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:gfs2-kmp-default-4.12.14-122.228.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:kernel-default-4.12.14-122.228.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:ocfs2-kmp-default-4.12.14-122.228.1
Image SLES15-SP4-SAP-Azure-LI-BYOS:cluster-md-kmp-default-5.14.21-150400.24.133.2
Image SLES15-SP4-SAP-Azure-LI-BYOS:dlm-kmp-default-5.14.21-150400.24.133.2
Image SLES15-SP4-SAP-Azure-LI-BYOS:gfs2-kmp-default-5.14.21-150400.24.133.2
@@ -3495,10 +3542,6 @@
SUSE Linux Enterprise Server Teradata 12 SP3:kernel-default
SUSE Linux Enterprise Server Teradata 12 SP3:kernel-source
SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default
- SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base
- SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel
- SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel
- SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros
SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source
SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default
SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel
no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2022-48899
skipping CVE-2022-48904 as CVE page is older than CVRF-CVE file.
skipping CVE-2022-48903 as CVE page is older than CVRF-CVE file.
skipping CVE-2022-48902 as CVE page is older than CVRF-CVE file.
skipping CVE-2022-48901 as CVE page is older than CVRF-CVE file.
skipping CVE-2022-48900 as CVE page is older than CVRF-CVE file.
--- /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2022-48899.xml 2024-10-20 01:50:22.254686000 +0200
+++ /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2022-48899.xml.new 2024-10-29 01:37:57.966994000 +0100
@@ -14,13 +14,13 @@
1
- 22
- 2024-10-19T23:50:21Z
+ 23
+ 2024-10-29T00:37:57Z
current
2024-08-21T23:44:09Z
- 2024-10-19T23:50:21Z
+ 2024-10-29T00:37:57Z
cve-database/bin/generate-cvrf-cve.pl
2020-12-27T01:00:00Z
@@ -100,6 +100,21 @@
Image SLES12-SP5-Azure-SAP-BYOS
+
+
+ Image SLES12-SP5-GCE-BYOS
+
+
+
+
+ Image SLES12-SP5-GCE-SAP-BYOS
+
+
+
+
+ Image SLES12-SP5-GCE-SAP-On-Demand
+
+
Image SLES15-SP4-SAP-Azure-LI-BYOS
@@ -1361,6 +1376,39 @@
ocfs2-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-Azure-SAP-BYOS
+
+ kernel-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-BYOS
+
+
+ cluster-md-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ dlm-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ gfs2-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ kernel-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ ocfs2-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ cluster-md-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
+
+ dlm-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
+
+ gfs2-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
+
+ kernel-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
+
+ ocfs2-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
cluster-md-kmp-default-5.14.21-150400.24.133.2 as a component of Image SLES15-SP4-SAP-Azure-LI-BYOS
@@ -2660,18 +2708,6 @@
kernel-default as a component of SUSE Linux Enterprise Server for SAP Applications 12 SP5
-
- kernel-default-base as a component of SUSE Linux Enterprise Server for SAP Applications 12 SP5
-
-
- kernel-default-devel as a component of SUSE Linux Enterprise Server for SAP Applications 12 SP5
-
-
- kernel-devel as a component of SUSE Linux Enterprise Server for SAP Applications 12 SP5
-
-
- kernel-macros as a component of SUSE Linux Enterprise Server for SAP Applications 12 SP5
-
kernel-source as a component of SUSE Linux Enterprise Server for SAP Applications 12 SP5
@@ -2795,6 +2831,17 @@
Image SLES12-SP5-Azure-SAP-BYOS:gfs2-kmp-default-4.12.14-122.228.1
Image SLES12-SP5-Azure-SAP-BYOS:kernel-default-4.12.14-122.228.1
Image SLES12-SP5-Azure-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.228.1
+ Image SLES12-SP5-GCE-BYOS:kernel-default-4.12.14-122.228.1
+ Image SLES12-SP5-GCE-SAP-BYOS:cluster-md-kmp-default-4.12.14-122.228.1
+ Image SLES12-SP5-GCE-SAP-BYOS:dlm-kmp-default-4.12.14-122.228.1
+ Image SLES12-SP5-GCE-SAP-BYOS:gfs2-kmp-default-4.12.14-122.228.1
+ Image SLES12-SP5-GCE-SAP-BYOS:kernel-default-4.12.14-122.228.1
+ Image SLES12-SP5-GCE-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.228.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:cluster-md-kmp-default-4.12.14-122.228.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:dlm-kmp-default-4.12.14-122.228.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:gfs2-kmp-default-4.12.14-122.228.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:kernel-default-4.12.14-122.228.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:ocfs2-kmp-default-4.12.14-122.228.1
Image SLES15-SP4-SAP-Azure-LI-BYOS:cluster-md-kmp-default-5.14.21-150400.24.133.2
Image SLES15-SP4-SAP-Azure-LI-BYOS:dlm-kmp-default-5.14.21-150400.24.133.2
Image SLES15-SP4-SAP-Azure-LI-BYOS:gfs2-kmp-default-5.14.21-150400.24.133.2
@@ -3163,10 +3210,6 @@
SUSE Linux Enterprise Server 11 SP4 LTSS:kernel-default
SUSE Linux Enterprise Server 11 SP4 LTSS:kernel-source
SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default
- SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base
- SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel
- SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel
- SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros
SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source
openSUSE Leap 15.6:cluster-md-kmp-default
openSUSE Leap 15.6:dlm-kmp-default
no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2022-48896
skipping CVE-2022-48898 as CVE page is older than CVRF-CVE file.
skipping CVE-2022-48897 as CVE page is older than CVRF-CVE file.
--- /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2022-48896.xml 2024-10-20 01:50:24.027599000 +0200
+++ /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2022-48896.xml.new 2024-10-29 01:37:58.960948000 +0100
@@ -14,13 +14,13 @@
1
- 19
- 2024-10-19T23:50:23Z
+ 20
+ 2024-10-29T00:37:58Z
current
2024-08-21T23:44:11Z
- 2024-10-19T23:50:23Z
+ 2024-10-29T00:37:58Z
cve-database/bin/generate-cvrf-cve.pl
2020-12-27T01:00:00Z
@@ -100,6 +100,21 @@
Image SLES12-SP5-Azure-SAP-BYOS
+
+
+ Image SLES12-SP5-GCE-BYOS
+
+
+
+
+ Image SLES12-SP5-GCE-SAP-BYOS
+
+
+
+
+ Image SLES12-SP5-GCE-SAP-On-Demand
+
+
Image SLES15-SP4-SAP-Azure-LI-BYOS
@@ -1343,6 +1358,39 @@
ocfs2-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-Azure-SAP-BYOS
+
+ kernel-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-BYOS
+
+
+ cluster-md-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ dlm-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ gfs2-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ kernel-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ ocfs2-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ cluster-md-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
+
+ dlm-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
+
+ gfs2-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
+
+ kernel-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
+
+ ocfs2-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
cluster-md-kmp-default-5.14.21-150400.24.133.2 as a component of Image SLES15-SP4-SAP-Azure-LI-BYOS
@@ -2588,18 +2636,6 @@
kernel-default as a component of SUSE Linux Enterprise Server for SAP Applications 12 SP5
-
- kernel-default-base as a component of SUSE Linux Enterprise Server for SAP Applications 12 SP5
-
-
- kernel-default-devel as a component of SUSE Linux Enterprise Server for SAP Applications 12 SP5
-
-
- kernel-devel as a component of SUSE Linux Enterprise Server for SAP Applications 12 SP5
-
-
- kernel-macros as a component of SUSE Linux Enterprise Server for SAP Applications 12 SP5
-
kernel-source as a component of SUSE Linux Enterprise Server for SAP Applications 12 SP5
@@ -2723,6 +2759,17 @@
Image SLES12-SP5-Azure-SAP-BYOS:gfs2-kmp-default-4.12.14-122.228.1
Image SLES12-SP5-Azure-SAP-BYOS:kernel-default-4.12.14-122.228.1
Image SLES12-SP5-Azure-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.228.1
+ Image SLES12-SP5-GCE-BYOS:kernel-default-4.12.14-122.228.1
+ Image SLES12-SP5-GCE-SAP-BYOS:cluster-md-kmp-default-4.12.14-122.228.1
+ Image SLES12-SP5-GCE-SAP-BYOS:dlm-kmp-default-4.12.14-122.228.1
+ Image SLES12-SP5-GCE-SAP-BYOS:gfs2-kmp-default-4.12.14-122.228.1
+ Image SLES12-SP5-GCE-SAP-BYOS:kernel-default-4.12.14-122.228.1
+ Image SLES12-SP5-GCE-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.228.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:cluster-md-kmp-default-4.12.14-122.228.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:dlm-kmp-default-4.12.14-122.228.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:gfs2-kmp-default-4.12.14-122.228.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:kernel-default-4.12.14-122.228.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:ocfs2-kmp-default-4.12.14-122.228.1
Image SLES15-SP4-SAP-Azure-LI-BYOS:cluster-md-kmp-default-5.14.21-150400.24.133.2
Image SLES15-SP4-SAP-Azure-LI-BYOS:dlm-kmp-default-5.14.21-150400.24.133.2
Image SLES15-SP4-SAP-Azure-LI-BYOS:gfs2-kmp-default-5.14.21-150400.24.133.2
@@ -3106,10 +3153,6 @@
SUSE Linux Enterprise Server Teradata 12 SP3:kernel-default
SUSE Linux Enterprise Server Teradata 12 SP3:kernel-source
SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default
- SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base
- SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel
- SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel
- SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros
SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source
openSUSE Leap 15.6:cluster-md-kmp-default
openSUSE Leap 15.6:dlm-kmp-default
no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2022-48875
skipping CVE-2022-48895 as CVE page is older than CVRF-CVE file.
skipping CVE-2022-48894 as CVE page is older than CVRF-CVE file.
skipping CVE-2022-48893 as CVE page is older than CVRF-CVE file.
skipping CVE-2022-48892 as CVE page is older than CVRF-CVE file.
skipping CVE-2022-48891 as CVE page is older than CVRF-CVE file.
skipping CVE-2022-48890 as CVE page is older than CVRF-CVE file.
skipping CVE-2022-48889 as CVE page is older than CVRF-CVE file.
skipping CVE-2022-48888 as CVE page is older than CVRF-CVE file.
skipping CVE-2022-48887 as CVE page is older than CVRF-CVE file.
skipping CVE-2022-48886 as CVE page is older than CVRF-CVE file.
skipping CVE-2022-48885 as CVE page is older than CVRF-CVE file.
skipping CVE-2022-48884 as CVE page is older than CVRF-CVE file.
skipping CVE-2022-48883 as CVE page is older than CVRF-CVE file.
skipping CVE-2022-48882 as CVE page is older than CVRF-CVE file.
skipping CVE-2022-48881 as CVE page is older than CVRF-CVE file.
skipping CVE-2022-48880 as CVE page is older than CVRF-CVE file.
skipping CVE-2022-48879 as CVE page is older than CVRF-CVE file.
skipping CVE-2022-48878 as CVE page is older than CVRF-CVE file.
skipping CVE-2022-48877 as CVE page is older than CVRF-CVE file.
skipping CVE-2022-48876 as CVE page is older than CVRF-CVE file.
--- /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2022-48875.xml 2024-10-20 01:50:33.786609000 +0200
+++ /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2022-48875.xml.new 2024-10-29 01:37:59.714992000 +0100
@@ -14,13 +14,13 @@
1
- 23
- 2024-10-19T23:50:33Z
+ 24
+ 2024-10-29T00:37:59Z
current
2024-08-21T23:44:18Z
- 2024-10-19T23:50:33Z
+ 2024-10-29T00:37:59Z
cve-database/bin/generate-cvrf-cve.pl
2020-12-27T01:00:00Z
@@ -159,6 +159,21 @@
Image SLES12-SP5-Azure-SAP-BYOS
+
+
+ Image SLES12-SP5-GCE-BYOS
+
+
+
+
+ Image SLES12-SP5-GCE-SAP-BYOS
+
+
+
+
+ Image SLES12-SP5-GCE-SAP-On-Demand
+
+
Image SLES15-SP4-SAP-Azure-LI-BYOS
@@ -1420,6 +1435,39 @@
ocfs2-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-Azure-SAP-BYOS
+
+ kernel-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-BYOS
+
+
+ cluster-md-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ dlm-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ gfs2-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ kernel-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ ocfs2-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ cluster-md-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
+
+ dlm-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
+
+ gfs2-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
+
+ kernel-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
+
+ ocfs2-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
cluster-md-kmp-default-5.14.21-150400.24.133.2 as a component of Image SLES15-SP4-SAP-Azure-LI-BYOS
@@ -2895,6 +2943,17 @@
Image SLES12-SP5-Azure-SAP-BYOS:gfs2-kmp-default-4.12.14-122.228.1
Image SLES12-SP5-Azure-SAP-BYOS:kernel-default-4.12.14-122.228.1
Image SLES12-SP5-Azure-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.228.1
+ Image SLES12-SP5-GCE-BYOS:kernel-default-4.12.14-122.228.1
+ Image SLES12-SP5-GCE-SAP-BYOS:cluster-md-kmp-default-4.12.14-122.228.1
+ Image SLES12-SP5-GCE-SAP-BYOS:dlm-kmp-default-4.12.14-122.228.1
+ Image SLES12-SP5-GCE-SAP-BYOS:gfs2-kmp-default-4.12.14-122.228.1
+ Image SLES12-SP5-GCE-SAP-BYOS:kernel-default-4.12.14-122.228.1
+ Image SLES12-SP5-GCE-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.228.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:cluster-md-kmp-default-4.12.14-122.228.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:dlm-kmp-default-4.12.14-122.228.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:gfs2-kmp-default-4.12.14-122.228.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:kernel-default-4.12.14-122.228.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:ocfs2-kmp-default-4.12.14-122.228.1
Image SLES15-SP4-SAP-Azure-LI-BYOS:cluster-md-kmp-default-5.14.21-150400.24.133.2
Image SLES15-SP4-SAP-Azure-LI-BYOS:dlm-kmp-default-5.14.21-150400.24.133.2
Image SLES15-SP4-SAP-Azure-LI-BYOS:gfs2-kmp-default-5.14.21-150400.24.133.2
skipping CVE-2022-48874 as CVE page is older than CVRF-CVE file.
skipping CVE-2022-48873 as CVE page is older than CVRF-CVE file.
skipping CVE-2022-48872 as CVE page is older than CVRF-CVE file.
skipping CVE-2022-48871 as CVE page is older than CVRF-CVE file.
skipping CVE-2022-48870 as CVE page is older than CVRF-CVE file.
skipping CVE-2022-48869 as CVE page is older than CVRF-CVE file.
skipping CVE-2022-48868 as CVE page is older than CVRF-CVE file.
skipping CVE-2022-48867 as CVE page is older than CVRF-CVE file.
skipping CVE-2022-48866 as CVE page is older than CVRF-CVE file.
--- /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2022-48865.xml 2024-10-16 01:54:39.536647000 +0200
+++ /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2022-48865.xml.new 2024-10-29 01:38:00.424919000 +0100
@@ -14,13 +14,13 @@
1
- 22
- 2024-10-15T23:54:39Z
+ 23
+ 2024-10-29T00:38:00Z
current
2024-07-17T23:31:11Z
- 2024-10-15T23:54:39Z
+ 2024-10-29T00:38:00Z
cve-database/bin/generate-cvrf-cve.pl
2020-12-27T01:00:00Z
@@ -140,6 +140,21 @@
Image SLES12-SP5-Azure-SAP-BYOS
+
+
+ Image SLES12-SP5-GCE-BYOS
+
+
+
+
+ Image SLES12-SP5-GCE-SAP-BYOS
+
+
+
+
+ Image SLES12-SP5-GCE-SAP-On-Demand
+
+
Image SLES15-SP5-Azure-Basic
@@ -1319,6 +1334,39 @@
ocfs2-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-Azure-SAP-BYOS
+
+ kernel-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-BYOS
+
+
+ cluster-md-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ dlm-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ gfs2-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ kernel-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ ocfs2-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ cluster-md-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
+
+ dlm-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
+
+ gfs2-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
+
+ kernel-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
+
+ ocfs2-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
kernel-azure-5.14.21-150500.33.66.1 as a component of Image SLES15-SP5-Azure-Basic
@@ -2656,6 +2704,17 @@
Image SLES12-SP5-Azure-SAP-BYOS:gfs2-kmp-default-4.12.14-122.228.1
Image SLES12-SP5-Azure-SAP-BYOS:kernel-default-4.12.14-122.228.1
Image SLES12-SP5-Azure-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.228.1
+ Image SLES12-SP5-GCE-BYOS:kernel-default-4.12.14-122.228.1
+ Image SLES12-SP5-GCE-SAP-BYOS:cluster-md-kmp-default-4.12.14-122.228.1
+ Image SLES12-SP5-GCE-SAP-BYOS:dlm-kmp-default-4.12.14-122.228.1
+ Image SLES12-SP5-GCE-SAP-BYOS:gfs2-kmp-default-4.12.14-122.228.1
+ Image SLES12-SP5-GCE-SAP-BYOS:kernel-default-4.12.14-122.228.1
+ Image SLES12-SP5-GCE-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.228.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:cluster-md-kmp-default-4.12.14-122.228.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:dlm-kmp-default-4.12.14-122.228.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:gfs2-kmp-default-4.12.14-122.228.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:kernel-default-4.12.14-122.228.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:ocfs2-kmp-default-4.12.14-122.228.1
Image SLES15-SP5-Azure-Basic:kernel-azure-5.14.21-150500.33.66.1
Image SLES15-SP5-Azure-Standard:kernel-azure-5.14.21-150500.33.66.1
Image SLES15-SP5-CHOST-BYOS-Aliyun:kernel-default-5.14.21-150500.55.80.2
no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2022-48863
skipping CVE-2022-48864 as CVE page is older than CVRF-CVE file.
--- /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2022-48863.xml 2024-10-20 01:50:41.345685000 +0200
+++ /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2022-48863.xml.new 2024-10-29 01:38:01.211825000 +0100
@@ -14,13 +14,13 @@
1
- 34
- 2024-10-19T23:50:40Z
+ 35
+ 2024-10-29T00:38:00Z
current
2024-07-17T23:31:11Z
- 2024-10-19T23:50:40Z
+ 2024-10-29T00:38:00Z
cve-database/bin/generate-cvrf-cve.pl
2020-12-27T01:00:00Z
@@ -118,6 +118,21 @@
Image SLES12-SP5-EC2-BYOS
+
+
+ Image SLES12-SP5-GCE-BYOS
+
+
+
+
+ Image SLES12-SP5-GCE-SAP-BYOS
+
+
+
+
+ Image SLES12-SP5-GCE-SAP-On-Demand
+
+
Image SLES12-SP5-SAP-Azure-LI-BYOS-Production
@@ -1776,6 +1791,39 @@
kernel-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-EC2-BYOS
+
+ kernel-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-BYOS
+
+
+ cluster-md-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ dlm-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ gfs2-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ kernel-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ ocfs2-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ cluster-md-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
+
+ dlm-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
+
+ gfs2-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
+
+ kernel-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
+
+ ocfs2-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
cluster-md-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-SAP-Azure-LI-BYOS-Production
@@ -3724,6 +3772,17 @@
Image SLES12-SP5-Azure-SAP-BYOS:kernel-default-4.12.14-122.225.1
Image SLES12-SP5-Azure-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.225.1
Image SLES12-SP5-EC2-BYOS:kernel-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-BYOS:kernel-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-BYOS:cluster-md-kmp-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-BYOS:dlm-kmp-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-BYOS:gfs2-kmp-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-BYOS:kernel-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:cluster-md-kmp-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:dlm-kmp-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:gfs2-kmp-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:kernel-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:ocfs2-kmp-default-4.12.14-122.225.1
Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:cluster-md-kmp-default-4.12.14-122.225.1
Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:dlm-kmp-default-4.12.14-122.225.1
Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:gfs2-kmp-default-4.12.14-122.225.1
no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2022-48860
skipping CVE-2022-48862 as CVE page is older than CVRF-CVE file.
skipping CVE-2022-48861 as CVE page is older than CVRF-CVE file.
--- /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2022-48860.xml 2024-10-20 01:50:43.519569000 +0200
+++ /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2022-48860.xml.new 2024-10-29 01:38:02.180797000 +0100
@@ -14,13 +14,13 @@
1
- 34
- 2024-10-19T23:50:43Z
+ 35
+ 2024-10-29T00:38:01Z
current
2024-07-17T23:31:12Z
- 2024-10-19T23:50:43Z
+ 2024-10-29T00:38:01Z
cve-database/bin/generate-cvrf-cve.pl
2020-12-27T01:00:00Z
@@ -116,6 +116,21 @@
Image SLES12-SP5-EC2-BYOS
+
+
+ Image SLES12-SP5-GCE-BYOS
+
+
+
+
+ Image SLES12-SP5-GCE-SAP-BYOS
+
+
+
+
+ Image SLES12-SP5-GCE-SAP-On-Demand
+
+
Image SLES12-SP5-SAP-Azure-LI-BYOS-Production
@@ -1769,6 +1784,39 @@
kernel-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-EC2-BYOS
+
+ kernel-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-BYOS
+
+
+ cluster-md-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ dlm-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ gfs2-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ kernel-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ ocfs2-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ cluster-md-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
+
+ dlm-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
+
+ gfs2-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
+
+ kernel-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
+
+ ocfs2-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
cluster-md-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-SAP-Azure-LI-BYOS-Production
@@ -3712,6 +3760,17 @@
Image SLES12-SP5-Azure-SAP-BYOS:kernel-default-4.12.14-122.225.1
Image SLES12-SP5-Azure-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.225.1
Image SLES12-SP5-EC2-BYOS:kernel-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-BYOS:kernel-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-BYOS:cluster-md-kmp-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-BYOS:dlm-kmp-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-BYOS:gfs2-kmp-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-BYOS:kernel-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:cluster-md-kmp-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:dlm-kmp-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:gfs2-kmp-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:kernel-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:ocfs2-kmp-default-4.12.14-122.225.1
Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:cluster-md-kmp-default-4.12.14-122.225.1
Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:dlm-kmp-default-4.12.14-122.225.1
Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:gfs2-kmp-default-4.12.14-122.225.1
no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2022-48857
skipping CVE-2022-48859 as CVE page is older than CVRF-CVE file.
skipping CVE-2022-48858 as CVE page is older than CVRF-CVE file.
--- /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2022-48857.xml 2024-10-20 01:50:45.955446000 +0200
+++ /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2022-48857.xml.new 2024-10-29 01:38:02.945762000 +0100
@@ -14,13 +14,13 @@
1
- 38
- 2024-10-19T23:50:45Z
+ 39
+ 2024-10-29T00:38:02Z
current
2024-07-17T23:31:13Z
- 2024-10-19T23:50:45Z
+ 2024-10-29T00:38:02Z
cve-database/bin/generate-cvrf-cve.pl
2020-12-27T01:00:00Z
@@ -174,6 +174,21 @@
Image SLES12-SP5-EC2-BYOS
+
+
+ Image SLES12-SP5-GCE-BYOS
+
+
+
+
+ Image SLES12-SP5-GCE-SAP-BYOS
+
+
+
+
+ Image SLES12-SP5-GCE-SAP-On-Demand
+
+
Image SLES12-SP5-SAP-Azure-LI-BYOS-Production
@@ -1889,6 +1904,39 @@
kernel-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-EC2-BYOS
+
+ kernel-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-BYOS
+
+
+ cluster-md-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ dlm-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ gfs2-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ kernel-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ ocfs2-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ cluster-md-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
+
+ dlm-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
+
+ gfs2-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
+
+ kernel-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
+
+ ocfs2-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
cluster-md-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-SAP-Azure-LI-BYOS-Production
@@ -3839,18 +3887,6 @@
kernel-default as a component of SUSE Linux Enterprise Server for SAP Applications 12 SP5
-
- kernel-default-base as a component of SUSE Linux Enterprise Server for SAP Applications 12 SP5
-
-
- kernel-default-devel as a component of SUSE Linux Enterprise Server for SAP Applications 12 SP5
-
-
- kernel-devel as a component of SUSE Linux Enterprise Server for SAP Applications 12 SP5
-
-
- kernel-macros as a component of SUSE Linux Enterprise Server for SAP Applications 12 SP5
-
kernel-source as a component of SUSE Linux Enterprise Server for SAP Applications 12 SP5
@@ -4034,6 +4070,17 @@
Image SLES12-SP5-Azure-SAP-BYOS:kernel-default-4.12.14-122.225.1
Image SLES12-SP5-Azure-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.225.1
Image SLES12-SP5-EC2-BYOS:kernel-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-BYOS:kernel-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-BYOS:cluster-md-kmp-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-BYOS:dlm-kmp-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-BYOS:gfs2-kmp-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-BYOS:kernel-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:cluster-md-kmp-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:dlm-kmp-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:gfs2-kmp-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:kernel-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:ocfs2-kmp-default-4.12.14-122.225.1
Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:cluster-md-kmp-default-4.12.14-122.225.1
Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:dlm-kmp-default-4.12.14-122.225.1
Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:gfs2-kmp-default-4.12.14-122.225.1
skipping CVE-2022-48856 as CVE page is older than CVRF-CVE file.
--- /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2022-48855.xml 2024-10-16 01:54:40.269588000 +0200
+++ /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2022-48855.xml.new 2024-10-29 01:38:03.596693000 +0100
@@ -14,13 +14,13 @@
1
- 29
- 2024-10-15T23:54:39Z
+ 30
+ 2024-10-29T00:38:03Z
current
2024-07-17T23:31:13Z
- 2024-10-15T23:54:39Z
+ 2024-10-29T00:38:03Z
cve-database/bin/generate-cvrf-cve.pl
2020-12-27T01:00:00Z
@@ -164,6 +164,21 @@
Image SLES12-SP5-EC2-BYOS
+
+
+ Image SLES12-SP5-GCE-BYOS
+
+
+
+
+ Image SLES12-SP5-GCE-SAP-BYOS
+
+
+
+
+ Image SLES12-SP5-GCE-SAP-On-Demand
+
+
Image SLES12-SP5-SAP-Azure-LI-BYOS-Production
@@ -1534,6 +1549,39 @@
kernel-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-EC2-BYOS
+
+ kernel-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-BYOS
+
+
+ cluster-md-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ dlm-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ gfs2-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ kernel-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ ocfs2-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ cluster-md-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
+
+ dlm-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
+
+ gfs2-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
+
+ kernel-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
+
+ ocfs2-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
cluster-md-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-SAP-Azure-LI-BYOS-Production
@@ -3118,6 +3166,17 @@
Image SLES12-SP5-Azure-SAP-BYOS:kernel-default-4.12.14-122.225.1
Image SLES12-SP5-Azure-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.225.1
Image SLES12-SP5-EC2-BYOS:kernel-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-BYOS:kernel-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-BYOS:cluster-md-kmp-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-BYOS:dlm-kmp-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-BYOS:gfs2-kmp-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-BYOS:kernel-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:cluster-md-kmp-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:dlm-kmp-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:gfs2-kmp-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:kernel-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:ocfs2-kmp-default-4.12.14-122.225.1
Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:cluster-md-kmp-default-4.12.14-122.225.1
Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:dlm-kmp-default-4.12.14-122.225.1
Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:gfs2-kmp-default-4.12.14-122.225.1
skipping CVE-2022-48854 as CVE page is older than CVRF-CVE file.
skipping CVE-2022-48853 as CVE page is older than CVRF-CVE file.
skipping CVE-2022-48852 as CVE page is older than CVRF-CVE file.
skipping CVE-2022-48851 as CVE page is older than CVRF-CVE file.
--- /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2022-48850.xml 2024-10-16 01:54:43.883453000 +0200
+++ /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2022-48850.xml.new 2024-10-29 01:38:04.211673000 +0100
@@ -14,13 +14,13 @@
1
- 31
- 2024-10-15T23:54:43Z
+ 32
+ 2024-10-29T00:38:03Z
current
2024-07-17T23:31:14Z
- 2024-10-15T23:54:43Z
+ 2024-10-29T00:38:03Z
cve-database/bin/generate-cvrf-cve.pl
2020-12-27T01:00:00Z
@@ -140,6 +140,21 @@
Image SLES12-SP5-EC2-BYOS
+
+
+ Image SLES12-SP5-GCE-BYOS
+
+
+
+
+ Image SLES12-SP5-GCE-SAP-BYOS
+
+
+
+
+ Image SLES12-SP5-GCE-SAP-On-Demand
+
+
Image SLES12-SP5-SAP-Azure-LI-BYOS-Production
@@ -1531,6 +1546,39 @@
kernel-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-EC2-BYOS
+
+ kernel-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-BYOS
+
+
+ cluster-md-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ dlm-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ gfs2-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ kernel-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ ocfs2-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ cluster-md-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
+
+ dlm-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
+
+ gfs2-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
+
+ kernel-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
+
+ ocfs2-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
cluster-md-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-SAP-Azure-LI-BYOS-Production
@@ -3106,6 +3154,17 @@
Image SLES12-SP5-Azure-SAP-BYOS:kernel-default-4.12.14-122.225.1
Image SLES12-SP5-Azure-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.225.1
Image SLES12-SP5-EC2-BYOS:kernel-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-BYOS:kernel-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-BYOS:cluster-md-kmp-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-BYOS:dlm-kmp-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-BYOS:gfs2-kmp-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-BYOS:kernel-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:cluster-md-kmp-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:dlm-kmp-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:gfs2-kmp-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:kernel-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:ocfs2-kmp-default-4.12.14-122.225.1
Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:cluster-md-kmp-default-4.12.14-122.225.1
Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:dlm-kmp-default-4.12.14-122.225.1
Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:gfs2-kmp-default-4.12.14-122.225.1
skipping CVE-2022-48849 as CVE page is older than CVRF-CVE file.
skipping CVE-2022-48848 as CVE page is older than CVRF-CVE file.
skipping CVE-2022-48847 as CVE page is older than CVRF-CVE file.
skipping CVE-2022-48846 as CVE page is older than CVRF-CVE file.
skipping CVE-2022-48845 as CVE page is older than CVRF-CVE file.
--- /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2022-48844.xml 2024-10-17 01:40:42.884956000 +0200
+++ /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2022-48844.xml.new 2024-10-29 01:38:04.836147000 +0100
@@ -14,13 +14,13 @@
1
- 26
- 2024-10-16T23:40:42Z
+ 27
+ 2024-10-29T00:38:04Z
current
2024-07-17T23:31:15Z
- 2024-10-16T23:40:42Z
+ 2024-10-29T00:38:04Z
cve-database/bin/generate-cvrf-cve.pl
2020-12-27T01:00:00Z
@@ -82,6 +82,21 @@
Container suse/sle-micro/rt-5.5:2.0.4-4.5.134
+
+
+ Image SLES12-SP5-GCE-BYOS
+
+
+
+
+ Image SLES12-SP5-GCE-SAP-BYOS
+
+
+
+
+ Image SLES12-SP5-GCE-SAP-On-Demand
+
+
Image SLES15-SP5-Azure-Basic
@@ -1421,6 +1436,39 @@
kernel-rt-5.14.21-150500.13.64.1 as a component of Container suse/sle-micro/rt-5.5:2.0.4-4.5.134
+
+ kernel-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-BYOS
+
+
+ cluster-md-kmp-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ dlm-kmp-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ gfs2-kmp-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ kernel-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ ocfs2-kmp-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ cluster-md-kmp-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
+
+ dlm-kmp-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
+
+ gfs2-kmp-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
+
+ kernel-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
+
+ ocfs2-kmp-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
kernel-azure-5.14.21-150500.33.63.1 as a component of Image SLES15-SP5-Azure-Basic
@@ -2907,6 +2955,17 @@
Container bci/bci-sle15-kernel-module-devel:15.5.22.2:kernel-syms-5.14.21-150500.55.73.1
Container suse/sle-micro/kvm-5.5:2.0.4-3.5.128:kernel-default-base-5.14.21-150500.55.73.1.150500.6.33.8
Container suse/sle-micro/rt-5.5:2.0.4-4.5.134:kernel-rt-5.14.21-150500.13.64.1
+ Image SLES12-SP5-GCE-BYOS:kernel-default-4.12.14-122.231.1
+ Image SLES12-SP5-GCE-SAP-BYOS:cluster-md-kmp-default-4.12.14-122.231.1
+ Image SLES12-SP5-GCE-SAP-BYOS:dlm-kmp-default-4.12.14-122.231.1
+ Image SLES12-SP5-GCE-SAP-BYOS:gfs2-kmp-default-4.12.14-122.231.1
+ Image SLES12-SP5-GCE-SAP-BYOS:kernel-default-4.12.14-122.231.1
+ Image SLES12-SP5-GCE-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.231.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:cluster-md-kmp-default-4.12.14-122.231.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:dlm-kmp-default-4.12.14-122.231.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:gfs2-kmp-default-4.12.14-122.231.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:kernel-default-4.12.14-122.231.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:ocfs2-kmp-default-4.12.14-122.231.1
Image SLES15-SP5-Azure-Basic:kernel-azure-5.14.21-150500.33.63.1
Image SLES15-SP5-Azure-Standard:kernel-azure-5.14.21-150500.33.63.1
Image SLES15-SP5-BYOS-Azure:kernel-default-5.14.21-150500.55.73.1
no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2022-48839
skipping CVE-2022-48843 as CVE page is older than CVRF-CVE file.
skipping CVE-2022-48842 as CVE page is older than CVRF-CVE file.
skipping CVE-2022-48841 as CVE page is older than CVRF-CVE file.
skipping CVE-2022-48840 as CVE page is older than CVRF-CVE file.
--- /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2022-48839.xml 2024-10-20 01:50:56.127934000 +0200
+++ /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2022-48839.xml.new 2024-10-29 01:38:05.523113000 +0100
@@ -14,13 +14,13 @@
1
- 36
- 2024-10-19T23:50:55Z
+ 37
+ 2024-10-29T00:38:05Z
current
2024-07-17T23:31:16Z
- 2024-10-19T23:50:55Z
+ 2024-10-29T00:38:05Z
cve-database/bin/generate-cvrf-cve.pl
2020-12-27T01:00:00Z
@@ -193,6 +193,21 @@
Image SLES12-SP5-EC2-BYOS
+
+
+ Image SLES12-SP5-GCE-BYOS
+
+
+
+
+ Image SLES12-SP5-GCE-SAP-BYOS
+
+
+
+
+ Image SLES12-SP5-GCE-SAP-On-Demand
+
+
Image SLES12-SP5-SAP-Azure-LI-BYOS-Production
@@ -1791,6 +1806,39 @@
kernel-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-EC2-BYOS
+
+ kernel-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-BYOS
+
+
+ cluster-md-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ dlm-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ gfs2-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ kernel-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ ocfs2-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ cluster-md-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
+
+ dlm-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
+
+ gfs2-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
+
+ kernel-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
+
+ ocfs2-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
cluster-md-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-SAP-Azure-LI-BYOS-Production
@@ -3879,18 +3927,6 @@
kernel-default as a component of SUSE Linux Enterprise Server for SAP Applications 12 SP5
-
- kernel-default-base as a component of SUSE Linux Enterprise Server for SAP Applications 12 SP5
-
-
- kernel-default-devel as a component of SUSE Linux Enterprise Server for SAP Applications 12 SP5
-
-
- kernel-devel as a component of SUSE Linux Enterprise Server for SAP Applications 12 SP5
-
-
- kernel-macros as a component of SUSE Linux Enterprise Server for SAP Applications 12 SP5
-
kernel-source as a component of SUSE Linux Enterprise Server for SAP Applications 12 SP5
@@ -4067,6 +4103,17 @@
Image SLES12-SP5-Azure-SAP-BYOS:kernel-default-4.12.14-122.225.1
Image SLES12-SP5-Azure-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.225.1
Image SLES12-SP5-EC2-BYOS:kernel-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-BYOS:kernel-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-BYOS:cluster-md-kmp-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-BYOS:dlm-kmp-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-BYOS:gfs2-kmp-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-BYOS:kernel-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:cluster-md-kmp-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:dlm-kmp-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:gfs2-kmp-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:kernel-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:ocfs2-kmp-default-4.12.14-122.225.1
Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:cluster-md-kmp-default-4.12.14-122.225.1
Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:dlm-kmp-default-4.12.14-122.225.1
Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:gfs2-kmp-default-4.12.14-122.225.1
@@ -4765,10 +4812,6 @@
SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros
SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source
SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default
- SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base
- SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel
- SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel
- SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros
SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source
SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default
SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel
no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2022-48836
skipping CVE-2022-48838 as CVE page is older than CVRF-CVE file.
skipping CVE-2022-48837 as CVE page is older than CVRF-CVE file.
--- /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2022-48836.xml 2024-10-20 01:50:58.280793000 +0200
+++ /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2022-48836.xml.new 2024-10-29 01:38:06.177119000 +0100
@@ -14,13 +14,13 @@
1
- 37
- 2024-10-19T23:50:57Z
+ 38
+ 2024-10-29T00:38:05Z
current
2024-07-17T23:31:17Z
- 2024-10-19T23:50:57Z
+ 2024-10-29T00:38:05Z
cve-database/bin/generate-cvrf-cve.pl
2020-12-27T01:00:00Z
@@ -151,6 +151,21 @@
Image SLES12-SP5-EC2-BYOS
+
+
+ Image SLES12-SP5-GCE-BYOS
+
+
+
+
+ Image SLES12-SP5-GCE-SAP-BYOS
+
+
+
+
+ Image SLES12-SP5-GCE-SAP-On-Demand
+
+
Image SLES12-SP5-SAP-Azure-LI-BYOS-Production
@@ -1931,6 +1946,39 @@
kernel-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-EC2-BYOS
+
+ kernel-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-BYOS
+
+
+ cluster-md-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ dlm-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ gfs2-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ kernel-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ ocfs2-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ cluster-md-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
+
+ dlm-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
+
+ gfs2-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
+
+ kernel-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
+
+ ocfs2-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
cluster-md-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-SAP-Azure-LI-BYOS-Production
@@ -3941,18 +3989,6 @@
kernel-default as a component of SUSE Linux Enterprise Server for SAP Applications 12 SP5
-
- kernel-default-base as a component of SUSE Linux Enterprise Server for SAP Applications 12 SP5
-
-
- kernel-default-devel as a component of SUSE Linux Enterprise Server for SAP Applications 12 SP5
-
-
- kernel-devel as a component of SUSE Linux Enterprise Server for SAP Applications 12 SP5
-
-
- kernel-macros as a component of SUSE Linux Enterprise Server for SAP Applications 12 SP5
-
kernel-source as a component of SUSE Linux Enterprise Server for SAP Applications 12 SP5
@@ -4109,6 +4145,17 @@
Image SLES12-SP5-Azure-SAP-BYOS:kernel-default-4.12.14-122.225.1
Image SLES12-SP5-Azure-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.225.1
Image SLES12-SP5-EC2-BYOS:kernel-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-BYOS:kernel-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-BYOS:cluster-md-kmp-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-BYOS:dlm-kmp-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-BYOS:gfs2-kmp-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-BYOS:kernel-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:cluster-md-kmp-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:dlm-kmp-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:gfs2-kmp-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:kernel-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:ocfs2-kmp-default-4.12.14-122.225.1
Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:cluster-md-kmp-default-4.12.14-122.225.1
Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:dlm-kmp-default-4.12.14-122.225.1
Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:gfs2-kmp-default-4.12.14-122.225.1
@@ -4732,10 +4779,6 @@
SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-source
SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default
SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default
- SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base
- SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel
- SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel
- SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros
SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source
SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default
SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel
no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2022-48829
skipping CVE-2022-48835 as CVE page is older than CVRF-CVE file.
skipping CVE-2022-48834 as CVE page is older than CVRF-CVE file.
skipping CVE-2022-48833 as CVE page is older than CVRF-CVE file.
skipping CVE-2022-48832 as CVE page is older than CVRF-CVE file.
skipping CVE-2022-48831 as CVE page is older than CVRF-CVE file.
skipping CVE-2022-48830 as CVE page is older than CVRF-CVE file.
--- /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2022-48829.xml 2024-10-20 01:51:02.605595000 +0200
+++ /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2022-48829.xml.new 2024-10-29 01:38:06.879089000 +0100
@@ -14,13 +14,13 @@
1
- 28
- 2024-10-19T23:51:02Z
+ 29
+ 2024-10-29T00:38:06Z
current
2024-07-17T23:31:19Z
- 2024-10-19T23:51:02Z
+ 2024-10-29T00:38:06Z
cve-database/bin/generate-cvrf-cve.pl
2020-12-27T01:00:00Z
@@ -124,6 +124,21 @@
Image SLES12-SP5-EC2-BYOS
+
+
+ Image SLES12-SP5-GCE-BYOS
+
+
+
+
+ Image SLES12-SP5-GCE-SAP-BYOS
+
+
+
+
+ Image SLES12-SP5-GCE-SAP-On-Demand
+
+
Image SLES12-SP5-SAP-Azure-LI-BYOS-Production
@@ -1757,6 +1772,39 @@
kernel-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-EC2-BYOS
+
+ kernel-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-BYOS
+
+
+ cluster-md-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ dlm-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ gfs2-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ kernel-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ ocfs2-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ cluster-md-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
+
+ dlm-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
+
+ gfs2-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
+
+ kernel-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
+
+ ocfs2-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
cluster-md-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-SAP-Azure-LI-BYOS-Production
@@ -3509,18 +3557,6 @@
kernel-default as a component of SUSE Linux Enterprise Server for SAP Applications 12 SP5
-
- kernel-default-base as a component of SUSE Linux Enterprise Server for SAP Applications 12 SP5
-
-
- kernel-default-devel as a component of SUSE Linux Enterprise Server for SAP Applications 12 SP5
-
-
- kernel-devel as a component of SUSE Linux Enterprise Server for SAP Applications 12 SP5
-
-
- kernel-macros as a component of SUSE Linux Enterprise Server for SAP Applications 12 SP5
-
kernel-source as a component of SUSE Linux Enterprise Server for SAP Applications 12 SP5
@@ -3666,6 +3702,17 @@
Image SLES12-SP5-Azure-SAP-BYOS:kernel-default-4.12.14-122.225.1
Image SLES12-SP5-Azure-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.225.1
Image SLES12-SP5-EC2-BYOS:kernel-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-BYOS:kernel-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-BYOS:cluster-md-kmp-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-BYOS:dlm-kmp-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-BYOS:gfs2-kmp-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-BYOS:kernel-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:cluster-md-kmp-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:dlm-kmp-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:gfs2-kmp-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:kernel-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:ocfs2-kmp-default-4.12.14-122.225.1
Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:cluster-md-kmp-default-4.12.14-122.225.1
Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:dlm-kmp-default-4.12.14-122.225.1
Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:gfs2-kmp-default-4.12.14-122.225.1
@@ -4252,10 +4299,6 @@
SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros
SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source
SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default
- SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base
- SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel
- SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel
- SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros
SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source
SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default
SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel
no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2022-48828
--- /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2022-48828.xml 2024-10-20 01:51:03.280550000 +0200
+++ /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2022-48828.xml.new 2024-10-29 01:38:07.604034000 +0100
@@ -14,13 +14,13 @@
1
- 33
- 2024-10-19T23:51:02Z
+ 34
+ 2024-10-29T00:38:07Z
current
2024-07-17T23:31:19Z
- 2024-10-19T23:51:02Z
+ 2024-10-29T00:38:07Z
cve-database/bin/generate-cvrf-cve.pl
2020-12-27T01:00:00Z
@@ -122,6 +122,21 @@
Image SLES12-SP5-EC2-BYOS
+
+
+ Image SLES12-SP5-GCE-BYOS
+
+
+
+
+ Image SLES12-SP5-GCE-SAP-BYOS
+
+
+
+
+ Image SLES12-SP5-GCE-SAP-On-Demand
+
+
Image SLES12-SP5-SAP-Azure-LI-BYOS-Production
@@ -1775,6 +1790,39 @@
kernel-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-EC2-BYOS
+
+ kernel-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-BYOS
+
+
+ cluster-md-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ dlm-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ gfs2-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ kernel-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ ocfs2-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ cluster-md-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
+
+ dlm-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
+
+ gfs2-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
+
+ kernel-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
+
+ ocfs2-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
cluster-md-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-SAP-Azure-LI-BYOS-Production
@@ -3724,6 +3772,17 @@
Image SLES12-SP5-Azure-SAP-BYOS:kernel-default-4.12.14-122.225.1
Image SLES12-SP5-Azure-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.225.1
Image SLES12-SP5-EC2-BYOS:kernel-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-BYOS:kernel-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-BYOS:cluster-md-kmp-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-BYOS:dlm-kmp-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-BYOS:gfs2-kmp-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-BYOS:kernel-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:cluster-md-kmp-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:dlm-kmp-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:gfs2-kmp-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:kernel-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:ocfs2-kmp-default-4.12.14-122.225.1
Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:cluster-md-kmp-default-4.12.14-122.225.1
Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:dlm-kmp-default-4.12.14-122.225.1
Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:gfs2-kmp-default-4.12.14-122.225.1
no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2022-48827
--- /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2022-48827.xml 2024-10-20 01:51:04.015528000 +0200
+++ /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2022-48827.xml.new 2024-10-29 01:38:08.368959000 +0100
@@ -14,13 +14,13 @@
1
- 36
- 2024-10-19T23:51:03Z
+ 37
+ 2024-10-29T00:38:07Z
current
2024-07-17T23:31:19Z
- 2024-10-19T23:51:03Z
+ 2024-10-29T00:38:07Z
cve-database/bin/generate-cvrf-cve.pl
2020-12-27T01:00:00Z
@@ -150,6 +150,21 @@
Image SLES12-SP5-EC2-BYOS
+
+
+ Image SLES12-SP5-GCE-BYOS
+
+
+
+
+ Image SLES12-SP5-GCE-SAP-BYOS
+
+
+
+
+ Image SLES12-SP5-GCE-SAP-On-Demand
+
+
Image SLES12-SP5-SAP-Azure-LI-BYOS-Production
@@ -1865,6 +1880,39 @@
kernel-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-EC2-BYOS
+
+ kernel-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-BYOS
+
+
+ cluster-md-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ dlm-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ gfs2-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ kernel-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ ocfs2-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ cluster-md-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
+
+ dlm-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
+
+ gfs2-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
+
+ kernel-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
+
+ ocfs2-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
cluster-md-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-SAP-Azure-LI-BYOS-Production
@@ -3815,18 +3863,6 @@
kernel-default as a component of SUSE Linux Enterprise Server for SAP Applications 12 SP5
-
- kernel-default-base as a component of SUSE Linux Enterprise Server for SAP Applications 12 SP5
-
-
- kernel-default-devel as a component of SUSE Linux Enterprise Server for SAP Applications 12 SP5
-
-
- kernel-devel as a component of SUSE Linux Enterprise Server for SAP Applications 12 SP5
-
-
- kernel-macros as a component of SUSE Linux Enterprise Server for SAP Applications 12 SP5
-
kernel-source as a component of SUSE Linux Enterprise Server for SAP Applications 12 SP5
@@ -3986,6 +4022,17 @@
Image SLES12-SP5-Azure-SAP-BYOS:kernel-default-4.12.14-122.225.1
Image SLES12-SP5-Azure-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.225.1
Image SLES12-SP5-EC2-BYOS:kernel-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-BYOS:kernel-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-BYOS:cluster-md-kmp-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-BYOS:dlm-kmp-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-BYOS:gfs2-kmp-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-BYOS:kernel-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:cluster-md-kmp-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:dlm-kmp-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:gfs2-kmp-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:kernel-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:ocfs2-kmp-default-4.12.14-122.225.1
Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:cluster-md-kmp-default-4.12.14-122.225.1
Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:dlm-kmp-default-4.12.14-122.225.1
Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:gfs2-kmp-default-4.12.14-122.225.1
no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2022-48826
--- /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2022-48826.xml 2024-10-20 01:51:04.809463000 +0200
+++ /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2022-48826.xml.new 2024-10-29 01:38:09.303908000 +0100
@@ -14,13 +14,13 @@
1
- 29
- 2024-10-19T23:51:04Z
+ 30
+ 2024-10-29T00:38:08Z
current
2024-07-16T23:43:13Z
- 2024-10-19T23:51:04Z
+ 2024-10-29T00:38:08Z
cve-database/bin/generate-cvrf-cve.pl
2020-12-27T01:00:00Z
@@ -167,6 +167,21 @@
Image SLES12-SP5-EC2-BYOS
+
+
+ Image SLES12-SP5-GCE-BYOS
+
+
+
+
+ Image SLES12-SP5-GCE-SAP-BYOS
+
+
+
+
+ Image SLES12-SP5-GCE-SAP-On-Demand
+
+
Image SLES12-SP5-SAP-Azure-LI-BYOS-Production
@@ -1781,6 +1796,39 @@
kernel-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-EC2-BYOS
+
+ kernel-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-BYOS
+
+
+ cluster-md-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ dlm-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ gfs2-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ kernel-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ ocfs2-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ cluster-md-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
+
+ dlm-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
+
+ gfs2-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
+
+ kernel-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
+
+ ocfs2-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
cluster-md-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-SAP-Azure-LI-BYOS-Production
@@ -3509,18 +3557,6 @@
kernel-default as a component of SUSE Linux Enterprise Server for SAP Applications 12 SP5
-
- kernel-default-base as a component of SUSE Linux Enterprise Server for SAP Applications 12 SP5
-
-
- kernel-default-devel as a component of SUSE Linux Enterprise Server for SAP Applications 12 SP5
-
-
- kernel-devel as a component of SUSE Linux Enterprise Server for SAP Applications 12 SP5
-
-
- kernel-macros as a component of SUSE Linux Enterprise Server for SAP Applications 12 SP5
-
kernel-source as a component of SUSE Linux Enterprise Server for SAP Applications 12 SP5
@@ -3709,6 +3745,17 @@
Image SLES12-SP5-Azure-SAP-BYOS:kernel-default-4.12.14-122.225.1
Image SLES12-SP5-Azure-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.225.1
Image SLES12-SP5-EC2-BYOS:kernel-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-BYOS:kernel-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-BYOS:cluster-md-kmp-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-BYOS:dlm-kmp-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-BYOS:gfs2-kmp-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-BYOS:kernel-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:cluster-md-kmp-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:dlm-kmp-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:gfs2-kmp-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:kernel-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:ocfs2-kmp-default-4.12.14-122.225.1
Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:cluster-md-kmp-default-4.12.14-122.225.1
Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:dlm-kmp-default-4.12.14-122.225.1
Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:gfs2-kmp-default-4.12.14-122.225.1
no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2022-48823
skipping CVE-2022-48825 as CVE page is older than CVRF-CVE file.
skipping CVE-2022-48824 as CVE page is older than CVRF-CVE file.
--- /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2022-48823.xml 2024-10-20 01:51:07.010869000 +0200
+++ /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2022-48823.xml.new 2024-10-29 01:38:10.256845000 +0100
@@ -14,13 +14,13 @@
1
- 41
- 2024-10-19T23:51:06Z
+ 42
+ 2024-10-29T00:38:09Z
current
2024-07-17T23:31:21Z
- 2024-10-19T23:51:06Z
+ 2024-10-29T00:38:09Z
cve-database/bin/generate-cvrf-cve.pl
2020-12-27T01:00:00Z
@@ -164,6 +164,21 @@
Image SLES12-SP5-EC2-BYOS
+
+
+ Image SLES12-SP5-GCE-BYOS
+
+
+
+
+ Image SLES12-SP5-GCE-SAP-BYOS
+
+
+
+
+ Image SLES12-SP5-GCE-SAP-On-Demand
+
+
Image SLES12-SP5-SAP-Azure-LI-BYOS-Production
@@ -1878,6 +1893,39 @@
kernel-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-EC2-BYOS
+
+ kernel-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-BYOS
+
+
+ cluster-md-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ dlm-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ gfs2-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ kernel-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ ocfs2-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ cluster-md-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
+
+ dlm-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
+
+ gfs2-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
+
+ kernel-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
+
+ ocfs2-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
cluster-md-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-SAP-Azure-LI-BYOS-Production
@@ -4043,6 +4091,17 @@
Image SLES12-SP5-Azure-SAP-BYOS:kernel-default-4.12.14-122.225.1
Image SLES12-SP5-Azure-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.225.1
Image SLES12-SP5-EC2-BYOS:kernel-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-BYOS:kernel-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-BYOS:cluster-md-kmp-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-BYOS:dlm-kmp-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-BYOS:gfs2-kmp-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-BYOS:kernel-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:cluster-md-kmp-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:dlm-kmp-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:gfs2-kmp-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:kernel-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:ocfs2-kmp-default-4.12.14-122.225.1
Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:cluster-md-kmp-default-4.12.14-122.225.1
Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:dlm-kmp-default-4.12.14-122.225.1
Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:gfs2-kmp-default-4.12.14-122.225.1
no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2022-48822
--- /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2022-48822.xml 2024-10-20 01:51:07.818799000 +0200
+++ /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2022-48822.xml.new 2024-10-29 01:38:11.367787000 +0100
@@ -14,13 +14,13 @@
1
- 33
- 2024-10-19T23:51:07Z
+ 34
+ 2024-10-29T00:38:10Z
current
2024-07-17T23:31:21Z
- 2024-10-19T23:51:07Z
+ 2024-10-29T00:38:10Z
cve-database/bin/generate-cvrf-cve.pl
2020-12-27T01:00:00Z
@@ -148,6 +148,21 @@
Image SLES12-SP5-Azure-SAP-BYOS
+
+
+ Image SLES12-SP5-GCE-BYOS
+
+
+
+
+ Image SLES12-SP5-GCE-SAP-BYOS
+
+
+
+
+ Image SLES12-SP5-GCE-SAP-On-Demand
+
+
Image SLES15-SP3-BYOS-EC2-HVM
@@ -1950,6 +1965,39 @@
ocfs2-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-Azure-SAP-BYOS
+
+ kernel-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-BYOS
+
+
+ cluster-md-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ dlm-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ gfs2-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ kernel-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ ocfs2-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ cluster-md-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
+
+ dlm-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
+
+ gfs2-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
+
+ kernel-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
+
+ ocfs2-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
kernel-default-5.3.18-150300.59.170.1 as a component of Image SLES15-SP3-BYOS-EC2-HVM
@@ -4002,18 +4050,6 @@
kernel-default as a component of SUSE Linux Enterprise Server for SAP Applications 12 SP5
-
- kernel-default-base as a component of SUSE Linux Enterprise Server for SAP Applications 12 SP5
-
-
- kernel-default-devel as a component of SUSE Linux Enterprise Server for SAP Applications 12 SP5
-
-
- kernel-devel as a component of SUSE Linux Enterprise Server for SAP Applications 12 SP5
-
-
- kernel-macros as a component of SUSE Linux Enterprise Server for SAP Applications 12 SP5
-
kernel-source as a component of SUSE Linux Enterprise Server for SAP Applications 12 SP5
@@ -4167,6 +4203,17 @@
Image SLES12-SP5-Azure-SAP-BYOS:gfs2-kmp-default-4.12.14-122.228.1
Image SLES12-SP5-Azure-SAP-BYOS:kernel-default-4.12.14-122.228.1
Image SLES12-SP5-Azure-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.228.1
+ Image SLES12-SP5-GCE-BYOS:kernel-default-4.12.14-122.228.1
+ Image SLES12-SP5-GCE-SAP-BYOS:cluster-md-kmp-default-4.12.14-122.228.1
+ Image SLES12-SP5-GCE-SAP-BYOS:dlm-kmp-default-4.12.14-122.228.1
+ Image SLES12-SP5-GCE-SAP-BYOS:gfs2-kmp-default-4.12.14-122.228.1
+ Image SLES12-SP5-GCE-SAP-BYOS:kernel-default-4.12.14-122.228.1
+ Image SLES12-SP5-GCE-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.228.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:cluster-md-kmp-default-4.12.14-122.228.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:dlm-kmp-default-4.12.14-122.228.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:gfs2-kmp-default-4.12.14-122.228.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:kernel-default-4.12.14-122.228.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:ocfs2-kmp-default-4.12.14-122.228.1
Image SLES15-SP3-BYOS-EC2-HVM:kernel-default-5.3.18-150300.59.170.1
Image SLES15-SP3-CHOST-BYOS-Aliyun:kernel-default-5.3.18-150300.59.170.1
Image SLES15-SP3-CHOST-BYOS-Azure:kernel-default-5.3.18-150300.59.170.1
@@ -4853,10 +4900,6 @@
SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros
SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source
SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default
- SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base
- SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel
- SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel
- SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros
SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source
SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default
SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel
no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2022-48811
skipping CVE-2022-48821 as CVE page is older than CVRF-CVE file.
skipping CVE-2022-48820 as CVE page is older than CVRF-CVE file.
skipping CVE-2022-48819 as CVE page is older than CVRF-CVE file.
skipping CVE-2022-48818 as CVE page is older than CVRF-CVE file.
skipping CVE-2022-48817 as CVE page is older than CVRF-CVE file.
skipping CVE-2022-48816 as CVE page is older than CVRF-CVE file.
skipping CVE-2022-48815 as CVE page is older than CVRF-CVE file.
skipping CVE-2022-48814 as CVE page is older than CVRF-CVE file.
skipping CVE-2022-48813 as CVE page is older than CVRF-CVE file.
skipping CVE-2022-48812 as CVE page is older than CVRF-CVE file.
--- /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2022-48811.xml 2024-10-20 01:51:15.311908000 +0200
+++ /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2022-48811.xml.new 2024-10-29 01:38:12.153753000 +0100
@@ -14,13 +14,13 @@
1
- 40
- 2024-10-19T23:51:14Z
+ 41
+ 2024-10-29T00:38:11Z
current
2024-07-16T23:43:16Z
- 2024-10-19T23:51:14Z
+ 2024-10-29T00:38:11Z
cve-database/bin/generate-cvrf-cve.pl
2020-12-27T01:00:00Z
@@ -169,6 +169,21 @@
Image SLES12-SP5-EC2-BYOS
+
+
+ Image SLES12-SP5-GCE-BYOS
+
+
+
+
+ Image SLES12-SP5-GCE-SAP-BYOS
+
+
+
+
+ Image SLES12-SP5-GCE-SAP-On-Demand
+
+
Image SLES12-SP5-SAP-Azure-LI-BYOS-Production
@@ -1878,6 +1893,39 @@
kernel-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-EC2-BYOS
+
+ kernel-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-BYOS
+
+
+ cluster-md-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ dlm-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ gfs2-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ kernel-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ ocfs2-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ cluster-md-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
+
+ dlm-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
+
+ gfs2-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
+
+ kernel-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
+
+ ocfs2-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
cluster-md-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-SAP-Azure-LI-BYOS-Production
@@ -4045,6 +4093,17 @@
Image SLES12-SP5-Azure-SAP-BYOS:kernel-default-4.12.14-122.225.1
Image SLES12-SP5-Azure-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.225.1
Image SLES12-SP5-EC2-BYOS:kernel-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-BYOS:kernel-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-BYOS:cluster-md-kmp-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-BYOS:dlm-kmp-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-BYOS:gfs2-kmp-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-BYOS:kernel-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:cluster-md-kmp-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:dlm-kmp-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:gfs2-kmp-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:kernel-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:ocfs2-kmp-default-4.12.14-122.225.1
Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:cluster-md-kmp-default-4.12.14-122.225.1
Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:dlm-kmp-default-4.12.14-122.225.1
Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:gfs2-kmp-default-4.12.14-122.225.1
--- /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2022-48810.xml 2024-10-17 01:40:46.634630000 +0200
+++ /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2022-48810.xml.new 2024-10-29 01:38:12.921728000 +0100
@@ -14,13 +14,13 @@
1
- 31
- 2024-10-16T23:40:46Z
+ 32
+ 2024-10-29T00:38:12Z
current
2024-07-16T23:43:16Z
- 2024-10-16T23:40:46Z
+ 2024-10-29T00:38:12Z
cve-database/bin/generate-cvrf-cve.pl
2020-12-27T01:00:00Z
@@ -142,6 +142,21 @@
Image SLES12-SP5-EC2-BYOS
+
+
+ Image SLES12-SP5-GCE-BYOS
+
+
+
+
+ Image SLES12-SP5-GCE-SAP-BYOS
+
+
+
+
+ Image SLES12-SP5-GCE-SAP-On-Demand
+
+
Image SLES12-SP5-SAP-Azure-LI-BYOS-Production
@@ -1533,6 +1548,39 @@
kernel-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-EC2-BYOS
+
+ kernel-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-BYOS
+
+
+ cluster-md-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ dlm-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ gfs2-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ kernel-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ ocfs2-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ cluster-md-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
+
+ dlm-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
+
+ gfs2-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
+
+ kernel-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
+
+ ocfs2-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
cluster-md-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-SAP-Azure-LI-BYOS-Production
@@ -3110,6 +3158,17 @@
Image SLES12-SP5-Azure-SAP-BYOS:kernel-default-4.12.14-122.225.1
Image SLES12-SP5-Azure-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.225.1
Image SLES12-SP5-EC2-BYOS:kernel-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-BYOS:kernel-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-BYOS:cluster-md-kmp-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-BYOS:dlm-kmp-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-BYOS:gfs2-kmp-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-BYOS:kernel-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:cluster-md-kmp-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:dlm-kmp-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:gfs2-kmp-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:kernel-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:ocfs2-kmp-default-4.12.14-122.225.1
Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:cluster-md-kmp-default-4.12.14-122.225.1
Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:dlm-kmp-default-4.12.14-122.225.1
Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:gfs2-kmp-default-4.12.14-122.225.1
no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2022-48805
skipping CVE-2022-48809 as CVE page is older than CVRF-CVE file.
skipping CVE-2022-48808 as CVE page is older than CVRF-CVE file.
skipping CVE-2022-48807 as CVE page is older than CVRF-CVE file.
skipping CVE-2022-48806 as CVE page is older than CVRF-CVE file.
--- /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2022-48805.xml 2024-10-20 01:51:18.799741000 +0200
+++ /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2022-48805.xml.new 2024-10-29 01:38:13.715725000 +0100
@@ -14,13 +14,13 @@
1
- 36
- 2024-10-19T23:51:18Z
+ 37
+ 2024-10-29T00:38:13Z
current
2024-07-16T23:43:17Z
- 2024-10-19T23:51:18Z
+ 2024-10-29T00:38:13Z
cve-database/bin/generate-cvrf-cve.pl
2020-12-27T01:00:00Z
@@ -148,6 +148,21 @@
Image SLES12-SP5-EC2-BYOS
+
+
+ Image SLES12-SP5-GCE-BYOS
+
+
+
+
+ Image SLES12-SP5-GCE-SAP-BYOS
+
+
+
+
+ Image SLES12-SP5-GCE-SAP-On-Demand
+
+
Image SLES12-SP5-SAP-Azure-LI-BYOS-Production
@@ -1951,6 +1966,39 @@
kernel-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-EC2-BYOS
+
+ kernel-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-BYOS
+
+
+ cluster-md-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ dlm-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ gfs2-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ kernel-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ ocfs2-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ cluster-md-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
+
+ dlm-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
+
+ gfs2-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
+
+ kernel-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
+
+ ocfs2-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
cluster-md-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-SAP-Azure-LI-BYOS-Production
@@ -4009,18 +4057,6 @@
kernel-default as a component of SUSE Linux Enterprise Server for SAP Applications 12 SP5
-
- kernel-default-base as a component of SUSE Linux Enterprise Server for SAP Applications 12 SP5
-
-
- kernel-default-devel as a component of SUSE Linux Enterprise Server for SAP Applications 12 SP5
-
-
- kernel-devel as a component of SUSE Linux Enterprise Server for SAP Applications 12 SP5
-
-
- kernel-macros as a component of SUSE Linux Enterprise Server for SAP Applications 12 SP5
-
kernel-source as a component of SUSE Linux Enterprise Server for SAP Applications 12 SP5
@@ -4156,6 +4192,17 @@
Image SLES12-SP5-Azure-SAP-BYOS:kernel-default-4.12.14-122.225.1
Image SLES12-SP5-Azure-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.225.1
Image SLES12-SP5-EC2-BYOS:kernel-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-BYOS:kernel-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-BYOS:cluster-md-kmp-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-BYOS:dlm-kmp-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-BYOS:gfs2-kmp-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-BYOS:kernel-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:cluster-md-kmp-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:dlm-kmp-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:gfs2-kmp-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:kernel-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:ocfs2-kmp-default-4.12.14-122.225.1
Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:cluster-md-kmp-default-4.12.14-122.225.1
Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:dlm-kmp-default-4.12.14-122.225.1
Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:gfs2-kmp-default-4.12.14-122.225.1
@@ -4844,10 +4891,6 @@
SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros
SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source
SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default
- SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base
- SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel
- SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel
- SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros
SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source
SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default
SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel
no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2022-48804
--- /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2022-48804.xml 2024-10-20 01:51:19.498715000 +0200
+++ /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2022-48804.xml.new 2024-10-29 01:38:14.748153000 +0100
@@ -14,13 +14,13 @@
1
- 34
- 2024-10-19T23:51:19Z
+ 35
+ 2024-10-29T00:38:14Z
current
2024-07-16T23:43:18Z
- 2024-10-19T23:51:19Z
+ 2024-10-29T00:38:14Z
cve-database/bin/generate-cvrf-cve.pl
2020-12-27T01:00:00Z
@@ -125,6 +125,21 @@
Image SLES12-SP5-EC2-BYOS
+
+
+ Image SLES12-SP5-GCE-BYOS
+
+
+
+
+ Image SLES12-SP5-GCE-SAP-BYOS
+
+
+
+
+ Image SLES12-SP5-GCE-SAP-On-Demand
+
+
Image SLES12-SP5-SAP-Azure-LI-BYOS-Production
@@ -1848,6 +1863,39 @@
kernel-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-EC2-BYOS
+
+ kernel-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-BYOS
+
+
+ cluster-md-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ dlm-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ gfs2-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ kernel-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ ocfs2-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ cluster-md-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
+
+ dlm-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
+
+ gfs2-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
+
+ kernel-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
+
+ ocfs2-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
cluster-md-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-SAP-Azure-LI-BYOS-Production
@@ -3859,6 +3907,17 @@
Image SLES12-SP5-Azure-SAP-BYOS:kernel-default-4.12.14-122.225.1
Image SLES12-SP5-Azure-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.225.1
Image SLES12-SP5-EC2-BYOS:kernel-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-BYOS:kernel-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-BYOS:cluster-md-kmp-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-BYOS:dlm-kmp-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-BYOS:gfs2-kmp-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-BYOS:kernel-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:cluster-md-kmp-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:dlm-kmp-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:gfs2-kmp-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:kernel-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:ocfs2-kmp-default-4.12.14-122.225.1
Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:cluster-md-kmp-default-4.12.14-122.225.1
Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:dlm-kmp-default-4.12.14-122.225.1
Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:gfs2-kmp-default-4.12.14-122.225.1
no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2022-48799
skipping CVE-2022-48803 as CVE page is older than CVRF-CVE file.
skipping CVE-2022-48802 as CVE page is older than CVRF-CVE file.
skipping CVE-2022-48801 as CVE page is older than CVRF-CVE file.
skipping CVE-2022-48800 as CVE page is older than CVRF-CVE file.
--- /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2022-48799.xml 2024-10-20 01:51:23.378499000 +0200
+++ /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2022-48799.xml.new 2024-10-29 01:38:15.811079000 +0100
@@ -14,13 +14,13 @@
1
- 31
- 2024-10-19T23:51:22Z
+ 32
+ 2024-10-29T00:38:15Z
current
2024-07-16T23:43:19Z
- 2024-10-19T23:51:22Z
+ 2024-10-29T00:38:15Z
cve-database/bin/generate-cvrf-cve.pl
2020-12-27T01:00:00Z
@@ -110,6 +110,21 @@
Container suse/sle-micro/rt-5.5:2.0.4-4.5.134
+
+
+ Image SLES12-SP5-GCE-BYOS
+
+
+
+
+ Image SLES12-SP5-GCE-SAP-BYOS
+
+
+
+
+ Image SLES12-SP5-GCE-SAP-On-Demand
+
+
Image SLES15-SP4-CHOST-BYOS
@@ -1713,6 +1728,39 @@
kernel-rt-5.14.21-150500.13.64.1 as a component of Container suse/sle-micro/rt-5.5:2.0.4-4.5.134
+
+ kernel-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-BYOS
+
+
+ cluster-md-kmp-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ dlm-kmp-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ gfs2-kmp-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ kernel-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ ocfs2-kmp-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ cluster-md-kmp-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
+
+ dlm-kmp-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
+
+ gfs2-kmp-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
+
+ kernel-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
+
+ ocfs2-kmp-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
kernel-default-5.14.21-150400.24.128.1 as a component of Image SLES15-SP4-CHOST-BYOS
@@ -3610,6 +3658,17 @@
Container suse/sle-micro-rancher/5.4:latest:kernel-default-5.14.21-150400.24.128.1
Container suse/sle-micro/kvm-5.5:2.0.4-3.5.128:kernel-default-base-5.14.21-150500.55.73.1.150500.6.33.8
Container suse/sle-micro/rt-5.5:2.0.4-4.5.134:kernel-rt-5.14.21-150500.13.64.1
+ Image SLES12-SP5-GCE-BYOS:kernel-default-4.12.14-122.231.1
+ Image SLES12-SP5-GCE-SAP-BYOS:cluster-md-kmp-default-4.12.14-122.231.1
+ Image SLES12-SP5-GCE-SAP-BYOS:dlm-kmp-default-4.12.14-122.231.1
+ Image SLES12-SP5-GCE-SAP-BYOS:gfs2-kmp-default-4.12.14-122.231.1
+ Image SLES12-SP5-GCE-SAP-BYOS:kernel-default-4.12.14-122.231.1
+ Image SLES12-SP5-GCE-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.231.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:cluster-md-kmp-default-4.12.14-122.231.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:dlm-kmp-default-4.12.14-122.231.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:gfs2-kmp-default-4.12.14-122.231.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:kernel-default-4.12.14-122.231.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:ocfs2-kmp-default-4.12.14-122.231.1
Image SLES15-SP4-CHOST-BYOS:kernel-default-5.14.21-150400.24.128.1
Image SLES15-SP4-CHOST-BYOS-Aliyun:kernel-default-5.14.21-150400.24.128.1
Image SLES15-SP4-CHOST-BYOS-Azure:kernel-default-5.14.21-150400.24.128.1
no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2022-48794
skipping CVE-2022-48798 as CVE page is older than CVRF-CVE file.
skipping CVE-2022-48797 as CVE page is older than CVRF-CVE file.
skipping CVE-2022-48796 as CVE page is older than CVRF-CVE file.
skipping CVE-2022-48795 as CVE page is older than CVRF-CVE file.
--- /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2022-48794.xml 2024-10-20 01:51:26.441846000 +0200
+++ /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2022-48794.xml.new 2024-10-29 01:38:16.837042000 +0100
@@ -14,13 +14,13 @@
1
- 28
- 2024-10-19T23:51:26Z
+ 29
+ 2024-10-29T00:38:16Z
current
2024-07-17T23:31:29Z
- 2024-10-19T23:51:26Z
+ 2024-10-29T00:38:16Z
cve-database/bin/generate-cvrf-cve.pl
2020-12-27T01:00:00Z
@@ -126,6 +126,21 @@
Image SLES12-SP5-EC2-BYOS
+
+
+ Image SLES12-SP5-GCE-BYOS
+
+
+
+
+ Image SLES12-SP5-GCE-SAP-BYOS
+
+
+
+
+ Image SLES12-SP5-GCE-SAP-On-Demand
+
+
Image SLES12-SP5-SAP-Azure-LI-BYOS-Production
@@ -1738,6 +1753,39 @@
kernel-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-EC2-BYOS
+
+ kernel-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-BYOS
+
+
+ cluster-md-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ dlm-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ gfs2-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ kernel-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ ocfs2-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ cluster-md-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
+
+ dlm-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
+
+ gfs2-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
+
+ kernel-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
+
+ ocfs2-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
cluster-md-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-SAP-Azure-LI-BYOS-Production
@@ -3475,18 +3523,6 @@
kernel-default as a component of SUSE Linux Enterprise Server for SAP Applications 12 SP5
-
- kernel-default-base as a component of SUSE Linux Enterprise Server for SAP Applications 12 SP5
-
-
- kernel-default-devel as a component of SUSE Linux Enterprise Server for SAP Applications 12 SP5
-
-
- kernel-devel as a component of SUSE Linux Enterprise Server for SAP Applications 12 SP5
-
-
- kernel-macros as a component of SUSE Linux Enterprise Server for SAP Applications 12 SP5
-
kernel-source as a component of SUSE Linux Enterprise Server for SAP Applications 12 SP5
@@ -3634,6 +3670,17 @@
Image SLES12-SP5-Azure-SAP-BYOS:kernel-default-4.12.14-122.225.1
Image SLES12-SP5-Azure-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.225.1
Image SLES12-SP5-EC2-BYOS:kernel-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-BYOS:kernel-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-BYOS:cluster-md-kmp-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-BYOS:dlm-kmp-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-BYOS:gfs2-kmp-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-BYOS:kernel-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:cluster-md-kmp-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:dlm-kmp-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:gfs2-kmp-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:kernel-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:ocfs2-kmp-default-4.12.14-122.225.1
Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:cluster-md-kmp-default-4.12.14-122.225.1
Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:dlm-kmp-default-4.12.14-122.225.1
Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:gfs2-kmp-default-4.12.14-122.225.1
@@ -4215,10 +4262,6 @@
SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros
SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source
SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default
- SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base
- SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel
- SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel
- SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros
SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source
SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default
SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel
notsure where Teradata 12-SP3 LTSS Extension is contained?
no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2022-48792
skipping CVE-2022-48793 as CVE page is older than CVRF-CVE file.
--- /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2022-48792.xml 2024-10-20 01:51:27.812779000 +0200
+++ /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2022-48792.xml.new 2024-10-29 01:38:17.824949000 +0100
@@ -14,13 +14,13 @@
1
- 35
- 2024-10-19T23:51:27Z
+ 36
+ 2024-10-29T00:38:17Z
current
2024-07-17T23:31:29Z
- 2024-10-19T23:51:27Z
+ 2024-10-29T00:38:17Z
cve-database/bin/generate-cvrf-cve.pl
2020-12-27T01:00:00Z
@@ -148,6 +148,21 @@
Image SLES12-SP5-EC2-BYOS
+
+
+ Image SLES12-SP5-GCE-BYOS
+
+
+
+
+ Image SLES12-SP5-GCE-SAP-BYOS
+
+
+
+
+ Image SLES12-SP5-GCE-SAP-On-Demand
+
+
Image SLES12-SP5-SAP-Azure-LI-BYOS-Production
@@ -2056,6 +2071,39 @@
kernel-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-EC2-BYOS
+
+ kernel-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-BYOS
+
+
+ cluster-md-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ dlm-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ gfs2-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ kernel-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ ocfs2-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ cluster-md-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
+
+ dlm-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
+
+ gfs2-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
+
+ kernel-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
+
+ ocfs2-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
cluster-md-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-SAP-Azure-LI-BYOS-Production
@@ -4180,18 +4228,6 @@
kernel-default as a component of SUSE Linux Enterprise Server for SAP Applications 12 SP5
-
- kernel-default-base as a component of SUSE Linux Enterprise Server for SAP Applications 12 SP5
-
-
- kernel-default-devel as a component of SUSE Linux Enterprise Server for SAP Applications 12 SP5
-
-
- kernel-devel as a component of SUSE Linux Enterprise Server for SAP Applications 12 SP5
-
-
- kernel-macros as a component of SUSE Linux Enterprise Server for SAP Applications 12 SP5
-
kernel-source as a component of SUSE Linux Enterprise Server for SAP Applications 12 SP5
@@ -4315,6 +4351,17 @@
Image SLES12-SP5-Azure-SAP-BYOS:kernel-default-4.12.14-122.225.1
Image SLES12-SP5-Azure-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.225.1
Image SLES12-SP5-EC2-BYOS:kernel-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-BYOS:kernel-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-BYOS:cluster-md-kmp-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-BYOS:dlm-kmp-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-BYOS:gfs2-kmp-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-BYOS:kernel-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:cluster-md-kmp-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:dlm-kmp-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:gfs2-kmp-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:kernel-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:ocfs2-kmp-default-4.12.14-122.225.1
Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:cluster-md-kmp-default-4.12.14-122.225.1
Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:dlm-kmp-default-4.12.14-122.225.1
Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:gfs2-kmp-default-4.12.14-122.225.1
no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2022-48791
--- /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2022-48791.xml 2024-10-20 01:51:28.508714000 +0200
+++ /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2022-48791.xml.new 2024-10-29 01:38:18.992938000 +0100
@@ -14,13 +14,13 @@
1
- 38
- 2024-10-19T23:51:28Z
+ 39
+ 2024-10-29T00:38:18Z
current
2024-07-17T23:31:29Z
- 2024-10-19T23:51:28Z
+ 2024-10-29T00:38:18Z
cve-database/bin/generate-cvrf-cve.pl
2020-12-27T01:00:00Z
@@ -130,6 +130,21 @@
Container suse/sle-micro/rt-5.5:2.0.4-4.5.134
+
+
+ Image SLES12-SP5-GCE-BYOS
+
+
+
+
+ Image SLES12-SP5-GCE-SAP-BYOS
+
+
+
+
+ Image SLES12-SP5-GCE-SAP-On-Demand
+
+
Image SLES15-SP4-CHOST-BYOS
@@ -1912,6 +1927,39 @@
kernel-rt-5.14.21-150500.13.64.1 as a component of Container suse/sle-micro/rt-5.5:2.0.4-4.5.134
+
+ kernel-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-BYOS
+
+
+ cluster-md-kmp-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ dlm-kmp-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ gfs2-kmp-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ kernel-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ ocfs2-kmp-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ cluster-md-kmp-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
+
+ dlm-kmp-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
+
+ gfs2-kmp-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
+
+ kernel-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
+
+ ocfs2-kmp-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
kernel-default-5.14.21-150400.24.128.1 as a component of Image SLES15-SP4-CHOST-BYOS
@@ -4007,6 +4055,17 @@
Container suse/sle-micro-rancher/5.4:latest:kernel-default-5.14.21-150400.24.128.1
Container suse/sle-micro/kvm-5.5:2.0.4-3.5.128:kernel-default-base-5.14.21-150500.55.73.1.150500.6.33.8
Container suse/sle-micro/rt-5.5:2.0.4-4.5.134:kernel-rt-5.14.21-150500.13.64.1
+ Image SLES12-SP5-GCE-BYOS:kernel-default-4.12.14-122.231.1
+ Image SLES12-SP5-GCE-SAP-BYOS:cluster-md-kmp-default-4.12.14-122.231.1
+ Image SLES12-SP5-GCE-SAP-BYOS:dlm-kmp-default-4.12.14-122.231.1
+ Image SLES12-SP5-GCE-SAP-BYOS:gfs2-kmp-default-4.12.14-122.231.1
+ Image SLES12-SP5-GCE-SAP-BYOS:kernel-default-4.12.14-122.231.1
+ Image SLES12-SP5-GCE-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.231.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:cluster-md-kmp-default-4.12.14-122.231.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:dlm-kmp-default-4.12.14-122.231.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:gfs2-kmp-default-4.12.14-122.231.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:kernel-default-4.12.14-122.231.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:ocfs2-kmp-default-4.12.14-122.231.1
Image SLES15-SP4-CHOST-BYOS:kernel-default-5.14.21-150400.24.128.1
Image SLES15-SP4-CHOST-BYOS-Aliyun:kernel-default-5.14.21-150400.24.128.1
Image SLES15-SP4-CHOST-BYOS-Azure:kernel-default-5.14.21-150400.24.128.1
no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2022-48790
--- /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2022-48790.xml 2024-10-20 01:51:29.192680000 +0200
+++ /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2022-48790.xml.new 2024-10-29 01:38:19.755867000 +0100
@@ -14,13 +14,13 @@
1
- 38
- 2024-10-19T23:51:28Z
+ 39
+ 2024-10-29T00:38:19Z
current
2024-07-16T23:43:19Z
- 2024-10-19T23:51:28Z
+ 2024-10-29T00:38:19Z
cve-database/bin/generate-cvrf-cve.pl
2020-12-27T01:00:00Z
@@ -135,6 +135,21 @@
Container suse/sle-micro/rt-5.5:2.0.4-4.5.134
+
+
+ Image SLES12-SP5-GCE-BYOS
+
+
+
+
+ Image SLES12-SP5-GCE-SAP-BYOS
+
+
+
+
+ Image SLES12-SP5-GCE-SAP-On-Demand
+
+
Image SLES15-SP4-CHOST-BYOS
@@ -1813,6 +1828,39 @@
kernel-rt-5.14.21-150500.13.64.1 as a component of Container suse/sle-micro/rt-5.5:2.0.4-4.5.134
+
+ kernel-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-BYOS
+
+
+ cluster-md-kmp-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ dlm-kmp-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ gfs2-kmp-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ kernel-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ ocfs2-kmp-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ cluster-md-kmp-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
+
+ dlm-kmp-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
+
+ gfs2-kmp-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
+
+ kernel-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
+
+ ocfs2-kmp-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
kernel-default-5.14.21-150400.24.128.1 as a component of Image SLES15-SP4-CHOST-BYOS
@@ -3778,18 +3826,6 @@
kernel-default as a component of SUSE Linux Enterprise Server for SAP Applications 12 SP5
-
- kernel-default-base as a component of SUSE Linux Enterprise Server for SAP Applications 12 SP5
-
-
- kernel-default-devel as a component of SUSE Linux Enterprise Server for SAP Applications 12 SP5
-
-
- kernel-devel as a component of SUSE Linux Enterprise Server for SAP Applications 12 SP5
-
-
- kernel-macros as a component of SUSE Linux Enterprise Server for SAP Applications 12 SP5
-
kernel-source as a component of SUSE Linux Enterprise Server for SAP Applications 12 SP5
@@ -3948,6 +3984,17 @@
Container suse/sle-micro-rancher/5.4:latest:kernel-default-5.14.21-150400.24.128.1
Container suse/sle-micro/kvm-5.5:2.0.4-3.5.128:kernel-default-base-5.14.21-150500.55.73.1.150500.6.33.8
Container suse/sle-micro/rt-5.5:2.0.4-4.5.134:kernel-rt-5.14.21-150500.13.64.1
+ Image SLES12-SP5-GCE-BYOS:kernel-default-4.12.14-122.231.1
+ Image SLES12-SP5-GCE-SAP-BYOS:cluster-md-kmp-default-4.12.14-122.231.1
+ Image SLES12-SP5-GCE-SAP-BYOS:dlm-kmp-default-4.12.14-122.231.1
+ Image SLES12-SP5-GCE-SAP-BYOS:gfs2-kmp-default-4.12.14-122.231.1
+ Image SLES12-SP5-GCE-SAP-BYOS:kernel-default-4.12.14-122.231.1
+ Image SLES12-SP5-GCE-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.231.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:cluster-md-kmp-default-4.12.14-122.231.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:dlm-kmp-default-4.12.14-122.231.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:gfs2-kmp-default-4.12.14-122.231.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:kernel-default-4.12.14-122.231.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:ocfs2-kmp-default-4.12.14-122.231.1
Image SLES15-SP4-CHOST-BYOS:kernel-default-5.14.21-150400.24.128.1
Image SLES15-SP4-CHOST-BYOS-Aliyun:kernel-default-5.14.21-150400.24.128.1
Image SLES15-SP4-CHOST-BYOS-Azure:kernel-default-5.14.21-150400.24.128.1
no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2022-48789
--- /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2022-48789.xml 2024-10-20 01:51:29.963649000 +0200
+++ /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2022-48789.xml.new 2024-10-29 01:38:20.575837000 +0100
@@ -14,13 +14,13 @@
1
- 36
- 2024-10-19T23:51:29Z
+ 37
+ 2024-10-29T00:38:20Z
current
2024-07-17T23:31:30Z
- 2024-10-19T23:51:29Z
+ 2024-10-29T00:38:20Z
cve-database/bin/generate-cvrf-cve.pl
2020-12-27T01:00:00Z
@@ -118,6 +118,21 @@
Container suse/sle-micro/rt-5.5:2.0.4-4.5.134
+
+
+ Image SLES12-SP5-GCE-BYOS
+
+
+
+
+ Image SLES12-SP5-GCE-SAP-BYOS
+
+
+
+
+ Image SLES12-SP5-GCE-SAP-On-Demand
+
+
Image SLES15-SP4-CHOST-BYOS
@@ -1796,6 +1811,39 @@
kernel-rt-5.14.21-150500.13.64.1 as a component of Container suse/sle-micro/rt-5.5:2.0.4-4.5.134
+
+ kernel-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-BYOS
+
+
+ cluster-md-kmp-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ dlm-kmp-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ gfs2-kmp-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ kernel-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ ocfs2-kmp-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ cluster-md-kmp-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
+
+ dlm-kmp-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
+
+ gfs2-kmp-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
+
+ kernel-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
+
+ ocfs2-kmp-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
kernel-default-5.14.21-150400.24.128.1 as a component of Image SLES15-SP4-CHOST-BYOS
@@ -3761,18 +3809,6 @@
kernel-default as a component of SUSE Linux Enterprise Server for SAP Applications 12 SP5
-
- kernel-default-base as a component of SUSE Linux Enterprise Server for SAP Applications 12 SP5
-
-
- kernel-default-devel as a component of SUSE Linux Enterprise Server for SAP Applications 12 SP5
-
-
- kernel-devel as a component of SUSE Linux Enterprise Server for SAP Applications 12 SP5
-
-
- kernel-macros as a component of SUSE Linux Enterprise Server for SAP Applications 12 SP5
-
kernel-source as a component of SUSE Linux Enterprise Server for SAP Applications 12 SP5
@@ -3914,6 +3950,17 @@
Container suse/sle-micro-rancher/5.4:latest:kernel-default-5.14.21-150400.24.128.1
Container suse/sle-micro/kvm-5.5:2.0.4-3.5.128:kernel-default-base-5.14.21-150500.55.73.1.150500.6.33.8
Container suse/sle-micro/rt-5.5:2.0.4-4.5.134:kernel-rt-5.14.21-150500.13.64.1
+ Image SLES12-SP5-GCE-BYOS:kernel-default-4.12.14-122.231.1
+ Image SLES12-SP5-GCE-SAP-BYOS:cluster-md-kmp-default-4.12.14-122.231.1
+ Image SLES12-SP5-GCE-SAP-BYOS:dlm-kmp-default-4.12.14-122.231.1
+ Image SLES12-SP5-GCE-SAP-BYOS:gfs2-kmp-default-4.12.14-122.231.1
+ Image SLES12-SP5-GCE-SAP-BYOS:kernel-default-4.12.14-122.231.1
+ Image SLES12-SP5-GCE-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.231.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:cluster-md-kmp-default-4.12.14-122.231.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:dlm-kmp-default-4.12.14-122.231.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:gfs2-kmp-default-4.12.14-122.231.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:kernel-default-4.12.14-122.231.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:ocfs2-kmp-default-4.12.14-122.231.1
Image SLES15-SP4-CHOST-BYOS:kernel-default-5.14.21-150400.24.128.1
Image SLES15-SP4-CHOST-BYOS-Aliyun:kernel-default-5.14.21-150400.24.128.1
Image SLES15-SP4-CHOST-BYOS-Azure:kernel-default-5.14.21-150400.24.128.1
no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2022-48788
--- /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2022-48788.xml 2024-10-20 01:51:30.672601000 +0200
+++ /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2022-48788.xml.new 2024-10-29 01:38:21.500805000 +0100
@@ -14,13 +14,13 @@
1
- 37
- 2024-10-19T23:51:30Z
+ 38
+ 2024-10-29T00:38:20Z
current
2024-07-16T23:43:20Z
- 2024-10-19T23:51:30Z
+ 2024-10-29T00:38:20Z
cve-database/bin/generate-cvrf-cve.pl
2020-12-27T01:00:00Z
@@ -118,6 +118,21 @@
Container suse/sle-micro/rt-5.5:2.0.4-4.5.134
+
+
+ Image SLES12-SP5-GCE-BYOS
+
+
+
+
+ Image SLES12-SP5-GCE-SAP-BYOS
+
+
+
+
+ Image SLES12-SP5-GCE-SAP-On-Demand
+
+
Image SLES15-SP4-CHOST-BYOS
@@ -1801,6 +1816,39 @@
kernel-rt-5.14.21-150500.13.64.1 as a component of Container suse/sle-micro/rt-5.5:2.0.4-4.5.134
+
+ kernel-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-BYOS
+
+
+ cluster-md-kmp-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ dlm-kmp-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ gfs2-kmp-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ kernel-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ ocfs2-kmp-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ cluster-md-kmp-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
+
+ dlm-kmp-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
+
+ gfs2-kmp-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
+
+ kernel-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
+
+ ocfs2-kmp-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
kernel-default-5.14.21-150400.24.128.1 as a component of Image SLES15-SP4-CHOST-BYOS
@@ -3904,6 +3952,17 @@
Container suse/sle-micro-rancher/5.4:latest:kernel-default-5.14.21-150400.24.128.1
Container suse/sle-micro/kvm-5.5:2.0.4-3.5.128:kernel-default-base-5.14.21-150500.55.73.1.150500.6.33.8
Container suse/sle-micro/rt-5.5:2.0.4-4.5.134:kernel-rt-5.14.21-150500.13.64.1
+ Image SLES12-SP5-GCE-BYOS:kernel-default-4.12.14-122.231.1
+ Image SLES12-SP5-GCE-SAP-BYOS:cluster-md-kmp-default-4.12.14-122.231.1
+ Image SLES12-SP5-GCE-SAP-BYOS:dlm-kmp-default-4.12.14-122.231.1
+ Image SLES12-SP5-GCE-SAP-BYOS:gfs2-kmp-default-4.12.14-122.231.1
+ Image SLES12-SP5-GCE-SAP-BYOS:kernel-default-4.12.14-122.231.1
+ Image SLES12-SP5-GCE-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.231.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:cluster-md-kmp-default-4.12.14-122.231.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:dlm-kmp-default-4.12.14-122.231.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:gfs2-kmp-default-4.12.14-122.231.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:kernel-default-4.12.14-122.231.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:ocfs2-kmp-default-4.12.14-122.231.1
Image SLES15-SP4-CHOST-BYOS:kernel-default-5.14.21-150400.24.128.1
Image SLES15-SP4-CHOST-BYOS-Aliyun:kernel-default-5.14.21-150400.24.128.1
Image SLES15-SP4-CHOST-BYOS-Azure:kernel-default-5.14.21-150400.24.128.1
no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2022-48786
skipping CVE-2022-48787 as CVE page is older than CVRF-CVE file.
--- /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2022-48786.xml 2024-10-20 01:51:32.058536000 +0200
+++ /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2022-48786.xml.new 2024-10-29 01:38:22.394729000 +0100
@@ -14,13 +14,13 @@
1
- 32
- 2024-10-19T23:51:31Z
+ 33
+ 2024-10-29T00:38:21Z
current
2024-07-17T23:31:32Z
- 2024-10-19T23:51:31Z
+ 2024-10-29T00:38:21Z
cve-database/bin/generate-cvrf-cve.pl
2020-12-27T01:00:00Z
@@ -119,6 +119,21 @@
Image SLES12-SP5-Azure-SAP-BYOS
+
+
+ Image SLES12-SP5-GCE-BYOS
+
+
+
+
+ Image SLES12-SP5-GCE-SAP-BYOS
+
+
+
+
+ Image SLES12-SP5-GCE-SAP-On-Demand
+
+
Image SLES15-SP4-CHOST-BYOS
@@ -1735,6 +1750,39 @@
ocfs2-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-Azure-SAP-BYOS
+
+ kernel-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-BYOS
+
+
+ cluster-md-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ dlm-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ gfs2-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ kernel-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ ocfs2-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ cluster-md-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
+
+ dlm-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
+
+ gfs2-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
+
+ kernel-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
+
+ ocfs2-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
kernel-default-5.14.21-150400.24.128.1 as a component of Image SLES15-SP4-CHOST-BYOS
@@ -3644,6 +3692,17 @@
Image SLES12-SP5-Azure-SAP-BYOS:gfs2-kmp-default-4.12.14-122.228.1
Image SLES12-SP5-Azure-SAP-BYOS:kernel-default-4.12.14-122.228.1
Image SLES12-SP5-Azure-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.228.1
+ Image SLES12-SP5-GCE-BYOS:kernel-default-4.12.14-122.228.1
+ Image SLES12-SP5-GCE-SAP-BYOS:cluster-md-kmp-default-4.12.14-122.228.1
+ Image SLES12-SP5-GCE-SAP-BYOS:dlm-kmp-default-4.12.14-122.228.1
+ Image SLES12-SP5-GCE-SAP-BYOS:gfs2-kmp-default-4.12.14-122.228.1
+ Image SLES12-SP5-GCE-SAP-BYOS:kernel-default-4.12.14-122.228.1
+ Image SLES12-SP5-GCE-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.228.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:cluster-md-kmp-default-4.12.14-122.228.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:dlm-kmp-default-4.12.14-122.228.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:gfs2-kmp-default-4.12.14-122.228.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:kernel-default-4.12.14-122.228.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:ocfs2-kmp-default-4.12.14-122.228.1
Image SLES15-SP4-CHOST-BYOS:kernel-default-5.14.21-150400.24.128.1
Image SLES15-SP4-CHOST-BYOS-Aliyun:kernel-default-5.14.21-150400.24.128.1
Image SLES15-SP4-CHOST-BYOS-Azure:kernel-default-5.14.21-150400.24.128.1
no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2022-48775
skipping CVE-2022-48785 as CVE page is older than CVRF-CVE file.
skipping CVE-2022-48784 as CVE page is older than CVRF-CVE file.
skipping CVE-2022-48783 as CVE page is older than CVRF-CVE file.
skipping CVE-2022-48782 as CVE page is older than CVRF-CVE file.
skipping CVE-2022-48781 as CVE page is older than CVRF-CVE file.
skipping CVE-2022-48780 as CVE page is older than CVRF-CVE file.
skipping CVE-2022-48779 as CVE page is older than CVRF-CVE file.
skipping CVE-2022-48778 as CVE page is older than CVRF-CVE file.
skipping CVE-2022-48777 as CVE page is older than CVRF-CVE file.
skipping CVE-2022-48776 as CVE page is older than CVRF-CVE file.
--- /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2022-48775.xml 2024-10-20 01:51:38.284704000 +0200
+++ /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2022-48775.xml.new 2024-10-29 01:38:23.240677000 +0100
@@ -14,13 +14,13 @@
1
- 36
- 2024-10-19T23:51:37Z
+ 37
+ 2024-10-29T00:38:22Z
current
2024-07-16T23:43:23Z
- 2024-10-19T23:51:37Z
+ 2024-10-29T00:38:22Z
cve-database/bin/generate-cvrf-cve.pl
2020-12-27T01:00:00Z
@@ -133,6 +133,21 @@
Image SLES12-SP5-EC2-BYOS
+
+
+ Image SLES12-SP5-GCE-BYOS
+
+
+
+
+ Image SLES12-SP5-GCE-SAP-BYOS
+
+
+
+
+ Image SLES12-SP5-GCE-SAP-On-Demand
+
+
Image SLES12-SP5-SAP-Azure-LI-BYOS-Production
@@ -1848,6 +1863,39 @@
kernel-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-EC2-BYOS
+
+ kernel-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-BYOS
+
+
+ cluster-md-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ dlm-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ gfs2-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ kernel-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ ocfs2-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ cluster-md-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
+
+ dlm-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
+
+ gfs2-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
+
+ kernel-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
+
+ ocfs2-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
cluster-md-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-SAP-Azure-LI-BYOS-Production
@@ -3798,18 +3846,6 @@
kernel-default as a component of SUSE Linux Enterprise Server for SAP Applications 12 SP5
-
- kernel-default-base as a component of SUSE Linux Enterprise Server for SAP Applications 12 SP5
-
-
- kernel-default-devel as a component of SUSE Linux Enterprise Server for SAP Applications 12 SP5
-
-
- kernel-devel as a component of SUSE Linux Enterprise Server for SAP Applications 12 SP5
-
-
- kernel-macros as a component of SUSE Linux Enterprise Server for SAP Applications 12 SP5
-
kernel-source as a component of SUSE Linux Enterprise Server for SAP Applications 12 SP5
@@ -3952,6 +3988,17 @@
Image SLES12-SP5-Azure-SAP-BYOS:kernel-default-4.12.14-122.225.1
Image SLES12-SP5-Azure-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.225.1
Image SLES12-SP5-EC2-BYOS:kernel-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-BYOS:kernel-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-BYOS:cluster-md-kmp-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-BYOS:dlm-kmp-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-BYOS:gfs2-kmp-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-BYOS:kernel-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:cluster-md-kmp-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:dlm-kmp-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:gfs2-kmp-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:kernel-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:ocfs2-kmp-default-4.12.14-122.225.1
Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:cluster-md-kmp-default-4.12.14-122.225.1
Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:dlm-kmp-default-4.12.14-122.225.1
Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:gfs2-kmp-default-4.12.14-122.225.1
skipping CVE-2022-48774 as CVE page is older than CVRF-CVE file.
skipping CVE-2022-48773 as CVE page is older than CVRF-CVE file.
no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2022-48769
skipping CVE-2022-48771 as CVE page is older than CVRF-CVE file.
skipping CVE-2022-48770 as CVE page is older than CVRF-CVE file.
--- /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2022-48769.xml 2024-10-20 01:51:41.890511000 +0200
+++ /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2022-48769.xml.new 2024-10-29 01:38:24.571137000 +0100
@@ -14,13 +14,13 @@
1
- 38
- 2024-10-19T23:51:41Z
+ 39
+ 2024-10-29T00:38:24Z
current
2024-06-20T23:31:36Z
- 2024-10-19T23:51:41Z
+ 2024-10-29T00:38:24Z
cve-database/bin/generate-cvrf-cve.pl
2020-12-27T01:00:00Z
@@ -126,6 +126,21 @@
Image SLES12-SP5-Azure-SAP-BYOS
+
+
+ Image SLES12-SP5-GCE-BYOS
+
+
+
+
+ Image SLES12-SP5-GCE-SAP-BYOS
+
+
+
+
+ Image SLES12-SP5-GCE-SAP-On-Demand
+
+
Image SLES15-SP4-CHOST-BYOS
@@ -1747,6 +1762,39 @@
ocfs2-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-Azure-SAP-BYOS
+
+ kernel-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-BYOS
+
+
+ cluster-md-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ dlm-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ gfs2-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ kernel-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ ocfs2-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ cluster-md-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
+
+ dlm-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
+
+ gfs2-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
+
+ kernel-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
+
+ ocfs2-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
kernel-default-5.14.21-150400.24.128.1 as a component of Image SLES15-SP4-CHOST-BYOS
@@ -3666,6 +3714,17 @@
Image SLES12-SP5-Azure-SAP-BYOS:gfs2-kmp-default-4.12.14-122.228.1
Image SLES12-SP5-Azure-SAP-BYOS:kernel-default-4.12.14-122.228.1
Image SLES12-SP5-Azure-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.228.1
+ Image SLES12-SP5-GCE-BYOS:kernel-default-4.12.14-122.228.1
+ Image SLES12-SP5-GCE-SAP-BYOS:cluster-md-kmp-default-4.12.14-122.228.1
+ Image SLES12-SP5-GCE-SAP-BYOS:dlm-kmp-default-4.12.14-122.228.1
+ Image SLES12-SP5-GCE-SAP-BYOS:gfs2-kmp-default-4.12.14-122.228.1
+ Image SLES12-SP5-GCE-SAP-BYOS:kernel-default-4.12.14-122.228.1
+ Image SLES12-SP5-GCE-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.228.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:cluster-md-kmp-default-4.12.14-122.228.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:dlm-kmp-default-4.12.14-122.228.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:gfs2-kmp-default-4.12.14-122.228.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:kernel-default-4.12.14-122.228.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:ocfs2-kmp-default-4.12.14-122.228.1
Image SLES15-SP4-CHOST-BYOS:kernel-default-5.14.21-150400.24.128.1
Image SLES15-SP4-CHOST-BYOS-Aliyun:kernel-default-5.14.21-150400.24.128.1
Image SLES15-SP4-CHOST-BYOS-Azure:kernel-default-5.14.21-150400.24.128.1
no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2022-48751
skipping CVE-2022-48768 as CVE page is older than CVRF-CVE file.
skipping CVE-2022-48767 as CVE page is older than CVRF-CVE file.
skipping CVE-2022-48766 as CVE page is older than CVRF-CVE file.
skipping CVE-2022-48765 as CVE page is older than CVRF-CVE file.
skipping CVE-2022-48764 as CVE page is older than CVRF-CVE file.
skipping CVE-2022-48763 as CVE page is older than CVRF-CVE file.
skipping CVE-2022-48762 as CVE page is older than CVRF-CVE file.
skipping CVE-2022-48761 as CVE page is older than CVRF-CVE file.
skipping CVE-2022-48760 as CVE page is older than CVRF-CVE file.
skipping CVE-2022-48759 as CVE page is older than CVRF-CVE file.
skipping CVE-2022-48758 as CVE page is older than CVRF-CVE file.
skipping CVE-2022-48757 as CVE page is older than CVRF-CVE file.
skipping CVE-2022-48756 as CVE page is older than CVRF-CVE file.
skipping CVE-2022-48755 as CVE page is older than CVRF-CVE file.
skipping CVE-2022-48754 as CVE page is older than CVRF-CVE file.
skipping CVE-2022-48753 as CVE page is older than CVRF-CVE file.
skipping CVE-2022-48752 as CVE page is older than CVRF-CVE file.
--- /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2022-48751.xml 2024-10-20 01:51:52.420459000 +0200
+++ /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2022-48751.xml.new 2024-10-29 01:38:25.511087000 +0100
@@ -14,13 +14,13 @@
1
- 39
- 2024-10-19T23:51:52Z
+ 40
+ 2024-10-29T00:38:24Z
current
2024-06-20T23:31:37Z
- 2024-10-19T23:51:52Z
+ 2024-10-29T00:38:24Z
cve-database/bin/generate-cvrf-cve.pl
2020-12-27T01:00:00Z
@@ -129,6 +129,21 @@
Image SLES12-SP5-Azure-SAP-BYOS
+
+
+ Image SLES12-SP5-GCE-BYOS
+
+
+
+
+ Image SLES12-SP5-GCE-SAP-BYOS
+
+
+
+
+ Image SLES12-SP5-GCE-SAP-On-Demand
+
+
Image SLES15-SP4-CHOST-BYOS
@@ -1750,6 +1765,39 @@
ocfs2-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-Azure-SAP-BYOS
+
+ kernel-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-BYOS
+
+
+ cluster-md-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ dlm-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ gfs2-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ kernel-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ ocfs2-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ cluster-md-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
+
+ dlm-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
+
+ gfs2-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
+
+ kernel-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
+
+ ocfs2-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
kernel-default-5.14.21-150400.24.128.1 as a component of Image SLES15-SP4-CHOST-BYOS
@@ -3672,6 +3720,17 @@
Image SLES12-SP5-Azure-SAP-BYOS:gfs2-kmp-default-4.12.14-122.228.1
Image SLES12-SP5-Azure-SAP-BYOS:kernel-default-4.12.14-122.228.1
Image SLES12-SP5-Azure-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.228.1
+ Image SLES12-SP5-GCE-BYOS:kernel-default-4.12.14-122.228.1
+ Image SLES12-SP5-GCE-SAP-BYOS:cluster-md-kmp-default-4.12.14-122.228.1
+ Image SLES12-SP5-GCE-SAP-BYOS:dlm-kmp-default-4.12.14-122.228.1
+ Image SLES12-SP5-GCE-SAP-BYOS:gfs2-kmp-default-4.12.14-122.228.1
+ Image SLES12-SP5-GCE-SAP-BYOS:kernel-default-4.12.14-122.228.1
+ Image SLES12-SP5-GCE-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.228.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:cluster-md-kmp-default-4.12.14-122.228.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:dlm-kmp-default-4.12.14-122.228.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:gfs2-kmp-default-4.12.14-122.228.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:kernel-default-4.12.14-122.228.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:ocfs2-kmp-default-4.12.14-122.228.1
Image SLES15-SP4-CHOST-BYOS:kernel-default-5.14.21-150400.24.128.1
Image SLES15-SP4-CHOST-BYOS-Aliyun:kernel-default-5.14.21-150400.24.128.1
Image SLES15-SP4-CHOST-BYOS-Azure:kernel-default-5.14.21-150400.24.128.1
skipping CVE-2022-48750 as CVE page is older than CVRF-CVE file.
skipping CVE-2022-48749 as CVE page is older than CVRF-CVE file.
skipping CVE-2022-48748 as CVE page is older than CVRF-CVE file.
skipping CVE-2022-48747 as CVE page is older than CVRF-CVE file.
skipping CVE-2022-48746 as CVE page is older than CVRF-CVE file.
skipping CVE-2022-48745 as CVE page is older than CVRF-CVE file.
skipping CVE-2022-48744 as CVE page is older than CVRF-CVE file.
skipping CVE-2022-48743 as CVE page is older than CVRF-CVE file.
skipping CVE-2022-48742 as CVE page is older than CVRF-CVE file.
skipping CVE-2022-48741 as CVE page is older than CVRF-CVE file.
skipping CVE-2022-48740 as CVE page is older than CVRF-CVE file.
skipping CVE-2022-48739 as CVE page is older than CVRF-CVE file.
skipping CVE-2022-48738 as CVE page is older than CVRF-CVE file.
skipping CVE-2022-48737 as CVE page is older than CVRF-CVE file.
skipping CVE-2022-48736 as CVE page is older than CVRF-CVE file.
skipping CVE-2022-48735 as CVE page is older than CVRF-CVE file.
skipping CVE-2022-48734 as CVE page is older than CVRF-CVE file.
no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2022-48729
skipping CVE-2022-48732 as CVE page is older than CVRF-CVE file.
skipping CVE-2022-48731 as CVE page is older than CVRF-CVE file.
skipping CVE-2022-48730 as CVE page is older than CVRF-CVE file.
--- /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2022-48729.xml 2024-10-20 01:52:05.794781000 +0200
+++ /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2022-48729.xml.new 2024-10-29 01:38:26.951976000 +0100
@@ -14,13 +14,13 @@
1
- 31
- 2024-10-19T23:52:05Z
+ 32
+ 2024-10-29T00:38:26Z
current
2024-06-21T23:31:52Z
- 2024-10-19T23:52:05Z
+ 2024-10-29T00:38:26Z
cve-database/bin/generate-cvrf-cve.pl
2020-12-27T01:00:00Z
@@ -3186,24 +3186,9 @@
kernel-default as a component of SUSE Linux Enterprise Server for SAP Applications 12 SP5
-
- kernel-default-base as a component of SUSE Linux Enterprise Server for SAP Applications 12 SP5
-
-
- kernel-default-devel as a component of SUSE Linux Enterprise Server for SAP Applications 12 SP5
-
-
- kernel-devel as a component of SUSE Linux Enterprise Server for SAP Applications 12 SP5
-
-
- kernel-macros as a component of SUSE Linux Enterprise Server for SAP Applications 12 SP5
-
kernel-source as a component of SUSE Linux Enterprise Server for SAP Applications 12 SP5
-
- kernel-devel-azure as a component of SUSE Linux Enterprise Server for SAP Applications 12 SP5
-
kernel-source-azure as a component of SUSE Linux Enterprise Server for SAP Applications 12 SP5
@@ -3911,11 +3896,6 @@
SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros
SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source
SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default
- SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base
- SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel
- SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel
- SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure
- SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros
SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source
SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure
SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default
no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2022-48701
skipping CVE-2022-48728 as CVE page is older than CVRF-CVE file.
skipping CVE-2022-48727 as CVE page is older than CVRF-CVE file.
skipping CVE-2022-48726 as CVE page is older than CVRF-CVE file.
skipping CVE-2022-48725 as CVE page is older than CVRF-CVE file.
skipping CVE-2022-48724 as CVE page is older than CVRF-CVE file.
skipping CVE-2022-48723 as CVE page is older than CVRF-CVE file.
skipping CVE-2022-48722 as CVE page is older than CVRF-CVE file.
skipping CVE-2022-48721 as CVE page is older than CVRF-CVE file.
skipping CVE-2022-48720 as CVE page is older than CVRF-CVE file.
skipping CVE-2022-48719 as CVE page is older than CVRF-CVE file.
skipping CVE-2022-48718 as CVE page is older than CVRF-CVE file.
skipping CVE-2022-48717 as CVE page is older than CVRF-CVE file.
skipping CVE-2022-48716 as CVE page is older than CVRF-CVE file.
skipping CVE-2022-48715 as CVE page is older than CVRF-CVE file.
skipping CVE-2022-48714 as CVE page is older than CVRF-CVE file.
skipping CVE-2022-48713 as CVE page is older than CVRF-CVE file.
skipping CVE-2022-48712 as CVE page is older than CVRF-CVE file.
skipping CVE-2022-48711 as CVE page is older than CVRF-CVE file.
skipping CVE-2022-48710 as CVE page is older than CVRF-CVE file.
skipping CVE-2022-48709 as CVE page is older than CVRF-CVE file.
skipping CVE-2022-48708 as CVE page is older than CVRF-CVE file.
skipping CVE-2022-48707 as CVE page is older than CVRF-CVE file.
skipping CVE-2022-48706 as CVE page is older than CVRF-CVE file.
skipping CVE-2022-48705 as CVE page is older than CVRF-CVE file.
skipping CVE-2022-48704 as CVE page is older than CVRF-CVE file.
skipping CVE-2022-48703 as CVE page is older than CVRF-CVE file.
skipping CVE-2022-48702 as CVE page is older than CVRF-CVE file.
no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2022-48686
skipping CVE-2022-48700 as CVE page is older than CVRF-CVE file.
skipping CVE-2022-48699 as CVE page is older than CVRF-CVE file.
skipping CVE-2022-48698 as CVE page is older than CVRF-CVE file.
skipping CVE-2022-48697 as CVE page is older than CVRF-CVE file.
skipping CVE-2022-48696 as CVE page is older than CVRF-CVE file.
skipping CVE-2022-48695 as CVE page is older than CVRF-CVE file.
skipping CVE-2022-48694 as CVE page is older than CVRF-CVE file.
skipping CVE-2022-48693 as CVE page is older than CVRF-CVE file.
skipping CVE-2022-48692 as CVE page is older than CVRF-CVE file.
skipping CVE-2022-48691 as CVE page is older than CVRF-CVE file.
skipping CVE-2022-48690 as CVE page is older than CVRF-CVE file.
skipping CVE-2022-48689 as CVE page is older than CVRF-CVE file.
skipping CVE-2022-48688 as CVE page is older than CVRF-CVE file.
skipping CVE-2022-48687 as CVE page is older than CVRF-CVE file.
no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2022-48662
skipping CVE-2022-48675 as CVE page is older than CVRF-CVE file.
skipping CVE-2022-48674 as CVE page is older than CVRF-CVE file.
skipping CVE-2022-48673 as CVE page is older than CVRF-CVE file.
skipping CVE-2022-48672 as CVE page is older than CVRF-CVE file.
skipping CVE-2022-48671 as CVE page is older than CVRF-CVE file.
skipping CVE-2022-48670 as CVE page is older than CVRF-CVE file.
skipping CVE-2022-48669 as CVE page is older than CVRF-CVE file.
skipping CVE-2022-48668 as CVE page is older than CVRF-CVE file.
skipping CVE-2022-48667 as CVE page is older than CVRF-CVE file.
skipping CVE-2022-48666 as CVE page is older than CVRF-CVE file.
skipping CVE-2022-48665 as CVE page is older than CVRF-CVE file.
skipping CVE-2022-48664 as CVE page is older than CVRF-CVE file.
skipping CVE-2022-48663 as CVE page is older than CVRF-CVE file.
--- /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2022-48662.xml 2024-10-22 02:33:48.373548000 +0200
+++ /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2022-48662.xml.new 2024-10-29 01:38:28.967889000 +0100
@@ -14,13 +14,13 @@
1
- 52
- 2024-10-22T00:33:47Z
+ 53
+ 2024-10-29T00:38:28Z
current
2024-04-29T23:27:50Z
- 2024-10-22T00:33:47Z
+ 2024-10-29T00:38:28Z
cve-database/bin/generate-cvrf-cve.pl
2020-12-27T01:00:00Z
@@ -1680,15 +1680,24 @@
kernel-livepatch-5_14_21-150400_24_103-default-9-150400.2.2
+
+ kernel-livepatch-5_14_21-150400_24_108-default-10-150400.9.8.1
+
kernel-livepatch-5_14_21-150400_24_108-default-9-150400.9.8.1
kernel-livepatch-5_14_21-150400_24_111-default-7-150400.9.6.1
+
+ kernel-livepatch-5_14_21-150400_24_111-default-8-150400.9.6.1
+
kernel-livepatch-5_14_21-150400_24_116-default-7-150400.9.8.1
+
+ kernel-livepatch-5_14_21-150400_24_116-default-8-150400.9.8.1
+
kernel-livepatch-5_14_21-150400_24_119-default-1-150400.9.3.1
@@ -1725,15 +1734,24 @@
kernel-livepatch-5_14_21-150500_13_30-rt-10-150500.2.1
+
+ kernel-livepatch-5_14_21-150500_13_35-rt-10-150500.11.8.1
+
kernel-livepatch-5_14_21-150500_13_35-rt-9-150500.11.8.1
kernel-livepatch-5_14_21-150500_13_38-rt-7-150500.11.6.1
+
+ kernel-livepatch-5_14_21-150500_13_38-rt-8-150500.11.6.1
+
kernel-livepatch-5_14_21-150500_13_47-rt-7-150500.11.6.1
+
+ kernel-livepatch-5_14_21-150500_13_47-rt-8-150500.11.6.1
+
kernel-livepatch-5_14_21-150500_13_52-rt-1-150500.11.5.1
@@ -1758,15 +1776,24 @@
kernel-livepatch-5_14_21-150500_55_44-default-10-150500.2.2
+
+ kernel-livepatch-5_14_21-150500_55_49-default-10-150500.11.8.1
+
kernel-livepatch-5_14_21-150500_55_49-default-9-150500.11.8.1
kernel-livepatch-5_14_21-150500_55_52-default-7-150500.11.6.1
+
+ kernel-livepatch-5_14_21-150500_55_52-default-8-150500.11.6.1
+
kernel-livepatch-5_14_21-150500_55_59-default-7-150500.11.10.1
+
+ kernel-livepatch-5_14_21-150500_55_59-default-8-150500.11.10.1
+
kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2
@@ -3459,6 +3486,33 @@
kernel-rt-5.14.21-150500.13.58.1 as a component of openSUSE Leap Micro 5.5
+
+ kernel-livepatch-5_14_21-150400_24_108-default-10-150400.9.8.1 as a component of SUSE Linux Enterprise Live Patching 15 SP4
+
+
+ kernel-livepatch-5_14_21-150400_24_111-default-8-150400.9.6.1 as a component of SUSE Linux Enterprise Live Patching 15 SP4
+
+
+ kernel-livepatch-5_14_21-150400_24_116-default-8-150400.9.8.1 as a component of SUSE Linux Enterprise Live Patching 15 SP4
+
+
+ kernel-livepatch-5_14_21-150500_13_35-rt-10-150500.11.8.1 as a component of SUSE Linux Enterprise Live Patching 15 SP5
+
+
+ kernel-livepatch-5_14_21-150500_13_38-rt-8-150500.11.6.1 as a component of SUSE Linux Enterprise Live Patching 15 SP5
+
+
+ kernel-livepatch-5_14_21-150500_13_47-rt-8-150500.11.6.1 as a component of SUSE Linux Enterprise Live Patching 15 SP5
+
+
+ kernel-livepatch-5_14_21-150500_55_49-default-10-150500.11.8.1 as a component of SUSE Linux Enterprise Live Patching 15 SP5
+
+
+ kernel-livepatch-5_14_21-150500_55_52-default-8-150500.11.6.1 as a component of SUSE Linux Enterprise Live Patching 15 SP5
+
+
+ kernel-livepatch-5_14_21-150500_55_59-default-8-150500.11.10.1 as a component of SUSE Linux Enterprise Live Patching 15 SP5
+
kernel-default as a component of SUSE Enterprise Storage 7.1
@@ -4474,6 +4528,17 @@
openSUSE Leap Micro 5.5:kernel-default-base-5.14.21-150500.55.68.1.150500.6.31.1
openSUSE Leap Micro 5.5:kernel-rt-5.14.21-150500.13.58.1
+
+ SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_108-default-10-150400.9.8.1
+ SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_111-default-8-150400.9.6.1
+ SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_116-default-8-150400.9.8.1
+ SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_35-rt-10-150500.11.8.1
+ SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_38-rt-8-150500.11.6.1
+ SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_47-rt-8-150500.11.6.1
+ SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_49-default-10-150500.11.8.1
+ SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_52-default-8-150500.11.6.1
+ SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_59-default-8-150500.11.10.1
+
SUSE Enterprise Storage 7.1:kernel-default
SUSE Enterprise Storage 7.1:kernel-default-devel
no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2022-48660
skipping CVE-2022-48661 as CVE page is older than CVRF-CVE file.
no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2022-48651
skipping CVE-2022-48659 as CVE page is older than CVRF-CVE file.
skipping CVE-2022-48658 as CVE page is older than CVRF-CVE file.
skipping CVE-2022-48657 as CVE page is older than CVRF-CVE file.
skipping CVE-2022-48656 as CVE page is older than CVRF-CVE file.
skipping CVE-2022-48655 as CVE page is older than CVRF-CVE file.
skipping CVE-2022-48654 as CVE page is older than CVRF-CVE file.
skipping CVE-2022-48653 as CVE page is older than CVRF-CVE file.
skipping CVE-2022-48652 as CVE page is older than CVRF-CVE file.
--- /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2022-48651.xml 2024-10-17 01:41:16.134590000 +0200
+++ /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2022-48651.xml.new 2024-10-29 01:38:30.911783000 +0100
@@ -14,13 +14,13 @@
1
- 71
- 2024-10-16T23:41:15Z
+ 72
+ 2024-10-29T00:38:30Z
current
2024-04-29T23:27:52Z
- 2024-10-16T23:41:15Z
+ 2024-10-29T00:38:30Z
cve-database/bin/generate-cvrf-cve.pl
2020-12-27T01:00:00Z
@@ -2462,15 +2462,24 @@
kernel-livepatch-5_14_21-150400_24_103-default-5-150400.2.1
+
+ kernel-livepatch-5_14_21-150400_24_108-default-10-150400.9.8.1
+
kernel-livepatch-5_14_21-150400_24_108-default-9-150400.9.8.1
kernel-livepatch-5_14_21-150400_24_111-default-7-150400.9.6.1
+
+ kernel-livepatch-5_14_21-150400_24_111-default-8-150400.9.6.1
+
kernel-livepatch-5_14_21-150400_24_116-default-7-150400.9.8.1
+
+ kernel-livepatch-5_14_21-150400_24_116-default-8-150400.9.8.1
+
kernel-livepatch-5_14_21-150400_24_119-default-1-150400.9.3.1
@@ -2522,15 +2531,24 @@
kernel-livepatch-5_14_21-150500_13_30-rt-6-150500.2.1
+
+ kernel-livepatch-5_14_21-150500_13_35-rt-10-150500.11.8.1
+
kernel-livepatch-5_14_21-150500_13_35-rt-9-150500.11.8.1
kernel-livepatch-5_14_21-150500_13_38-rt-7-150500.11.6.1
+
+ kernel-livepatch-5_14_21-150500_13_38-rt-8-150500.11.6.1
+
kernel-livepatch-5_14_21-150500_13_47-rt-7-150500.11.6.1
+
+ kernel-livepatch-5_14_21-150500_13_47-rt-8-150500.11.6.1
+
kernel-livepatch-5_14_21-150500_13_5-rt-12-150500.2.1
@@ -2561,15 +2579,24 @@
kernel-livepatch-5_14_21-150500_55_44-default-6-150500.2.1
+
+ kernel-livepatch-5_14_21-150500_55_49-default-10-150500.11.8.1
+
kernel-livepatch-5_14_21-150500_55_49-default-9-150500.11.8.1
kernel-livepatch-5_14_21-150500_55_52-default-7-150500.11.6.1
+
+ kernel-livepatch-5_14_21-150500_55_52-default-8-150500.11.6.1
+
kernel-livepatch-5_14_21-150500_55_59-default-7-150500.11.10.1
+
+ kernel-livepatch-5_14_21-150500_55_59-default-8-150500.11.10.1
+
kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2
@@ -2609,9 +2636,15 @@
kernel-livepatch-5_3_18-150200_24_183-default-8-150200.5.6.1
+
+ kernel-livepatch-5_3_18-150200_24_183-default-9-150200.5.6.1
+
kernel-livepatch-5_3_18-150200_24_188-default-7-150200.5.6.1
+
+ kernel-livepatch-5_3_18-150200_24_188-default-8-150200.5.6.1
+
kernel-livepatch-5_3_18-150200_24_191-default-1-150200.5.3.1
@@ -2648,9 +2681,15 @@
kernel-livepatch-5_3_18-150300_59_153-default-8-150300.7.6.1
+
+ kernel-livepatch-5_3_18-150300_59_153-default-9-150300.7.6.1
+
kernel-livepatch-5_3_18-150300_59_158-default-7-150300.7.6.1
+
+ kernel-livepatch-5_3_18-150300_59_158-default-8-150300.7.6.1
+
kernel-livepatch-5_3_18-150300_59_161-default-1-150300.7.3.1
@@ -2891,6 +2930,9 @@
kgraft-patch-4_12_14-122_201-default-8-8.10.1
+
+ kgraft-patch-4_12_14-122_201-default-9-8.10.1
+
kgraft-patch-4_12_14-122_216-default-1-8.3.1
@@ -5465,6 +5507,48 @@
kernel-rt-5.14.21-150500.13.52.1 as a component of openSUSE Leap Micro 5.5
+
+ kgraft-patch-4_12_14-122_201-default-9-8.10.1 as a component of SUSE Linux Enterprise Live Patching 12 SP5
+
+
+ kernel-livepatch-5_3_18-150200_24_183-default-9-150200.5.6.1 as a component of SUSE Linux Enterprise Live Patching 15 SP2
+
+
+ kernel-livepatch-5_3_18-150200_24_188-default-8-150200.5.6.1 as a component of SUSE Linux Enterprise Live Patching 15 SP2
+
+
+ kernel-livepatch-5_3_18-150300_59_153-default-9-150300.7.6.1 as a component of SUSE Linux Enterprise Live Patching 15 SP3
+
+
+ kernel-livepatch-5_3_18-150300_59_158-default-8-150300.7.6.1 as a component of SUSE Linux Enterprise Live Patching 15 SP3
+
+
+ kernel-livepatch-5_14_21-150400_24_108-default-10-150400.9.8.1 as a component of SUSE Linux Enterprise Live Patching 15 SP4
+
+
+ kernel-livepatch-5_14_21-150400_24_111-default-8-150400.9.6.1 as a component of SUSE Linux Enterprise Live Patching 15 SP4
+
+
+ kernel-livepatch-5_14_21-150400_24_116-default-8-150400.9.8.1 as a component of SUSE Linux Enterprise Live Patching 15 SP4
+
+
+ kernel-livepatch-5_14_21-150500_13_35-rt-10-150500.11.8.1 as a component of SUSE Linux Enterprise Live Patching 15 SP5
+
+
+ kernel-livepatch-5_14_21-150500_13_38-rt-8-150500.11.6.1 as a component of SUSE Linux Enterprise Live Patching 15 SP5
+
+
+ kernel-livepatch-5_14_21-150500_13_47-rt-8-150500.11.6.1 as a component of SUSE Linux Enterprise Live Patching 15 SP5
+
+
+ kernel-livepatch-5_14_21-150500_55_49-default-10-150500.11.8.1 as a component of SUSE Linux Enterprise Live Patching 15 SP5
+
+
+ kernel-livepatch-5_14_21-150500_55_52-default-8-150500.11.6.1 as a component of SUSE Linux Enterprise Live Patching 15 SP5
+
+
+ kernel-livepatch-5_14_21-150500_55_59-default-8-150500.11.10.1 as a component of SUSE Linux Enterprise Live Patching 15 SP5
+
kernel-default as a component of SUSE Linux Enterprise Micro 5.0
@@ -6589,6 +6673,22 @@
openSUSE Leap Micro 5.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2
openSUSE Leap Micro 5.5:kernel-rt-5.14.21-150500.13.52.1
+
+ SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_201-default-9-8.10.1
+ SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_183-default-9-150200.5.6.1
+ SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_188-default-8-150200.5.6.1
+ SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_153-default-9-150300.7.6.1
+ SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_158-default-8-150300.7.6.1
+ SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_108-default-10-150400.9.8.1
+ SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_111-default-8-150400.9.6.1
+ SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_116-default-8-150400.9.8.1
+ SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_35-rt-10-150500.11.8.1
+ SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_38-rt-8-150500.11.6.1
+ SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_47-rt-8-150500.11.6.1
+ SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_49-default-10-150500.11.8.1
+ SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_52-default-8-150500.11.6.1
+ SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_59-default-8-150500.11.10.1
+
SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default
SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel
no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2022-48624
skipping CVE-2022-48650 as CVE page is older than CVRF-CVE file.
skipping CVE-2022-48649 as CVE page is older than CVRF-CVE file.
skipping CVE-2022-48648 as CVE page is older than CVRF-CVE file.
skipping CVE-2022-48647 as CVE page is older than CVRF-CVE file.
skipping CVE-2022-48646 as CVE page is older than CVRF-CVE file.
skipping CVE-2022-48645 as CVE page is older than CVRF-CVE file.
skipping CVE-2022-48644 as CVE page is older than CVRF-CVE file.
skipping CVE-2022-48643 as CVE page is older than CVRF-CVE file.
skipping CVE-2022-48642 as CVE page is older than CVRF-CVE file.
skipping CVE-2022-48641 as CVE page is older than CVRF-CVE file.
skipping CVE-2022-48640 as CVE page is older than CVRF-CVE file.
skipping CVE-2022-48639 as CVE page is older than CVRF-CVE file.
skipping CVE-2022-48638 as CVE page is older than CVRF-CVE file.
skipping CVE-2022-48637 as CVE page is older than CVRF-CVE file.
skipping CVE-2022-48636 as CVE page is older than CVRF-CVE file.
skipping CVE-2022-48635 as CVE page is older than CVRF-CVE file.
skipping CVE-2022-48634 as CVE page is older than CVRF-CVE file.
skipping CVE-2022-48633 as CVE page is older than CVRF-CVE file.
skipping CVE-2022-48632 as CVE page is older than CVRF-CVE file.
skipping CVE-2022-48631 as CVE page is older than CVRF-CVE file.
skipping CVE-2022-48630 as CVE page is older than CVRF-CVE file.
skipping CVE-2022-48629 as CVE page is older than CVRF-CVE file.
skipping CVE-2022-48628 as CVE page is older than CVRF-CVE file.
skipping CVE-2022-48627 as CVE page is older than CVRF-CVE file.
skipping CVE-2022-48626 as CVE page is older than CVRF-CVE file.
no cpe found for SUSE Package Hub 15 SP5 in CVE-2022-48620
skipping CVE-2022-48622 as CVE page is older than CVRF-CVE file.
skipping CVE-2022-48619 as CVE page is older than CVRF-CVE file.
no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2022-48566
skipping CVE-2022-48565 as CVE page is older than CVRF-CVE file.
skipping CVE-2022-48564 as CVE page is older than CVRF-CVE file.
skipping CVE-2022-48560 as CVE page is older than CVRF-CVE file.
skipping CVE-2022-48554 as CVE page is older than CVRF-CVE file.
skipping CVE-2022-48522 as CVE page is older than CVRF-CVE file.
no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2022-48503
no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2022-48468
skipping CVE-2022-48502 as CVE page is older than CVRF-CVE file.
no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2022-48434
skipping CVE-2022-48425 as CVE page is older than CVRF-CVE file.
skipping CVE-2022-48424 as CVE page is older than CVRF-CVE file.
skipping CVE-2022-48423 as CVE page is older than CVRF-CVE file.
no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2022-48279
skipping CVE-2022-48339 as CVE page is older than CVRF-CVE file.
skipping CVE-2022-48338 as CVE page is older than CVRF-CVE file.
skipping CVE-2022-48337 as CVE page is older than CVRF-CVE file.
skipping CVE-2022-48303 as CVE page is older than CVRF-CVE file.
skipping CVE-2022-48281 as CVE page is older than CVRF-CVE file.
no cpe found for SUSE Package Hub 15 SP4 in CVE-2022-48258
no cpe found for SUSE Package Hub 15 SP4 in CVE-2022-48257
no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2022-48174
skipping CVE-2022-48065 as CVE page is older than CVRF-CVE file.
skipping CVE-2022-48064 as CVE page is older than CVRF-CVE file.
skipping CVE-2022-48063 as CVE page is older than CVRF-CVE file.
skipping CVE-2022-47946 as CVE page is older than CVRF-CVE file.
skipping CVE-2022-47943 as CVE page is older than CVRF-CVE file.
skipping CVE-2022-47942 as CVE page is older than CVRF-CVE file.
skipping CVE-2022-47941 as CVE page is older than CVRF-CVE file.
skipping CVE-2022-47940 as CVE page is older than CVRF-CVE file.
skipping CVE-2022-47939 as CVE page is older than CVRF-CVE file.
skipping CVE-2022-47938 as CVE page is older than CVRF-CVE file.
skipping CVE-2022-47929 as CVE page is older than CVRF-CVE file.
skipping CVE-2022-47696 as CVE page is older than CVRF-CVE file.
skipping CVE-2022-47695 as CVE page is older than CVRF-CVE file.
skipping CVE-2022-47673 as CVE page is older than CVRF-CVE file.
no cpe found for SUSE Liberty Linux 7 LTSS in CVE-2022-47629
no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2022-47629
skipping CVE-2022-47521 as CVE page is older than CVRF-CVE file.
skipping CVE-2022-47520 as CVE page is older than CVRF-CVE file.
skipping CVE-2022-47519 as CVE page is older than CVRF-CVE file.
skipping CVE-2022-47518 as CVE page is older than CVRF-CVE file.
skipping CVE-2022-47085 as CVE page is older than CVRF-CVE file.
skipping CVE-2022-47024 as CVE page is older than CVRF-CVE file.
no cpe found for SUSE Package Hub 15 SP5 in CVE-2022-47021
skipping CVE-2022-47015 as CVE page is older than CVRF-CVE file.
no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2022-46751
skipping CVE-2022-47011 as CVE page is older than CVRF-CVE file.
skipping CVE-2022-47010 as CVE page is older than CVRF-CVE file.
skipping CVE-2022-47008 as CVE page is older than CVRF-CVE file.
skipping CVE-2022-47007 as CVE page is older than CVRF-CVE file.
skipping CVE-2022-46908 as CVE page is older than CVRF-CVE file.
skipping CVE-2022-46885 as CVE page is older than CVRF-CVE file.
skipping CVE-2022-46884 as CVE page is older than CVRF-CVE file.
skipping CVE-2022-46883 as CVE page is older than CVRF-CVE file.
skipping CVE-2022-46882 as CVE page is older than CVRF-CVE file.
skipping CVE-2022-46881 as CVE page is older than CVRF-CVE file.
skipping CVE-2022-46880 as CVE page is older than CVRF-CVE file.
skipping CVE-2022-46879 as CVE page is older than CVRF-CVE file.
skipping CVE-2022-46878 as CVE page is older than CVRF-CVE file.
skipping CVE-2022-46877 as CVE page is older than CVRF-CVE file.
skipping CVE-2022-46875 as CVE page is older than CVRF-CVE file.
skipping CVE-2022-46874 as CVE page is older than CVRF-CVE file.
skipping CVE-2022-46873 as CVE page is older than CVRF-CVE file.
skipping CVE-2022-46872 as CVE page is older than CVRF-CVE file.
skipping CVE-2022-46871 as CVE page is older than CVRF-CVE file.
skipping CVE-2022-46781 as CVE page is older than CVRF-CVE file.
skipping CVE-2022-46768 as CVE page is older than CVRF-CVE file.
no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2022-46725
no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2022-46705
no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2022-46663
skipping CVE-2022-46700 as CVE page is older than CVRF-CVE file.
skipping CVE-2022-46699 as CVE page is older than CVRF-CVE file.
skipping CVE-2022-46698 as CVE page is older than CVRF-CVE file.
skipping CVE-2022-46692 as CVE page is older than CVRF-CVE file.
skipping CVE-2022-46691 as CVE page is older than CVRF-CVE file.
no cpe found for SUSE Package Hub 15 SP4 in CVE-2022-46393
skipping CVE-2022-46349 as CVE page is older than CVRF-CVE file.
skipping CVE-2022-46344 as CVE page is older than CVRF-CVE file.
skipping CVE-2022-46343 as CVE page is older than CVRF-CVE file.
skipping CVE-2022-46342 as CVE page is older than CVRF-CVE file.
skipping CVE-2022-46341 as CVE page is older than CVRF-CVE file.
skipping CVE-2022-46340 as CVE page is older than CVRF-CVE file.
no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2022-46285
no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2022-46176
skipping CVE-2022-46283 as CVE page is older than CVRF-CVE file.
no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2022-46174
no cpe found for SUSE Package Hub 15 SP4 in CVE-2022-46169
no cpe found for SUSE Package Hub 15 SP5 in CVE-2022-46165
no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2022-46149
no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2022-46146
no cpe found for SUSE Manager Client Tools for RHEL, Liberty and Clones 9-CLIENT-TOOLS in CVE-2022-46146
no cpe found for SUSE Manager Tools Beta for SLE Micro 5 in CVE-2022-46146
no cpe found for SUSE Manager Tools for SLE Micro 5 in CVE-2022-46146
CVE-2022-45919: no packages for Image SLES15-SP4-Micro-5-3-BYOS, but entry?
CVE-2022-45919: no packages for Image SLES15-SP5-SAP-Hardened-BYOS-GCE, but entry?
CVE-2022-45919: no packages for Image SLES15-SP3-Manager-4-2-Server-BYOS-GCE, but entry?
CVE-2022-45919: no packages for Image SLES15-SP5-Micro-5-5-GCE, but entry?
CVE-2022-45919: no packages for Container suse/hpc/warewulf4-x86_64/sle-hpc-node:latest, but entry?
CVE-2022-45919: no packages for Image SLES15-SP5-Micro-5-5-BYOS, but entry?
CVE-2022-45919: no packages for Image SLES15-SP5-HPC-BYOS-Azure, but entry?
CVE-2022-45919: no packages for SUSE Linux Enterprise Module for Development Tools 15 SP4, but entry?
CVE-2022-45919: no packages for Image SLES15-SP4-SAP-Hardened-BYOS-GCE, but entry?
CVE-2022-45919: no packages for Image SLES15-SP4-Micro-5-4-BYOS-Azure, but entry?
CVE-2022-45919: no packages for Image SLES15-SP4-SAPCAL, but entry?
CVE-2022-45919: no packages for Image SLES15-SP5-HPC-BYOS-EC2, but entry?
CVE-2022-45919: no packages for SUSE Linux Enterprise Module for Public Cloud 15 SP5, but entry?
CVE-2022-45919: no packages for Image SLES15-SP4-HPC-EC2, but entry?
CVE-2022-45919: no packages for Image SLES15-SP4-Micro-5-3-BYOS-GCE, but entry?
CVE-2022-45919: no packages for Image SLES12-SP5-GCE-SAP-On-Demand, but entry?
CVE-2022-45919: no packages for Image SLES15-SP3-CHOST-BYOS-Azure, but entry?
CVE-2022-45919: no packages for Image SLES15-SP5-CHOST-BYOS-EC2, but entry?
CVE-2022-45919: no packages for Image SLES15-SP4-Manager-Server-4-3-Azure-ltd, but entry?
CVE-2022-45919: no packages for Image SLES15-SP2-SAP-BYOS-Azure, but entry?
CVE-2022-45919: no packages for Container suse/sle-micro-rancher/5.4:latest, but entry?
CVE-2022-45919: no packages for Image SLES12-SP5-Azure-HPC-BYOS, but entry?
CVE-2022-45919: no packages for SUSE Linux Enterprise Module for Development Tools 15 SP5, but entry?
CVE-2022-45919: no packages for Image SLES15-SP4-Micro-5-4-BYOS-EC2, but entry?
CVE-2022-45919: no packages for SUSE OpenStack Cloud 9, but entry?
CVE-2022-45919: no packages for Image SLES12-SP5-EC2-BYOS, but entry?
CVE-2022-45919: no packages for Image SLES15-SP3-SAP-BYOS-GCE, but entry?
CVE-2022-45919: no packages for Image SLES15-SP3-Micro-5-2-BYOS-Azure, but entry?
CVE-2022-45919: no packages for Image SLES15-SP3-Manager-4-2-Proxy-BYOS-EC2-HVM, but entry?
CVE-2022-45919: no packages for Image SLES15-SP3-HPC-BYOS-GCE, but entry?
CVE-2022-45919: no packages for Image SLES15-SP5-SAP-Hardened-GCE, but entry?
CVE-2022-45919: no packages for SUSE Linux Enterprise Real Time 15 SP3, but entry?
CVE-2022-45919: no packages for Image SLES15-SP3-SAP-BYOS-EC2-HVM, but entry?
CVE-2022-45919: no packages for Image SLES15-SP5-SAP-Azure-LI-BYOS-Production, but entry?
CVE-2022-45919: no packages for Image SLES15-SP5-EC2, but entry?
CVE-2022-45919: no packages for Image SLES15-SP4-HPC-BYOS, but entry?
CVE-2022-45919: no packages for SUSE Linux Enterprise High Availability Extension 12 SP5, but entry?
CVE-2022-45919: no packages for Image SLES15-SP4-BYOS, but entry?
CVE-2022-45919: no packages for Image SLES15-SP5-SAP-Azure-VLI-BYOS, but entry?
CVE-2022-45919: no packages for Image SLES15-SP4-SAP-Hardened, but entry?
CVE-2022-45919: no packages for Image SLES15-SP4-Manager-Server-4-3-EC2-ltd, but entry?
CVE-2022-45919: no packages for Image SLES15-SP3-SAPCAL-Azure, but entry?
CVE-2022-45919: no packages for Image SLES15-SP3-Micro-5-2-BYOS-EC2-HVM, but entry?
CVE-2022-45919: no packages for Image SLES15-SP4-CHOST-BYOS-EC2, but entry?
CVE-2022-45919: no packages for Image SLES15-SP3-Manager-4-2-Proxy-BYOS-Azure, but entry?
CVE-2022-45919: no packages for Image SLES15-SP3-SAP-Azure-VLI-BYOS-Production, but entry?
CVE-2022-45919: no packages for Image SLES15-SP3-HPC-BYOS-Azure, but entry?
CVE-2022-45919: no packages for Image SLES15-SP4-Micro-5-4-GCE, but entry?
CVE-2022-45919: no packages for SUSE Linux Enterprise Server 12 SP2-BCL, but entry?
CVE-2022-45919: no packages for SUSE Linux Enterprise Module for Basesystem 15 SP4, but entry?
CVE-2022-45919: no packages for Image SLES15-SP3-BYOS-Azure, but entry?
CVE-2022-45919: no packages for Image SLES15-SP5-Azure-Basic, but entry?
CVE-2022-45919: no packages for Image SLES15-SP4-SAP-BYOS, but entry?
CVE-2022-45919: no packages for Image SLES15-SP5-Manager-Server-5-0-BYOS-Azure, but entry?
CVE-2022-45919: no packages for Image SLES15-SP4-SAP-BYOS-GCE, but entry?
CVE-2022-45919: no packages for Image SLES15-SP3-HPC-BYOS-EC2-HVM, but entry?
CVE-2022-45919: no packages for SUSE Linux Enterprise Server 15 SP3-LTSS, but entry?
CVE-2022-45919: no packages for Image SLES15-SP4-Hardened-BYOS-Azure, but entry?
CVE-2022-45919: no packages for Image SLES15-SP5-Manager-Proxy-5-0-BYOS, but entry?
CVE-2022-45919: no packages for SUSE Linux Enterprise High Availability Extension 15 SP2, but entry?
CVE-2022-45919: no packages for SUSE Linux Enterprise Live Patching 15 SP1, but entry?
CVE-2022-45919: no packages for Image SLES15-SP4-Micro-5-3-BYOS-Azure, but entry?
CVE-2022-45919: no packages for Image SLES15-SP4-Manager-Server-4-3-Azure-llc, but entry?
CVE-2022-45919: no packages for Image SLES12-SP5-Azure-SAP-On-Demand, but entry?
CVE-2022-45919: no packages for Image SLES15-SP5-BYOS-GCE, but entry?
CVE-2022-45919: no packages for Image SLES15-SP2-SAP-BYOS-GCE, but entry?
CVE-2022-45919: no packages for Image SLES15-SP4-SAP-Azure-LI-BYOS-Production, but entry?
CVE-2022-45919: no packages for Image SLES15-SP3-SAPCAL-EC2-HVM, but entry?
CVE-2022-45919: no packages for SUSE Manager Server 4.2, but entry?
CVE-2022-45919: no packages for Image SLES15-SP2-SAP-Azure-LI-BYOS-Production, but entry?
CVE-2022-45919: no packages for SUSE Linux Enterprise Software Development Kit 12 SP5, but entry?
CVE-2022-45919: no packages for SUSE Linux Enterprise Server for SAP Applications 12 SP5, but entry?
CVE-2022-45919: no packages for SUSE Linux Enterprise Micro 5.4, but entry?
CVE-2022-45919: no packages for Image SLES15-SP3-SAP-BYOS-Azure, but entry?
CVE-2022-45919: no packages for SUSE Enterprise Storage 7.1, but entry?
CVE-2022-45919: no packages for Image SLES15-SP4-SAP-Azure-LI-BYOS, but entry?
CVE-2022-45919: no packages for Image SLES15-SP4-Manager-Server-4-3-BYOS, but entry?
CVE-2022-45919: no packages for Image SLES15-SP4-Micro-5-4-BYOS-GCE, but entry?
CVE-2022-45919: no packages for SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE, but entry?
CVE-2022-45919: no packages for Image SLES15-SP3-CHOST-BYOS-EC2, but entry?
CVE-2022-45919: no packages for Image SLES15-SP4-Micro-5-4, but entry?
CVE-2022-45919: no packages for Image SLES12-SP5-Azure-BYOS, but entry?
CVE-2022-45919: no packages for Image SLES15-SP5-CHOST-BYOS-Azure, but entry?
CVE-2022-45919: no packages for Image SLES15-SP5-Micro-5-5-BYOS-GCE, but entry?
CVE-2022-45919: no packages for Image SLES15-SP4-SAP-Hardened-GCE, but entry?
CVE-2022-45919: no packages for Image SLES15-SP4-BYOS-GCE, but entry?
CVE-2022-45919: no packages for Image SLES15-SP5-Azure-Standard, but entry?
CVE-2022-45919: no packages for Image SLES12-SP5-EC2-ECS-On-Demand, but entry?
CVE-2022-45919: no packages for Image SLES15-SP2-SAP-Azure, but entry?
CVE-2022-45919: no packages for SUSE Real Time Module 15 SP5, but entry?
CVE-2022-45919: no packages for Image SLES15-SP4-CHOST-BYOS, but entry?
CVE-2022-45919: no packages for SUSE Linux Enterprise Module for Basesystem 15 SP5, but entry?
CVE-2022-45919: no packages for Image SLES15-SP4-SAPCAL-GCE, but entry?
CVE-2022-45919: no packages for Image SLES12-SP5-Azure-HPC-On-Demand, but entry?
CVE-2022-45919: no packages for SUSE Linux Enterprise Module for Legacy 15 SP5, but entry?
CVE-2022-45919: no packages for Image SLES15-SP3-BYOS-EC2-HVM, but entry?
CVE-2022-45919: no packages for Image SLES15-SP3-SAPCAL-GCE, but entry?
CVE-2022-45919: no packages for Image SLES15-SP5-Micro-5-5, but entry?
CVE-2022-45919: no packages for Image SLES12-SP5-Azure-SAP-BYOS, but entry?
CVE-2022-45919: no packages for Image SLES15-SP1-SAP-Azure-VLI-BYOS-Production, but entry?
CVE-2022-45919: no packages for SUSE Linux Enterprise High Availability Extension 15 SP4, but entry?
CVE-2022-45919: no packages for SUSE Linux Enterprise Real Time 12 SP5, but entry?
CVE-2022-45919: no packages for SUSE Linux Enterprise Server 15 SP2-LTSS, but entry?
CVE-2022-45919: no packages for SUSE Linux Enterprise Module for Public Cloud 15 SP4, but entry?
CVE-2022-45919: no packages for Image SLES12-SP5-GCE-On-Demand, but entry?
CVE-2022-45919: no packages for Image SLES15-SP4-SAP-BYOS-EC2, but entry?
CVE-2022-45919: no packages for SUSE Linux Enterprise Server 12 SP3-LTSS-TERADATA, but entry?
CVE-2022-45919: no packages for SUSE Linux Enterprise Micro 5.3, but entry?
CVE-2022-45919: no packages for Image SLES15-SP5-CHOST-BYOS-GDC, but entry?
CVE-2022-45919: no packages for Image SLES15-SP4-CHOST-BYOS-SAP-CCloud, but entry?
CVE-2022-45919: no packages for SUSE OpenStack Cloud Crowbar 9, but entry?
CVE-2022-45919: no packages for Image SLES15-SP5-CHOST-BYOS-Aliyun, but entry?
CVE-2022-45919: no packages for Image SLES15-SP5-Micro-5-5-Azure, but entry?
CVE-2022-45919: no packages for Image SLES15-SP4-Manager-Proxy-4-3-BYOS-EC2, but entry?
CVE-2022-45919: no packages for SUSE Linux Enterprise Live Patching 15 SP3, but entry?
CVE-2022-45919: no packages for Image SLES15-SP4-SAP-Hardened-BYOS, but entry?
CVE-2022-45919: no packages for Image SLES15-SP3-CHOST-BYOS-GCE, but entry?
CVE-2022-45919: no packages for SUSE Linux Enterprise Server 12 SP3-TERADATA, but entry?
CVE-2022-45919: no packages for Image SLES15-SP5-Micro-5-5-BYOS-EC2, but entry?
CVE-2022-45919: no packages for Image SLES15-SP4-SAP-Azure, but entry?
CVE-2022-45919: no packages for Image SLES15-SP4-Manager-Server-4-3-EC2-llc, but entry?
CVE-2022-45919: no packages for Image SLES15-SP3-Micro-5-2-BYOS-GCE, but entry?
CVE-2022-45919: no packages for Image SLES15-SP4-HPC-BYOS-Azure, but entry?
CVE-2022-45919: no packages for SUSE Linux Enterprise High Availability Extension 12 SP4, but entry?
CVE-2022-45919: no packages for Image SLES12-SP5-Azure-Standard-On-Demand, but entry?
CVE-2022-45919: no packages for SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS, but entry?
CVE-2022-45919: no packages for Image SLES15-SP5-Manager-Server-5-0-BYOS-EC2, but entry?
CVE-2022-45919: no packages for SUSE Manager Proxy 4.2, but entry?
CVE-2022-45919: no packages for Image SLES15-SP4-Hardened-BYOS-EC2, but entry?
CVE-2022-45919: no packages for SUSE Manager Retail Branch Server 4.2, but entry?
CVE-2022-45919: no packages for Image SLES15-SP3-CHOST-BYOS-Aliyun, but entry?
CVE-2022-45919: no packages for SUSE Linux Enterprise Live Patching 12 SP4, but entry?
CVE-2022-45919: no packages for Container bci/bci-sle15-kernel-module-devel:15.5, but entry?
CVE-2022-45919: no packages for Image SLES15-SP4-SAP, but entry?
CVE-2022-45919: no packages for Image SLES15-SP4-Manager-Server-4-3, but entry?
CVE-2022-45919: no packages for Image SLES12-SP5-GCE-SAP-BYOS, but entry?
CVE-2022-45919: no packages for SUSE Linux Enterprise Server 15 SP4-TERADATA, but entry?
CVE-2022-45919: no packages for Image SLES15-SP4-Micro-5-3, but entry?
CVE-2022-45919: no packages for Image SLES15-SP4-SAP-Azure-VLI-BYOS, but entry?
CVE-2022-45919: no packages for SUSE Linux Enterprise Module for Legacy 15 SP4, but entry?
CVE-2022-45919: no packages for Image SLES15-SP4-Micro-5-3-BYOS-EC2, but entry?
CVE-2022-45919: no packages for Image SLES15-SP3-CHOST-BYOS-SAP-CCloud, but entry?
CVE-2022-45919: no packages for Image SLES15-SP4-Manager-Proxy-4-3-BYOS-GCE, but entry?
CVE-2022-45919: no packages for Image SLES15-SP5-SAP-BYOS-EC2, but entry?
CVE-2022-45919: no packages for SUSE Real Time Module 15 SP3, but entry?
CVE-2022-45919: no packages for Image SLES15-SP4-SAP-GCE, but entry?
CVE-2022-45919: no packages for Image SLES15-SP3-Micro-5-1-BYOS-EC2-HVM, but entry?
CVE-2022-45919: no packages for SUSE Linux Enterprise Live Patching 15 SP5, but entry?
CVE-2022-45919: no packages for Image SLES15-SP4-HPC-GCE, but entry?
CVE-2022-45919: no packages for Image SLES15-SP2-SAP-EC2-HVM, but entry?
CVE-2022-45919: no packages for SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS, but entry?
CVE-2022-45919: no packages for Image SLES15-SP5-Manager-Server-5-0-BYOS, but entry?
CVE-2022-45919: no packages for openSUSE Leap Micro 5.3, but entry?
CVE-2022-45919: no packages for Image SLES15-SP3-SAP-Azure-LI-BYOS-Production, but entry?
CVE-2022-45919: no packages for Image SLES15-SP5-HPC-BYOS-GCE, but entry?
CVE-2022-45919: no packages for SUSE Linux Enterprise Server for SAP Applications 15 SP3, but entry?
CVE-2022-45919: no packages for SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS, but entry?
CVE-2022-45919: no packages for Image SLES15-SP4-Manager-Proxy-4-3-BYOS-Azure, but entry?
CVE-2022-45919: no packages for SUSE Linux Enterprise Live Patching 15 SP2, but entry?
CVE-2022-45919: no packages for Container suse/sle-micro-rancher/5.3:latest, but entry?
CVE-2022-45919: no packages for Image SLES15-SP5-SAP-Hardened-BYOS-Azure, but entry?
CVE-2022-45919: no packages for SUSE Linux Enterprise Micro 5.2, but entry?
CVE-2022-45919: no packages for SUSE Enterprise Storage 7, but entry?
CVE-2022-45919: no packages for Image SLES12-SP5-EC2-SAP-BYOS, but entry?
CVE-2022-45919: no packages for Image SLES15-SP4-Micro-5-4-BYOS, but entry?
CVE-2022-45919: no packages for Image SLES12-SP5-EC2-On-Demand, but entry?
CVE-2022-45919: no packages for Image SLES15-SP5-Micro-5-5-BYOS-Azure, but entry?
CVE-2022-45919: no packages for SUSE Linux Enterprise Server 12 SP4-ESPOS, but entry?
CVE-2022-45919: no packages for SUSE Real Time Module 15 SP4, but entry?
CVE-2022-45919: no packages for Image SLES15-SP3-Micro-5-1-BYOS-Azure, but entry?
CVE-2022-45919: no packages for SUSE Linux Enterprise Live Patching 15 SP4, but entry?
CVE-2022-45919: no packages for Image SLES15-SP4-Micro-5-4-EC2, but entry?
CVE-2022-45919: no packages for Image SLES12-SP5-EC2-SAP-On-Demand, but entry?
CVE-2022-45919: no packages for Image SLES15-SP5-SAP-BYOS-GCE, but entry?
CVE-2022-45919: no packages for Image SLES15-SP5-SAP-Hardened-Azure, but entry?
CVE-2022-45919: no packages for Image SLES15-SP3-Manager-4-2-Server-BYOS-Azure, but entry?
CVE-2022-45919: no packages for Image SLES15-SP5-Hardened-BYOS-GCE, but entry?
CVE-2022-45919: no packages for Image SLES15-SP5-GCE, but entry?
CVE-2022-45919: no packages for Image SLES15-SP4-CHOST-BYOS-Azure, but entry?
CVE-2022-45919: no packages for Image SLES15-SP2-HPC-BYOS-Azure, but entry?
CVE-2022-45919: no packages for Image SLES15-SP1-SAP-Azure-LI-BYOS-Production, but entry?
CVE-2022-45919: no packages for Image SLES15-SP5-SAP-Hardened-BYOS-EC2, but entry?
CVE-2022-45919: no packages for Image SLES15-SP2-SAP-GCE, but entry?
CVE-2022-45919: no packages for SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS, but entry?
CVE-2022-45919: no packages for SUSE Linux Enterprise High Availability Extension 15 SP1, but entry?
CVE-2022-45919: no packages for SUSE Linux Enterprise Server for SAP Applications 15 SP1, but entry?
CVE-2022-45919: no packages for Image SLES15-SP4-SAP-EC2, but entry?
CVE-2022-45919: no packages for Image SLES15-SP5-Hardened-BYOS-EC2, but entry?
CVE-2022-45919: no packages for Image SLES15-SP5-Manager-Proxy-5-0-BYOS-EC2, but entry?
CVE-2022-45919: no packages for Image SLES15-SP4-SAPCAL-EC2, but entry?
CVE-2022-45919: no packages for Image SLES15-SP4-Manager-Proxy-4-3-BYOS, but entry?
CVE-2022-45919: no packages for Image SLES15-SP3-Manager-4-2-Proxy-BYOS-GCE, but entry?
CVE-2022-45919: no packages for Image SLES15-SP4-SUSE-Rancher-Setup-BYOS-EC2, but entry?
CVE-2022-45919: no packages for Image SLES15-SP4-SAPCAL-Azure, but entry?
CVE-2022-45919: no packages for Image SLES15-SP5-SAPCAL-EC2, but entry?
CVE-2022-45919: no packages for Image SLES15-SP3-BYOS-GCE, but entry?
CVE-2022-45919: no packages for Image SLES12-SP5-Azure-Basic-On-Demand, but entry?
CVE-2022-45919: no packages for Image SLES15-SP4-CHOST-BYOS-GCE, but entry?
CVE-2022-45919: no packages for Image SLES15-SP4-SAP-Hardened-BYOS-EC2, but entry?
CVE-2022-45919: no packages for Image SLES15-SP5-BYOS-Azure, but entry?
CVE-2022-45919: no packages for Container suse/sle-micro-rancher/5.2:latest, but entry?
CVE-2022-45919: no packages for Container suse/sle-micro/rt-5.5:2.0.2-3.2.23, but entry?
CVE-2022-45919: no packages for SUSE CaaS Platform 4.0, but entry?
CVE-2022-45919: no packages for SUSE Linux Enterprise Micro 5.1, but entry?
CVE-2022-45919: no packages for Image SLES15-SP5-SAP-Azure-VLI-BYOS-Production, but entry?
CVE-2022-45919: no packages for Image SLES15-SP3-Micro-5-1-BYOS-GCE, but entry?
CVE-2022-45919: no packages for Image SLES15-SP5-HPC-Azure, but entry?
CVE-2022-45919: no packages for SUSE Linux Enterprise Server 12 SP5, but entry?
CVE-2022-45919: no packages for Container rancher/elemental-teal-rt/5.4:1.2.3-2.2.63, but entry?
CVE-2022-45919: no packages for Image SLES15-SP2-SAP-Azure-VLI-BYOS-Production, but entry?
CVE-2022-45919: no packages for Image SLES15-SP4-Micro-5-3-EC2, but entry?
CVE-2022-45919: no packages for Image SLES15-SP4-HPC-BYOS-GCE, but entry?
CVE-2022-45919: no packages for Image SLES15-SP4-Hardened-BYOS-GCE, but entry?
CVE-2022-45919: no packages for Image SLES15-SP4-SUSE-Rancher-Setup-BYOS, but entry?
CVE-2022-45919: no packages for Image SLES15-SP2-SAP-BYOS-EC2-HVM, but entry?
CVE-2022-45919: no packages for Image SLES15-SP4-CHOST-BYOS-Aliyun, but entry?
CVE-2022-45919: no packages for Image SLES15-SP5-Hardened-BYOS-Azure, but entry?
CVE-2022-45919: no packages for Image SLES15-SP5-Manager-Proxy-5-0-BYOS-GCE, but entry?
CVE-2022-45919: no packages for Image SLES15-SP4-BYOS-EC2, but entry?
CVE-2022-45919: no packages for SUSE Linux Enterprise Server for SAP Applications 12 SP4, but entry?
CVE-2022-45919: no packages for SUSE Linux Enterprise Server 12 SP4-LTSS, but entry?
CVE-2022-45919: no packages for SUSE Linux Enterprise High Availability Extension 15 SP3, but entry?
CVE-2022-45919: no packages for Container suse/sle-micro/kvm-5.5:2.0.2-2.2.20, but entry?
CVE-2022-45919: no packages for Image SLES15-SP5-Manager-Server-5-0-BYOS-GCE, but entry?
CVE-2022-45919: no packages for Image SLES15-SP4-SAP-Hardened-BYOS-Azure, but entry?
CVE-2022-45919: no packages for Image SLES12-SP5-GCE-BYOS, but entry?
CVE-2022-45919: no packages for Image SLES15-SP5-CHOST-BYOS-SAP-CCloud, but entry?
CVE-2022-45919: no packages for Image SLES15-SP5-BYOS-EC2, but entry?
CVE-2022-45919: no packages for Image SLES15-SP5-SAP-BYOS-Azure, but entry?
CVE-2022-45919: no packages for Image SLES15-SP4-BYOS-Azure, but entry?
CVE-2022-45919: no packages for SUSE Linux Enterprise Server 15 SP1-LTSS, but entry?
CVE-2022-45919: no packages for Image SLES15-SP5-SAPCAL-Azure, but entry?
CVE-2022-45919: no packages for SUSE Linux Enterprise Server for SAP Applications 15 SP2, but entry?
CVE-2022-45919: no packages for Image SLES15-SP4-SAP-BYOS-Azure, but entry?
CVE-2022-45919: no packages for SUSE Linux Enterprise High Availability Extension 15 SP5, but entry?
CVE-2022-45919: no packages for Image SLES15-SP5-CHOST-BYOS-GCE, but entry?
CVE-2022-45919: no packages for Image SLES15-SP5-SAPCAL-GCE, but entry?
CVE-2022-45919: no packages for Image SLES12-SP5-SAP-Azure-LI-BYOS-Production, but entry?
CVE-2022-45919: no packages for openSUSE Leap Micro 5.4, but entry?
CVE-2022-45919: no packages for Image SLES15-SP4-SAP-Azure-VLI-BYOS-Production, but entry?
CVE-2022-45919: no packages for Image SLES15-SP4-HPC-BYOS-EC2, but entry?
CVE-2022-45919: no packages for SUSE Linux Enterprise Live Patching 12 SP5, but entry?
CVE-2022-45919: no packages for Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production, but entry?
CVE-2022-45919: no packages for Image SLES15-SP4-SAP-Hardened-Azure, but entry?
CVE-2022-45919: no packages for Image SLES15-SP5-SAP-Azure-LI-BYOS, but entry?
CVE-2022-45919: no packages for Image SLES15-SP5-Micro-5-5-EC2, but entry?
CVE-2022-45919: no packages for Image SLES15-SP4-Manager-Server-4-3-BYOS-EC2, but entry?
CVE-2022-45919: no packages for Image SLES15-SP5-Manager-Proxy-5-0-BYOS-Azure, but entry?
CVE-2022-45919: no packages for Image SLES15-SP3-Manager-4-2-Server-BYOS-EC2-HVM, but entry?
CVE-2022-45919: no packages for Image SLES15-SP4-Hardened-BYOS, but entry?
CVE-2022-45919: no packages for Image SLES15-SP4-Manager-Server-4-3-BYOS-Azure, but entry?
CVE-2022-45919: no packages for Image SLES15-SP2-BYOS-Azure, but entry?
CVE-2022-45919: no packages for Image SLES15-SP4-Manager-Server-4-3-BYOS-GCE, but entry?
CVE-2022-45919: no packages for Container bci/bci-sle15-kernel-module-devel:15.5, but entry?
CVE-2022-45919: no packages for Container rancher/elemental-teal-rt/5.4:1.2.3-2.2.63, but entry?
CVE-2022-45919: no packages for Container suse/hpc/warewulf4-x86_64/sle-hpc-node:latest, but entry?
CVE-2022-45919: no packages for Container suse/sle-micro-rancher/5.2:latest, but entry?
CVE-2022-45919: no packages for Container suse/sle-micro-rancher/5.3:latest, but entry?
CVE-2022-45919: no packages for Container suse/sle-micro-rancher/5.4:latest, but entry?
CVE-2022-45919: no packages for Container suse/sle-micro/kvm-5.5:2.0.2-2.2.20, but entry?
CVE-2022-45919: no packages for Container suse/sle-micro/rt-5.5:2.0.2-3.2.23, but entry?
CVE-2022-45919: no packages for Image SLES12-SP5-Azure-BYOS, but entry?
CVE-2022-45919: no packages for Image SLES12-SP5-Azure-Basic-On-Demand, but entry?
CVE-2022-45919: no packages for Image SLES12-SP5-Azure-HPC-BYOS, but entry?
CVE-2022-45919: no packages for Image SLES12-SP5-Azure-HPC-On-Demand, but entry?
CVE-2022-45919: no packages for Image SLES12-SP5-Azure-SAP-BYOS, but entry?
CVE-2022-45919: no packages for Image SLES12-SP5-Azure-SAP-On-Demand, but entry?
CVE-2022-45919: no packages for Image SLES12-SP5-Azure-Standard-On-Demand, but entry?
CVE-2022-45919: no packages for Image SLES12-SP5-EC2-BYOS, but entry?
CVE-2022-45919: no packages for Image SLES12-SP5-EC2-ECS-On-Demand, but entry?
CVE-2022-45919: no packages for Image SLES12-SP5-EC2-On-Demand, but entry?
CVE-2022-45919: no packages for Image SLES12-SP5-EC2-SAP-BYOS, but entry?
CVE-2022-45919: no packages for Image SLES12-SP5-EC2-SAP-On-Demand, but entry?
CVE-2022-45919: no packages for Image SLES12-SP5-GCE-BYOS, but entry?
CVE-2022-45919: no packages for Image SLES12-SP5-GCE-On-Demand, but entry?
CVE-2022-45919: no packages for Image SLES12-SP5-GCE-SAP-BYOS, but entry?
CVE-2022-45919: no packages for Image SLES12-SP5-GCE-SAP-On-Demand, but entry?
CVE-2022-45919: no packages for Image SLES12-SP5-SAP-Azure-LI-BYOS-Production, but entry?
CVE-2022-45919: no packages for Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production, but entry?
CVE-2022-45919: no packages for Image SLES15-SP1-SAP-Azure-LI-BYOS-Production, but entry?
CVE-2022-45919: no packages for Image SLES15-SP1-SAP-Azure-VLI-BYOS-Production, but entry?
CVE-2022-45919: no packages for Image SLES15-SP2-BYOS-Azure, but entry?
CVE-2022-45919: no packages for Image SLES15-SP2-HPC-BYOS-Azure, but entry?
CVE-2022-45919: no packages for Image SLES15-SP2-SAP-Azure, but entry?
CVE-2022-45919: no packages for Image SLES15-SP2-SAP-Azure-LI-BYOS-Production, but entry?
CVE-2022-45919: no packages for Image SLES15-SP2-SAP-Azure-VLI-BYOS-Production, but entry?
CVE-2022-45919: no packages for Image SLES15-SP2-SAP-BYOS-Azure, but entry?
CVE-2022-45919: no packages for Image SLES15-SP2-SAP-BYOS-EC2-HVM, but entry?
CVE-2022-45919: no packages for Image SLES15-SP2-SAP-BYOS-GCE, but entry?
CVE-2022-45919: no packages for Image SLES15-SP2-SAP-EC2-HVM, but entry?
CVE-2022-45919: no packages for Image SLES15-SP2-SAP-GCE, but entry?
CVE-2022-45919: no packages for Image SLES15-SP3-BYOS-Azure, but entry?
CVE-2022-45919: no packages for Image SLES15-SP3-BYOS-EC2-HVM, but entry?
CVE-2022-45919: no packages for Image SLES15-SP3-BYOS-GCE, but entry?
CVE-2022-45919: no packages for Image SLES15-SP3-CHOST-BYOS-Aliyun, but entry?
CVE-2022-45919: no packages for Image SLES15-SP3-CHOST-BYOS-Azure, but entry?
CVE-2022-45919: no packages for Image SLES15-SP3-CHOST-BYOS-EC2, but entry?
CVE-2022-45919: no packages for Image SLES15-SP3-CHOST-BYOS-GCE, but entry?
CVE-2022-45919: no packages for Image SLES15-SP3-CHOST-BYOS-SAP-CCloud, but entry?
CVE-2022-45919: no packages for Image SLES15-SP3-HPC-BYOS-Azure, but entry?
CVE-2022-45919: no packages for Image SLES15-SP3-HPC-BYOS-EC2-HVM, but entry?
CVE-2022-45919: no packages for Image SLES15-SP3-HPC-BYOS-GCE, but entry?
CVE-2022-45919: no packages for Image SLES15-SP3-Manager-4-2-Proxy-BYOS-Azure, but entry?
CVE-2022-45919: no packages for Image SLES15-SP3-Manager-4-2-Proxy-BYOS-EC2-HVM, but entry?
CVE-2022-45919: no packages for Image SLES15-SP3-Manager-4-2-Proxy-BYOS-GCE, but entry?
CVE-2022-45919: no packages for Image SLES15-SP3-Manager-4-2-Server-BYOS-Azure, but entry?
CVE-2022-45919: no packages for Image SLES15-SP3-Manager-4-2-Server-BYOS-EC2-HVM, but entry?
CVE-2022-45919: no packages for Image SLES15-SP3-Manager-4-2-Server-BYOS-GCE, but entry?
CVE-2022-45919: no packages for Image SLES15-SP3-Micro-5-1-BYOS-Azure, but entry?
CVE-2022-45919: no packages for Image SLES15-SP3-Micro-5-1-BYOS-EC2-HVM, but entry?
CVE-2022-45919: no packages for Image SLES15-SP3-Micro-5-1-BYOS-GCE, but entry?
CVE-2022-45919: no packages for Image SLES15-SP3-Micro-5-2-BYOS-Azure, but entry?
CVE-2022-45919: no packages for Image SLES15-SP3-Micro-5-2-BYOS-EC2-HVM, but entry?
CVE-2022-45919: no packages for Image SLES15-SP3-Micro-5-2-BYOS-GCE, but entry?
CVE-2022-45919: no packages for Image SLES15-SP3-SAP-Azure-LI-BYOS-Production, but entry?
CVE-2022-45919: no packages for Image SLES15-SP3-SAP-Azure-VLI-BYOS-Production, but entry?
CVE-2022-45919: no packages for Image SLES15-SP3-SAP-BYOS-Azure, but entry?
CVE-2022-45919: no packages for Image SLES15-SP3-SAP-BYOS-EC2-HVM, but entry?
CVE-2022-45919: no packages for Image SLES15-SP3-SAP-BYOS-GCE, but entry?
CVE-2022-45919: no packages for Image SLES15-SP3-SAPCAL-Azure, but entry?
CVE-2022-45919: no packages for Image SLES15-SP3-SAPCAL-EC2-HVM, but entry?
CVE-2022-45919: no packages for Image SLES15-SP3-SAPCAL-GCE, but entry?
CVE-2022-45919: no packages for Image SLES15-SP4-BYOS, but entry?
CVE-2022-45919: no packages for Image SLES15-SP4-BYOS-Azure, but entry?
CVE-2022-45919: no packages for Image SLES15-SP4-BYOS-EC2, but entry?
CVE-2022-45919: no packages for Image SLES15-SP4-BYOS-GCE, but entry?
CVE-2022-45919: no packages for Image SLES15-SP4-CHOST-BYOS, but entry?
CVE-2022-45919: no packages for Image SLES15-SP4-CHOST-BYOS-Aliyun, but entry?
CVE-2022-45919: no packages for Image SLES15-SP4-CHOST-BYOS-Azure, but entry?
CVE-2022-45919: no packages for Image SLES15-SP4-CHOST-BYOS-EC2, but entry?
CVE-2022-45919: no packages for Image SLES15-SP4-CHOST-BYOS-GCE, but entry?
CVE-2022-45919: no packages for Image SLES15-SP4-CHOST-BYOS-SAP-CCloud, but entry?
CVE-2022-45919: no packages for Image SLES15-SP4-HPC-BYOS, but entry?
CVE-2022-45919: no packages for Image SLES15-SP4-HPC-BYOS-Azure, but entry?
CVE-2022-45919: no packages for Image SLES15-SP4-HPC-BYOS-EC2, but entry?
CVE-2022-45919: no packages for Image SLES15-SP4-HPC-BYOS-GCE, but entry?
CVE-2022-45919: no packages for Image SLES15-SP4-HPC-EC2, but entry?
CVE-2022-45919: no packages for Image SLES15-SP4-HPC-GCE, but entry?
CVE-2022-45919: no packages for Image SLES15-SP4-Hardened-BYOS, but entry?
CVE-2022-45919: no packages for Image SLES15-SP4-Hardened-BYOS-Azure, but entry?
CVE-2022-45919: no packages for Image SLES15-SP4-Hardened-BYOS-EC2, but entry?
CVE-2022-45919: no packages for Image SLES15-SP4-Hardened-BYOS-GCE, but entry?
CVE-2022-45919: no packages for Image SLES15-SP4-Manager-Proxy-4-3-BYOS, but entry?
CVE-2022-45919: no packages for Image SLES15-SP4-Manager-Proxy-4-3-BYOS-Azure, but entry?
CVE-2022-45919: no packages for Image SLES15-SP4-Manager-Proxy-4-3-BYOS-EC2, but entry?
CVE-2022-45919: no packages for Image SLES15-SP4-Manager-Proxy-4-3-BYOS-GCE, but entry?
CVE-2022-45919: no packages for Image SLES15-SP4-Manager-Server-4-3, but entry?
CVE-2022-45919: no packages for Image SLES15-SP4-Manager-Server-4-3-Azure-llc, but entry?
CVE-2022-45919: no packages for Image SLES15-SP4-Manager-Server-4-3-Azure-ltd, but entry?
CVE-2022-45919: no packages for Image SLES15-SP4-Manager-Server-4-3-BYOS, but entry?
CVE-2022-45919: no packages for Image SLES15-SP4-Manager-Server-4-3-BYOS-Azure, but entry?
CVE-2022-45919: no packages for Image SLES15-SP4-Manager-Server-4-3-BYOS-EC2, but entry?
CVE-2022-45919: no packages for Image SLES15-SP4-Manager-Server-4-3-BYOS-GCE, but entry?
CVE-2022-45919: no packages for Image SLES15-SP4-Manager-Server-4-3-EC2-llc, but entry?
CVE-2022-45919: no packages for Image SLES15-SP4-Manager-Server-4-3-EC2-ltd, but entry?
CVE-2022-45919: no packages for Image SLES15-SP4-Micro-5-3, but entry?
CVE-2022-45919: no packages for Image SLES15-SP4-Micro-5-3-BYOS, but entry?
CVE-2022-45919: no packages for Image SLES15-SP4-Micro-5-3-BYOS-Azure, but entry?
CVE-2022-45919: no packages for Image SLES15-SP4-Micro-5-3-BYOS-EC2, but entry?
CVE-2022-45919: no packages for Image SLES15-SP4-Micro-5-3-BYOS-GCE, but entry?
CVE-2022-45919: no packages for Image SLES15-SP4-Micro-5-3-EC2, but entry?
CVE-2022-45919: no packages for Image SLES15-SP4-Micro-5-4, but entry?
CVE-2022-45919: no packages for Image SLES15-SP4-Micro-5-4-BYOS, but entry?
CVE-2022-45919: no packages for Image SLES15-SP4-Micro-5-4-BYOS-Azure, but entry?
CVE-2022-45919: no packages for Image SLES15-SP4-Micro-5-4-BYOS-EC2, but entry?
CVE-2022-45919: no packages for Image SLES15-SP4-Micro-5-4-BYOS-GCE, but entry?
CVE-2022-45919: no packages for Image SLES15-SP4-Micro-5-4-EC2, but entry?
CVE-2022-45919: no packages for Image SLES15-SP4-Micro-5-4-GCE, but entry?
CVE-2022-45919: no packages for Image SLES15-SP4-SAP, but entry?
CVE-2022-45919: no packages for Image SLES15-SP4-SAP-Azure, but entry?
CVE-2022-45919: no packages for Image SLES15-SP4-SAP-Azure-LI-BYOS, but entry?
CVE-2022-45919: no packages for Image SLES15-SP4-SAP-Azure-LI-BYOS-Production, but entry?
CVE-2022-45919: no packages for Image SLES15-SP4-SAP-Azure-VLI-BYOS, but entry?
CVE-2022-45919: no packages for Image SLES15-SP4-SAP-Azure-VLI-BYOS-Production, but entry?
CVE-2022-45919: no packages for Image SLES15-SP4-SAP-BYOS, but entry?
CVE-2022-45919: no packages for Image SLES15-SP4-SAP-BYOS-Azure, but entry?
CVE-2022-45919: no packages for Image SLES15-SP4-SAP-BYOS-EC2, but entry?
CVE-2022-45919: no packages for Image SLES15-SP4-SAP-BYOS-GCE, but entry?
CVE-2022-45919: no packages for Image SLES15-SP4-SAP-EC2, but entry?
CVE-2022-45919: no packages for Image SLES15-SP4-SAP-GCE, but entry?
CVE-2022-45919: no packages for Image SLES15-SP4-SAP-Hardened, but entry?
CVE-2022-45919: no packages for Image SLES15-SP4-SAP-Hardened-Azure, but entry?
CVE-2022-45919: no packages for Image SLES15-SP4-SAP-Hardened-BYOS, but entry?
CVE-2022-45919: no packages for Image SLES15-SP4-SAP-Hardened-BYOS-Azure, but entry?
CVE-2022-45919: no packages for Image SLES15-SP4-SAP-Hardened-BYOS-EC2, but entry?
CVE-2022-45919: no packages for Image SLES15-SP4-SAP-Hardened-BYOS-GCE, but entry?
CVE-2022-45919: no packages for Image SLES15-SP4-SAP-Hardened-GCE, but entry?
CVE-2022-45919: no packages for Image SLES15-SP4-SAPCAL, but entry?
CVE-2022-45919: no packages for Image SLES15-SP4-SAPCAL-Azure, but entry?
CVE-2022-45919: no packages for Image SLES15-SP4-SAPCAL-EC2, but entry?
CVE-2022-45919: no packages for Image SLES15-SP4-SAPCAL-GCE, but entry?
CVE-2022-45919: no packages for Image SLES15-SP4-SUSE-Rancher-Setup-BYOS, but entry?
CVE-2022-45919: no packages for Image SLES15-SP4-SUSE-Rancher-Setup-BYOS-EC2, but entry?
CVE-2022-45919: no packages for Image SLES15-SP5-Azure-Basic, but entry?
CVE-2022-45919: no packages for Image SLES15-SP5-Azure-Standard, but entry?
CVE-2022-45919: no packages for Image SLES15-SP5-BYOS-Azure, but entry?
CVE-2022-45919: no packages for Image SLES15-SP5-BYOS-EC2, but entry?
CVE-2022-45919: no packages for Image SLES15-SP5-BYOS-GCE, but entry?
CVE-2022-45919: no packages for Image SLES15-SP5-CHOST-BYOS-Aliyun, but entry?
CVE-2022-45919: no packages for Image SLES15-SP5-CHOST-BYOS-Azure, but entry?
CVE-2022-45919: no packages for Image SLES15-SP5-CHOST-BYOS-EC2, but entry?
CVE-2022-45919: no packages for Image SLES15-SP5-CHOST-BYOS-GCE, but entry?
CVE-2022-45919: no packages for Image SLES15-SP5-CHOST-BYOS-GDC, but entry?
CVE-2022-45919: no packages for Image SLES15-SP5-CHOST-BYOS-SAP-CCloud, but entry?
CVE-2022-45919: no packages for Image SLES15-SP5-EC2, but entry?
CVE-2022-45919: no packages for Image SLES15-SP5-GCE, but entry?
CVE-2022-45919: no packages for Image SLES15-SP5-HPC-Azure, but entry?
CVE-2022-45919: no packages for Image SLES15-SP5-HPC-BYOS-Azure, but entry?
CVE-2022-45919: no packages for Image SLES15-SP5-HPC-BYOS-EC2, but entry?
CVE-2022-45919: no packages for Image SLES15-SP5-HPC-BYOS-GCE, but entry?
CVE-2022-45919: no packages for Image SLES15-SP5-Hardened-BYOS-Azure, but entry?
CVE-2022-45919: no packages for Image SLES15-SP5-Hardened-BYOS-EC2, but entry?
CVE-2022-45919: no packages for Image SLES15-SP5-Hardened-BYOS-GCE, but entry?
CVE-2022-45919: no packages for Image SLES15-SP5-Manager-Proxy-5-0-BYOS, but entry?
CVE-2022-45919: no packages for Image SLES15-SP5-Manager-Proxy-5-0-BYOS-Azure, but entry?
CVE-2022-45919: no packages for Image SLES15-SP5-Manager-Proxy-5-0-BYOS-EC2, but entry?
CVE-2022-45919: no packages for Image SLES15-SP5-Manager-Proxy-5-0-BYOS-GCE, but entry?
CVE-2022-45919: no packages for Image SLES15-SP5-Manager-Server-5-0-BYOS, but entry?
CVE-2022-45919: no packages for Image SLES15-SP5-Manager-Server-5-0-BYOS-Azure, but entry?
CVE-2022-45919: no packages for Image SLES15-SP5-Manager-Server-5-0-BYOS-EC2, but entry?
CVE-2022-45919: no packages for Image SLES15-SP5-Manager-Server-5-0-BYOS-GCE, but entry?
CVE-2022-45919: no packages for Image SLES15-SP5-Micro-5-5, but entry?
CVE-2022-45919: no packages for Image SLES15-SP5-Micro-5-5-Azure, but entry?
CVE-2022-45919: no packages for Image SLES15-SP5-Micro-5-5-BYOS, but entry?
CVE-2022-45919: no packages for Image SLES15-SP5-Micro-5-5-BYOS-Azure, but entry?
CVE-2022-45919: no packages for Image SLES15-SP5-Micro-5-5-BYOS-EC2, but entry?
CVE-2022-45919: no packages for Image SLES15-SP5-Micro-5-5-BYOS-GCE, but entry?
CVE-2022-45919: no packages for Image SLES15-SP5-Micro-5-5-EC2, but entry?
CVE-2022-45919: no packages for Image SLES15-SP5-Micro-5-5-GCE, but entry?
CVE-2022-45919: no packages for Image SLES15-SP5-SAP-Azure-LI-BYOS, but entry?
CVE-2022-45919: no packages for Image SLES15-SP5-SAP-Azure-LI-BYOS-Production, but entry?
CVE-2022-45919: no packages for Image SLES15-SP5-SAP-Azure-VLI-BYOS, but entry?
CVE-2022-45919: no packages for Image SLES15-SP5-SAP-Azure-VLI-BYOS-Production, but entry?
CVE-2022-45919: no packages for Image SLES15-SP5-SAP-BYOS-Azure, but entry?
CVE-2022-45919: no packages for Image SLES15-SP5-SAP-BYOS-EC2, but entry?
CVE-2022-45919: no packages for Image SLES15-SP5-SAP-BYOS-GCE, but entry?
CVE-2022-45919: no packages for Image SLES15-SP5-SAP-Hardened-Azure, but entry?
CVE-2022-45919: no packages for Image SLES15-SP5-SAP-Hardened-BYOS-Azure, but entry?
CVE-2022-45919: no packages for Image SLES15-SP5-SAP-Hardened-BYOS-EC2, but entry?
CVE-2022-45919: no packages for Image SLES15-SP5-SAP-Hardened-BYOS-GCE, but entry?
CVE-2022-45919: no packages for Image SLES15-SP5-SAP-Hardened-GCE, but entry?
CVE-2022-45919: no packages for Image SLES15-SP5-SAPCAL-Azure, but entry?
CVE-2022-45919: no packages for Image SLES15-SP5-SAPCAL-EC2, but entry?
CVE-2022-45919: no packages for Image SLES15-SP5-SAPCAL-GCE, but entry?
CVE-2022-45919: no packages for SUSE CaaS Platform 4.0, but entry?
CVE-2022-45919: no packages for SUSE Enterprise Storage 7, but entry?
CVE-2022-45919: no packages for SUSE Enterprise Storage 7.1, but entry?
CVE-2022-45919: no packages for SUSE Linux Enterprise High Availability Extension 12 SP4, but entry?
CVE-2022-45919: no packages for SUSE Linux Enterprise High Availability Extension 12 SP5, but entry?
CVE-2022-45919: no packages for SUSE Linux Enterprise High Availability Extension 15 SP1, but entry?
CVE-2022-45919: no packages for SUSE Linux Enterprise High Availability Extension 15 SP2, but entry?
CVE-2022-45919: no packages for SUSE Linux Enterprise High Availability Extension 15 SP3, but entry?
CVE-2022-45919: no packages for SUSE Linux Enterprise High Availability Extension 15 SP4, but entry?
CVE-2022-45919: no packages for SUSE Linux Enterprise High Availability Extension 15 SP5, but entry?
CVE-2022-45919: no packages for SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS, but entry?
CVE-2022-45919: no packages for SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS, but entry?
CVE-2022-45919: no packages for SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS, but entry?
CVE-2022-45919: no packages for SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS, but entry?
CVE-2022-45919: no packages for SUSE Linux Enterprise Live Patching 12 SP4, but entry?
CVE-2022-45919: no packages for SUSE Linux Enterprise Live Patching 12 SP5, but entry?
CVE-2022-45919: no packages for SUSE Linux Enterprise Live Patching 15 SP1, but entry?
CVE-2022-45919: no packages for SUSE Linux Enterprise Live Patching 15 SP2, but entry?
CVE-2022-45919: no packages for SUSE Linux Enterprise Live Patching 15 SP3, but entry?
CVE-2022-45919: no packages for SUSE Linux Enterprise Live Patching 15 SP4, but entry?
CVE-2022-45919: no packages for SUSE Linux Enterprise Live Patching 15 SP5, but entry?
CVE-2022-45919: no packages for SUSE Linux Enterprise Micro 5.1, but entry?
CVE-2022-45919: no packages for SUSE Linux Enterprise Micro 5.2, but entry?
CVE-2022-45919: no packages for SUSE Linux Enterprise Micro 5.3, but entry?
CVE-2022-45919: no packages for SUSE Linux Enterprise Micro 5.4, but entry?
CVE-2022-45919: no packages for SUSE Linux Enterprise Module for Basesystem 15 SP4, but entry?
CVE-2022-45919: no packages for SUSE Linux Enterprise Module for Basesystem 15 SP5, but entry?
CVE-2022-45919: no packages for SUSE Linux Enterprise Module for Development Tools 15 SP4, but entry?
CVE-2022-45919: no packages for SUSE Linux Enterprise Module for Development Tools 15 SP5, but entry?
CVE-2022-45919: no packages for SUSE Linux Enterprise Module for Legacy 15 SP4, but entry?
CVE-2022-45919: no packages for SUSE Linux Enterprise Module for Legacy 15 SP5, but entry?
CVE-2022-45919: no packages for SUSE Linux Enterprise Module for Public Cloud 15 SP4, but entry?
CVE-2022-45919: no packages for SUSE Linux Enterprise Module for Public Cloud 15 SP5, but entry?
CVE-2022-45919: no packages for SUSE Linux Enterprise Real Time 12 SP5, but entry?
CVE-2022-45919: no packages for SUSE Linux Enterprise Real Time 15 SP3, but entry?
CVE-2022-45919: no packages for SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE, but entry?
CVE-2022-45919: no packages for SUSE Linux Enterprise Server 12 SP2-BCL, but entry?
CVE-2022-45919: no packages for SUSE Linux Enterprise Server 12 SP3-LTSS-TERADATA, but entry?
CVE-2022-45919: no packages for SUSE Linux Enterprise Server 12 SP3-TERADATA, but entry?
CVE-2022-45919: no packages for SUSE Linux Enterprise Server 12 SP4-ESPOS, but entry?
CVE-2022-45919: no packages for SUSE Linux Enterprise Server 12 SP4-LTSS, but entry?
CVE-2022-45919: no packages for SUSE Linux Enterprise Server 12 SP5, but entry?
CVE-2022-45919: no packages for SUSE Linux Enterprise Server 15 SP1-LTSS, but entry?
CVE-2022-45919: no packages for SUSE Linux Enterprise Server 15 SP2-LTSS, but entry?
CVE-2022-45919: no packages for SUSE Linux Enterprise Server 15 SP3-LTSS, but entry?
CVE-2022-45919: no packages for SUSE Linux Enterprise Server 15 SP4-TERADATA, but entry?
CVE-2022-45919: no packages for SUSE Linux Enterprise Server for SAP Applications 12 SP4, but entry?
CVE-2022-45919: no packages for SUSE Linux Enterprise Server for SAP Applications 12 SP5, but entry?
CVE-2022-45919: no packages for SUSE Linux Enterprise Server for SAP Applications 15 SP1, but entry?
CVE-2022-45919: no packages for SUSE Linux Enterprise Server for SAP Applications 15 SP2, but entry?
CVE-2022-45919: no packages for SUSE Linux Enterprise Server for SAP Applications 15 SP3, but entry?
CVE-2022-45919: no packages for SUSE Linux Enterprise Software Development Kit 12 SP5, but entry?
CVE-2022-45919: no packages for SUSE Manager Proxy 4.2, but entry?
CVE-2022-45919: no packages for SUSE Manager Retail Branch Server 4.2, but entry?
CVE-2022-45919: no packages for SUSE Manager Server 4.2, but entry?
CVE-2022-45919: no packages for SUSE OpenStack Cloud 9, but entry?
CVE-2022-45919: no packages for SUSE OpenStack Cloud Crowbar 9, but entry?
CVE-2022-45919: no packages for SUSE Real Time Module 15 SP3, but entry?
CVE-2022-45919: no packages for SUSE Real Time Module 15 SP4, but entry?
CVE-2022-45919: no packages for SUSE Real Time Module 15 SP5, but entry?
CVE-2022-45919: no packages for openSUSE Leap Micro 5.3, but entry?
CVE-2022-45919: no packages for openSUSE Leap Micro 5.4, but entry?
CVE-2022-45919: no packages for Container bci/bci-sle15-kernel-module-devel:15.5, but entry?
CVE-2022-45919: no packages for Container rancher/elemental-teal-rt/5.4:1.2.3-2.2.63, but entry?
CVE-2022-45919: no packages for Container suse/hpc/warewulf4-x86_64/sle-hpc-node:latest, but entry?
CVE-2022-45919: no packages for Container suse/sle-micro-rancher/5.2:latest, but entry?
CVE-2022-45919: no packages for Container suse/sle-micro-rancher/5.3:latest, but entry?
CVE-2022-45919: no packages for Container suse/sle-micro-rancher/5.4:latest, but entry?
CVE-2022-45919: no packages for Container suse/sle-micro/kvm-5.5:2.0.2-2.2.20, but entry?
CVE-2022-45919: no packages for Container suse/sle-micro/rt-5.5:2.0.2-3.2.23, but entry?
CVE-2022-45919: no packages for Image SLES12-SP5-Azure-BYOS, but entry?
CVE-2022-45919: no packages for Image SLES12-SP5-Azure-Basic-On-Demand, but entry?
CVE-2022-45919: no packages for Image SLES12-SP5-Azure-HPC-BYOS, but entry?
CVE-2022-45919: no packages for Image SLES12-SP5-Azure-HPC-On-Demand, but entry?
CVE-2022-45919: no packages for Image SLES12-SP5-Azure-SAP-BYOS, but entry?
CVE-2022-45919: no packages for Image SLES12-SP5-Azure-SAP-On-Demand, but entry?
CVE-2022-45919: no packages for Image SLES12-SP5-Azure-Standard-On-Demand, but entry?
CVE-2022-45919: no packages for Image SLES12-SP5-EC2-BYOS, but entry?
CVE-2022-45919: no packages for Image SLES12-SP5-EC2-ECS-On-Demand, but entry?
CVE-2022-45919: no packages for Image SLES12-SP5-EC2-On-Demand, but entry?
CVE-2022-45919: no packages for Image SLES12-SP5-EC2-SAP-BYOS, but entry?
CVE-2022-45919: no packages for Image SLES12-SP5-EC2-SAP-On-Demand, but entry?
CVE-2022-45919: no packages for Image SLES12-SP5-GCE-BYOS, but entry?
CVE-2022-45919: no packages for Image SLES12-SP5-GCE-On-Demand, but entry?
CVE-2022-45919: no packages for Image SLES12-SP5-GCE-SAP-BYOS, but entry?
CVE-2022-45919: no packages for Image SLES12-SP5-GCE-SAP-On-Demand, but entry?
CVE-2022-45919: no packages for Image SLES12-SP5-SAP-Azure-LI-BYOS-Production, but entry?
CVE-2022-45919: no packages for Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production, but entry?
CVE-2022-45919: no packages for Image SLES15-SP1-SAP-Azure-LI-BYOS-Production, but entry?
CVE-2022-45919: no packages for Image SLES15-SP1-SAP-Azure-VLI-BYOS-Production, but entry?
CVE-2022-45919: no packages for Image SLES15-SP2-BYOS-Azure, but entry?
CVE-2022-45919: no packages for Image SLES15-SP2-HPC-BYOS-Azure, but entry?
CVE-2022-45919: no packages for Image SLES15-SP2-SAP-Azure, but entry?
CVE-2022-45919: no packages for Image SLES15-SP2-SAP-Azure-LI-BYOS-Production, but entry?
CVE-2022-45919: no packages for Image SLES15-SP2-SAP-Azure-VLI-BYOS-Production, but entry?
CVE-2022-45919: no packages for Image SLES15-SP2-SAP-BYOS-Azure, but entry?
CVE-2022-45919: no packages for Image SLES15-SP2-SAP-BYOS-EC2-HVM, but entry?
CVE-2022-45919: no packages for Image SLES15-SP2-SAP-BYOS-GCE, but entry?
CVE-2022-45919: no packages for Image SLES15-SP2-SAP-EC2-HVM, but entry?
CVE-2022-45919: no packages for Image SLES15-SP2-SAP-GCE, but entry?
CVE-2022-45919: no packages for Image SLES15-SP3-BYOS-Azure, but entry?
CVE-2022-45919: no packages for Image SLES15-SP3-BYOS-EC2-HVM, but entry?
CVE-2022-45919: no packages for Image SLES15-SP3-BYOS-GCE, but entry?
CVE-2022-45919: no packages for Image SLES15-SP3-CHOST-BYOS-Aliyun, but entry?
CVE-2022-45919: no packages for Image SLES15-SP3-CHOST-BYOS-Azure, but entry?
CVE-2022-45919: no packages for Image SLES15-SP3-CHOST-BYOS-EC2, but entry?
CVE-2022-45919: no packages for Image SLES15-SP3-CHOST-BYOS-GCE, but entry?
CVE-2022-45919: no packages for Image SLES15-SP3-CHOST-BYOS-SAP-CCloud, but entry?
CVE-2022-45919: no packages for Image SLES15-SP3-HPC-BYOS-Azure, but entry?
CVE-2022-45919: no packages for Image SLES15-SP3-HPC-BYOS-EC2-HVM, but entry?
CVE-2022-45919: no packages for Image SLES15-SP3-HPC-BYOS-GCE, but entry?
CVE-2022-45919: no packages for Image SLES15-SP3-Manager-4-2-Proxy-BYOS-Azure, but entry?
CVE-2022-45919: no packages for Image SLES15-SP3-Manager-4-2-Proxy-BYOS-EC2-HVM, but entry?
CVE-2022-45919: no packages for Image SLES15-SP3-Manager-4-2-Proxy-BYOS-GCE, but entry?
CVE-2022-45919: no packages for Image SLES15-SP3-Manager-4-2-Server-BYOS-Azure, but entry?
CVE-2022-45919: no packages for Image SLES15-SP3-Manager-4-2-Server-BYOS-EC2-HVM, but entry?
CVE-2022-45919: no packages for Image SLES15-SP3-Manager-4-2-Server-BYOS-GCE, but entry?
CVE-2022-45919: no packages for Image SLES15-SP3-Micro-5-1-BYOS-Azure, but entry?
CVE-2022-45919: no packages for Image SLES15-SP3-Micro-5-1-BYOS-EC2-HVM, but entry?
CVE-2022-45919: no packages for Image SLES15-SP3-Micro-5-1-BYOS-GCE, but entry?
CVE-2022-45919: no packages for Image SLES15-SP3-Micro-5-2-BYOS-Azure, but entry?
CVE-2022-45919: no packages for Image SLES15-SP3-Micro-5-2-BYOS-EC2-HVM, but entry?
CVE-2022-45919: no packages for Image SLES15-SP3-Micro-5-2-BYOS-GCE, but entry?
CVE-2022-45919: no packages for Image SLES15-SP3-SAP-Azure-LI-BYOS-Production, but entry?
CVE-2022-45919: no packages for Image SLES15-SP3-SAP-Azure-VLI-BYOS-Production, but entry?
CVE-2022-45919: no packages for Image SLES15-SP3-SAP-BYOS-Azure, but entry?
CVE-2022-45919: no packages for Image SLES15-SP3-SAP-BYOS-EC2-HVM, but entry?
CVE-2022-45919: no packages for Image SLES15-SP3-SAP-BYOS-GCE, but entry?
CVE-2022-45919: no packages for Image SLES15-SP3-SAPCAL-Azure, but entry?
CVE-2022-45919: no packages for Image SLES15-SP3-SAPCAL-EC2-HVM, but entry?
CVE-2022-45919: no packages for Image SLES15-SP3-SAPCAL-GCE, but entry?
CVE-2022-45919: no packages for Image SLES15-SP4-BYOS, but entry?
CVE-2022-45919: no packages for Image SLES15-SP4-BYOS-Azure, but entry?
CVE-2022-45919: no packages for Image SLES15-SP4-BYOS-EC2, but entry?
CVE-2022-45919: no packages for Image SLES15-SP4-BYOS-GCE, but entry?
CVE-2022-45919: no packages for Image SLES15-SP4-CHOST-BYOS, but entry?
CVE-2022-45919: no packages for Image SLES15-SP4-CHOST-BYOS-Aliyun, but entry?
CVE-2022-45919: no packages for Image SLES15-SP4-CHOST-BYOS-Azure, but entry?
CVE-2022-45919: no packages for Image SLES15-SP4-CHOST-BYOS-EC2, but entry?
CVE-2022-45919: no packages for Image SLES15-SP4-CHOST-BYOS-GCE, but entry?
CVE-2022-45919: no packages for Image SLES15-SP4-CHOST-BYOS-SAP-CCloud, but entry?
CVE-2022-45919: no packages for Image SLES15-SP4-HPC-BYOS, but entry?
CVE-2022-45919: no packages for Image SLES15-SP4-HPC-BYOS-Azure, but entry?
CVE-2022-45919: no packages for Image SLES15-SP4-HPC-BYOS-EC2, but entry?
CVE-2022-45919: no packages for Image SLES15-SP4-HPC-BYOS-GCE, but entry?
CVE-2022-45919: no packages for Image SLES15-SP4-HPC-EC2, but entry?
CVE-2022-45919: no packages for Image SLES15-SP4-HPC-GCE, but entry?
CVE-2022-45919: no packages for Image SLES15-SP4-Hardened-BYOS, but entry?
CVE-2022-45919: no packages for Image SLES15-SP4-Hardened-BYOS-Azure, but entry?
CVE-2022-45919: no packages for Image SLES15-SP4-Hardened-BYOS-EC2, but entry?
CVE-2022-45919: no packages for Image SLES15-SP4-Hardened-BYOS-GCE, but entry?
CVE-2022-45919: no packages for Image SLES15-SP4-Manager-Proxy-4-3-BYOS, but entry?
CVE-2022-45919: no packages for Image SLES15-SP4-Manager-Proxy-4-3-BYOS-Azure, but entry?
CVE-2022-45919: no packages for Image SLES15-SP4-Manager-Proxy-4-3-BYOS-EC2, but entry?
CVE-2022-45919: no packages for Image SLES15-SP4-Manager-Proxy-4-3-BYOS-GCE, but entry?
CVE-2022-45919: no packages for Image SLES15-SP4-Manager-Server-4-3, but entry?
CVE-2022-45919: no packages for Image SLES15-SP4-Manager-Server-4-3-Azure-llc, but entry?
CVE-2022-45919: no packages for Image SLES15-SP4-Manager-Server-4-3-Azure-ltd, but entry?
CVE-2022-45919: no packages for Image SLES15-SP4-Manager-Server-4-3-BYOS, but entry?
CVE-2022-45919: no packages for Image SLES15-SP4-Manager-Server-4-3-BYOS-Azure, but entry?
CVE-2022-45919: no packages for Image SLES15-SP4-Manager-Server-4-3-BYOS-EC2, but entry?
CVE-2022-45919: no packages for Image SLES15-SP4-Manager-Server-4-3-BYOS-GCE, but entry?
CVE-2022-45919: no packages for Image SLES15-SP4-Manager-Server-4-3-EC2-llc, but entry?
CVE-2022-45919: no packages for Image SLES15-SP4-Manager-Server-4-3-EC2-ltd, but entry?
CVE-2022-45919: no packages for Image SLES15-SP4-Micro-5-3, but entry?
CVE-2022-45919: no packages for Image SLES15-SP4-Micro-5-3-BYOS, but entry?
CVE-2022-45919: no packages for Image SLES15-SP4-Micro-5-3-BYOS-Azure, but entry?
CVE-2022-45919: no packages for Image SLES15-SP4-Micro-5-3-BYOS-EC2, but entry?
CVE-2022-45919: no packages for Image SLES15-SP4-Micro-5-3-BYOS-GCE, but entry?
CVE-2022-45919: no packages for Image SLES15-SP4-Micro-5-3-EC2, but entry?
CVE-2022-45919: no packages for Image SLES15-SP4-Micro-5-4, but entry?
CVE-2022-45919: no packages for Image SLES15-SP4-Micro-5-4-BYOS, but entry?
CVE-2022-45919: no packages for Image SLES15-SP4-Micro-5-4-BYOS-Azure, but entry?
CVE-2022-45919: no packages for Image SLES15-SP4-Micro-5-4-BYOS-EC2, but entry?
CVE-2022-45919: no packages for Image SLES15-SP4-Micro-5-4-BYOS-GCE, but entry?
CVE-2022-45919: no packages for Image SLES15-SP4-Micro-5-4-EC2, but entry?
CVE-2022-45919: no packages for Image SLES15-SP4-Micro-5-4-GCE, but entry?
CVE-2022-45919: no packages for Image SLES15-SP4-SAP, but entry?
CVE-2022-45919: no packages for Image SLES15-SP4-SAP-Azure, but entry?
CVE-2022-45919: no packages for Image SLES15-SP4-SAP-Azure-LI-BYOS, but entry?
CVE-2022-45919: no packages for Image SLES15-SP4-SAP-Azure-LI-BYOS-Production, but entry?
CVE-2022-45919: no packages for Image SLES15-SP4-SAP-Azure-VLI-BYOS, but entry?
CVE-2022-45919: no packages for Image SLES15-SP4-SAP-Azure-VLI-BYOS-Production, but entry?
CVE-2022-45919: no packages for Image SLES15-SP4-SAP-BYOS, but entry?
CVE-2022-45919: no packages for Image SLES15-SP4-SAP-BYOS-Azure, but entry?
CVE-2022-45919: no packages for Image SLES15-SP4-SAP-BYOS-EC2, but entry?
CVE-2022-45919: no packages for Image SLES15-SP4-SAP-BYOS-GCE, but entry?
CVE-2022-45919: no packages for Image SLES15-SP4-SAP-EC2, but entry?
CVE-2022-45919: no packages for Image SLES15-SP4-SAP-GCE, but entry?
CVE-2022-45919: no packages for Image SLES15-SP4-SAP-Hardened, but entry?
CVE-2022-45919: no packages for Image SLES15-SP4-SAP-Hardened-Azure, but entry?
CVE-2022-45919: no packages for Image SLES15-SP4-SAP-Hardened-BYOS, but entry?
CVE-2022-45919: no packages for Image SLES15-SP4-SAP-Hardened-BYOS-Azure, but entry?
CVE-2022-45919: no packages for Image SLES15-SP4-SAP-Hardened-BYOS-EC2, but entry?
CVE-2022-45919: no packages for Image SLES15-SP4-SAP-Hardened-BYOS-GCE, but entry?
CVE-2022-45919: no packages for Image SLES15-SP4-SAP-Hardened-GCE, but entry?
CVE-2022-45919: no packages for Image SLES15-SP4-SAPCAL, but entry?
CVE-2022-45919: no packages for Image SLES15-SP4-SAPCAL-Azure, but entry?
CVE-2022-45919: no packages for Image SLES15-SP4-SAPCAL-EC2, but entry?
CVE-2022-45919: no packages for Image SLES15-SP4-SAPCAL-GCE, but entry?
CVE-2022-45919: no packages for Image SLES15-SP4-SUSE-Rancher-Setup-BYOS, but entry?
CVE-2022-45919: no packages for Image SLES15-SP4-SUSE-Rancher-Setup-BYOS-EC2, but entry?
CVE-2022-45919: no packages for Image SLES15-SP5-Azure-Basic, but entry?
CVE-2022-45919: no packages for Image SLES15-SP5-Azure-Standard, but entry?
CVE-2022-45919: no packages for Image SLES15-SP5-BYOS-Azure, but entry?
CVE-2022-45919: no packages for Image SLES15-SP5-BYOS-EC2, but entry?
CVE-2022-45919: no packages for Image SLES15-SP5-BYOS-GCE, but entry?
CVE-2022-45919: no packages for Image SLES15-SP5-CHOST-BYOS-Aliyun, but entry?
CVE-2022-45919: no packages for Image SLES15-SP5-CHOST-BYOS-Azure, but entry?
CVE-2022-45919: no packages for Image SLES15-SP5-CHOST-BYOS-EC2, but entry?
CVE-2022-45919: no packages for Image SLES15-SP5-CHOST-BYOS-GCE, but entry?
CVE-2022-45919: no packages for Image SLES15-SP5-CHOST-BYOS-GDC, but entry?
CVE-2022-45919: no packages for Image SLES15-SP5-CHOST-BYOS-SAP-CCloud, but entry?
CVE-2022-45919: no packages for Image SLES15-SP5-EC2, but entry?
CVE-2022-45919: no packages for Image SLES15-SP5-GCE, but entry?
CVE-2022-45919: no packages for Image SLES15-SP5-HPC-Azure, but entry?
CVE-2022-45919: no packages for Image SLES15-SP5-HPC-BYOS-Azure, but entry?
CVE-2022-45919: no packages for Image SLES15-SP5-HPC-BYOS-EC2, but entry?
CVE-2022-45919: no packages for Image SLES15-SP5-HPC-BYOS-GCE, but entry?
CVE-2022-45919: no packages for Image SLES15-SP5-Hardened-BYOS-Azure, but entry?
CVE-2022-45919: no packages for Image SLES15-SP5-Hardened-BYOS-EC2, but entry?
CVE-2022-45919: no packages for Image SLES15-SP5-Hardened-BYOS-GCE, but entry?
CVE-2022-45919: no packages for Image SLES15-SP5-Manager-Proxy-5-0-BYOS, but entry?
CVE-2022-45919: no packages for Image SLES15-SP5-Manager-Proxy-5-0-BYOS-Azure, but entry?
CVE-2022-45919: no packages for Image SLES15-SP5-Manager-Proxy-5-0-BYOS-EC2, but entry?
CVE-2022-45919: no packages for Image SLES15-SP5-Manager-Proxy-5-0-BYOS-GCE, but entry?
CVE-2022-45919: no packages for Image SLES15-SP5-Manager-Server-5-0-BYOS, but entry?
CVE-2022-45919: no packages for Image SLES15-SP5-Manager-Server-5-0-BYOS-Azure, but entry?
CVE-2022-45919: no packages for Image SLES15-SP5-Manager-Server-5-0-BYOS-EC2, but entry?
CVE-2022-45919: no packages for Image SLES15-SP5-Manager-Server-5-0-BYOS-GCE, but entry?
CVE-2022-45919: no packages for Image SLES15-SP5-Micro-5-5, but entry?
CVE-2022-45919: no packages for Image SLES15-SP5-Micro-5-5-Azure, but entry?
CVE-2022-45919: no packages for Image SLES15-SP5-Micro-5-5-BYOS, but entry?
CVE-2022-45919: no packages for Image SLES15-SP5-Micro-5-5-BYOS-Azure, but entry?
CVE-2022-45919: no packages for Image SLES15-SP5-Micro-5-5-BYOS-EC2, but entry?
CVE-2022-45919: no packages for Image SLES15-SP5-Micro-5-5-BYOS-GCE, but entry?
CVE-2022-45919: no packages for Image SLES15-SP5-Micro-5-5-EC2, but entry?
CVE-2022-45919: no packages for Image SLES15-SP5-Micro-5-5-GCE, but entry?
CVE-2022-45919: no packages for Image SLES15-SP5-SAP-Azure-LI-BYOS, but entry?
CVE-2022-45919: no packages for Image SLES15-SP5-SAP-Azure-LI-BYOS-Production, but entry?
CVE-2022-45919: no packages for Image SLES15-SP5-SAP-Azure-VLI-BYOS, but entry?
CVE-2022-45919: no packages for Image SLES15-SP5-SAP-Azure-VLI-BYOS-Production, but entry?
CVE-2022-45919: no packages for Image SLES15-SP5-SAP-BYOS-Azure, but entry?
CVE-2022-45919: no packages for Image SLES15-SP5-SAP-BYOS-EC2, but entry?
CVE-2022-45919: no packages for Image SLES15-SP5-SAP-BYOS-GCE, but entry?
CVE-2022-45919: no packages for Image SLES15-SP5-SAP-Hardened-Azure, but entry?
CVE-2022-45919: no packages for Image SLES15-SP5-SAP-Hardened-BYOS-Azure, but entry?
CVE-2022-45919: no packages for Image SLES15-SP5-SAP-Hardened-BYOS-EC2, but entry?
CVE-2022-45919: no packages for Image SLES15-SP5-SAP-Hardened-BYOS-GCE, but entry?
CVE-2022-45919: no packages for Image SLES15-SP5-SAP-Hardened-GCE, but entry?
CVE-2022-45919: no packages for Image SLES15-SP5-SAPCAL-Azure, but entry?
CVE-2022-45919: no packages for Image SLES15-SP5-SAPCAL-EC2, but entry?
CVE-2022-45919: no packages for Image SLES15-SP5-SAPCAL-GCE, but entry?
CVE-2022-45919: no packages for SUSE CaaS Platform 4.0, but entry?
CVE-2022-45919: no packages for SUSE Enterprise Storage 7, but entry?
CVE-2022-45919: no packages for SUSE Enterprise Storage 7.1, but entry?
CVE-2022-45919: no packages for SUSE Linux Enterprise High Availability Extension 12 SP4, but entry?
CVE-2022-45919: no packages for SUSE Linux Enterprise High Availability Extension 12 SP5, but entry?
CVE-2022-45919: no packages for SUSE Linux Enterprise High Availability Extension 15 SP1, but entry?
CVE-2022-45919: no packages for SUSE Linux Enterprise High Availability Extension 15 SP2, but entry?
CVE-2022-45919: no packages for SUSE Linux Enterprise High Availability Extension 15 SP3, but entry?
CVE-2022-45919: no packages for SUSE Linux Enterprise High Availability Extension 15 SP4, but entry?
CVE-2022-45919: no packages for SUSE Linux Enterprise High Availability Extension 15 SP5, but entry?
CVE-2022-45919: no packages for SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS, but entry?
CVE-2022-45919: no packages for SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS, but entry?
CVE-2022-45919: no packages for SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS, but entry?
CVE-2022-45919: no packages for SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS, but entry?
CVE-2022-45919: no packages for SUSE Linux Enterprise Live Patching 12 SP4, but entry?
CVE-2022-45919: no packages for SUSE Linux Enterprise Live Patching 12 SP5, but entry?
CVE-2022-45919: no packages for SUSE Linux Enterprise Live Patching 15 SP1, but entry?
CVE-2022-45919: no packages for SUSE Linux Enterprise Live Patching 15 SP2, but entry?
CVE-2022-45919: no packages for SUSE Linux Enterprise Live Patching 15 SP3, but entry?
CVE-2022-45919: no packages for SUSE Linux Enterprise Live Patching 15 SP4, but entry?
CVE-2022-45919: no packages for SUSE Linux Enterprise Live Patching 15 SP5, but entry?
CVE-2022-45919: no packages for SUSE Linux Enterprise Micro 5.1, but entry?
CVE-2022-45919: no packages for SUSE Linux Enterprise Micro 5.2, but entry?
CVE-2022-45919: no packages for SUSE Linux Enterprise Micro 5.3, but entry?
CVE-2022-45919: no packages for SUSE Linux Enterprise Micro 5.4, but entry?
CVE-2022-45919: no packages for SUSE Linux Enterprise Module for Basesystem 15 SP4, but entry?
CVE-2022-45919: no packages for SUSE Linux Enterprise Module for Basesystem 15 SP5, but entry?
CVE-2022-45919: no packages for SUSE Linux Enterprise Module for Development Tools 15 SP4, but entry?
CVE-2022-45919: no packages for SUSE Linux Enterprise Module for Development Tools 15 SP5, but entry?
CVE-2022-45919: no packages for SUSE Linux Enterprise Module for Legacy 15 SP4, but entry?
CVE-2022-45919: no packages for SUSE Linux Enterprise Module for Legacy 15 SP5, but entry?
CVE-2022-45919: no packages for SUSE Linux Enterprise Module for Public Cloud 15 SP4, but entry?
CVE-2022-45919: no packages for SUSE Linux Enterprise Module for Public Cloud 15 SP5, but entry?
CVE-2022-45919: no packages for SUSE Linux Enterprise Real Time 12 SP5, but entry?
CVE-2022-45919: no packages for SUSE Linux Enterprise Real Time 15 SP3, but entry?
CVE-2022-45919: no packages for SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE, but entry?
CVE-2022-45919: no packages for SUSE Linux Enterprise Server 12 SP2-BCL, but entry?
CVE-2022-45919: no packages for SUSE Linux Enterprise Server 12 SP3-LTSS-TERADATA, but entry?
CVE-2022-45919: no packages for SUSE Linux Enterprise Server 12 SP3-TERADATA, but entry?
CVE-2022-45919: no packages for SUSE Linux Enterprise Server 12 SP4-ESPOS, but entry?
CVE-2022-45919: no packages for SUSE Linux Enterprise Server 12 SP4-LTSS, but entry?
CVE-2022-45919: no packages for SUSE Linux Enterprise Server 12 SP5, but entry?
CVE-2022-45919: no packages for SUSE Linux Enterprise Server 15 SP1-LTSS, but entry?
CVE-2022-45919: no packages for SUSE Linux Enterprise Server 15 SP2-LTSS, but entry?
CVE-2022-45919: no packages for SUSE Linux Enterprise Server 15 SP3-LTSS, but entry?
CVE-2022-45919: no packages for SUSE Linux Enterprise Server 15 SP4-TERADATA, but entry?
CVE-2022-45919: no packages for SUSE Linux Enterprise Server for SAP Applications 12 SP4, but entry?
CVE-2022-45919: no packages for SUSE Linux Enterprise Server for SAP Applications 12 SP5, but entry?
CVE-2022-45919: no packages for SUSE Linux Enterprise Server for SAP Applications 15 SP1, but entry?
CVE-2022-45919: no packages for SUSE Linux Enterprise Server for SAP Applications 15 SP2, but entry?
CVE-2022-45919: no packages for SUSE Linux Enterprise Server for SAP Applications 15 SP3, but entry?
CVE-2022-45919: no packages for SUSE Linux Enterprise Software Development Kit 12 SP5, but entry?
CVE-2022-45919: no packages for SUSE Manager Proxy 4.2, but entry?
CVE-2022-45919: no packages for SUSE Manager Retail Branch Server 4.2, but entry?
CVE-2022-45919: no packages for SUSE Manager Server 4.2, but entry?
CVE-2022-45919: no packages for SUSE OpenStack Cloud 9, but entry?
CVE-2022-45919: no packages for SUSE OpenStack Cloud Crowbar 9, but entry?
CVE-2022-45919: no packages for SUSE Real Time Module 15 SP3, but entry?
CVE-2022-45919: no packages for SUSE Real Time Module 15 SP4, but entry?
CVE-2022-45919: no packages for SUSE Real Time Module 15 SP5, but entry?
CVE-2022-45919: no packages for openSUSE Leap Micro 5.3, but entry?
CVE-2022-45919: no packages for openSUSE Leap Micro 5.4, but entry?
skipping CVE-2022-45939 as CVE page is older than CVRF-CVE file.
skipping CVE-2022-45934 as CVE page is older than CVRF-CVE file.
no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2022-45887
skipping CVE-2022-45888 as CVE page is older than CVRF-CVE file.
no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2022-45884
skipping CVE-2022-45886 as CVE page is older than CVRF-CVE file.
skipping CVE-2022-45885 as CVE page is older than CVRF-CVE file.
skipping CVE-2022-45873 as CVE page is older than CVRF-CVE file.
skipping CVE-2022-45869 as CVE page is older than CVRF-CVE file.
CVE-2022-45693: no packages for SUSE CaaS Platform 4.0, but entry?
CVE-2022-45693: no packages for Image SLES15-SP5-SAP-Azure-VLI-BYOS-Production, but entry?
CVE-2022-45693: no packages for Container suse/manager/5.0/x86_64/server-attestation:5.0.0-beta2.2.16, but entry?
CVE-2022-45693: no packages for Image SLES15-SP6-SAP-Azure-VLI-BYOS, but entry?
CVE-2022-45693: no packages for Image SLES15-SP5-SAP-Azure, but entry?
CVE-2022-45693: no packages for Image SLES15-SP2-SAP-Azure-VLI-BYOS-Production, but entry?
CVE-2022-45693: no packages for Image SLES15-SP2-SAP-BYOS-EC2-HVM, but entry?
CVE-2022-45693: no packages for Image SLES15-SP6-SAPCAL-Azure, but entry?
CVE-2022-45693: no packages for SUSE Linux Enterprise Server 15 SP1-LTSS, but entry?
CVE-2022-45693: no packages for Container bci/openjdk-devel:17-7.2, but entry?
CVE-2022-45693: no packages for Image SLES15-SP5-SAPCAL-Azure, but entry?
CVE-2022-45693: no packages for SUSE Linux Enterprise Server for SAP Applications 15 SP2, but entry?
CVE-2022-45693: no packages for Image SLES15-SP5-SAP-GCE, but entry?
CVE-2022-45693: no packages for SUSE Linux Enterprise Workstation Extension 15 SP5, but entry?
CVE-2022-45693: no packages for Image SLES15-SP6-SAP-GCE, but entry?
CVE-2022-45693: no packages for Image SLES15-SP4-Manager-Server-4-3-BYOS-Azure, but entry?
CVE-2022-45693: no packages for Image SLES15-SP3-Manager-4-2-Server-BYOS-EC2-HVM, but entry?
CVE-2022-45693: no packages for Image SLES15-SP4-Manager-Server-4-3-BYOS-GCE, but entry?
CVE-2022-45693: no packages for Container bci/openjdk-devel:11-6.2, but entry?
CVE-2022-45693: no packages for Image SLES15-SP6-SAPCAL-GCE, but entry?
CVE-2022-45693: no packages for Image SLES15-SP4-SAP-Azure-VLI-BYOS-Production, but entry?
CVE-2022-45693: no packages for Image SLES15-SP6-SAP-Azure, but entry?
CVE-2022-45693: no packages for Image SLES15-SP5-SAPCAL-GCE, but entry?
CVE-2022-45693: no packages for SUSE Manager Server Module 4.2, but entry?
CVE-2022-45693: no packages for Image SLES15-SP5-SAP-Azure-LI-BYOS, but entry?
CVE-2022-45693: no packages for Image SLES15-SP4-Manager-Server-4-3-BYOS-EC2, but entry?
CVE-2022-45693: no packages for Image SLES15-SP6-SAP-EC2, but entry?
CVE-2022-45693: no packages for Image SLES15-SP4-SAP-GCE, but entry?
CVE-2022-45693: no packages for Image SLES15-SP4-SAP-Azure-VLI-BYOS, but entry?
CVE-2022-45693: no packages for Image SLES15-SP6-SAP-Azure-LI-BYOS, but entry?
CVE-2022-45693: no packages for SUSE Linux Enterprise Server 15 SP4-TERADATA, but entry?
CVE-2022-45693: no packages for SUSE Enterprise Storage 7, but entry?
CVE-2022-45693: no packages for SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS, but entry?
CVE-2022-45693: no packages for SUSE Manager Server Module 4.3, but entry?
CVE-2022-45693: no packages for Image SLES15-SP6-SAP-Azure-VLI-BYOS-Production, but entry?
CVE-2022-45693: no packages for Image SLES15-SP2-SAP-EC2-HVM, but entry?
CVE-2022-45693: no packages for SUSE Linux Enterprise Server for SAP Applications 15 SP3, but entry?
CVE-2022-45693: no packages for SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS, but entry?
CVE-2022-45693: no packages for SUSE Linux Enterprise Workstation Extension 15 SP6, but entry?
CVE-2022-45693: no packages for Image SLES15-SP3-SAP-Azure-LI-BYOS-Production, but entry?
CVE-2022-45693: no packages for Image SLES15-SP2-SAP-GCE, but entry?
CVE-2022-45693: no packages for Image SLES15-SP3-Manager-4-2-Server-BYOS-Azure, but entry?
CVE-2022-45693: no packages for SUSE Linux Enterprise Module for Web and Scripting 15 SP4, but entry?
CVE-2022-45693: no packages for Image SLES15-SP4-SAPCAL-EC2, but entry?
CVE-2022-45693: no packages for Image SLES15-SP4-SAPCAL-Azure, but entry?
CVE-2022-45693: no packages for Image SLES15-SP5-SAPCAL-EC2, but entry?
CVE-2022-45693: no packages for SUSE Linux Enterprise Server for SAP Applications 15 SP1, but entry?
CVE-2022-45693: no packages for Image SLES15-SP4-SAP-EC2, but entry?
CVE-2022-45693: no packages for Container bci/openjdk:11-7.1, but entry?
CVE-2022-45693: no packages for SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS, but entry?
CVE-2022-45693: no packages for Container bci/kiwi:9.24.43-8.6, but entry?
CVE-2022-45693: no packages for Container bci/openjdk-devel:17-14.11, but entry?
CVE-2022-45693: no packages for Container suse/manager/5.0/x86_64/server:5.0.0-beta1.2.122, but entry?
CVE-2022-45693: no packages for SUSE Enterprise Storage 7.1, but entry?
CVE-2022-45693: no packages for Image SLES15-SP4-SAP-Azure-LI-BYOS, but entry?
CVE-2022-45693: no packages for Image SLES15-SP4-SAP-Azure-LI-BYOS-Production, but entry?
CVE-2022-45693: no packages for SUSE Manager Server 4.2, but entry?
CVE-2022-45693: no packages for Image SLES15-SP3-SAPCAL-EC2-HVM, but entry?
CVE-2022-45693: no packages for Image SLES15-SP2-SAP-Azure-LI-BYOS-Production, but entry?
CVE-2022-45693: no packages for Image SLES15-SP4-Manager-Server-4-3-BYOS, but entry?
CVE-2022-45693: no packages for SUSE Linux Enterprise Module for Development Tools 15 SP6, but entry?
CVE-2022-45693: no packages for Image SLES15-SP6-SAP, but entry?
CVE-2022-45693: no packages for Image SLES15-SP3-SAPCAL-GCE, but entry?
CVE-2022-45693: no packages for Image SLES15-SP2-SAP-Azure, but entry?
CVE-2022-45693: no packages for Image SLES15-SP4-SAPCAL-GCE, but entry?
CVE-2022-45693: no packages for SUSE Linux Enterprise Module for Basesystem 15 SP5, but entry?
CVE-2022-45693: no packages for SUSE Linux Enterprise Module for Package Hub 15 SP5, but entry?
CVE-2022-45693: no packages for Image SLES15-SP4-SAP-Azure, but entry?
CVE-2022-45693: no packages for SUSE Linux Enterprise Module for Package Hub 15 SP4, but entry?
CVE-2022-45693: no packages for SUSE Linux Enterprise Server 15 SP2-LTSS, but entry?
CVE-2022-45693: no packages for Image SLES15-SP6-SAP-Azure-LI-BYOS-Production, but entry?
CVE-2022-45693: no packages for SUSE Linux Enterprise Workstation Extension 15 SP4, but entry?
CVE-2022-45693: no packages for Image SLES15-SP4-SAP, but entry?
CVE-2022-45693: no packages for SUSE Manager Retail Branch Server 4.2, but entry?
CVE-2022-45693: no packages for Image SLES15-SP4-Manager-Server-4-3, but entry?
CVE-2022-45693: no packages for Image SLES15-SP4-Manager-Server-4-3-EC2-llc, but entry?
CVE-2022-45693: no packages for SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS, but entry?
CVE-2022-45693: no packages for SUSE Manager Proxy 4.2, but entry?
CVE-2022-45693: no packages for Image SLES15-SP6-SAPCAL-EC2, but entry?
CVE-2022-45693: no packages for Image SLES15-SP4-SAPCAL, but entry?
CVE-2022-45693: no packages for Image SLES15-SP3-Manager-4-2-Server-BYOS-GCE, but entry?
CVE-2022-45693: no packages for SUSE Linux Enterprise Module for Web and Scripting 15 SP6, but entry?
CVE-2022-45693: no packages for Container bci/openjdk:latest, but entry?
CVE-2022-45693: no packages for SUSE Linux Enterprise Module for Development Tools 15 SP4, but entry?
CVE-2022-45693: no packages for SUSE Linux Enterprise Real Time 15 SP3, but entry?
CVE-2022-45693: no packages for Image SLES15-SP5-SAP-EC2, but entry?
CVE-2022-45693: no packages for SUSE Linux Enterprise Module for Web and Scripting 15 SP5, but entry?
CVE-2022-45693: no packages for Image SLES15-SP4-Manager-Server-4-3-Azure-ltd, but entry?
CVE-2022-45693: no packages for SUSE Linux Enterprise Module for Development Tools 15 SP5, but entry?
CVE-2022-45693: no packages for Image SLES15-SP2-SAP-BYOS-Azure, but entry?
CVE-2022-45693: no packages for Image SLES15-SP4-Manager-Server-4-3-EC2-ltd, but entry?
CVE-2022-45693: no packages for Image SLES15-SP3-SAPCAL-Azure, but entry?
CVE-2022-45693: no packages for Image SLES15-SP3-SAP-Azure-VLI-BYOS-Production, but entry?
CVE-2022-45693: no packages for Image SLES15-SP5-SAP-Azure-LI-BYOS-Production, but entry?
CVE-2022-45693: no packages for SUSE Linux Enterprise Module for Basesystem 15 SP6, but entry?
CVE-2022-45693: no packages for Image SLES15-SP6-SAPCAL, but entry?
CVE-2022-45693: no packages for Image SLES15-SP5-SAP-Azure-VLI-BYOS, but entry?
CVE-2022-45693: no packages for Image SLES15-SP4-Manager-Server-4-3-Azure-llc, but entry?
CVE-2022-45693: no packages for Image SLES15-SP2-SAP-BYOS-GCE, but entry?
CVE-2022-45693: no packages for Container bci/openjdk:17-7.1, but entry?
CVE-2022-45693: no packages for SUSE Linux Enterprise Module for Package Hub 15 SP6, but entry?
CVE-2022-45693: no packages for SUSE Linux Enterprise Module for Basesystem 15 SP4, but entry?
CVE-2022-45693: no packages for SUSE Linux Enterprise Server 15 SP3-LTSS, but entry?
CVE-2022-45693: no packages for Container bci/kiwi:9.24.43-8.6, but entry?
CVE-2022-45693: no packages for Container bci/openjdk-devel:11-6.2, but entry?
CVE-2022-45693: no packages for Container bci/openjdk-devel:17-14.11, but entry?
CVE-2022-45693: no packages for Container bci/openjdk-devel:17-7.2, but entry?
CVE-2022-45693: no packages for Container bci/openjdk:11-7.1, but entry?
CVE-2022-45693: no packages for Container bci/openjdk:17-7.1, but entry?
CVE-2022-45693: no packages for Container bci/openjdk:latest, but entry?
CVE-2022-45693: no packages for Container suse/manager/5.0/x86_64/server-attestation:5.0.0-beta2.2.16, but entry?
CVE-2022-45693: no packages for Container suse/manager/5.0/x86_64/server:5.0.0-beta1.2.122, but entry?
CVE-2022-45693: no packages for Image SLES15-SP2-SAP-Azure, but entry?
CVE-2022-45693: no packages for Image SLES15-SP2-SAP-Azure-LI-BYOS-Production, but entry?
CVE-2022-45693: no packages for Image SLES15-SP2-SAP-Azure-VLI-BYOS-Production, but entry?
CVE-2022-45693: no packages for Image SLES15-SP2-SAP-BYOS-Azure, but entry?
CVE-2022-45693: no packages for Image SLES15-SP2-SAP-BYOS-EC2-HVM, but entry?
CVE-2022-45693: no packages for Image SLES15-SP2-SAP-BYOS-GCE, but entry?
CVE-2022-45693: no packages for Image SLES15-SP2-SAP-EC2-HVM, but entry?
CVE-2022-45693: no packages for Image SLES15-SP2-SAP-GCE, but entry?
CVE-2022-45693: no packages for Image SLES15-SP3-Manager-4-2-Server-BYOS-Azure, but entry?
CVE-2022-45693: no packages for Image SLES15-SP3-Manager-4-2-Server-BYOS-EC2-HVM, but entry?
CVE-2022-45693: no packages for Image SLES15-SP3-Manager-4-2-Server-BYOS-GCE, but entry?
CVE-2022-45693: no packages for Image SLES15-SP3-SAP-Azure-LI-BYOS-Production, but entry?
CVE-2022-45693: no packages for Image SLES15-SP3-SAP-Azure-VLI-BYOS-Production, but entry?
CVE-2022-45693: no packages for Image SLES15-SP3-SAPCAL-Azure, but entry?
CVE-2022-45693: no packages for Image SLES15-SP3-SAPCAL-EC2-HVM, but entry?
CVE-2022-45693: no packages for Image SLES15-SP3-SAPCAL-GCE, but entry?
CVE-2022-45693: no packages for Image SLES15-SP4-Manager-Server-4-3, but entry?
CVE-2022-45693: no packages for Image SLES15-SP4-Manager-Server-4-3-Azure-llc, but entry?
CVE-2022-45693: no packages for Image SLES15-SP4-Manager-Server-4-3-Azure-ltd, but entry?
CVE-2022-45693: no packages for Image SLES15-SP4-Manager-Server-4-3-BYOS, but entry?
CVE-2022-45693: no packages for Image SLES15-SP4-Manager-Server-4-3-BYOS-Azure, but entry?
CVE-2022-45693: no packages for Image SLES15-SP4-Manager-Server-4-3-BYOS-EC2, but entry?
CVE-2022-45693: no packages for Image SLES15-SP4-Manager-Server-4-3-BYOS-GCE, but entry?
CVE-2022-45693: no packages for Image SLES15-SP4-Manager-Server-4-3-EC2-llc, but entry?
CVE-2022-45693: no packages for Image SLES15-SP4-Manager-Server-4-3-EC2-ltd, but entry?
CVE-2022-45693: no packages for Image SLES15-SP4-SAP, but entry?
CVE-2022-45693: no packages for Image SLES15-SP4-SAP-Azure, but entry?
CVE-2022-45693: no packages for Image SLES15-SP4-SAP-Azure-LI-BYOS, but entry?
CVE-2022-45693: no packages for Image SLES15-SP4-SAP-Azure-LI-BYOS-Production, but entry?
CVE-2022-45693: no packages for Image SLES15-SP4-SAP-Azure-VLI-BYOS, but entry?
CVE-2022-45693: no packages for Image SLES15-SP4-SAP-Azure-VLI-BYOS-Production, but entry?
CVE-2022-45693: no packages for Image SLES15-SP4-SAP-EC2, but entry?
CVE-2022-45693: no packages for Image SLES15-SP4-SAP-GCE, but entry?
CVE-2022-45693: no packages for Image SLES15-SP4-SAPCAL, but entry?
CVE-2022-45693: no packages for Image SLES15-SP4-SAPCAL-Azure, but entry?
CVE-2022-45693: no packages for Image SLES15-SP4-SAPCAL-EC2, but entry?
CVE-2022-45693: no packages for Image SLES15-SP4-SAPCAL-GCE, but entry?
CVE-2022-45693: no packages for Image SLES15-SP5-SAP-Azure, but entry?
CVE-2022-45693: no packages for Image SLES15-SP5-SAP-Azure-LI-BYOS, but entry?
CVE-2022-45693: no packages for Image SLES15-SP5-SAP-Azure-LI-BYOS-Production, but entry?
CVE-2022-45693: no packages for Image SLES15-SP5-SAP-Azure-VLI-BYOS, but entry?
CVE-2022-45693: no packages for Image SLES15-SP5-SAP-Azure-VLI-BYOS-Production, but entry?
CVE-2022-45693: no packages for Image SLES15-SP5-SAP-EC2, but entry?
CVE-2022-45693: no packages for Image SLES15-SP5-SAP-GCE, but entry?
CVE-2022-45693: no packages for Image SLES15-SP5-SAPCAL-Azure, but entry?
CVE-2022-45693: no packages for Image SLES15-SP5-SAPCAL-EC2, but entry?
CVE-2022-45693: no packages for Image SLES15-SP5-SAPCAL-GCE, but entry?
CVE-2022-45693: no packages for Image SLES15-SP6-SAP, but entry?
CVE-2022-45693: no packages for Image SLES15-SP6-SAP-Azure, but entry?
CVE-2022-45693: no packages for Image SLES15-SP6-SAP-Azure-LI-BYOS, but entry?
CVE-2022-45693: no packages for Image SLES15-SP6-SAP-Azure-LI-BYOS-Production, but entry?
CVE-2022-45693: no packages for Image SLES15-SP6-SAP-Azure-VLI-BYOS, but entry?
CVE-2022-45693: no packages for Image SLES15-SP6-SAP-Azure-VLI-BYOS-Production, but entry?
CVE-2022-45693: no packages for Image SLES15-SP6-SAP-EC2, but entry?
CVE-2022-45693: no packages for Image SLES15-SP6-SAP-GCE, but entry?
CVE-2022-45693: no packages for Image SLES15-SP6-SAPCAL, but entry?
CVE-2022-45693: no packages for Image SLES15-SP6-SAPCAL-Azure, but entry?
CVE-2022-45693: no packages for Image SLES15-SP6-SAPCAL-EC2, but entry?
CVE-2022-45693: no packages for Image SLES15-SP6-SAPCAL-GCE, but entry?
CVE-2022-45693: no packages for SUSE CaaS Platform 4.0, but entry?
CVE-2022-45693: no packages for SUSE Enterprise Storage 7, but entry?
CVE-2022-45693: no packages for SUSE Enterprise Storage 7.1, but entry?
CVE-2022-45693: no packages for SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS, but entry?
CVE-2022-45693: no packages for SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS, but entry?
CVE-2022-45693: no packages for SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS, but entry?
CVE-2022-45693: no packages for SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS, but entry?
CVE-2022-45693: no packages for SUSE Linux Enterprise Module for Basesystem 15 SP4, but entry?
CVE-2022-45693: no packages for SUSE Linux Enterprise Module for Basesystem 15 SP5, but entry?
CVE-2022-45693: no packages for SUSE Linux Enterprise Module for Basesystem 15 SP6, but entry?
CVE-2022-45693: no packages for SUSE Linux Enterprise Module for Development Tools 15 SP4, but entry?
CVE-2022-45693: no packages for SUSE Linux Enterprise Module for Development Tools 15 SP5, but entry?
CVE-2022-45693: no packages for SUSE Linux Enterprise Module for Development Tools 15 SP6, but entry?
CVE-2022-45693: no packages for SUSE Linux Enterprise Module for Package Hub 15 SP4, but entry?
CVE-2022-45693: no packages for SUSE Linux Enterprise Module for Package Hub 15 SP5, but entry?
CVE-2022-45693: no packages for SUSE Linux Enterprise Module for Package Hub 15 SP6, but entry?
CVE-2022-45693: no packages for SUSE Linux Enterprise Module for Web and Scripting 15 SP4, but entry?
CVE-2022-45693: no packages for SUSE Linux Enterprise Module for Web and Scripting 15 SP5, but entry?
CVE-2022-45693: no packages for SUSE Linux Enterprise Module for Web and Scripting 15 SP6, but entry?
CVE-2022-45693: no packages for SUSE Linux Enterprise Real Time 15 SP3, but entry?
CVE-2022-45693: no packages for SUSE Linux Enterprise Server 15 SP1-LTSS, but entry?
CVE-2022-45693: no packages for SUSE Linux Enterprise Server 15 SP2-LTSS, but entry?
CVE-2022-45693: no packages for SUSE Linux Enterprise Server 15 SP3-LTSS, but entry?
CVE-2022-45693: no packages for SUSE Linux Enterprise Server 15 SP4-TERADATA, but entry?
CVE-2022-45693: no packages for SUSE Linux Enterprise Server for SAP Applications 15 SP1, but entry?
CVE-2022-45693: no packages for SUSE Linux Enterprise Server for SAP Applications 15 SP2, but entry?
CVE-2022-45693: no packages for SUSE Linux Enterprise Server for SAP Applications 15 SP3, but entry?
CVE-2022-45693: no packages for SUSE Linux Enterprise Workstation Extension 15 SP4, but entry?
CVE-2022-45693: no packages for SUSE Linux Enterprise Workstation Extension 15 SP5, but entry?
CVE-2022-45693: no packages for SUSE Linux Enterprise Workstation Extension 15 SP6, but entry?
CVE-2022-45693: no packages for SUSE Manager Proxy 4.2, but entry?
CVE-2022-45693: no packages for SUSE Manager Retail Branch Server 4.2, but entry?
CVE-2022-45693: no packages for SUSE Manager Server 4.2, but entry?
CVE-2022-45693: no packages for SUSE Manager Server Module 4.2, but entry?
CVE-2022-45693: no packages for SUSE Manager Server Module 4.3, but entry?
CVE-2022-45693: no packages for Container bci/kiwi:9.24.43-8.6, but entry?
CVE-2022-45693: no packages for Container bci/openjdk-devel:11-6.2, but entry?
CVE-2022-45693: no packages for Container bci/openjdk-devel:17-14.11, but entry?
CVE-2022-45693: no packages for Container bci/openjdk-devel:17-7.2, but entry?
CVE-2022-45693: no packages for Container bci/openjdk:11-7.1, but entry?
CVE-2022-45693: no packages for Container bci/openjdk:17-7.1, but entry?
CVE-2022-45693: no packages for Container bci/openjdk:latest, but entry?
CVE-2022-45693: no packages for Container suse/manager/5.0/x86_64/server-attestation:5.0.0-beta2.2.16, but entry?
CVE-2022-45693: no packages for Container suse/manager/5.0/x86_64/server:5.0.0-beta1.2.122, but entry?
CVE-2022-45693: no packages for Image SLES15-SP2-SAP-Azure, but entry?
CVE-2022-45693: no packages for Image SLES15-SP2-SAP-Azure-LI-BYOS-Production, but entry?
CVE-2022-45693: no packages for Image SLES15-SP2-SAP-Azure-VLI-BYOS-Production, but entry?
CVE-2022-45693: no packages for Image SLES15-SP2-SAP-BYOS-Azure, but entry?
CVE-2022-45693: no packages for Image SLES15-SP2-SAP-BYOS-EC2-HVM, but entry?
CVE-2022-45693: no packages for Image SLES15-SP2-SAP-BYOS-GCE, but entry?
CVE-2022-45693: no packages for Image SLES15-SP2-SAP-EC2-HVM, but entry?
CVE-2022-45693: no packages for Image SLES15-SP2-SAP-GCE, but entry?
CVE-2022-45693: no packages for Image SLES15-SP3-Manager-4-2-Server-BYOS-Azure, but entry?
CVE-2022-45693: no packages for Image SLES15-SP3-Manager-4-2-Server-BYOS-EC2-HVM, but entry?
CVE-2022-45693: no packages for Image SLES15-SP3-Manager-4-2-Server-BYOS-GCE, but entry?
CVE-2022-45693: no packages for Image SLES15-SP3-SAP-Azure-LI-BYOS-Production, but entry?
CVE-2022-45693: no packages for Image SLES15-SP3-SAP-Azure-VLI-BYOS-Production, but entry?
CVE-2022-45693: no packages for Image SLES15-SP3-SAPCAL-Azure, but entry?
CVE-2022-45693: no packages for Image SLES15-SP3-SAPCAL-EC2-HVM, but entry?
CVE-2022-45693: no packages for Image SLES15-SP3-SAPCAL-GCE, but entry?
CVE-2022-45693: no packages for Image SLES15-SP4-Manager-Server-4-3, but entry?
CVE-2022-45693: no packages for Image SLES15-SP4-Manager-Server-4-3-Azure-llc, but entry?
CVE-2022-45693: no packages for Image SLES15-SP4-Manager-Server-4-3-Azure-ltd, but entry?
CVE-2022-45693: no packages for Image SLES15-SP4-Manager-Server-4-3-BYOS, but entry?
CVE-2022-45693: no packages for Image SLES15-SP4-Manager-Server-4-3-BYOS-Azure, but entry?
CVE-2022-45693: no packages for Image SLES15-SP4-Manager-Server-4-3-BYOS-EC2, but entry?
CVE-2022-45693: no packages for Image SLES15-SP4-Manager-Server-4-3-BYOS-GCE, but entry?
CVE-2022-45693: no packages for Image SLES15-SP4-Manager-Server-4-3-EC2-llc, but entry?
CVE-2022-45693: no packages for Image SLES15-SP4-Manager-Server-4-3-EC2-ltd, but entry?
CVE-2022-45693: no packages for Image SLES15-SP4-SAP, but entry?
CVE-2022-45693: no packages for Image SLES15-SP4-SAP-Azure, but entry?
CVE-2022-45693: no packages for Image SLES15-SP4-SAP-Azure-LI-BYOS, but entry?
CVE-2022-45693: no packages for Image SLES15-SP4-SAP-Azure-LI-BYOS-Production, but entry?
CVE-2022-45693: no packages for Image SLES15-SP4-SAP-Azure-VLI-BYOS, but entry?
CVE-2022-45693: no packages for Image SLES15-SP4-SAP-Azure-VLI-BYOS-Production, but entry?
CVE-2022-45693: no packages for Image SLES15-SP4-SAP-EC2, but entry?
CVE-2022-45693: no packages for Image SLES15-SP4-SAP-GCE, but entry?
CVE-2022-45693: no packages for Image SLES15-SP4-SAPCAL, but entry?
CVE-2022-45693: no packages for Image SLES15-SP4-SAPCAL-Azure, but entry?
CVE-2022-45693: no packages for Image SLES15-SP4-SAPCAL-EC2, but entry?
CVE-2022-45693: no packages for Image SLES15-SP4-SAPCAL-GCE, but entry?
CVE-2022-45693: no packages for Image SLES15-SP5-SAP-Azure, but entry?
CVE-2022-45693: no packages for Image SLES15-SP5-SAP-Azure-LI-BYOS, but entry?
CVE-2022-45693: no packages for Image SLES15-SP5-SAP-Azure-LI-BYOS-Production, but entry?
CVE-2022-45693: no packages for Image SLES15-SP5-SAP-Azure-VLI-BYOS, but entry?
CVE-2022-45693: no packages for Image SLES15-SP5-SAP-Azure-VLI-BYOS-Production, but entry?
CVE-2022-45693: no packages for Image SLES15-SP5-SAP-EC2, but entry?
CVE-2022-45693: no packages for Image SLES15-SP5-SAP-GCE, but entry?
CVE-2022-45693: no packages for Image SLES15-SP5-SAPCAL-Azure, but entry?
CVE-2022-45693: no packages for Image SLES15-SP5-SAPCAL-EC2, but entry?
CVE-2022-45693: no packages for Image SLES15-SP5-SAPCAL-GCE, but entry?
CVE-2022-45693: no packages for Image SLES15-SP6-SAP, but entry?
CVE-2022-45693: no packages for Image SLES15-SP6-SAP-Azure, but entry?
CVE-2022-45693: no packages for Image SLES15-SP6-SAP-Azure-LI-BYOS, but entry?
CVE-2022-45693: no packages for Image SLES15-SP6-SAP-Azure-LI-BYOS-Production, but entry?
CVE-2022-45693: no packages for Image SLES15-SP6-SAP-Azure-VLI-BYOS, but entry?
CVE-2022-45693: no packages for Image SLES15-SP6-SAP-Azure-VLI-BYOS-Production, but entry?
CVE-2022-45693: no packages for Image SLES15-SP6-SAP-EC2, but entry?
CVE-2022-45693: no packages for Image SLES15-SP6-SAP-GCE, but entry?
CVE-2022-45693: no packages for Image SLES15-SP6-SAPCAL, but entry?
CVE-2022-45693: no packages for Image SLES15-SP6-SAPCAL-Azure, but entry?
CVE-2022-45693: no packages for Image SLES15-SP6-SAPCAL-EC2, but entry?
CVE-2022-45693: no packages for Image SLES15-SP6-SAPCAL-GCE, but entry?
CVE-2022-45693: no packages for SUSE CaaS Platform 4.0, but entry?
CVE-2022-45693: no packages for SUSE Enterprise Storage 7, but entry?
CVE-2022-45693: no packages for SUSE Enterprise Storage 7.1, but entry?
CVE-2022-45693: no packages for SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS, but entry?
CVE-2022-45693: no packages for SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS, but entry?
CVE-2022-45693: no packages for SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS, but entry?
CVE-2022-45693: no packages for SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS, but entry?
CVE-2022-45693: no packages for SUSE Linux Enterprise Module for Basesystem 15 SP4, but entry?
CVE-2022-45693: no packages for SUSE Linux Enterprise Module for Basesystem 15 SP5, but entry?
CVE-2022-45693: no packages for SUSE Linux Enterprise Module for Basesystem 15 SP6, but entry?
CVE-2022-45693: no packages for SUSE Linux Enterprise Module for Development Tools 15 SP4, but entry?
CVE-2022-45693: no packages for SUSE Linux Enterprise Module for Development Tools 15 SP5, but entry?
CVE-2022-45693: no packages for SUSE Linux Enterprise Module for Development Tools 15 SP6, but entry?
CVE-2022-45693: no packages for SUSE Linux Enterprise Module for Package Hub 15 SP4, but entry?
CVE-2022-45693: no packages for SUSE Linux Enterprise Module for Package Hub 15 SP5, but entry?
CVE-2022-45693: no packages for SUSE Linux Enterprise Module for Package Hub 15 SP6, but entry?
CVE-2022-45693: no packages for SUSE Linux Enterprise Module for Web and Scripting 15 SP4, but entry?
CVE-2022-45693: no packages for SUSE Linux Enterprise Module for Web and Scripting 15 SP5, but entry?
CVE-2022-45693: no packages for SUSE Linux Enterprise Module for Web and Scripting 15 SP6, but entry?
CVE-2022-45693: no packages for SUSE Linux Enterprise Real Time 15 SP3, but entry?
CVE-2022-45693: no packages for SUSE Linux Enterprise Server 15 SP1-LTSS, but entry?
CVE-2022-45693: no packages for SUSE Linux Enterprise Server 15 SP2-LTSS, but entry?
CVE-2022-45693: no packages for SUSE Linux Enterprise Server 15 SP3-LTSS, but entry?
CVE-2022-45693: no packages for SUSE Linux Enterprise Server 15 SP4-TERADATA, but entry?
CVE-2022-45693: no packages for SUSE Linux Enterprise Server for SAP Applications 15 SP1, but entry?
CVE-2022-45693: no packages for SUSE Linux Enterprise Server for SAP Applications 15 SP2, but entry?
CVE-2022-45693: no packages for SUSE Linux Enterprise Server for SAP Applications 15 SP3, but entry?
CVE-2022-45693: no packages for SUSE Linux Enterprise Workstation Extension 15 SP4, but entry?
CVE-2022-45693: no packages for SUSE Linux Enterprise Workstation Extension 15 SP5, but entry?
CVE-2022-45693: no packages for SUSE Linux Enterprise Workstation Extension 15 SP6, but entry?
CVE-2022-45693: no packages for SUSE Manager Proxy 4.2, but entry?
CVE-2022-45693: no packages for SUSE Manager Retail Branch Server 4.2, but entry?
CVE-2022-45693: no packages for SUSE Manager Server 4.2, but entry?
CVE-2022-45693: no packages for SUSE Manager Server Module 4.2, but entry?
CVE-2022-45693: no packages for SUSE Manager Server Module 4.3, but entry?
skipping CVE-2022-45703 as CVE page is older than CVRF-CVE file.
CVE-2022-45685: no packages for Container bci/kiwi:9.24.43-8.6, but entry?
CVE-2022-45685: no packages for SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS, but entry?
CVE-2022-45685: no packages for Container bci/openjdk:11-7.1, but entry?
CVE-2022-45685: no packages for Image SLES15-SP4-SAP-EC2, but entry?
CVE-2022-45685: no packages for SUSE Linux Enterprise Server for SAP Applications 15 SP1, but entry?
CVE-2022-45685: no packages for Container bci/openjdk-devel:17-14.11, but entry?
CVE-2022-45685: no packages for Image SLES15-SP4-SAPCAL-EC2, but entry?
CVE-2022-45685: no packages for SUSE Linux Enterprise Module for Web and Scripting 15 SP4, but entry?
CVE-2022-45685: no packages for Image SLES15-SP5-SAPCAL-EC2, but entry?
CVE-2022-45685: no packages for Image SLES15-SP4-SAPCAL-Azure, but entry?
CVE-2022-45685: no packages for Image SLES15-SP3-Manager-4-2-Server-BYOS-Azure, but entry?
CVE-2022-45685: no packages for Image SLES15-SP2-SAP-GCE, but entry?
CVE-2022-45685: no packages for Image SLES15-SP2-SAP-EC2-HVM, but entry?
CVE-2022-45685: no packages for Image SLES15-SP6-SAP-Azure-VLI-BYOS-Production, but entry?
CVE-2022-45685: no packages for SUSE Manager Server Module 4.3, but entry?
CVE-2022-45685: no packages for SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS, but entry?
CVE-2022-45685: no packages for Image SLES15-SP3-SAP-Azure-LI-BYOS-Production, but entry?
CVE-2022-45685: no packages for SUSE Linux Enterprise Workstation Extension 15 SP6, but entry?
CVE-2022-45685: no packages for SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS, but entry?
CVE-2022-45685: no packages for SUSE Linux Enterprise Server for SAP Applications 15 SP3, but entry?
CVE-2022-45685: no packages for SUSE Enterprise Storage 7, but entry?
CVE-2022-45685: no packages for SUSE Linux Enterprise Server 15 SP4-TERADATA, but entry?
CVE-2022-45685: no packages for Image SLES15-SP6-SAP-Azure-LI-BYOS, but entry?
CVE-2022-45685: no packages for Image SLES15-SP4-SAP-Azure-VLI-BYOS, but entry?
CVE-2022-45685: no packages for Image SLES15-SP4-SAP-GCE, but entry?
CVE-2022-45685: no packages for Image SLES15-SP6-SAP-EC2, but entry?
CVE-2022-45685: no packages for Image SLES15-SP5-SAPCAL-GCE, but entry?
CVE-2022-45685: no packages for Image SLES15-SP6-SAP-Azure, but entry?
CVE-2022-45685: no packages for Image SLES15-SP4-SAP-Azure-VLI-BYOS-Production, but entry?
CVE-2022-45685: no packages for Image SLES15-SP4-Manager-Server-4-3-BYOS-EC2, but entry?
CVE-2022-45685: no packages for Image SLES15-SP5-SAP-Azure-LI-BYOS, but entry?
CVE-2022-45685: no packages for SUSE Manager Server Module 4.2, but entry?
CVE-2022-45685: no packages for Image SLES15-SP3-Manager-4-2-Server-BYOS-EC2-HVM, but entry?
CVE-2022-45685: no packages for Image SLES15-SP4-Manager-Server-4-3-BYOS-Azure, but entry?
CVE-2022-45685: no packages for Image SLES15-SP6-SAP-GCE, but entry?
CVE-2022-45685: no packages for Image SLES15-SP6-SAPCAL-GCE, but entry?
CVE-2022-45685: no packages for Container bci/openjdk-devel:11-6.2, but entry?
CVE-2022-45685: no packages for Image SLES15-SP4-Manager-Server-4-3-BYOS-GCE, but entry?
CVE-2022-45685: no packages for SUSE Linux Enterprise Workstation Extension 15 SP5, but entry?
CVE-2022-45685: no packages for Image SLES15-SP5-SAP-GCE, but entry?
CVE-2022-45685: no packages for Container bci/openjdk-devel:17-7.2, but entry?
CVE-2022-45685: no packages for SUSE Linux Enterprise Server 15 SP1-LTSS, but entry?
CVE-2022-45685: no packages for SUSE Linux Enterprise Server for SAP Applications 15 SP2, but entry?
CVE-2022-45685: no packages for Image SLES15-SP5-SAPCAL-Azure, but entry?
CVE-2022-45685: no packages for Image SLES15-SP2-SAP-Azure-VLI-BYOS-Production, but entry?
CVE-2022-45685: no packages for Image SLES15-SP6-SAPCAL-Azure, but entry?
CVE-2022-45685: no packages for Image SLES15-SP2-SAP-BYOS-EC2-HVM, but entry?
CVE-2022-45685: no packages for Image SLES15-SP6-SAP-Azure-VLI-BYOS, but entry?
CVE-2022-45685: no packages for Container suse/manager/5.0/x86_64/server-attestation:5.0.0-beta2.2.16, but entry?
CVE-2022-45685: no packages for Image SLES15-SP5-SAP-Azure, but entry?
CVE-2022-45685: no packages for Image SLES15-SP5-SAP-Azure-VLI-BYOS-Production, but entry?
CVE-2022-45685: no packages for SUSE CaaS Platform 4.0, but entry?
CVE-2022-45685: no packages for SUSE Linux Enterprise Module for Basesystem 15 SP4, but entry?
CVE-2022-45685: no packages for SUSE Linux Enterprise Module for Package Hub 15 SP6, but entry?
CVE-2022-45685: no packages for SUSE Linux Enterprise Server 15 SP3-LTSS, but entry?
CVE-2022-45685: no packages for Image SLES15-SP4-Manager-Server-4-3-Azure-llc, but entry?
CVE-2022-45685: no packages for Container bci/openjdk:17-7.1, but entry?
CVE-2022-45685: no packages for Image SLES15-SP2-SAP-BYOS-GCE, but entry?
CVE-2022-45685: no packages for SUSE Linux Enterprise Module for Basesystem 15 SP6, but entry?
CVE-2022-45685: no packages for Image SLES15-SP5-SAP-Azure-LI-BYOS-Production, but entry?
CVE-2022-45685: no packages for Image SLES15-SP5-SAP-Azure-VLI-BYOS, but entry?
CVE-2022-45685: no packages for Image SLES15-SP6-SAPCAL, but entry?
CVE-2022-45685: no packages for Image SLES15-SP3-SAPCAL-Azure, but entry?
CVE-2022-45685: no packages for Image SLES15-SP4-Manager-Server-4-3-EC2-ltd, but entry?
CVE-2022-45685: no packages for Image SLES15-SP3-SAP-Azure-VLI-BYOS-Production, but entry?
CVE-2022-45685: no packages for Image SLES15-SP4-Manager-Server-4-3-Azure-ltd, but entry?
CVE-2022-45685: no packages for Image SLES15-SP2-SAP-BYOS-Azure, but entry?
CVE-2022-45685: no packages for SUSE Linux Enterprise Module for Development Tools 15 SP5, but entry?
CVE-2022-45685: no packages for SUSE Linux Enterprise Module for Web and Scripting 15 SP5, but entry?
CVE-2022-45685: no packages for Image SLES15-SP5-SAP-EC2, but entry?
CVE-2022-45685: no packages for SUSE Linux Enterprise Real Time 15 SP3, but entry?
CVE-2022-45685: no packages for Image SLES15-SP3-Manager-4-2-Server-BYOS-GCE, but entry?
CVE-2022-45685: no packages for SUSE Linux Enterprise Module for Development Tools 15 SP4, but entry?
CVE-2022-45685: no packages for Container bci/openjdk:latest, but entry?
CVE-2022-45685: no packages for SUSE Linux Enterprise Module for Web and Scripting 15 SP6, but entry?
CVE-2022-45685: no packages for Image SLES15-SP4-SAPCAL, but entry?
CVE-2022-45685: no packages for Image SLES15-SP6-SAPCAL-EC2, but entry?
CVE-2022-45685: no packages for Image SLES15-SP4-Manager-Server-4-3-EC2-llc, but entry?
CVE-2022-45685: no packages for SUSE Manager Proxy 4.2, but entry?
CVE-2022-45685: no packages for SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS, but entry?
CVE-2022-45685: no packages for SUSE Manager Retail Branch Server 4.2, but entry?
CVE-2022-45685: no packages for Image SLES15-SP4-SAP, but entry?
CVE-2022-45685: no packages for Image SLES15-SP4-Manager-Server-4-3, but entry?
CVE-2022-45685: no packages for Image SLES15-SP6-SAP-Azure-LI-BYOS-Production, but entry?
CVE-2022-45685: no packages for SUSE Linux Enterprise Server 15 SP2-LTSS, but entry?
CVE-2022-45685: no packages for SUSE Linux Enterprise Module for Package Hub 15 SP4, but entry?
CVE-2022-45685: no packages for SUSE Linux Enterprise Workstation Extension 15 SP4, but entry?
CVE-2022-45685: no packages for SUSE Linux Enterprise Module for Package Hub 15 SP5, but entry?
CVE-2022-45685: no packages for Image SLES15-SP4-SAP-Azure, but entry?
CVE-2022-45685: no packages for Image SLES15-SP2-SAP-Azure, but entry?
CVE-2022-45685: no packages for SUSE Linux Enterprise Module for Basesystem 15 SP5, but entry?
CVE-2022-45685: no packages for Image SLES15-SP4-SAPCAL-GCE, but entry?
CVE-2022-45685: no packages for Image SLES15-SP6-SAP, but entry?
CVE-2022-45685: no packages for Image SLES15-SP3-SAPCAL-GCE, but entry?
CVE-2022-45685: no packages for Image SLES15-SP2-SAP-Azure-LI-BYOS-Production, but entry?
CVE-2022-45685: no packages for Image SLES15-SP3-SAPCAL-EC2-HVM, but entry?
CVE-2022-45685: no packages for SUSE Manager Server 4.2, but entry?
CVE-2022-45685: no packages for Image SLES15-SP4-SAP-Azure-LI-BYOS-Production, but entry?
CVE-2022-45685: no packages for Image SLES15-SP4-SAP-Azure-LI-BYOS, but entry?
CVE-2022-45685: no packages for SUSE Enterprise Storage 7.1, but entry?
CVE-2022-45685: no packages for SUSE Linux Enterprise Module for Development Tools 15 SP6, but entry?
CVE-2022-45685: no packages for Image SLES15-SP4-Manager-Server-4-3-BYOS, but entry?
CVE-2022-45685: no packages for Container suse/manager/5.0/x86_64/server:5.0.0-beta1.2.122, but entry?
CVE-2022-45685: no packages for Container bci/kiwi:9.24.43-8.6, but entry?
CVE-2022-45685: no packages for Container bci/openjdk-devel:11-6.2, but entry?
CVE-2022-45685: no packages for Container bci/openjdk-devel:17-14.11, but entry?
CVE-2022-45685: no packages for Container bci/openjdk-devel:17-7.2, but entry?
CVE-2022-45685: no packages for Container bci/openjdk:11-7.1, but entry?
CVE-2022-45685: no packages for Container bci/openjdk:17-7.1, but entry?
CVE-2022-45685: no packages for Container bci/openjdk:latest, but entry?
CVE-2022-45685: no packages for Container suse/manager/5.0/x86_64/server-attestation:5.0.0-beta2.2.16, but entry?
CVE-2022-45685: no packages for Container suse/manager/5.0/x86_64/server:5.0.0-beta1.2.122, but entry?
CVE-2022-45685: no packages for Image SLES15-SP2-SAP-Azure, but entry?
CVE-2022-45685: no packages for Image SLES15-SP2-SAP-Azure-LI-BYOS-Production, but entry?
CVE-2022-45685: no packages for Image SLES15-SP2-SAP-Azure-VLI-BYOS-Production, but entry?
CVE-2022-45685: no packages for Image SLES15-SP2-SAP-BYOS-Azure, but entry?
CVE-2022-45685: no packages for Image SLES15-SP2-SAP-BYOS-EC2-HVM, but entry?
CVE-2022-45685: no packages for Image SLES15-SP2-SAP-BYOS-GCE, but entry?
CVE-2022-45685: no packages for Image SLES15-SP2-SAP-EC2-HVM, but entry?
CVE-2022-45685: no packages for Image SLES15-SP2-SAP-GCE, but entry?
CVE-2022-45685: no packages for Image SLES15-SP3-Manager-4-2-Server-BYOS-Azure, but entry?
CVE-2022-45685: no packages for Image SLES15-SP3-Manager-4-2-Server-BYOS-EC2-HVM, but entry?
CVE-2022-45685: no packages for Image SLES15-SP3-Manager-4-2-Server-BYOS-GCE, but entry?
CVE-2022-45685: no packages for Image SLES15-SP3-SAP-Azure-LI-BYOS-Production, but entry?
CVE-2022-45685: no packages for Image SLES15-SP3-SAP-Azure-VLI-BYOS-Production, but entry?
CVE-2022-45685: no packages for Image SLES15-SP3-SAPCAL-Azure, but entry?
CVE-2022-45685: no packages for Image SLES15-SP3-SAPCAL-EC2-HVM, but entry?
CVE-2022-45685: no packages for Image SLES15-SP3-SAPCAL-GCE, but entry?
CVE-2022-45685: no packages for Image SLES15-SP4-Manager-Server-4-3, but entry?
CVE-2022-45685: no packages for Image SLES15-SP4-Manager-Server-4-3-Azure-llc, but entry?
CVE-2022-45685: no packages for Image SLES15-SP4-Manager-Server-4-3-Azure-ltd, but entry?
CVE-2022-45685: no packages for Image SLES15-SP4-Manager-Server-4-3-BYOS, but entry?
CVE-2022-45685: no packages for Image SLES15-SP4-Manager-Server-4-3-BYOS-Azure, but entry?
CVE-2022-45685: no packages for Image SLES15-SP4-Manager-Server-4-3-BYOS-EC2, but entry?
CVE-2022-45685: no packages for Image SLES15-SP4-Manager-Server-4-3-BYOS-GCE, but entry?
CVE-2022-45685: no packages for Image SLES15-SP4-Manager-Server-4-3-EC2-llc, but entry?
CVE-2022-45685: no packages for Image SLES15-SP4-Manager-Server-4-3-EC2-ltd, but entry?
CVE-2022-45685: no packages for Image SLES15-SP4-SAP, but entry?
CVE-2022-45685: no packages for Image SLES15-SP4-SAP-Azure, but entry?
CVE-2022-45685: no packages for Image SLES15-SP4-SAP-Azure-LI-BYOS, but entry?
CVE-2022-45685: no packages for Image SLES15-SP4-SAP-Azure-LI-BYOS-Production, but entry?
CVE-2022-45685: no packages for Image SLES15-SP4-SAP-Azure-VLI-BYOS, but entry?
CVE-2022-45685: no packages for Image SLES15-SP4-SAP-Azure-VLI-BYOS-Production, but entry?
CVE-2022-45685: no packages for Image SLES15-SP4-SAP-EC2, but entry?
CVE-2022-45685: no packages for Image SLES15-SP4-SAP-GCE, but entry?
CVE-2022-45685: no packages for Image SLES15-SP4-SAPCAL, but entry?
CVE-2022-45685: no packages for Image SLES15-SP4-SAPCAL-Azure, but entry?
CVE-2022-45685: no packages for Image SLES15-SP4-SAPCAL-EC2, but entry?
CVE-2022-45685: no packages for Image SLES15-SP4-SAPCAL-GCE, but entry?
CVE-2022-45685: no packages for Image SLES15-SP5-SAP-Azure, but entry?
CVE-2022-45685: no packages for Image SLES15-SP5-SAP-Azure-LI-BYOS, but entry?
CVE-2022-45685: no packages for Image SLES15-SP5-SAP-Azure-LI-BYOS-Production, but entry?
CVE-2022-45685: no packages for Image SLES15-SP5-SAP-Azure-VLI-BYOS, but entry?
CVE-2022-45685: no packages for Image SLES15-SP5-SAP-Azure-VLI-BYOS-Production, but entry?
CVE-2022-45685: no packages for Image SLES15-SP5-SAP-EC2, but entry?
CVE-2022-45685: no packages for Image SLES15-SP5-SAP-GCE, but entry?
CVE-2022-45685: no packages for Image SLES15-SP5-SAPCAL-Azure, but entry?
CVE-2022-45685: no packages for Image SLES15-SP5-SAPCAL-EC2, but entry?
CVE-2022-45685: no packages for Image SLES15-SP5-SAPCAL-GCE, but entry?
CVE-2022-45685: no packages for Image SLES15-SP6-SAP, but entry?
CVE-2022-45685: no packages for Image SLES15-SP6-SAP-Azure, but entry?
CVE-2022-45685: no packages for Image SLES15-SP6-SAP-Azure-LI-BYOS, but entry?
CVE-2022-45685: no packages for Image SLES15-SP6-SAP-Azure-LI-BYOS-Production, but entry?
CVE-2022-45685: no packages for Image SLES15-SP6-SAP-Azure-VLI-BYOS, but entry?
CVE-2022-45685: no packages for Image SLES15-SP6-SAP-Azure-VLI-BYOS-Production, but entry?
CVE-2022-45685: no packages for Image SLES15-SP6-SAP-EC2, but entry?
CVE-2022-45685: no packages for Image SLES15-SP6-SAP-GCE, but entry?
CVE-2022-45685: no packages for Image SLES15-SP6-SAPCAL, but entry?
CVE-2022-45685: no packages for Image SLES15-SP6-SAPCAL-Azure, but entry?
CVE-2022-45685: no packages for Image SLES15-SP6-SAPCAL-EC2, but entry?
CVE-2022-45685: no packages for Image SLES15-SP6-SAPCAL-GCE, but entry?
CVE-2022-45685: no packages for SUSE CaaS Platform 4.0, but entry?
CVE-2022-45685: no packages for SUSE Enterprise Storage 7, but entry?
CVE-2022-45685: no packages for SUSE Enterprise Storage 7.1, but entry?
CVE-2022-45685: no packages for SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS, but entry?
CVE-2022-45685: no packages for SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS, but entry?
CVE-2022-45685: no packages for SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS, but entry?
CVE-2022-45685: no packages for SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS, but entry?
CVE-2022-45685: no packages for SUSE Linux Enterprise Module for Basesystem 15 SP4, but entry?
CVE-2022-45685: no packages for SUSE Linux Enterprise Module for Basesystem 15 SP5, but entry?
CVE-2022-45685: no packages for SUSE Linux Enterprise Module for Basesystem 15 SP6, but entry?
CVE-2022-45685: no packages for SUSE Linux Enterprise Module for Development Tools 15 SP4, but entry?
CVE-2022-45685: no packages for SUSE Linux Enterprise Module for Development Tools 15 SP5, but entry?
CVE-2022-45685: no packages for SUSE Linux Enterprise Module for Development Tools 15 SP6, but entry?
CVE-2022-45685: no packages for SUSE Linux Enterprise Module for Package Hub 15 SP4, but entry?
CVE-2022-45685: no packages for SUSE Linux Enterprise Module for Package Hub 15 SP5, but entry?
CVE-2022-45685: no packages for SUSE Linux Enterprise Module for Package Hub 15 SP6, but entry?
CVE-2022-45685: no packages for SUSE Linux Enterprise Module for Web and Scripting 15 SP4, but entry?
CVE-2022-45685: no packages for SUSE Linux Enterprise Module for Web and Scripting 15 SP5, but entry?
CVE-2022-45685: no packages for SUSE Linux Enterprise Module for Web and Scripting 15 SP6, but entry?
CVE-2022-45685: no packages for SUSE Linux Enterprise Real Time 15 SP3, but entry?
CVE-2022-45685: no packages for SUSE Linux Enterprise Server 15 SP1-LTSS, but entry?
CVE-2022-45685: no packages for SUSE Linux Enterprise Server 15 SP2-LTSS, but entry?
CVE-2022-45685: no packages for SUSE Linux Enterprise Server 15 SP3-LTSS, but entry?
CVE-2022-45685: no packages for SUSE Linux Enterprise Server 15 SP4-TERADATA, but entry?
CVE-2022-45685: no packages for SUSE Linux Enterprise Server for SAP Applications 15 SP1, but entry?
CVE-2022-45685: no packages for SUSE Linux Enterprise Server for SAP Applications 15 SP2, but entry?
CVE-2022-45685: no packages for SUSE Linux Enterprise Server for SAP Applications 15 SP3, but entry?
CVE-2022-45685: no packages for SUSE Linux Enterprise Workstation Extension 15 SP4, but entry?
CVE-2022-45685: no packages for SUSE Linux Enterprise Workstation Extension 15 SP5, but entry?
CVE-2022-45685: no packages for SUSE Linux Enterprise Workstation Extension 15 SP6, but entry?
CVE-2022-45685: no packages for SUSE Manager Proxy 4.2, but entry?
CVE-2022-45685: no packages for SUSE Manager Retail Branch Server 4.2, but entry?
CVE-2022-45685: no packages for SUSE Manager Server 4.2, but entry?
CVE-2022-45685: no packages for SUSE Manager Server Module 4.2, but entry?
CVE-2022-45685: no packages for SUSE Manager Server Module 4.3, but entry?
CVE-2022-45685: no packages for Container bci/kiwi:9.24.43-8.6, but entry?
CVE-2022-45685: no packages for Container bci/openjdk-devel:11-6.2, but entry?
CVE-2022-45685: no packages for Container bci/openjdk-devel:17-14.11, but entry?
CVE-2022-45685: no packages for Container bci/openjdk-devel:17-7.2, but entry?
CVE-2022-45685: no packages for Container bci/openjdk:11-7.1, but entry?
CVE-2022-45685: no packages for Container bci/openjdk:17-7.1, but entry?
CVE-2022-45685: no packages for Container bci/openjdk:latest, but entry?
CVE-2022-45685: no packages for Container suse/manager/5.0/x86_64/server-attestation:5.0.0-beta2.2.16, but entry?
CVE-2022-45685: no packages for Container suse/manager/5.0/x86_64/server:5.0.0-beta1.2.122, but entry?
CVE-2022-45685: no packages for Image SLES15-SP2-SAP-Azure, but entry?
CVE-2022-45685: no packages for Image SLES15-SP2-SAP-Azure-LI-BYOS-Production, but entry?
CVE-2022-45685: no packages for Image SLES15-SP2-SAP-Azure-VLI-BYOS-Production, but entry?
CVE-2022-45685: no packages for Image SLES15-SP2-SAP-BYOS-Azure, but entry?
CVE-2022-45685: no packages for Image SLES15-SP2-SAP-BYOS-EC2-HVM, but entry?
CVE-2022-45685: no packages for Image SLES15-SP2-SAP-BYOS-GCE, but entry?
CVE-2022-45685: no packages for Image SLES15-SP2-SAP-EC2-HVM, but entry?
CVE-2022-45685: no packages for Image SLES15-SP2-SAP-GCE, but entry?
CVE-2022-45685: no packages for Image SLES15-SP3-Manager-4-2-Server-BYOS-Azure, but entry?
CVE-2022-45685: no packages for Image SLES15-SP3-Manager-4-2-Server-BYOS-EC2-HVM, but entry?
CVE-2022-45685: no packages for Image SLES15-SP3-Manager-4-2-Server-BYOS-GCE, but entry?
CVE-2022-45685: no packages for Image SLES15-SP3-SAP-Azure-LI-BYOS-Production, but entry?
CVE-2022-45685: no packages for Image SLES15-SP3-SAP-Azure-VLI-BYOS-Production, but entry?
CVE-2022-45685: no packages for Image SLES15-SP3-SAPCAL-Azure, but entry?
CVE-2022-45685: no packages for Image SLES15-SP3-SAPCAL-EC2-HVM, but entry?
CVE-2022-45685: no packages for Image SLES15-SP3-SAPCAL-GCE, but entry?
CVE-2022-45685: no packages for Image SLES15-SP4-Manager-Server-4-3, but entry?
CVE-2022-45685: no packages for Image SLES15-SP4-Manager-Server-4-3-Azure-llc, but entry?
CVE-2022-45685: no packages for Image SLES15-SP4-Manager-Server-4-3-Azure-ltd, but entry?
CVE-2022-45685: no packages for Image SLES15-SP4-Manager-Server-4-3-BYOS, but entry?
CVE-2022-45685: no packages for Image SLES15-SP4-Manager-Server-4-3-BYOS-Azure, but entry?
CVE-2022-45685: no packages for Image SLES15-SP4-Manager-Server-4-3-BYOS-EC2, but entry?
CVE-2022-45685: no packages for Image SLES15-SP4-Manager-Server-4-3-BYOS-GCE, but entry?
CVE-2022-45685: no packages for Image SLES15-SP4-Manager-Server-4-3-EC2-llc, but entry?
CVE-2022-45685: no packages for Image SLES15-SP4-Manager-Server-4-3-EC2-ltd, but entry?
CVE-2022-45685: no packages for Image SLES15-SP4-SAP, but entry?
CVE-2022-45685: no packages for Image SLES15-SP4-SAP-Azure, but entry?
CVE-2022-45685: no packages for Image SLES15-SP4-SAP-Azure-LI-BYOS, but entry?
CVE-2022-45685: no packages for Image SLES15-SP4-SAP-Azure-LI-BYOS-Production, but entry?
CVE-2022-45685: no packages for Image SLES15-SP4-SAP-Azure-VLI-BYOS, but entry?
CVE-2022-45685: no packages for Image SLES15-SP4-SAP-Azure-VLI-BYOS-Production, but entry?
CVE-2022-45685: no packages for Image SLES15-SP4-SAP-EC2, but entry?
CVE-2022-45685: no packages for Image SLES15-SP4-SAP-GCE, but entry?
CVE-2022-45685: no packages for Image SLES15-SP4-SAPCAL, but entry?
CVE-2022-45685: no packages for Image SLES15-SP4-SAPCAL-Azure, but entry?
CVE-2022-45685: no packages for Image SLES15-SP4-SAPCAL-EC2, but entry?
CVE-2022-45685: no packages for Image SLES15-SP4-SAPCAL-GCE, but entry?
CVE-2022-45685: no packages for Image SLES15-SP5-SAP-Azure, but entry?
CVE-2022-45685: no packages for Image SLES15-SP5-SAP-Azure-LI-BYOS, but entry?
CVE-2022-45685: no packages for Image SLES15-SP5-SAP-Azure-LI-BYOS-Production, but entry?
CVE-2022-45685: no packages for Image SLES15-SP5-SAP-Azure-VLI-BYOS, but entry?
CVE-2022-45685: no packages for Image SLES15-SP5-SAP-Azure-VLI-BYOS-Production, but entry?
CVE-2022-45685: no packages for Image SLES15-SP5-SAP-EC2, but entry?
CVE-2022-45685: no packages for Image SLES15-SP5-SAP-GCE, but entry?
CVE-2022-45685: no packages for Image SLES15-SP5-SAPCAL-Azure, but entry?
CVE-2022-45685: no packages for Image SLES15-SP5-SAPCAL-EC2, but entry?
CVE-2022-45685: no packages for Image SLES15-SP5-SAPCAL-GCE, but entry?
CVE-2022-45685: no packages for Image SLES15-SP6-SAP, but entry?
CVE-2022-45685: no packages for Image SLES15-SP6-SAP-Azure, but entry?
CVE-2022-45685: no packages for Image SLES15-SP6-SAP-Azure-LI-BYOS, but entry?
CVE-2022-45685: no packages for Image SLES15-SP6-SAP-Azure-LI-BYOS-Production, but entry?
CVE-2022-45685: no packages for Image SLES15-SP6-SAP-Azure-VLI-BYOS, but entry?
CVE-2022-45685: no packages for Image SLES15-SP6-SAP-Azure-VLI-BYOS-Production, but entry?
CVE-2022-45685: no packages for Image SLES15-SP6-SAP-EC2, but entry?
CVE-2022-45685: no packages for Image SLES15-SP6-SAP-GCE, but entry?
CVE-2022-45685: no packages for Image SLES15-SP6-SAPCAL, but entry?
CVE-2022-45685: no packages for Image SLES15-SP6-SAPCAL-Azure, but entry?
CVE-2022-45685: no packages for Image SLES15-SP6-SAPCAL-EC2, but entry?
CVE-2022-45685: no packages for Image SLES15-SP6-SAPCAL-GCE, but entry?
CVE-2022-45685: no packages for SUSE CaaS Platform 4.0, but entry?
CVE-2022-45685: no packages for SUSE Enterprise Storage 7, but entry?
CVE-2022-45685: no packages for SUSE Enterprise Storage 7.1, but entry?
CVE-2022-45685: no packages for SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS, but entry?
CVE-2022-45685: no packages for SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS, but entry?
CVE-2022-45685: no packages for SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS, but entry?
CVE-2022-45685: no packages for SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS, but entry?
CVE-2022-45685: no packages for SUSE Linux Enterprise Module for Basesystem 15 SP4, but entry?
CVE-2022-45685: no packages for SUSE Linux Enterprise Module for Basesystem 15 SP5, but entry?
CVE-2022-45685: no packages for SUSE Linux Enterprise Module for Basesystem 15 SP6, but entry?
CVE-2022-45685: no packages for SUSE Linux Enterprise Module for Development Tools 15 SP4, but entry?
CVE-2022-45685: no packages for SUSE Linux Enterprise Module for Development Tools 15 SP5, but entry?
CVE-2022-45685: no packages for SUSE Linux Enterprise Module for Development Tools 15 SP6, but entry?
CVE-2022-45685: no packages for SUSE Linux Enterprise Module for Package Hub 15 SP4, but entry?
CVE-2022-45685: no packages for SUSE Linux Enterprise Module for Package Hub 15 SP5, but entry?
CVE-2022-45685: no packages for SUSE Linux Enterprise Module for Package Hub 15 SP6, but entry?
CVE-2022-45685: no packages for SUSE Linux Enterprise Module for Web and Scripting 15 SP4, but entry?
CVE-2022-45685: no packages for SUSE Linux Enterprise Module for Web and Scripting 15 SP5, but entry?
CVE-2022-45685: no packages for SUSE Linux Enterprise Module for Web and Scripting 15 SP6, but entry?
CVE-2022-45685: no packages for SUSE Linux Enterprise Real Time 15 SP3, but entry?
CVE-2022-45685: no packages for SUSE Linux Enterprise Server 15 SP1-LTSS, but entry?
CVE-2022-45685: no packages for SUSE Linux Enterprise Server 15 SP2-LTSS, but entry?
CVE-2022-45685: no packages for SUSE Linux Enterprise Server 15 SP3-LTSS, but entry?
CVE-2022-45685: no packages for SUSE Linux Enterprise Server 15 SP4-TERADATA, but entry?
CVE-2022-45685: no packages for SUSE Linux Enterprise Server for SAP Applications 15 SP1, but entry?
CVE-2022-45685: no packages for SUSE Linux Enterprise Server for SAP Applications 15 SP2, but entry?
CVE-2022-45685: no packages for SUSE Linux Enterprise Server for SAP Applications 15 SP3, but entry?
CVE-2022-45685: no packages for SUSE Linux Enterprise Workstation Extension 15 SP4, but entry?
CVE-2022-45685: no packages for SUSE Linux Enterprise Workstation Extension 15 SP5, but entry?
CVE-2022-45685: no packages for SUSE Linux Enterprise Workstation Extension 15 SP6, but entry?
CVE-2022-45685: no packages for SUSE Manager Proxy 4.2, but entry?
CVE-2022-45685: no packages for SUSE Manager Retail Branch Server 4.2, but entry?
CVE-2022-45685: no packages for SUSE Manager Server 4.2, but entry?
CVE-2022-45685: no packages for SUSE Manager Server Module 4.2, but entry?
CVE-2022-45685: no packages for SUSE Manager Server Module 4.3, but entry?
skipping CVE-2022-45587 as CVE page is older than CVRF-CVE file.
skipping CVE-2022-45586 as CVE page is older than CVRF-CVE file.
notsure where SUSE Linux Enterprise Module for Package Hub 15 SP3 is contained?
skipping CVE-2022-45421 as CVE page is older than CVRF-CVE file.
skipping CVE-2022-45420 as CVE page is older than CVRF-CVE file.
skipping CVE-2022-45419 as CVE page is older than CVRF-CVE file.
skipping CVE-2022-45418 as CVE page is older than CVRF-CVE file.
skipping CVE-2022-45417 as CVE page is older than CVRF-CVE file.
skipping CVE-2022-45416 as CVE page is older than CVRF-CVE file.
skipping CVE-2022-45415 as CVE page is older than CVRF-CVE file.
skipping CVE-2022-45413 as CVE page is older than CVRF-CVE file.
skipping CVE-2022-45412 as CVE page is older than CVRF-CVE file.
skipping CVE-2022-45411 as CVE page is older than CVRF-CVE file.
skipping CVE-2022-45410 as CVE page is older than CVRF-CVE file.
skipping CVE-2022-45409 as CVE page is older than CVRF-CVE file.
skipping CVE-2022-45408 as CVE page is older than CVRF-CVE file.
skipping CVE-2022-45407 as CVE page is older than CVRF-CVE file.
skipping CVE-2022-45406 as CVE page is older than CVRF-CVE file.
skipping CVE-2022-45405 as CVE page is older than CVRF-CVE file.
skipping CVE-2022-45404 as CVE page is older than CVRF-CVE file.
skipping CVE-2022-45403 as CVE page is older than CVRF-CVE file.
no cpe found for SUSE Package Hub 15 SP5 in CVE-2022-45198
no cpe found for SUSE Package Hub 15 SP3 in CVE-2022-45197
no cpe found for SUSE Package Hub 15 SP4 in CVE-2022-45197
No V5 entry found for CVE-2022-45157 / /home/securitybot/prod/cve-database/cvelistV5/cves/2022/45xxxx/CVE-2022-45157.json:No such file or directory
no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2022-45154
skipping CVE-2022-45153 as CVE page is older than CVRF-CVE file.
no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2022-45063
skipping CVE-2022-45143 as CVE page is older than CVRF-CVE file.
skipping CVE-2022-45142 as CVE page is older than CVRF-CVE file.
skipping CVE-2022-45141 as CVE page is older than CVRF-CVE file.
no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2022-45061
--- /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2022-45061.xml 2024-10-22 02:36:39.164600000 +0200
+++ /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2022-45061.xml.new 2024-10-29 01:38:58.853847000 +0100
@@ -14,13 +14,13 @@
1
- 134
- 2024-10-22T00:36:38Z
+ 135
+ 2024-10-29T00:38:58Z
current
2022-11-10T00:42:32Z
- 2024-10-22T00:36:38Z
+ 2024-10-29T00:38:58Z
cve-database/bin/generate-cvrf-cve.pl
2020-12-27T01:00:00Z
@@ -3189,6 +3189,24 @@
python313-x86-64-v3-3.13.0~b3-1.1
+
+ python314-3.14.0~a1-1.1
+
+
+ python314-curses-3.14.0~a1-1.1
+
+
+ python314-dbm-3.14.0~a1-1.1
+
+
+ python314-idle-3.14.0~a1-1.1
+
+
+ python314-tk-3.14.0~a1-1.1
+
+
+ python314-x86-64-v3-3.14.0~a1-1.1
+
python36-3.6.15-37.1
@@ -9723,6 +9741,24 @@
python313-x86-64-v3-3.13.0~b3-1.1 as a component of openSUSE Tumbleweed
+
+ python314-3.14.0~a1-1.1 as a component of openSUSE Tumbleweed
+
+
+ python314-curses-3.14.0~a1-1.1 as a component of openSUSE Tumbleweed
+
+
+ python314-dbm-3.14.0~a1-1.1 as a component of openSUSE Tumbleweed
+
+
+ python314-idle-3.14.0~a1-1.1 as a component of openSUSE Tumbleweed
+
+
+ python314-tk-3.14.0~a1-1.1 as a component of openSUSE Tumbleweed
+
+
+ python314-x86-64-v3-3.14.0~a1-1.1 as a component of openSUSE Tumbleweed
+
python38-3.8.15-4.1 as a component of openSUSE Tumbleweed
@@ -12029,6 +12065,12 @@
openSUSE Tumbleweed:python313-idle-3.13.0~b3-1.1
openSUSE Tumbleweed:python313-tk-3.13.0~b3-1.1
openSUSE Tumbleweed:python313-x86-64-v3-3.13.0~b3-1.1
+ openSUSE Tumbleweed:python314-3.14.0~a1-1.1
+ openSUSE Tumbleweed:python314-curses-3.14.0~a1-1.1
+ openSUSE Tumbleweed:python314-dbm-3.14.0~a1-1.1
+ openSUSE Tumbleweed:python314-idle-3.14.0~a1-1.1
+ openSUSE Tumbleweed:python314-tk-3.14.0~a1-1.1
+ openSUSE Tumbleweed:python314-x86-64-v3-3.14.0~a1-1.1
openSUSE Tumbleweed:python38-3.8.15-4.1
openSUSE Tumbleweed:python38-32bit-3.8.15-4.1
openSUSE Tumbleweed:python38-curses-3.8.15-4.1
no cpe found for SUSE Package Hub 15 SP4 in CVE-2022-45060
no cpe found for SUSE Package Hub 15 SP4 in CVE-2022-45059
no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2022-45047
skipping CVE-2022-44840 as CVE page is older than CVRF-CVE file.
skipping CVE-2022-44793 as CVE page is older than CVRF-CVE file.
skipping CVE-2022-44792 as CVE page is older than CVRF-CVE file.
no cpe found for SUSE Package Hub 15 SP3 in CVE-2022-44640
no cpe found for SUSE Package Hub 15 SP4 in CVE-2022-44640
skipping CVE-2022-44638 as CVE page is older than CVRF-CVE file.
skipping CVE-2022-44617 as CVE page is older than CVRF-CVE file.
skipping CVE-2022-44572 as CVE page is older than CVRF-CVE file.
skipping CVE-2022-44571 as CVE page is older than CVRF-CVE file.
skipping CVE-2022-44570 as CVE page is older than CVRF-CVE file.
skipping CVE-2022-44566 as CVE page is older than CVRF-CVE file.
skipping CVE-2022-44268 as CVE page is older than CVRF-CVE file.
skipping CVE-2022-44267 as CVE page is older than CVRF-CVE file.
skipping CVE-2022-44034 as CVE page is older than CVRF-CVE file.
skipping CVE-2022-44033 as CVE page is older than CVRF-CVE file.
skipping CVE-2022-44032 as CVE page is older than CVRF-CVE file.
no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2022-43995
no cpe found for SUSE Linux Enterprise Server 15 SP3-BCL in CVE-2022-43945
no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2022-43945
skipping CVE-2022-43760 as CVE page is older than CVRF-CVE file.
no cpe found for SUSE Package Hub 15 SP3 in CVE-2022-43705
no cpe found for SUSE Package Hub 15 SP4 in CVE-2022-43705
skipping CVE-2022-43754 as CVE page is older than CVRF-CVE file.
skipping CVE-2022-43753 as CVE page is older than CVRF-CVE file.
skipping CVE-2022-43750 as CVE page is older than CVRF-CVE file.
skipping CVE-2022-43680 as CVE page is older than CVRF-CVE file.
no cpe found for SUSE Liberty Linux 7 LTSS in CVE-2022-43552
no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2022-43552
no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2022-43548
skipping CVE-2022-43551 as CVE page is older than CVRF-CVE file.
no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2022-43507
skipping CVE-2022-43516 as CVE page is older than CVRF-CVE file.
skipping CVE-2022-43515 as CVE page is older than CVRF-CVE file.
no cpe found for SUSE Package Hub 15 SP4 in CVE-2022-43272
skipping CVE-2022-43295 as CVE page is older than CVRF-CVE file.
skipping CVE-2022-42969 as CVE page is older than CVRF-CVE file.
skipping CVE-2022-42932 as CVE page is older than CVRF-CVE file.
no cpe found for SUSE Liberty Linux 7 LTSS in CVE-2022-42920
no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2022-42920
skipping CVE-2022-42930 as CVE page is older than CVRF-CVE file.
skipping CVE-2022-42929 as CVE page is older than CVRF-CVE file.
skipping CVE-2022-42928 as CVE page is older than CVRF-CVE file.
skipping CVE-2022-42927 as CVE page is older than CVRF-CVE file.
no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2022-42919
--- /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2022-42919.xml 2024-10-22 02:37:27.307569000 +0200
+++ /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2022-42919.xml.new 2024-10-29 01:39:13.633064000 +0100
@@ -14,13 +14,13 @@
1
- 42
- 2024-10-22T00:37:26Z
+ 43
+ 2024-10-29T00:39:13Z
current
2022-10-27T23:44:55Z
- 2024-10-22T00:37:26Z
+ 2024-10-29T00:39:13Z
cve-database/bin/generate-cvrf-cve.pl
2020-12-27T01:00:00Z
@@ -765,6 +765,24 @@
python313-x86-64-v3-3.13.0~b3-1.1
+
+ python314-3.14.0~a1-1.1
+
+
+ python314-curses-3.14.0~a1-1.1
+
+
+ python314-dbm-3.14.0~a1-1.1
+
+
+ python314-idle-3.14.0~a1-1.1
+
+
+ python314-tk-3.14.0~a1-1.1
+
+
+ python314-x86-64-v3-3.14.0~a1-1.1
+
python36
@@ -1446,6 +1464,24 @@
python313-x86-64-v3-3.13.0~b3-1.1 as a component of openSUSE Tumbleweed
+
+ python314-3.14.0~a1-1.1 as a component of openSUSE Tumbleweed
+
+
+ python314-curses-3.14.0~a1-1.1 as a component of openSUSE Tumbleweed
+
+
+ python314-dbm-3.14.0~a1-1.1 as a component of openSUSE Tumbleweed
+
+
+ python314-idle-3.14.0~a1-1.1 as a component of openSUSE Tumbleweed
+
+
+ python314-tk-3.14.0~a1-1.1 as a component of openSUSE Tumbleweed
+
+
+ python314-x86-64-v3-3.14.0~a1-1.1 as a component of openSUSE Tumbleweed
+
python39-3.9.15-2.1 as a component of openSUSE Tumbleweed
@@ -2551,6 +2587,12 @@
openSUSE Tumbleweed:python313-idle-3.13.0~b3-1.1
openSUSE Tumbleweed:python313-tk-3.13.0~b3-1.1
openSUSE Tumbleweed:python313-x86-64-v3-3.13.0~b3-1.1
+ openSUSE Tumbleweed:python314-3.14.0~a1-1.1
+ openSUSE Tumbleweed:python314-curses-3.14.0~a1-1.1
+ openSUSE Tumbleweed:python314-dbm-3.14.0~a1-1.1
+ openSUSE Tumbleweed:python314-idle-3.14.0~a1-1.1
+ openSUSE Tumbleweed:python314-tk-3.14.0~a1-1.1
+ openSUSE Tumbleweed:python314-x86-64-v3-3.14.0~a1-1.1
openSUSE Tumbleweed:python39-3.9.15-2.1
openSUSE Tumbleweed:python39-32bit-3.9.15-2.1
openSUSE Tumbleweed:python39-curses-3.9.15-2.1
No V5 entry found for CVE-2022-42917 / /home/securitybot/prod/cve-database/cvelistV5/cves/2022/42xxxx/CVE-2022-42917.json:No such file or directory
no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2022-42917
skipping CVE-2022-42916 as CVE page is older than CVRF-CVE file.
skipping CVE-2022-42915 as CVE page is older than CVRF-CVE file.
skipping CVE-2022-42898 as CVE page is older than CVRF-CVE file.
skipping CVE-2022-42896 as CVE page is older than CVRF-CVE file.
skipping CVE-2022-42895 as CVE page is older than CVRF-CVE file.
CVE-2022-42889: no packages for Image SLES15-SP5-SAPCAL-EC2, but entry?
CVE-2022-42889: no packages for Image SLES15-SP4-SAPCAL-Azure, but entry?
CVE-2022-42889: no packages for SUSE Linux Enterprise Module for Web and Scripting 15 SP4, but entry?
CVE-2022-42889: no packages for Image SLES15-SP4-SAPCAL-EC2, but entry?
CVE-2022-42889: no packages for Container bci/openjdk-devel:17-14.11, but entry?
CVE-2022-42889: no packages for Image SLES15-SP4-SAP-EC2, but entry?
CVE-2022-42889: no packages for SUSE Linux Enterprise Server for SAP Applications 15 SP1, but entry?
CVE-2022-42889: no packages for Container bci/openjdk:11-7.1, but entry?
CVE-2022-42889: no packages for Container bci/kiwi:9.24.43-8.6, but entry?
CVE-2022-42889: no packages for SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS, but entry?
CVE-2022-42889: no packages for Image SLES15-SP2-SAP-GCE, but entry?
CVE-2022-42889: no packages for Image SLES15-SP3-Manager-4-2-Server-BYOS-Azure, but entry?
CVE-2022-42889: no packages for SUSE Linux Enterprise Workstation Extension 15 SP6, but entry?
CVE-2022-42889: no packages for Image SLES15-SP3-SAP-Azure-LI-BYOS-Production, but entry?
CVE-2022-42889: no packages for SUSE Manager Server Module 4.3, but entry?
CVE-2022-42889: no packages for Image SLES15-SP2-SAP-EC2-HVM, but entry?
CVE-2022-42889: no packages for Image SLES15-SP6-SAP-Azure-VLI-BYOS-Production, but entry?
CVE-2022-42889: no packages for Image SLES15-SP6-SAP-EC2, but entry?
CVE-2022-42889: no packages for Image SLES15-SP4-SAP-GCE, but entry?
CVE-2022-42889: no packages for Image SLES15-SP4-SAP-Azure-VLI-BYOS, but entry?
CVE-2022-42889: no packages for Image SLES15-SP6-SAP-Azure-LI-BYOS, but entry?
CVE-2022-42889: no packages for SUSE Linux Enterprise Server 15 SP4-TERADATA, but entry?
CVE-2022-42889: no packages for Image SLES15-SP4-Manager-Server-4-3-BYOS-GCE, but entry?
CVE-2022-42889: no packages for Container bci/openjdk-devel:11-6.2, but entry?
CVE-2022-42889: no packages for Image SLES15-SP6-SAPCAL-GCE, but entry?
CVE-2022-42889: no packages for Image SLES15-SP6-SAP-GCE, but entry?
CVE-2022-42889: no packages for Image SLES15-SP4-Manager-Server-4-3-BYOS-Azure, but entry?
CVE-2022-42889: no packages for Image SLES15-SP3-Manager-4-2-Server-BYOS-EC2-HVM, but entry?
CVE-2022-42889: no packages for SUSE Manager Server Module 4.2, but entry?
CVE-2022-42889: no packages for Image SLES15-SP4-Manager-Server-4-3-BYOS-EC2, but entry?
CVE-2022-42889: no packages for Image SLES15-SP5-SAP-Azure-LI-BYOS, but entry?
CVE-2022-42889: no packages for Image SLES15-SP4-SAP-Azure-VLI-BYOS-Production, but entry?
CVE-2022-42889: no packages for Image SLES15-SP6-SAP-Azure, but entry?
CVE-2022-42889: no packages for Image SLES15-SP5-SAPCAL-GCE, but entry?
CVE-2022-42889: no packages for Image SLES15-SP5-SAPCAL-Azure, but entry?
CVE-2022-42889: no packages for Container bci/openjdk-devel:17-7.2, but entry?
CVE-2022-42889: no packages for SUSE Linux Enterprise Server 15 SP1-LTSS, but entry?
CVE-2022-42889: no packages for Image SLES15-SP5-SAP-GCE, but entry?
CVE-2022-42889: no packages for SUSE Linux Enterprise Workstation Extension 15 SP5, but entry?
CVE-2022-42889: no packages for Image SLES15-SP5-SAP-Azure, but entry?
CVE-2022-42889: no packages for Container suse/manager/5.0/x86_64/server-attestation:5.0.0-beta2.2.16, but entry?
CVE-2022-42889: no packages for Image SLES15-SP6-SAP-Azure-VLI-BYOS, but entry?
CVE-2022-42889: no packages for Image SLES15-SP2-SAP-BYOS-EC2-HVM, but entry?
CVE-2022-42889: no packages for Image SLES15-SP6-SAPCAL-Azure, but entry?
CVE-2022-42889: no packages for Image SLES15-SP2-SAP-Azure-VLI-BYOS-Production, but entry?
CVE-2022-42889: no packages for Image SLES15-SP5-SAP-Azure-VLI-BYOS-Production, but entry?
CVE-2022-42889: no packages for SUSE CaaS Platform 4.0, but entry?
CVE-2022-42889: no packages for Image SLES15-SP2-SAP-BYOS-GCE, but entry?
CVE-2022-42889: no packages for Container bci/openjdk:17-7.1, but entry?
CVE-2022-42889: no packages for Image SLES15-SP4-Manager-Server-4-3-Azure-llc, but entry?
CVE-2022-42889: no packages for SUSE Linux Enterprise Module for Basesystem 15 SP4, but entry?
CVE-2022-42889: no packages for SUSE Linux Enterprise Module for Package Hub 15 SP6, but entry?
CVE-2022-42889: no packages for Image SLES15-SP3-SAP-Azure-VLI-BYOS-Production, but entry?
CVE-2022-42889: no packages for Image SLES15-SP3-SAPCAL-Azure, but entry?
CVE-2022-42889: no packages for Image SLES15-SP4-Manager-Server-4-3-EC2-ltd, but entry?
CVE-2022-42889: no packages for Image SLES15-SP6-SAPCAL, but entry?
CVE-2022-42889: no packages for Image SLES15-SP5-SAP-Azure-VLI-BYOS, but entry?
CVE-2022-42889: no packages for Image SLES15-SP5-SAP-Azure-LI-BYOS-Production, but entry?
CVE-2022-42889: no packages for SUSE Linux Enterprise Module for Basesystem 15 SP6, but entry?
CVE-2022-42889: no packages for Image SLES15-SP5-SAP-EC2, but entry?
CVE-2022-42889: no packages for SUSE Linux Enterprise Module for Web and Scripting 15 SP5, but entry?
CVE-2022-42889: no packages for Image SLES15-SP2-SAP-BYOS-Azure, but entry?
CVE-2022-42889: no packages for Image SLES15-SP4-Manager-Server-4-3-Azure-ltd, but entry?
CVE-2022-42889: no packages for Image SLES15-SP6-SAPCAL-EC2, but entry?
CVE-2022-42889: no packages for Image SLES15-SP4-SAPCAL, but entry?
CVE-2022-42889: no packages for SUSE Linux Enterprise Module for Web and Scripting 15 SP6, but entry?
CVE-2022-42889: no packages for Container bci/openjdk:latest, but entry?
CVE-2022-42889: no packages for Image SLES15-SP3-Manager-4-2-Server-BYOS-GCE, but entry?
CVE-2022-42889: no packages for Image SLES15-SP4-Manager-Server-4-3, but entry?
CVE-2022-42889: no packages for Image SLES15-SP4-SAP, but entry?
CVE-2022-42889: no packages for SUSE Manager Retail Branch Server 4.2, but entry?
CVE-2022-42889: no packages for SUSE Manager Proxy 4.2, but entry?
CVE-2022-42889: no packages for Image SLES15-SP4-Manager-Server-4-3-EC2-llc, but entry?
CVE-2022-42889: no packages for Image SLES15-SP4-SAP-Azure, but entry?
CVE-2022-42889: no packages for SUSE Linux Enterprise Module for Package Hub 15 SP5, but entry?
CVE-2022-42889: no packages for SUSE Linux Enterprise Workstation Extension 15 SP4, but entry?
CVE-2022-42889: no packages for SUSE Linux Enterprise Module for Package Hub 15 SP4, but entry?
CVE-2022-42889: no packages for Image SLES15-SP6-SAP-Azure-LI-BYOS-Production, but entry?
CVE-2022-42889: no packages for Image SLES15-SP3-SAPCAL-GCE, but entry?
CVE-2022-42889: no packages for Image SLES15-SP6-SAP, but entry?
CVE-2022-42889: no packages for Image SLES15-SP4-SAPCAL-GCE, but entry?
CVE-2022-42889: no packages for SUSE Linux Enterprise Module for Basesystem 15 SP5, but entry?
CVE-2022-42889: no packages for Image SLES15-SP2-SAP-Azure, but entry?
CVE-2022-42889: no packages for Container suse/manager/5.0/x86_64/server:5.0.0-beta1.2.122, but entry?
CVE-2022-42889: no packages for Image SLES15-SP4-Manager-Server-4-3-BYOS, but entry?
CVE-2022-42889: no packages for Image SLES15-SP4-SAP-Azure-LI-BYOS, but entry?
CVE-2022-42889: no packages for Image SLES15-SP3-SAPCAL-EC2-HVM, but entry?
CVE-2022-42889: no packages for SUSE Manager Server 4.2, but entry?
CVE-2022-42889: no packages for Image SLES15-SP4-SAP-Azure-LI-BYOS-Production, but entry?
CVE-2022-42889: no packages for Image SLES15-SP2-SAP-Azure-LI-BYOS-Production, but entry?
CVE-2022-42889: no packages for Container bci/kiwi:9.24.43-8.6, but entry?
CVE-2022-42889: no packages for Container bci/openjdk-devel:11-6.2, but entry?
CVE-2022-42889: no packages for Container bci/openjdk-devel:17-14.11, but entry?
CVE-2022-42889: no packages for Container bci/openjdk-devel:17-7.2, but entry?
CVE-2022-42889: no packages for Container bci/openjdk:11-7.1, but entry?
CVE-2022-42889: no packages for Container bci/openjdk:17-7.1, but entry?
CVE-2022-42889: no packages for Container bci/openjdk:latest, but entry?
CVE-2022-42889: no packages for Container suse/manager/5.0/x86_64/server-attestation:5.0.0-beta2.2.16, but entry?
CVE-2022-42889: no packages for Container suse/manager/5.0/x86_64/server:5.0.0-beta1.2.122, but entry?
CVE-2022-42889: no packages for Image SLES15-SP2-SAP-Azure, but entry?
CVE-2022-42889: no packages for Image SLES15-SP2-SAP-Azure-LI-BYOS-Production, but entry?
CVE-2022-42889: no packages for Image SLES15-SP2-SAP-Azure-VLI-BYOS-Production, but entry?
CVE-2022-42889: no packages for Image SLES15-SP2-SAP-BYOS-Azure, but entry?
CVE-2022-42889: no packages for Image SLES15-SP2-SAP-BYOS-EC2-HVM, but entry?
CVE-2022-42889: no packages for Image SLES15-SP2-SAP-BYOS-GCE, but entry?
CVE-2022-42889: no packages for Image SLES15-SP2-SAP-EC2-HVM, but entry?
CVE-2022-42889: no packages for Image SLES15-SP2-SAP-GCE, but entry?
CVE-2022-42889: no packages for Image SLES15-SP3-Manager-4-2-Server-BYOS-Azure, but entry?
CVE-2022-42889: no packages for Image SLES15-SP3-Manager-4-2-Server-BYOS-EC2-HVM, but entry?
CVE-2022-42889: no packages for Image SLES15-SP3-Manager-4-2-Server-BYOS-GCE, but entry?
CVE-2022-42889: no packages for Image SLES15-SP3-SAP-Azure-LI-BYOS-Production, but entry?
CVE-2022-42889: no packages for Image SLES15-SP3-SAP-Azure-VLI-BYOS-Production, but entry?
CVE-2022-42889: no packages for Image SLES15-SP3-SAPCAL-Azure, but entry?
CVE-2022-42889: no packages for Image SLES15-SP3-SAPCAL-EC2-HVM, but entry?
CVE-2022-42889: no packages for Image SLES15-SP3-SAPCAL-GCE, but entry?
CVE-2022-42889: no packages for Image SLES15-SP4-Manager-Server-4-3, but entry?
CVE-2022-42889: no packages for Image SLES15-SP4-Manager-Server-4-3-Azure-llc, but entry?
CVE-2022-42889: no packages for Image SLES15-SP4-Manager-Server-4-3-Azure-ltd, but entry?
CVE-2022-42889: no packages for Image SLES15-SP4-Manager-Server-4-3-BYOS, but entry?
CVE-2022-42889: no packages for Image SLES15-SP4-Manager-Server-4-3-BYOS-Azure, but entry?
CVE-2022-42889: no packages for Image SLES15-SP4-Manager-Server-4-3-BYOS-EC2, but entry?
CVE-2022-42889: no packages for Image SLES15-SP4-Manager-Server-4-3-BYOS-GCE, but entry?
CVE-2022-42889: no packages for Image SLES15-SP4-Manager-Server-4-3-EC2-llc, but entry?
CVE-2022-42889: no packages for Image SLES15-SP4-Manager-Server-4-3-EC2-ltd, but entry?
CVE-2022-42889: no packages for Image SLES15-SP4-SAP, but entry?
CVE-2022-42889: no packages for Image SLES15-SP4-SAP-Azure, but entry?
CVE-2022-42889: no packages for Image SLES15-SP4-SAP-Azure-LI-BYOS, but entry?
CVE-2022-42889: no packages for Image SLES15-SP4-SAP-Azure-LI-BYOS-Production, but entry?
CVE-2022-42889: no packages for Image SLES15-SP4-SAP-Azure-VLI-BYOS, but entry?
CVE-2022-42889: no packages for Image SLES15-SP4-SAP-Azure-VLI-BYOS-Production, but entry?
CVE-2022-42889: no packages for Image SLES15-SP4-SAP-EC2, but entry?
CVE-2022-42889: no packages for Image SLES15-SP4-SAP-GCE, but entry?
CVE-2022-42889: no packages for Image SLES15-SP4-SAPCAL, but entry?
CVE-2022-42889: no packages for Image SLES15-SP4-SAPCAL-Azure, but entry?
CVE-2022-42889: no packages for Image SLES15-SP4-SAPCAL-EC2, but entry?
CVE-2022-42889: no packages for Image SLES15-SP4-SAPCAL-GCE, but entry?
CVE-2022-42889: no packages for Image SLES15-SP5-SAP-Azure, but entry?
CVE-2022-42889: no packages for Image SLES15-SP5-SAP-Azure-LI-BYOS, but entry?
CVE-2022-42889: no packages for Image SLES15-SP5-SAP-Azure-LI-BYOS-Production, but entry?
CVE-2022-42889: no packages for Image SLES15-SP5-SAP-Azure-VLI-BYOS, but entry?
CVE-2022-42889: no packages for Image SLES15-SP5-SAP-Azure-VLI-BYOS-Production, but entry?
CVE-2022-42889: no packages for Image SLES15-SP5-SAP-EC2, but entry?
CVE-2022-42889: no packages for Image SLES15-SP5-SAP-GCE, but entry?
CVE-2022-42889: no packages for Image SLES15-SP5-SAPCAL-Azure, but entry?
CVE-2022-42889: no packages for Image SLES15-SP5-SAPCAL-EC2, but entry?
CVE-2022-42889: no packages for Image SLES15-SP5-SAPCAL-GCE, but entry?
CVE-2022-42889: no packages for Image SLES15-SP6-SAP, but entry?
CVE-2022-42889: no packages for Image SLES15-SP6-SAP-Azure, but entry?
CVE-2022-42889: no packages for Image SLES15-SP6-SAP-Azure-LI-BYOS, but entry?
CVE-2022-42889: no packages for Image SLES15-SP6-SAP-Azure-LI-BYOS-Production, but entry?
CVE-2022-42889: no packages for Image SLES15-SP6-SAP-Azure-VLI-BYOS, but entry?
CVE-2022-42889: no packages for Image SLES15-SP6-SAP-Azure-VLI-BYOS-Production, but entry?
CVE-2022-42889: no packages for Image SLES15-SP6-SAP-EC2, but entry?
CVE-2022-42889: no packages for Image SLES15-SP6-SAP-GCE, but entry?
CVE-2022-42889: no packages for Image SLES15-SP6-SAPCAL, but entry?
CVE-2022-42889: no packages for Image SLES15-SP6-SAPCAL-Azure, but entry?
CVE-2022-42889: no packages for Image SLES15-SP6-SAPCAL-EC2, but entry?
CVE-2022-42889: no packages for Image SLES15-SP6-SAPCAL-GCE, but entry?
CVE-2022-42889: no packages for SUSE CaaS Platform 4.0, but entry?
CVE-2022-42889: no packages for SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS, but entry?
CVE-2022-42889: no packages for SUSE Linux Enterprise Module for Basesystem 15 SP4, but entry?
CVE-2022-42889: no packages for SUSE Linux Enterprise Module for Basesystem 15 SP5, but entry?
CVE-2022-42889: no packages for SUSE Linux Enterprise Module for Basesystem 15 SP6, but entry?
CVE-2022-42889: no packages for SUSE Linux Enterprise Module for Package Hub 15 SP4, but entry?
CVE-2022-42889: no packages for SUSE Linux Enterprise Module for Package Hub 15 SP5, but entry?
CVE-2022-42889: no packages for SUSE Linux Enterprise Module for Package Hub 15 SP6, but entry?
CVE-2022-42889: no packages for SUSE Linux Enterprise Module for Web and Scripting 15 SP4, but entry?
CVE-2022-42889: no packages for SUSE Linux Enterprise Module for Web and Scripting 15 SP5, but entry?
CVE-2022-42889: no packages for SUSE Linux Enterprise Module for Web and Scripting 15 SP6, but entry?
CVE-2022-42889: no packages for SUSE Linux Enterprise Server 15 SP1-LTSS, but entry?
CVE-2022-42889: no packages for SUSE Linux Enterprise Server 15 SP4-TERADATA, but entry?
CVE-2022-42889: no packages for SUSE Linux Enterprise Server for SAP Applications 15 SP1, but entry?
CVE-2022-42889: no packages for SUSE Linux Enterprise Workstation Extension 15 SP4, but entry?
CVE-2022-42889: no packages for SUSE Linux Enterprise Workstation Extension 15 SP5, but entry?
CVE-2022-42889: no packages for SUSE Linux Enterprise Workstation Extension 15 SP6, but entry?
CVE-2022-42889: no packages for SUSE Manager Proxy 4.2, but entry?
CVE-2022-42889: no packages for SUSE Manager Retail Branch Server 4.2, but entry?
CVE-2022-42889: no packages for SUSE Manager Server 4.2, but entry?
CVE-2022-42889: no packages for SUSE Manager Server Module 4.2, but entry?
CVE-2022-42889: no packages for SUSE Manager Server Module 4.3, but entry?
CVE-2022-42889: no packages for Container bci/kiwi:9.24.43-8.6, but entry?
CVE-2022-42889: no packages for Container bci/openjdk-devel:11-6.2, but entry?
CVE-2022-42889: no packages for Container bci/openjdk-devel:17-14.11, but entry?
CVE-2022-42889: no packages for Container bci/openjdk-devel:17-7.2, but entry?
CVE-2022-42889: no packages for Container bci/openjdk:11-7.1, but entry?
CVE-2022-42889: no packages for Container bci/openjdk:17-7.1, but entry?
CVE-2022-42889: no packages for Container bci/openjdk:latest, but entry?
CVE-2022-42889: no packages for Container suse/manager/5.0/x86_64/server-attestation:5.0.0-beta2.2.16, but entry?
CVE-2022-42889: no packages for Container suse/manager/5.0/x86_64/server:5.0.0-beta1.2.122, but entry?
CVE-2022-42889: no packages for Image SLES15-SP2-SAP-Azure, but entry?
CVE-2022-42889: no packages for Image SLES15-SP2-SAP-Azure-LI-BYOS-Production, but entry?
CVE-2022-42889: no packages for Image SLES15-SP2-SAP-Azure-VLI-BYOS-Production, but entry?
CVE-2022-42889: no packages for Image SLES15-SP2-SAP-BYOS-Azure, but entry?
CVE-2022-42889: no packages for Image SLES15-SP2-SAP-BYOS-EC2-HVM, but entry?
CVE-2022-42889: no packages for Image SLES15-SP2-SAP-BYOS-GCE, but entry?
CVE-2022-42889: no packages for Image SLES15-SP2-SAP-EC2-HVM, but entry?
CVE-2022-42889: no packages for Image SLES15-SP2-SAP-GCE, but entry?
CVE-2022-42889: no packages for Image SLES15-SP3-Manager-4-2-Server-BYOS-Azure, but entry?
CVE-2022-42889: no packages for Image SLES15-SP3-Manager-4-2-Server-BYOS-EC2-HVM, but entry?
CVE-2022-42889: no packages for Image SLES15-SP3-Manager-4-2-Server-BYOS-GCE, but entry?
CVE-2022-42889: no packages for Image SLES15-SP3-SAP-Azure-LI-BYOS-Production, but entry?
CVE-2022-42889: no packages for Image SLES15-SP3-SAP-Azure-VLI-BYOS-Production, but entry?
CVE-2022-42889: no packages for Image SLES15-SP3-SAPCAL-Azure, but entry?
CVE-2022-42889: no packages for Image SLES15-SP3-SAPCAL-EC2-HVM, but entry?
CVE-2022-42889: no packages for Image SLES15-SP3-SAPCAL-GCE, but entry?
CVE-2022-42889: no packages for Image SLES15-SP4-Manager-Server-4-3, but entry?
CVE-2022-42889: no packages for Image SLES15-SP4-Manager-Server-4-3-Azure-llc, but entry?
CVE-2022-42889: no packages for Image SLES15-SP4-Manager-Server-4-3-Azure-ltd, but entry?
CVE-2022-42889: no packages for Image SLES15-SP4-Manager-Server-4-3-BYOS, but entry?
CVE-2022-42889: no packages for Image SLES15-SP4-Manager-Server-4-3-BYOS-Azure, but entry?
CVE-2022-42889: no packages for Image SLES15-SP4-Manager-Server-4-3-BYOS-EC2, but entry?
CVE-2022-42889: no packages for Image SLES15-SP4-Manager-Server-4-3-BYOS-GCE, but entry?
CVE-2022-42889: no packages for Image SLES15-SP4-Manager-Server-4-3-EC2-llc, but entry?
CVE-2022-42889: no packages for Image SLES15-SP4-Manager-Server-4-3-EC2-ltd, but entry?
CVE-2022-42889: no packages for Image SLES15-SP4-SAP, but entry?
CVE-2022-42889: no packages for Image SLES15-SP4-SAP-Azure, but entry?
CVE-2022-42889: no packages for Image SLES15-SP4-SAP-Azure-LI-BYOS, but entry?
CVE-2022-42889: no packages for Image SLES15-SP4-SAP-Azure-LI-BYOS-Production, but entry?
CVE-2022-42889: no packages for Image SLES15-SP4-SAP-Azure-VLI-BYOS, but entry?
CVE-2022-42889: no packages for Image SLES15-SP4-SAP-Azure-VLI-BYOS-Production, but entry?
CVE-2022-42889: no packages for Image SLES15-SP4-SAP-EC2, but entry?
CVE-2022-42889: no packages for Image SLES15-SP4-SAP-GCE, but entry?
CVE-2022-42889: no packages for Image SLES15-SP4-SAPCAL, but entry?
CVE-2022-42889: no packages for Image SLES15-SP4-SAPCAL-Azure, but entry?
CVE-2022-42889: no packages for Image SLES15-SP4-SAPCAL-EC2, but entry?
CVE-2022-42889: no packages for Image SLES15-SP4-SAPCAL-GCE, but entry?
CVE-2022-42889: no packages for Image SLES15-SP5-SAP-Azure, but entry?
CVE-2022-42889: no packages for Image SLES15-SP5-SAP-Azure-LI-BYOS, but entry?
CVE-2022-42889: no packages for Image SLES15-SP5-SAP-Azure-LI-BYOS-Production, but entry?
CVE-2022-42889: no packages for Image SLES15-SP5-SAP-Azure-VLI-BYOS, but entry?
CVE-2022-42889: no packages for Image SLES15-SP5-SAP-Azure-VLI-BYOS-Production, but entry?
CVE-2022-42889: no packages for Image SLES15-SP5-SAP-EC2, but entry?
CVE-2022-42889: no packages for Image SLES15-SP5-SAP-GCE, but entry?
CVE-2022-42889: no packages for Image SLES15-SP5-SAPCAL-Azure, but entry?
CVE-2022-42889: no packages for Image SLES15-SP5-SAPCAL-EC2, but entry?
CVE-2022-42889: no packages for Image SLES15-SP5-SAPCAL-GCE, but entry?
CVE-2022-42889: no packages for Image SLES15-SP6-SAP, but entry?
CVE-2022-42889: no packages for Image SLES15-SP6-SAP-Azure, but entry?
CVE-2022-42889: no packages for Image SLES15-SP6-SAP-Azure-LI-BYOS, but entry?
CVE-2022-42889: no packages for Image SLES15-SP6-SAP-Azure-LI-BYOS-Production, but entry?
CVE-2022-42889: no packages for Image SLES15-SP6-SAP-Azure-VLI-BYOS, but entry?
CVE-2022-42889: no packages for Image SLES15-SP6-SAP-Azure-VLI-BYOS-Production, but entry?
CVE-2022-42889: no packages for Image SLES15-SP6-SAP-EC2, but entry?
CVE-2022-42889: no packages for Image SLES15-SP6-SAP-GCE, but entry?
CVE-2022-42889: no packages for Image SLES15-SP6-SAPCAL, but entry?
CVE-2022-42889: no packages for Image SLES15-SP6-SAPCAL-Azure, but entry?
CVE-2022-42889: no packages for Image SLES15-SP6-SAPCAL-EC2, but entry?
CVE-2022-42889: no packages for Image SLES15-SP6-SAPCAL-GCE, but entry?
CVE-2022-42889: no packages for SUSE CaaS Platform 4.0, but entry?
CVE-2022-42889: no packages for SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS, but entry?
CVE-2022-42889: no packages for SUSE Linux Enterprise Module for Basesystem 15 SP4, but entry?
CVE-2022-42889: no packages for SUSE Linux Enterprise Module for Basesystem 15 SP5, but entry?
CVE-2022-42889: no packages for SUSE Linux Enterprise Module for Basesystem 15 SP6, but entry?
CVE-2022-42889: no packages for SUSE Linux Enterprise Module for Package Hub 15 SP4, but entry?
CVE-2022-42889: no packages for SUSE Linux Enterprise Module for Package Hub 15 SP5, but entry?
CVE-2022-42889: no packages for SUSE Linux Enterprise Module for Package Hub 15 SP6, but entry?
CVE-2022-42889: no packages for SUSE Linux Enterprise Module for Web and Scripting 15 SP4, but entry?
CVE-2022-42889: no packages for SUSE Linux Enterprise Module for Web and Scripting 15 SP5, but entry?
CVE-2022-42889: no packages for SUSE Linux Enterprise Module for Web and Scripting 15 SP6, but entry?
CVE-2022-42889: no packages for SUSE Linux Enterprise Server 15 SP1-LTSS, but entry?
CVE-2022-42889: no packages for SUSE Linux Enterprise Server 15 SP4-TERADATA, but entry?
CVE-2022-42889: no packages for SUSE Linux Enterprise Server for SAP Applications 15 SP1, but entry?
CVE-2022-42889: no packages for SUSE Linux Enterprise Workstation Extension 15 SP4, but entry?
CVE-2022-42889: no packages for SUSE Linux Enterprise Workstation Extension 15 SP5, but entry?
CVE-2022-42889: no packages for SUSE Linux Enterprise Workstation Extension 15 SP6, but entry?
CVE-2022-42889: no packages for SUSE Manager Proxy 4.2, but entry?
CVE-2022-42889: no packages for SUSE Manager Retail Branch Server 4.2, but entry?
CVE-2022-42889: no packages for SUSE Manager Server 4.2, but entry?
CVE-2022-42889: no packages for SUSE Manager Server Module 4.2, but entry?
CVE-2022-42889: no packages for SUSE Manager Server Module 4.3, but entry?
skipping CVE-2022-42867 as CVE page is older than CVRF-CVE file.
skipping CVE-2022-42863 as CVE page is older than CVRF-CVE file.
skipping CVE-2022-42856 as CVE page is older than CVRF-CVE file.
skipping CVE-2022-42852 as CVE page is older than CVRF-CVE file.
skipping CVE-2022-42826 as CVE page is older than CVRF-CVE file.
skipping CVE-2022-42824 as CVE page is older than CVRF-CVE file.
skipping CVE-2022-42823 as CVE page is older than CVRF-CVE file.
skipping CVE-2022-42799 as CVE page is older than CVRF-CVE file.
no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2022-42703
skipping CVE-2022-42722 as CVE page is older than CVRF-CVE file.
skipping CVE-2022-42721 as CVE page is older than CVRF-CVE file.
skipping CVE-2022-42720 as CVE page is older than CVRF-CVE file.
skipping CVE-2022-42719 as CVE page is older than CVRF-CVE file.
skipping CVE-2022-42432 as CVE page is older than CVRF-CVE file.
skipping CVE-2022-42336 as CVE page is older than CVRF-CVE file.
skipping CVE-2022-42335 as CVE page is older than CVRF-CVE file.
no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2022-42326
skipping CVE-2022-42330 as CVE page is older than CVRF-CVE file.
skipping CVE-2022-42329 as CVE page is older than CVRF-CVE file.
skipping CVE-2022-42328 as CVE page is older than CVRF-CVE file.
skipping CVE-2022-42327 as CVE page is older than CVRF-CVE file.
no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2022-42325
no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2022-42323
no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2022-42322
no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2022-42321
no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2022-42320
no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2022-42319
no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2022-42318
no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2022-42317
no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2022-42316
no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2022-42315
no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2022-42314
no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2022-42313
no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2022-42312
no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2022-42311
no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2022-42310
no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2022-42309
no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2022-42265
no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2022-42003
skipping CVE-2022-42252 as CVE page is older than CVRF-CVE file.
skipping CVE-2022-42012 as CVE page is older than CVRF-CVE file.
skipping CVE-2022-42011 as CVE page is older than CVRF-CVE file.
skipping CVE-2022-42010 as CVE page is older than CVRF-CVE file.
skipping CVE-2022-42004 as CVE page is older than CVRF-CVE file.
skipping CVE-2022-41974 as CVE page is older than CVRF-CVE file.
skipping CVE-2022-41973 as CVE page is older than CVRF-CVE file.
skipping CVE-2022-41966 as CVE page is older than CVRF-CVE file.
no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2022-41946
no cpe found for SUSE Package Hub 15 SP3 in CVE-2022-41916
no cpe found for SUSE Package Hub 15 SP4 in CVE-2022-41916
no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2022-41915
skipping CVE-2022-41903 as CVE page is older than CVRF-CVE file.
no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2022-41881
skipping CVE-2022-41862 as CVE page is older than CVRF-CVE file.
skipping CVE-2022-41861 as CVE page is older than CVRF-CVE file.
skipping CVE-2022-41860 as CVE page is older than CVRF-CVE file.
skipping CVE-2022-41859 as CVE page is older than CVRF-CVE file.
skipping CVE-2022-41858 as CVE page is older than CVRF-CVE file.
no cpe found for SUSE Liberty Linux 7 LTSS in CVE-2022-41853
no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2022-41848
skipping CVE-2022-41850 as CVE page is older than CVRF-CVE file.
skipping CVE-2022-41849 as CVE page is older than CVRF-CVE file.
skipping CVE-2022-41844 as CVE page is older than CVRF-CVE file.
skipping CVE-2022-41843 as CVE page is older than CVRF-CVE file.
skipping CVE-2022-41842 as CVE page is older than CVRF-CVE file.
no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2022-41804
skipping CVE-2022-41808 as CVE page is older than CVRF-CVE file.
no cpe found for SUSE Package Hub 15 SP3 in CVE-2022-41751
no cpe found for SUSE Package Hub 15 SP4 in CVE-2022-41751
no cpe found for SUSE Package Hub 15 SP5 in CVE-2022-41751
no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2022-41742
skipping CVE-2022-41741 as CVE page is older than CVRF-CVE file.
no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2022-41725
no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2022-41724
no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2022-41723
no cpe found for SUSE Manager Client Tools for RHEL, Liberty and Clones 9-CLIENT-TOOLS in CVE-2022-41723
no cpe found for SUSE Manager Tools Beta for SLE Micro 5 in CVE-2022-41723
no cpe found for SUSE Manager Tools for SLE Micro 5 in CVE-2022-41723
no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2022-41722
no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2022-41720
no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2022-41717
no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2022-41716
no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2022-41715
no cpe found for SUSE Manager Tools Beta for SLE Micro 5 in CVE-2022-41715
no cpe found for SUSE Manager Tools for SLE Micro 5 in CVE-2022-41715
skipping CVE-2022-41674 as CVE page is older than CVRF-CVE file.
no cpe found for SUSE Package Hub 15 SP3 in CVE-2022-41556
no cpe found for SUSE Package Hub 15 SP4 in CVE-2022-41556
no cpe found for SUSE Package Hub 15 SP4 in CVE-2022-41550
skipping CVE-2022-41409 as CVE page is older than CVRF-CVE file.
no cpe found for SUSE Package Hub 15 SP3 in CVE-2022-41325
no cpe found for SUSE Package Hub 15 SP4 in CVE-2022-41325
no cpe found for SUSE Package Hub 15 SP5 in CVE-2022-41325
CVE-2022-41323: no packages for SUSE Package Hub 15 SP5, but entry?
CVE-2022-41323: no packages for openSUSE Leap 15.5, but entry?
no cpe found for SUSE Package Hub 15 SP3 in CVE-2022-41323
no cpe found for SUSE Package Hub 15 SP4 in CVE-2022-41323
CVE-2022-41323: no packages for SUSE Package Hub 15 SP5, but entry?
CVE-2022-41323: no packages for openSUSE Leap 15.5, but entry?
CVE-2022-41323: no packages for SUSE Package Hub 15 SP5, but entry?
CVE-2022-41323: no packages for openSUSE Leap 15.5, but entry?
no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2022-41318
no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2022-41317
CVE-2022-41218: no packages for Image SLES15-SP4-Micro-5-3-BYOS, but entry?
CVE-2022-41218: no packages for Image SLES15-SP3-Manager-4-2-Server-BYOS-GCE, but entry?
CVE-2022-41218: no packages for Image SLES15-SP4-SAP-Hardened-BYOS-GCE, but entry?
CVE-2022-41218: no packages for Container rancher/elemental-teal-rt/5.3:latest, but entry?
CVE-2022-41218: no packages for SUSE Linux Enterprise Module for Development Tools 15 SP4, but entry?
CVE-2022-41218: no packages for SUSE Enterprise Storage 6, but entry?
CVE-2022-41218: no packages for Image SLES15-SP4-Micro-5-4-BYOS-Azure, but entry?
CVE-2022-41218: no packages for Image SLES15-SP4-SAPCAL, but entry?
CVE-2022-41218: no packages for Image SLES12-SP5-GCE-SAP-On-Demand, but entry?
CVE-2022-41218: no packages for Image SLES15-SP3-CHOST-BYOS-Azure, but entry?
CVE-2022-41218: no packages for Image SLES15-SP4-HPC-EC2, but entry?
CVE-2022-41218: no packages for Image SLES15-SP4-Micro-5-3-BYOS-GCE, but entry?
CVE-2022-41218: no packages for Image SLES15-SP4-Manager-Server-4-3-Azure-ltd, but entry?
CVE-2022-41218: no packages for Image SLES15-SP4-Micro-5-4-BYOS-EC2, but entry?
CVE-2022-41218: no packages for SUSE OpenStack Cloud 9, but entry?
CVE-2022-41218: no packages for Image SLES15-SP2-SAP-BYOS-Azure, but entry?
CVE-2022-41218: no packages for Container suse/sle-micro-rancher/5.4:latest, but entry?
CVE-2022-41218: no packages for Image SLES12-SP5-Azure-HPC-BYOS, but entry?
CVE-2022-41218: no packages for Image SLES15-SP3-Manager-4-2-Proxy-BYOS-EC2-HVM, but entry?
CVE-2022-41218: no packages for Image SLES15-SP3-HPC-BYOS-GCE, but entry?
CVE-2022-41218: no packages for Image SLES12-SP4-SAP-Azure-LI-BYOS-Production, but entry?
CVE-2022-41218: no packages for Image SLES12-SP5-EC2-BYOS, but entry?
CVE-2022-41218: no packages for Image SLES15-SP3-SAP-BYOS-GCE, but entry?
CVE-2022-41218: no packages for Image SLES15-SP3-Micro-5-2-BYOS-Azure, but entry?
CVE-2022-41218: no packages for Image SLES15-SP3-SAP-BYOS-EC2-HVM, but entry?
CVE-2022-41218: no packages for Image SLES15-SP2-HPC-BYOS-EC2-HVM, but entry?
CVE-2022-41218: no packages for SUSE Linux Enterprise High Performance Computing 15-LTSS, but entry?
CVE-2022-41218: no packages for Image SLES15-SP4-EC2, but entry?
CVE-2022-41218: no packages for Image SLES15-SP4-HPC-BYOS, but entry?
CVE-2022-41218: no packages for SUSE Linux Enterprise High Availability Extension 12 SP5, but entry?
CVE-2022-41218: no packages for Image SLES15-SP4-SAP-Hardened, but entry?
CVE-2022-41218: no packages for SUSE Linux Enterprise Module for Basesystem 15 SP3, but entry?
CVE-2022-41218: no packages for Image SLES15-SP4-BYOS, but entry?
CVE-2022-41218: no packages for Image SLES15-SP4-Manager-Server-4-3-EC2-ltd, but entry?
CVE-2022-41218: no packages for Image SLES15-SP3-SAPCAL-Azure, but entry?
CVE-2022-41218: no packages for Image SLES15-SP3-Micro-5-2-BYOS-EC2-HVM, but entry?
CVE-2022-41218: no packages for Image SLES15-SP4-CHOST-BYOS-EC2, but entry?
CVE-2022-41218: no packages for SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS, but entry?
CVE-2022-41218: no packages for Image SLES15-SP4-EC2-ECS-HVM, but entry?
CVE-2022-41218: no packages for Image SLES15-SP4-Micro-5-4-GCE, but entry?
CVE-2022-41218: no packages for Image SLES15-SP3-Manager-4-2-Proxy-BYOS-Azure, but entry?
CVE-2022-41218: no packages for Image SLES15-SP3-HPC-BYOS-Azure, but entry?
CVE-2022-41218: no packages for Image SLES15-SP3-SAP-Azure-VLI-BYOS-Production, but entry?
CVE-2022-41218: no packages for Container rancher/elemental-teal-rt/5.4:latest, but entry?
CVE-2022-41218: no packages for SUSE Linux Enterprise Module for Basesystem 15 SP4, but entry?
CVE-2022-41218: no packages for Image SLES15-SP3-BYOS-Azure, but entry?
CVE-2022-41218: no packages for SUSE Linux Enterprise Server 12 SP2-BCL, but entry?
CVE-2022-41218: no packages for Image SLES15-SP1-SAPCAL-EC2-HVM, but entry?
CVE-2022-41218: no packages for Image SLES15-SP3-HPC-BYOS-EC2-HVM, but entry?
CVE-2022-41218: no packages for Image SLES15-SP4-Hardened-BYOS-Azure, but entry?
CVE-2022-41218: no packages for SUSE Manager Server 4.1, but entry?
CVE-2022-41218: no packages for Image SLES15-SP4-SAP-BYOS, but entry?
CVE-2022-41218: no packages for Image SLES15-SP4-SAP-BYOS-GCE, but entry?
CVE-2022-41218: no packages for SUSE Linux Enterprise Live Patching 15 SP1, but entry?
CVE-2022-41218: no packages for Image SLES15-SP4-Micro-5-3-BYOS-Azure, but entry?
CVE-2022-41218: no packages for Image SLES15-SP4-Manager-Server-4-3-Azure-llc, but entry?
CVE-2022-41218: no packages for SUSE Linux Enterprise High Availability Extension 15 SP2, but entry?
CVE-2022-41218: no packages for Image SLES15-SP2-SAP-BYOS-GCE, but entry?
CVE-2022-41218: no packages for Image SLES12-SP5-Azure-SAP-On-Demand, but entry?
CVE-2022-41218: no packages for SUSE Linux Enterprise Server for SAP Applications 12 SP5, but entry?
CVE-2022-41218: no packages for Image SLES15-SP3-SAP-BYOS-Azure, but entry?
CVE-2022-41218: no packages for Image SLES15-SP4-SAP-Azure-LI-BYOS, but entry?
CVE-2022-41218: no packages for Image SLES15-SP4-SAP-Azure-LI-BYOS-Production, but entry?
CVE-2022-41218: no packages for Image SLES15-SP3-SAPCAL-EC2-HVM, but entry?
CVE-2022-41218: no packages for Image SLES15-SP2-SAP-Azure-LI-BYOS-Production, but entry?
CVE-2022-41218: no packages for SUSE Linux Enterprise Module for Legacy 15 SP3, but entry?
CVE-2022-41218: no packages for SUSE Linux Enterprise Software Development Kit 12 SP5, but entry?
CVE-2022-41218: no packages for Image SLES15-SP4-Manager-Server-4-3-BYOS, but entry?
CVE-2022-41218: no packages for Image SLES15-SP4-Micro-5-4-BYOS-GCE, but entry?
CVE-2022-41218: no packages for SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE, but entry?
CVE-2022-41218: no packages for Image SLES15-SP3-CHOST-BYOS-EC2, but entry?
CVE-2022-41218: no packages for Image SLES15-SP4-Micro-5-4, but entry?
CVE-2022-41218: no packages for Image SLES12-SP5-Azure-BYOS, but entry?
CVE-2022-41218: no packages for Image SLES15-SP4-SAP-Hardened-GCE, but entry?
CVE-2022-41218: no packages for Image SLES15-SP4-BYOS-GCE, but entry?
CVE-2022-41218: no packages for Image SLES12-SP5-EC2-ECS-On-Demand, but entry?
CVE-2022-41218: no packages for Image SLES15-SP2-SAP-Azure, but entry?
CVE-2022-41218: no packages for SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS, but entry?
CVE-2022-41218: no packages for Image SLES15-SP4-SAPCAL-GCE, but entry?
CVE-2022-41218: no packages for SUSE Linux Enterprise Server 12 SP3-BCL, but entry?
CVE-2022-41218: no packages for Image SLES15-SP4-CHOST-BYOS, but entry?
CVE-2022-41218: no packages for SUSE Liberty Linux 8, but entry?
CVE-2022-41218: no packages for Image SLES12-SP5-Azure-HPC-On-Demand, but entry?
CVE-2022-41218: no packages for Image SLES15-SP2-BYOS-EC2-HVM, but entry?
CVE-2022-41218: no packages for Image SLES12-SP5-Azure-SAP-BYOS, but entry?
CVE-2022-41218: no packages for Image SLES15-SP1-SAP-Azure-VLI-BYOS-Production, but entry?
CVE-2022-41218: no packages for SUSE Linux Enterprise High Availability Extension 15 SP4, but entry?
CVE-2022-41218: no packages for Image SLES15-SP3-SAPCAL-GCE, but entry?
CVE-2022-41218: no packages for Image SLES15-SP3-BYOS-EC2-HVM, but entry?
CVE-2022-41218: no packages for SUSE Linux Enterprise Micro 5.3, but entry?
CVE-2022-41218: no packages for SUSE Linux Enterprise Server 15 SP2-LTSS, but entry?
CVE-2022-41218: no packages for SUSE Linux Enterprise Real Time 12 SP5, but entry?
CVE-2022-41218: no packages for SUSE Linux Enterprise Module for Public Cloud 15 SP4, but entry?
CVE-2022-41218: no packages for Image SLES12-SP5-GCE-On-Demand, but entry?
CVE-2022-41218: no packages for Image SLES15-SP4-SAP-BYOS-EC2, but entry?
CVE-2022-41218: no packages for SUSE Linux Enterprise Server 12 SP3-LTSS-TERADATA, but entry?
CVE-2022-41218: no packages for Image SLES15-SP4-Manager-Proxy-4-3-BYOS-EC2, but entry?
CVE-2022-41218: no packages for SUSE Linux Enterprise Live Patching 15 SP3, but entry?
CVE-2022-41218: no packages for SUSE OpenStack Cloud Crowbar 9, but entry?
CVE-2022-41218: no packages for Image SLES15-SP4-CHOST-BYOS-SAP-CCloud, but entry?
CVE-2022-41218: no packages for Image SLES15-SP3-CHOST-BYOS-GCE, but entry?
CVE-2022-41218: no packages for SUSE Linux Enterprise Server 12 SP3-TERADATA, but entry?
CVE-2022-41218: no packages for SUSE Manager Proxy 4.1, but entry?
CVE-2022-41218: no packages for Image SLES15-SP4-SAP-Hardened-BYOS, but entry?
CVE-2022-41218: no packages for Image SLES15-SP4-SAP-Azure, but entry?
CVE-2022-41218: no packages for SUSE Linux Enterprise High Availability Extension 12 SP4, but entry?
CVE-2022-41218: no packages for Image SLES12-SP5-Azure-Standard-On-Demand, but entry?
CVE-2022-41218: no packages for Image SLES15-SP1-SAPCAL-Azure, but entry?
CVE-2022-41218: no packages for Image SLES15-SP4-Manager-Server-4-3-EC2-llc, but entry?
CVE-2022-41218: no packages for Image SLES15-SP3-Micro-5-2-BYOS-GCE, but entry?
CVE-2022-41218: no packages for Image SLES15-SP4-HPC-BYOS-Azure, but entry?
CVE-2022-41218: no packages for Image SLES15-SP4-Hardened-BYOS-EC2, but entry?
CVE-2022-41218: no packages for SUSE Linux Enterprise Server 15 SP2-BCL, but entry?
CVE-2022-41218: no packages for SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS, but entry?
CVE-2022-41218: no packages for SUSE Linux Enterprise Live Patching 12 SP4, but entry?
CVE-2022-41218: no packages for Image SLES15-SP4-SAP, but entry?
CVE-2022-41218: no packages for Image SLES15-SP3-CHOST-BYOS-Aliyun, but entry?
CVE-2022-41218: no packages for Image SLES15-SP4-Manager-Server-4-3, but entry?
CVE-2022-41218: no packages for Image SLES15-SP4-Azure-Basic, but entry?
CVE-2022-41218: no packages for Image SLES12-SP5-GCE-SAP-BYOS, but entry?
CVE-2022-41218: no packages for Image SLES15-SP4-SAP-Azure-VLI-BYOS, but entry?
CVE-2022-41218: no packages for SUSE Linux Enterprise Module for Legacy 15 SP4, but entry?
CVE-2022-41218: no packages for Image SLES12-SP4-SAP-Azure-VLI-BYOS-Production, but entry?
CVE-2022-41218: no packages for Image SLES15-SP4-Micro-5-3, but entry?
CVE-2022-41218: no packages for SUSE Linux Enterprise Server 15 SP4-TERADATA, but entry?
CVE-2022-41218: no packages for Image SLES15-SP3-CHOST-BYOS-SAP-CCloud, but entry?
CVE-2022-41218: no packages for Image SLES15-SP4-Micro-5-3-BYOS-EC2, but entry?
CVE-2022-41218: no packages for SUSE Linux Enterprise Server for SAP Applications 15, but entry?
CVE-2022-41218: no packages for SUSE Real Time Module 15 SP3, but entry?
CVE-2022-41218: no packages for Image SLES15-SP4-Manager-Proxy-4-3-BYOS-GCE, but entry?
CVE-2022-41218: no packages for Image SLES15-SP2-BYOS-GCE, but entry?
CVE-2022-41218: no packages for Image SLES15-SP3-Micro-5-1-BYOS-EC2-HVM, but entry?
CVE-2022-41218: no packages for Image SLES15-SP4-SAP-GCE, but entry?
CVE-2022-41218: no packages for Image SLES15-SP4-HPC-GCE, but entry?
CVE-2022-41218: no packages for Image SLES15-SP2-SAP-EC2-HVM, but entry?
CVE-2022-41218: no packages for Image SLES15-SP3-SAP-Azure-LI-BYOS-Production, but entry?
CVE-2022-41218: no packages for Image SLES15-SP4-Micro-5-3-GCE, but entry?
CVE-2022-41218: no packages for Image SLES15-SP4-Manager-Proxy-4-3-BYOS-Azure, but entry?
CVE-2022-41218: no packages for Container suse/sle-micro-rancher/5.3:latest, but entry?
CVE-2022-41218: no packages for SUSE Linux Enterprise Live Patching 15 SP2, but entry?
CVE-2022-41218: no packages for SUSE Linux Enterprise Micro 5.2, but entry?
CVE-2022-41218: no packages for SUSE Linux Enterprise Server 12 SP4-ESPOS, but entry?
CVE-2022-41218: no packages for Image SLES15-SP3-Micro-5-1-BYOS-Azure, but entry?
CVE-2022-41218: no packages for SUSE Real Time Module 15 SP4, but entry?
CVE-2022-41218: no packages for SUSE Linux Enterprise Live Patching 15 SP4, but entry?
CVE-2022-41218: no packages for SUSE Enterprise Storage 7, but entry?
CVE-2022-41218: no packages for Image SLES15-SP4-Micro-5-4-BYOS, but entry?
CVE-2022-41218: no packages for Image SLES12-SP5-EC2-SAP-BYOS, but entry?
CVE-2022-41218: no packages for Image SLES12-SP5-EC2-On-Demand, but entry?
CVE-2022-41218: no packages for openSUSE Leap Micro 5.2, but entry?
CVE-2022-41218: no packages for Image SLES15-SP3-Manager-4-2-Server-BYOS-Azure, but entry?
CVE-2022-41218: no packages for SUSE Linux Enterprise Server 15-LTSS, but entry?
CVE-2022-41218: no packages for Image SLES15-SP4-Micro-5-4-EC2, but entry?
CVE-2022-41218: no packages for Image SLES12-SP5-EC2-SAP-On-Demand, but entry?
CVE-2022-41218: no packages for SUSE Linux Enterprise Live Patching 15, but entry?
CVE-2022-41218: no packages for Image SLES15-SP2-HPC-BYOS-Azure, but entry?
CVE-2022-41218: no packages for Image SLES15-SP1-SAP-Azure-LI-BYOS-Production, but entry?
CVE-2022-41218: no packages for Image SLES15-SP4-CHOST-BYOS-Azure, but entry?
CVE-2022-41218: no packages for Image SLES15-SP2-SAP-GCE, but entry?
CVE-2022-41218: no packages for SUSE Linux Enterprise Module for Development Tools 15 SP3, but entry?
CVE-2022-41218: no packages for SUSE Linux Enterprise Server for SAP Applications 15 SP1, but entry?
CVE-2022-41218: no packages for Image SLES15-SP4-SAP-EC2, but entry?
CVE-2022-41218: no packages for Image SLES15-SP4-GCE, but entry?
CVE-2022-41218: no packages for SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS, but entry?
CVE-2022-41218: no packages for Image SLES15-SP1-SAPCAL-GCE, but entry?
CVE-2022-41218: no packages for SUSE Linux Enterprise High Availability Extension 15 SP1, but entry?
CVE-2022-41218: no packages for Image SLES15-SP4-Manager-Proxy-4-3-BYOS, but entry?
CVE-2022-41218: no packages for SUSE Linux Enterprise Server 15 SP1-BCL, but entry?
CVE-2022-41218: no packages for Image SLES15-SP4-SAPCAL-EC2, but entry?
CVE-2022-41218: no packages for Image SLES15-SP3-BYOS-GCE, but entry?
CVE-2022-41218: no packages for Image SLES15-SP3-Manager-4-2-Proxy-BYOS-GCE, but entry?
CVE-2022-41218: no packages for Image SLES15-SP4-SUSE-Rancher-Setup-BYOS-EC2, but entry?
CVE-2022-41218: no packages for Image SLES15-SP4-Micro-5-4-Azure, but entry?
CVE-2022-41218: no packages for Image SLES15-SP4-Micro-5-3-Azure, but entry?
CVE-2022-41218: no packages for Image SLES15-SP4-SAPCAL-Azure, but entry?
CVE-2022-41218: no packages for Image SLES12-SP5-Azure-Basic-On-Demand, but entry?
CVE-2022-41218: no packages for Image SLES15-SP4-CHOST-BYOS-GCE, but entry?
CVE-2022-41218: no packages for Image SLES15-SP4-SAP-Hardened-BYOS-EC2, but entry?
CVE-2022-41218: no packages for SUSE CaaS Platform 4.0, but entry?
CVE-2022-41218: no packages for SUSE Linux Enterprise Micro 5.1, but entry?
CVE-2022-41218: no packages for Container suse/sle-micro-rancher/5.2:latest, but entry?
CVE-2022-41218: no packages for Image SLES15-SP3-Micro-5-1-BYOS-GCE, but entry?
CVE-2022-41218: no packages for SUSE Manager Retail Branch Server 4.1, but entry?
CVE-2022-41218: no packages for SUSE Linux Enterprise Server 12 SP5, but entry?
CVE-2022-41218: no packages for Image SLES15-SP4, but entry?
CVE-2022-41218: no packages for Image SLES15-SP4-HPC-Azure, but entry?
CVE-2022-41218: no packages for Image SLES15-SP4-Micro-5-3-EC2, but entry?
CVE-2022-41218: no packages for Image SLES15-SP4-Azure-Standard, but entry?
CVE-2022-41218: no packages for SUSE Linux Enterprise Module for Public Cloud 15 SP3, but entry?
CVE-2022-41218: no packages for Image SLES15-SP2-SAP-Azure-VLI-BYOS-Production, but entry?
CVE-2022-41218: no packages for Image SLES15-SP2-SAP-BYOS-EC2-HVM, but entry?
CVE-2022-41218: no packages for Image SLES15-SP4-CHOST-BYOS-Aliyun, but entry?
CVE-2022-41218: no packages for Image SLES15-SP4-Hardened-BYOS-GCE, but entry?
CVE-2022-41218: no packages for Image SLES15-SP4-HPC-BYOS-GCE, but entry?
CVE-2022-41218: no packages for Image SLES15-SP4-SUSE-Rancher-Setup-BYOS, but entry?
CVE-2022-41218: no packages for SUSE Linux Enterprise High Performance Computing 15-ESPOS, but entry?
CVE-2022-41218: no packages for SUSE Linux Enterprise Server for SAP Applications 12 SP4, but entry?
CVE-2022-41218: no packages for Image SLES15-SP4-SAP-Hardened-EC2, but entry?
CVE-2022-41218: no packages for Image SLES15-SP4-BYOS-EC2, but entry?
CVE-2022-41218: no packages for SUSE Linux Enterprise High Availability Extension 15 SP3, but entry?
CVE-2022-41218: no packages for SUSE Linux Enterprise Server 12 SP4-LTSS, but entry?
CVE-2022-41218: no packages for Image SLES12-SP5-GCE-BYOS, but entry?
CVE-2022-41218: no packages for Image SLES15-SP4-SAP-Hardened-BYOS-Azure, but entry?
CVE-2022-41218: no packages for Image SLES15-SP4-BYOS-Azure, but entry?
CVE-2022-41218: no packages for SUSE Linux Enterprise Server 15 SP1-LTSS, but entry?
CVE-2022-41218: no packages for SUSE Linux Enterprise High Availability Extension 15, but entry?
CVE-2022-41218: no packages for SUSE Linux Enterprise Server for SAP Applications 15 SP2, but entry?
CVE-2022-41218: no packages for Image SLES15-SP4-SAP-Azure-VLI-BYOS-Production, but entry?
CVE-2022-41218: no packages for Image SLES15-SP4-SAP-BYOS-Azure, but entry?
CVE-2022-41218: no packages for Image SLES12-SP5-SAP-Azure-LI-BYOS-Production, but entry?
CVE-2022-41218: no packages for Image SLES15-SP4-HPC, but entry?
CVE-2022-41218: no packages for Image SLES15-SP4-HPC-BYOS-EC2, but entry?
CVE-2022-41218: no packages for Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production, but entry?
CVE-2022-41218: no packages for Image SLES15-SP4-SAP-Hardened-Azure, but entry?
CVE-2022-41218: no packages for SUSE Linux Enterprise Live Patching 12 SP5, but entry?
CVE-2022-41218: no packages for Image SLES15-SP4-Manager-Server-4-3-BYOS-EC2, but entry?
CVE-2022-41218: no packages for Image SLES15-SP4-Hardened-BYOS, but entry?
CVE-2022-41218: no packages for SUSE Linux Enterprise Server 11 SP3-TERADATA, but entry?
CVE-2022-41218: no packages for Image SLES15-SP4-Manager-Server-4-3-BYOS-Azure, but entry?
CVE-2022-41218: no packages for Image SLES15-SP3-Manager-4-2-Server-BYOS-EC2-HVM, but entry?
CVE-2022-41218: no packages for Image SLES15-SP4-Manager-Server-4-3-BYOS-GCE, but entry?
CVE-2022-41218: no packages for Image SLES15-SP2-BYOS-Azure, but entry?
CVE-2022-41218: no packages for Container rancher/elemental-teal-rt/5.3:latest, but entry?
CVE-2022-41218: no packages for Container rancher/elemental-teal-rt/5.4:latest, but entry?
CVE-2022-41218: no packages for Container suse/sle-micro-rancher/5.2:latest, but entry?
CVE-2022-41218: no packages for Container suse/sle-micro-rancher/5.3:latest, but entry?
CVE-2022-41218: no packages for Container suse/sle-micro-rancher/5.4:latest, but entry?
CVE-2022-41218: no packages for Image SLES12-SP4-SAP-Azure-LI-BYOS-Production, but entry?
CVE-2022-41218: no packages for Image SLES12-SP4-SAP-Azure-VLI-BYOS-Production, but entry?
CVE-2022-41218: no packages for Image SLES12-SP5-Azure-BYOS, but entry?
CVE-2022-41218: no packages for Image SLES12-SP5-Azure-Basic-On-Demand, but entry?
CVE-2022-41218: no packages for Image SLES12-SP5-Azure-HPC-BYOS, but entry?
CVE-2022-41218: no packages for Image SLES12-SP5-Azure-HPC-On-Demand, but entry?
CVE-2022-41218: no packages for Image SLES12-SP5-Azure-SAP-BYOS, but entry?
CVE-2022-41218: no packages for Image SLES12-SP5-Azure-SAP-On-Demand, but entry?
CVE-2022-41218: no packages for Image SLES12-SP5-Azure-Standard-On-Demand, but entry?
CVE-2022-41218: no packages for Image SLES12-SP5-EC2-BYOS, but entry?
CVE-2022-41218: no packages for Image SLES12-SP5-EC2-ECS-On-Demand, but entry?
CVE-2022-41218: no packages for Image SLES12-SP5-EC2-On-Demand, but entry?
CVE-2022-41218: no packages for Image SLES12-SP5-EC2-SAP-BYOS, but entry?
CVE-2022-41218: no packages for Image SLES12-SP5-EC2-SAP-On-Demand, but entry?
CVE-2022-41218: no packages for Image SLES12-SP5-GCE-BYOS, but entry?
CVE-2022-41218: no packages for Image SLES12-SP5-GCE-On-Demand, but entry?
CVE-2022-41218: no packages for Image SLES12-SP5-GCE-SAP-BYOS, but entry?
CVE-2022-41218: no packages for Image SLES12-SP5-GCE-SAP-On-Demand, but entry?
CVE-2022-41218: no packages for Image SLES12-SP5-SAP-Azure-LI-BYOS-Production, but entry?
CVE-2022-41218: no packages for Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production, but entry?
CVE-2022-41218: no packages for Image SLES15-SP1-SAP-Azure-LI-BYOS-Production, but entry?
CVE-2022-41218: no packages for Image SLES15-SP1-SAP-Azure-VLI-BYOS-Production, but entry?
CVE-2022-41218: no packages for Image SLES15-SP1-SAPCAL-Azure, but entry?
CVE-2022-41218: no packages for Image SLES15-SP1-SAPCAL-EC2-HVM, but entry?
CVE-2022-41218: no packages for Image SLES15-SP1-SAPCAL-GCE, but entry?
CVE-2022-41218: no packages for Image SLES15-SP2-BYOS-Azure, but entry?
CVE-2022-41218: no packages for Image SLES15-SP2-BYOS-EC2-HVM, but entry?
CVE-2022-41218: no packages for Image SLES15-SP2-BYOS-GCE, but entry?
CVE-2022-41218: no packages for Image SLES15-SP2-HPC-BYOS-Azure, but entry?
CVE-2022-41218: no packages for Image SLES15-SP2-HPC-BYOS-EC2-HVM, but entry?
CVE-2022-41218: no packages for Image SLES15-SP2-SAP-Azure, but entry?
CVE-2022-41218: no packages for Image SLES15-SP2-SAP-Azure-LI-BYOS-Production, but entry?
CVE-2022-41218: no packages for Image SLES15-SP2-SAP-Azure-VLI-BYOS-Production, but entry?
CVE-2022-41218: no packages for Image SLES15-SP2-SAP-BYOS-Azure, but entry?
CVE-2022-41218: no packages for Image SLES15-SP2-SAP-BYOS-EC2-HVM, but entry?
CVE-2022-41218: no packages for Image SLES15-SP2-SAP-BYOS-GCE, but entry?
CVE-2022-41218: no packages for Image SLES15-SP2-SAP-EC2-HVM, but entry?
CVE-2022-41218: no packages for Image SLES15-SP2-SAP-GCE, but entry?
CVE-2022-41218: no packages for Image SLES15-SP3-BYOS-Azure, but entry?
CVE-2022-41218: no packages for Image SLES15-SP3-BYOS-EC2-HVM, but entry?
CVE-2022-41218: no packages for Image SLES15-SP3-BYOS-GCE, but entry?
CVE-2022-41218: no packages for Image SLES15-SP3-CHOST-BYOS-Aliyun, but entry?
CVE-2022-41218: no packages for Image SLES15-SP3-CHOST-BYOS-Azure, but entry?
CVE-2022-41218: no packages for Image SLES15-SP3-CHOST-BYOS-EC2, but entry?
CVE-2022-41218: no packages for Image SLES15-SP3-CHOST-BYOS-GCE, but entry?
CVE-2022-41218: no packages for Image SLES15-SP3-CHOST-BYOS-SAP-CCloud, but entry?
CVE-2022-41218: no packages for Image SLES15-SP3-HPC-BYOS-Azure, but entry?
CVE-2022-41218: no packages for Image SLES15-SP3-HPC-BYOS-EC2-HVM, but entry?
CVE-2022-41218: no packages for Image SLES15-SP3-HPC-BYOS-GCE, but entry?
CVE-2022-41218: no packages for Image SLES15-SP3-Manager-4-2-Proxy-BYOS-Azure, but entry?
CVE-2022-41218: no packages for Image SLES15-SP3-Manager-4-2-Proxy-BYOS-EC2-HVM, but entry?
CVE-2022-41218: no packages for Image SLES15-SP3-Manager-4-2-Proxy-BYOS-GCE, but entry?
CVE-2022-41218: no packages for Image SLES15-SP3-Manager-4-2-Server-BYOS-Azure, but entry?
CVE-2022-41218: no packages for Image SLES15-SP3-Manager-4-2-Server-BYOS-EC2-HVM, but entry?
CVE-2022-41218: no packages for Image SLES15-SP3-Manager-4-2-Server-BYOS-GCE, but entry?
CVE-2022-41218: no packages for Image SLES15-SP3-Micro-5-1-BYOS-Azure, but entry?
CVE-2022-41218: no packages for Image SLES15-SP3-Micro-5-1-BYOS-EC2-HVM, but entry?
CVE-2022-41218: no packages for Image SLES15-SP3-Micro-5-1-BYOS-GCE, but entry?
CVE-2022-41218: no packages for Image SLES15-SP3-Micro-5-2-BYOS-Azure, but entry?
CVE-2022-41218: no packages for Image SLES15-SP3-Micro-5-2-BYOS-EC2-HVM, but entry?
CVE-2022-41218: no packages for Image SLES15-SP3-Micro-5-2-BYOS-GCE, but entry?
CVE-2022-41218: no packages for Image SLES15-SP3-SAP-Azure-LI-BYOS-Production, but entry?
CVE-2022-41218: no packages for Image SLES15-SP3-SAP-Azure-VLI-BYOS-Production, but entry?
CVE-2022-41218: no packages for Image SLES15-SP3-SAP-BYOS-Azure, but entry?
CVE-2022-41218: no packages for Image SLES15-SP3-SAP-BYOS-EC2-HVM, but entry?
CVE-2022-41218: no packages for Image SLES15-SP3-SAP-BYOS-GCE, but entry?
CVE-2022-41218: no packages for Image SLES15-SP3-SAPCAL-Azure, but entry?
CVE-2022-41218: no packages for Image SLES15-SP3-SAPCAL-EC2-HVM, but entry?
CVE-2022-41218: no packages for Image SLES15-SP3-SAPCAL-GCE, but entry?
CVE-2022-41218: no packages for Image SLES15-SP4, but entry?
CVE-2022-41218: no packages for Image SLES15-SP4-Azure-Basic, but entry?
CVE-2022-41218: no packages for Image SLES15-SP4-Azure-Standard, but entry?
CVE-2022-41218: no packages for Image SLES15-SP4-BYOS, but entry?
CVE-2022-41218: no packages for Image SLES15-SP4-BYOS-Azure, but entry?
CVE-2022-41218: no packages for Image SLES15-SP4-BYOS-EC2, but entry?
CVE-2022-41218: no packages for Image SLES15-SP4-BYOS-GCE, but entry?
CVE-2022-41218: no packages for Image SLES15-SP4-CHOST-BYOS, but entry?
CVE-2022-41218: no packages for Image SLES15-SP4-CHOST-BYOS-Aliyun, but entry?
CVE-2022-41218: no packages for Image SLES15-SP4-CHOST-BYOS-Azure, but entry?
CVE-2022-41218: no packages for Image SLES15-SP4-CHOST-BYOS-EC2, but entry?
CVE-2022-41218: no packages for Image SLES15-SP4-CHOST-BYOS-GCE, but entry?
CVE-2022-41218: no packages for Image SLES15-SP4-CHOST-BYOS-SAP-CCloud, but entry?
CVE-2022-41218: no packages for Image SLES15-SP4-EC2, but entry?
CVE-2022-41218: no packages for Image SLES15-SP4-EC2-ECS-HVM, but entry?
CVE-2022-41218: no packages for Image SLES15-SP4-GCE, but entry?
CVE-2022-41218: no packages for Image SLES15-SP4-HPC, but entry?
CVE-2022-41218: no packages for Image SLES15-SP4-HPC-Azure, but entry?
CVE-2022-41218: no packages for Image SLES15-SP4-HPC-BYOS, but entry?
CVE-2022-41218: no packages for Image SLES15-SP4-HPC-BYOS-Azure, but entry?
CVE-2022-41218: no packages for Image SLES15-SP4-HPC-BYOS-EC2, but entry?
CVE-2022-41218: no packages for Image SLES15-SP4-HPC-BYOS-GCE, but entry?
CVE-2022-41218: no packages for Image SLES15-SP4-HPC-EC2, but entry?
CVE-2022-41218: no packages for Image SLES15-SP4-HPC-GCE, but entry?
CVE-2022-41218: no packages for Image SLES15-SP4-Hardened-BYOS, but entry?
CVE-2022-41218: no packages for Image SLES15-SP4-Hardened-BYOS-Azure, but entry?
CVE-2022-41218: no packages for Image SLES15-SP4-Hardened-BYOS-EC2, but entry?
CVE-2022-41218: no packages for Image SLES15-SP4-Hardened-BYOS-GCE, but entry?
CVE-2022-41218: no packages for Image SLES15-SP4-Manager-Proxy-4-3-BYOS, but entry?
CVE-2022-41218: no packages for Image SLES15-SP4-Manager-Proxy-4-3-BYOS-Azure, but entry?
CVE-2022-41218: no packages for Image SLES15-SP4-Manager-Proxy-4-3-BYOS-EC2, but entry?
CVE-2022-41218: no packages for Image SLES15-SP4-Manager-Proxy-4-3-BYOS-GCE, but entry?
CVE-2022-41218: no packages for Image SLES15-SP4-Manager-Server-4-3, but entry?
CVE-2022-41218: no packages for Image SLES15-SP4-Manager-Server-4-3-Azure-llc, but entry?
CVE-2022-41218: no packages for Image SLES15-SP4-Manager-Server-4-3-Azure-ltd, but entry?
CVE-2022-41218: no packages for Image SLES15-SP4-Manager-Server-4-3-BYOS, but entry?
CVE-2022-41218: no packages for Image SLES15-SP4-Manager-Server-4-3-BYOS-Azure, but entry?
CVE-2022-41218: no packages for Image SLES15-SP4-Manager-Server-4-3-BYOS-EC2, but entry?
CVE-2022-41218: no packages for Image SLES15-SP4-Manager-Server-4-3-BYOS-GCE, but entry?
CVE-2022-41218: no packages for Image SLES15-SP4-Manager-Server-4-3-EC2-llc, but entry?
CVE-2022-41218: no packages for Image SLES15-SP4-Manager-Server-4-3-EC2-ltd, but entry?
CVE-2022-41218: no packages for Image SLES15-SP4-Micro-5-3, but entry?
CVE-2022-41218: no packages for Image SLES15-SP4-Micro-5-3-Azure, but entry?
CVE-2022-41218: no packages for Image SLES15-SP4-Micro-5-3-BYOS, but entry?
CVE-2022-41218: no packages for Image SLES15-SP4-Micro-5-3-BYOS-Azure, but entry?
CVE-2022-41218: no packages for Image SLES15-SP4-Micro-5-3-BYOS-EC2, but entry?
CVE-2022-41218: no packages for Image SLES15-SP4-Micro-5-3-BYOS-GCE, but entry?
CVE-2022-41218: no packages for Image SLES15-SP4-Micro-5-3-EC2, but entry?
CVE-2022-41218: no packages for Image SLES15-SP4-Micro-5-3-GCE, but entry?
CVE-2022-41218: no packages for Image SLES15-SP4-Micro-5-4, but entry?
CVE-2022-41218: no packages for Image SLES15-SP4-Micro-5-4-Azure, but entry?
CVE-2022-41218: no packages for Image SLES15-SP4-Micro-5-4-BYOS, but entry?
CVE-2022-41218: no packages for Image SLES15-SP4-Micro-5-4-BYOS-Azure, but entry?
CVE-2022-41218: no packages for Image SLES15-SP4-Micro-5-4-BYOS-EC2, but entry?
CVE-2022-41218: no packages for Image SLES15-SP4-Micro-5-4-BYOS-GCE, but entry?
CVE-2022-41218: no packages for Image SLES15-SP4-Micro-5-4-EC2, but entry?
CVE-2022-41218: no packages for Image SLES15-SP4-Micro-5-4-GCE, but entry?
CVE-2022-41218: no packages for Image SLES15-SP4-SAP, but entry?
CVE-2022-41218: no packages for Image SLES15-SP4-SAP-Azure, but entry?
CVE-2022-41218: no packages for Image SLES15-SP4-SAP-Azure-LI-BYOS, but entry?
CVE-2022-41218: no packages for Image SLES15-SP4-SAP-Azure-LI-BYOS-Production, but entry?
CVE-2022-41218: no packages for Image SLES15-SP4-SAP-Azure-VLI-BYOS, but entry?
CVE-2022-41218: no packages for Image SLES15-SP4-SAP-Azure-VLI-BYOS-Production, but entry?
CVE-2022-41218: no packages for Image SLES15-SP4-SAP-BYOS, but entry?
CVE-2022-41218: no packages for Image SLES15-SP4-SAP-BYOS-Azure, but entry?
CVE-2022-41218: no packages for Image SLES15-SP4-SAP-BYOS-EC2, but entry?
CVE-2022-41218: no packages for Image SLES15-SP4-SAP-BYOS-GCE, but entry?
CVE-2022-41218: no packages for Image SLES15-SP4-SAP-EC2, but entry?
CVE-2022-41218: no packages for Image SLES15-SP4-SAP-GCE, but entry?
CVE-2022-41218: no packages for Image SLES15-SP4-SAP-Hardened, but entry?
CVE-2022-41218: no packages for Image SLES15-SP4-SAP-Hardened-Azure, but entry?
CVE-2022-41218: no packages for Image SLES15-SP4-SAP-Hardened-BYOS, but entry?
CVE-2022-41218: no packages for Image SLES15-SP4-SAP-Hardened-BYOS-Azure, but entry?
CVE-2022-41218: no packages for Image SLES15-SP4-SAP-Hardened-BYOS-EC2, but entry?
CVE-2022-41218: no packages for Image SLES15-SP4-SAP-Hardened-BYOS-GCE, but entry?
CVE-2022-41218: no packages for Image SLES15-SP4-SAP-Hardened-EC2, but entry?
CVE-2022-41218: no packages for Image SLES15-SP4-SAP-Hardened-GCE, but entry?
CVE-2022-41218: no packages for Image SLES15-SP4-SAPCAL, but entry?
CVE-2022-41218: no packages for Image SLES15-SP4-SAPCAL-Azure, but entry?
CVE-2022-41218: no packages for Image SLES15-SP4-SAPCAL-EC2, but entry?
CVE-2022-41218: no packages for Image SLES15-SP4-SAPCAL-GCE, but entry?
CVE-2022-41218: no packages for Image SLES15-SP4-SUSE-Rancher-Setup-BYOS, but entry?
CVE-2022-41218: no packages for Image SLES15-SP4-SUSE-Rancher-Setup-BYOS-EC2, but entry?
CVE-2022-41218: no packages for SUSE CaaS Platform 4.0, but entry?
CVE-2022-41218: no packages for SUSE Enterprise Storage 6, but entry?
CVE-2022-41218: no packages for SUSE Enterprise Storage 7, but entry?
CVE-2022-41218: no packages for SUSE Liberty Linux 8, but entry?
CVE-2022-41218: no packages for SUSE Linux Enterprise High Availability Extension 12 SP4, but entry?
CVE-2022-41218: no packages for SUSE Linux Enterprise High Availability Extension 12 SP5, but entry?
CVE-2022-41218: no packages for SUSE Linux Enterprise High Availability Extension 15, but entry?
CVE-2022-41218: no packages for SUSE Linux Enterprise High Availability Extension 15 SP1, but entry?
CVE-2022-41218: no packages for SUSE Linux Enterprise High Availability Extension 15 SP2, but entry?
CVE-2022-41218: no packages for SUSE Linux Enterprise High Availability Extension 15 SP3, but entry?
CVE-2022-41218: no packages for SUSE Linux Enterprise High Availability Extension 15 SP4, but entry?
CVE-2022-41218: no packages for SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS, but entry?
CVE-2022-41218: no packages for SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS, but entry?
CVE-2022-41218: no packages for SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS, but entry?
CVE-2022-41218: no packages for SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS, but entry?
CVE-2022-41218: no packages for SUSE Linux Enterprise High Performance Computing 15-ESPOS, but entry?
CVE-2022-41218: no packages for SUSE Linux Enterprise High Performance Computing 15-LTSS, but entry?
CVE-2022-41218: no packages for SUSE Linux Enterprise Live Patching 12 SP4, but entry?
CVE-2022-41218: no packages for SUSE Linux Enterprise Live Patching 12 SP5, but entry?
CVE-2022-41218: no packages for SUSE Linux Enterprise Live Patching 15, but entry?
CVE-2022-41218: no packages for SUSE Linux Enterprise Live Patching 15 SP1, but entry?
CVE-2022-41218: no packages for SUSE Linux Enterprise Live Patching 15 SP2, but entry?
CVE-2022-41218: no packages for SUSE Linux Enterprise Live Patching 15 SP3, but entry?
CVE-2022-41218: no packages for SUSE Linux Enterprise Live Patching 15 SP4, but entry?
CVE-2022-41218: no packages for SUSE Linux Enterprise Micro 5.1, but entry?
CVE-2022-41218: no packages for SUSE Linux Enterprise Micro 5.2, but entry?
CVE-2022-41218: no packages for SUSE Linux Enterprise Micro 5.3, but entry?
CVE-2022-41218: no packages for SUSE Linux Enterprise Module for Basesystem 15 SP3, but entry?
CVE-2022-41218: no packages for SUSE Linux Enterprise Module for Basesystem 15 SP4, but entry?
CVE-2022-41218: no packages for SUSE Linux Enterprise Module for Development Tools 15 SP3, but entry?
CVE-2022-41218: no packages for SUSE Linux Enterprise Module for Development Tools 15 SP4, but entry?
CVE-2022-41218: no packages for SUSE Linux Enterprise Module for Legacy 15 SP3, but entry?
CVE-2022-41218: no packages for SUSE Linux Enterprise Module for Legacy 15 SP4, but entry?
CVE-2022-41218: no packages for SUSE Linux Enterprise Module for Public Cloud 15 SP3, but entry?
CVE-2022-41218: no packages for SUSE Linux Enterprise Module for Public Cloud 15 SP4, but entry?
CVE-2022-41218: no packages for SUSE Linux Enterprise Real Time 12 SP5, but entry?
CVE-2022-41218: no packages for SUSE Linux Enterprise Server 11 SP3-TERADATA, but entry?
CVE-2022-41218: no packages for SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE, but entry?
CVE-2022-41218: no packages for SUSE Linux Enterprise Server 12 SP2-BCL, but entry?
CVE-2022-41218: no packages for SUSE Linux Enterprise Server 12 SP3-BCL, but entry?
CVE-2022-41218: no packages for SUSE Linux Enterprise Server 12 SP3-LTSS-TERADATA, but entry?
CVE-2022-41218: no packages for SUSE Linux Enterprise Server 12 SP3-TERADATA, but entry?
CVE-2022-41218: no packages for SUSE Linux Enterprise Server 12 SP4-ESPOS, but entry?
CVE-2022-41218: no packages for SUSE Linux Enterprise Server 12 SP4-LTSS, but entry?
CVE-2022-41218: no packages for SUSE Linux Enterprise Server 12 SP5, but entry?
CVE-2022-41218: no packages for SUSE Linux Enterprise Server 15 SP1-BCL, but entry?
CVE-2022-41218: no packages for SUSE Linux Enterprise Server 15 SP1-LTSS, but entry?
CVE-2022-41218: no packages for SUSE Linux Enterprise Server 15 SP2-BCL, but entry?
CVE-2022-41218: no packages for SUSE Linux Enterprise Server 15 SP2-LTSS, but entry?
CVE-2022-41218: no packages for SUSE Linux Enterprise Server 15 SP4-TERADATA, but entry?
CVE-2022-41218: no packages for SUSE Linux Enterprise Server 15-LTSS, but entry?
CVE-2022-41218: no packages for SUSE Linux Enterprise Server for SAP Applications 12 SP4, but entry?
CVE-2022-41218: no packages for SUSE Linux Enterprise Server for SAP Applications 12 SP5, but entry?
CVE-2022-41218: no packages for SUSE Linux Enterprise Server for SAP Applications 15, but entry?
CVE-2022-41218: no packages for SUSE Linux Enterprise Server for SAP Applications 15 SP1, but entry?
CVE-2022-41218: no packages for SUSE Linux Enterprise Server for SAP Applications 15 SP2, but entry?
CVE-2022-41218: no packages for SUSE Linux Enterprise Software Development Kit 12 SP5, but entry?
CVE-2022-41218: no packages for SUSE Manager Proxy 4.1, but entry?
CVE-2022-41218: no packages for SUSE Manager Retail Branch Server 4.1, but entry?
CVE-2022-41218: no packages for SUSE Manager Server 4.1, but entry?
CVE-2022-41218: no packages for SUSE OpenStack Cloud 9, but entry?
CVE-2022-41218: no packages for SUSE OpenStack Cloud Crowbar 9, but entry?
CVE-2022-41218: no packages for SUSE Real Time Module 15 SP3, but entry?
CVE-2022-41218: no packages for SUSE Real Time Module 15 SP4, but entry?
CVE-2022-41218: no packages for openSUSE Leap Micro 5.2, but entry?
CVE-2022-41218: no packages for Container rancher/elemental-teal-rt/5.3:latest, but entry?
CVE-2022-41218: no packages for Container rancher/elemental-teal-rt/5.4:latest, but entry?
CVE-2022-41218: no packages for Container suse/sle-micro-rancher/5.2:latest, but entry?
CVE-2022-41218: no packages for Container suse/sle-micro-rancher/5.3:latest, but entry?
CVE-2022-41218: no packages for Container suse/sle-micro-rancher/5.4:latest, but entry?
CVE-2022-41218: no packages for Image SLES12-SP4-SAP-Azure-LI-BYOS-Production, but entry?
CVE-2022-41218: no packages for Image SLES12-SP4-SAP-Azure-VLI-BYOS-Production, but entry?
CVE-2022-41218: no packages for Image SLES12-SP5-Azure-BYOS, but entry?
CVE-2022-41218: no packages for Image SLES12-SP5-Azure-Basic-On-Demand, but entry?
CVE-2022-41218: no packages for Image SLES12-SP5-Azure-HPC-BYOS, but entry?
CVE-2022-41218: no packages for Image SLES12-SP5-Azure-HPC-On-Demand, but entry?
CVE-2022-41218: no packages for Image SLES12-SP5-Azure-SAP-BYOS, but entry?
CVE-2022-41218: no packages for Image SLES12-SP5-Azure-SAP-On-Demand, but entry?
CVE-2022-41218: no packages for Image SLES12-SP5-Azure-Standard-On-Demand, but entry?
CVE-2022-41218: no packages for Image SLES12-SP5-EC2-BYOS, but entry?
CVE-2022-41218: no packages for Image SLES12-SP5-EC2-ECS-On-Demand, but entry?
CVE-2022-41218: no packages for Image SLES12-SP5-EC2-On-Demand, but entry?
CVE-2022-41218: no packages for Image SLES12-SP5-EC2-SAP-BYOS, but entry?
CVE-2022-41218: no packages for Image SLES12-SP5-EC2-SAP-On-Demand, but entry?
CVE-2022-41218: no packages for Image SLES12-SP5-GCE-BYOS, but entry?
CVE-2022-41218: no packages for Image SLES12-SP5-GCE-On-Demand, but entry?
CVE-2022-41218: no packages for Image SLES12-SP5-GCE-SAP-BYOS, but entry?
CVE-2022-41218: no packages for Image SLES12-SP5-GCE-SAP-On-Demand, but entry?
CVE-2022-41218: no packages for Image SLES12-SP5-SAP-Azure-LI-BYOS-Production, but entry?
CVE-2022-41218: no packages for Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production, but entry?
CVE-2022-41218: no packages for Image SLES15-SP1-SAP-Azure-LI-BYOS-Production, but entry?
CVE-2022-41218: no packages for Image SLES15-SP1-SAP-Azure-VLI-BYOS-Production, but entry?
CVE-2022-41218: no packages for Image SLES15-SP1-SAPCAL-Azure, but entry?
CVE-2022-41218: no packages for Image SLES15-SP1-SAPCAL-EC2-HVM, but entry?
CVE-2022-41218: no packages for Image SLES15-SP1-SAPCAL-GCE, but entry?
CVE-2022-41218: no packages for Image SLES15-SP2-BYOS-Azure, but entry?
CVE-2022-41218: no packages for Image SLES15-SP2-BYOS-EC2-HVM, but entry?
CVE-2022-41218: no packages for Image SLES15-SP2-BYOS-GCE, but entry?
CVE-2022-41218: no packages for Image SLES15-SP2-HPC-BYOS-Azure, but entry?
CVE-2022-41218: no packages for Image SLES15-SP2-HPC-BYOS-EC2-HVM, but entry?
CVE-2022-41218: no packages for Image SLES15-SP2-SAP-Azure, but entry?
CVE-2022-41218: no packages for Image SLES15-SP2-SAP-Azure-LI-BYOS-Production, but entry?
CVE-2022-41218: no packages for Image SLES15-SP2-SAP-Azure-VLI-BYOS-Production, but entry?
CVE-2022-41218: no packages for Image SLES15-SP2-SAP-BYOS-Azure, but entry?
CVE-2022-41218: no packages for Image SLES15-SP2-SAP-BYOS-EC2-HVM, but entry?
CVE-2022-41218: no packages for Image SLES15-SP2-SAP-BYOS-GCE, but entry?
CVE-2022-41218: no packages for Image SLES15-SP2-SAP-EC2-HVM, but entry?
CVE-2022-41218: no packages for Image SLES15-SP2-SAP-GCE, but entry?
CVE-2022-41218: no packages for Image SLES15-SP3-BYOS-Azure, but entry?
CVE-2022-41218: no packages for Image SLES15-SP3-BYOS-EC2-HVM, but entry?
CVE-2022-41218: no packages for Image SLES15-SP3-BYOS-GCE, but entry?
CVE-2022-41218: no packages for Image SLES15-SP3-CHOST-BYOS-Aliyun, but entry?
CVE-2022-41218: no packages for Image SLES15-SP3-CHOST-BYOS-Azure, but entry?
CVE-2022-41218: no packages for Image SLES15-SP3-CHOST-BYOS-EC2, but entry?
CVE-2022-41218: no packages for Image SLES15-SP3-CHOST-BYOS-GCE, but entry?
CVE-2022-41218: no packages for Image SLES15-SP3-CHOST-BYOS-SAP-CCloud, but entry?
CVE-2022-41218: no packages for Image SLES15-SP3-HPC-BYOS-Azure, but entry?
CVE-2022-41218: no packages for Image SLES15-SP3-HPC-BYOS-EC2-HVM, but entry?
CVE-2022-41218: no packages for Image SLES15-SP3-HPC-BYOS-GCE, but entry?
CVE-2022-41218: no packages for Image SLES15-SP3-Manager-4-2-Proxy-BYOS-Azure, but entry?
CVE-2022-41218: no packages for Image SLES15-SP3-Manager-4-2-Proxy-BYOS-EC2-HVM, but entry?
CVE-2022-41218: no packages for Image SLES15-SP3-Manager-4-2-Proxy-BYOS-GCE, but entry?
CVE-2022-41218: no packages for Image SLES15-SP3-Manager-4-2-Server-BYOS-Azure, but entry?
CVE-2022-41218: no packages for Image SLES15-SP3-Manager-4-2-Server-BYOS-EC2-HVM, but entry?
CVE-2022-41218: no packages for Image SLES15-SP3-Manager-4-2-Server-BYOS-GCE, but entry?
CVE-2022-41218: no packages for Image SLES15-SP3-Micro-5-1-BYOS-Azure, but entry?
CVE-2022-41218: no packages for Image SLES15-SP3-Micro-5-1-BYOS-EC2-HVM, but entry?
CVE-2022-41218: no packages for Image SLES15-SP3-Micro-5-1-BYOS-GCE, but entry?
CVE-2022-41218: no packages for Image SLES15-SP3-Micro-5-2-BYOS-Azure, but entry?
CVE-2022-41218: no packages for Image SLES15-SP3-Micro-5-2-BYOS-EC2-HVM, but entry?
CVE-2022-41218: no packages for Image SLES15-SP3-Micro-5-2-BYOS-GCE, but entry?
CVE-2022-41218: no packages for Image SLES15-SP3-SAP-Azure-LI-BYOS-Production, but entry?
CVE-2022-41218: no packages for Image SLES15-SP3-SAP-Azure-VLI-BYOS-Production, but entry?
CVE-2022-41218: no packages for Image SLES15-SP3-SAP-BYOS-Azure, but entry?
CVE-2022-41218: no packages for Image SLES15-SP3-SAP-BYOS-EC2-HVM, but entry?
CVE-2022-41218: no packages for Image SLES15-SP3-SAP-BYOS-GCE, but entry?
CVE-2022-41218: no packages for Image SLES15-SP3-SAPCAL-Azure, but entry?
CVE-2022-41218: no packages for Image SLES15-SP3-SAPCAL-EC2-HVM, but entry?
CVE-2022-41218: no packages for Image SLES15-SP3-SAPCAL-GCE, but entry?
CVE-2022-41218: no packages for Image SLES15-SP4, but entry?
CVE-2022-41218: no packages for Image SLES15-SP4-Azure-Basic, but entry?
CVE-2022-41218: no packages for Image SLES15-SP4-Azure-Standard, but entry?
CVE-2022-41218: no packages for Image SLES15-SP4-BYOS, but entry?
CVE-2022-41218: no packages for Image SLES15-SP4-BYOS-Azure, but entry?
CVE-2022-41218: no packages for Image SLES15-SP4-BYOS-EC2, but entry?
CVE-2022-41218: no packages for Image SLES15-SP4-BYOS-GCE, but entry?
CVE-2022-41218: no packages for Image SLES15-SP4-CHOST-BYOS, but entry?
CVE-2022-41218: no packages for Image SLES15-SP4-CHOST-BYOS-Aliyun, but entry?
CVE-2022-41218: no packages for Image SLES15-SP4-CHOST-BYOS-Azure, but entry?
CVE-2022-41218: no packages for Image SLES15-SP4-CHOST-BYOS-EC2, but entry?
CVE-2022-41218: no packages for Image SLES15-SP4-CHOST-BYOS-GCE, but entry?
CVE-2022-41218: no packages for Image SLES15-SP4-CHOST-BYOS-SAP-CCloud, but entry?
CVE-2022-41218: no packages for Image SLES15-SP4-EC2, but entry?
CVE-2022-41218: no packages for Image SLES15-SP4-EC2-ECS-HVM, but entry?
CVE-2022-41218: no packages for Image SLES15-SP4-GCE, but entry?
CVE-2022-41218: no packages for Image SLES15-SP4-HPC, but entry?
CVE-2022-41218: no packages for Image SLES15-SP4-HPC-Azure, but entry?
CVE-2022-41218: no packages for Image SLES15-SP4-HPC-BYOS, but entry?
CVE-2022-41218: no packages for Image SLES15-SP4-HPC-BYOS-Azure, but entry?
CVE-2022-41218: no packages for Image SLES15-SP4-HPC-BYOS-EC2, but entry?
CVE-2022-41218: no packages for Image SLES15-SP4-HPC-BYOS-GCE, but entry?
CVE-2022-41218: no packages for Image SLES15-SP4-HPC-EC2, but entry?
CVE-2022-41218: no packages for Image SLES15-SP4-HPC-GCE, but entry?
CVE-2022-41218: no packages for Image SLES15-SP4-Hardened-BYOS, but entry?
CVE-2022-41218: no packages for Image SLES15-SP4-Hardened-BYOS-Azure, but entry?
CVE-2022-41218: no packages for Image SLES15-SP4-Hardened-BYOS-EC2, but entry?
CVE-2022-41218: no packages for Image SLES15-SP4-Hardened-BYOS-GCE, but entry?
CVE-2022-41218: no packages for Image SLES15-SP4-Manager-Proxy-4-3-BYOS, but entry?
CVE-2022-41218: no packages for Image SLES15-SP4-Manager-Proxy-4-3-BYOS-Azure, but entry?
CVE-2022-41218: no packages for Image SLES15-SP4-Manager-Proxy-4-3-BYOS-EC2, but entry?
CVE-2022-41218: no packages for Image SLES15-SP4-Manager-Proxy-4-3-BYOS-GCE, but entry?
CVE-2022-41218: no packages for Image SLES15-SP4-Manager-Server-4-3, but entry?
CVE-2022-41218: no packages for Image SLES15-SP4-Manager-Server-4-3-Azure-llc, but entry?
CVE-2022-41218: no packages for Image SLES15-SP4-Manager-Server-4-3-Azure-ltd, but entry?
CVE-2022-41218: no packages for Image SLES15-SP4-Manager-Server-4-3-BYOS, but entry?
CVE-2022-41218: no packages for Image SLES15-SP4-Manager-Server-4-3-BYOS-Azure, but entry?
CVE-2022-41218: no packages for Image SLES15-SP4-Manager-Server-4-3-BYOS-EC2, but entry?
CVE-2022-41218: no packages for Image SLES15-SP4-Manager-Server-4-3-BYOS-GCE, but entry?
CVE-2022-41218: no packages for Image SLES15-SP4-Manager-Server-4-3-EC2-llc, but entry?
CVE-2022-41218: no packages for Image SLES15-SP4-Manager-Server-4-3-EC2-ltd, but entry?
CVE-2022-41218: no packages for Image SLES15-SP4-Micro-5-3, but entry?
CVE-2022-41218: no packages for Image SLES15-SP4-Micro-5-3-Azure, but entry?
CVE-2022-41218: no packages for Image SLES15-SP4-Micro-5-3-BYOS, but entry?
CVE-2022-41218: no packages for Image SLES15-SP4-Micro-5-3-BYOS-Azure, but entry?
CVE-2022-41218: no packages for Image SLES15-SP4-Micro-5-3-BYOS-EC2, but entry?
CVE-2022-41218: no packages for Image SLES15-SP4-Micro-5-3-BYOS-GCE, but entry?
CVE-2022-41218: no packages for Image SLES15-SP4-Micro-5-3-EC2, but entry?
CVE-2022-41218: no packages for Image SLES15-SP4-Micro-5-3-GCE, but entry?
CVE-2022-41218: no packages for Image SLES15-SP4-Micro-5-4, but entry?
CVE-2022-41218: no packages for Image SLES15-SP4-Micro-5-4-Azure, but entry?
CVE-2022-41218: no packages for Image SLES15-SP4-Micro-5-4-BYOS, but entry?
CVE-2022-41218: no packages for Image SLES15-SP4-Micro-5-4-BYOS-Azure, but entry?
CVE-2022-41218: no packages for Image SLES15-SP4-Micro-5-4-BYOS-EC2, but entry?
CVE-2022-41218: no packages for Image SLES15-SP4-Micro-5-4-BYOS-GCE, but entry?
CVE-2022-41218: no packages for Image SLES15-SP4-Micro-5-4-EC2, but entry?
CVE-2022-41218: no packages for Image SLES15-SP4-Micro-5-4-GCE, but entry?
CVE-2022-41218: no packages for Image SLES15-SP4-SAP, but entry?
CVE-2022-41218: no packages for Image SLES15-SP4-SAP-Azure, but entry?
CVE-2022-41218: no packages for Image SLES15-SP4-SAP-Azure-LI-BYOS, but entry?
CVE-2022-41218: no packages for Image SLES15-SP4-SAP-Azure-LI-BYOS-Production, but entry?
CVE-2022-41218: no packages for Image SLES15-SP4-SAP-Azure-VLI-BYOS, but entry?
CVE-2022-41218: no packages for Image SLES15-SP4-SAP-Azure-VLI-BYOS-Production, but entry?
CVE-2022-41218: no packages for Image SLES15-SP4-SAP-BYOS, but entry?
CVE-2022-41218: no packages for Image SLES15-SP4-SAP-BYOS-Azure, but entry?
CVE-2022-41218: no packages for Image SLES15-SP4-SAP-BYOS-EC2, but entry?
CVE-2022-41218: no packages for Image SLES15-SP4-SAP-BYOS-GCE, but entry?
CVE-2022-41218: no packages for Image SLES15-SP4-SAP-EC2, but entry?
CVE-2022-41218: no packages for Image SLES15-SP4-SAP-GCE, but entry?
CVE-2022-41218: no packages for Image SLES15-SP4-SAP-Hardened, but entry?
CVE-2022-41218: no packages for Image SLES15-SP4-SAP-Hardened-Azure, but entry?
CVE-2022-41218: no packages for Image SLES15-SP4-SAP-Hardened-BYOS, but entry?
CVE-2022-41218: no packages for Image SLES15-SP4-SAP-Hardened-BYOS-Azure, but entry?
CVE-2022-41218: no packages for Image SLES15-SP4-SAP-Hardened-BYOS-EC2, but entry?
CVE-2022-41218: no packages for Image SLES15-SP4-SAP-Hardened-BYOS-GCE, but entry?
CVE-2022-41218: no packages for Image SLES15-SP4-SAP-Hardened-EC2, but entry?
CVE-2022-41218: no packages for Image SLES15-SP4-SAP-Hardened-GCE, but entry?
CVE-2022-41218: no packages for Image SLES15-SP4-SAPCAL, but entry?
CVE-2022-41218: no packages for Image SLES15-SP4-SAPCAL-Azure, but entry?
CVE-2022-41218: no packages for Image SLES15-SP4-SAPCAL-EC2, but entry?
CVE-2022-41218: no packages for Image SLES15-SP4-SAPCAL-GCE, but entry?
CVE-2022-41218: no packages for Image SLES15-SP4-SUSE-Rancher-Setup-BYOS, but entry?
CVE-2022-41218: no packages for Image SLES15-SP4-SUSE-Rancher-Setup-BYOS-EC2, but entry?
CVE-2022-41218: no packages for SUSE CaaS Platform 4.0, but entry?
CVE-2022-41218: no packages for SUSE Enterprise Storage 6, but entry?
CVE-2022-41218: no packages for SUSE Enterprise Storage 7, but entry?
CVE-2022-41218: no packages for SUSE Liberty Linux 8, but entry?
CVE-2022-41218: no packages for SUSE Linux Enterprise High Availability Extension 12 SP4, but entry?
CVE-2022-41218: no packages for SUSE Linux Enterprise High Availability Extension 12 SP5, but entry?
CVE-2022-41218: no packages for SUSE Linux Enterprise High Availability Extension 15, but entry?
CVE-2022-41218: no packages for SUSE Linux Enterprise High Availability Extension 15 SP1, but entry?
CVE-2022-41218: no packages for SUSE Linux Enterprise High Availability Extension 15 SP2, but entry?
CVE-2022-41218: no packages for SUSE Linux Enterprise High Availability Extension 15 SP3, but entry?
CVE-2022-41218: no packages for SUSE Linux Enterprise High Availability Extension 15 SP4, but entry?
CVE-2022-41218: no packages for SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS, but entry?
CVE-2022-41218: no packages for SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS, but entry?
CVE-2022-41218: no packages for SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS, but entry?
CVE-2022-41218: no packages for SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS, but entry?
CVE-2022-41218: no packages for SUSE Linux Enterprise High Performance Computing 15-ESPOS, but entry?
CVE-2022-41218: no packages for SUSE Linux Enterprise High Performance Computing 15-LTSS, but entry?
CVE-2022-41218: no packages for SUSE Linux Enterprise Live Patching 12 SP4, but entry?
CVE-2022-41218: no packages for SUSE Linux Enterprise Live Patching 12 SP5, but entry?
CVE-2022-41218: no packages for SUSE Linux Enterprise Live Patching 15, but entry?
CVE-2022-41218: no packages for SUSE Linux Enterprise Live Patching 15 SP1, but entry?
CVE-2022-41218: no packages for SUSE Linux Enterprise Live Patching 15 SP2, but entry?
CVE-2022-41218: no packages for SUSE Linux Enterprise Live Patching 15 SP3, but entry?
CVE-2022-41218: no packages for SUSE Linux Enterprise Live Patching 15 SP4, but entry?
CVE-2022-41218: no packages for SUSE Linux Enterprise Micro 5.1, but entry?
CVE-2022-41218: no packages for SUSE Linux Enterprise Micro 5.2, but entry?
CVE-2022-41218: no packages for SUSE Linux Enterprise Micro 5.3, but entry?
CVE-2022-41218: no packages for SUSE Linux Enterprise Module for Basesystem 15 SP3, but entry?
CVE-2022-41218: no packages for SUSE Linux Enterprise Module for Basesystem 15 SP4, but entry?
CVE-2022-41218: no packages for SUSE Linux Enterprise Module for Development Tools 15 SP3, but entry?
CVE-2022-41218: no packages for SUSE Linux Enterprise Module for Development Tools 15 SP4, but entry?
CVE-2022-41218: no packages for SUSE Linux Enterprise Module for Legacy 15 SP3, but entry?
CVE-2022-41218: no packages for SUSE Linux Enterprise Module for Legacy 15 SP4, but entry?
CVE-2022-41218: no packages for SUSE Linux Enterprise Module for Open Buildservice Development Tools 15 SP5, but entry?
CVE-2022-41218: no packages for SUSE Linux Enterprise Module for Open Buildservice Development Tools 15 SP6, but entry?
CVE-2022-41218: no packages for SUSE Linux Enterprise Module for Public Cloud 15 SP3, but entry?
CVE-2022-41218: no packages for SUSE Linux Enterprise Module for Public Cloud 15 SP4, but entry?
CVE-2022-41218: no packages for SUSE Linux Enterprise Real Time 12 SP5, but entry?
CVE-2022-41218: no packages for SUSE Linux Enterprise Server 11 SP3-TERADATA, but entry?
CVE-2022-41218: no packages for SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE, but entry?
CVE-2022-41218: no packages for SUSE Linux Enterprise Server 12 SP2-BCL, but entry?
CVE-2022-41218: no packages for SUSE Linux Enterprise Server 12 SP3-BCL, but entry?
CVE-2022-41218: no packages for SUSE Linux Enterprise Server 12 SP3-LTSS-TERADATA, but entry?
CVE-2022-41218: no packages for SUSE Linux Enterprise Server 12 SP3-TERADATA, but entry?
CVE-2022-41218: no packages for SUSE Linux Enterprise Server 12 SP4-ESPOS, but entry?
CVE-2022-41218: no packages for SUSE Linux Enterprise Server 12 SP4-LTSS, but entry?
CVE-2022-41218: no packages for SUSE Linux Enterprise Server 12 SP5, but entry?
CVE-2022-41218: no packages for SUSE Linux Enterprise Server 15 SP1-BCL, but entry?
CVE-2022-41218: no packages for SUSE Linux Enterprise Server 15 SP1-LTSS, but entry?
CVE-2022-41218: no packages for SUSE Linux Enterprise Server 15 SP2-BCL, but entry?
CVE-2022-41218: no packages for SUSE Linux Enterprise Server 15 SP2-LTSS, but entry?
CVE-2022-41218: no packages for SUSE Linux Enterprise Server 15 SP4-TERADATA, but entry?
CVE-2022-41218: no packages for SUSE Linux Enterprise Server 15-LTSS, but entry?
CVE-2022-41218: no packages for SUSE Linux Enterprise Server for SAP Applications 12 SP4, but entry?
CVE-2022-41218: no packages for SUSE Linux Enterprise Server for SAP Applications 12 SP5, but entry?
CVE-2022-41218: no packages for SUSE Linux Enterprise Server for SAP Applications 15, but entry?
CVE-2022-41218: no packages for SUSE Linux Enterprise Server for SAP Applications 15 SP1, but entry?
CVE-2022-41218: no packages for SUSE Linux Enterprise Server for SAP Applications 15 SP2, but entry?
CVE-2022-41218: no packages for SUSE Linux Enterprise Software Development Kit 12 SP5, but entry?
CVE-2022-41218: no packages for SUSE Manager Proxy 4.1, but entry?
CVE-2022-41218: no packages for SUSE Manager Retail Branch Server 4.1, but entry?
CVE-2022-41218: no packages for SUSE Manager Server 4.1, but entry?
CVE-2022-41218: no packages for SUSE OpenStack Cloud 9, but entry?
CVE-2022-41218: no packages for SUSE OpenStack Cloud Crowbar 9, but entry?
CVE-2022-41218: no packages for SUSE Real Time Module 15 SP3, but entry?
CVE-2022-41218: no packages for SUSE Real Time Module 15 SP4, but entry?
CVE-2022-41218: no packages for openSUSE Leap Micro 5.2, but entry?
skipping CVE-2022-41222 as CVE page is older than CVRF-CVE file.
No V5 entry found for CVE-2022-41160 / /home/securitybot/prod/cve-database/cvelistV5/cves/2022/41xxxx/CVE-2022-41160.json:No such file or directory
no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2022-40982
no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2022-40898
skipping CVE-2022-40962 as CVE page is older than CVRF-CVE file.
skipping CVE-2022-40961 as CVE page is older than CVRF-CVE file.
skipping CVE-2022-40960 as CVE page is older than CVRF-CVE file.
skipping CVE-2022-40959 as CVE page is older than CVRF-CVE file.
skipping CVE-2022-40958 as CVE page is older than CVRF-CVE file.
skipping CVE-2022-40957 as CVE page is older than CVRF-CVE file.
skipping CVE-2022-40956 as CVE page is older than CVRF-CVE file.
skipping CVE-2022-40899 as CVE page is older than CVRF-CVE file.
skipping CVE-2022-40897 as CVE page is older than CVRF-CVE file.
skipping CVE-2022-40768 as CVE page is older than CVRF-CVE file.
skipping CVE-2022-40755 as CVE page is older than CVRF-CVE file.
skipping CVE-2022-40735 as CVE page is older than CVRF-CVE file.
skipping CVE-2022-40674 as CVE page is older than CVRF-CVE file.
no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2022-40617
skipping CVE-2022-40626 as CVE page is older than CVRF-CVE file.
no cpe found for SUSE Package Hub 15 SP5 in CVE-2022-40468
skipping CVE-2022-40609 as CVE page is older than CVRF-CVE file.
skipping CVE-2022-40540 as CVE page is older than CVRF-CVE file.
skipping CVE-2022-40476 as CVE page is older than CVRF-CVE file.
skipping CVE-2022-40433 as CVE page is older than CVRF-CVE file.
skipping CVE-2022-40307 as CVE page is older than CVRF-CVE file.
skipping CVE-2022-40304 as CVE page is older than CVRF-CVE file.
skipping CVE-2022-40303 as CVE page is older than CVRF-CVE file.
CVE-2022-40150: no packages for Image SLES15-SP5-SAP-EC2, but entry?
CVE-2022-40150: no packages for SUSE Linux Enterprise Real Time 15 SP3, but entry?
CVE-2022-40150: no packages for SUSE Linux Enterprise Module for Web and Scripting 15 SP5, but entry?
CVE-2022-40150: no packages for SUSE Linux Enterprise Module for Development Tools 15 SP5, but entry?
CVE-2022-40150: no packages for Image SLES15-SP2-SAP-BYOS-Azure, but entry?
CVE-2022-40150: no packages for Image SLES15-SP4-Manager-Server-4-3-Azure-ltd, but entry?
CVE-2022-40150: no packages for Image SLES15-SP6-SAPCAL-EC2, but entry?
CVE-2022-40150: no packages for Image SLES15-SP4-SAPCAL, but entry?
CVE-2022-40150: no packages for SUSE Linux Enterprise Module for Web and Scripting 15 SP6, but entry?
CVE-2022-40150: no packages for SUSE Linux Enterprise Module for Development Tools 15 SP4, but entry?
CVE-2022-40150: no packages for Container bci/openjdk:latest, but entry?
CVE-2022-40150: no packages for Image SLES15-SP3-Manager-4-2-Server-BYOS-GCE, but entry?
CVE-2022-40150: no packages for Image SLES15-SP2-SAP-BYOS-GCE, but entry?
CVE-2022-40150: no packages for Container bci/openjdk:17-7.1, but entry?
CVE-2022-40150: no packages for Image SLES15-SP4-Manager-Server-4-3-Azure-llc, but entry?
CVE-2022-40150: no packages for SUSE Linux Enterprise Server 15 SP3-LTSS, but entry?
CVE-2022-40150: no packages for SUSE Linux Enterprise Module for Basesystem 15 SP4, but entry?
CVE-2022-40150: no packages for SUSE Linux Enterprise Module for Package Hub 15 SP6, but entry?
CVE-2022-40150: no packages for Image SLES15-SP3-SAP-Azure-VLI-BYOS-Production, but entry?
CVE-2022-40150: no packages for Image SLES15-SP3-SAPCAL-Azure, but entry?
CVE-2022-40150: no packages for Image SLES15-SP4-Manager-Server-4-3-EC2-ltd, but entry?
CVE-2022-40150: no packages for Image SLES15-SP5-SAP-Azure-VLI-BYOS, but entry?
CVE-2022-40150: no packages for Image SLES15-SP6-SAPCAL, but entry?
CVE-2022-40150: no packages for SUSE Linux Enterprise Module for Basesystem 15 SP6, but entry?
CVE-2022-40150: no packages for Image SLES15-SP5-SAP-Azure-LI-BYOS-Production, but entry?
CVE-2022-40150: no packages for Image SLES15-SP3-SAPCAL-GCE, but entry?
CVE-2022-40150: no packages for Image SLES15-SP6-SAP, but entry?
CVE-2022-40150: no packages for Image SLES15-SP4-SAPCAL-GCE, but entry?
CVE-2022-40150: no packages for SUSE Linux Enterprise Module for Basesystem 15 SP5, but entry?
CVE-2022-40150: no packages for Image SLES15-SP2-SAP-Azure, but entry?
CVE-2022-40150: no packages for Container suse/manager/5.0/x86_64/server:5.0.0-beta1.2.122, but entry?
CVE-2022-40150: no packages for SUSE Linux Enterprise Module for Development Tools 15 SP6, but entry?
CVE-2022-40150: no packages for Image SLES15-SP4-Manager-Server-4-3-BYOS, but entry?
CVE-2022-40150: no packages for SUSE Enterprise Storage 7.1, but entry?
CVE-2022-40150: no packages for Image SLES15-SP4-SAP-Azure-LI-BYOS, but entry?
CVE-2022-40150: no packages for Image SLES15-SP2-SAP-Azure-LI-BYOS-Production, but entry?
CVE-2022-40150: no packages for Image SLES15-SP3-SAPCAL-EC2-HVM, but entry?
CVE-2022-40150: no packages for SUSE Manager Server 4.2, but entry?
CVE-2022-40150: no packages for Image SLES15-SP4-SAP-Azure-LI-BYOS-Production, but entry?
CVE-2022-40150: no packages for Image SLES15-SP4-Manager-Server-4-3, but entry?
CVE-2022-40150: no packages for Image SLES15-SP4-SAP, but entry?
CVE-2022-40150: no packages for SUSE Manager Retail Branch Server 4.2, but entry?
CVE-2022-40150: no packages for SUSE Manager Proxy 4.2, but entry?
CVE-2022-40150: no packages for SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS, but entry?
CVE-2022-40150: no packages for Image SLES15-SP4-Manager-Server-4-3-EC2-llc, but entry?
CVE-2022-40150: no packages for Image SLES15-SP4-SAP-Azure, but entry?
CVE-2022-40150: no packages for SUSE Linux Enterprise Module for Package Hub 15 SP5, but entry?
CVE-2022-40150: no packages for SUSE Linux Enterprise Workstation Extension 15 SP4, but entry?
CVE-2022-40150: no packages for SUSE Linux Enterprise Module for Package Hub 15 SP4, but entry?
CVE-2022-40150: no packages for Image SLES15-SP6-SAP-Azure-LI-BYOS-Production, but entry?
CVE-2022-40150: no packages for SUSE Linux Enterprise Server 15 SP2-LTSS, but entry?
CVE-2022-40150: no packages for SUSE Enterprise Storage 7, but entry?
CVE-2022-40150: no packages for SUSE Linux Enterprise Workstation Extension 15 SP6, but entry?
CVE-2022-40150: no packages for SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS, but entry?
CVE-2022-40150: no packages for SUSE Linux Enterprise Server for SAP Applications 15 SP3, but entry?
CVE-2022-40150: no packages for Image SLES15-SP3-SAP-Azure-LI-BYOS-Production, but entry?
CVE-2022-40150: no packages for SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS, but entry?
CVE-2022-40150: no packages for Image SLES15-SP2-SAP-EC2-HVM, but entry?
CVE-2022-40150: no packages for Image SLES15-SP6-SAP-Azure-VLI-BYOS-Production, but entry?
CVE-2022-40150: no packages for SUSE Manager Server Module 4.3, but entry?
CVE-2022-40150: no packages for Image SLES15-SP6-SAP-EC2, but entry?
CVE-2022-40150: no packages for Image SLES15-SP4-SAP-GCE, but entry?
CVE-2022-40150: no packages for Image SLES15-SP6-SAP-Azure-LI-BYOS, but entry?
CVE-2022-40150: no packages for Image SLES15-SP4-SAP-Azure-VLI-BYOS, but entry?
CVE-2022-40150: no packages for SUSE Linux Enterprise Server 15 SP4-TERADATA, but entry?
CVE-2022-40150: no packages for Image SLES15-SP5-SAPCAL-EC2, but entry?
CVE-2022-40150: no packages for Image SLES15-SP4-SAPCAL-Azure, but entry?
CVE-2022-40150: no packages for Image SLES15-SP4-SAPCAL-EC2, but entry?
CVE-2022-40150: no packages for SUSE Linux Enterprise Module for Web and Scripting 15 SP4, but entry?
CVE-2022-40150: no packages for Container bci/openjdk-devel:17-14.11, but entry?
CVE-2022-40150: no packages for Container bci/openjdk:11-7.1, but entry?
CVE-2022-40150: no packages for Image SLES15-SP4-SAP-EC2, but entry?
CVE-2022-40150: no packages for SUSE Linux Enterprise Server for SAP Applications 15 SP1, but entry?
CVE-2022-40150: no packages for Container bci/kiwi:9.24.43-8.6, but entry?
CVE-2022-40150: no packages for SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS, but entry?
CVE-2022-40150: no packages for Image SLES15-SP2-SAP-GCE, but entry?
CVE-2022-40150: no packages for Image SLES15-SP3-Manager-4-2-Server-BYOS-Azure, but entry?
CVE-2022-40150: no packages for Image SLES15-SP5-SAP-Azure, but entry?
CVE-2022-40150: no packages for Container suse/manager/5.0/x86_64/server-attestation:5.0.0-beta2.2.16, but entry?
CVE-2022-40150: no packages for Image SLES15-SP6-SAP-Azure-VLI-BYOS, but entry?
CVE-2022-40150: no packages for Image SLES15-SP6-SAPCAL-Azure, but entry?
CVE-2022-40150: no packages for Image SLES15-SP2-SAP-BYOS-EC2-HVM, but entry?
CVE-2022-40150: no packages for Image SLES15-SP2-SAP-Azure-VLI-BYOS-Production, but entry?
CVE-2022-40150: no packages for Image SLES15-SP5-SAP-Azure-VLI-BYOS-Production, but entry?
CVE-2022-40150: no packages for SUSE CaaS Platform 4.0, but entry?
CVE-2022-40150: no packages for Container bci/openjdk-devel:11-6.2, but entry?
CVE-2022-40150: no packages for Image SLES15-SP4-Manager-Server-4-3-BYOS-GCE, but entry?
CVE-2022-40150: no packages for Image SLES15-SP6-SAPCAL-GCE, but entry?
CVE-2022-40150: no packages for Image SLES15-SP4-Manager-Server-4-3-BYOS-Azure, but entry?
CVE-2022-40150: no packages for Image SLES15-SP6-SAP-GCE, but entry?
CVE-2022-40150: no packages for Image SLES15-SP3-Manager-4-2-Server-BYOS-EC2-HVM, but entry?
CVE-2022-40150: no packages for SUSE Manager Server Module 4.2, but entry?
CVE-2022-40150: no packages for Image SLES15-SP4-Manager-Server-4-3-BYOS-EC2, but entry?
CVE-2022-40150: no packages for Image SLES15-SP5-SAP-Azure-LI-BYOS, but entry?
CVE-2022-40150: no packages for Image SLES15-SP4-SAP-Azure-VLI-BYOS-Production, but entry?
CVE-2022-40150: no packages for Image SLES15-SP5-SAPCAL-GCE, but entry?
CVE-2022-40150: no packages for Image SLES15-SP6-SAP-Azure, but entry?
CVE-2022-40150: no packages for Image SLES15-SP5-SAPCAL-Azure, but entry?
CVE-2022-40150: no packages for SUSE Linux Enterprise Server for SAP Applications 15 SP2, but entry?
CVE-2022-40150: no packages for Container bci/openjdk-devel:17-7.2, but entry?
CVE-2022-40150: no packages for SUSE Linux Enterprise Server 15 SP1-LTSS, but entry?
CVE-2022-40150: no packages for SUSE Linux Enterprise Workstation Extension 15 SP5, but entry?
CVE-2022-40150: no packages for Image SLES15-SP5-SAP-GCE, but entry?
CVE-2022-40150: no packages for Container bci/kiwi:9.24.43-8.6, but entry?
CVE-2022-40150: no packages for Container bci/openjdk-devel:11-6.2, but entry?
CVE-2022-40150: no packages for Container bci/openjdk-devel:17-14.11, but entry?
CVE-2022-40150: no packages for Container bci/openjdk-devel:17-7.2, but entry?
CVE-2022-40150: no packages for Container bci/openjdk:11-7.1, but entry?
CVE-2022-40150: no packages for Container bci/openjdk:17-7.1, but entry?
CVE-2022-40150: no packages for Container bci/openjdk:latest, but entry?
CVE-2022-40150: no packages for Container suse/manager/5.0/x86_64/server-attestation:5.0.0-beta2.2.16, but entry?
CVE-2022-40150: no packages for Container suse/manager/5.0/x86_64/server:5.0.0-beta1.2.122, but entry?
CVE-2022-40150: no packages for Image SLES15-SP2-SAP-Azure, but entry?
CVE-2022-40150: no packages for Image SLES15-SP2-SAP-Azure-LI-BYOS-Production, but entry?
CVE-2022-40150: no packages for Image SLES15-SP2-SAP-Azure-VLI-BYOS-Production, but entry?
CVE-2022-40150: no packages for Image SLES15-SP2-SAP-BYOS-Azure, but entry?
CVE-2022-40150: no packages for Image SLES15-SP2-SAP-BYOS-EC2-HVM, but entry?
CVE-2022-40150: no packages for Image SLES15-SP2-SAP-BYOS-GCE, but entry?
CVE-2022-40150: no packages for Image SLES15-SP2-SAP-EC2-HVM, but entry?
CVE-2022-40150: no packages for Image SLES15-SP2-SAP-GCE, but entry?
CVE-2022-40150: no packages for Image SLES15-SP3-Manager-4-2-Server-BYOS-Azure, but entry?
CVE-2022-40150: no packages for Image SLES15-SP3-Manager-4-2-Server-BYOS-EC2-HVM, but entry?
CVE-2022-40150: no packages for Image SLES15-SP3-Manager-4-2-Server-BYOS-GCE, but entry?
CVE-2022-40150: no packages for Image SLES15-SP3-SAP-Azure-LI-BYOS-Production, but entry?
CVE-2022-40150: no packages for Image SLES15-SP3-SAP-Azure-VLI-BYOS-Production, but entry?
CVE-2022-40150: no packages for Image SLES15-SP3-SAPCAL-Azure, but entry?
CVE-2022-40150: no packages for Image SLES15-SP3-SAPCAL-EC2-HVM, but entry?
CVE-2022-40150: no packages for Image SLES15-SP3-SAPCAL-GCE, but entry?
CVE-2022-40150: no packages for Image SLES15-SP4-Manager-Server-4-3, but entry?
CVE-2022-40150: no packages for Image SLES15-SP4-Manager-Server-4-3-Azure-llc, but entry?
CVE-2022-40150: no packages for Image SLES15-SP4-Manager-Server-4-3-Azure-ltd, but entry?
CVE-2022-40150: no packages for Image SLES15-SP4-Manager-Server-4-3-BYOS, but entry?
CVE-2022-40150: no packages for Image SLES15-SP4-Manager-Server-4-3-BYOS-Azure, but entry?
CVE-2022-40150: no packages for Image SLES15-SP4-Manager-Server-4-3-BYOS-EC2, but entry?
CVE-2022-40150: no packages for Image SLES15-SP4-Manager-Server-4-3-BYOS-GCE, but entry?
CVE-2022-40150: no packages for Image SLES15-SP4-Manager-Server-4-3-EC2-llc, but entry?
CVE-2022-40150: no packages for Image SLES15-SP4-Manager-Server-4-3-EC2-ltd, but entry?
CVE-2022-40150: no packages for Image SLES15-SP4-SAP, but entry?
CVE-2022-40150: no packages for Image SLES15-SP4-SAP-Azure, but entry?
CVE-2022-40150: no packages for Image SLES15-SP4-SAP-Azure-LI-BYOS, but entry?
CVE-2022-40150: no packages for Image SLES15-SP4-SAP-Azure-LI-BYOS-Production, but entry?
CVE-2022-40150: no packages for Image SLES15-SP4-SAP-Azure-VLI-BYOS, but entry?
CVE-2022-40150: no packages for Image SLES15-SP4-SAP-Azure-VLI-BYOS-Production, but entry?
CVE-2022-40150: no packages for Image SLES15-SP4-SAP-EC2, but entry?
CVE-2022-40150: no packages for Image SLES15-SP4-SAP-GCE, but entry?
CVE-2022-40150: no packages for Image SLES15-SP4-SAPCAL, but entry?
CVE-2022-40150: no packages for Image SLES15-SP4-SAPCAL-Azure, but entry?
CVE-2022-40150: no packages for Image SLES15-SP4-SAPCAL-EC2, but entry?
CVE-2022-40150: no packages for Image SLES15-SP4-SAPCAL-GCE, but entry?
CVE-2022-40150: no packages for Image SLES15-SP5-SAP-Azure, but entry?
CVE-2022-40150: no packages for Image SLES15-SP5-SAP-Azure-LI-BYOS, but entry?
CVE-2022-40150: no packages for Image SLES15-SP5-SAP-Azure-LI-BYOS-Production, but entry?
CVE-2022-40150: no packages for Image SLES15-SP5-SAP-Azure-VLI-BYOS, but entry?
CVE-2022-40150: no packages for Image SLES15-SP5-SAP-Azure-VLI-BYOS-Production, but entry?
CVE-2022-40150: no packages for Image SLES15-SP5-SAP-EC2, but entry?
CVE-2022-40150: no packages for Image SLES15-SP5-SAP-GCE, but entry?
CVE-2022-40150: no packages for Image SLES15-SP5-SAPCAL-Azure, but entry?
CVE-2022-40150: no packages for Image SLES15-SP5-SAPCAL-EC2, but entry?
CVE-2022-40150: no packages for Image SLES15-SP5-SAPCAL-GCE, but entry?
CVE-2022-40150: no packages for Image SLES15-SP6-SAP, but entry?
CVE-2022-40150: no packages for Image SLES15-SP6-SAP-Azure, but entry?
CVE-2022-40150: no packages for Image SLES15-SP6-SAP-Azure-LI-BYOS, but entry?
CVE-2022-40150: no packages for Image SLES15-SP6-SAP-Azure-LI-BYOS-Production, but entry?
CVE-2022-40150: no packages for Image SLES15-SP6-SAP-Azure-VLI-BYOS, but entry?
CVE-2022-40150: no packages for Image SLES15-SP6-SAP-Azure-VLI-BYOS-Production, but entry?
CVE-2022-40150: no packages for Image SLES15-SP6-SAP-EC2, but entry?
CVE-2022-40150: no packages for Image SLES15-SP6-SAP-GCE, but entry?
CVE-2022-40150: no packages for Image SLES15-SP6-SAPCAL, but entry?
CVE-2022-40150: no packages for Image SLES15-SP6-SAPCAL-Azure, but entry?
CVE-2022-40150: no packages for Image SLES15-SP6-SAPCAL-EC2, but entry?
CVE-2022-40150: no packages for Image SLES15-SP6-SAPCAL-GCE, but entry?
CVE-2022-40150: no packages for SUSE CaaS Platform 4.0, but entry?
CVE-2022-40150: no packages for SUSE Enterprise Storage 7, but entry?
CVE-2022-40150: no packages for SUSE Enterprise Storage 7.1, but entry?
CVE-2022-40150: no packages for SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS, but entry?
CVE-2022-40150: no packages for SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS, but entry?
CVE-2022-40150: no packages for SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS, but entry?
CVE-2022-40150: no packages for SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS, but entry?
CVE-2022-40150: no packages for SUSE Linux Enterprise Module for Basesystem 15 SP4, but entry?
CVE-2022-40150: no packages for SUSE Linux Enterprise Module for Basesystem 15 SP5, but entry?
CVE-2022-40150: no packages for SUSE Linux Enterprise Module for Basesystem 15 SP6, but entry?
CVE-2022-40150: no packages for SUSE Linux Enterprise Module for Development Tools 15 SP4, but entry?
CVE-2022-40150: no packages for SUSE Linux Enterprise Module for Development Tools 15 SP5, but entry?
CVE-2022-40150: no packages for SUSE Linux Enterprise Module for Development Tools 15 SP6, but entry?
CVE-2022-40150: no packages for SUSE Linux Enterprise Module for Package Hub 15 SP4, but entry?
CVE-2022-40150: no packages for SUSE Linux Enterprise Module for Package Hub 15 SP5, but entry?
CVE-2022-40150: no packages for SUSE Linux Enterprise Module for Package Hub 15 SP6, but entry?
CVE-2022-40150: no packages for SUSE Linux Enterprise Module for Web and Scripting 15 SP4, but entry?
CVE-2022-40150: no packages for SUSE Linux Enterprise Module for Web and Scripting 15 SP5, but entry?
CVE-2022-40150: no packages for SUSE Linux Enterprise Module for Web and Scripting 15 SP6, but entry?
CVE-2022-40150: no packages for SUSE Linux Enterprise Real Time 15 SP3, but entry?
CVE-2022-40150: no packages for SUSE Linux Enterprise Server 15 SP1-LTSS, but entry?
CVE-2022-40150: no packages for SUSE Linux Enterprise Server 15 SP2-LTSS, but entry?
CVE-2022-40150: no packages for SUSE Linux Enterprise Server 15 SP3-LTSS, but entry?
CVE-2022-40150: no packages for SUSE Linux Enterprise Server 15 SP4-TERADATA, but entry?
CVE-2022-40150: no packages for SUSE Linux Enterprise Server for SAP Applications 15 SP1, but entry?
CVE-2022-40150: no packages for SUSE Linux Enterprise Server for SAP Applications 15 SP2, but entry?
CVE-2022-40150: no packages for SUSE Linux Enterprise Server for SAP Applications 15 SP3, but entry?
CVE-2022-40150: no packages for SUSE Linux Enterprise Workstation Extension 15 SP4, but entry?
CVE-2022-40150: no packages for SUSE Linux Enterprise Workstation Extension 15 SP5, but entry?
CVE-2022-40150: no packages for SUSE Linux Enterprise Workstation Extension 15 SP6, but entry?
CVE-2022-40150: no packages for SUSE Manager Proxy 4.2, but entry?
CVE-2022-40150: no packages for SUSE Manager Retail Branch Server 4.2, but entry?
CVE-2022-40150: no packages for SUSE Manager Server 4.2, but entry?
CVE-2022-40150: no packages for SUSE Manager Server Module 4.2, but entry?
CVE-2022-40150: no packages for SUSE Manager Server Module 4.3, but entry?
CVE-2022-40150: no packages for Container bci/kiwi:9.24.43-8.6, but entry?
CVE-2022-40150: no packages for Container bci/openjdk-devel:11-6.2, but entry?
CVE-2022-40150: no packages for Container bci/openjdk-devel:17-14.11, but entry?
CVE-2022-40150: no packages for Container bci/openjdk-devel:17-7.2, but entry?
CVE-2022-40150: no packages for Container bci/openjdk:11-7.1, but entry?
CVE-2022-40150: no packages for Container bci/openjdk:17-7.1, but entry?
CVE-2022-40150: no packages for Container bci/openjdk:latest, but entry?
CVE-2022-40150: no packages for Container suse/manager/5.0/x86_64/server-attestation:5.0.0-beta2.2.16, but entry?
CVE-2022-40150: no packages for Container suse/manager/5.0/x86_64/server:5.0.0-beta1.2.122, but entry?
CVE-2022-40150: no packages for Image SLES15-SP2-SAP-Azure, but entry?
CVE-2022-40150: no packages for Image SLES15-SP2-SAP-Azure-LI-BYOS-Production, but entry?
CVE-2022-40150: no packages for Image SLES15-SP2-SAP-Azure-VLI-BYOS-Production, but entry?
CVE-2022-40150: no packages for Image SLES15-SP2-SAP-BYOS-Azure, but entry?
CVE-2022-40150: no packages for Image SLES15-SP2-SAP-BYOS-EC2-HVM, but entry?
CVE-2022-40150: no packages for Image SLES15-SP2-SAP-BYOS-GCE, but entry?
CVE-2022-40150: no packages for Image SLES15-SP2-SAP-EC2-HVM, but entry?
CVE-2022-40150: no packages for Image SLES15-SP2-SAP-GCE, but entry?
CVE-2022-40150: no packages for Image SLES15-SP3-Manager-4-2-Server-BYOS-Azure, but entry?
CVE-2022-40150: no packages for Image SLES15-SP3-Manager-4-2-Server-BYOS-EC2-HVM, but entry?
CVE-2022-40150: no packages for Image SLES15-SP3-Manager-4-2-Server-BYOS-GCE, but entry?
CVE-2022-40150: no packages for Image SLES15-SP3-SAP-Azure-LI-BYOS-Production, but entry?
CVE-2022-40150: no packages for Image SLES15-SP3-SAP-Azure-VLI-BYOS-Production, but entry?
CVE-2022-40150: no packages for Image SLES15-SP3-SAPCAL-Azure, but entry?
CVE-2022-40150: no packages for Image SLES15-SP3-SAPCAL-EC2-HVM, but entry?
CVE-2022-40150: no packages for Image SLES15-SP3-SAPCAL-GCE, but entry?
CVE-2022-40150: no packages for Image SLES15-SP4-Manager-Server-4-3, but entry?
CVE-2022-40150: no packages for Image SLES15-SP4-Manager-Server-4-3-Azure-llc, but entry?
CVE-2022-40150: no packages for Image SLES15-SP4-Manager-Server-4-3-Azure-ltd, but entry?
CVE-2022-40150: no packages for Image SLES15-SP4-Manager-Server-4-3-BYOS, but entry?
CVE-2022-40150: no packages for Image SLES15-SP4-Manager-Server-4-3-BYOS-Azure, but entry?
CVE-2022-40150: no packages for Image SLES15-SP4-Manager-Server-4-3-BYOS-EC2, but entry?
CVE-2022-40150: no packages for Image SLES15-SP4-Manager-Server-4-3-BYOS-GCE, but entry?
CVE-2022-40150: no packages for Image SLES15-SP4-Manager-Server-4-3-EC2-llc, but entry?
CVE-2022-40150: no packages for Image SLES15-SP4-Manager-Server-4-3-EC2-ltd, but entry?
CVE-2022-40150: no packages for Image SLES15-SP4-SAP, but entry?
CVE-2022-40150: no packages for Image SLES15-SP4-SAP-Azure, but entry?
CVE-2022-40150: no packages for Image SLES15-SP4-SAP-Azure-LI-BYOS, but entry?
CVE-2022-40150: no packages for Image SLES15-SP4-SAP-Azure-LI-BYOS-Production, but entry?
CVE-2022-40150: no packages for Image SLES15-SP4-SAP-Azure-VLI-BYOS, but entry?
CVE-2022-40150: no packages for Image SLES15-SP4-SAP-Azure-VLI-BYOS-Production, but entry?
CVE-2022-40150: no packages for Image SLES15-SP4-SAP-EC2, but entry?
CVE-2022-40150: no packages for Image SLES15-SP4-SAP-GCE, but entry?
CVE-2022-40150: no packages for Image SLES15-SP4-SAPCAL, but entry?
CVE-2022-40150: no packages for Image SLES15-SP4-SAPCAL-Azure, but entry?
CVE-2022-40150: no packages for Image SLES15-SP4-SAPCAL-EC2, but entry?
CVE-2022-40150: no packages for Image SLES15-SP4-SAPCAL-GCE, but entry?
CVE-2022-40150: no packages for Image SLES15-SP5-SAP-Azure, but entry?
CVE-2022-40150: no packages for Image SLES15-SP5-SAP-Azure-LI-BYOS, but entry?
CVE-2022-40150: no packages for Image SLES15-SP5-SAP-Azure-LI-BYOS-Production, but entry?
CVE-2022-40150: no packages for Image SLES15-SP5-SAP-Azure-VLI-BYOS, but entry?
CVE-2022-40150: no packages for Image SLES15-SP5-SAP-Azure-VLI-BYOS-Production, but entry?
CVE-2022-40150: no packages for Image SLES15-SP5-SAP-EC2, but entry?
CVE-2022-40150: no packages for Image SLES15-SP5-SAP-GCE, but entry?
CVE-2022-40150: no packages for Image SLES15-SP5-SAPCAL-Azure, but entry?
CVE-2022-40150: no packages for Image SLES15-SP5-SAPCAL-EC2, but entry?
CVE-2022-40150: no packages for Image SLES15-SP5-SAPCAL-GCE, but entry?
CVE-2022-40150: no packages for Image SLES15-SP6-SAP, but entry?
CVE-2022-40150: no packages for Image SLES15-SP6-SAP-Azure, but entry?
CVE-2022-40150: no packages for Image SLES15-SP6-SAP-Azure-LI-BYOS, but entry?
CVE-2022-40150: no packages for Image SLES15-SP6-SAP-Azure-LI-BYOS-Production, but entry?
CVE-2022-40150: no packages for Image SLES15-SP6-SAP-Azure-VLI-BYOS, but entry?
CVE-2022-40150: no packages for Image SLES15-SP6-SAP-Azure-VLI-BYOS-Production, but entry?
CVE-2022-40150: no packages for Image SLES15-SP6-SAP-EC2, but entry?
CVE-2022-40150: no packages for Image SLES15-SP6-SAP-GCE, but entry?
CVE-2022-40150: no packages for Image SLES15-SP6-SAPCAL, but entry?
CVE-2022-40150: no packages for Image SLES15-SP6-SAPCAL-Azure, but entry?
CVE-2022-40150: no packages for Image SLES15-SP6-SAPCAL-EC2, but entry?
CVE-2022-40150: no packages for Image SLES15-SP6-SAPCAL-GCE, but entry?
CVE-2022-40150: no packages for SUSE CaaS Platform 4.0, but entry?
CVE-2022-40150: no packages for SUSE Enterprise Storage 7, but entry?
CVE-2022-40150: no packages for SUSE Enterprise Storage 7.1, but entry?
CVE-2022-40150: no packages for SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS, but entry?
CVE-2022-40150: no packages for SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS, but entry?
CVE-2022-40150: no packages for SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS, but entry?
CVE-2022-40150: no packages for SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS, but entry?
CVE-2022-40150: no packages for SUSE Linux Enterprise Module for Basesystem 15 SP4, but entry?
CVE-2022-40150: no packages for SUSE Linux Enterprise Module for Basesystem 15 SP5, but entry?
CVE-2022-40150: no packages for SUSE Linux Enterprise Module for Basesystem 15 SP6, but entry?
CVE-2022-40150: no packages for SUSE Linux Enterprise Module for Development Tools 15 SP4, but entry?
CVE-2022-40150: no packages for SUSE Linux Enterprise Module for Development Tools 15 SP5, but entry?
CVE-2022-40150: no packages for SUSE Linux Enterprise Module for Development Tools 15 SP6, but entry?
CVE-2022-40150: no packages for SUSE Linux Enterprise Module for Package Hub 15 SP4, but entry?
CVE-2022-40150: no packages for SUSE Linux Enterprise Module for Package Hub 15 SP5, but entry?
CVE-2022-40150: no packages for SUSE Linux Enterprise Module for Package Hub 15 SP6, but entry?
CVE-2022-40150: no packages for SUSE Linux Enterprise Module for Web and Scripting 15 SP4, but entry?
CVE-2022-40150: no packages for SUSE Linux Enterprise Module for Web and Scripting 15 SP5, but entry?
CVE-2022-40150: no packages for SUSE Linux Enterprise Module for Web and Scripting 15 SP6, but entry?
CVE-2022-40150: no packages for SUSE Linux Enterprise Real Time 15 SP3, but entry?
CVE-2022-40150: no packages for SUSE Linux Enterprise Server 15 SP1-LTSS, but entry?
CVE-2022-40150: no packages for SUSE Linux Enterprise Server 15 SP2-LTSS, but entry?
CVE-2022-40150: no packages for SUSE Linux Enterprise Server 15 SP3-LTSS, but entry?
CVE-2022-40150: no packages for SUSE Linux Enterprise Server 15 SP4-TERADATA, but entry?
CVE-2022-40150: no packages for SUSE Linux Enterprise Server for SAP Applications 15 SP1, but entry?
CVE-2022-40150: no packages for SUSE Linux Enterprise Server for SAP Applications 15 SP2, but entry?
CVE-2022-40150: no packages for SUSE Linux Enterprise Server for SAP Applications 15 SP3, but entry?
CVE-2022-40150: no packages for SUSE Linux Enterprise Workstation Extension 15 SP4, but entry?
CVE-2022-40150: no packages for SUSE Linux Enterprise Workstation Extension 15 SP5, but entry?
CVE-2022-40150: no packages for SUSE Linux Enterprise Workstation Extension 15 SP6, but entry?
CVE-2022-40150: no packages for SUSE Manager Proxy 4.2, but entry?
CVE-2022-40150: no packages for SUSE Manager Retail Branch Server 4.2, but entry?
CVE-2022-40150: no packages for SUSE Manager Server 4.2, but entry?
CVE-2022-40150: no packages for SUSE Manager Server Module 4.2, but entry?
CVE-2022-40150: no packages for SUSE Manager Server Module 4.3, but entry?
skipping CVE-2022-40152 as CVE page is older than CVRF-CVE file.
skipping CVE-2022-40151 as CVE page is older than CVRF-CVE file.
CVE-2022-40149: no packages for Image SLES15-SP3-Manager-4-2-Server-BYOS-Azure, but entry?
CVE-2022-40149: no packages for Image SLES15-SP2-SAP-GCE, but entry?
CVE-2022-40149: no packages for Container bci/kiwi:9.24.43-8.6, but entry?
CVE-2022-40149: no packages for SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS, but entry?
CVE-2022-40149: no packages for Container bci/openjdk:11-7.1, but entry?
CVE-2022-40149: no packages for Image SLES15-SP4-SAP-EC2, but entry?
CVE-2022-40149: no packages for SUSE Linux Enterprise Server for SAP Applications 15 SP1, but entry?
CVE-2022-40149: no packages for Container bci/openjdk-devel:17-14.11, but entry?
CVE-2022-40149: no packages for Image SLES15-SP4-SAPCAL-EC2, but entry?
CVE-2022-40149: no packages for SUSE Linux Enterprise Module for Web and Scripting 15 SP4, but entry?
CVE-2022-40149: no packages for Image SLES15-SP5-SAPCAL-EC2, but entry?
CVE-2022-40149: no packages for Image SLES15-SP4-SAPCAL-Azure, but entry?
CVE-2022-40149: no packages for SUSE Linux Enterprise Server 15 SP4-TERADATA, but entry?
CVE-2022-40149: no packages for Image SLES15-SP6-SAP-Azure-LI-BYOS, but entry?
CVE-2022-40149: no packages for Image SLES15-SP4-SAP-Azure-VLI-BYOS, but entry?
CVE-2022-40149: no packages for Image SLES15-SP4-SAP-GCE, but entry?
CVE-2022-40149: no packages for Image SLES15-SP6-SAP-EC2, but entry?
CVE-2022-40149: no packages for Image SLES15-SP2-SAP-EC2-HVM, but entry?
CVE-2022-40149: no packages for Image SLES15-SP6-SAP-Azure-VLI-BYOS-Production, but entry?
CVE-2022-40149: no packages for SUSE Manager Server Module 4.3, but entry?
CVE-2022-40149: no packages for SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS, but entry?
CVE-2022-40149: no packages for Image SLES15-SP3-SAP-Azure-LI-BYOS-Production, but entry?
CVE-2022-40149: no packages for SUSE Linux Enterprise Workstation Extension 15 SP6, but entry?
CVE-2022-40149: no packages for SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS, but entry?
CVE-2022-40149: no packages for SUSE Linux Enterprise Server for SAP Applications 15 SP3, but entry?
CVE-2022-40149: no packages for SUSE Enterprise Storage 7, but entry?
CVE-2022-40149: no packages for SUSE Linux Enterprise Workstation Extension 15 SP5, but entry?
CVE-2022-40149: no packages for Image SLES15-SP5-SAP-GCE, but entry?
CVE-2022-40149: no packages for Container bci/openjdk-devel:17-7.2, but entry?
CVE-2022-40149: no packages for SUSE Linux Enterprise Server 15 SP1-LTSS, but entry?
CVE-2022-40149: no packages for Image SLES15-SP5-SAPCAL-Azure, but entry?
CVE-2022-40149: no packages for SUSE Linux Enterprise Server for SAP Applications 15 SP2, but entry?
CVE-2022-40149: no packages for Image SLES15-SP5-SAPCAL-GCE, but entry?
CVE-2022-40149: no packages for Image SLES15-SP6-SAP-Azure, but entry?
CVE-2022-40149: no packages for Image SLES15-SP4-SAP-Azure-VLI-BYOS-Production, but entry?
CVE-2022-40149: no packages for Image SLES15-SP4-Manager-Server-4-3-BYOS-EC2, but entry?
CVE-2022-40149: no packages for Image SLES15-SP5-SAP-Azure-LI-BYOS, but entry?
CVE-2022-40149: no packages for SUSE Manager Server Module 4.2, but entry?
CVE-2022-40149: no packages for Image SLES15-SP3-Manager-4-2-Server-BYOS-EC2-HVM, but entry?
CVE-2022-40149: no packages for Image SLES15-SP4-Manager-Server-4-3-BYOS-Azure, but entry?
CVE-2022-40149: no packages for Image SLES15-SP6-SAP-GCE, but entry?
CVE-2022-40149: no packages for Image SLES15-SP6-SAPCAL-GCE, but entry?
CVE-2022-40149: no packages for Container bci/openjdk-devel:11-6.2, but entry?
CVE-2022-40149: no packages for Image SLES15-SP4-Manager-Server-4-3-BYOS-GCE, but entry?
CVE-2022-40149: no packages for Image SLES15-SP5-SAP-Azure-VLI-BYOS-Production, but entry?
CVE-2022-40149: no packages for SUSE CaaS Platform 4.0, but entry?
CVE-2022-40149: no packages for Image SLES15-SP2-SAP-Azure-VLI-BYOS-Production, but entry?
CVE-2022-40149: no packages for Image SLES15-SP6-SAPCAL-Azure, but entry?
CVE-2022-40149: no packages for Image SLES15-SP2-SAP-BYOS-EC2-HVM, but entry?
CVE-2022-40149: no packages for Image SLES15-SP6-SAP-Azure-VLI-BYOS, but entry?
CVE-2022-40149: no packages for Container suse/manager/5.0/x86_64/server-attestation:5.0.0-beta2.2.16, but entry?
CVE-2022-40149: no packages for Image SLES15-SP5-SAP-Azure, but entry?
CVE-2022-40149: no packages for SUSE Linux Enterprise Module for Basesystem 15 SP6, but entry?
CVE-2022-40149: no packages for Image SLES15-SP5-SAP-Azure-LI-BYOS-Production, but entry?
CVE-2022-40149: no packages for Image SLES15-SP5-SAP-Azure-VLI-BYOS, but entry?
CVE-2022-40149: no packages for Image SLES15-SP6-SAPCAL, but entry?
CVE-2022-40149: no packages for Image SLES15-SP3-SAPCAL-Azure, but entry?
CVE-2022-40149: no packages for Image SLES15-SP4-Manager-Server-4-3-EC2-ltd, but entry?
CVE-2022-40149: no packages for Image SLES15-SP3-SAP-Azure-VLI-BYOS-Production, but entry?
CVE-2022-40149: no packages for SUSE Linux Enterprise Module for Basesystem 15 SP4, but entry?
CVE-2022-40149: no packages for SUSE Linux Enterprise Module for Package Hub 15 SP6, but entry?
CVE-2022-40149: no packages for SUSE Linux Enterprise Server 15 SP3-LTSS, but entry?
CVE-2022-40149: no packages for Image SLES15-SP4-Manager-Server-4-3-Azure-llc, but entry?
CVE-2022-40149: no packages for Container bci/openjdk:17-7.1, but entry?
CVE-2022-40149: no packages for Image SLES15-SP2-SAP-BYOS-GCE, but entry?
CVE-2022-40149: no packages for Image SLES15-SP3-Manager-4-2-Server-BYOS-GCE, but entry?
CVE-2022-40149: no packages for Container bci/openjdk:latest, but entry?
CVE-2022-40149: no packages for SUSE Linux Enterprise Module for Development Tools 15 SP4, but entry?
CVE-2022-40149: no packages for SUSE Linux Enterprise Module for Web and Scripting 15 SP6, but entry?
CVE-2022-40149: no packages for Image SLES15-SP4-SAPCAL, but entry?
CVE-2022-40149: no packages for Image SLES15-SP6-SAPCAL-EC2, but entry?
CVE-2022-40149: no packages for Image SLES15-SP4-Manager-Server-4-3-Azure-ltd, but entry?
CVE-2022-40149: no packages for Image SLES15-SP2-SAP-BYOS-Azure, but entry?
CVE-2022-40149: no packages for SUSE Linux Enterprise Module for Development Tools 15 SP5, but entry?
CVE-2022-40149: no packages for SUSE Linux Enterprise Module for Web and Scripting 15 SP5, but entry?
CVE-2022-40149: no packages for Image SLES15-SP5-SAP-EC2, but entry?
CVE-2022-40149: no packages for SUSE Linux Enterprise Real Time 15 SP3, but entry?
CVE-2022-40149: no packages for Image SLES15-SP6-SAP-Azure-LI-BYOS-Production, but entry?
CVE-2022-40149: no packages for SUSE Linux Enterprise Server 15 SP2-LTSS, but entry?
CVE-2022-40149: no packages for SUSE Linux Enterprise Module for Package Hub 15 SP4, but entry?
CVE-2022-40149: no packages for SUSE Linux Enterprise Workstation Extension 15 SP4, but entry?
CVE-2022-40149: no packages for SUSE Linux Enterprise Module for Package Hub 15 SP5, but entry?
CVE-2022-40149: no packages for Image SLES15-SP4-SAP-Azure, but entry?
CVE-2022-40149: no packages for Image SLES15-SP4-Manager-Server-4-3-EC2-llc, but entry?
CVE-2022-40149: no packages for SUSE Manager Proxy 4.2, but entry?
CVE-2022-40149: no packages for SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS, but entry?
CVE-2022-40149: no packages for SUSE Manager Retail Branch Server 4.2, but entry?
CVE-2022-40149: no packages for Image SLES15-SP4-SAP, but entry?
CVE-2022-40149: no packages for Image SLES15-SP4-Manager-Server-4-3, but entry?
CVE-2022-40149: no packages for Image SLES15-SP2-SAP-Azure-LI-BYOS-Production, but entry?
CVE-2022-40149: no packages for Image SLES15-SP3-SAPCAL-EC2-HVM, but entry?
CVE-2022-40149: no packages for SUSE Manager Server 4.2, but entry?
CVE-2022-40149: no packages for Image SLES15-SP4-SAP-Azure-LI-BYOS-Production, but entry?
CVE-2022-40149: no packages for Image SLES15-SP4-SAP-Azure-LI-BYOS, but entry?
CVE-2022-40149: no packages for SUSE Enterprise Storage 7.1, but entry?
CVE-2022-40149: no packages for SUSE Linux Enterprise Module for Development Tools 15 SP6, but entry?
CVE-2022-40149: no packages for Image SLES15-SP4-Manager-Server-4-3-BYOS, but entry?
CVE-2022-40149: no packages for Container suse/manager/5.0/x86_64/server:5.0.0-beta1.2.122, but entry?
CVE-2022-40149: no packages for Image SLES15-SP2-SAP-Azure, but entry?
CVE-2022-40149: no packages for SUSE Linux Enterprise Module for Basesystem 15 SP5, but entry?
CVE-2022-40149: no packages for Image SLES15-SP4-SAPCAL-GCE, but entry?
CVE-2022-40149: no packages for Image SLES15-SP6-SAP, but entry?
CVE-2022-40149: no packages for Image SLES15-SP3-SAPCAL-GCE, but entry?
CVE-2022-40149: no packages for Container bci/kiwi:9.24.43-8.6, but entry?
CVE-2022-40149: no packages for Container bci/openjdk-devel:11-6.2, but entry?
CVE-2022-40149: no packages for Container bci/openjdk-devel:17-14.11, but entry?
CVE-2022-40149: no packages for Container bci/openjdk-devel:17-7.2, but entry?
CVE-2022-40149: no packages for Container bci/openjdk:11-7.1, but entry?
CVE-2022-40149: no packages for Container bci/openjdk:17-7.1, but entry?
CVE-2022-40149: no packages for Container bci/openjdk:latest, but entry?
CVE-2022-40149: no packages for Container suse/manager/5.0/x86_64/server-attestation:5.0.0-beta2.2.16, but entry?
CVE-2022-40149: no packages for Container suse/manager/5.0/x86_64/server:5.0.0-beta1.2.122, but entry?
CVE-2022-40149: no packages for Image SLES15-SP2-SAP-Azure, but entry?
CVE-2022-40149: no packages for Image SLES15-SP2-SAP-Azure-LI-BYOS-Production, but entry?
CVE-2022-40149: no packages for Image SLES15-SP2-SAP-Azure-VLI-BYOS-Production, but entry?
CVE-2022-40149: no packages for Image SLES15-SP2-SAP-BYOS-Azure, but entry?
CVE-2022-40149: no packages for Image SLES15-SP2-SAP-BYOS-EC2-HVM, but entry?
CVE-2022-40149: no packages for Image SLES15-SP2-SAP-BYOS-GCE, but entry?
CVE-2022-40149: no packages for Image SLES15-SP2-SAP-EC2-HVM, but entry?
CVE-2022-40149: no packages for Image SLES15-SP2-SAP-GCE, but entry?
CVE-2022-40149: no packages for Image SLES15-SP3-Manager-4-2-Server-BYOS-Azure, but entry?
CVE-2022-40149: no packages for Image SLES15-SP3-Manager-4-2-Server-BYOS-EC2-HVM, but entry?
CVE-2022-40149: no packages for Image SLES15-SP3-Manager-4-2-Server-BYOS-GCE, but entry?
CVE-2022-40149: no packages for Image SLES15-SP3-SAP-Azure-LI-BYOS-Production, but entry?
CVE-2022-40149: no packages for Image SLES15-SP3-SAP-Azure-VLI-BYOS-Production, but entry?
CVE-2022-40149: no packages for Image SLES15-SP3-SAPCAL-Azure, but entry?
CVE-2022-40149: no packages for Image SLES15-SP3-SAPCAL-EC2-HVM, but entry?
CVE-2022-40149: no packages for Image SLES15-SP3-SAPCAL-GCE, but entry?
CVE-2022-40149: no packages for Image SLES15-SP4-Manager-Server-4-3, but entry?
CVE-2022-40149: no packages for Image SLES15-SP4-Manager-Server-4-3-Azure-llc, but entry?
CVE-2022-40149: no packages for Image SLES15-SP4-Manager-Server-4-3-Azure-ltd, but entry?
CVE-2022-40149: no packages for Image SLES15-SP4-Manager-Server-4-3-BYOS, but entry?
CVE-2022-40149: no packages for Image SLES15-SP4-Manager-Server-4-3-BYOS-Azure, but entry?
CVE-2022-40149: no packages for Image SLES15-SP4-Manager-Server-4-3-BYOS-EC2, but entry?
CVE-2022-40149: no packages for Image SLES15-SP4-Manager-Server-4-3-BYOS-GCE, but entry?
CVE-2022-40149: no packages for Image SLES15-SP4-Manager-Server-4-3-EC2-llc, but entry?
CVE-2022-40149: no packages for Image SLES15-SP4-Manager-Server-4-3-EC2-ltd, but entry?
CVE-2022-40149: no packages for Image SLES15-SP4-SAP, but entry?
CVE-2022-40149: no packages for Image SLES15-SP4-SAP-Azure, but entry?
CVE-2022-40149: no packages for Image SLES15-SP4-SAP-Azure-LI-BYOS, but entry?
CVE-2022-40149: no packages for Image SLES15-SP4-SAP-Azure-LI-BYOS-Production, but entry?
CVE-2022-40149: no packages for Image SLES15-SP4-SAP-Azure-VLI-BYOS, but entry?
CVE-2022-40149: no packages for Image SLES15-SP4-SAP-Azure-VLI-BYOS-Production, but entry?
CVE-2022-40149: no packages for Image SLES15-SP4-SAP-EC2, but entry?
CVE-2022-40149: no packages for Image SLES15-SP4-SAP-GCE, but entry?
CVE-2022-40149: no packages for Image SLES15-SP4-SAPCAL, but entry?
CVE-2022-40149: no packages for Image SLES15-SP4-SAPCAL-Azure, but entry?
CVE-2022-40149: no packages for Image SLES15-SP4-SAPCAL-EC2, but entry?
CVE-2022-40149: no packages for Image SLES15-SP4-SAPCAL-GCE, but entry?
CVE-2022-40149: no packages for Image SLES15-SP5-SAP-Azure, but entry?
CVE-2022-40149: no packages for Image SLES15-SP5-SAP-Azure-LI-BYOS, but entry?
CVE-2022-40149: no packages for Image SLES15-SP5-SAP-Azure-LI-BYOS-Production, but entry?
CVE-2022-40149: no packages for Image SLES15-SP5-SAP-Azure-VLI-BYOS, but entry?
CVE-2022-40149: no packages for Image SLES15-SP5-SAP-Azure-VLI-BYOS-Production, but entry?
CVE-2022-40149: no packages for Image SLES15-SP5-SAP-EC2, but entry?
CVE-2022-40149: no packages for Image SLES15-SP5-SAP-GCE, but entry?
CVE-2022-40149: no packages for Image SLES15-SP5-SAPCAL-Azure, but entry?
CVE-2022-40149: no packages for Image SLES15-SP5-SAPCAL-EC2, but entry?
CVE-2022-40149: no packages for Image SLES15-SP5-SAPCAL-GCE, but entry?
CVE-2022-40149: no packages for Image SLES15-SP6-SAP, but entry?
CVE-2022-40149: no packages for Image SLES15-SP6-SAP-Azure, but entry?
CVE-2022-40149: no packages for Image SLES15-SP6-SAP-Azure-LI-BYOS, but entry?
CVE-2022-40149: no packages for Image SLES15-SP6-SAP-Azure-LI-BYOS-Production, but entry?
CVE-2022-40149: no packages for Image SLES15-SP6-SAP-Azure-VLI-BYOS, but entry?
CVE-2022-40149: no packages for Image SLES15-SP6-SAP-Azure-VLI-BYOS-Production, but entry?
CVE-2022-40149: no packages for Image SLES15-SP6-SAP-EC2, but entry?
CVE-2022-40149: no packages for Image SLES15-SP6-SAP-GCE, but entry?
CVE-2022-40149: no packages for Image SLES15-SP6-SAPCAL, but entry?
CVE-2022-40149: no packages for Image SLES15-SP6-SAPCAL-Azure, but entry?
CVE-2022-40149: no packages for Image SLES15-SP6-SAPCAL-EC2, but entry?
CVE-2022-40149: no packages for Image SLES15-SP6-SAPCAL-GCE, but entry?
CVE-2022-40149: no packages for SUSE CaaS Platform 4.0, but entry?
CVE-2022-40149: no packages for SUSE Enterprise Storage 7, but entry?
CVE-2022-40149: no packages for SUSE Enterprise Storage 7.1, but entry?
CVE-2022-40149: no packages for SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS, but entry?
CVE-2022-40149: no packages for SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS, but entry?
CVE-2022-40149: no packages for SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS, but entry?
CVE-2022-40149: no packages for SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS, but entry?
CVE-2022-40149: no packages for SUSE Linux Enterprise Module for Basesystem 15 SP4, but entry?
CVE-2022-40149: no packages for SUSE Linux Enterprise Module for Basesystem 15 SP5, but entry?
CVE-2022-40149: no packages for SUSE Linux Enterprise Module for Basesystem 15 SP6, but entry?
CVE-2022-40149: no packages for SUSE Linux Enterprise Module for Development Tools 15 SP4, but entry?
CVE-2022-40149: no packages for SUSE Linux Enterprise Module for Development Tools 15 SP5, but entry?
CVE-2022-40149: no packages for SUSE Linux Enterprise Module for Development Tools 15 SP6, but entry?
CVE-2022-40149: no packages for SUSE Linux Enterprise Module for Package Hub 15 SP4, but entry?
CVE-2022-40149: no packages for SUSE Linux Enterprise Module for Package Hub 15 SP5, but entry?
CVE-2022-40149: no packages for SUSE Linux Enterprise Module for Package Hub 15 SP6, but entry?
CVE-2022-40149: no packages for SUSE Linux Enterprise Module for Web and Scripting 15 SP4, but entry?
CVE-2022-40149: no packages for SUSE Linux Enterprise Module for Web and Scripting 15 SP5, but entry?
CVE-2022-40149: no packages for SUSE Linux Enterprise Module for Web and Scripting 15 SP6, but entry?
CVE-2022-40149: no packages for SUSE Linux Enterprise Real Time 15 SP3, but entry?
CVE-2022-40149: no packages for SUSE Linux Enterprise Server 15 SP1-LTSS, but entry?
CVE-2022-40149: no packages for SUSE Linux Enterprise Server 15 SP2-LTSS, but entry?
CVE-2022-40149: no packages for SUSE Linux Enterprise Server 15 SP3-LTSS, but entry?
CVE-2022-40149: no packages for SUSE Linux Enterprise Server 15 SP4-TERADATA, but entry?
CVE-2022-40149: no packages for SUSE Linux Enterprise Server for SAP Applications 15 SP1, but entry?
CVE-2022-40149: no packages for SUSE Linux Enterprise Server for SAP Applications 15 SP2, but entry?
CVE-2022-40149: no packages for SUSE Linux Enterprise Server for SAP Applications 15 SP3, but entry?
CVE-2022-40149: no packages for SUSE Linux Enterprise Workstation Extension 15 SP4, but entry?
CVE-2022-40149: no packages for SUSE Linux Enterprise Workstation Extension 15 SP5, but entry?
CVE-2022-40149: no packages for SUSE Linux Enterprise Workstation Extension 15 SP6, but entry?
CVE-2022-40149: no packages for SUSE Manager Proxy 4.2, but entry?
CVE-2022-40149: no packages for SUSE Manager Retail Branch Server 4.2, but entry?
CVE-2022-40149: no packages for SUSE Manager Server 4.2, but entry?
CVE-2022-40149: no packages for SUSE Manager Server Module 4.2, but entry?
CVE-2022-40149: no packages for SUSE Manager Server Module 4.3, but entry?
CVE-2022-40149: no packages for Container bci/kiwi:9.24.43-8.6, but entry?
CVE-2022-40149: no packages for Container bci/openjdk-devel:11-6.2, but entry?
CVE-2022-40149: no packages for Container bci/openjdk-devel:17-14.11, but entry?
CVE-2022-40149: no packages for Container bci/openjdk-devel:17-7.2, but entry?
CVE-2022-40149: no packages for Container bci/openjdk:11-7.1, but entry?
CVE-2022-40149: no packages for Container bci/openjdk:17-7.1, but entry?
CVE-2022-40149: no packages for Container bci/openjdk:latest, but entry?
CVE-2022-40149: no packages for Container suse/manager/5.0/x86_64/server-attestation:5.0.0-beta2.2.16, but entry?
CVE-2022-40149: no packages for Container suse/manager/5.0/x86_64/server:5.0.0-beta1.2.122, but entry?
CVE-2022-40149: no packages for Image SLES15-SP2-SAP-Azure, but entry?
CVE-2022-40149: no packages for Image SLES15-SP2-SAP-Azure-LI-BYOS-Production, but entry?
CVE-2022-40149: no packages for Image SLES15-SP2-SAP-Azure-VLI-BYOS-Production, but entry?
CVE-2022-40149: no packages for Image SLES15-SP2-SAP-BYOS-Azure, but entry?
CVE-2022-40149: no packages for Image SLES15-SP2-SAP-BYOS-EC2-HVM, but entry?
CVE-2022-40149: no packages for Image SLES15-SP2-SAP-BYOS-GCE, but entry?
CVE-2022-40149: no packages for Image SLES15-SP2-SAP-EC2-HVM, but entry?
CVE-2022-40149: no packages for Image SLES15-SP2-SAP-GCE, but entry?
CVE-2022-40149: no packages for Image SLES15-SP3-Manager-4-2-Server-BYOS-Azure, but entry?
CVE-2022-40149: no packages for Image SLES15-SP3-Manager-4-2-Server-BYOS-EC2-HVM, but entry?
CVE-2022-40149: no packages for Image SLES15-SP3-Manager-4-2-Server-BYOS-GCE, but entry?
CVE-2022-40149: no packages for Image SLES15-SP3-SAP-Azure-LI-BYOS-Production, but entry?
CVE-2022-40149: no packages for Image SLES15-SP3-SAP-Azure-VLI-BYOS-Production, but entry?
CVE-2022-40149: no packages for Image SLES15-SP3-SAPCAL-Azure, but entry?
CVE-2022-40149: no packages for Image SLES15-SP3-SAPCAL-EC2-HVM, but entry?
CVE-2022-40149: no packages for Image SLES15-SP3-SAPCAL-GCE, but entry?
CVE-2022-40149: no packages for Image SLES15-SP4-Manager-Server-4-3, but entry?
CVE-2022-40149: no packages for Image SLES15-SP4-Manager-Server-4-3-Azure-llc, but entry?
CVE-2022-40149: no packages for Image SLES15-SP4-Manager-Server-4-3-Azure-ltd, but entry?
CVE-2022-40149: no packages for Image SLES15-SP4-Manager-Server-4-3-BYOS, but entry?
CVE-2022-40149: no packages for Image SLES15-SP4-Manager-Server-4-3-BYOS-Azure, but entry?
CVE-2022-40149: no packages for Image SLES15-SP4-Manager-Server-4-3-BYOS-EC2, but entry?
CVE-2022-40149: no packages for Image SLES15-SP4-Manager-Server-4-3-BYOS-GCE, but entry?
CVE-2022-40149: no packages for Image SLES15-SP4-Manager-Server-4-3-EC2-llc, but entry?
CVE-2022-40149: no packages for Image SLES15-SP4-Manager-Server-4-3-EC2-ltd, but entry?
CVE-2022-40149: no packages for Image SLES15-SP4-SAP, but entry?
CVE-2022-40149: no packages for Image SLES15-SP4-SAP-Azure, but entry?
CVE-2022-40149: no packages for Image SLES15-SP4-SAP-Azure-LI-BYOS, but entry?
CVE-2022-40149: no packages for Image SLES15-SP4-SAP-Azure-LI-BYOS-Production, but entry?
CVE-2022-40149: no packages for Image SLES15-SP4-SAP-Azure-VLI-BYOS, but entry?
CVE-2022-40149: no packages for Image SLES15-SP4-SAP-Azure-VLI-BYOS-Production, but entry?
CVE-2022-40149: no packages for Image SLES15-SP4-SAP-EC2, but entry?
CVE-2022-40149: no packages for Image SLES15-SP4-SAP-GCE, but entry?
CVE-2022-40149: no packages for Image SLES15-SP4-SAPCAL, but entry?
CVE-2022-40149: no packages for Image SLES15-SP4-SAPCAL-Azure, but entry?
CVE-2022-40149: no packages for Image SLES15-SP4-SAPCAL-EC2, but entry?
CVE-2022-40149: no packages for Image SLES15-SP4-SAPCAL-GCE, but entry?
CVE-2022-40149: no packages for Image SLES15-SP5-SAP-Azure, but entry?
CVE-2022-40149: no packages for Image SLES15-SP5-SAP-Azure-LI-BYOS, but entry?
CVE-2022-40149: no packages for Image SLES15-SP5-SAP-Azure-LI-BYOS-Production, but entry?
CVE-2022-40149: no packages for Image SLES15-SP5-SAP-Azure-VLI-BYOS, but entry?
CVE-2022-40149: no packages for Image SLES15-SP5-SAP-Azure-VLI-BYOS-Production, but entry?
CVE-2022-40149: no packages for Image SLES15-SP5-SAP-EC2, but entry?
CVE-2022-40149: no packages for Image SLES15-SP5-SAP-GCE, but entry?
CVE-2022-40149: no packages for Image SLES15-SP5-SAPCAL-Azure, but entry?
CVE-2022-40149: no packages for Image SLES15-SP5-SAPCAL-EC2, but entry?
CVE-2022-40149: no packages for Image SLES15-SP5-SAPCAL-GCE, but entry?
CVE-2022-40149: no packages for Image SLES15-SP6-SAP, but entry?
CVE-2022-40149: no packages for Image SLES15-SP6-SAP-Azure, but entry?
CVE-2022-40149: no packages for Image SLES15-SP6-SAP-Azure-LI-BYOS, but entry?
CVE-2022-40149: no packages for Image SLES15-SP6-SAP-Azure-LI-BYOS-Production, but entry?
CVE-2022-40149: no packages for Image SLES15-SP6-SAP-Azure-VLI-BYOS, but entry?
CVE-2022-40149: no packages for Image SLES15-SP6-SAP-Azure-VLI-BYOS-Production, but entry?
CVE-2022-40149: no packages for Image SLES15-SP6-SAP-EC2, but entry?
CVE-2022-40149: no packages for Image SLES15-SP6-SAP-GCE, but entry?
CVE-2022-40149: no packages for Image SLES15-SP6-SAPCAL, but entry?
CVE-2022-40149: no packages for Image SLES15-SP6-SAPCAL-Azure, but entry?
CVE-2022-40149: no packages for Image SLES15-SP6-SAPCAL-EC2, but entry?
CVE-2022-40149: no packages for Image SLES15-SP6-SAPCAL-GCE, but entry?
CVE-2022-40149: no packages for SUSE CaaS Platform 4.0, but entry?
CVE-2022-40149: no packages for SUSE Enterprise Storage 7, but entry?
CVE-2022-40149: no packages for SUSE Enterprise Storage 7.1, but entry?
CVE-2022-40149: no packages for SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS, but entry?
CVE-2022-40149: no packages for SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS, but entry?
CVE-2022-40149: no packages for SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS, but entry?
CVE-2022-40149: no packages for SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS, but entry?
CVE-2022-40149: no packages for SUSE Linux Enterprise Module for Basesystem 15 SP4, but entry?
CVE-2022-40149: no packages for SUSE Linux Enterprise Module for Basesystem 15 SP5, but entry?
CVE-2022-40149: no packages for SUSE Linux Enterprise Module for Basesystem 15 SP6, but entry?
CVE-2022-40149: no packages for SUSE Linux Enterprise Module for Development Tools 15 SP4, but entry?
CVE-2022-40149: no packages for SUSE Linux Enterprise Module for Development Tools 15 SP5, but entry?
CVE-2022-40149: no packages for SUSE Linux Enterprise Module for Development Tools 15 SP6, but entry?
CVE-2022-40149: no packages for SUSE Linux Enterprise Module for Package Hub 15 SP4, but entry?
CVE-2022-40149: no packages for SUSE Linux Enterprise Module for Package Hub 15 SP5, but entry?
CVE-2022-40149: no packages for SUSE Linux Enterprise Module for Package Hub 15 SP6, but entry?
CVE-2022-40149: no packages for SUSE Linux Enterprise Module for Web and Scripting 15 SP4, but entry?
CVE-2022-40149: no packages for SUSE Linux Enterprise Module for Web and Scripting 15 SP5, but entry?
CVE-2022-40149: no packages for SUSE Linux Enterprise Module for Web and Scripting 15 SP6, but entry?
CVE-2022-40149: no packages for SUSE Linux Enterprise Real Time 15 SP3, but entry?
CVE-2022-40149: no packages for SUSE Linux Enterprise Server 15 SP1-LTSS, but entry?
CVE-2022-40149: no packages for SUSE Linux Enterprise Server 15 SP2-LTSS, but entry?
CVE-2022-40149: no packages for SUSE Linux Enterprise Server 15 SP3-LTSS, but entry?
CVE-2022-40149: no packages for SUSE Linux Enterprise Server 15 SP4-TERADATA, but entry?
CVE-2022-40149: no packages for SUSE Linux Enterprise Server for SAP Applications 15 SP1, but entry?
CVE-2022-40149: no packages for SUSE Linux Enterprise Server for SAP Applications 15 SP2, but entry?
CVE-2022-40149: no packages for SUSE Linux Enterprise Server for SAP Applications 15 SP3, but entry?
CVE-2022-40149: no packages for SUSE Linux Enterprise Workstation Extension 15 SP4, but entry?
CVE-2022-40149: no packages for SUSE Linux Enterprise Workstation Extension 15 SP5, but entry?
CVE-2022-40149: no packages for SUSE Linux Enterprise Workstation Extension 15 SP6, but entry?
CVE-2022-40149: no packages for SUSE Manager Proxy 4.2, but entry?
CVE-2022-40149: no packages for SUSE Manager Retail Branch Server 4.2, but entry?
CVE-2022-40149: no packages for SUSE Manager Server 4.2, but entry?
CVE-2022-40149: no packages for SUSE Manager Server Module 4.2, but entry?
CVE-2022-40149: no packages for SUSE Manager Server Module 4.3, but entry?
CVE-2022-40146: no packages for SUSE Linux Enterprise Server 15 SP4-TERADATA, but entry?
CVE-2022-40146: no packages for Image SLES15-SP4-SAP-Azure-VLI-BYOS, but entry?
CVE-2022-40146: no packages for Image SLES15-SP6-SAP-Azure-LI-BYOS, but entry?
CVE-2022-40146: no packages for Image SLES15-SP4-SAP-GCE, but entry?
CVE-2022-40146: no packages for Image SLES15-SP6-SAP-EC2, but entry?
CVE-2022-40146: no packages for Image SLES15-SP3-SAP-Azure-LI-BYOS-Production, but entry?
CVE-2022-40146: no packages for SUSE Linux Enterprise Workstation Extension 15 SP6, but entry?
CVE-2022-40146: no packages for SUSE Manager Server Module 4.3, but entry?
CVE-2022-40146: no packages for Image SLES15-SP2-SAP-EC2-HVM, but entry?
CVE-2022-40146: no packages for Image SLES15-SP6-SAP-Azure-VLI-BYOS-Production, but entry?
CVE-2022-40146: no packages for Image SLES15-SP3-Manager-4-2-Server-BYOS-Azure, but entry?
CVE-2022-40146: no packages for Image SLES15-SP2-SAP-GCE, but entry?
CVE-2022-40146: no packages for Container bci/openjdk-devel:17-14.11, but entry?
CVE-2022-40146: no packages for Container bci/kiwi:9.24.43-8.6, but entry?
CVE-2022-40146: no packages for SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS, but entry?
CVE-2022-40146: no packages for Image SLES15-SP4-SAP-EC2, but entry?
CVE-2022-40146: no packages for SUSE Linux Enterprise Server for SAP Applications 15 SP1, but entry?
CVE-2022-40146: no packages for Container bci/openjdk:11-7.1, but entry?
CVE-2022-40146: no packages for Image SLES15-SP5-SAPCAL-EC2, but entry?
CVE-2022-40146: no packages for Image SLES15-SP4-SAPCAL-Azure, but entry?
CVE-2022-40146: no packages for SUSE Linux Enterprise Module for Web and Scripting 15 SP4, but entry?
CVE-2022-40146: no packages for Image SLES15-SP4-SAPCAL-EC2, but entry?
CVE-2022-40146: no packages for Image SLES15-SP5-SAP-Azure-VLI-BYOS-Production, but entry?
CVE-2022-40146: no packages for SUSE CaaS Platform 4.0, but entry?
CVE-2022-40146: no packages for Image SLES15-SP2-SAP-BYOS-EC2-HVM, but entry?
CVE-2022-40146: no packages for Image SLES15-SP6-SAPCAL-Azure, but entry?
CVE-2022-40146: no packages for Image SLES15-SP2-SAP-Azure-VLI-BYOS-Production, but entry?
CVE-2022-40146: no packages for Image SLES15-SP5-SAP-Azure, but entry?
CVE-2022-40146: no packages for Image SLES15-SP6-SAP-Azure-VLI-BYOS, but entry?
CVE-2022-40146: no packages for Container suse/manager/5.0/x86_64/server-attestation:5.0.0-beta2.2.16, but entry?
CVE-2022-40146: no packages for Image SLES15-SP5-SAP-GCE, but entry?
CVE-2022-40146: no packages for SUSE Linux Enterprise Workstation Extension 15 SP5, but entry?
CVE-2022-40146: no packages for Image SLES15-SP5-SAPCAL-Azure, but entry?
CVE-2022-40146: no packages for Container bci/openjdk-devel:17-7.2, but entry?
CVE-2022-40146: no packages for SUSE Linux Enterprise Server 15 SP1-LTSS, but entry?
CVE-2022-40146: no packages for Image SLES15-SP4-Manager-Server-4-3-BYOS-EC2, but entry?
CVE-2022-40146: no packages for Image SLES15-SP5-SAP-Azure-LI-BYOS, but entry?
CVE-2022-40146: no packages for SUSE Manager Server Module 4.2, but entry?
CVE-2022-40146: no packages for Image SLES15-SP6-SAP-Azure, but entry?
CVE-2022-40146: no packages for Image SLES15-SP5-SAPCAL-GCE, but entry?
CVE-2022-40146: no packages for Image SLES15-SP4-SAP-Azure-VLI-BYOS-Production, but entry?
CVE-2022-40146: no packages for Image SLES15-SP6-SAPCAL-GCE, but entry?
CVE-2022-40146: no packages for Image SLES15-SP4-Manager-Server-4-3-BYOS-GCE, but entry?
CVE-2022-40146: no packages for Container bci/openjdk-devel:11-6.2, but entry?
CVE-2022-40146: no packages for Image SLES15-SP3-Manager-4-2-Server-BYOS-EC2-HVM, but entry?
CVE-2022-40146: no packages for Image SLES15-SP6-SAP-GCE, but entry?
CVE-2022-40146: no packages for Image SLES15-SP4-Manager-Server-4-3-BYOS-Azure, but entry?
CVE-2022-40146: no packages for Container bci/openjdk:latest, but entry?
CVE-2022-40146: no packages for SUSE Linux Enterprise Module for Web and Scripting 15 SP6, but entry?
CVE-2022-40146: no packages for Image SLES15-SP3-Manager-4-2-Server-BYOS-GCE, but entry?
CVE-2022-40146: no packages for Image SLES15-SP4-SAPCAL, but entry?
CVE-2022-40146: no packages for Image SLES15-SP6-SAPCAL-EC2, but entry?
CVE-2022-40146: no packages for Image SLES15-SP2-SAP-BYOS-Azure, but entry?
CVE-2022-40146: no packages for Image SLES15-SP4-Manager-Server-4-3-Azure-ltd, but entry?
CVE-2022-40146: no packages for SUSE Linux Enterprise Module for Web and Scripting 15 SP5, but entry?
CVE-2022-40146: no packages for Image SLES15-SP5-SAP-EC2, but entry?
CVE-2022-40146: no packages for Image SLES15-SP6-SAPCAL, but entry?
CVE-2022-40146: no packages for Image SLES15-SP5-SAP-Azure-VLI-BYOS, but entry?
CVE-2022-40146: no packages for Image SLES15-SP5-SAP-Azure-LI-BYOS-Production, but entry?
CVE-2022-40146: no packages for SUSE Linux Enterprise Module for Basesystem 15 SP6, but entry?
CVE-2022-40146: no packages for Image SLES15-SP3-SAP-Azure-VLI-BYOS-Production, but entry?
CVE-2022-40146: no packages for Image SLES15-SP3-SAPCAL-Azure, but entry?
CVE-2022-40146: no packages for Image SLES15-SP4-Manager-Server-4-3-EC2-ltd, but entry?
CVE-2022-40146: no packages for SUSE Linux Enterprise Module for Basesystem 15 SP4, but entry?
CVE-2022-40146: no packages for Container bci/openjdk:17-7.1, but entry?
CVE-2022-40146: no packages for Image SLES15-SP2-SAP-BYOS-GCE, but entry?
CVE-2022-40146: no packages for Image SLES15-SP4-Manager-Server-4-3-Azure-llc, but entry?
CVE-2022-40146: no packages for SUSE Linux Enterprise Module for Development Tools 15 SP6, but entry?
CVE-2022-40146: no packages for Image SLES15-SP4-Manager-Server-4-3-BYOS, but entry?
CVE-2022-40146: no packages for SUSE Manager Server 4.2, but entry?
CVE-2022-40146: no packages for Image SLES15-SP3-SAPCAL-EC2-HVM, but entry?
CVE-2022-40146: no packages for Image SLES15-SP4-SAP-Azure-LI-BYOS-Production, but entry?
CVE-2022-40146: no packages for Image SLES15-SP2-SAP-Azure-LI-BYOS-Production, but entry?
CVE-2022-40146: no packages for Image SLES15-SP4-SAP-Azure-LI-BYOS, but entry?
CVE-2022-40146: no packages for Container suse/manager/5.0/x86_64/server:5.0.0-beta1.2.122, but entry?
CVE-2022-40146: no packages for SUSE Linux Enterprise Module for Basesystem 15 SP5, but entry?
CVE-2022-40146: no packages for Image SLES15-SP4-SAPCAL-GCE, but entry?
CVE-2022-40146: no packages for Image SLES15-SP2-SAP-Azure, but entry?
CVE-2022-40146: no packages for Image SLES15-SP3-SAPCAL-GCE, but entry?
CVE-2022-40146: no packages for Image SLES15-SP6-SAP, but entry?
CVE-2022-40146: no packages for SUSE Linux Enterprise Workstation Extension 15 SP4, but entry?
CVE-2022-40146: no packages for Image SLES15-SP6-SAP-Azure-LI-BYOS-Production, but entry?
CVE-2022-40146: no packages for SUSE Linux Enterprise Module for Package Hub 15 SP4, but entry?
CVE-2022-40146: no packages for Image SLES15-SP4-SAP-Azure, but entry?
CVE-2022-40146: no packages for SUSE Linux Enterprise Module for Package Hub 15 SP5, but entry?
CVE-2022-40146: no packages for SUSE Manager Proxy 4.2, but entry?
CVE-2022-40146: no packages for Image SLES15-SP4-Manager-Server-4-3-EC2-llc, but entry?
CVE-2022-40146: no packages for Image SLES15-SP4-Manager-Server-4-3, but entry?
CVE-2022-40146: no packages for SUSE Manager Retail Branch Server 4.2, but entry?
CVE-2022-40146: no packages for Image SLES15-SP4-SAP, but entry?
CVE-2022-40146: no packages for Container bci/kiwi:9.24.43-8.6, but entry?
CVE-2022-40146: no packages for Container bci/openjdk-devel:11-6.2, but entry?
CVE-2022-40146: no packages for Container bci/openjdk-devel:17-14.11, but entry?
CVE-2022-40146: no packages for Container bci/openjdk-devel:17-7.2, but entry?
CVE-2022-40146: no packages for Container bci/openjdk:11-7.1, but entry?
CVE-2022-40146: no packages for Container bci/openjdk:17-7.1, but entry?
CVE-2022-40146: no packages for Container bci/openjdk:latest, but entry?
CVE-2022-40146: no packages for Container suse/manager/5.0/x86_64/server-attestation:5.0.0-beta2.2.16, but entry?
CVE-2022-40146: no packages for Container suse/manager/5.0/x86_64/server:5.0.0-beta1.2.122, but entry?
CVE-2022-40146: no packages for Image SLES15-SP2-SAP-Azure, but entry?
CVE-2022-40146: no packages for Image SLES15-SP2-SAP-Azure-LI-BYOS-Production, but entry?
CVE-2022-40146: no packages for Image SLES15-SP2-SAP-Azure-VLI-BYOS-Production, but entry?
CVE-2022-40146: no packages for Image SLES15-SP2-SAP-BYOS-Azure, but entry?
CVE-2022-40146: no packages for Image SLES15-SP2-SAP-BYOS-EC2-HVM, but entry?
CVE-2022-40146: no packages for Image SLES15-SP2-SAP-BYOS-GCE, but entry?
CVE-2022-40146: no packages for Image SLES15-SP2-SAP-EC2-HVM, but entry?
CVE-2022-40146: no packages for Image SLES15-SP2-SAP-GCE, but entry?
CVE-2022-40146: no packages for Image SLES15-SP3-Manager-4-2-Server-BYOS-Azure, but entry?
CVE-2022-40146: no packages for Image SLES15-SP3-Manager-4-2-Server-BYOS-EC2-HVM, but entry?
CVE-2022-40146: no packages for Image SLES15-SP3-Manager-4-2-Server-BYOS-GCE, but entry?
CVE-2022-40146: no packages for Image SLES15-SP3-SAP-Azure-LI-BYOS-Production, but entry?
CVE-2022-40146: no packages for Image SLES15-SP3-SAP-Azure-VLI-BYOS-Production, but entry?
CVE-2022-40146: no packages for Image SLES15-SP3-SAPCAL-Azure, but entry?
CVE-2022-40146: no packages for Image SLES15-SP3-SAPCAL-EC2-HVM, but entry?
CVE-2022-40146: no packages for Image SLES15-SP3-SAPCAL-GCE, but entry?
CVE-2022-40146: no packages for Image SLES15-SP4-Manager-Server-4-3, but entry?
CVE-2022-40146: no packages for Image SLES15-SP4-Manager-Server-4-3-Azure-llc, but entry?
CVE-2022-40146: no packages for Image SLES15-SP4-Manager-Server-4-3-Azure-ltd, but entry?
CVE-2022-40146: no packages for Image SLES15-SP4-Manager-Server-4-3-BYOS, but entry?
CVE-2022-40146: no packages for Image SLES15-SP4-Manager-Server-4-3-BYOS-Azure, but entry?
CVE-2022-40146: no packages for Image SLES15-SP4-Manager-Server-4-3-BYOS-EC2, but entry?
CVE-2022-40146: no packages for Image SLES15-SP4-Manager-Server-4-3-BYOS-GCE, but entry?
CVE-2022-40146: no packages for Image SLES15-SP4-Manager-Server-4-3-EC2-llc, but entry?
CVE-2022-40146: no packages for Image SLES15-SP4-Manager-Server-4-3-EC2-ltd, but entry?
CVE-2022-40146: no packages for Image SLES15-SP4-SAP, but entry?
CVE-2022-40146: no packages for Image SLES15-SP4-SAP-Azure, but entry?
CVE-2022-40146: no packages for Image SLES15-SP4-SAP-Azure-LI-BYOS, but entry?
CVE-2022-40146: no packages for Image SLES15-SP4-SAP-Azure-LI-BYOS-Production, but entry?
CVE-2022-40146: no packages for Image SLES15-SP4-SAP-Azure-VLI-BYOS, but entry?
CVE-2022-40146: no packages for Image SLES15-SP4-SAP-Azure-VLI-BYOS-Production, but entry?
CVE-2022-40146: no packages for Image SLES15-SP4-SAP-EC2, but entry?
CVE-2022-40146: no packages for Image SLES15-SP4-SAP-GCE, but entry?
CVE-2022-40146: no packages for Image SLES15-SP4-SAPCAL, but entry?
CVE-2022-40146: no packages for Image SLES15-SP4-SAPCAL-Azure, but entry?
CVE-2022-40146: no packages for Image SLES15-SP4-SAPCAL-EC2, but entry?
CVE-2022-40146: no packages for Image SLES15-SP4-SAPCAL-GCE, but entry?
CVE-2022-40146: no packages for Image SLES15-SP5-SAP-Azure, but entry?
CVE-2022-40146: no packages for Image SLES15-SP5-SAP-Azure-LI-BYOS, but entry?
CVE-2022-40146: no packages for Image SLES15-SP5-SAP-Azure-LI-BYOS-Production, but entry?
CVE-2022-40146: no packages for Image SLES15-SP5-SAP-Azure-VLI-BYOS, but entry?
CVE-2022-40146: no packages for Image SLES15-SP5-SAP-Azure-VLI-BYOS-Production, but entry?
CVE-2022-40146: no packages for Image SLES15-SP5-SAP-EC2, but entry?
CVE-2022-40146: no packages for Image SLES15-SP5-SAP-GCE, but entry?
CVE-2022-40146: no packages for Image SLES15-SP5-SAPCAL-Azure, but entry?
CVE-2022-40146: no packages for Image SLES15-SP5-SAPCAL-EC2, but entry?
CVE-2022-40146: no packages for Image SLES15-SP5-SAPCAL-GCE, but entry?
CVE-2022-40146: no packages for Image SLES15-SP6-SAP, but entry?
CVE-2022-40146: no packages for Image SLES15-SP6-SAP-Azure, but entry?
CVE-2022-40146: no packages for Image SLES15-SP6-SAP-Azure-LI-BYOS, but entry?
CVE-2022-40146: no packages for Image SLES15-SP6-SAP-Azure-LI-BYOS-Production, but entry?
CVE-2022-40146: no packages for Image SLES15-SP6-SAP-Azure-VLI-BYOS, but entry?
CVE-2022-40146: no packages for Image SLES15-SP6-SAP-Azure-VLI-BYOS-Production, but entry?
CVE-2022-40146: no packages for Image SLES15-SP6-SAP-EC2, but entry?
CVE-2022-40146: no packages for Image SLES15-SP6-SAP-GCE, but entry?
CVE-2022-40146: no packages for Image SLES15-SP6-SAPCAL, but entry?
CVE-2022-40146: no packages for Image SLES15-SP6-SAPCAL-Azure, but entry?
CVE-2022-40146: no packages for Image SLES15-SP6-SAPCAL-EC2, but entry?
CVE-2022-40146: no packages for Image SLES15-SP6-SAPCAL-GCE, but entry?
CVE-2022-40146: no packages for SUSE CaaS Platform 4.0, but entry?
CVE-2022-40146: no packages for SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS, but entry?
CVE-2022-40146: no packages for SUSE Linux Enterprise Module for Basesystem 15 SP4, but entry?
CVE-2022-40146: no packages for SUSE Linux Enterprise Module for Basesystem 15 SP5, but entry?
CVE-2022-40146: no packages for SUSE Linux Enterprise Module for Basesystem 15 SP6, but entry?
CVE-2022-40146: no packages for SUSE Linux Enterprise Module for Development Tools 15 SP6, but entry?
CVE-2022-40146: no packages for SUSE Linux Enterprise Module for Package Hub 15 SP4, but entry?
CVE-2022-40146: no packages for SUSE Linux Enterprise Module for Package Hub 15 SP5, but entry?
CVE-2022-40146: no packages for SUSE Linux Enterprise Module for Web and Scripting 15 SP4, but entry?
CVE-2022-40146: no packages for SUSE Linux Enterprise Module for Web and Scripting 15 SP5, but entry?
CVE-2022-40146: no packages for SUSE Linux Enterprise Module for Web and Scripting 15 SP6, but entry?
CVE-2022-40146: no packages for SUSE Linux Enterprise Server 15 SP1-LTSS, but entry?
CVE-2022-40146: no packages for SUSE Linux Enterprise Server 15 SP4-TERADATA, but entry?
CVE-2022-40146: no packages for SUSE Linux Enterprise Server for SAP Applications 15 SP1, but entry?
CVE-2022-40146: no packages for SUSE Linux Enterprise Workstation Extension 15 SP4, but entry?
CVE-2022-40146: no packages for SUSE Linux Enterprise Workstation Extension 15 SP5, but entry?
CVE-2022-40146: no packages for SUSE Linux Enterprise Workstation Extension 15 SP6, but entry?
CVE-2022-40146: no packages for SUSE Manager Proxy 4.2, but entry?
CVE-2022-40146: no packages for SUSE Manager Retail Branch Server 4.2, but entry?
CVE-2022-40146: no packages for SUSE Manager Server 4.2, but entry?
CVE-2022-40146: no packages for SUSE Manager Server Module 4.2, but entry?
CVE-2022-40146: no packages for SUSE Manager Server Module 4.3, but entry?
CVE-2022-40146: no packages for Container bci/kiwi:9.24.43-8.6, but entry?
CVE-2022-40146: no packages for Container bci/openjdk-devel:11-6.2, but entry?
CVE-2022-40146: no packages for Container bci/openjdk-devel:17-14.11, but entry?
CVE-2022-40146: no packages for Container bci/openjdk-devel:17-7.2, but entry?
CVE-2022-40146: no packages for Container bci/openjdk:11-7.1, but entry?
CVE-2022-40146: no packages for Container bci/openjdk:17-7.1, but entry?
CVE-2022-40146: no packages for Container bci/openjdk:latest, but entry?
CVE-2022-40146: no packages for Container suse/manager/5.0/x86_64/server-attestation:5.0.0-beta2.2.16, but entry?
CVE-2022-40146: no packages for Container suse/manager/5.0/x86_64/server:5.0.0-beta1.2.122, but entry?
CVE-2022-40146: no packages for Image SLES15-SP2-SAP-Azure, but entry?
CVE-2022-40146: no packages for Image SLES15-SP2-SAP-Azure-LI-BYOS-Production, but entry?
CVE-2022-40146: no packages for Image SLES15-SP2-SAP-Azure-VLI-BYOS-Production, but entry?
CVE-2022-40146: no packages for Image SLES15-SP2-SAP-BYOS-Azure, but entry?
CVE-2022-40146: no packages for Image SLES15-SP2-SAP-BYOS-EC2-HVM, but entry?
CVE-2022-40146: no packages for Image SLES15-SP2-SAP-BYOS-GCE, but entry?
CVE-2022-40146: no packages for Image SLES15-SP2-SAP-EC2-HVM, but entry?
CVE-2022-40146: no packages for Image SLES15-SP2-SAP-GCE, but entry?
CVE-2022-40146: no packages for Image SLES15-SP3-Manager-4-2-Server-BYOS-Azure, but entry?
CVE-2022-40146: no packages for Image SLES15-SP3-Manager-4-2-Server-BYOS-EC2-HVM, but entry?
CVE-2022-40146: no packages for Image SLES15-SP3-Manager-4-2-Server-BYOS-GCE, but entry?
CVE-2022-40146: no packages for Image SLES15-SP3-SAP-Azure-LI-BYOS-Production, but entry?
CVE-2022-40146: no packages for Image SLES15-SP3-SAP-Azure-VLI-BYOS-Production, but entry?
CVE-2022-40146: no packages for Image SLES15-SP3-SAPCAL-Azure, but entry?
CVE-2022-40146: no packages for Image SLES15-SP3-SAPCAL-EC2-HVM, but entry?
CVE-2022-40146: no packages for Image SLES15-SP3-SAPCAL-GCE, but entry?
CVE-2022-40146: no packages for Image SLES15-SP4-Manager-Server-4-3, but entry?
CVE-2022-40146: no packages for Image SLES15-SP4-Manager-Server-4-3-Azure-llc, but entry?
CVE-2022-40146: no packages for Image SLES15-SP4-Manager-Server-4-3-Azure-ltd, but entry?
CVE-2022-40146: no packages for Image SLES15-SP4-Manager-Server-4-3-BYOS, but entry?
CVE-2022-40146: no packages for Image SLES15-SP4-Manager-Server-4-3-BYOS-Azure, but entry?
CVE-2022-40146: no packages for Image SLES15-SP4-Manager-Server-4-3-BYOS-EC2, but entry?
CVE-2022-40146: no packages for Image SLES15-SP4-Manager-Server-4-3-BYOS-GCE, but entry?
CVE-2022-40146: no packages for Image SLES15-SP4-Manager-Server-4-3-EC2-llc, but entry?
CVE-2022-40146: no packages for Image SLES15-SP4-Manager-Server-4-3-EC2-ltd, but entry?
CVE-2022-40146: no packages for Image SLES15-SP4-SAP, but entry?
CVE-2022-40146: no packages for Image SLES15-SP4-SAP-Azure, but entry?
CVE-2022-40146: no packages for Image SLES15-SP4-SAP-Azure-LI-BYOS, but entry?
CVE-2022-40146: no packages for Image SLES15-SP4-SAP-Azure-LI-BYOS-Production, but entry?
CVE-2022-40146: no packages for Image SLES15-SP4-SAP-Azure-VLI-BYOS, but entry?
CVE-2022-40146: no packages for Image SLES15-SP4-SAP-Azure-VLI-BYOS-Production, but entry?
CVE-2022-40146: no packages for Image SLES15-SP4-SAP-EC2, but entry?
CVE-2022-40146: no packages for Image SLES15-SP4-SAP-GCE, but entry?
CVE-2022-40146: no packages for Image SLES15-SP4-SAPCAL, but entry?
CVE-2022-40146: no packages for Image SLES15-SP4-SAPCAL-Azure, but entry?
CVE-2022-40146: no packages for Image SLES15-SP4-SAPCAL-EC2, but entry?
CVE-2022-40146: no packages for Image SLES15-SP4-SAPCAL-GCE, but entry?
CVE-2022-40146: no packages for Image SLES15-SP5-SAP-Azure, but entry?
CVE-2022-40146: no packages for Image SLES15-SP5-SAP-Azure-LI-BYOS, but entry?
CVE-2022-40146: no packages for Image SLES15-SP5-SAP-Azure-LI-BYOS-Production, but entry?
CVE-2022-40146: no packages for Image SLES15-SP5-SAP-Azure-VLI-BYOS, but entry?
CVE-2022-40146: no packages for Image SLES15-SP5-SAP-Azure-VLI-BYOS-Production, but entry?
CVE-2022-40146: no packages for Image SLES15-SP5-SAP-EC2, but entry?
CVE-2022-40146: no packages for Image SLES15-SP5-SAP-GCE, but entry?
CVE-2022-40146: no packages for Image SLES15-SP5-SAPCAL-Azure, but entry?
CVE-2022-40146: no packages for Image SLES15-SP5-SAPCAL-EC2, but entry?
CVE-2022-40146: no packages for Image SLES15-SP5-SAPCAL-GCE, but entry?
CVE-2022-40146: no packages for Image SLES15-SP6-SAP, but entry?
CVE-2022-40146: no packages for Image SLES15-SP6-SAP-Azure, but entry?
CVE-2022-40146: no packages for Image SLES15-SP6-SAP-Azure-LI-BYOS, but entry?
CVE-2022-40146: no packages for Image SLES15-SP6-SAP-Azure-LI-BYOS-Production, but entry?
CVE-2022-40146: no packages for Image SLES15-SP6-SAP-Azure-VLI-BYOS, but entry?
CVE-2022-40146: no packages for Image SLES15-SP6-SAP-Azure-VLI-BYOS-Production, but entry?
CVE-2022-40146: no packages for Image SLES15-SP6-SAP-EC2, but entry?
CVE-2022-40146: no packages for Image SLES15-SP6-SAP-GCE, but entry?
CVE-2022-40146: no packages for Image SLES15-SP6-SAPCAL, but entry?
CVE-2022-40146: no packages for Image SLES15-SP6-SAPCAL-Azure, but entry?
CVE-2022-40146: no packages for Image SLES15-SP6-SAPCAL-EC2, but entry?
CVE-2022-40146: no packages for Image SLES15-SP6-SAPCAL-GCE, but entry?
CVE-2022-40146: no packages for SUSE CaaS Platform 4.0, but entry?
CVE-2022-40146: no packages for SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS, but entry?
CVE-2022-40146: no packages for SUSE Linux Enterprise Module for Basesystem 15 SP4, but entry?
CVE-2022-40146: no packages for SUSE Linux Enterprise Module for Basesystem 15 SP5, but entry?
CVE-2022-40146: no packages for SUSE Linux Enterprise Module for Basesystem 15 SP6, but entry?
CVE-2022-40146: no packages for SUSE Linux Enterprise Module for Development Tools 15 SP6, but entry?
CVE-2022-40146: no packages for SUSE Linux Enterprise Module for Package Hub 15 SP4, but entry?
CVE-2022-40146: no packages for SUSE Linux Enterprise Module for Package Hub 15 SP5, but entry?
CVE-2022-40146: no packages for SUSE Linux Enterprise Module for Web and Scripting 15 SP4, but entry?
CVE-2022-40146: no packages for SUSE Linux Enterprise Module for Web and Scripting 15 SP5, but entry?
CVE-2022-40146: no packages for SUSE Linux Enterprise Module for Web and Scripting 15 SP6, but entry?
CVE-2022-40146: no packages for SUSE Linux Enterprise Server 15 SP1-LTSS, but entry?
CVE-2022-40146: no packages for SUSE Linux Enterprise Server 15 SP4-TERADATA, but entry?
CVE-2022-40146: no packages for SUSE Linux Enterprise Server for SAP Applications 15 SP1, but entry?
CVE-2022-40146: no packages for SUSE Linux Enterprise Workstation Extension 15 SP4, but entry?
CVE-2022-40146: no packages for SUSE Linux Enterprise Workstation Extension 15 SP5, but entry?
CVE-2022-40146: no packages for SUSE Linux Enterprise Workstation Extension 15 SP6, but entry?
CVE-2022-40146: no packages for SUSE Manager Proxy 4.2, but entry?
CVE-2022-40146: no packages for SUSE Manager Retail Branch Server 4.2, but entry?
CVE-2022-40146: no packages for SUSE Manager Server 4.2, but entry?
CVE-2022-40146: no packages for SUSE Manager Server Module 4.2, but entry?
CVE-2022-40146: no packages for SUSE Manager Server Module 4.3, but entry?
no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2022-40023
skipping CVE-2022-40133 as CVE page is older than CVRF-CVE file.
skipping CVE-2022-40090 as CVE page is older than CVRF-CVE file.
skipping CVE-2022-39842 as CVE page is older than CVRF-CVE file.
skipping CVE-2022-39399 as CVE page is older than CVRF-CVE file.
skipping CVE-2022-39377 as CVE page is older than CVRF-CVE file.
no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2022-39348
no cpe found for SUSE Package Hub 15 SP4 in CVE-2022-39346
no cpe found for SUSE Package Hub 15 SP4 in CVE-2022-39334
no cpe found for SUSE Package Hub 15 SP5 in CVE-2022-39334
no cpe found for SUSE Package Hub 15 SP4 in CVE-2022-39333
no cpe found for SUSE Package Hub 15 SP5 in CVE-2022-39333
no cpe found for SUSE Package Hub 15 SP4 in CVE-2022-39332
no cpe found for SUSE Package Hub 15 SP5 in CVE-2022-39332
no cpe found for SUSE Package Hub 15 SP4 in CVE-2022-39331
no cpe found for SUSE Package Hub 15 SP5 in CVE-2022-39331
no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2022-39324
no cpe found for SUSE Manager Tools Beta for SLE Micro 5 in CVE-2022-39324
no cpe found for SUSE Manager Tools for SLE Micro 5 in CVE-2022-39324
no cpe found for SUSE Manager Tools Beta for SLE Micro 5 in CVE-2022-39307
no cpe found for SUSE Manager Tools for SLE Micro 5 in CVE-2022-39307
no cpe found for SUSE Manager Tools Beta for SLE Micro 5 in CVE-2022-39306
no cpe found for SUSE Manager Tools for SLE Micro 5 in CVE-2022-39306
skipping CVE-2022-39260 as CVE page is older than CVRF-CVE file.
skipping CVE-2022-39253 as CVE page is older than CVRF-CVE file.
no cpe found for SUSE Manager Tools Beta for SLE Micro 5 in CVE-2022-39229
no cpe found for SUSE Manager Tools for SLE Micro 5 in CVE-2022-39229
no cpe found for SUSE Manager Tools Beta for SLE Micro 5 in CVE-2022-39201
no cpe found for SUSE Manager Tools for SLE Micro 5 in CVE-2022-39201
no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2022-39188
skipping CVE-2022-39190 as CVE page is older than CVRF-CVE file.
skipping CVE-2022-39189 as CVE page is older than CVRF-CVE file.
skipping CVE-2022-39177 as CVE page is older than CVRF-CVE file.
skipping CVE-2022-39176 as CVE page is older than CVRF-CVE file.
skipping CVE-2022-39046 as CVE page is older than CVRF-CVE file.
skipping CVE-2022-39028 as CVE page is older than CVRF-CVE file.
skipping CVE-2022-38928 as CVE page is older than CVRF-CVE file.
skipping CVE-2022-38791 as CVE page is older than CVRF-CVE file.
skipping CVE-2022-38784 as CVE page is older than CVRF-CVE file.
CVE-2022-38752: no packages for Image SLES15-SP6-SAP-Azure, but entry?
CVE-2022-38752: no packages for Image SLES15-SP5-SAPCAL-GCE, but entry?
CVE-2022-38752: no packages for Image SLES15-SP4-SAP-Azure-VLI-BYOS-Production, but entry?
CVE-2022-38752: no packages for Image SLES15-SP5-SAP-Azure-LI-BYOS, but entry?
CVE-2022-38752: no packages for Image SLES15-SP6-SAP-GCE, but entry?
CVE-2022-38752: no packages for Image SLES15-SP6-SAPCAL-GCE, but entry?
CVE-2022-38752: no packages for Container bci/openjdk-devel:11-6.2, but entry?
CVE-2022-38752: no packages for Image SLES15-SP5-SAP-GCE, but entry?
CVE-2022-38752: no packages for SUSE Linux Enterprise Workstation Extension 15 SP5, but entry?
CVE-2022-38752: no packages for Container bci/openjdk-devel:17-7.2, but entry?
CVE-2022-38752: no packages for SUSE Linux Enterprise Server 15 SP1-LTSS, but entry?
CVE-2022-38752: no packages for Image SLES15-SP5-SAPCAL-Azure, but entry?
CVE-2022-38752: no packages for Image SLES15-SP2-SAP-Azure-VLI-BYOS-Production, but entry?
CVE-2022-38752: no packages for Image SLES15-SP2-SAP-BYOS-EC2-HVM, but entry?
CVE-2022-38752: no packages for Image SLES15-SP6-SAPCAL-Azure, but entry?
CVE-2022-38752: no packages for Image SLES15-SP6-SAP-Azure-VLI-BYOS, but entry?
CVE-2022-38752: no packages for Container suse/manager/5.0/x86_64/server-attestation:5.0.0-beta2.2.16, but entry?
CVE-2022-38752: no packages for Image SLES15-SP5-SAP-Azure, but entry?
CVE-2022-38752: no packages for Image SLES15-SP5-SAP-Azure-VLI-BYOS-Production, but entry?
CVE-2022-38752: no packages for SUSE CaaS Platform 4.0, but entry?
CVE-2022-38752: no packages for Container bci/kiwi:9.24.43-8.6, but entry?
CVE-2022-38752: no packages for SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS, but entry?
CVE-2022-38752: no packages for Image SLES15-SP4-SAP-EC2, but entry?
CVE-2022-38752: no packages for SUSE Linux Enterprise Server for SAP Applications 15 SP1, but entry?
CVE-2022-38752: no packages for Container bci/openjdk:11-7.1, but entry?
CVE-2022-38752: no packages for Container bci/openjdk-devel:17-14.11, but entry?
CVE-2022-38752: no packages for SUSE Linux Enterprise Module for Web and Scripting 15 SP4, but entry?
CVE-2022-38752: no packages for Image SLES15-SP4-SAPCAL-EC2, but entry?
CVE-2022-38752: no packages for Image SLES15-SP5-SAPCAL-EC2, but entry?
CVE-2022-38752: no packages for Image SLES15-SP4-SAPCAL-Azure, but entry?
CVE-2022-38752: no packages for Image SLES15-SP2-SAP-GCE, but entry?
CVE-2022-38752: no packages for Image SLES15-SP2-SAP-EC2-HVM, but entry?
CVE-2022-38752: no packages for Image SLES15-SP6-SAP-Azure-VLI-BYOS-Production, but entry?
CVE-2022-38752: no packages for Image SLES15-SP3-SAP-Azure-LI-BYOS-Production, but entry?
CVE-2022-38752: no packages for SUSE Linux Enterprise Workstation Extension 15 SP6, but entry?
CVE-2022-38752: no packages for Image SLES15-SP4-SAP-Azure-VLI-BYOS, but entry?
CVE-2022-38752: no packages for Image SLES15-SP6-SAP-Azure-LI-BYOS, but entry?
CVE-2022-38752: no packages for Image SLES15-SP4-SAP-GCE, but entry?
CVE-2022-38752: no packages for Image SLES15-SP6-SAP-EC2, but entry?
CVE-2022-38752: no packages for SUSE Manager Proxy 4.2, but entry?
CVE-2022-38752: no packages for SUSE Manager Retail Branch Server 4.2, but entry?
CVE-2022-38752: no packages for Image SLES15-SP4-SAP, but entry?
CVE-2022-38752: no packages for Image SLES15-SP6-SAP-Azure-LI-BYOS-Production, but entry?
CVE-2022-38752: no packages for SUSE Linux Enterprise Module for Package Hub 15 SP4, but entry?
CVE-2022-38752: no packages for SUSE Linux Enterprise Workstation Extension 15 SP4, but entry?
CVE-2022-38752: no packages for SUSE Linux Enterprise Module for Package Hub 15 SP5, but entry?
CVE-2022-38752: no packages for Image SLES15-SP4-SAP-Azure, but entry?
CVE-2022-38752: no packages for Image SLES15-SP2-SAP-Azure, but entry?
CVE-2022-38752: no packages for SUSE Linux Enterprise Module for Basesystem 15 SP5, but entry?
CVE-2022-38752: no packages for Image SLES15-SP4-SAPCAL-GCE, but entry?
CVE-2022-38752: no packages for Image SLES15-SP6-SAP, but entry?
CVE-2022-38752: no packages for Image SLES15-SP3-SAPCAL-GCE, but entry?
CVE-2022-38752: no packages for Image SLES15-SP3-SAPCAL-EC2-HVM, but entry?
CVE-2022-38752: no packages for SUSE Manager Server 4.2, but entry?
CVE-2022-38752: no packages for Image SLES15-SP4-SAP-Azure-LI-BYOS-Production, but entry?
CVE-2022-38752: no packages for Image SLES15-SP2-SAP-Azure-LI-BYOS-Production, but entry?
CVE-2022-38752: no packages for Image SLES15-SP4-SAP-Azure-LI-BYOS, but entry?
CVE-2022-38752: no packages for SUSE Linux Enterprise Module for Basesystem 15 SP4, but entry?
CVE-2022-38752: no packages for SUSE Linux Enterprise Module for Package Hub 15 SP6, but entry?
CVE-2022-38752: no packages for Container bci/openjdk:17-7.1, but entry?
CVE-2022-38752: no packages for Image SLES15-SP2-SAP-BYOS-GCE, but entry?
CVE-2022-38752: no packages for Image SLES15-SP5-SAP-Azure-LI-BYOS-Production, but entry?
CVE-2022-38752: no packages for SUSE Linux Enterprise Module for Basesystem 15 SP6, but entry?
CVE-2022-38752: no packages for Image SLES15-SP6-SAPCAL, but entry?
CVE-2022-38752: no packages for Image SLES15-SP5-SAP-Azure-VLI-BYOS, but entry?
CVE-2022-38752: no packages for Image SLES15-SP3-SAPCAL-Azure, but entry?
CVE-2022-38752: no packages for Image SLES15-SP3-SAP-Azure-VLI-BYOS-Production, but entry?
CVE-2022-38752: no packages for Image SLES15-SP2-SAP-BYOS-Azure, but entry?
CVE-2022-38752: no packages for SUSE Linux Enterprise Module for Web and Scripting 15 SP5, but entry?
CVE-2022-38752: no packages for Image SLES15-SP5-SAP-EC2, but entry?
CVE-2022-38752: no packages for Container bci/openjdk:latest, but entry?
CVE-2022-38752: no packages for SUSE Linux Enterprise Module for Web and Scripting 15 SP6, but entry?
CVE-2022-38752: no packages for Image SLES15-SP4-SAPCAL, but entry?
CVE-2022-38752: no packages for Image SLES15-SP6-SAPCAL-EC2, but entry?
no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2022-38752
CVE-2022-38752: no packages for Container bci/kiwi:9.24.43-8.6, but entry?
CVE-2022-38752: no packages for Container bci/openjdk-devel:11-6.2, but entry?
CVE-2022-38752: no packages for Container bci/openjdk-devel:17-14.11, but entry?
CVE-2022-38752: no packages for Container bci/openjdk-devel:17-7.2, but entry?
CVE-2022-38752: no packages for Container bci/openjdk:11-7.1, but entry?
CVE-2022-38752: no packages for Container bci/openjdk:17-7.1, but entry?
CVE-2022-38752: no packages for Container bci/openjdk:latest, but entry?
CVE-2022-38752: no packages for Container suse/manager/5.0/x86_64/server-attestation:5.0.0-beta2.2.16, but entry?
CVE-2022-38752: no packages for Image SLES15-SP2-SAP-Azure, but entry?
CVE-2022-38752: no packages for Image SLES15-SP2-SAP-Azure-LI-BYOS-Production, but entry?
CVE-2022-38752: no packages for Image SLES15-SP2-SAP-Azure-VLI-BYOS-Production, but entry?
CVE-2022-38752: no packages for Image SLES15-SP2-SAP-BYOS-Azure, but entry?
CVE-2022-38752: no packages for Image SLES15-SP2-SAP-BYOS-EC2-HVM, but entry?
CVE-2022-38752: no packages for Image SLES15-SP2-SAP-BYOS-GCE, but entry?
CVE-2022-38752: no packages for Image SLES15-SP2-SAP-EC2-HVM, but entry?
CVE-2022-38752: no packages for Image SLES15-SP2-SAP-GCE, but entry?
CVE-2022-38752: no packages for Image SLES15-SP3-SAP-Azure-LI-BYOS-Production, but entry?
CVE-2022-38752: no packages for Image SLES15-SP3-SAP-Azure-VLI-BYOS-Production, but entry?
CVE-2022-38752: no packages for Image SLES15-SP3-SAPCAL-Azure, but entry?
CVE-2022-38752: no packages for Image SLES15-SP3-SAPCAL-EC2-HVM, but entry?
CVE-2022-38752: no packages for Image SLES15-SP3-SAPCAL-GCE, but entry?
CVE-2022-38752: no packages for Image SLES15-SP4-SAP, but entry?
CVE-2022-38752: no packages for Image SLES15-SP4-SAP-Azure, but entry?
CVE-2022-38752: no packages for Image SLES15-SP4-SAP-Azure-LI-BYOS, but entry?
CVE-2022-38752: no packages for Image SLES15-SP4-SAP-Azure-LI-BYOS-Production, but entry?
CVE-2022-38752: no packages for Image SLES15-SP4-SAP-Azure-VLI-BYOS, but entry?
CVE-2022-38752: no packages for Image SLES15-SP4-SAP-Azure-VLI-BYOS-Production, but entry?
CVE-2022-38752: no packages for Image SLES15-SP4-SAP-EC2, but entry?
CVE-2022-38752: no packages for Image SLES15-SP4-SAP-GCE, but entry?
CVE-2022-38752: no packages for Image SLES15-SP4-SAPCAL, but entry?
CVE-2022-38752: no packages for Image SLES15-SP4-SAPCAL-Azure, but entry?
CVE-2022-38752: no packages for Image SLES15-SP4-SAPCAL-EC2, but entry?
CVE-2022-38752: no packages for Image SLES15-SP4-SAPCAL-GCE, but entry?
CVE-2022-38752: no packages for Image SLES15-SP5-SAP-Azure, but entry?
CVE-2022-38752: no packages for Image SLES15-SP5-SAP-Azure-LI-BYOS, but entry?
CVE-2022-38752: no packages for Image SLES15-SP5-SAP-Azure-LI-BYOS-Production, but entry?
CVE-2022-38752: no packages for Image SLES15-SP5-SAP-Azure-VLI-BYOS, but entry?
CVE-2022-38752: no packages for Image SLES15-SP5-SAP-Azure-VLI-BYOS-Production, but entry?
CVE-2022-38752: no packages for Image SLES15-SP5-SAP-EC2, but entry?
CVE-2022-38752: no packages for Image SLES15-SP5-SAP-GCE, but entry?
CVE-2022-38752: no packages for Image SLES15-SP5-SAPCAL-Azure, but entry?
CVE-2022-38752: no packages for Image SLES15-SP5-SAPCAL-EC2, but entry?
CVE-2022-38752: no packages for Image SLES15-SP5-SAPCAL-GCE, but entry?
CVE-2022-38752: no packages for Image SLES15-SP6-SAP, but entry?
CVE-2022-38752: no packages for Image SLES15-SP6-SAP-Azure, but entry?
CVE-2022-38752: no packages for Image SLES15-SP6-SAP-Azure-LI-BYOS, but entry?
CVE-2022-38752: no packages for Image SLES15-SP6-SAP-Azure-LI-BYOS-Production, but entry?
CVE-2022-38752: no packages for Image SLES15-SP6-SAP-Azure-VLI-BYOS, but entry?
CVE-2022-38752: no packages for Image SLES15-SP6-SAP-Azure-VLI-BYOS-Production, but entry?
CVE-2022-38752: no packages for Image SLES15-SP6-SAP-EC2, but entry?
CVE-2022-38752: no packages for Image SLES15-SP6-SAP-GCE, but entry?
CVE-2022-38752: no packages for Image SLES15-SP6-SAPCAL, but entry?
CVE-2022-38752: no packages for Image SLES15-SP6-SAPCAL-Azure, but entry?
CVE-2022-38752: no packages for Image SLES15-SP6-SAPCAL-EC2, but entry?
CVE-2022-38752: no packages for Image SLES15-SP6-SAPCAL-GCE, but entry?
CVE-2022-38752: no packages for SUSE CaaS Platform 4.0, but entry?
CVE-2022-38752: no packages for SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS, but entry?
CVE-2022-38752: no packages for SUSE Linux Enterprise Module for Basesystem 15 SP4, but entry?
CVE-2022-38752: no packages for SUSE Linux Enterprise Module for Basesystem 15 SP5, but entry?
CVE-2022-38752: no packages for SUSE Linux Enterprise Module for Basesystem 15 SP6, but entry?
CVE-2022-38752: no packages for SUSE Linux Enterprise Module for Package Hub 15 SP4, but entry?
CVE-2022-38752: no packages for SUSE Linux Enterprise Module for Package Hub 15 SP5, but entry?
CVE-2022-38752: no packages for SUSE Linux Enterprise Module for Package Hub 15 SP6, but entry?
CVE-2022-38752: no packages for SUSE Linux Enterprise Module for Web and Scripting 15 SP4, but entry?
CVE-2022-38752: no packages for SUSE Linux Enterprise Module for Web and Scripting 15 SP5, but entry?
CVE-2022-38752: no packages for SUSE Linux Enterprise Module for Web and Scripting 15 SP6, but entry?
CVE-2022-38752: no packages for SUSE Linux Enterprise Server 15 SP1-LTSS, but entry?
CVE-2022-38752: no packages for SUSE Linux Enterprise Server for SAP Applications 15 SP1, but entry?
CVE-2022-38752: no packages for SUSE Linux Enterprise Workstation Extension 15 SP4, but entry?
CVE-2022-38752: no packages for SUSE Linux Enterprise Workstation Extension 15 SP5, but entry?
CVE-2022-38752: no packages for SUSE Linux Enterprise Workstation Extension 15 SP6, but entry?
CVE-2022-38752: no packages for SUSE Manager Proxy 4.2, but entry?
CVE-2022-38752: no packages for SUSE Manager Retail Branch Server 4.2, but entry?
CVE-2022-38752: no packages for SUSE Manager Server 4.2, but entry?
CVE-2022-38752: no packages for Container bci/kiwi:9.24.43-8.6, but entry?
CVE-2022-38752: no packages for Container bci/openjdk-devel:11-6.2, but entry?
CVE-2022-38752: no packages for Container bci/openjdk-devel:17-14.11, but entry?
CVE-2022-38752: no packages for Container bci/openjdk-devel:17-7.2, but entry?
CVE-2022-38752: no packages for Container bci/openjdk:11-7.1, but entry?
CVE-2022-38752: no packages for Container bci/openjdk:17-7.1, but entry?
CVE-2022-38752: no packages for Container bci/openjdk:latest, but entry?
CVE-2022-38752: no packages for Container suse/manager/5.0/x86_64/server-attestation:5.0.0-beta2.2.16, but entry?
CVE-2022-38752: no packages for Image SLES15-SP2-SAP-Azure, but entry?
CVE-2022-38752: no packages for Image SLES15-SP2-SAP-Azure-LI-BYOS-Production, but entry?
CVE-2022-38752: no packages for Image SLES15-SP2-SAP-Azure-VLI-BYOS-Production, but entry?
CVE-2022-38752: no packages for Image SLES15-SP2-SAP-BYOS-Azure, but entry?
CVE-2022-38752: no packages for Image SLES15-SP2-SAP-BYOS-EC2-HVM, but entry?
CVE-2022-38752: no packages for Image SLES15-SP2-SAP-BYOS-GCE, but entry?
CVE-2022-38752: no packages for Image SLES15-SP2-SAP-EC2-HVM, but entry?
CVE-2022-38752: no packages for Image SLES15-SP2-SAP-GCE, but entry?
CVE-2022-38752: no packages for Image SLES15-SP3-SAP-Azure-LI-BYOS-Production, but entry?
CVE-2022-38752: no packages for Image SLES15-SP3-SAP-Azure-VLI-BYOS-Production, but entry?
CVE-2022-38752: no packages for Image SLES15-SP3-SAPCAL-Azure, but entry?
CVE-2022-38752: no packages for Image SLES15-SP3-SAPCAL-EC2-HVM, but entry?
CVE-2022-38752: no packages for Image SLES15-SP3-SAPCAL-GCE, but entry?
CVE-2022-38752: no packages for Image SLES15-SP4-SAP, but entry?
CVE-2022-38752: no packages for Image SLES15-SP4-SAP-Azure, but entry?
CVE-2022-38752: no packages for Image SLES15-SP4-SAP-Azure-LI-BYOS, but entry?
CVE-2022-38752: no packages for Image SLES15-SP4-SAP-Azure-LI-BYOS-Production, but entry?
CVE-2022-38752: no packages for Image SLES15-SP4-SAP-Azure-VLI-BYOS, but entry?
CVE-2022-38752: no packages for Image SLES15-SP4-SAP-Azure-VLI-BYOS-Production, but entry?
CVE-2022-38752: no packages for Image SLES15-SP4-SAP-EC2, but entry?
CVE-2022-38752: no packages for Image SLES15-SP4-SAP-GCE, but entry?
CVE-2022-38752: no packages for Image SLES15-SP4-SAPCAL, but entry?
CVE-2022-38752: no packages for Image SLES15-SP4-SAPCAL-Azure, but entry?
CVE-2022-38752: no packages for Image SLES15-SP4-SAPCAL-EC2, but entry?
CVE-2022-38752: no packages for Image SLES15-SP4-SAPCAL-GCE, but entry?
CVE-2022-38752: no packages for Image SLES15-SP5-SAP-Azure, but entry?
CVE-2022-38752: no packages for Image SLES15-SP5-SAP-Azure-LI-BYOS, but entry?
CVE-2022-38752: no packages for Image SLES15-SP5-SAP-Azure-LI-BYOS-Production, but entry?
CVE-2022-38752: no packages for Image SLES15-SP5-SAP-Azure-VLI-BYOS, but entry?
CVE-2022-38752: no packages for Image SLES15-SP5-SAP-Azure-VLI-BYOS-Production, but entry?
CVE-2022-38752: no packages for Image SLES15-SP5-SAP-EC2, but entry?
CVE-2022-38752: no packages for Image SLES15-SP5-SAP-GCE, but entry?
CVE-2022-38752: no packages for Image SLES15-SP5-SAPCAL-Azure, but entry?
CVE-2022-38752: no packages for Image SLES15-SP5-SAPCAL-EC2, but entry?
CVE-2022-38752: no packages for Image SLES15-SP5-SAPCAL-GCE, but entry?
CVE-2022-38752: no packages for Image SLES15-SP6-SAP, but entry?
CVE-2022-38752: no packages for Image SLES15-SP6-SAP-Azure, but entry?
CVE-2022-38752: no packages for Image SLES15-SP6-SAP-Azure-LI-BYOS, but entry?
CVE-2022-38752: no packages for Image SLES15-SP6-SAP-Azure-LI-BYOS-Production, but entry?
CVE-2022-38752: no packages for Image SLES15-SP6-SAP-Azure-VLI-BYOS, but entry?
CVE-2022-38752: no packages for Image SLES15-SP6-SAP-Azure-VLI-BYOS-Production, but entry?
CVE-2022-38752: no packages for Image SLES15-SP6-SAP-EC2, but entry?
CVE-2022-38752: no packages for Image SLES15-SP6-SAP-GCE, but entry?
CVE-2022-38752: no packages for Image SLES15-SP6-SAPCAL, but entry?
CVE-2022-38752: no packages for Image SLES15-SP6-SAPCAL-Azure, but entry?
CVE-2022-38752: no packages for Image SLES15-SP6-SAPCAL-EC2, but entry?
CVE-2022-38752: no packages for Image SLES15-SP6-SAPCAL-GCE, but entry?
CVE-2022-38752: no packages for SUSE CaaS Platform 4.0, but entry?
CVE-2022-38752: no packages for SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS, but entry?
CVE-2022-38752: no packages for SUSE Linux Enterprise Module for Basesystem 15 SP4, but entry?
CVE-2022-38752: no packages for SUSE Linux Enterprise Module for Basesystem 15 SP5, but entry?
CVE-2022-38752: no packages for SUSE Linux Enterprise Module for Basesystem 15 SP6, but entry?
CVE-2022-38752: no packages for SUSE Linux Enterprise Module for Package Hub 15 SP4, but entry?
CVE-2022-38752: no packages for SUSE Linux Enterprise Module for Package Hub 15 SP5, but entry?
CVE-2022-38752: no packages for SUSE Linux Enterprise Module for Package Hub 15 SP6, but entry?
CVE-2022-38752: no packages for SUSE Linux Enterprise Module for Web and Scripting 15 SP4, but entry?
CVE-2022-38752: no packages for SUSE Linux Enterprise Module for Web and Scripting 15 SP5, but entry?
CVE-2022-38752: no packages for SUSE Linux Enterprise Module for Web and Scripting 15 SP6, but entry?
CVE-2022-38752: no packages for SUSE Linux Enterprise Server 15 SP1-LTSS, but entry?
CVE-2022-38752: no packages for SUSE Linux Enterprise Server for SAP Applications 15 SP1, but entry?
CVE-2022-38752: no packages for SUSE Linux Enterprise Workstation Extension 15 SP4, but entry?
CVE-2022-38752: no packages for SUSE Linux Enterprise Workstation Extension 15 SP5, but entry?
CVE-2022-38752: no packages for SUSE Linux Enterprise Workstation Extension 15 SP6, but entry?
CVE-2022-38752: no packages for SUSE Manager Proxy 4.2, but entry?
CVE-2022-38752: no packages for SUSE Manager Retail Branch Server 4.2, but entry?
CVE-2022-38752: no packages for SUSE Manager Server 4.2, but entry?
no cpe found for SUSE Package Hub 15 SP4 in CVE-2022-38725
skipping CVE-2022-38751 as CVE page is older than CVRF-CVE file.
skipping CVE-2022-38750 as CVE page is older than CVRF-CVE file.
skipping CVE-2022-38749 as CVE page is older than CVRF-CVE file.
CVE-2022-38648: no packages for Image SLES15-SP5-SAPCAL-Azure, but entry?
CVE-2022-38648: no packages for Container bci/openjdk-devel:17-7.2, but entry?
CVE-2022-38648: no packages for SUSE Linux Enterprise Server 15 SP1-LTSS, but entry?
CVE-2022-38648: no packages for SUSE Linux Enterprise Workstation Extension 15 SP5, but entry?
CVE-2022-38648: no packages for Image SLES15-SP5-SAP-GCE, but entry?
CVE-2022-38648: no packages for Image SLES15-SP6-SAPCAL-GCE, but entry?
CVE-2022-38648: no packages for Container bci/openjdk-devel:11-6.2, but entry?
CVE-2022-38648: no packages for Image SLES15-SP4-Manager-Server-4-3-BYOS-GCE, but entry?
CVE-2022-38648: no packages for Image SLES15-SP3-Manager-4-2-Server-BYOS-EC2-HVM, but entry?
CVE-2022-38648: no packages for Image SLES15-SP4-Manager-Server-4-3-BYOS-Azure, but entry?
CVE-2022-38648: no packages for Image SLES15-SP6-SAP-GCE, but entry?
CVE-2022-38648: no packages for Image SLES15-SP4-Manager-Server-4-3-BYOS-EC2, but entry?
CVE-2022-38648: no packages for Image SLES15-SP5-SAP-Azure-LI-BYOS, but entry?
CVE-2022-38648: no packages for SUSE Manager Server Module 4.2, but entry?
CVE-2022-38648: no packages for Image SLES15-SP5-SAPCAL-GCE, but entry?
CVE-2022-38648: no packages for Image SLES15-SP6-SAP-Azure, but entry?
CVE-2022-38648: no packages for Image SLES15-SP4-SAP-Azure-VLI-BYOS-Production, but entry?
CVE-2022-38648: no packages for Image SLES15-SP5-SAP-Azure-VLI-BYOS-Production, but entry?
CVE-2022-38648: no packages for SUSE CaaS Platform 4.0, but entry?
CVE-2022-38648: no packages for Image SLES15-SP5-SAP-Azure, but entry?
CVE-2022-38648: no packages for Image SLES15-SP6-SAP-Azure-VLI-BYOS, but entry?
CVE-2022-38648: no packages for Container suse/manager/5.0/x86_64/server-attestation:5.0.0-beta2.2.16, but entry?
CVE-2022-38648: no packages for Image SLES15-SP6-SAPCAL-Azure, but entry?
CVE-2022-38648: no packages for Image SLES15-SP2-SAP-BYOS-EC2-HVM, but entry?
CVE-2022-38648: no packages for Image SLES15-SP2-SAP-Azure-VLI-BYOS-Production, but entry?
CVE-2022-38648: no packages for Image SLES15-SP2-SAP-GCE, but entry?
CVE-2022-38648: no packages for Image SLES15-SP3-Manager-4-2-Server-BYOS-Azure, but entry?
CVE-2022-38648: no packages for Image SLES15-SP5-SAPCAL-EC2, but entry?
CVE-2022-38648: no packages for Image SLES15-SP4-SAPCAL-Azure, but entry?
CVE-2022-38648: no packages for Image SLES15-SP4-SAPCAL-EC2, but entry?
CVE-2022-38648: no packages for SUSE Linux Enterprise Module for Web and Scripting 15 SP4, but entry?
CVE-2022-38648: no packages for Container bci/openjdk-devel:17-14.11, but entry?
CVE-2022-38648: no packages for Container bci/kiwi:9.24.43-8.6, but entry?
CVE-2022-38648: no packages for SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS, but entry?
CVE-2022-38648: no packages for Container bci/openjdk:11-7.1, but entry?
CVE-2022-38648: no packages for Image SLES15-SP4-SAP-EC2, but entry?
CVE-2022-38648: no packages for SUSE Linux Enterprise Server for SAP Applications 15 SP1, but entry?
CVE-2022-38648: no packages for Image SLES15-SP4-SAP-GCE, but entry?
CVE-2022-38648: no packages for Image SLES15-SP6-SAP-EC2, but entry?
CVE-2022-38648: no packages for SUSE Linux Enterprise Server 15 SP4-TERADATA, but entry?
CVE-2022-38648: no packages for Image SLES15-SP6-SAP-Azure-LI-BYOS, but entry?
CVE-2022-38648: no packages for Image SLES15-SP4-SAP-Azure-VLI-BYOS, but entry?
CVE-2022-38648: no packages for Image SLES15-SP3-SAP-Azure-LI-BYOS-Production, but entry?
CVE-2022-38648: no packages for SUSE Linux Enterprise Workstation Extension 15 SP6, but entry?
CVE-2022-38648: no packages for Image SLES15-SP2-SAP-EC2-HVM, but entry?
CVE-2022-38648: no packages for Image SLES15-SP6-SAP-Azure-VLI-BYOS-Production, but entry?
CVE-2022-38648: no packages for SUSE Manager Server Module 4.3, but entry?
CVE-2022-38648: no packages for Image SLES15-SP4-SAP-Azure, but entry?
CVE-2022-38648: no packages for SUSE Linux Enterprise Module for Package Hub 15 SP5, but entry?
CVE-2022-38648: no packages for SUSE Linux Enterprise Workstation Extension 15 SP4, but entry?
CVE-2022-38648: no packages for Image SLES15-SP6-SAP-Azure-LI-BYOS-Production, but entry?
CVE-2022-38648: no packages for SUSE Linux Enterprise Module for Package Hub 15 SP4, but entry?
CVE-2022-38648: no packages for Image SLES15-SP4-Manager-Server-4-3, but entry?
CVE-2022-38648: no packages for SUSE Manager Retail Branch Server 4.2, but entry?
CVE-2022-38648: no packages for Image SLES15-SP4-SAP, but entry?
CVE-2022-38648: no packages for SUSE Manager Proxy 4.2, but entry?
CVE-2022-38648: no packages for Image SLES15-SP4-Manager-Server-4-3-EC2-llc, but entry?
CVE-2022-38648: no packages for Container suse/manager/5.0/x86_64/server:5.0.0-beta1.2.122, but entry?
CVE-2022-38648: no packages for SUSE Linux Enterprise Module for Development Tools 15 SP6, but entry?
CVE-2022-38648: no packages for Image SLES15-SP4-Manager-Server-4-3-BYOS, but entry?
CVE-2022-38648: no packages for Image SLES15-SP2-SAP-Azure-LI-BYOS-Production, but entry?
CVE-2022-38648: no packages for Image SLES15-SP3-SAPCAL-EC2-HVM, but entry?
CVE-2022-38648: no packages for SUSE Manager Server 4.2, but entry?
CVE-2022-38648: no packages for Image SLES15-SP4-SAP-Azure-LI-BYOS-Production, but entry?
CVE-2022-38648: no packages for Image SLES15-SP4-SAP-Azure-LI-BYOS, but entry?
CVE-2022-38648: no packages for Image SLES15-SP3-SAPCAL-GCE, but entry?
CVE-2022-38648: no packages for Image SLES15-SP6-SAP, but entry?
CVE-2022-38648: no packages for SUSE Linux Enterprise Module for Basesystem 15 SP5, but entry?
CVE-2022-38648: no packages for Image SLES15-SP4-SAPCAL-GCE, but entry?
CVE-2022-38648: no packages for Image SLES15-SP2-SAP-Azure, but entry?
CVE-2022-38648: no packages for Image SLES15-SP3-SAP-Azure-VLI-BYOS-Production, but entry?
CVE-2022-38648: no packages for Image SLES15-SP3-SAPCAL-Azure, but entry?
CVE-2022-38648: no packages for Image SLES15-SP4-Manager-Server-4-3-EC2-ltd, but entry?
CVE-2022-38648: no packages for Image SLES15-SP5-SAP-Azure-VLI-BYOS, but entry?
CVE-2022-38648: no packages for Image SLES15-SP6-SAPCAL, but entry?
CVE-2022-38648: no packages for SUSE Linux Enterprise Module for Basesystem 15 SP6, but entry?
CVE-2022-38648: no packages for Image SLES15-SP5-SAP-Azure-LI-BYOS-Production, but entry?
CVE-2022-38648: no packages for Container bci/openjdk:17-7.1, but entry?
CVE-2022-38648: no packages for Image SLES15-SP2-SAP-BYOS-GCE, but entry?
CVE-2022-38648: no packages for Image SLES15-SP4-Manager-Server-4-3-Azure-llc, but entry?
CVE-2022-38648: no packages for SUSE Linux Enterprise Module for Basesystem 15 SP4, but entry?
CVE-2022-38648: no packages for Image SLES15-SP4-SAPCAL, but entry?
CVE-2022-38648: no packages for Image SLES15-SP6-SAPCAL-EC2, but entry?
CVE-2022-38648: no packages for Container bci/openjdk:latest, but entry?
CVE-2022-38648: no packages for SUSE Linux Enterprise Module for Web and Scripting 15 SP6, but entry?
CVE-2022-38648: no packages for Image SLES15-SP3-Manager-4-2-Server-BYOS-GCE, but entry?
CVE-2022-38648: no packages for SUSE Linux Enterprise Module for Web and Scripting 15 SP5, but entry?
CVE-2022-38648: no packages for Image SLES15-SP5-SAP-EC2, but entry?
CVE-2022-38648: no packages for Image SLES15-SP2-SAP-BYOS-Azure, but entry?
CVE-2022-38648: no packages for Image SLES15-SP4-Manager-Server-4-3-Azure-ltd, but entry?
CVE-2022-38648: no packages for Container bci/kiwi:9.24.43-8.6, but entry?
CVE-2022-38648: no packages for Container bci/openjdk-devel:11-6.2, but entry?
CVE-2022-38648: no packages for Container bci/openjdk-devel:17-14.11, but entry?
CVE-2022-38648: no packages for Container bci/openjdk-devel:17-7.2, but entry?
CVE-2022-38648: no packages for Container bci/openjdk:11-7.1, but entry?
CVE-2022-38648: no packages for Container bci/openjdk:17-7.1, but entry?
CVE-2022-38648: no packages for Container bci/openjdk:latest, but entry?
CVE-2022-38648: no packages for Container suse/manager/5.0/x86_64/server-attestation:5.0.0-beta2.2.16, but entry?
CVE-2022-38648: no packages for Container suse/manager/5.0/x86_64/server:5.0.0-beta1.2.122, but entry?
CVE-2022-38648: no packages for Image SLES15-SP2-SAP-Azure, but entry?
CVE-2022-38648: no packages for Image SLES15-SP2-SAP-Azure-LI-BYOS-Production, but entry?
CVE-2022-38648: no packages for Image SLES15-SP2-SAP-Azure-VLI-BYOS-Production, but entry?
CVE-2022-38648: no packages for Image SLES15-SP2-SAP-BYOS-Azure, but entry?
CVE-2022-38648: no packages for Image SLES15-SP2-SAP-BYOS-EC2-HVM, but entry?
CVE-2022-38648: no packages for Image SLES15-SP2-SAP-BYOS-GCE, but entry?
CVE-2022-38648: no packages for Image SLES15-SP2-SAP-EC2-HVM, but entry?
CVE-2022-38648: no packages for Image SLES15-SP2-SAP-GCE, but entry?
CVE-2022-38648: no packages for Image SLES15-SP3-Manager-4-2-Server-BYOS-Azure, but entry?
CVE-2022-38648: no packages for Image SLES15-SP3-Manager-4-2-Server-BYOS-EC2-HVM, but entry?
CVE-2022-38648: no packages for Image SLES15-SP3-Manager-4-2-Server-BYOS-GCE, but entry?
CVE-2022-38648: no packages for Image SLES15-SP3-SAP-Azure-LI-BYOS-Production, but entry?
CVE-2022-38648: no packages for Image SLES15-SP3-SAP-Azure-VLI-BYOS-Production, but entry?
CVE-2022-38648: no packages for Image SLES15-SP3-SAPCAL-Azure, but entry?
CVE-2022-38648: no packages for Image SLES15-SP3-SAPCAL-EC2-HVM, but entry?
CVE-2022-38648: no packages for Image SLES15-SP3-SAPCAL-GCE, but entry?
CVE-2022-38648: no packages for Image SLES15-SP4-Manager-Server-4-3, but entry?
CVE-2022-38648: no packages for Image SLES15-SP4-Manager-Server-4-3-Azure-llc, but entry?
CVE-2022-38648: no packages for Image SLES15-SP4-Manager-Server-4-3-Azure-ltd, but entry?
CVE-2022-38648: no packages for Image SLES15-SP4-Manager-Server-4-3-BYOS, but entry?
CVE-2022-38648: no packages for Image SLES15-SP4-Manager-Server-4-3-BYOS-Azure, but entry?
CVE-2022-38648: no packages for Image SLES15-SP4-Manager-Server-4-3-BYOS-EC2, but entry?
CVE-2022-38648: no packages for Image SLES15-SP4-Manager-Server-4-3-BYOS-GCE, but entry?
CVE-2022-38648: no packages for Image SLES15-SP4-Manager-Server-4-3-EC2-llc, but entry?
CVE-2022-38648: no packages for Image SLES15-SP4-Manager-Server-4-3-EC2-ltd, but entry?
CVE-2022-38648: no packages for Image SLES15-SP4-SAP, but entry?
CVE-2022-38648: no packages for Image SLES15-SP4-SAP-Azure, but entry?
CVE-2022-38648: no packages for Image SLES15-SP4-SAP-Azure-LI-BYOS, but entry?
CVE-2022-38648: no packages for Image SLES15-SP4-SAP-Azure-LI-BYOS-Production, but entry?
CVE-2022-38648: no packages for Image SLES15-SP4-SAP-Azure-VLI-BYOS, but entry?
CVE-2022-38648: no packages for Image SLES15-SP4-SAP-Azure-VLI-BYOS-Production, but entry?
CVE-2022-38648: no packages for Image SLES15-SP4-SAP-EC2, but entry?
CVE-2022-38648: no packages for Image SLES15-SP4-SAP-GCE, but entry?
CVE-2022-38648: no packages for Image SLES15-SP4-SAPCAL, but entry?
CVE-2022-38648: no packages for Image SLES15-SP4-SAPCAL-Azure, but entry?
CVE-2022-38648: no packages for Image SLES15-SP4-SAPCAL-EC2, but entry?
CVE-2022-38648: no packages for Image SLES15-SP4-SAPCAL-GCE, but entry?
CVE-2022-38648: no packages for Image SLES15-SP5-SAP-Azure, but entry?
CVE-2022-38648: no packages for Image SLES15-SP5-SAP-Azure-LI-BYOS, but entry?
CVE-2022-38648: no packages for Image SLES15-SP5-SAP-Azure-LI-BYOS-Production, but entry?
CVE-2022-38648: no packages for Image SLES15-SP5-SAP-Azure-VLI-BYOS, but entry?
CVE-2022-38648: no packages for Image SLES15-SP5-SAP-Azure-VLI-BYOS-Production, but entry?
CVE-2022-38648: no packages for Image SLES15-SP5-SAP-EC2, but entry?
CVE-2022-38648: no packages for Image SLES15-SP5-SAP-GCE, but entry?
CVE-2022-38648: no packages for Image SLES15-SP5-SAPCAL-Azure, but entry?
CVE-2022-38648: no packages for Image SLES15-SP5-SAPCAL-EC2, but entry?
CVE-2022-38648: no packages for Image SLES15-SP5-SAPCAL-GCE, but entry?
CVE-2022-38648: no packages for Image SLES15-SP6-SAP, but entry?
CVE-2022-38648: no packages for Image SLES15-SP6-SAP-Azure, but entry?
CVE-2022-38648: no packages for Image SLES15-SP6-SAP-Azure-LI-BYOS, but entry?
CVE-2022-38648: no packages for Image SLES15-SP6-SAP-Azure-LI-BYOS-Production, but entry?
CVE-2022-38648: no packages for Image SLES15-SP6-SAP-Azure-VLI-BYOS, but entry?
CVE-2022-38648: no packages for Image SLES15-SP6-SAP-Azure-VLI-BYOS-Production, but entry?
CVE-2022-38648: no packages for Image SLES15-SP6-SAP-EC2, but entry?
CVE-2022-38648: no packages for Image SLES15-SP6-SAP-GCE, but entry?
CVE-2022-38648: no packages for Image SLES15-SP6-SAPCAL, but entry?
CVE-2022-38648: no packages for Image SLES15-SP6-SAPCAL-Azure, but entry?
CVE-2022-38648: no packages for Image SLES15-SP6-SAPCAL-EC2, but entry?
CVE-2022-38648: no packages for Image SLES15-SP6-SAPCAL-GCE, but entry?
CVE-2022-38648: no packages for SUSE CaaS Platform 4.0, but entry?
CVE-2022-38648: no packages for SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS, but entry?
CVE-2022-38648: no packages for SUSE Linux Enterprise Module for Basesystem 15 SP4, but entry?
CVE-2022-38648: no packages for SUSE Linux Enterprise Module for Basesystem 15 SP5, but entry?
CVE-2022-38648: no packages for SUSE Linux Enterprise Module for Basesystem 15 SP6, but entry?
CVE-2022-38648: no packages for SUSE Linux Enterprise Module for Development Tools 15 SP6, but entry?
CVE-2022-38648: no packages for SUSE Linux Enterprise Module for Package Hub 15 SP4, but entry?
CVE-2022-38648: no packages for SUSE Linux Enterprise Module for Package Hub 15 SP5, but entry?
CVE-2022-38648: no packages for SUSE Linux Enterprise Module for Web and Scripting 15 SP4, but entry?
CVE-2022-38648: no packages for SUSE Linux Enterprise Module for Web and Scripting 15 SP5, but entry?
CVE-2022-38648: no packages for SUSE Linux Enterprise Module for Web and Scripting 15 SP6, but entry?
CVE-2022-38648: no packages for SUSE Linux Enterprise Server 15 SP1-LTSS, but entry?
CVE-2022-38648: no packages for SUSE Linux Enterprise Server 15 SP4-TERADATA, but entry?
CVE-2022-38648: no packages for SUSE Linux Enterprise Server for SAP Applications 15 SP1, but entry?
CVE-2022-38648: no packages for SUSE Linux Enterprise Workstation Extension 15 SP4, but entry?
CVE-2022-38648: no packages for SUSE Linux Enterprise Workstation Extension 15 SP5, but entry?
CVE-2022-38648: no packages for SUSE Linux Enterprise Workstation Extension 15 SP6, but entry?
CVE-2022-38648: no packages for SUSE Manager Proxy 4.2, but entry?
CVE-2022-38648: no packages for SUSE Manager Retail Branch Server 4.2, but entry?
CVE-2022-38648: no packages for SUSE Manager Server 4.2, but entry?
CVE-2022-38648: no packages for SUSE Manager Server Module 4.2, but entry?
CVE-2022-38648: no packages for SUSE Manager Server Module 4.3, but entry?
CVE-2022-38648: no packages for Container bci/kiwi:9.24.43-8.6, but entry?
CVE-2022-38648: no packages for Container bci/openjdk-devel:11-6.2, but entry?
CVE-2022-38648: no packages for Container bci/openjdk-devel:17-14.11, but entry?
CVE-2022-38648: no packages for Container bci/openjdk-devel:17-7.2, but entry?
CVE-2022-38648: no packages for Container bci/openjdk:11-7.1, but entry?
CVE-2022-38648: no packages for Container bci/openjdk:17-7.1, but entry?
CVE-2022-38648: no packages for Container bci/openjdk:latest, but entry?
CVE-2022-38648: no packages for Container suse/manager/5.0/x86_64/server-attestation:5.0.0-beta2.2.16, but entry?
CVE-2022-38648: no packages for Container suse/manager/5.0/x86_64/server:5.0.0-beta1.2.122, but entry?
CVE-2022-38648: no packages for Image SLES15-SP2-SAP-Azure, but entry?
CVE-2022-38648: no packages for Image SLES15-SP2-SAP-Azure-LI-BYOS-Production, but entry?
CVE-2022-38648: no packages for Image SLES15-SP2-SAP-Azure-VLI-BYOS-Production, but entry?
CVE-2022-38648: no packages for Image SLES15-SP2-SAP-BYOS-Azure, but entry?
CVE-2022-38648: no packages for Image SLES15-SP2-SAP-BYOS-EC2-HVM, but entry?
CVE-2022-38648: no packages for Image SLES15-SP2-SAP-BYOS-GCE, but entry?
CVE-2022-38648: no packages for Image SLES15-SP2-SAP-EC2-HVM, but entry?
CVE-2022-38648: no packages for Image SLES15-SP2-SAP-GCE, but entry?
CVE-2022-38648: no packages for Image SLES15-SP3-Manager-4-2-Server-BYOS-Azure, but entry?
CVE-2022-38648: no packages for Image SLES15-SP3-Manager-4-2-Server-BYOS-EC2-HVM, but entry?
CVE-2022-38648: no packages for Image SLES15-SP3-Manager-4-2-Server-BYOS-GCE, but entry?
CVE-2022-38648: no packages for Image SLES15-SP3-SAP-Azure-LI-BYOS-Production, but entry?
CVE-2022-38648: no packages for Image SLES15-SP3-SAP-Azure-VLI-BYOS-Production, but entry?
CVE-2022-38648: no packages for Image SLES15-SP3-SAPCAL-Azure, but entry?
CVE-2022-38648: no packages for Image SLES15-SP3-SAPCAL-EC2-HVM, but entry?
CVE-2022-38648: no packages for Image SLES15-SP3-SAPCAL-GCE, but entry?
CVE-2022-38648: no packages for Image SLES15-SP4-Manager-Server-4-3, but entry?
CVE-2022-38648: no packages for Image SLES15-SP4-Manager-Server-4-3-Azure-llc, but entry?
CVE-2022-38648: no packages for Image SLES15-SP4-Manager-Server-4-3-Azure-ltd, but entry?
CVE-2022-38648: no packages for Image SLES15-SP4-Manager-Server-4-3-BYOS, but entry?
CVE-2022-38648: no packages for Image SLES15-SP4-Manager-Server-4-3-BYOS-Azure, but entry?
CVE-2022-38648: no packages for Image SLES15-SP4-Manager-Server-4-3-BYOS-EC2, but entry?
CVE-2022-38648: no packages for Image SLES15-SP4-Manager-Server-4-3-BYOS-GCE, but entry?
CVE-2022-38648: no packages for Image SLES15-SP4-Manager-Server-4-3-EC2-llc, but entry?
CVE-2022-38648: no packages for Image SLES15-SP4-Manager-Server-4-3-EC2-ltd, but entry?
CVE-2022-38648: no packages for Image SLES15-SP4-SAP, but entry?
CVE-2022-38648: no packages for Image SLES15-SP4-SAP-Azure, but entry?
CVE-2022-38648: no packages for Image SLES15-SP4-SAP-Azure-LI-BYOS, but entry?
CVE-2022-38648: no packages for Image SLES15-SP4-SAP-Azure-LI-BYOS-Production, but entry?
CVE-2022-38648: no packages for Image SLES15-SP4-SAP-Azure-VLI-BYOS, but entry?
CVE-2022-38648: no packages for Image SLES15-SP4-SAP-Azure-VLI-BYOS-Production, but entry?
CVE-2022-38648: no packages for Image SLES15-SP4-SAP-EC2, but entry?
CVE-2022-38648: no packages for Image SLES15-SP4-SAP-GCE, but entry?
CVE-2022-38648: no packages for Image SLES15-SP4-SAPCAL, but entry?
CVE-2022-38648: no packages for Image SLES15-SP4-SAPCAL-Azure, but entry?
CVE-2022-38648: no packages for Image SLES15-SP4-SAPCAL-EC2, but entry?
CVE-2022-38648: no packages for Image SLES15-SP4-SAPCAL-GCE, but entry?
CVE-2022-38648: no packages for Image SLES15-SP5-SAP-Azure, but entry?
CVE-2022-38648: no packages for Image SLES15-SP5-SAP-Azure-LI-BYOS, but entry?
CVE-2022-38648: no packages for Image SLES15-SP5-SAP-Azure-LI-BYOS-Production, but entry?
CVE-2022-38648: no packages for Image SLES15-SP5-SAP-Azure-VLI-BYOS, but entry?
CVE-2022-38648: no packages for Image SLES15-SP5-SAP-Azure-VLI-BYOS-Production, but entry?
CVE-2022-38648: no packages for Image SLES15-SP5-SAP-EC2, but entry?
CVE-2022-38648: no packages for Image SLES15-SP5-SAP-GCE, but entry?
CVE-2022-38648: no packages for Image SLES15-SP5-SAPCAL-Azure, but entry?
CVE-2022-38648: no packages for Image SLES15-SP5-SAPCAL-EC2, but entry?
CVE-2022-38648: no packages for Image SLES15-SP5-SAPCAL-GCE, but entry?
CVE-2022-38648: no packages for Image SLES15-SP6-SAP, but entry?
CVE-2022-38648: no packages for Image SLES15-SP6-SAP-Azure, but entry?
CVE-2022-38648: no packages for Image SLES15-SP6-SAP-Azure-LI-BYOS, but entry?
CVE-2022-38648: no packages for Image SLES15-SP6-SAP-Azure-LI-BYOS-Production, but entry?
CVE-2022-38648: no packages for Image SLES15-SP6-SAP-Azure-VLI-BYOS, but entry?
CVE-2022-38648: no packages for Image SLES15-SP6-SAP-Azure-VLI-BYOS-Production, but entry?
CVE-2022-38648: no packages for Image SLES15-SP6-SAP-EC2, but entry?
CVE-2022-38648: no packages for Image SLES15-SP6-SAP-GCE, but entry?
CVE-2022-38648: no packages for Image SLES15-SP6-SAPCAL, but entry?
CVE-2022-38648: no packages for Image SLES15-SP6-SAPCAL-Azure, but entry?
CVE-2022-38648: no packages for Image SLES15-SP6-SAPCAL-EC2, but entry?
CVE-2022-38648: no packages for Image SLES15-SP6-SAPCAL-GCE, but entry?
CVE-2022-38648: no packages for SUSE CaaS Platform 4.0, but entry?
CVE-2022-38648: no packages for SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS, but entry?
CVE-2022-38648: no packages for SUSE Linux Enterprise Module for Basesystem 15 SP4, but entry?
CVE-2022-38648: no packages for SUSE Linux Enterprise Module for Basesystem 15 SP5, but entry?
CVE-2022-38648: no packages for SUSE Linux Enterprise Module for Basesystem 15 SP6, but entry?
CVE-2022-38648: no packages for SUSE Linux Enterprise Module for Development Tools 15 SP6, but entry?
CVE-2022-38648: no packages for SUSE Linux Enterprise Module for Package Hub 15 SP4, but entry?
CVE-2022-38648: no packages for SUSE Linux Enterprise Module for Package Hub 15 SP5, but entry?
CVE-2022-38648: no packages for SUSE Linux Enterprise Module for Web and Scripting 15 SP4, but entry?
CVE-2022-38648: no packages for SUSE Linux Enterprise Module for Web and Scripting 15 SP5, but entry?
CVE-2022-38648: no packages for SUSE Linux Enterprise Module for Web and Scripting 15 SP6, but entry?
CVE-2022-38648: no packages for SUSE Linux Enterprise Server 15 SP1-LTSS, but entry?
CVE-2022-38648: no packages for SUSE Linux Enterprise Server 15 SP4-TERADATA, but entry?
CVE-2022-38648: no packages for SUSE Linux Enterprise Server for SAP Applications 15 SP1, but entry?
CVE-2022-38648: no packages for SUSE Linux Enterprise Workstation Extension 15 SP4, but entry?
CVE-2022-38648: no packages for SUSE Linux Enterprise Workstation Extension 15 SP5, but entry?
CVE-2022-38648: no packages for SUSE Linux Enterprise Workstation Extension 15 SP6, but entry?
CVE-2022-38648: no packages for SUSE Manager Proxy 4.2, but entry?
CVE-2022-38648: no packages for SUSE Manager Retail Branch Server 4.2, but entry?
CVE-2022-38648: no packages for SUSE Manager Server 4.2, but entry?
CVE-2022-38648: no packages for SUSE Manager Server Module 4.2, but entry?
CVE-2022-38648: no packages for SUSE Manager Server Module 4.3, but entry?
skipping CVE-2022-38533 as CVE page is older than CVRF-CVE file.
CVE-2022-38398: no packages for Image SLES15-SP3-SAPCAL-Azure, but entry?
CVE-2022-38398: no packages for Image SLES15-SP4-Manager-Server-4-3-EC2-ltd, but entry?
CVE-2022-38398: no packages for Image SLES15-SP3-SAP-Azure-VLI-BYOS-Production, but entry?
CVE-2022-38398: no packages for Image SLES15-SP5-SAP-Azure-LI-BYOS-Production, but entry?
CVE-2022-38398: no packages for SUSE Linux Enterprise Module for Basesystem 15 SP6, but entry?
CVE-2022-38398: no packages for Image SLES15-SP6-SAPCAL, but entry?
CVE-2022-38398: no packages for Image SLES15-SP5-SAP-Azure-VLI-BYOS, but entry?
CVE-2022-38398: no packages for Image SLES15-SP4-Manager-Server-4-3-Azure-llc, but entry?
CVE-2022-38398: no packages for Image SLES15-SP2-SAP-BYOS-GCE, but entry?
CVE-2022-38398: no packages for Container bci/openjdk:17-7.1, but entry?
CVE-2022-38398: no packages for SUSE Linux Enterprise Module for Basesystem 15 SP4, but entry?
CVE-2022-38398: no packages for Image SLES15-SP6-SAPCAL-EC2, but entry?
CVE-2022-38398: no packages for Image SLES15-SP4-SAPCAL, but entry?
CVE-2022-38398: no packages for Image SLES15-SP3-Manager-4-2-Server-BYOS-GCE, but entry?
CVE-2022-38398: no packages for SUSE Linux Enterprise Module for Web and Scripting 15 SP6, but entry?
CVE-2022-38398: no packages for Container bci/openjdk:latest, but entry?
CVE-2022-38398: no packages for Image SLES15-SP5-SAP-EC2, but entry?
CVE-2022-38398: no packages for SUSE Linux Enterprise Module for Web and Scripting 15 SP5, but entry?
CVE-2022-38398: no packages for Image SLES15-SP4-Manager-Server-4-3-Azure-ltd, but entry?
CVE-2022-38398: no packages for Image SLES15-SP2-SAP-BYOS-Azure, but entry?
CVE-2022-38398: no packages for SUSE Linux Enterprise Module for Package Hub 15 SP5, but entry?
CVE-2022-38398: no packages for Image SLES15-SP4-SAP-Azure, but entry?
CVE-2022-38398: no packages for SUSE Linux Enterprise Module for Package Hub 15 SP4, but entry?
CVE-2022-38398: no packages for Image SLES15-SP6-SAP-Azure-LI-BYOS-Production, but entry?
CVE-2022-38398: no packages for SUSE Linux Enterprise Workstation Extension 15 SP4, but entry?
CVE-2022-38398: no packages for Image SLES15-SP4-SAP, but entry?
CVE-2022-38398: no packages for SUSE Manager Retail Branch Server 4.2, but entry?
CVE-2022-38398: no packages for Image SLES15-SP4-Manager-Server-4-3, but entry?
CVE-2022-38398: no packages for Image SLES15-SP4-Manager-Server-4-3-EC2-llc, but entry?
CVE-2022-38398: no packages for SUSE Manager Proxy 4.2, but entry?
CVE-2022-38398: no packages for Container suse/manager/5.0/x86_64/server:5.0.0-beta1.2.122, but entry?
CVE-2022-38398: no packages for Image SLES15-SP4-SAP-Azure-LI-BYOS, but entry?
CVE-2022-38398: no packages for SUSE Manager Server 4.2, but entry?
CVE-2022-38398: no packages for Image SLES15-SP3-SAPCAL-EC2-HVM, but entry?
CVE-2022-38398: no packages for Image SLES15-SP4-SAP-Azure-LI-BYOS-Production, but entry?
CVE-2022-38398: no packages for Image SLES15-SP2-SAP-Azure-LI-BYOS-Production, but entry?
CVE-2022-38398: no packages for SUSE Linux Enterprise Module for Development Tools 15 SP6, but entry?
CVE-2022-38398: no packages for Image SLES15-SP4-Manager-Server-4-3-BYOS, but entry?
CVE-2022-38398: no packages for Image SLES15-SP6-SAP, but entry?
CVE-2022-38398: no packages for Image SLES15-SP3-SAPCAL-GCE, but entry?
CVE-2022-38398: no packages for Image SLES15-SP2-SAP-Azure, but entry?
CVE-2022-38398: no packages for Image SLES15-SP4-SAPCAL-GCE, but entry?
CVE-2022-38398: no packages for SUSE Linux Enterprise Module for Basesystem 15 SP5, but entry?
CVE-2022-38398: no packages for Image SLES15-SP2-SAP-GCE, but entry?
CVE-2022-38398: no packages for Image SLES15-SP3-Manager-4-2-Server-BYOS-Azure, but entry?
CVE-2022-38398: no packages for SUSE Linux Enterprise Module for Web and Scripting 15 SP4, but entry?
CVE-2022-38398: no packages for Image SLES15-SP4-SAPCAL-EC2, but entry?
CVE-2022-38398: no packages for Image SLES15-SP5-SAPCAL-EC2, but entry?
CVE-2022-38398: no packages for Image SLES15-SP4-SAPCAL-Azure, but entry?
CVE-2022-38398: no packages for Image SLES15-SP4-SAP-EC2, but entry?
CVE-2022-38398: no packages for SUSE Linux Enterprise Server for SAP Applications 15 SP1, but entry?
CVE-2022-38398: no packages for Container bci/openjdk:11-7.1, but entry?
CVE-2022-38398: no packages for Container bci/kiwi:9.24.43-8.6, but entry?
CVE-2022-38398: no packages for SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS, but entry?
CVE-2022-38398: no packages for Container bci/openjdk-devel:17-14.11, but entry?
CVE-2022-38398: no packages for Image SLES15-SP6-SAP-EC2, but entry?
CVE-2022-38398: no packages for Image SLES15-SP4-SAP-GCE, but entry?
CVE-2022-38398: no packages for Image SLES15-SP4-SAP-Azure-VLI-BYOS, but entry?
CVE-2022-38398: no packages for Image SLES15-SP6-SAP-Azure-LI-BYOS, but entry?
CVE-2022-38398: no packages for SUSE Linux Enterprise Server 15 SP4-TERADATA, but entry?
CVE-2022-38398: no packages for SUSE Manager Server Module 4.3, but entry?
CVE-2022-38398: no packages for Image SLES15-SP2-SAP-EC2-HVM, but entry?
CVE-2022-38398: no packages for Image SLES15-SP6-SAP-Azure-VLI-BYOS-Production, but entry?
CVE-2022-38398: no packages for SUSE Linux Enterprise Workstation Extension 15 SP6, but entry?
CVE-2022-38398: no packages for Image SLES15-SP3-SAP-Azure-LI-BYOS-Production, but entry?
CVE-2022-38398: no packages for Container bci/openjdk-devel:17-7.2, but entry?
CVE-2022-38398: no packages for SUSE Linux Enterprise Server 15 SP1-LTSS, but entry?
CVE-2022-38398: no packages for Image SLES15-SP5-SAPCAL-Azure, but entry?
CVE-2022-38398: no packages for Image SLES15-SP5-SAP-GCE, but entry?
CVE-2022-38398: no packages for SUSE Linux Enterprise Workstation Extension 15 SP5, but entry?
CVE-2022-38398: no packages for Image SLES15-SP6-SAP-GCE, but entry?
CVE-2022-38398: no packages for Image SLES15-SP4-Manager-Server-4-3-BYOS-Azure, but entry?
CVE-2022-38398: no packages for Image SLES15-SP3-Manager-4-2-Server-BYOS-EC2-HVM, but entry?
CVE-2022-38398: no packages for Image SLES15-SP4-Manager-Server-4-3-BYOS-GCE, but entry?
CVE-2022-38398: no packages for Container bci/openjdk-devel:11-6.2, but entry?
CVE-2022-38398: no packages for Image SLES15-SP6-SAPCAL-GCE, but entry?
CVE-2022-38398: no packages for Image SLES15-SP4-SAP-Azure-VLI-BYOS-Production, but entry?
CVE-2022-38398: no packages for Image SLES15-SP6-SAP-Azure, but entry?
CVE-2022-38398: no packages for Image SLES15-SP5-SAPCAL-GCE, but entry?
CVE-2022-38398: no packages for SUSE Manager Server Module 4.2, but entry?
CVE-2022-38398: no packages for Image SLES15-SP4-Manager-Server-4-3-BYOS-EC2, but entry?
CVE-2022-38398: no packages for Image SLES15-SP5-SAP-Azure-LI-BYOS, but entry?
CVE-2022-38398: no packages for Image SLES15-SP5-SAP-Azure-VLI-BYOS-Production, but entry?
CVE-2022-38398: no packages for SUSE CaaS Platform 4.0, but entry?
CVE-2022-38398: no packages for Container suse/manager/5.0/x86_64/server-attestation:5.0.0-beta2.2.16, but entry?
CVE-2022-38398: no packages for Image SLES15-SP6-SAP-Azure-VLI-BYOS, but entry?
CVE-2022-38398: no packages for Image SLES15-SP5-SAP-Azure, but entry?
CVE-2022-38398: no packages for Image SLES15-SP2-SAP-Azure-VLI-BYOS-Production, but entry?
CVE-2022-38398: no packages for Image SLES15-SP2-SAP-BYOS-EC2-HVM, but entry?
CVE-2022-38398: no packages for Image SLES15-SP6-SAPCAL-Azure, but entry?
CVE-2022-38398: no packages for Container bci/kiwi:9.24.43-8.6, but entry?
CVE-2022-38398: no packages for Container bci/openjdk-devel:11-6.2, but entry?
CVE-2022-38398: no packages for Container bci/openjdk-devel:17-14.11, but entry?
CVE-2022-38398: no packages for Container bci/openjdk-devel:17-7.2, but entry?
CVE-2022-38398: no packages for Container bci/openjdk:11-7.1, but entry?
CVE-2022-38398: no packages for Container bci/openjdk:17-7.1, but entry?
CVE-2022-38398: no packages for Container bci/openjdk:latest, but entry?
CVE-2022-38398: no packages for Container suse/manager/5.0/x86_64/server-attestation:5.0.0-beta2.2.16, but entry?
CVE-2022-38398: no packages for Container suse/manager/5.0/x86_64/server:5.0.0-beta1.2.122, but entry?
CVE-2022-38398: no packages for Image SLES15-SP2-SAP-Azure, but entry?
CVE-2022-38398: no packages for Image SLES15-SP2-SAP-Azure-LI-BYOS-Production, but entry?
CVE-2022-38398: no packages for Image SLES15-SP2-SAP-Azure-VLI-BYOS-Production, but entry?
CVE-2022-38398: no packages for Image SLES15-SP2-SAP-BYOS-Azure, but entry?
CVE-2022-38398: no packages for Image SLES15-SP2-SAP-BYOS-EC2-HVM, but entry?
CVE-2022-38398: no packages for Image SLES15-SP2-SAP-BYOS-GCE, but entry?
CVE-2022-38398: no packages for Image SLES15-SP2-SAP-EC2-HVM, but entry?
CVE-2022-38398: no packages for Image SLES15-SP2-SAP-GCE, but entry?
CVE-2022-38398: no packages for Image SLES15-SP3-Manager-4-2-Server-BYOS-Azure, but entry?
CVE-2022-38398: no packages for Image SLES15-SP3-Manager-4-2-Server-BYOS-EC2-HVM, but entry?
CVE-2022-38398: no packages for Image SLES15-SP3-Manager-4-2-Server-BYOS-GCE, but entry?
CVE-2022-38398: no packages for Image SLES15-SP3-SAP-Azure-LI-BYOS-Production, but entry?
CVE-2022-38398: no packages for Image SLES15-SP3-SAP-Azure-VLI-BYOS-Production, but entry?
CVE-2022-38398: no packages for Image SLES15-SP3-SAPCAL-Azure, but entry?
CVE-2022-38398: no packages for Image SLES15-SP3-SAPCAL-EC2-HVM, but entry?
CVE-2022-38398: no packages for Image SLES15-SP3-SAPCAL-GCE, but entry?
CVE-2022-38398: no packages for Image SLES15-SP4-Manager-Server-4-3, but entry?
CVE-2022-38398: no packages for Image SLES15-SP4-Manager-Server-4-3-Azure-llc, but entry?
CVE-2022-38398: no packages for Image SLES15-SP4-Manager-Server-4-3-Azure-ltd, but entry?
CVE-2022-38398: no packages for Image SLES15-SP4-Manager-Server-4-3-BYOS, but entry?
CVE-2022-38398: no packages for Image SLES15-SP4-Manager-Server-4-3-BYOS-Azure, but entry?
CVE-2022-38398: no packages for Image SLES15-SP4-Manager-Server-4-3-BYOS-EC2, but entry?
CVE-2022-38398: no packages for Image SLES15-SP4-Manager-Server-4-3-BYOS-GCE, but entry?
CVE-2022-38398: no packages for Image SLES15-SP4-Manager-Server-4-3-EC2-llc, but entry?
CVE-2022-38398: no packages for Image SLES15-SP4-Manager-Server-4-3-EC2-ltd, but entry?
CVE-2022-38398: no packages for Image SLES15-SP4-SAP, but entry?
CVE-2022-38398: no packages for Image SLES15-SP4-SAP-Azure, but entry?
CVE-2022-38398: no packages for Image SLES15-SP4-SAP-Azure-LI-BYOS, but entry?
CVE-2022-38398: no packages for Image SLES15-SP4-SAP-Azure-LI-BYOS-Production, but entry?
CVE-2022-38398: no packages for Image SLES15-SP4-SAP-Azure-VLI-BYOS, but entry?
CVE-2022-38398: no packages for Image SLES15-SP4-SAP-Azure-VLI-BYOS-Production, but entry?
CVE-2022-38398: no packages for Image SLES15-SP4-SAP-EC2, but entry?
CVE-2022-38398: no packages for Image SLES15-SP4-SAP-GCE, but entry?
CVE-2022-38398: no packages for Image SLES15-SP4-SAPCAL, but entry?
CVE-2022-38398: no packages for Image SLES15-SP4-SAPCAL-Azure, but entry?
CVE-2022-38398: no packages for Image SLES15-SP4-SAPCAL-EC2, but entry?
CVE-2022-38398: no packages for Image SLES15-SP4-SAPCAL-GCE, but entry?
CVE-2022-38398: no packages for Image SLES15-SP5-SAP-Azure, but entry?
CVE-2022-38398: no packages for Image SLES15-SP5-SAP-Azure-LI-BYOS, but entry?
CVE-2022-38398: no packages for Image SLES15-SP5-SAP-Azure-LI-BYOS-Production, but entry?
CVE-2022-38398: no packages for Image SLES15-SP5-SAP-Azure-VLI-BYOS, but entry?
CVE-2022-38398: no packages for Image SLES15-SP5-SAP-Azure-VLI-BYOS-Production, but entry?
CVE-2022-38398: no packages for Image SLES15-SP5-SAP-EC2, but entry?
CVE-2022-38398: no packages for Image SLES15-SP5-SAP-GCE, but entry?
CVE-2022-38398: no packages for Image SLES15-SP5-SAPCAL-Azure, but entry?
CVE-2022-38398: no packages for Image SLES15-SP5-SAPCAL-EC2, but entry?
CVE-2022-38398: no packages for Image SLES15-SP5-SAPCAL-GCE, but entry?
CVE-2022-38398: no packages for Image SLES15-SP6-SAP, but entry?
CVE-2022-38398: no packages for Image SLES15-SP6-SAP-Azure, but entry?
CVE-2022-38398: no packages for Image SLES15-SP6-SAP-Azure-LI-BYOS, but entry?
CVE-2022-38398: no packages for Image SLES15-SP6-SAP-Azure-LI-BYOS-Production, but entry?
CVE-2022-38398: no packages for Image SLES15-SP6-SAP-Azure-VLI-BYOS, but entry?
CVE-2022-38398: no packages for Image SLES15-SP6-SAP-Azure-VLI-BYOS-Production, but entry?
CVE-2022-38398: no packages for Image SLES15-SP6-SAP-EC2, but entry?
CVE-2022-38398: no packages for Image SLES15-SP6-SAP-GCE, but entry?
CVE-2022-38398: no packages for Image SLES15-SP6-SAPCAL, but entry?
CVE-2022-38398: no packages for Image SLES15-SP6-SAPCAL-Azure, but entry?
CVE-2022-38398: no packages for Image SLES15-SP6-SAPCAL-EC2, but entry?
CVE-2022-38398: no packages for Image SLES15-SP6-SAPCAL-GCE, but entry?
CVE-2022-38398: no packages for SUSE CaaS Platform 4.0, but entry?
CVE-2022-38398: no packages for SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS, but entry?
CVE-2022-38398: no packages for SUSE Linux Enterprise Module for Basesystem 15 SP4, but entry?
CVE-2022-38398: no packages for SUSE Linux Enterprise Module for Basesystem 15 SP5, but entry?
CVE-2022-38398: no packages for SUSE Linux Enterprise Module for Basesystem 15 SP6, but entry?
CVE-2022-38398: no packages for SUSE Linux Enterprise Module for Development Tools 15 SP6, but entry?
CVE-2022-38398: no packages for SUSE Linux Enterprise Module for Package Hub 15 SP4, but entry?
CVE-2022-38398: no packages for SUSE Linux Enterprise Module for Package Hub 15 SP5, but entry?
CVE-2022-38398: no packages for SUSE Linux Enterprise Module for Web and Scripting 15 SP4, but entry?
CVE-2022-38398: no packages for SUSE Linux Enterprise Module for Web and Scripting 15 SP5, but entry?
CVE-2022-38398: no packages for SUSE Linux Enterprise Module for Web and Scripting 15 SP6, but entry?
CVE-2022-38398: no packages for SUSE Linux Enterprise Server 15 SP1-LTSS, but entry?
CVE-2022-38398: no packages for SUSE Linux Enterprise Server 15 SP4-TERADATA, but entry?
CVE-2022-38398: no packages for SUSE Linux Enterprise Server for SAP Applications 15 SP1, but entry?
CVE-2022-38398: no packages for SUSE Linux Enterprise Workstation Extension 15 SP4, but entry?
CVE-2022-38398: no packages for SUSE Linux Enterprise Workstation Extension 15 SP5, but entry?
CVE-2022-38398: no packages for SUSE Linux Enterprise Workstation Extension 15 SP6, but entry?
CVE-2022-38398: no packages for SUSE Manager Proxy 4.2, but entry?
CVE-2022-38398: no packages for SUSE Manager Retail Branch Server 4.2, but entry?
CVE-2022-38398: no packages for SUSE Manager Server 4.2, but entry?
CVE-2022-38398: no packages for SUSE Manager Server Module 4.2, but entry?
CVE-2022-38398: no packages for SUSE Manager Server Module 4.3, but entry?
CVE-2022-38398: no packages for Container bci/kiwi:9.24.43-8.6, but entry?
CVE-2022-38398: no packages for Container bci/openjdk-devel:11-6.2, but entry?
CVE-2022-38398: no packages for Container bci/openjdk-devel:17-14.11, but entry?
CVE-2022-38398: no packages for Container bci/openjdk-devel:17-7.2, but entry?
CVE-2022-38398: no packages for Container bci/openjdk:11-7.1, but entry?
CVE-2022-38398: no packages for Container bci/openjdk:17-7.1, but entry?
CVE-2022-38398: no packages for Container bci/openjdk:latest, but entry?
CVE-2022-38398: no packages for Container suse/manager/5.0/x86_64/server-attestation:5.0.0-beta2.2.16, but entry?
CVE-2022-38398: no packages for Container suse/manager/5.0/x86_64/server:5.0.0-beta1.2.122, but entry?
CVE-2022-38398: no packages for Image SLES15-SP2-SAP-Azure, but entry?
CVE-2022-38398: no packages for Image SLES15-SP2-SAP-Azure-LI-BYOS-Production, but entry?
CVE-2022-38398: no packages for Image SLES15-SP2-SAP-Azure-VLI-BYOS-Production, but entry?
CVE-2022-38398: no packages for Image SLES15-SP2-SAP-BYOS-Azure, but entry?
CVE-2022-38398: no packages for Image SLES15-SP2-SAP-BYOS-EC2-HVM, but entry?
CVE-2022-38398: no packages for Image SLES15-SP2-SAP-BYOS-GCE, but entry?
CVE-2022-38398: no packages for Image SLES15-SP2-SAP-EC2-HVM, but entry?
CVE-2022-38398: no packages for Image SLES15-SP2-SAP-GCE, but entry?
CVE-2022-38398: no packages for Image SLES15-SP3-Manager-4-2-Server-BYOS-Azure, but entry?
CVE-2022-38398: no packages for Image SLES15-SP3-Manager-4-2-Server-BYOS-EC2-HVM, but entry?
CVE-2022-38398: no packages for Image SLES15-SP3-Manager-4-2-Server-BYOS-GCE, but entry?
CVE-2022-38398: no packages for Image SLES15-SP3-SAP-Azure-LI-BYOS-Production, but entry?
CVE-2022-38398: no packages for Image SLES15-SP3-SAP-Azure-VLI-BYOS-Production, but entry?
CVE-2022-38398: no packages for Image SLES15-SP3-SAPCAL-Azure, but entry?
CVE-2022-38398: no packages for Image SLES15-SP3-SAPCAL-EC2-HVM, but entry?
CVE-2022-38398: no packages for Image SLES15-SP3-SAPCAL-GCE, but entry?
CVE-2022-38398: no packages for Image SLES15-SP4-Manager-Server-4-3, but entry?
CVE-2022-38398: no packages for Image SLES15-SP4-Manager-Server-4-3-Azure-llc, but entry?
CVE-2022-38398: no packages for Image SLES15-SP4-Manager-Server-4-3-Azure-ltd, but entry?
CVE-2022-38398: no packages for Image SLES15-SP4-Manager-Server-4-3-BYOS, but entry?
CVE-2022-38398: no packages for Image SLES15-SP4-Manager-Server-4-3-BYOS-Azure, but entry?
CVE-2022-38398: no packages for Image SLES15-SP4-Manager-Server-4-3-BYOS-EC2, but entry?
CVE-2022-38398: no packages for Image SLES15-SP4-Manager-Server-4-3-BYOS-GCE, but entry?
CVE-2022-38398: no packages for Image SLES15-SP4-Manager-Server-4-3-EC2-llc, but entry?
CVE-2022-38398: no packages for Image SLES15-SP4-Manager-Server-4-3-EC2-ltd, but entry?
CVE-2022-38398: no packages for Image SLES15-SP4-SAP, but entry?
CVE-2022-38398: no packages for Image SLES15-SP4-SAP-Azure, but entry?
CVE-2022-38398: no packages for Image SLES15-SP4-SAP-Azure-LI-BYOS, but entry?
CVE-2022-38398: no packages for Image SLES15-SP4-SAP-Azure-LI-BYOS-Production, but entry?
CVE-2022-38398: no packages for Image SLES15-SP4-SAP-Azure-VLI-BYOS, but entry?
CVE-2022-38398: no packages for Image SLES15-SP4-SAP-Azure-VLI-BYOS-Production, but entry?
CVE-2022-38398: no packages for Image SLES15-SP4-SAP-EC2, but entry?
CVE-2022-38398: no packages for Image SLES15-SP4-SAP-GCE, but entry?
CVE-2022-38398: no packages for Image SLES15-SP4-SAPCAL, but entry?
CVE-2022-38398: no packages for Image SLES15-SP4-SAPCAL-Azure, but entry?
CVE-2022-38398: no packages for Image SLES15-SP4-SAPCAL-EC2, but entry?
CVE-2022-38398: no packages for Image SLES15-SP4-SAPCAL-GCE, but entry?
CVE-2022-38398: no packages for Image SLES15-SP5-SAP-Azure, but entry?
CVE-2022-38398: no packages for Image SLES15-SP5-SAP-Azure-LI-BYOS, but entry?
CVE-2022-38398: no packages for Image SLES15-SP5-SAP-Azure-LI-BYOS-Production, but entry?
CVE-2022-38398: no packages for Image SLES15-SP5-SAP-Azure-VLI-BYOS, but entry?
CVE-2022-38398: no packages for Image SLES15-SP5-SAP-Azure-VLI-BYOS-Production, but entry?
CVE-2022-38398: no packages for Image SLES15-SP5-SAP-EC2, but entry?
CVE-2022-38398: no packages for Image SLES15-SP5-SAP-GCE, but entry?
CVE-2022-38398: no packages for Image SLES15-SP5-SAPCAL-Azure, but entry?
CVE-2022-38398: no packages for Image SLES15-SP5-SAPCAL-EC2, but entry?
CVE-2022-38398: no packages for Image SLES15-SP5-SAPCAL-GCE, but entry?
CVE-2022-38398: no packages for Image SLES15-SP6-SAP, but entry?
CVE-2022-38398: no packages for Image SLES15-SP6-SAP-Azure, but entry?
CVE-2022-38398: no packages for Image SLES15-SP6-SAP-Azure-LI-BYOS, but entry?
CVE-2022-38398: no packages for Image SLES15-SP6-SAP-Azure-LI-BYOS-Production, but entry?
CVE-2022-38398: no packages for Image SLES15-SP6-SAP-Azure-VLI-BYOS, but entry?
CVE-2022-38398: no packages for Image SLES15-SP6-SAP-Azure-VLI-BYOS-Production, but entry?
CVE-2022-38398: no packages for Image SLES15-SP6-SAP-EC2, but entry?
CVE-2022-38398: no packages for Image SLES15-SP6-SAP-GCE, but entry?
CVE-2022-38398: no packages for Image SLES15-SP6-SAPCAL, but entry?
CVE-2022-38398: no packages for Image SLES15-SP6-SAPCAL-Azure, but entry?
CVE-2022-38398: no packages for Image SLES15-SP6-SAPCAL-EC2, but entry?
CVE-2022-38398: no packages for Image SLES15-SP6-SAPCAL-GCE, but entry?
CVE-2022-38398: no packages for SUSE CaaS Platform 4.0, but entry?
CVE-2022-38398: no packages for SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS, but entry?
CVE-2022-38398: no packages for SUSE Linux Enterprise Module for Basesystem 15 SP4, but entry?
CVE-2022-38398: no packages for SUSE Linux Enterprise Module for Basesystem 15 SP5, but entry?
CVE-2022-38398: no packages for SUSE Linux Enterprise Module for Basesystem 15 SP6, but entry?
CVE-2022-38398: no packages for SUSE Linux Enterprise Module for Development Tools 15 SP6, but entry?
CVE-2022-38398: no packages for SUSE Linux Enterprise Module for Package Hub 15 SP4, but entry?
CVE-2022-38398: no packages for SUSE Linux Enterprise Module for Package Hub 15 SP5, but entry?
CVE-2022-38398: no packages for SUSE Linux Enterprise Module for Web and Scripting 15 SP4, but entry?
CVE-2022-38398: no packages for SUSE Linux Enterprise Module for Web and Scripting 15 SP5, but entry?
CVE-2022-38398: no packages for SUSE Linux Enterprise Module for Web and Scripting 15 SP6, but entry?
CVE-2022-38398: no packages for SUSE Linux Enterprise Server 15 SP1-LTSS, but entry?
CVE-2022-38398: no packages for SUSE Linux Enterprise Server 15 SP4-TERADATA, but entry?
CVE-2022-38398: no packages for SUSE Linux Enterprise Server for SAP Applications 15 SP1, but entry?
CVE-2022-38398: no packages for SUSE Linux Enterprise Workstation Extension 15 SP4, but entry?
CVE-2022-38398: no packages for SUSE Linux Enterprise Workstation Extension 15 SP5, but entry?
CVE-2022-38398: no packages for SUSE Linux Enterprise Workstation Extension 15 SP6, but entry?
CVE-2022-38398: no packages for SUSE Manager Proxy 4.2, but entry?
CVE-2022-38398: no packages for SUSE Manager Retail Branch Server 4.2, but entry?
CVE-2022-38398: no packages for SUSE Manager Server 4.2, but entry?
CVE-2022-38398: no packages for SUSE Manager Server Module 4.2, but entry?
CVE-2022-38398: no packages for SUSE Manager Server Module 4.3, but entry?
skipping CVE-2022-38478 as CVE page is older than CVRF-CVE file.
skipping CVE-2022-38477 as CVE page is older than CVRF-CVE file.
skipping CVE-2022-38476 as CVE page is older than CVRF-CVE file.
skipping CVE-2022-38475 as CVE page is older than CVRF-CVE file.
skipping CVE-2022-38474 as CVE page is older than CVRF-CVE file.
skipping CVE-2022-38473 as CVE page is older than CVRF-CVE file.
skipping CVE-2022-38472 as CVE page is older than CVRF-CVE file.
skipping CVE-2022-38457 as CVE page is older than CVRF-CVE file.
skipping CVE-2022-38349 as CVE page is older than CVRF-CVE file.
skipping CVE-2022-38334 as CVE page is older than CVRF-CVE file.
no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2022-38223
skipping CVE-2022-38238 as CVE page is older than CVRF-CVE file.
skipping CVE-2022-38237 as CVE page is older than CVRF-CVE file.
skipping CVE-2022-38236 as CVE page is older than CVRF-CVE file.
skipping CVE-2022-38235 as CVE page is older than CVRF-CVE file.
skipping CVE-2022-38234 as CVE page is older than CVRF-CVE file.
skipping CVE-2022-38233 as CVE page is older than CVRF-CVE file.
skipping CVE-2022-38231 as CVE page is older than CVRF-CVE file.
skipping CVE-2022-38230 as CVE page is older than CVRF-CVE file.
skipping CVE-2022-38229 as CVE page is older than CVRF-CVE file.
skipping CVE-2022-38228 as CVE page is older than CVRF-CVE file.
skipping CVE-2022-38227 as CVE page is older than CVRF-CVE file.
no cpe found for SUSE Package Hub 15 SP4 in CVE-2022-38150
skipping CVE-2022-38222 as CVE page is older than CVRF-CVE file.
skipping CVE-2022-38178 as CVE page is older than CVRF-CVE file.
skipping CVE-2022-38177 as CVE page is older than CVRF-CVE file.
skipping CVE-2022-38171 as CVE page is older than CVRF-CVE file.
no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2022-38090
skipping CVE-2022-38128 as CVE page is older than CVRF-CVE file.
skipping CVE-2022-38127 as CVE page is older than CVRF-CVE file.
skipping CVE-2022-38126 as CVE page is older than CVRF-CVE file.
skipping CVE-2022-38096 as CVE page is older than CVRF-CVE file.
no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2022-38023
no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2022-37967
no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2022-37966
CVE-2022-37866: no packages for Image SLES15-SP6-SAP-Azure-VLI-BYOS-Production, but entry?
CVE-2022-37866: no packages for Image SLES15-SP2-SAP-EC2-HVM, but entry?
CVE-2022-37866: no packages for SUSE Manager Server Module 4.3, but entry?
CVE-2022-37866: no packages for SUSE Linux Enterprise Workstation Extension 15 SP6, but entry?
CVE-2022-37866: no packages for Image SLES15-SP3-SAP-Azure-LI-BYOS-Production, but entry?
CVE-2022-37866: no packages for Image SLES15-SP6-SAP-EC2, but entry?
CVE-2022-37866: no packages for Image SLES15-SP4-SAP-GCE, but entry?
CVE-2022-37866: no packages for Image SLES15-SP6-SAP-Azure-LI-BYOS, but entry?
CVE-2022-37866: no packages for Image SLES15-SP4-SAP-Azure-VLI-BYOS, but entry?
CVE-2022-37866: no packages for SUSE Linux Enterprise Server 15 SP4-TERADATA, but entry?
CVE-2022-37866: no packages for Image SLES15-SP4-SAPCAL-EC2, but entry?
CVE-2022-37866: no packages for SUSE Linux Enterprise Module for Web and Scripting 15 SP4, but entry?
CVE-2022-37866: no packages for Image SLES15-SP4-SAPCAL-Azure, but entry?
CVE-2022-37866: no packages for Image SLES15-SP5-SAPCAL-EC2, but entry?
CVE-2022-37866: no packages for Container bci/openjdk:11-7.1, but entry?
CVE-2022-37866: no packages for SUSE Linux Enterprise Server for SAP Applications 15 SP1, but entry?
CVE-2022-37866: no packages for Image SLES15-SP4-SAP-EC2, but entry?
CVE-2022-37866: no packages for SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS, but entry?
CVE-2022-37866: no packages for Container bci/kiwi:9.24.43-8.6, but entry?
CVE-2022-37866: no packages for Container bci/openjdk-devel:17-14.11, but entry?
CVE-2022-37866: no packages for Image SLES15-SP2-SAP-GCE, but entry?
CVE-2022-37866: no packages for Image SLES15-SP3-Manager-4-2-Server-BYOS-Azure, but entry?
CVE-2022-37866: no packages for Container suse/manager/5.0/x86_64/server-attestation:5.0.0-beta2.2.16, but entry?
CVE-2022-37866: no packages for Image SLES15-SP6-SAP-Azure-VLI-BYOS, but entry?
CVE-2022-37866: no packages for Image SLES15-SP5-SAP-Azure, but entry?
CVE-2022-37866: no packages for Image SLES15-SP2-SAP-Azure-VLI-BYOS-Production, but entry?
CVE-2022-37866: no packages for Image SLES15-SP6-SAPCAL-Azure, but entry?
CVE-2022-37866: no packages for Image SLES15-SP2-SAP-BYOS-EC2-HVM, but entry?
CVE-2022-37866: no packages for SUSE CaaS Platform 4.0, but entry?
CVE-2022-37866: no packages for Image SLES15-SP5-SAP-Azure-VLI-BYOS-Production, but entry?
CVE-2022-37866: no packages for Image SLES15-SP4-Manager-Server-4-3-BYOS-Azure, but entry?
CVE-2022-37866: no packages for Image SLES15-SP6-SAP-GCE, but entry?
CVE-2022-37866: no packages for Image SLES15-SP3-Manager-4-2-Server-BYOS-EC2-HVM, but entry?
CVE-2022-37866: no packages for Container bci/openjdk-devel:11-6.2, but entry?
CVE-2022-37866: no packages for Image SLES15-SP4-Manager-Server-4-3-BYOS-GCE, but entry?
CVE-2022-37866: no packages for Image SLES15-SP6-SAPCAL-GCE, but entry?
CVE-2022-37866: no packages for Image SLES15-SP4-SAP-Azure-VLI-BYOS-Production, but entry?
CVE-2022-37866: no packages for Image SLES15-SP5-SAPCAL-GCE, but entry?
CVE-2022-37866: no packages for Image SLES15-SP6-SAP-Azure, but entry?
CVE-2022-37866: no packages for SUSE Manager Server Module 4.2, but entry?
CVE-2022-37866: no packages for Image SLES15-SP5-SAP-Azure-LI-BYOS, but entry?
CVE-2022-37866: no packages for Image SLES15-SP4-Manager-Server-4-3-BYOS-EC2, but entry?
CVE-2022-37866: no packages for SUSE Linux Enterprise Server 15 SP1-LTSS, but entry?
CVE-2022-37866: no packages for Container bci/openjdk-devel:17-7.2, but entry?
CVE-2022-37866: no packages for Image SLES15-SP5-SAPCAL-Azure, but entry?
CVE-2022-37866: no packages for SUSE Linux Enterprise Workstation Extension 15 SP5, but entry?
CVE-2022-37866: no packages for Image SLES15-SP5-SAP-GCE, but entry?
CVE-2022-37866: no packages for Image SLES15-SP5-SAP-EC2, but entry?
CVE-2022-37866: no packages for SUSE Linux Enterprise Module for Web and Scripting 15 SP5, but entry?
CVE-2022-37866: no packages for Image SLES15-SP4-Manager-Server-4-3-Azure-ltd, but entry?
CVE-2022-37866: no packages for Image SLES15-SP2-SAP-BYOS-Azure, but entry?
CVE-2022-37866: no packages for Image SLES15-SP6-SAPCAL-EC2, but entry?
CVE-2022-37866: no packages for Image SLES15-SP4-SAPCAL, but entry?
CVE-2022-37866: no packages for Image SLES15-SP3-Manager-4-2-Server-BYOS-GCE, but entry?
CVE-2022-37866: no packages for SUSE Linux Enterprise Module for Web and Scripting 15 SP6, but entry?
CVE-2022-37866: no packages for Container bci/openjdk:latest, but entry?
CVE-2022-37866: no packages for Image SLES15-SP4-Manager-Server-4-3-Azure-llc, but entry?
CVE-2022-37866: no packages for Image SLES15-SP2-SAP-BYOS-GCE, but entry?
CVE-2022-37866: no packages for Container bci/openjdk:17-7.1, but entry?
CVE-2022-37866: no packages for SUSE Linux Enterprise Module for Package Hub 15 SP6, but entry?
CVE-2022-37866: no packages for SUSE Linux Enterprise Module for Basesystem 15 SP4, but entry?
CVE-2022-37866: no packages for Image SLES15-SP4-Manager-Server-4-3-EC2-ltd, but entry?
CVE-2022-37866: no packages for Image SLES15-SP3-SAPCAL-Azure, but entry?
CVE-2022-37866: no packages for Image SLES15-SP3-SAP-Azure-VLI-BYOS-Production, but entry?
CVE-2022-37866: no packages for SUSE Linux Enterprise Module for Basesystem 15 SP6, but entry?
CVE-2022-37866: no packages for Image SLES15-SP5-SAP-Azure-LI-BYOS-Production, but entry?
CVE-2022-37866: no packages for Image SLES15-SP5-SAP-Azure-VLI-BYOS, but entry?
CVE-2022-37866: no packages for Image SLES15-SP6-SAPCAL, but entry?
CVE-2022-37866: no packages for Image SLES15-SP6-SAP, but entry?
CVE-2022-37866: no packages for Image SLES15-SP3-SAPCAL-GCE, but entry?
CVE-2022-37866: no packages for Image SLES15-SP2-SAP-Azure, but entry?
CVE-2022-37866: no packages for Image SLES15-SP4-SAPCAL-GCE, but entry?
CVE-2022-37866: no packages for SUSE Linux Enterprise Module for Basesystem 15 SP5, but entry?
CVE-2022-37866: no packages for Container suse/manager/5.0/x86_64/server:5.0.0-beta1.2.122, but entry?
CVE-2022-37866: no packages for Image SLES15-SP4-SAP-Azure-LI-BYOS, but entry?
CVE-2022-37866: no packages for Image SLES15-SP2-SAP-Azure-LI-BYOS-Production, but entry?
CVE-2022-37866: no packages for Image SLES15-SP4-SAP-Azure-LI-BYOS-Production, but entry?
CVE-2022-37866: no packages for Image SLES15-SP3-SAPCAL-EC2-HVM, but entry?
CVE-2022-37866: no packages for SUSE Manager Server 4.2, but entry?
CVE-2022-37866: no packages for Image SLES15-SP4-Manager-Server-4-3-BYOS, but entry?
CVE-2022-37866: no packages for Image SLES15-SP4-SAP, but entry?
CVE-2022-37866: no packages for SUSE Manager Retail Branch Server 4.2, but entry?
CVE-2022-37866: no packages for Image SLES15-SP4-Manager-Server-4-3, but entry?
CVE-2022-37866: no packages for Image SLES15-SP4-Manager-Server-4-3-EC2-llc, but entry?
CVE-2022-37866: no packages for SUSE Manager Proxy 4.2, but entry?
CVE-2022-37866: no packages for SUSE Linux Enterprise Module for Package Hub 15 SP5, but entry?
CVE-2022-37866: no packages for Image SLES15-SP4-SAP-Azure, but entry?
CVE-2022-37866: no packages for SUSE Linux Enterprise Module for Package Hub 15 SP4, but entry?
CVE-2022-37866: no packages for Image SLES15-SP6-SAP-Azure-LI-BYOS-Production, but entry?
CVE-2022-37866: no packages for SUSE Linux Enterprise Workstation Extension 15 SP4, but entry?
CVE-2022-37866: no packages for Container bci/kiwi:9.24.43-8.6, but entry?
CVE-2022-37866: no packages for Container bci/openjdk-devel:11-6.2, but entry?
CVE-2022-37866: no packages for Container bci/openjdk-devel:17-14.11, but entry?
CVE-2022-37866: no packages for Container bci/openjdk-devel:17-7.2, but entry?
CVE-2022-37866: no packages for Container bci/openjdk:11-7.1, but entry?
CVE-2022-37866: no packages for Container bci/openjdk:17-7.1, but entry?
CVE-2022-37866: no packages for Container bci/openjdk:latest, but entry?
CVE-2022-37866: no packages for Container suse/manager/5.0/x86_64/server-attestation:5.0.0-beta2.2.16, but entry?
CVE-2022-37866: no packages for Container suse/manager/5.0/x86_64/server:5.0.0-beta1.2.122, but entry?
CVE-2022-37866: no packages for Image SLES15-SP2-SAP-Azure, but entry?
CVE-2022-37866: no packages for Image SLES15-SP2-SAP-Azure-LI-BYOS-Production, but entry?
CVE-2022-37866: no packages for Image SLES15-SP2-SAP-Azure-VLI-BYOS-Production, but entry?
CVE-2022-37866: no packages for Image SLES15-SP2-SAP-BYOS-Azure, but entry?
CVE-2022-37866: no packages for Image SLES15-SP2-SAP-BYOS-EC2-HVM, but entry?
CVE-2022-37866: no packages for Image SLES15-SP2-SAP-BYOS-GCE, but entry?
CVE-2022-37866: no packages for Image SLES15-SP2-SAP-EC2-HVM, but entry?
CVE-2022-37866: no packages for Image SLES15-SP2-SAP-GCE, but entry?
CVE-2022-37866: no packages for Image SLES15-SP3-Manager-4-2-Server-BYOS-Azure, but entry?
CVE-2022-37866: no packages for Image SLES15-SP3-Manager-4-2-Server-BYOS-EC2-HVM, but entry?
CVE-2022-37866: no packages for Image SLES15-SP3-Manager-4-2-Server-BYOS-GCE, but entry?
CVE-2022-37866: no packages for Image SLES15-SP3-SAP-Azure-LI-BYOS-Production, but entry?
CVE-2022-37866: no packages for Image SLES15-SP3-SAP-Azure-VLI-BYOS-Production, but entry?
CVE-2022-37866: no packages for Image SLES15-SP3-SAPCAL-Azure, but entry?
CVE-2022-37866: no packages for Image SLES15-SP3-SAPCAL-EC2-HVM, but entry?
CVE-2022-37866: no packages for Image SLES15-SP3-SAPCAL-GCE, but entry?
CVE-2022-37866: no packages for Image SLES15-SP4-Manager-Server-4-3, but entry?
CVE-2022-37866: no packages for Image SLES15-SP4-Manager-Server-4-3-Azure-llc, but entry?
CVE-2022-37866: no packages for Image SLES15-SP4-Manager-Server-4-3-Azure-ltd, but entry?
CVE-2022-37866: no packages for Image SLES15-SP4-Manager-Server-4-3-BYOS, but entry?
CVE-2022-37866: no packages for Image SLES15-SP4-Manager-Server-4-3-BYOS-Azure, but entry?
CVE-2022-37866: no packages for Image SLES15-SP4-Manager-Server-4-3-BYOS-EC2, but entry?
CVE-2022-37866: no packages for Image SLES15-SP4-Manager-Server-4-3-BYOS-GCE, but entry?
CVE-2022-37866: no packages for Image SLES15-SP4-Manager-Server-4-3-EC2-llc, but entry?
CVE-2022-37866: no packages for Image SLES15-SP4-Manager-Server-4-3-EC2-ltd, but entry?
CVE-2022-37866: no packages for Image SLES15-SP4-SAP, but entry?
CVE-2022-37866: no packages for Image SLES15-SP4-SAP-Azure, but entry?
CVE-2022-37866: no packages for Image SLES15-SP4-SAP-Azure-LI-BYOS, but entry?
CVE-2022-37866: no packages for Image SLES15-SP4-SAP-Azure-LI-BYOS-Production, but entry?
CVE-2022-37866: no packages for Image SLES15-SP4-SAP-Azure-VLI-BYOS, but entry?
CVE-2022-37866: no packages for Image SLES15-SP4-SAP-Azure-VLI-BYOS-Production, but entry?
CVE-2022-37866: no packages for Image SLES15-SP4-SAP-EC2, but entry?
CVE-2022-37866: no packages for Image SLES15-SP4-SAP-GCE, but entry?
CVE-2022-37866: no packages for Image SLES15-SP4-SAPCAL, but entry?
CVE-2022-37866: no packages for Image SLES15-SP4-SAPCAL-Azure, but entry?
CVE-2022-37866: no packages for Image SLES15-SP4-SAPCAL-EC2, but entry?
CVE-2022-37866: no packages for Image SLES15-SP4-SAPCAL-GCE, but entry?
CVE-2022-37866: no packages for Image SLES15-SP5-SAP-Azure, but entry?
CVE-2022-37866: no packages for Image SLES15-SP5-SAP-Azure-LI-BYOS, but entry?
CVE-2022-37866: no packages for Image SLES15-SP5-SAP-Azure-LI-BYOS-Production, but entry?
CVE-2022-37866: no packages for Image SLES15-SP5-SAP-Azure-VLI-BYOS, but entry?
CVE-2022-37866: no packages for Image SLES15-SP5-SAP-Azure-VLI-BYOS-Production, but entry?
CVE-2022-37866: no packages for Image SLES15-SP5-SAP-EC2, but entry?
CVE-2022-37866: no packages for Image SLES15-SP5-SAP-GCE, but entry?
CVE-2022-37866: no packages for Image SLES15-SP5-SAPCAL-Azure, but entry?
CVE-2022-37866: no packages for Image SLES15-SP5-SAPCAL-EC2, but entry?
CVE-2022-37866: no packages for Image SLES15-SP5-SAPCAL-GCE, but entry?
CVE-2022-37866: no packages for Image SLES15-SP6-SAP, but entry?
CVE-2022-37866: no packages for Image SLES15-SP6-SAP-Azure, but entry?
CVE-2022-37866: no packages for Image SLES15-SP6-SAP-Azure-LI-BYOS, but entry?
CVE-2022-37866: no packages for Image SLES15-SP6-SAP-Azure-LI-BYOS-Production, but entry?
CVE-2022-37866: no packages for Image SLES15-SP6-SAP-Azure-VLI-BYOS, but entry?
CVE-2022-37866: no packages for Image SLES15-SP6-SAP-Azure-VLI-BYOS-Production, but entry?
CVE-2022-37866: no packages for Image SLES15-SP6-SAP-EC2, but entry?
CVE-2022-37866: no packages for Image SLES15-SP6-SAP-GCE, but entry?
CVE-2022-37866: no packages for Image SLES15-SP6-SAPCAL, but entry?
CVE-2022-37866: no packages for Image SLES15-SP6-SAPCAL-Azure, but entry?
CVE-2022-37866: no packages for Image SLES15-SP6-SAPCAL-EC2, but entry?
CVE-2022-37866: no packages for Image SLES15-SP6-SAPCAL-GCE, but entry?
CVE-2022-37866: no packages for SUSE CaaS Platform 4.0, but entry?
CVE-2022-37866: no packages for SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS, but entry?
CVE-2022-37866: no packages for SUSE Linux Enterprise Module for Basesystem 15 SP4, but entry?
CVE-2022-37866: no packages for SUSE Linux Enterprise Module for Basesystem 15 SP5, but entry?
CVE-2022-37866: no packages for SUSE Linux Enterprise Module for Basesystem 15 SP6, but entry?
CVE-2022-37866: no packages for SUSE Linux Enterprise Module for Package Hub 15 SP4, but entry?
CVE-2022-37866: no packages for SUSE Linux Enterprise Module for Package Hub 15 SP5, but entry?
CVE-2022-37866: no packages for SUSE Linux Enterprise Module for Package Hub 15 SP6, but entry?
CVE-2022-37866: no packages for SUSE Linux Enterprise Module for Web and Scripting 15 SP4, but entry?
CVE-2022-37866: no packages for SUSE Linux Enterprise Module for Web and Scripting 15 SP5, but entry?
CVE-2022-37866: no packages for SUSE Linux Enterprise Module for Web and Scripting 15 SP6, but entry?
CVE-2022-37866: no packages for SUSE Linux Enterprise Server 15 SP1-LTSS, but entry?
CVE-2022-37866: no packages for SUSE Linux Enterprise Server 15 SP4-TERADATA, but entry?
CVE-2022-37866: no packages for SUSE Linux Enterprise Server for SAP Applications 15 SP1, but entry?
CVE-2022-37866: no packages for SUSE Linux Enterprise Workstation Extension 15 SP4, but entry?
CVE-2022-37866: no packages for SUSE Linux Enterprise Workstation Extension 15 SP5, but entry?
CVE-2022-37866: no packages for SUSE Linux Enterprise Workstation Extension 15 SP6, but entry?
CVE-2022-37866: no packages for SUSE Manager Proxy 4.2, but entry?
CVE-2022-37866: no packages for SUSE Manager Retail Branch Server 4.2, but entry?
CVE-2022-37866: no packages for SUSE Manager Server 4.2, but entry?
CVE-2022-37866: no packages for SUSE Manager Server Module 4.2, but entry?
CVE-2022-37866: no packages for SUSE Manager Server Module 4.3, but entry?
CVE-2022-37866: no packages for Container bci/kiwi:9.24.43-8.6, but entry?
CVE-2022-37866: no packages for Container bci/openjdk-devel:11-6.2, but entry?
CVE-2022-37866: no packages for Container bci/openjdk-devel:17-14.11, but entry?
CVE-2022-37866: no packages for Container bci/openjdk-devel:17-7.2, but entry?
CVE-2022-37866: no packages for Container bci/openjdk:11-7.1, but entry?
CVE-2022-37866: no packages for Container bci/openjdk:17-7.1, but entry?
CVE-2022-37866: no packages for Container bci/openjdk:latest, but entry?
CVE-2022-37866: no packages for Container suse/manager/5.0/x86_64/server-attestation:5.0.0-beta2.2.16, but entry?
CVE-2022-37866: no packages for Container suse/manager/5.0/x86_64/server:5.0.0-beta1.2.122, but entry?
CVE-2022-37866: no packages for Image SLES15-SP2-SAP-Azure, but entry?
CVE-2022-37866: no packages for Image SLES15-SP2-SAP-Azure-LI-BYOS-Production, but entry?
CVE-2022-37866: no packages for Image SLES15-SP2-SAP-Azure-VLI-BYOS-Production, but entry?
CVE-2022-37866: no packages for Image SLES15-SP2-SAP-BYOS-Azure, but entry?
CVE-2022-37866: no packages for Image SLES15-SP2-SAP-BYOS-EC2-HVM, but entry?
CVE-2022-37866: no packages for Image SLES15-SP2-SAP-BYOS-GCE, but entry?
CVE-2022-37866: no packages for Image SLES15-SP2-SAP-EC2-HVM, but entry?
CVE-2022-37866: no packages for Image SLES15-SP2-SAP-GCE, but entry?
CVE-2022-37866: no packages for Image SLES15-SP3-Manager-4-2-Server-BYOS-Azure, but entry?
CVE-2022-37866: no packages for Image SLES15-SP3-Manager-4-2-Server-BYOS-EC2-HVM, but entry?
CVE-2022-37866: no packages for Image SLES15-SP3-Manager-4-2-Server-BYOS-GCE, but entry?
CVE-2022-37866: no packages for Image SLES15-SP3-SAP-Azure-LI-BYOS-Production, but entry?
CVE-2022-37866: no packages for Image SLES15-SP3-SAP-Azure-VLI-BYOS-Production, but entry?
CVE-2022-37866: no packages for Image SLES15-SP3-SAPCAL-Azure, but entry?
CVE-2022-37866: no packages for Image SLES15-SP3-SAPCAL-EC2-HVM, but entry?
CVE-2022-37866: no packages for Image SLES15-SP3-SAPCAL-GCE, but entry?
CVE-2022-37866: no packages for Image SLES15-SP4-Manager-Server-4-3, but entry?
CVE-2022-37866: no packages for Image SLES15-SP4-Manager-Server-4-3-Azure-llc, but entry?
CVE-2022-37866: no packages for Image SLES15-SP4-Manager-Server-4-3-Azure-ltd, but entry?
CVE-2022-37866: no packages for Image SLES15-SP4-Manager-Server-4-3-BYOS, but entry?
CVE-2022-37866: no packages for Image SLES15-SP4-Manager-Server-4-3-BYOS-Azure, but entry?
CVE-2022-37866: no packages for Image SLES15-SP4-Manager-Server-4-3-BYOS-EC2, but entry?
CVE-2022-37866: no packages for Image SLES15-SP4-Manager-Server-4-3-BYOS-GCE, but entry?
CVE-2022-37866: no packages for Image SLES15-SP4-Manager-Server-4-3-EC2-llc, but entry?
CVE-2022-37866: no packages for Image SLES15-SP4-Manager-Server-4-3-EC2-ltd, but entry?
CVE-2022-37866: no packages for Image SLES15-SP4-SAP, but entry?
CVE-2022-37866: no packages for Image SLES15-SP4-SAP-Azure, but entry?
CVE-2022-37866: no packages for Image SLES15-SP4-SAP-Azure-LI-BYOS, but entry?
CVE-2022-37866: no packages for Image SLES15-SP4-SAP-Azure-LI-BYOS-Production, but entry?
CVE-2022-37866: no packages for Image SLES15-SP4-SAP-Azure-VLI-BYOS, but entry?
CVE-2022-37866: no packages for Image SLES15-SP4-SAP-Azure-VLI-BYOS-Production, but entry?
CVE-2022-37866: no packages for Image SLES15-SP4-SAP-EC2, but entry?
CVE-2022-37866: no packages for Image SLES15-SP4-SAP-GCE, but entry?
CVE-2022-37866: no packages for Image SLES15-SP4-SAPCAL, but entry?
CVE-2022-37866: no packages for Image SLES15-SP4-SAPCAL-Azure, but entry?
CVE-2022-37866: no packages for Image SLES15-SP4-SAPCAL-EC2, but entry?
CVE-2022-37866: no packages for Image SLES15-SP4-SAPCAL-GCE, but entry?
CVE-2022-37866: no packages for Image SLES15-SP5-SAP-Azure, but entry?
CVE-2022-37866: no packages for Image SLES15-SP5-SAP-Azure-LI-BYOS, but entry?
CVE-2022-37866: no packages for Image SLES15-SP5-SAP-Azure-LI-BYOS-Production, but entry?
CVE-2022-37866: no packages for Image SLES15-SP5-SAP-Azure-VLI-BYOS, but entry?
CVE-2022-37866: no packages for Image SLES15-SP5-SAP-Azure-VLI-BYOS-Production, but entry?
CVE-2022-37866: no packages for Image SLES15-SP5-SAP-EC2, but entry?
CVE-2022-37866: no packages for Image SLES15-SP5-SAP-GCE, but entry?
CVE-2022-37866: no packages for Image SLES15-SP5-SAPCAL-Azure, but entry?
CVE-2022-37866: no packages for Image SLES15-SP5-SAPCAL-EC2, but entry?
CVE-2022-37866: no packages for Image SLES15-SP5-SAPCAL-GCE, but entry?
CVE-2022-37866: no packages for Image SLES15-SP6-SAP, but entry?
CVE-2022-37866: no packages for Image SLES15-SP6-SAP-Azure, but entry?
CVE-2022-37866: no packages for Image SLES15-SP6-SAP-Azure-LI-BYOS, but entry?
CVE-2022-37866: no packages for Image SLES15-SP6-SAP-Azure-LI-BYOS-Production, but entry?
CVE-2022-37866: no packages for Image SLES15-SP6-SAP-Azure-VLI-BYOS, but entry?
CVE-2022-37866: no packages for Image SLES15-SP6-SAP-Azure-VLI-BYOS-Production, but entry?
CVE-2022-37866: no packages for Image SLES15-SP6-SAP-EC2, but entry?
CVE-2022-37866: no packages for Image SLES15-SP6-SAP-GCE, but entry?
CVE-2022-37866: no packages for Image SLES15-SP6-SAPCAL, but entry?
CVE-2022-37866: no packages for Image SLES15-SP6-SAPCAL-Azure, but entry?
CVE-2022-37866: no packages for Image SLES15-SP6-SAPCAL-EC2, but entry?
CVE-2022-37866: no packages for Image SLES15-SP6-SAPCAL-GCE, but entry?
CVE-2022-37866: no packages for SUSE CaaS Platform 4.0, but entry?
CVE-2022-37866: no packages for SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS, but entry?
CVE-2022-37866: no packages for SUSE Linux Enterprise Module for Basesystem 15 SP4, but entry?
CVE-2022-37866: no packages for SUSE Linux Enterprise Module for Basesystem 15 SP5, but entry?
CVE-2022-37866: no packages for SUSE Linux Enterprise Module for Basesystem 15 SP6, but entry?
CVE-2022-37866: no packages for SUSE Linux Enterprise Module for Package Hub 15 SP4, but entry?
CVE-2022-37866: no packages for SUSE Linux Enterprise Module for Package Hub 15 SP5, but entry?
CVE-2022-37866: no packages for SUSE Linux Enterprise Module for Package Hub 15 SP6, but entry?
CVE-2022-37866: no packages for SUSE Linux Enterprise Module for Web and Scripting 15 SP4, but entry?
CVE-2022-37866: no packages for SUSE Linux Enterprise Module for Web and Scripting 15 SP5, but entry?
CVE-2022-37866: no packages for SUSE Linux Enterprise Module for Web and Scripting 15 SP6, but entry?
CVE-2022-37866: no packages for SUSE Linux Enterprise Server 15 SP1-LTSS, but entry?
CVE-2022-37866: no packages for SUSE Linux Enterprise Server 15 SP4-TERADATA, but entry?
CVE-2022-37866: no packages for SUSE Linux Enterprise Server for SAP Applications 15 SP1, but entry?
CVE-2022-37866: no packages for SUSE Linux Enterprise Workstation Extension 15 SP4, but entry?
CVE-2022-37866: no packages for SUSE Linux Enterprise Workstation Extension 15 SP5, but entry?
CVE-2022-37866: no packages for SUSE Linux Enterprise Workstation Extension 15 SP6, but entry?
CVE-2022-37866: no packages for SUSE Manager Proxy 4.2, but entry?
CVE-2022-37866: no packages for SUSE Manager Retail Branch Server 4.2, but entry?
CVE-2022-37866: no packages for SUSE Manager Server 4.2, but entry?
CVE-2022-37866: no packages for SUSE Manager Server Module 4.2, but entry?
CVE-2022-37866: no packages for SUSE Manager Server Module 4.3, but entry?
CVE-2022-37865: no packages for SUSE CaaS Platform 4.0, but entry?
CVE-2022-37865: no packages for Image SLES15-SP5-SAP-Azure-VLI-BYOS-Production, but entry?
CVE-2022-37865: no packages for Image SLES15-SP6-SAPCAL-Azure, but entry?
CVE-2022-37865: no packages for Image SLES15-SP2-SAP-BYOS-EC2-HVM, but entry?
CVE-2022-37865: no packages for Image SLES15-SP2-SAP-Azure-VLI-BYOS-Production, but entry?
CVE-2022-37865: no packages for Image SLES15-SP5-SAP-Azure, but entry?
CVE-2022-37865: no packages for Container suse/manager/5.0/x86_64/server-attestation:5.0.0-beta2.2.16, but entry?
CVE-2022-37865: no packages for Image SLES15-SP6-SAP-Azure-VLI-BYOS, but entry?
CVE-2022-37865: no packages for SUSE Linux Enterprise Workstation Extension 15 SP5, but entry?
CVE-2022-37865: no packages for Image SLES15-SP5-SAP-GCE, but entry?
CVE-2022-37865: no packages for Image SLES15-SP5-SAPCAL-Azure, but entry?
CVE-2022-37865: no packages for SUSE Linux Enterprise Server 15 SP1-LTSS, but entry?
CVE-2022-37865: no packages for Container bci/openjdk-devel:17-7.2, but entry?
CVE-2022-37865: no packages for SUSE Manager Server Module 4.2, but entry?
CVE-2022-37865: no packages for Image SLES15-SP5-SAP-Azure-LI-BYOS, but entry?
CVE-2022-37865: no packages for Image SLES15-SP4-Manager-Server-4-3-BYOS-EC2, but entry?
CVE-2022-37865: no packages for Image SLES15-SP4-SAP-Azure-VLI-BYOS-Production, but entry?
CVE-2022-37865: no packages for Image SLES15-SP5-SAPCAL-GCE, but entry?
CVE-2022-37865: no packages for Image SLES15-SP6-SAP-Azure, but entry?
CVE-2022-37865: no packages for Container bci/openjdk-devel:11-6.2, but entry?
CVE-2022-37865: no packages for Image SLES15-SP4-Manager-Server-4-3-BYOS-GCE, but entry?
CVE-2022-37865: no packages for Image SLES15-SP6-SAPCAL-GCE, but entry?
CVE-2022-37865: no packages for Image SLES15-SP4-Manager-Server-4-3-BYOS-Azure, but entry?
CVE-2022-37865: no packages for Image SLES15-SP6-SAP-GCE, but entry?
CVE-2022-37865: no packages for Image SLES15-SP3-Manager-4-2-Server-BYOS-EC2-HVM, but entry?
CVE-2022-37865: no packages for Image SLES15-SP6-SAP-Azure-LI-BYOS, but entry?
CVE-2022-37865: no packages for Image SLES15-SP4-SAP-Azure-VLI-BYOS, but entry?
CVE-2022-37865: no packages for SUSE Linux Enterprise Server 15 SP4-TERADATA, but entry?
CVE-2022-37865: no packages for Image SLES15-SP6-SAP-EC2, but entry?
CVE-2022-37865: no packages for Image SLES15-SP4-SAP-GCE, but entry?
CVE-2022-37865: no packages for SUSE Linux Enterprise Workstation Extension 15 SP6, but entry?
CVE-2022-37865: no packages for Image SLES15-SP3-SAP-Azure-LI-BYOS-Production, but entry?
CVE-2022-37865: no packages for Image SLES15-SP2-SAP-EC2-HVM, but entry?
CVE-2022-37865: no packages for Image SLES15-SP6-SAP-Azure-VLI-BYOS-Production, but entry?
CVE-2022-37865: no packages for SUSE Manager Server Module 4.3, but entry?
CVE-2022-37865: no packages for Image SLES15-SP3-Manager-4-2-Server-BYOS-Azure, but entry?
CVE-2022-37865: no packages for Image SLES15-SP2-SAP-GCE, but entry?
CVE-2022-37865: no packages for Container bci/openjdk-devel:17-14.11, but entry?
CVE-2022-37865: no packages for Container bci/openjdk:11-7.1, but entry?
CVE-2022-37865: no packages for SUSE Linux Enterprise Server for SAP Applications 15 SP1, but entry?
CVE-2022-37865: no packages for Image SLES15-SP4-SAP-EC2, but entry?
CVE-2022-37865: no packages for SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS, but entry?
CVE-2022-37865: no packages for Container bci/kiwi:9.24.43-8.6, but entry?
CVE-2022-37865: no packages for Image SLES15-SP4-SAPCAL-Azure, but entry?
CVE-2022-37865: no packages for Image SLES15-SP5-SAPCAL-EC2, but entry?
CVE-2022-37865: no packages for Image SLES15-SP4-SAPCAL-EC2, but entry?
CVE-2022-37865: no packages for SUSE Linux Enterprise Module for Web and Scripting 15 SP4, but entry?
CVE-2022-37865: no packages for Image SLES15-SP4-Manager-Server-4-3-BYOS, but entry?
CVE-2022-37865: no packages for Image SLES15-SP4-SAP-Azure-LI-BYOS, but entry?
CVE-2022-37865: no packages for Image SLES15-SP2-SAP-Azure-LI-BYOS-Production, but entry?
CVE-2022-37865: no packages for Image SLES15-SP4-SAP-Azure-LI-BYOS-Production, but entry?
CVE-2022-37865: no packages for Image SLES15-SP3-SAPCAL-EC2-HVM, but entry?
CVE-2022-37865: no packages for SUSE Manager Server 4.2, but entry?
CVE-2022-37865: no packages for Container suse/manager/5.0/x86_64/server:5.0.0-beta1.2.122, but entry?
CVE-2022-37865: no packages for Image SLES15-SP4-SAPCAL-GCE, but entry?
CVE-2022-37865: no packages for SUSE Linux Enterprise Module for Basesystem 15 SP5, but entry?
CVE-2022-37865: no packages for Image SLES15-SP2-SAP-Azure, but entry?
CVE-2022-37865: no packages for Image SLES15-SP3-SAPCAL-GCE, but entry?
CVE-2022-37865: no packages for Image SLES15-SP6-SAP, but entry?
CVE-2022-37865: no packages for SUSE Linux Enterprise Workstation Extension 15 SP4, but entry?
CVE-2022-37865: no packages for SUSE Linux Enterprise Module for Package Hub 15 SP4, but entry?
CVE-2022-37865: no packages for Image SLES15-SP6-SAP-Azure-LI-BYOS-Production, but entry?
CVE-2022-37865: no packages for Image SLES15-SP4-SAP-Azure, but entry?
CVE-2022-37865: no packages for SUSE Linux Enterprise Module for Package Hub 15 SP5, but entry?
CVE-2022-37865: no packages for SUSE Manager Proxy 4.2, but entry?
CVE-2022-37865: no packages for Image SLES15-SP4-Manager-Server-4-3-EC2-llc, but entry?
CVE-2022-37865: no packages for Image SLES15-SP4-Manager-Server-4-3, but entry?
CVE-2022-37865: no packages for Image SLES15-SP4-SAP, but entry?
CVE-2022-37865: no packages for SUSE Manager Retail Branch Server 4.2, but entry?
CVE-2022-37865: no packages for SUSE Linux Enterprise Module for Web and Scripting 15 SP6, but entry?
CVE-2022-37865: no packages for Container bci/openjdk:latest, but entry?
CVE-2022-37865: no packages for Image SLES15-SP3-Manager-4-2-Server-BYOS-GCE, but entry?
CVE-2022-37865: no packages for Image SLES15-SP6-SAPCAL-EC2, but entry?
CVE-2022-37865: no packages for Image SLES15-SP4-SAPCAL, but entry?
CVE-2022-37865: no packages for Image SLES15-SP2-SAP-BYOS-Azure, but entry?
CVE-2022-37865: no packages for Image SLES15-SP4-Manager-Server-4-3-Azure-ltd, but entry?
CVE-2022-37865: no packages for Image SLES15-SP5-SAP-EC2, but entry?
CVE-2022-37865: no packages for SUSE Linux Enterprise Module for Web and Scripting 15 SP5, but entry?
CVE-2022-37865: no packages for Image SLES15-SP5-SAP-Azure-VLI-BYOS, but entry?
CVE-2022-37865: no packages for Image SLES15-SP6-SAPCAL, but entry?
CVE-2022-37865: no packages for SUSE Linux Enterprise Module for Basesystem 15 SP6, but entry?
CVE-2022-37865: no packages for Image SLES15-SP5-SAP-Azure-LI-BYOS-Production, but entry?
CVE-2022-37865: no packages for Image SLES15-SP3-SAP-Azure-VLI-BYOS-Production, but entry?
CVE-2022-37865: no packages for Image SLES15-SP4-Manager-Server-4-3-EC2-ltd, but entry?
CVE-2022-37865: no packages for Image SLES15-SP3-SAPCAL-Azure, but entry?
CVE-2022-37865: no packages for SUSE Linux Enterprise Module for Package Hub 15 SP6, but entry?
CVE-2022-37865: no packages for SUSE Linux Enterprise Module for Basesystem 15 SP4, but entry?
CVE-2022-37865: no packages for Image SLES15-SP2-SAP-BYOS-GCE, but entry?
CVE-2022-37865: no packages for Container bci/openjdk:17-7.1, but entry?
CVE-2022-37865: no packages for Image SLES15-SP4-Manager-Server-4-3-Azure-llc, but entry?
CVE-2022-37865: no packages for Container bci/kiwi:9.24.43-8.6, but entry?
CVE-2022-37865: no packages for Container bci/openjdk-devel:11-6.2, but entry?
CVE-2022-37865: no packages for Container bci/openjdk-devel:17-14.11, but entry?
CVE-2022-37865: no packages for Container bci/openjdk-devel:17-7.2, but entry?
CVE-2022-37865: no packages for Container bci/openjdk:11-7.1, but entry?
CVE-2022-37865: no packages for Container bci/openjdk:17-7.1, but entry?
CVE-2022-37865: no packages for Container bci/openjdk:latest, but entry?
CVE-2022-37865: no packages for Container suse/manager/5.0/x86_64/server-attestation:5.0.0-beta2.2.16, but entry?
CVE-2022-37865: no packages for Container suse/manager/5.0/x86_64/server:5.0.0-beta1.2.122, but entry?
CVE-2022-37865: no packages for Image SLES15-SP2-SAP-Azure, but entry?
CVE-2022-37865: no packages for Image SLES15-SP2-SAP-Azure-LI-BYOS-Production, but entry?
CVE-2022-37865: no packages for Image SLES15-SP2-SAP-Azure-VLI-BYOS-Production, but entry?
CVE-2022-37865: no packages for Image SLES15-SP2-SAP-BYOS-Azure, but entry?
CVE-2022-37865: no packages for Image SLES15-SP2-SAP-BYOS-EC2-HVM, but entry?
CVE-2022-37865: no packages for Image SLES15-SP2-SAP-BYOS-GCE, but entry?
CVE-2022-37865: no packages for Image SLES15-SP2-SAP-EC2-HVM, but entry?
CVE-2022-37865: no packages for Image SLES15-SP2-SAP-GCE, but entry?
CVE-2022-37865: no packages for Image SLES15-SP3-Manager-4-2-Server-BYOS-Azure, but entry?
CVE-2022-37865: no packages for Image SLES15-SP3-Manager-4-2-Server-BYOS-EC2-HVM, but entry?
CVE-2022-37865: no packages for Image SLES15-SP3-Manager-4-2-Server-BYOS-GCE, but entry?
CVE-2022-37865: no packages for Image SLES15-SP3-SAP-Azure-LI-BYOS-Production, but entry?
CVE-2022-37865: no packages for Image SLES15-SP3-SAP-Azure-VLI-BYOS-Production, but entry?
CVE-2022-37865: no packages for Image SLES15-SP3-SAPCAL-Azure, but entry?
CVE-2022-37865: no packages for Image SLES15-SP3-SAPCAL-EC2-HVM, but entry?
CVE-2022-37865: no packages for Image SLES15-SP3-SAPCAL-GCE, but entry?
CVE-2022-37865: no packages for Image SLES15-SP4-Manager-Server-4-3, but entry?
CVE-2022-37865: no packages for Image SLES15-SP4-Manager-Server-4-3-Azure-llc, but entry?
CVE-2022-37865: no packages for Image SLES15-SP4-Manager-Server-4-3-Azure-ltd, but entry?
CVE-2022-37865: no packages for Image SLES15-SP4-Manager-Server-4-3-BYOS, but entry?
CVE-2022-37865: no packages for Image SLES15-SP4-Manager-Server-4-3-BYOS-Azure, but entry?
CVE-2022-37865: no packages for Image SLES15-SP4-Manager-Server-4-3-BYOS-EC2, but entry?
CVE-2022-37865: no packages for Image SLES15-SP4-Manager-Server-4-3-BYOS-GCE, but entry?
CVE-2022-37865: no packages for Image SLES15-SP4-Manager-Server-4-3-EC2-llc, but entry?
CVE-2022-37865: no packages for Image SLES15-SP4-Manager-Server-4-3-EC2-ltd, but entry?
CVE-2022-37865: no packages for Image SLES15-SP4-SAP, but entry?
CVE-2022-37865: no packages for Image SLES15-SP4-SAP-Azure, but entry?
CVE-2022-37865: no packages for Image SLES15-SP4-SAP-Azure-LI-BYOS, but entry?
CVE-2022-37865: no packages for Image SLES15-SP4-SAP-Azure-LI-BYOS-Production, but entry?
CVE-2022-37865: no packages for Image SLES15-SP4-SAP-Azure-VLI-BYOS, but entry?
CVE-2022-37865: no packages for Image SLES15-SP4-SAP-Azure-VLI-BYOS-Production, but entry?
CVE-2022-37865: no packages for Image SLES15-SP4-SAP-EC2, but entry?
CVE-2022-37865: no packages for Image SLES15-SP4-SAP-GCE, but entry?
CVE-2022-37865: no packages for Image SLES15-SP4-SAPCAL, but entry?
CVE-2022-37865: no packages for Image SLES15-SP4-SAPCAL-Azure, but entry?
CVE-2022-37865: no packages for Image SLES15-SP4-SAPCAL-EC2, but entry?
CVE-2022-37865: no packages for Image SLES15-SP4-SAPCAL-GCE, but entry?
CVE-2022-37865: no packages for Image SLES15-SP5-SAP-Azure, but entry?
CVE-2022-37865: no packages for Image SLES15-SP5-SAP-Azure-LI-BYOS, but entry?
CVE-2022-37865: no packages for Image SLES15-SP5-SAP-Azure-LI-BYOS-Production, but entry?
CVE-2022-37865: no packages for Image SLES15-SP5-SAP-Azure-VLI-BYOS, but entry?
CVE-2022-37865: no packages for Image SLES15-SP5-SAP-Azure-VLI-BYOS-Production, but entry?
CVE-2022-37865: no packages for Image SLES15-SP5-SAP-EC2, but entry?
CVE-2022-37865: no packages for Image SLES15-SP5-SAP-GCE, but entry?
CVE-2022-37865: no packages for Image SLES15-SP5-SAPCAL-Azure, but entry?
CVE-2022-37865: no packages for Image SLES15-SP5-SAPCAL-EC2, but entry?
CVE-2022-37865: no packages for Image SLES15-SP5-SAPCAL-GCE, but entry?
CVE-2022-37865: no packages for Image SLES15-SP6-SAP, but entry?
CVE-2022-37865: no packages for Image SLES15-SP6-SAP-Azure, but entry?
CVE-2022-37865: no packages for Image SLES15-SP6-SAP-Azure-LI-BYOS, but entry?
CVE-2022-37865: no packages for Image SLES15-SP6-SAP-Azure-LI-BYOS-Production, but entry?
CVE-2022-37865: no packages for Image SLES15-SP6-SAP-Azure-VLI-BYOS, but entry?
CVE-2022-37865: no packages for Image SLES15-SP6-SAP-Azure-VLI-BYOS-Production, but entry?
CVE-2022-37865: no packages for Image SLES15-SP6-SAP-EC2, but entry?
CVE-2022-37865: no packages for Image SLES15-SP6-SAP-GCE, but entry?
CVE-2022-37865: no packages for Image SLES15-SP6-SAPCAL, but entry?
CVE-2022-37865: no packages for Image SLES15-SP6-SAPCAL-Azure, but entry?
CVE-2022-37865: no packages for Image SLES15-SP6-SAPCAL-EC2, but entry?
CVE-2022-37865: no packages for Image SLES15-SP6-SAPCAL-GCE, but entry?
CVE-2022-37865: no packages for SUSE CaaS Platform 4.0, but entry?
CVE-2022-37865: no packages for SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS, but entry?
CVE-2022-37865: no packages for SUSE Linux Enterprise Module for Basesystem 15 SP4, but entry?
CVE-2022-37865: no packages for SUSE Linux Enterprise Module for Basesystem 15 SP5, but entry?
CVE-2022-37865: no packages for SUSE Linux Enterprise Module for Basesystem 15 SP6, but entry?
CVE-2022-37865: no packages for SUSE Linux Enterprise Module for Package Hub 15 SP4, but entry?
CVE-2022-37865: no packages for SUSE Linux Enterprise Module for Package Hub 15 SP5, but entry?
CVE-2022-37865: no packages for SUSE Linux Enterprise Module for Package Hub 15 SP6, but entry?
CVE-2022-37865: no packages for SUSE Linux Enterprise Module for Web and Scripting 15 SP4, but entry?
CVE-2022-37865: no packages for SUSE Linux Enterprise Module for Web and Scripting 15 SP5, but entry?
CVE-2022-37865: no packages for SUSE Linux Enterprise Module for Web and Scripting 15 SP6, but entry?
CVE-2022-37865: no packages for SUSE Linux Enterprise Server 15 SP1-LTSS, but entry?
CVE-2022-37865: no packages for SUSE Linux Enterprise Server 15 SP4-TERADATA, but entry?
CVE-2022-37865: no packages for SUSE Linux Enterprise Server for SAP Applications 15 SP1, but entry?
CVE-2022-37865: no packages for SUSE Linux Enterprise Workstation Extension 15 SP4, but entry?
CVE-2022-37865: no packages for SUSE Linux Enterprise Workstation Extension 15 SP5, but entry?
CVE-2022-37865: no packages for SUSE Linux Enterprise Workstation Extension 15 SP6, but entry?
CVE-2022-37865: no packages for SUSE Manager Proxy 4.2, but entry?
CVE-2022-37865: no packages for SUSE Manager Retail Branch Server 4.2, but entry?
CVE-2022-37865: no packages for SUSE Manager Server 4.2, but entry?
CVE-2022-37865: no packages for SUSE Manager Server Module 4.2, but entry?
CVE-2022-37865: no packages for SUSE Manager Server Module 4.3, but entry?
CVE-2022-37865: no packages for Container bci/kiwi:9.24.43-8.6, but entry?
CVE-2022-37865: no packages for Container bci/openjdk-devel:11-6.2, but entry?
CVE-2022-37865: no packages for Container bci/openjdk-devel:17-14.11, but entry?
CVE-2022-37865: no packages for Container bci/openjdk-devel:17-7.2, but entry?
CVE-2022-37865: no packages for Container bci/openjdk:11-7.1, but entry?
CVE-2022-37865: no packages for Container bci/openjdk:17-7.1, but entry?
CVE-2022-37865: no packages for Container bci/openjdk:latest, but entry?
CVE-2022-37865: no packages for Container suse/manager/5.0/x86_64/server-attestation:5.0.0-beta2.2.16, but entry?
CVE-2022-37865: no packages for Container suse/manager/5.0/x86_64/server:5.0.0-beta1.2.122, but entry?
CVE-2022-37865: no packages for Image SLES15-SP2-SAP-Azure, but entry?
CVE-2022-37865: no packages for Image SLES15-SP2-SAP-Azure-LI-BYOS-Production, but entry?
CVE-2022-37865: no packages for Image SLES15-SP2-SAP-Azure-VLI-BYOS-Production, but entry?
CVE-2022-37865: no packages for Image SLES15-SP2-SAP-BYOS-Azure, but entry?
CVE-2022-37865: no packages for Image SLES15-SP2-SAP-BYOS-EC2-HVM, but entry?
CVE-2022-37865: no packages for Image SLES15-SP2-SAP-BYOS-GCE, but entry?
CVE-2022-37865: no packages for Image SLES15-SP2-SAP-EC2-HVM, but entry?
CVE-2022-37865: no packages for Image SLES15-SP2-SAP-GCE, but entry?
CVE-2022-37865: no packages for Image SLES15-SP3-Manager-4-2-Server-BYOS-Azure, but entry?
CVE-2022-37865: no packages for Image SLES15-SP3-Manager-4-2-Server-BYOS-EC2-HVM, but entry?
CVE-2022-37865: no packages for Image SLES15-SP3-Manager-4-2-Server-BYOS-GCE, but entry?
CVE-2022-37865: no packages for Image SLES15-SP3-SAP-Azure-LI-BYOS-Production, but entry?
CVE-2022-37865: no packages for Image SLES15-SP3-SAP-Azure-VLI-BYOS-Production, but entry?
CVE-2022-37865: no packages for Image SLES15-SP3-SAPCAL-Azure, but entry?
CVE-2022-37865: no packages for Image SLES15-SP3-SAPCAL-EC2-HVM, but entry?
CVE-2022-37865: no packages for Image SLES15-SP3-SAPCAL-GCE, but entry?
CVE-2022-37865: no packages for Image SLES15-SP4-Manager-Server-4-3, but entry?
CVE-2022-37865: no packages for Image SLES15-SP4-Manager-Server-4-3-Azure-llc, but entry?
CVE-2022-37865: no packages for Image SLES15-SP4-Manager-Server-4-3-Azure-ltd, but entry?
CVE-2022-37865: no packages for Image SLES15-SP4-Manager-Server-4-3-BYOS, but entry?
CVE-2022-37865: no packages for Image SLES15-SP4-Manager-Server-4-3-BYOS-Azure, but entry?
CVE-2022-37865: no packages for Image SLES15-SP4-Manager-Server-4-3-BYOS-EC2, but entry?
CVE-2022-37865: no packages for Image SLES15-SP4-Manager-Server-4-3-BYOS-GCE, but entry?
CVE-2022-37865: no packages for Image SLES15-SP4-Manager-Server-4-3-EC2-llc, but entry?
CVE-2022-37865: no packages for Image SLES15-SP4-Manager-Server-4-3-EC2-ltd, but entry?
CVE-2022-37865: no packages for Image SLES15-SP4-SAP, but entry?
CVE-2022-37865: no packages for Image SLES15-SP4-SAP-Azure, but entry?
CVE-2022-37865: no packages for Image SLES15-SP4-SAP-Azure-LI-BYOS, but entry?
CVE-2022-37865: no packages for Image SLES15-SP4-SAP-Azure-LI-BYOS-Production, but entry?
CVE-2022-37865: no packages for Image SLES15-SP4-SAP-Azure-VLI-BYOS, but entry?
CVE-2022-37865: no packages for Image SLES15-SP4-SAP-Azure-VLI-BYOS-Production, but entry?
CVE-2022-37865: no packages for Image SLES15-SP4-SAP-EC2, but entry?
CVE-2022-37865: no packages for Image SLES15-SP4-SAP-GCE, but entry?
CVE-2022-37865: no packages for Image SLES15-SP4-SAPCAL, but entry?
CVE-2022-37865: no packages for Image SLES15-SP4-SAPCAL-Azure, but entry?
CVE-2022-37865: no packages for Image SLES15-SP4-SAPCAL-EC2, but entry?
CVE-2022-37865: no packages for Image SLES15-SP4-SAPCAL-GCE, but entry?
CVE-2022-37865: no packages for Image SLES15-SP5-SAP-Azure, but entry?
CVE-2022-37865: no packages for Image SLES15-SP5-SAP-Azure-LI-BYOS, but entry?
CVE-2022-37865: no packages for Image SLES15-SP5-SAP-Azure-LI-BYOS-Production, but entry?
CVE-2022-37865: no packages for Image SLES15-SP5-SAP-Azure-VLI-BYOS, but entry?
CVE-2022-37865: no packages for Image SLES15-SP5-SAP-Azure-VLI-BYOS-Production, but entry?
CVE-2022-37865: no packages for Image SLES15-SP5-SAP-EC2, but entry?
CVE-2022-37865: no packages for Image SLES15-SP5-SAP-GCE, but entry?
CVE-2022-37865: no packages for Image SLES15-SP5-SAPCAL-Azure, but entry?
CVE-2022-37865: no packages for Image SLES15-SP5-SAPCAL-EC2, but entry?
CVE-2022-37865: no packages for Image SLES15-SP5-SAPCAL-GCE, but entry?
CVE-2022-37865: no packages for Image SLES15-SP6-SAP, but entry?
CVE-2022-37865: no packages for Image SLES15-SP6-SAP-Azure, but entry?
CVE-2022-37865: no packages for Image SLES15-SP6-SAP-Azure-LI-BYOS, but entry?
CVE-2022-37865: no packages for Image SLES15-SP6-SAP-Azure-LI-BYOS-Production, but entry?
CVE-2022-37865: no packages for Image SLES15-SP6-SAP-Azure-VLI-BYOS, but entry?
CVE-2022-37865: no packages for Image SLES15-SP6-SAP-Azure-VLI-BYOS-Production, but entry?
CVE-2022-37865: no packages for Image SLES15-SP6-SAP-EC2, but entry?
CVE-2022-37865: no packages for Image SLES15-SP6-SAP-GCE, but entry?
CVE-2022-37865: no packages for Image SLES15-SP6-SAPCAL, but entry?
CVE-2022-37865: no packages for Image SLES15-SP6-SAPCAL-Azure, but entry?
CVE-2022-37865: no packages for Image SLES15-SP6-SAPCAL-EC2, but entry?
CVE-2022-37865: no packages for Image SLES15-SP6-SAPCAL-GCE, but entry?
CVE-2022-37865: no packages for SUSE CaaS Platform 4.0, but entry?
CVE-2022-37865: no packages for SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS, but entry?
CVE-2022-37865: no packages for SUSE Linux Enterprise Module for Basesystem 15 SP4, but entry?
CVE-2022-37865: no packages for SUSE Linux Enterprise Module for Basesystem 15 SP5, but entry?
CVE-2022-37865: no packages for SUSE Linux Enterprise Module for Basesystem 15 SP6, but entry?
CVE-2022-37865: no packages for SUSE Linux Enterprise Module for Package Hub 15 SP4, but entry?
CVE-2022-37865: no packages for SUSE Linux Enterprise Module for Package Hub 15 SP5, but entry?
CVE-2022-37865: no packages for SUSE Linux Enterprise Module for Package Hub 15 SP6, but entry?
CVE-2022-37865: no packages for SUSE Linux Enterprise Module for Web and Scripting 15 SP4, but entry?
CVE-2022-37865: no packages for SUSE Linux Enterprise Module for Web and Scripting 15 SP5, but entry?
CVE-2022-37865: no packages for SUSE Linux Enterprise Module for Web and Scripting 15 SP6, but entry?
CVE-2022-37865: no packages for SUSE Linux Enterprise Server 15 SP1-LTSS, but entry?
CVE-2022-37865: no packages for SUSE Linux Enterprise Server 15 SP4-TERADATA, but entry?
CVE-2022-37865: no packages for SUSE Linux Enterprise Server for SAP Applications 15 SP1, but entry?
CVE-2022-37865: no packages for SUSE Linux Enterprise Workstation Extension 15 SP4, but entry?
CVE-2022-37865: no packages for SUSE Linux Enterprise Workstation Extension 15 SP5, but entry?
CVE-2022-37865: no packages for SUSE Linux Enterprise Workstation Extension 15 SP6, but entry?
CVE-2022-37865: no packages for SUSE Manager Proxy 4.2, but entry?
CVE-2022-37865: no packages for SUSE Manager Retail Branch Server 4.2, but entry?
CVE-2022-37865: no packages for SUSE Manager Server 4.2, but entry?
CVE-2022-37865: no packages for SUSE Manager Server Module 4.2, but entry?
CVE-2022-37865: no packages for SUSE Manager Server Module 4.3, but entry?
no cpe found for SUSE Package Hub 15 SP3 in CVE-2022-37797
no cpe found for SUSE Package Hub 15 SP4 in CVE-2022-37797
no cpe found for SUSE Package Hub 15 SP4 in CVE-2022-37706
no cpe found for SUSE Package Hub 15 SP4 in CVE-2022-37705
no cpe found for SUSE Package Hub 15 SP4 in CVE-2022-37704
No V5 entry found for CVE-2022-37474 / /home/securitybot/prod/cve-database/cvelistV5/cves/2022/37xxxx/CVE-2022-37474.json:No such file or directory
skipping CVE-2022-37454 as CVE page is older than CVRF-CVE file.
no cpe found for SUSE Package Hub 15 SP4 in CVE-2022-37428
skipping CVE-2022-37436 as CVE page is older than CVRF-CVE file.
skipping CVE-2022-37434 as CVE page is older than CVRF-CVE file.
skipping CVE-2022-37416 as CVE page is older than CVRF-CVE file.
skipping CVE-2022-37290 as CVE page is older than CVRF-CVE file.
skipping CVE-2022-37052 as CVE page is older than CVRF-CVE file.
skipping CVE-2022-37051 as CVE page is older than CVRF-CVE file.
skipping CVE-2022-37050 as CVE page is older than CVRF-CVE file.
no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2022-37035
skipping CVE-2022-37032 as CVE page is older than CVRF-CVE file.
no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2022-37026
no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2022-36946
no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2022-36879
skipping CVE-2022-36765 as CVE page is older than CVRF-CVE file.
skipping CVE-2022-36764 as CVE page is older than CVRF-CVE file.
skipping CVE-2022-36763 as CVE page is older than CVRF-CVE file.
skipping CVE-2022-36760 as CVE page is older than CVRF-CVE file.
skipping CVE-2022-36648 as CVE page is older than CVRF-CVE file.
no cpe found for SUSE Package Hub 15 SP3 in CVE-2022-36359
no cpe found for SUSE Package Hub 15 SP4 in CVE-2022-36359
no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2022-36280
skipping CVE-2022-36320 as CVE page is older than CVRF-CVE file.
skipping CVE-2022-36319 as CVE page is older than CVRF-CVE file.
skipping CVE-2022-36318 as CVE page is older than CVRF-CVE file.
skipping CVE-2022-36317 as CVE page is older than CVRF-CVE file.
skipping CVE-2022-36316 as CVE page is older than CVRF-CVE file.
skipping CVE-2022-36315 as CVE page is older than CVRF-CVE file.
skipping CVE-2022-36314 as CVE page is older than CVRF-CVE file.
no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2022-36227
no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2022-36114
skipping CVE-2022-36123 as CVE page is older than CVRF-CVE file.
no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2022-36113
CVE-2022-36062: no packages for SUSE Linux Enterprise Server 15 SP2-LTSS, but entry?
CVE-2022-36062: no packages for SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS, but entry?
CVE-2022-36062: no packages for Image SLES15-SP2-SAP-Azure-LI-BYOS-Production, but entry?
CVE-2022-36062: no packages for Image SLES15-SP2-SAP-Azure, but entry?
CVE-2022-36062: no packages for Image SLES15-SP1-SAP-Azure-VLI-BYOS-Production, but entry?
CVE-2022-36062: no packages for SUSE Manager Tools Beta for SLE Micro 5, but entry?
CVE-2022-36062: no packages for Image SLES15-SP2-SAP-BYOS-GCE, but entry?
CVE-2022-36062: no packages for SUSE Manager Tools for SLE Micro 5, but entry?
CVE-2022-36062: no packages for SUSE Manager Proxy Module 4.2, but entry?
CVE-2022-36062: no packages for Image SLES15-SP2-SAP-BYOS-Azure, but entry?
CVE-2022-36062: no packages for SUSE Linux Enterprise Server 15 SP1-LTSS, but entry?
CVE-2022-36062: no packages for SUSE Linux Enterprise Server for SAP Applications 15 SP2, but entry?
CVE-2022-36062: no packages for SUSE Manager Proxy Module 4.3, but entry?
CVE-2022-36062: no packages for Image SLES15-SP2-BYOS-Azure, but entry?
CVE-2022-36062: no packages for SUSE CaaS Platform 4.0, but entry?
CVE-2022-36062: no packages for Image SLES15-SP2-SAP-Azure-VLI-BYOS-Production, but entry?
CVE-2022-36062: no packages for Image SLES15-SP2-SAP-BYOS-EC2-HVM, but entry?
CVE-2022-36062: no packages for Image SLES15-SP1-SAP-Azure-LI-BYOS-Production, but entry?
CVE-2022-36062: no packages for Image SLES15-SP2-HPC-BYOS-Azure, but entry?
CVE-2022-36062: no packages for Image SLES15-SP2-SAP-GCE, but entry?
CVE-2022-36062: no packages for SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS, but entry?
CVE-2022-36062: no packages for SUSE Linux Enterprise Server for SAP Applications 15 SP1, but entry?
CVE-2022-36062: no packages for Image SLES15-SP2-SAP-EC2-HVM, but entry?
CVE-2022-36062: no packages for SUSE Enterprise Storage 7, but entry?
CVE-2022-36062: no packages for Image SLES15-SP1-SAP-Azure-LI-BYOS-Production, but entry?
CVE-2022-36062: no packages for Image SLES15-SP1-SAP-Azure-VLI-BYOS-Production, but entry?
CVE-2022-36062: no packages for Image SLES15-SP2-BYOS-Azure, but entry?
CVE-2022-36062: no packages for Image SLES15-SP2-HPC-BYOS-Azure, but entry?
CVE-2022-36062: no packages for Image SLES15-SP2-SAP-Azure, but entry?
CVE-2022-36062: no packages for Image SLES15-SP2-SAP-Azure-LI-BYOS-Production, but entry?
CVE-2022-36062: no packages for Image SLES15-SP2-SAP-Azure-VLI-BYOS-Production, but entry?
CVE-2022-36062: no packages for Image SLES15-SP2-SAP-BYOS-Azure, but entry?
CVE-2022-36062: no packages for Image SLES15-SP2-SAP-BYOS-EC2-HVM, but entry?
CVE-2022-36062: no packages for Image SLES15-SP2-SAP-BYOS-GCE, but entry?
CVE-2022-36062: no packages for Image SLES15-SP2-SAP-EC2-HVM, but entry?
CVE-2022-36062: no packages for Image SLES15-SP2-SAP-GCE, but entry?
CVE-2022-36062: no packages for SUSE CaaS Platform 4.0, but entry?
CVE-2022-36062: no packages for SUSE Enterprise Storage 7, but entry?
CVE-2022-36062: no packages for SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS, but entry?
CVE-2022-36062: no packages for SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS, but entry?
CVE-2022-36062: no packages for SUSE Linux Enterprise Server 15 SP1-LTSS, but entry?
CVE-2022-36062: no packages for SUSE Linux Enterprise Server 15 SP2-LTSS, but entry?
CVE-2022-36062: no packages for SUSE Linux Enterprise Server for SAP Applications 15 SP1, but entry?
CVE-2022-36062: no packages for SUSE Linux Enterprise Server for SAP Applications 15 SP2, but entry?
CVE-2022-36062: no packages for SUSE Manager Proxy Module 4.2, but entry?
CVE-2022-36062: no packages for SUSE Manager Proxy Module 4.3, but entry?
CVE-2022-36062: no packages for SUSE Manager Tools Beta for SLE Micro 5, but entry?
CVE-2022-36062: no packages for SUSE Manager Tools for SLE Micro 5, but entry?
CVE-2022-36062: no packages for Image SLES15-SP1-SAP-Azure-LI-BYOS-Production, but entry?
CVE-2022-36062: no packages for Image SLES15-SP1-SAP-Azure-VLI-BYOS-Production, but entry?
CVE-2022-36062: no packages for Image SLES15-SP2-BYOS-Azure, but entry?
CVE-2022-36062: no packages for Image SLES15-SP2-HPC-BYOS-Azure, but entry?
CVE-2022-36062: no packages for Image SLES15-SP2-SAP-Azure, but entry?
CVE-2022-36062: no packages for Image SLES15-SP2-SAP-Azure-LI-BYOS-Production, but entry?
CVE-2022-36062: no packages for Image SLES15-SP2-SAP-Azure-VLI-BYOS-Production, but entry?
CVE-2022-36062: no packages for Image SLES15-SP2-SAP-BYOS-Azure, but entry?
CVE-2022-36062: no packages for Image SLES15-SP2-SAP-BYOS-EC2-HVM, but entry?
CVE-2022-36062: no packages for Image SLES15-SP2-SAP-BYOS-GCE, but entry?
CVE-2022-36062: no packages for Image SLES15-SP2-SAP-EC2-HVM, but entry?
CVE-2022-36062: no packages for Image SLES15-SP2-SAP-GCE, but entry?
CVE-2022-36062: no packages for SUSE CaaS Platform 4.0, but entry?
CVE-2022-36062: no packages for SUSE Enterprise Storage 7, but entry?
CVE-2022-36062: no packages for SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS, but entry?
CVE-2022-36062: no packages for SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS, but entry?
CVE-2022-36062: no packages for SUSE Linux Enterprise Server 15 SP1-LTSS, but entry?
CVE-2022-36062: no packages for SUSE Linux Enterprise Server 15 SP2-LTSS, but entry?
CVE-2022-36062: no packages for SUSE Linux Enterprise Server for SAP Applications 15 SP1, but entry?
CVE-2022-36062: no packages for SUSE Linux Enterprise Server for SAP Applications 15 SP2, but entry?
CVE-2022-36062: no packages for SUSE Manager Proxy Module 4.2, but entry?
CVE-2022-36062: no packages for SUSE Manager Proxy Module 4.3, but entry?
CVE-2022-36062: no packages for SUSE Manager Tools Beta for SLE Micro 5, but entry?
CVE-2022-36062: no packages for SUSE Manager Tools for SLE Micro 5, but entry?
no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2022-36056
no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2022-36033
skipping CVE-2022-36055 as CVE page is older than CVRF-CVE file.
no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2022-36021
no cpe found for SUSE Package Hub 15 SP3 in CVE-2022-35978
no cpe found for SUSE Package Hub 15 SP4 in CVE-2022-35978
no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2022-35977
CVE-2022-35957: no packages for Image SLES15-SP2-SAP-BYOS-GCE, but entry?
CVE-2022-35957: no packages for SUSE Manager Tools Beta for SLE Micro 5, but entry?
CVE-2022-35957: no packages for Image SLES15-SP2-SAP-BYOS-Azure, but entry?
CVE-2022-35957: no packages for SUSE Manager Proxy Module 4.2, but entry?
CVE-2022-35957: no packages for SUSE Manager Tools for SLE Micro 5, but entry?
CVE-2022-35957: no packages for SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS, but entry?
CVE-2022-35957: no packages for SUSE Linux Enterprise Server 15 SP2-LTSS, but entry?
CVE-2022-35957: no packages for Image SLES15-SP2-SAP-Azure, but entry?
CVE-2022-35957: no packages for Image SLES15-SP1-SAP-Azure-VLI-BYOS-Production, but entry?
CVE-2022-35957: no packages for Image SLES15-SP2-SAP-Azure-LI-BYOS-Production, but entry?
CVE-2022-35957: no packages for SUSE Linux Enterprise Server for SAP Applications 15 SP1, but entry?
CVE-2022-35957: no packages for SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS, but entry?
CVE-2022-35957: no packages for Image SLES15-SP2-SAP-GCE, but entry?
CVE-2022-35957: no packages for Image SLES15-SP2-HPC-BYOS-Azure, but entry?
CVE-2022-35957: no packages for Image SLES15-SP1-SAP-Azure-LI-BYOS-Production, but entry?
CVE-2022-35957: no packages for Image SLES15-SP2-SAP-EC2-HVM, but entry?
CVE-2022-35957: no packages for SUSE Enterprise Storage 7, but entry?
CVE-2022-35957: no packages for SUSE Manager Proxy Module 4.3, but entry?
CVE-2022-35957: no packages for Image SLES15-SP2-BYOS-Azure, but entry?
CVE-2022-35957: no packages for SUSE Linux Enterprise Server for SAP Applications 15 SP2, but entry?
CVE-2022-35957: no packages for SUSE Linux Enterprise Server 15 SP1-LTSS, but entry?
CVE-2022-35957: no packages for Image SLES15-SP2-SAP-BYOS-EC2-HVM, but entry?
CVE-2022-35957: no packages for Image SLES15-SP2-SAP-Azure-VLI-BYOS-Production, but entry?
CVE-2022-35957: no packages for SUSE CaaS Platform 4.0, but entry?
CVE-2022-35957: no packages for Image SLES15-SP1-SAP-Azure-LI-BYOS-Production, but entry?
CVE-2022-35957: no packages for Image SLES15-SP1-SAP-Azure-VLI-BYOS-Production, but entry?
CVE-2022-35957: no packages for Image SLES15-SP2-BYOS-Azure, but entry?
CVE-2022-35957: no packages for Image SLES15-SP2-HPC-BYOS-Azure, but entry?
CVE-2022-35957: no packages for Image SLES15-SP2-SAP-Azure, but entry?
CVE-2022-35957: no packages for Image SLES15-SP2-SAP-Azure-LI-BYOS-Production, but entry?
CVE-2022-35957: no packages for Image SLES15-SP2-SAP-Azure-VLI-BYOS-Production, but entry?
CVE-2022-35957: no packages for Image SLES15-SP2-SAP-BYOS-Azure, but entry?
CVE-2022-35957: no packages for Image SLES15-SP2-SAP-BYOS-EC2-HVM, but entry?
CVE-2022-35957: no packages for Image SLES15-SP2-SAP-BYOS-GCE, but entry?
CVE-2022-35957: no packages for Image SLES15-SP2-SAP-EC2-HVM, but entry?
CVE-2022-35957: no packages for Image SLES15-SP2-SAP-GCE, but entry?
CVE-2022-35957: no packages for SUSE CaaS Platform 4.0, but entry?
CVE-2022-35957: no packages for SUSE Enterprise Storage 7, but entry?
CVE-2022-35957: no packages for SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS, but entry?
CVE-2022-35957: no packages for SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS, but entry?
CVE-2022-35957: no packages for SUSE Linux Enterprise Server 15 SP1-LTSS, but entry?
CVE-2022-35957: no packages for SUSE Linux Enterprise Server 15 SP2-LTSS, but entry?
CVE-2022-35957: no packages for SUSE Linux Enterprise Server for SAP Applications 15 SP1, but entry?
CVE-2022-35957: no packages for SUSE Linux Enterprise Server for SAP Applications 15 SP2, but entry?
CVE-2022-35957: no packages for SUSE Manager Proxy Module 4.2, but entry?
CVE-2022-35957: no packages for SUSE Manager Proxy Module 4.3, but entry?
CVE-2022-35957: no packages for SUSE Manager Tools Beta for SLE Micro 5, but entry?
CVE-2022-35957: no packages for SUSE Manager Tools for SLE Micro 5, but entry?
CVE-2022-35957: no packages for Image SLES15-SP1-SAP-Azure-LI-BYOS-Production, but entry?
CVE-2022-35957: no packages for Image SLES15-SP1-SAP-Azure-VLI-BYOS-Production, but entry?
CVE-2022-35957: no packages for Image SLES15-SP2-BYOS-Azure, but entry?
CVE-2022-35957: no packages for Image SLES15-SP2-HPC-BYOS-Azure, but entry?
CVE-2022-35957: no packages for Image SLES15-SP2-SAP-Azure, but entry?
CVE-2022-35957: no packages for Image SLES15-SP2-SAP-Azure-LI-BYOS-Production, but entry?
CVE-2022-35957: no packages for Image SLES15-SP2-SAP-Azure-VLI-BYOS-Production, but entry?
CVE-2022-35957: no packages for Image SLES15-SP2-SAP-BYOS-Azure, but entry?
CVE-2022-35957: no packages for Image SLES15-SP2-SAP-BYOS-EC2-HVM, but entry?
CVE-2022-35957: no packages for Image SLES15-SP2-SAP-BYOS-GCE, but entry?
CVE-2022-35957: no packages for Image SLES15-SP2-SAP-EC2-HVM, but entry?
CVE-2022-35957: no packages for Image SLES15-SP2-SAP-GCE, but entry?
CVE-2022-35957: no packages for SUSE CaaS Platform 4.0, but entry?
CVE-2022-35957: no packages for SUSE Enterprise Storage 7, but entry?
CVE-2022-35957: no packages for SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS, but entry?
CVE-2022-35957: no packages for SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS, but entry?
CVE-2022-35957: no packages for SUSE Linux Enterprise Server 15 SP1-LTSS, but entry?
CVE-2022-35957: no packages for SUSE Linux Enterprise Server 15 SP2-LTSS, but entry?
CVE-2022-35957: no packages for SUSE Linux Enterprise Server for SAP Applications 15 SP1, but entry?
CVE-2022-35957: no packages for SUSE Linux Enterprise Server for SAP Applications 15 SP2, but entry?
CVE-2022-35957: no packages for SUSE Manager Proxy Module 4.2, but entry?
CVE-2022-35957: no packages for SUSE Manager Proxy Module 4.3, but entry?
CVE-2022-35957: no packages for SUSE Manager Tools Beta for SLE Micro 5, but entry?
CVE-2022-35957: no packages for SUSE Manager Tools for SLE Micro 5, but entry?
no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2022-35949
no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2022-35948
no cpe found for SUSE Package Hub 15 SP4 in CVE-2022-35931
no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2022-35929
no cpe found for SUSE Package Hub 15 SP4 in CVE-2022-35861
skipping CVE-2022-35737 as CVE page is older than CVRF-CVE file.
no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2022-35414
no cpe found for SUSE Package Hub 15 SP3 in CVE-2022-35409
no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2022-35256
skipping CVE-2022-35260 as CVE page is older than CVRF-CVE file.
no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2022-35255
skipping CVE-2022-35252 as CVE page is older than CVRF-CVE file.
skipping CVE-2022-35230 as CVE page is older than CVRF-CVE file.
skipping CVE-2022-35229 as CVE page is older than CVRF-CVE file.
skipping CVE-2022-35206 as CVE page is older than CVRF-CVE file.
skipping CVE-2022-35205 as CVE page is older than CVRF-CVE file.
no cpe found for SUSE Package Hub 15 SP4 in CVE-2022-35133
no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2022-34903
skipping CVE-2022-34918 as CVE page is older than CVRF-CVE file.
no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2022-34835
no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2022-34526
skipping CVE-2022-34568 as CVE page is older than CVRF-CVE file.
skipping CVE-2022-34503 as CVE page is older than CVRF-CVE file.
skipping CVE-2022-34495 as CVE page is older than CVRF-CVE file.
skipping CVE-2022-34494 as CVE page is older than CVRF-CVE file.
skipping CVE-2022-34485 as CVE page is older than CVRF-CVE file.
skipping CVE-2022-34484 as CVE page is older than CVRF-CVE file.
skipping CVE-2022-34483 as CVE page is older than CVRF-CVE file.
skipping CVE-2022-34482 as CVE page is older than CVRF-CVE file.
skipping CVE-2022-34481 as CVE page is older than CVRF-CVE file.
skipping CVE-2022-34480 as CVE page is older than CVRF-CVE file.
skipping CVE-2022-34479 as CVE page is older than CVRF-CVE file.
skipping CVE-2022-34478 as CVE page is older than CVRF-CVE file.
skipping CVE-2022-34477 as CVE page is older than CVRF-CVE file.
skipping CVE-2022-34476 as CVE page is older than CVRF-CVE file.
skipping CVE-2022-34475 as CVE page is older than CVRF-CVE file.
skipping CVE-2022-34474 as CVE page is older than CVRF-CVE file.
skipping CVE-2022-34473 as CVE page is older than CVRF-CVE file.
skipping CVE-2022-34472 as CVE page is older than CVRF-CVE file.
skipping CVE-2022-34471 as CVE page is older than CVRF-CVE file.
skipping CVE-2022-34470 as CVE page is older than CVRF-CVE file.
skipping CVE-2022-34469 as CVE page is older than CVRF-CVE file.
skipping CVE-2022-34468 as CVE page is older than CVRF-CVE file.
skipping CVE-2022-34305 as CVE page is older than CVRF-CVE file.
skipping CVE-2022-34266 as CVE page is older than CVRF-CVE file.
no cpe found for SUSE Package Hub 15 SP4 in CVE-2022-34037
skipping CVE-2022-34169 as CVE page is older than CVRF-CVE file.
no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2022-33981
no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2022-33972
no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2022-33967
no cpe found for SUSE Package Hub 15 SP3 in CVE-2022-33903
no cpe found for SUSE Package Hub 15 SP4 in CVE-2022-33903
no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2022-33748
skipping CVE-2022-33879 as CVE page is older than CVRF-CVE file.
no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2022-33746
skipping CVE-2022-33747 as CVE page is older than CVRF-CVE file.
no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2022-33745
no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2022-33742
skipping CVE-2022-33743 as CVE page is older than CVRF-CVE file.
no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2022-33741
no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2022-33740
no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2022-33196
skipping CVE-2022-33108 as CVE page is older than CVRF-CVE file.
no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2022-33103
skipping CVE-2022-33099 as CVE page is older than CVRF-CVE file.
skipping CVE-2022-33068 as CVE page is older than CVRF-CVE file.
skipping CVE-2022-33065 as CVE page is older than CVRF-CVE file.
no cpe found for SUSE Package Hub 15 SP5 in CVE-2022-33025
no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2022-32933
skipping CVE-2022-32981 as CVE page is older than CVRF-CVE file.
no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2022-32919
skipping CVE-2022-32923 as CVE page is older than CVRF-CVE file.
skipping CVE-2022-32912 as CVE page is older than CVRF-CVE file.
skipping CVE-2022-32893 as CVE page is older than CVRF-CVE file.
skipping CVE-2022-32891 as CVE page is older than CVRF-CVE file.
skipping CVE-2022-32888 as CVE page is older than CVRF-CVE file.
skipping CVE-2022-32886 as CVE page is older than CVRF-CVE file.
skipping CVE-2022-32885 as CVE page is older than CVRF-CVE file.
skipping CVE-2022-32816 as CVE page is older than CVRF-CVE file.
skipping CVE-2022-32792 as CVE page is older than CVRF-CVE file.
skipping CVE-2022-32746 as CVE page is older than CVRF-CVE file.
skipping CVE-2022-32745 as CVE page is older than CVRF-CVE file.
skipping CVE-2022-32744 as CVE page is older than CVRF-CVE file.
skipping CVE-2022-32743 as CVE page is older than CVRF-CVE file.
skipping CVE-2022-32742 as CVE page is older than CVRF-CVE file.
no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2022-32547
no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2022-32546
no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2022-32545
no cpe found for SUSE Package Hub 15 SP3 in CVE-2022-32323
no cpe found for SUSE Package Hub 15 SP4 in CVE-2022-32323
no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2022-32296
no cpe found for SUSE Package Hub 15 SP3 in CVE-2022-32293
no cpe found for SUSE Package Hub 15 SP4 in CVE-2022-32293
no cpe found for SUSE Package Hub 15 SP3 in CVE-2022-32292
no cpe found for SUSE Package Hub 15 SP4 in CVE-2022-32292
no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2022-32250
no cpe found for SUSE Package Hub 15 SP4 in CVE-2022-32224
no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2022-32215
skipping CVE-2022-32221 as CVE page is older than CVRF-CVE file.
no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2022-32214
no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2022-32213
no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2022-32212
no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2022-32208
skipping CVE-2022-32209 as CVE page is older than CVRF-CVE file.
no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2022-32206
skipping CVE-2022-32207 as CVE page is older than CVRF-CVE file.
skipping CVE-2022-32205 as CVE page is older than CVRF-CVE file.
no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2022-32190
no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2022-32189
no cpe found for SUSE Manager Client Tools for RHEL, Liberty and Clones 9-CLIENT-TOOLS in CVE-2022-32149
no cpe found for SUSE Manager Tools Beta for SLE Micro 5 in CVE-2022-32149
no cpe found for SUSE Manager Tools for SLE Micro 5 in CVE-2022-32149
skipping CVE-2022-32166 as CVE page is older than CVRF-CVE file.
no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2022-32148
no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2022-31813
skipping CVE-2022-32091 as CVE page is older than CVRF-CVE file.
skipping CVE-2022-32089 as CVE page is older than CVRF-CVE file.
skipping CVE-2022-32088 as CVE page is older than CVRF-CVE file.
skipping CVE-2022-32087 as CVE page is older than CVRF-CVE file.
skipping CVE-2022-32086 as CVE page is older than CVRF-CVE file.
skipping CVE-2022-32085 as CVE page is older than CVRF-CVE file.
skipping CVE-2022-32084 as CVE page is older than CVRF-CVE file.
skipping CVE-2022-32083 as CVE page is older than CVRF-CVE file.
skipping CVE-2022-32082 as CVE page is older than CVRF-CVE file.
skipping CVE-2022-32081 as CVE page is older than CVRF-CVE file.
no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2022-31799
skipping CVE-2022-31783 as CVE page is older than CVRF-CVE file.
no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2022-31747
no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2022-31744
no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2022-31742
no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2022-31741
no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2022-31740
no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2022-31739
no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2022-31738
no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2022-31737
no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2022-31736
no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2022-31676
no cpe found for SUSE Package Hub 15 SP4 in CVE-2022-31651
no cpe found for SUSE Package Hub 15 SP5 in CVE-2022-31651
no cpe found for SUSE Package Hub 15 SP4 in CVE-2022-31650
no cpe found for SUSE Package Hub 15 SP5 in CVE-2022-31650
No V5 entry found for CVE-2022-31631 / /home/securitybot/prod/cve-database/cvelistV5/cves/2022/31xxxx/CVE-2022-31631.json:No such file or directory
no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2022-31631
no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2022-31630
no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2022-31629
no cpe found for SUSE Package Hub 15 SP5 in CVE-2022-31629
no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2022-31628
no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2022-31626
no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2022-31625
no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2022-31394
skipping CVE-2022-31624 as CVE page is older than CVRF-CVE file.
skipping CVE-2022-31623 as CVE page is older than CVRF-CVE file.
skipping CVE-2022-31622 as CVE page is older than CVRF-CVE file.
skipping CVE-2022-31621 as CVE page is older than CVRF-CVE file.
no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2022-31256
no cpe found for SUSE Linux Enterprise Server 15 SP3-BCL in CVE-2022-31254
no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2022-31254
skipping CVE-2022-31255 as CVE page is older than CVRF-CVE file.
no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2022-31252
no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2022-31250
skipping CVE-2022-31251 as CVE page is older than CVRF-CVE file.
skipping CVE-2022-31248 as CVE page is older than CVRF-CVE file.
no cpe found for SUSE Package Hub 15 SP3 in CVE-2022-31214
no cpe found for SUSE Package Hub 15 SP4 in CVE-2022-31214
no cpe found for SUSE Package Hub 15 SP4 in CVE-2022-31213
no cpe found for SUSE Package Hub 15 SP4 in CVE-2022-31212
no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2022-31197
skipping CVE-2022-31163 as CVE page is older than CVRF-CVE file.
no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2022-31150
no cpe found for SUSE Manager Tools Beta for SLE Micro 5 in CVE-2022-31130
no cpe found for SUSE Manager Tools for SLE Micro 5 in CVE-2022-31130
no cpe found for SUSE Manager Tools Beta for SLE Micro 5 in CVE-2022-31123
no cpe found for SUSE Manager Tools for SLE Micro 5 in CVE-2022-31123
skipping CVE-2022-31129 as CVE page is older than CVRF-CVE file.
no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2022-31117
no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2022-31116
CVE-2022-31107: no packages for Image SLES15-SP2-SAP-BYOS-GCE, but entry?
CVE-2022-31107: no packages for SUSE Manager Tools Beta for SLE Micro 5, but entry?
CVE-2022-31107: no packages for Image SLES15-SP2-SAP-BYOS-Azure, but entry?
CVE-2022-31107: no packages for SUSE OpenStack Cloud 9, but entry?
CVE-2022-31107: no packages for SUSE Linux Enterprise High Performance Computing 15-LTSS, but entry?
CVE-2022-31107: no packages for SUSE Manager Tools for SLE Micro 5, but entry?
CVE-2022-31107: no packages for SUSE Manager Proxy Module 4.2, but entry?
CVE-2022-31107: no packages for SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS, but entry?
CVE-2022-31107: no packages for SUSE OpenStack Cloud Crowbar 9, but entry?
CVE-2022-31107: no packages for SUSE Linux Enterprise Server 12 SP3-LTSS-TERADATA, but entry?
CVE-2022-31107: no packages for SUSE Linux Enterprise Server 15 SP2-LTSS, but entry?
CVE-2022-31107: no packages for SUSE Linux Enterprise Server 12 SP3-TERADATA, but entry?
CVE-2022-31107: no packages for SUSE Linux Enterprise Server 12 SP3-BCL, but entry?
CVE-2022-31107: no packages for Image SLES15-SP2-SAP-Azure, but entry?
CVE-2022-31107: no packages for Image SLES15-SP1-SAP-Azure-VLI-BYOS-Production, but entry?
CVE-2022-31107: no packages for Image SLES15-SP2-SAP-Azure-LI-BYOS-Production, but entry?
CVE-2022-31107: no packages for SUSE Linux Enterprise Server for SAP Applications 12 SP5, but entry?
CVE-2022-31107: no packages for SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS, but entry?
CVE-2022-31107: no packages for SUSE Linux Enterprise Server for SAP Applications 15 SP1, but entry?
CVE-2022-31107: no packages for SUSE Linux Enterprise Server 15-LTSS, but entry?
CVE-2022-31107: no packages for Image SLES15-SP2-SAP-GCE, but entry?
CVE-2022-31107: no packages for Image SLES15-SP1-SAP-Azure-LI-BYOS-Production, but entry?
CVE-2022-31107: no packages for Image SLES15-SP2-HPC-BYOS-Azure, but entry?
CVE-2022-31107: no packages for Image SLES15-SP2-SAP-EC2-HVM, but entry?
CVE-2022-31107: no packages for SUSE Manager Server Module 4.3, but entry?
CVE-2022-31107: no packages for SUSE Enterprise Storage 7, but entry?
CVE-2022-31107: no packages for SUSE Linux Enterprise Server 12 SP4-ESPOS, but entry?
CVE-2022-31107: no packages for SUSE Linux Enterprise Server for SAP Applications 15, but entry?
CVE-2022-31107: no packages for SUSE Manager Server Module 4.2, but entry?
CVE-2022-31107: no packages for SUSE Manager Proxy Module 4.3, but entry?
CVE-2022-31107: no packages for Image SLES15-SP2-BYOS-Azure, but entry?
CVE-2022-31107: no packages for SUSE Linux Enterprise Server 12 SP4-LTSS, but entry?
CVE-2022-31107: no packages for SUSE Linux Enterprise Server for SAP Applications 15 SP2, but entry?
CVE-2022-31107: no packages for SUSE Linux Enterprise Server 15 SP1-LTSS, but entry?
CVE-2022-31107: no packages for Image SLES15-SP2-SAP-BYOS-EC2-HVM, but entry?
CVE-2022-31107: no packages for Image SLES15-SP2-SAP-Azure-VLI-BYOS-Production, but entry?
CVE-2022-31107: no packages for SUSE Linux Enterprise Server for SAP Applications 12 SP4, but entry?
CVE-2022-31107: no packages for SUSE Linux Enterprise High Performance Computing 15-ESPOS, but entry?
CVE-2022-31107: no packages for SUSE CaaS Platform 4.0, but entry?
CVE-2022-31107: no packages for SUSE Linux Enterprise Server 12 SP5, but entry?
CVE-2022-31107: no packages for Image SLES15-SP1-SAP-Azure-LI-BYOS-Production, but entry?
CVE-2022-31107: no packages for Image SLES15-SP1-SAP-Azure-VLI-BYOS-Production, but entry?
CVE-2022-31107: no packages for Image SLES15-SP2-BYOS-Azure, but entry?
CVE-2022-31107: no packages for Image SLES15-SP2-HPC-BYOS-Azure, but entry?
CVE-2022-31107: no packages for Image SLES15-SP2-SAP-Azure, but entry?
CVE-2022-31107: no packages for Image SLES15-SP2-SAP-Azure-LI-BYOS-Production, but entry?
CVE-2022-31107: no packages for Image SLES15-SP2-SAP-Azure-VLI-BYOS-Production, but entry?
CVE-2022-31107: no packages for Image SLES15-SP2-SAP-BYOS-Azure, but entry?
CVE-2022-31107: no packages for Image SLES15-SP2-SAP-BYOS-EC2-HVM, but entry?
CVE-2022-31107: no packages for Image SLES15-SP2-SAP-BYOS-GCE, but entry?
CVE-2022-31107: no packages for Image SLES15-SP2-SAP-EC2-HVM, but entry?
CVE-2022-31107: no packages for Image SLES15-SP2-SAP-GCE, but entry?
CVE-2022-31107: no packages for SUSE CaaS Platform 4.0, but entry?
CVE-2022-31107: no packages for SUSE Enterprise Storage 7, but entry?
CVE-2022-31107: no packages for SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS, but entry?
CVE-2022-31107: no packages for SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS, but entry?
CVE-2022-31107: no packages for SUSE Linux Enterprise High Performance Computing 15-ESPOS, but entry?
CVE-2022-31107: no packages for SUSE Linux Enterprise High Performance Computing 15-LTSS, but entry?
CVE-2022-31107: no packages for SUSE Linux Enterprise Server 12 SP3-BCL, but entry?
CVE-2022-31107: no packages for SUSE Linux Enterprise Server 12 SP3-LTSS-TERADATA, but entry?
CVE-2022-31107: no packages for SUSE Linux Enterprise Server 12 SP3-TERADATA, but entry?
CVE-2022-31107: no packages for SUSE Linux Enterprise Server 12 SP4-ESPOS, but entry?
CVE-2022-31107: no packages for SUSE Linux Enterprise Server 12 SP4-LTSS, but entry?
CVE-2022-31107: no packages for SUSE Linux Enterprise Server 12 SP5, but entry?
CVE-2022-31107: no packages for SUSE Linux Enterprise Server 15 SP1-LTSS, but entry?
CVE-2022-31107: no packages for SUSE Linux Enterprise Server 15 SP2-LTSS, but entry?
CVE-2022-31107: no packages for SUSE Linux Enterprise Server 15-LTSS, but entry?
CVE-2022-31107: no packages for SUSE Linux Enterprise Server for SAP Applications 12 SP4, but entry?
CVE-2022-31107: no packages for SUSE Linux Enterprise Server for SAP Applications 12 SP5, but entry?
CVE-2022-31107: no packages for SUSE Linux Enterprise Server for SAP Applications 15, but entry?
CVE-2022-31107: no packages for SUSE Linux Enterprise Server for SAP Applications 15 SP1, but entry?
CVE-2022-31107: no packages for SUSE Linux Enterprise Server for SAP Applications 15 SP2, but entry?
CVE-2022-31107: no packages for SUSE Manager Proxy Module 4.2, but entry?
CVE-2022-31107: no packages for SUSE Manager Proxy Module 4.3, but entry?
CVE-2022-31107: no packages for SUSE Manager Server Module 4.2, but entry?
CVE-2022-31107: no packages for SUSE Manager Server Module 4.3, but entry?
CVE-2022-31107: no packages for SUSE Manager Tools Beta for SLE Micro 5, but entry?
CVE-2022-31107: no packages for SUSE Manager Tools for SLE Micro 5, but entry?
CVE-2022-31107: no packages for SUSE OpenStack Cloud 9, but entry?
CVE-2022-31107: no packages for SUSE OpenStack Cloud Crowbar 9, but entry?
CVE-2022-31107: no packages for Image SLES15-SP1-SAP-Azure-LI-BYOS-Production, but entry?
CVE-2022-31107: no packages for Image SLES15-SP1-SAP-Azure-VLI-BYOS-Production, but entry?
CVE-2022-31107: no packages for Image SLES15-SP2-BYOS-Azure, but entry?
CVE-2022-31107: no packages for Image SLES15-SP2-HPC-BYOS-Azure, but entry?
CVE-2022-31107: no packages for Image SLES15-SP2-SAP-Azure, but entry?
CVE-2022-31107: no packages for Image SLES15-SP2-SAP-Azure-LI-BYOS-Production, but entry?
CVE-2022-31107: no packages for Image SLES15-SP2-SAP-Azure-VLI-BYOS-Production, but entry?
CVE-2022-31107: no packages for Image SLES15-SP2-SAP-BYOS-Azure, but entry?
CVE-2022-31107: no packages for Image SLES15-SP2-SAP-BYOS-EC2-HVM, but entry?
CVE-2022-31107: no packages for Image SLES15-SP2-SAP-BYOS-GCE, but entry?
CVE-2022-31107: no packages for Image SLES15-SP2-SAP-EC2-HVM, but entry?
CVE-2022-31107: no packages for Image SLES15-SP2-SAP-GCE, but entry?
CVE-2022-31107: no packages for SUSE CaaS Platform 4.0, but entry?
CVE-2022-31107: no packages for SUSE Enterprise Storage 7, but entry?
CVE-2022-31107: no packages for SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS, but entry?
CVE-2022-31107: no packages for SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS, but entry?
CVE-2022-31107: no packages for SUSE Linux Enterprise High Performance Computing 15-ESPOS, but entry?
CVE-2022-31107: no packages for SUSE Linux Enterprise High Performance Computing 15-LTSS, but entry?
CVE-2022-31107: no packages for SUSE Linux Enterprise Server 12 SP3-BCL, but entry?
CVE-2022-31107: no packages for SUSE Linux Enterprise Server 12 SP3-LTSS-TERADATA, but entry?
CVE-2022-31107: no packages for SUSE Linux Enterprise Server 12 SP3-TERADATA, but entry?
CVE-2022-31107: no packages for SUSE Linux Enterprise Server 12 SP4-ESPOS, but entry?
CVE-2022-31107: no packages for SUSE Linux Enterprise Server 12 SP4-LTSS, but entry?
CVE-2022-31107: no packages for SUSE Linux Enterprise Server 12 SP5, but entry?
CVE-2022-31107: no packages for SUSE Linux Enterprise Server 15 SP1-LTSS, but entry?
CVE-2022-31107: no packages for SUSE Linux Enterprise Server 15 SP2-LTSS, but entry?
CVE-2022-31107: no packages for SUSE Linux Enterprise Server 15-LTSS, but entry?
CVE-2022-31107: no packages for SUSE Linux Enterprise Server for SAP Applications 12 SP4, but entry?
CVE-2022-31107: no packages for SUSE Linux Enterprise Server for SAP Applications 12 SP5, but entry?
CVE-2022-31107: no packages for SUSE Linux Enterprise Server for SAP Applications 15, but entry?
CVE-2022-31107: no packages for SUSE Linux Enterprise Server for SAP Applications 15 SP1, but entry?
CVE-2022-31107: no packages for SUSE Linux Enterprise Server for SAP Applications 15 SP2, but entry?
CVE-2022-31107: no packages for SUSE Manager Proxy Module 4.2, but entry?
CVE-2022-31107: no packages for SUSE Manager Proxy Module 4.3, but entry?
CVE-2022-31107: no packages for SUSE Manager Server Module 4.2, but entry?
CVE-2022-31107: no packages for SUSE Manager Server Module 4.3, but entry?
CVE-2022-31107: no packages for SUSE Manager Tools Beta for SLE Micro 5, but entry?
CVE-2022-31107: no packages for SUSE Manager Tools for SLE Micro 5, but entry?
CVE-2022-31107: no packages for SUSE OpenStack Cloud 9, but entry?
CVE-2022-31107: no packages for SUSE OpenStack Cloud Crowbar 9, but entry?
CVE-2022-31097: no packages for SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS, but entry?
CVE-2022-31097: no packages for SUSE OpenStack Cloud Crowbar 9, but entry?
CVE-2022-31097: no packages for SUSE Linux Enterprise Server 15 SP2-LTSS, but entry?
CVE-2022-31097: no packages for SUSE Linux Enterprise Server 12 SP3-LTSS-TERADATA, but entry?
CVE-2022-31097: no packages for SUSE Linux Enterprise Server 12 SP3-TERADATA, but entry?
CVE-2022-31097: no packages for SUSE Linux Enterprise Server 12 SP3-BCL, but entry?
CVE-2022-31097: no packages for Image SLES15-SP2-SAP-Azure, but entry?
CVE-2022-31097: no packages for Image SLES15-SP1-SAP-Azure-VLI-BYOS-Production, but entry?
CVE-2022-31097: no packages for Image SLES15-SP2-SAP-Azure-LI-BYOS-Production, but entry?
CVE-2022-31097: no packages for SUSE Linux Enterprise Server for SAP Applications 12 SP5, but entry?
CVE-2022-31097: no packages for Image SLES15-SP2-SAP-BYOS-GCE, but entry?
CVE-2022-31097: no packages for SUSE Manager Tools Beta for SLE Micro 5, but entry?
CVE-2022-31097: no packages for Image SLES15-SP2-SAP-BYOS-Azure, but entry?
CVE-2022-31097: no packages for SUSE OpenStack Cloud 9, but entry?
CVE-2022-31097: no packages for SUSE Linux Enterprise High Performance Computing 15-LTSS, but entry?
CVE-2022-31097: no packages for SUSE Manager Tools for SLE Micro 5, but entry?
CVE-2022-31097: no packages for SUSE Manager Proxy Module 4.2, but entry?
CVE-2022-31097: no packages for SUSE Manager Server Module 4.2, but entry?
CVE-2022-31097: no packages for SUSE Manager Proxy Module 4.3, but entry?
CVE-2022-31097: no packages for Image SLES15-SP2-BYOS-Azure, but entry?
CVE-2022-31097: no packages for SUSE Linux Enterprise Server 12 SP4-LTSS, but entry?
CVE-2022-31097: no packages for SUSE Linux Enterprise Server for SAP Applications 15 SP2, but entry?
CVE-2022-31097: no packages for SUSE Linux Enterprise Server 15 SP1-LTSS, but entry?
CVE-2022-31097: no packages for Image SLES15-SP2-SAP-BYOS-EC2-HVM, but entry?
CVE-2022-31097: no packages for Image SLES15-SP2-SAP-Azure-VLI-BYOS-Production, but entry?
CVE-2022-31097: no packages for SUSE Linux Enterprise Server for SAP Applications 12 SP4, but entry?
CVE-2022-31097: no packages for SUSE Linux Enterprise High Performance Computing 15-ESPOS, but entry?
CVE-2022-31097: no packages for SUSE CaaS Platform 4.0, but entry?
CVE-2022-31097: no packages for SUSE Linux Enterprise Server 12 SP5, but entry?
CVE-2022-31097: no packages for SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS, but entry?
CVE-2022-31097: no packages for SUSE Linux Enterprise Server for SAP Applications 15 SP1, but entry?
CVE-2022-31097: no packages for SUSE Linux Enterprise Server 15-LTSS, but entry?
CVE-2022-31097: no packages for Image SLES15-SP2-SAP-GCE, but entry?
CVE-2022-31097: no packages for Image SLES15-SP2-HPC-BYOS-Azure, but entry?
CVE-2022-31097: no packages for Image SLES15-SP1-SAP-Azure-LI-BYOS-Production, but entry?
CVE-2022-31097: no packages for SUSE Manager Server Module 4.3, but entry?
CVE-2022-31097: no packages for Image SLES15-SP2-SAP-EC2-HVM, but entry?
CVE-2022-31097: no packages for SUSE Enterprise Storage 7, but entry?
CVE-2022-31097: no packages for SUSE Linux Enterprise Server 12 SP4-ESPOS, but entry?
CVE-2022-31097: no packages for SUSE Linux Enterprise Server for SAP Applications 15, but entry?
CVE-2022-31097: no packages for Image SLES15-SP1-SAP-Azure-LI-BYOS-Production, but entry?
CVE-2022-31097: no packages for Image SLES15-SP1-SAP-Azure-VLI-BYOS-Production, but entry?
CVE-2022-31097: no packages for Image SLES15-SP2-BYOS-Azure, but entry?
CVE-2022-31097: no packages for Image SLES15-SP2-HPC-BYOS-Azure, but entry?
CVE-2022-31097: no packages for Image SLES15-SP2-SAP-Azure, but entry?
CVE-2022-31097: no packages for Image SLES15-SP2-SAP-Azure-LI-BYOS-Production, but entry?
CVE-2022-31097: no packages for Image SLES15-SP2-SAP-Azure-VLI-BYOS-Production, but entry?
CVE-2022-31097: no packages for Image SLES15-SP2-SAP-BYOS-Azure, but entry?
CVE-2022-31097: no packages for Image SLES15-SP2-SAP-BYOS-EC2-HVM, but entry?
CVE-2022-31097: no packages for Image SLES15-SP2-SAP-BYOS-GCE, but entry?
CVE-2022-31097: no packages for Image SLES15-SP2-SAP-EC2-HVM, but entry?
CVE-2022-31097: no packages for Image SLES15-SP2-SAP-GCE, but entry?
CVE-2022-31097: no packages for SUSE CaaS Platform 4.0, but entry?
CVE-2022-31097: no packages for SUSE Enterprise Storage 7, but entry?
CVE-2022-31097: no packages for SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS, but entry?
CVE-2022-31097: no packages for SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS, but entry?
CVE-2022-31097: no packages for SUSE Linux Enterprise High Performance Computing 15-ESPOS, but entry?
CVE-2022-31097: no packages for SUSE Linux Enterprise High Performance Computing 15-LTSS, but entry?
CVE-2022-31097: no packages for SUSE Linux Enterprise Server 12 SP3-BCL, but entry?
CVE-2022-31097: no packages for SUSE Linux Enterprise Server 12 SP3-LTSS-TERADATA, but entry?
CVE-2022-31097: no packages for SUSE Linux Enterprise Server 12 SP3-TERADATA, but entry?
CVE-2022-31097: no packages for SUSE Linux Enterprise Server 12 SP4-ESPOS, but entry?
CVE-2022-31097: no packages for SUSE Linux Enterprise Server 12 SP4-LTSS, but entry?
CVE-2022-31097: no packages for SUSE Linux Enterprise Server 12 SP5, but entry?
CVE-2022-31097: no packages for SUSE Linux Enterprise Server 15 SP1-LTSS, but entry?
CVE-2022-31097: no packages for SUSE Linux Enterprise Server 15 SP2-LTSS, but entry?
CVE-2022-31097: no packages for SUSE Linux Enterprise Server 15-LTSS, but entry?
CVE-2022-31097: no packages for SUSE Linux Enterprise Server for SAP Applications 12 SP4, but entry?
CVE-2022-31097: no packages for SUSE Linux Enterprise Server for SAP Applications 12 SP5, but entry?
CVE-2022-31097: no packages for SUSE Linux Enterprise Server for SAP Applications 15, but entry?
CVE-2022-31097: no packages for SUSE Linux Enterprise Server for SAP Applications 15 SP1, but entry?
CVE-2022-31097: no packages for SUSE Linux Enterprise Server for SAP Applications 15 SP2, but entry?
CVE-2022-31097: no packages for SUSE Manager Proxy Module 4.2, but entry?
CVE-2022-31097: no packages for SUSE Manager Proxy Module 4.3, but entry?
CVE-2022-31097: no packages for SUSE Manager Server Module 4.2, but entry?
CVE-2022-31097: no packages for SUSE Manager Server Module 4.3, but entry?
CVE-2022-31097: no packages for SUSE Manager Tools Beta for SLE Micro 5, but entry?
CVE-2022-31097: no packages for SUSE Manager Tools for SLE Micro 5, but entry?
CVE-2022-31097: no packages for SUSE OpenStack Cloud 9, but entry?
CVE-2022-31097: no packages for SUSE OpenStack Cloud Crowbar 9, but entry?
CVE-2022-31097: no packages for Image SLES15-SP1-SAP-Azure-LI-BYOS-Production, but entry?
CVE-2022-31097: no packages for Image SLES15-SP1-SAP-Azure-VLI-BYOS-Production, but entry?
CVE-2022-31097: no packages for Image SLES15-SP2-BYOS-Azure, but entry?
CVE-2022-31097: no packages for Image SLES15-SP2-HPC-BYOS-Azure, but entry?
CVE-2022-31097: no packages for Image SLES15-SP2-SAP-Azure, but entry?
CVE-2022-31097: no packages for Image SLES15-SP2-SAP-Azure-LI-BYOS-Production, but entry?
CVE-2022-31097: no packages for Image SLES15-SP2-SAP-Azure-VLI-BYOS-Production, but entry?
CVE-2022-31097: no packages for Image SLES15-SP2-SAP-BYOS-Azure, but entry?
CVE-2022-31097: no packages for Image SLES15-SP2-SAP-BYOS-EC2-HVM, but entry?
CVE-2022-31097: no packages for Image SLES15-SP2-SAP-BYOS-GCE, but entry?
CVE-2022-31097: no packages for Image SLES15-SP2-SAP-EC2-HVM, but entry?
CVE-2022-31097: no packages for Image SLES15-SP2-SAP-GCE, but entry?
CVE-2022-31097: no packages for SUSE CaaS Platform 4.0, but entry?
CVE-2022-31097: no packages for SUSE Enterprise Storage 7, but entry?
CVE-2022-31097: no packages for SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS, but entry?
CVE-2022-31097: no packages for SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS, but entry?
CVE-2022-31097: no packages for SUSE Linux Enterprise High Performance Computing 15-ESPOS, but entry?
CVE-2022-31097: no packages for SUSE Linux Enterprise High Performance Computing 15-LTSS, but entry?
CVE-2022-31097: no packages for SUSE Linux Enterprise Server 12 SP3-BCL, but entry?
CVE-2022-31097: no packages for SUSE Linux Enterprise Server 12 SP3-LTSS-TERADATA, but entry?
CVE-2022-31097: no packages for SUSE Linux Enterprise Server 12 SP3-TERADATA, but entry?
CVE-2022-31097: no packages for SUSE Linux Enterprise Server 12 SP4-ESPOS, but entry?
CVE-2022-31097: no packages for SUSE Linux Enterprise Server 12 SP4-LTSS, but entry?
CVE-2022-31097: no packages for SUSE Linux Enterprise Server 12 SP5, but entry?
CVE-2022-31097: no packages for SUSE Linux Enterprise Server 15 SP1-LTSS, but entry?
CVE-2022-31097: no packages for SUSE Linux Enterprise Server 15 SP2-LTSS, but entry?
CVE-2022-31097: no packages for SUSE Linux Enterprise Server 15-LTSS, but entry?
CVE-2022-31097: no packages for SUSE Linux Enterprise Server for SAP Applications 12 SP4, but entry?
CVE-2022-31097: no packages for SUSE Linux Enterprise Server for SAP Applications 12 SP5, but entry?
CVE-2022-31097: no packages for SUSE Linux Enterprise Server for SAP Applications 15, but entry?
CVE-2022-31097: no packages for SUSE Linux Enterprise Server for SAP Applications 15 SP1, but entry?
CVE-2022-31097: no packages for SUSE Linux Enterprise Server for SAP Applications 15 SP2, but entry?
CVE-2022-31097: no packages for SUSE Manager Proxy Module 4.2, but entry?
CVE-2022-31097: no packages for SUSE Manager Proxy Module 4.3, but entry?
CVE-2022-31097: no packages for SUSE Manager Server Module 4.2, but entry?
CVE-2022-31097: no packages for SUSE Manager Server Module 4.3, but entry?
CVE-2022-31097: no packages for SUSE Manager Tools Beta for SLE Micro 5, but entry?
CVE-2022-31097: no packages for SUSE Manager Tools for SLE Micro 5, but entry?
CVE-2022-31097: no packages for SUSE OpenStack Cloud 9, but entry?
CVE-2022-31097: no packages for SUSE OpenStack Cloud Crowbar 9, but entry?
no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2022-31081
no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2022-31030
no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2022-31008
no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2022-30790
skipping CVE-2022-30973 as CVE page is older than CVRF-CVE file.
no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2022-30767
skipping CVE-2022-30775 as CVE page is older than CVRF-CVE file.
no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2022-30699
no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2022-30698
no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2022-30635
no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2022-30634
no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2022-30633
no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2022-30632
no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2022-30631
no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2022-30630
no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2022-30629
no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2022-30594
no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2022-30580
no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2022-30552
skipping CVE-2022-30556 as CVE page is older than CVRF-CVE file.
skipping CVE-2022-30550 as CVE page is older than CVRF-CVE file.
skipping CVE-2022-30524 as CVE page is older than CVRF-CVE file.
skipping CVE-2022-30522 as CVE page is older than CVRF-CVE file.
skipping CVE-2022-30294 as CVE page is older than CVRF-CVE file.
skipping CVE-2022-30293 as CVE page is older than CVRF-CVE file.
no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2022-30187
skipping CVE-2022-30126 as CVE page is older than CVRF-CVE file.
skipping CVE-2022-30123 as CVE page is older than CVRF-CVE file.
skipping CVE-2022-30122 as CVE page is older than CVRF-CVE file.
skipping CVE-2022-30115 as CVE page is older than CVRF-CVE file.
no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2022-30065
skipping CVE-2022-29968 as CVE page is older than CVRF-CVE file.
no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2022-29917
no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2022-29916
no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2022-29914
no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2022-29912
no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2022-29911
no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2022-29909
no cpe found for SUSE Linux Enterprise Server 15 SP3-BCL in CVE-2022-29901
no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2022-29901
no cpe found for SUSE Linux Enterprise Server 15 SP3-BCL in CVE-2022-29900
no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2022-29900
no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2022-29869
skipping CVE-2022-29885 as CVE page is older than CVRF-CVE file.
no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2022-29824
no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2022-29804
no cpe found for SUSE Package Hub 15 SP4 in CVE-2022-29718
CVE-2022-29599: no packages for Image SLES15-SP3-Manager-4-2-Server-BYOS-Azure, but entry?
CVE-2022-29599: no packages for Image SLES15-SP2-SAP-GCE, but entry?
CVE-2022-29599: no packages for SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS, but entry?
CVE-2022-29599: no packages for Container bci/kiwi:9.24.43-8.6, but entry?
CVE-2022-29599: no packages for Container bci/openjdk:11-7.1, but entry?
CVE-2022-29599: no packages for SUSE Linux Enterprise Server for SAP Applications 15 SP1, but entry?
CVE-2022-29599: no packages for Image SLES15-SP4-SAP-EC2, but entry?
CVE-2022-29599: no packages for Image SLES15-SP4-SAPCAL-EC2, but entry?
CVE-2022-29599: no packages for SUSE Linux Enterprise Module for Web and Scripting 15 SP4, but entry?
CVE-2022-29599: no packages for Image SLES15-SP4-SAPCAL-Azure, but entry?
CVE-2022-29599: no packages for Image SLES15-SP5-SAPCAL-EC2, but entry?
CVE-2022-29599: no packages for SUSE Linux Enterprise Server 15 SP4-TERADATA, but entry?
CVE-2022-29599: no packages for Image SLES15-SP6-SAP-Azure-LI-BYOS, but entry?
CVE-2022-29599: no packages for Image SLES15-SP4-SAP-Azure-VLI-BYOS, but entry?
CVE-2022-29599: no packages for Image SLES15-SP4-SAP-GCE, but entry?
CVE-2022-29599: no packages for Image SLES15-SP6-SAP-EC2, but entry?
CVE-2022-29599: no packages for Image SLES15-SP2-SAP-EC2-HVM, but entry?
CVE-2022-29599: no packages for Image SLES15-SP6-SAP-Azure-VLI-BYOS-Production, but entry?
CVE-2022-29599: no packages for SUSE Manager Server Module 4.3, but entry?
CVE-2022-29599: no packages for Image SLES15-SP3-SAP-Azure-LI-BYOS-Production, but entry?
CVE-2022-29599: no packages for SUSE Linux Enterprise Workstation Extension 15 SP6, but entry?
CVE-2022-29599: no packages for SUSE Linux Enterprise Workstation Extension 15 SP5, but entry?
CVE-2022-29599: no packages for Image SLES15-SP5-SAP-GCE, but entry?
CVE-2022-29599: no packages for SUSE Linux Enterprise Server 15 SP1-LTSS, but entry?
CVE-2022-29599: no packages for Image SLES15-SP5-SAPCAL-Azure, but entry?
CVE-2022-29599: no packages for Image SLES15-SP5-SAPCAL-GCE, but entry?
CVE-2022-29599: no packages for Image SLES15-SP6-SAP-Azure, but entry?
CVE-2022-29599: no packages for Image SLES15-SP4-SAP-Azure-VLI-BYOS-Production, but entry?
CVE-2022-29599: no packages for Image SLES15-SP5-SAP-Azure-LI-BYOS, but entry?
CVE-2022-29599: no packages for Image SLES15-SP4-Manager-Server-4-3-BYOS-EC2, but entry?
CVE-2022-29599: no packages for SUSE Manager Server Module 4.2, but entry?
CVE-2022-29599: no packages for Image SLES15-SP3-Manager-4-2-Server-BYOS-EC2-HVM, but entry?
CVE-2022-29599: no packages for Image SLES15-SP4-Manager-Server-4-3-BYOS-Azure, but entry?
CVE-2022-29599: no packages for Image SLES15-SP6-SAP-GCE, but entry?
CVE-2022-29599: no packages for Image SLES15-SP6-SAPCAL-GCE, but entry?
CVE-2022-29599: no packages for Image SLES15-SP4-Manager-Server-4-3-BYOS-GCE, but entry?
CVE-2022-29599: no packages for SUSE CaaS Platform 4.0, but entry?
CVE-2022-29599: no packages for Image SLES15-SP5-SAP-Azure-VLI-BYOS-Production, but entry?
CVE-2022-29599: no packages for Image SLES15-SP2-SAP-Azure-VLI-BYOS-Production, but entry?
CVE-2022-29599: no packages for Image SLES15-SP6-SAPCAL-Azure, but entry?
CVE-2022-29599: no packages for Image SLES15-SP2-SAP-BYOS-EC2-HVM, but entry?
CVE-2022-29599: no packages for Image SLES15-SP6-SAP-Azure-VLI-BYOS, but entry?
CVE-2022-29599: no packages for Container suse/manager/5.0/x86_64/server-attestation:5.0.0-beta2.2.16, but entry?
CVE-2022-29599: no packages for Image SLES15-SP5-SAP-Azure, but entry?
CVE-2022-29599: no packages for SUSE Linux Enterprise Module for Basesystem 15 SP6, but entry?
CVE-2022-29599: no packages for Image SLES15-SP5-SAP-Azure-LI-BYOS-Production, but entry?
CVE-2022-29599: no packages for Image SLES15-SP5-SAP-Azure-VLI-BYOS, but entry?
CVE-2022-29599: no packages for Image SLES15-SP6-SAPCAL, but entry?
CVE-2022-29599: no packages for Image SLES15-SP4-Manager-Server-4-3-EC2-ltd, but entry?
CVE-2022-29599: no packages for Image SLES15-SP3-SAPCAL-Azure, but entry?
CVE-2022-29599: no packages for Image SLES15-SP3-SAP-Azure-VLI-BYOS-Production, but entry?
CVE-2022-29599: no packages for SUSE Linux Enterprise Module for Package Hub 15 SP6, but entry?
CVE-2022-29599: no packages for SUSE Linux Enterprise Module for Basesystem 15 SP4, but entry?
CVE-2022-29599: no packages for Image SLES15-SP4-Manager-Server-4-3-Azure-llc, but entry?
CVE-2022-29599: no packages for Container bci/openjdk:17-7.1, but entry?
CVE-2022-29599: no packages for Image SLES15-SP2-SAP-BYOS-GCE, but entry?
CVE-2022-29599: no packages for Image SLES15-SP3-Manager-4-2-Server-BYOS-GCE, but entry?
CVE-2022-29599: no packages for Container bci/openjdk:latest, but entry?
CVE-2022-29599: no packages for SUSE Linux Enterprise Module for Web and Scripting 15 SP6, but entry?
CVE-2022-29599: no packages for Image SLES15-SP4-SAPCAL, but entry?
CVE-2022-29599: no packages for Image SLES15-SP6-SAPCAL-EC2, but entry?
CVE-2022-29599: no packages for Image SLES15-SP4-Manager-Server-4-3-Azure-ltd, but entry?
CVE-2022-29599: no packages for Image SLES15-SP2-SAP-BYOS-Azure, but entry?
CVE-2022-29599: no packages for SUSE Linux Enterprise Module for Web and Scripting 15 SP5, but entry?
CVE-2022-29599: no packages for Image SLES15-SP5-SAP-EC2, but entry?
CVE-2022-29599: no packages for Image SLES15-SP6-SAP-Azure-LI-BYOS-Production, but entry?
CVE-2022-29599: no packages for SUSE Linux Enterprise Module for Package Hub 15 SP4, but entry?
CVE-2022-29599: no packages for SUSE Linux Enterprise Workstation Extension 15 SP4, but entry?
CVE-2022-29599: no packages for SUSE Linux Enterprise Module for Package Hub 15 SP5, but entry?
CVE-2022-29599: no packages for Image SLES15-SP4-SAP-Azure, but entry?
CVE-2022-29599: no packages for Image SLES15-SP4-Manager-Server-4-3-EC2-llc, but entry?
CVE-2022-29599: no packages for SUSE Manager Proxy 4.2, but entry?
CVE-2022-29599: no packages for SUSE Manager Retail Branch Server 4.2, but entry?
CVE-2022-29599: no packages for Image SLES15-SP4-SAP, but entry?
CVE-2022-29599: no packages for Image SLES15-SP4-Manager-Server-4-3, but entry?
CVE-2022-29599: no packages for Image SLES15-SP2-SAP-Azure-LI-BYOS-Production, but entry?
CVE-2022-29599: no packages for Image SLES15-SP4-SAP-Azure-LI-BYOS-Production, but entry?
CVE-2022-29599: no packages for SUSE Manager Server 4.2, but entry?
CVE-2022-29599: no packages for Image SLES15-SP3-SAPCAL-EC2-HVM, but entry?
CVE-2022-29599: no packages for Image SLES15-SP4-SAP-Azure-LI-BYOS, but entry?
CVE-2022-29599: no packages for Image SLES15-SP4-Manager-Server-4-3-BYOS, but entry?
CVE-2022-29599: no packages for Container suse/manager/5.0/x86_64/server:5.0.0-beta1.2.122, but entry?
CVE-2022-29599: no packages for Image SLES15-SP2-SAP-Azure, but entry?
CVE-2022-29599: no packages for SUSE Linux Enterprise Module for Basesystem 15 SP5, but entry?
CVE-2022-29599: no packages for Image SLES15-SP4-SAPCAL-GCE, but entry?
CVE-2022-29599: no packages for Image SLES15-SP6-SAP, but entry?
CVE-2022-29599: no packages for Image SLES15-SP3-SAPCAL-GCE, but entry?
CVE-2022-29599: no packages for Container bci/kiwi:9.24.43-8.6, but entry?
CVE-2022-29599: no packages for Container bci/openjdk:11-7.1, but entry?
CVE-2022-29599: no packages for Container bci/openjdk:17-7.1, but entry?
CVE-2022-29599: no packages for Container bci/openjdk:latest, but entry?
CVE-2022-29599: no packages for Container suse/manager/5.0/x86_64/server-attestation:5.0.0-beta2.2.16, but entry?
CVE-2022-29599: no packages for Container suse/manager/5.0/x86_64/server:5.0.0-beta1.2.122, but entry?
CVE-2022-29599: no packages for Image SLES15-SP2-SAP-Azure, but entry?
CVE-2022-29599: no packages for Image SLES15-SP2-SAP-Azure-LI-BYOS-Production, but entry?
CVE-2022-29599: no packages for Image SLES15-SP2-SAP-Azure-VLI-BYOS-Production, but entry?
CVE-2022-29599: no packages for Image SLES15-SP2-SAP-BYOS-Azure, but entry?
CVE-2022-29599: no packages for Image SLES15-SP2-SAP-BYOS-EC2-HVM, but entry?
CVE-2022-29599: no packages for Image SLES15-SP2-SAP-BYOS-GCE, but entry?
CVE-2022-29599: no packages for Image SLES15-SP2-SAP-EC2-HVM, but entry?
CVE-2022-29599: no packages for Image SLES15-SP2-SAP-GCE, but entry?
CVE-2022-29599: no packages for Image SLES15-SP3-Manager-4-2-Server-BYOS-Azure, but entry?
CVE-2022-29599: no packages for Image SLES15-SP3-Manager-4-2-Server-BYOS-EC2-HVM, but entry?
CVE-2022-29599: no packages for Image SLES15-SP3-Manager-4-2-Server-BYOS-GCE, but entry?
CVE-2022-29599: no packages for Image SLES15-SP3-SAP-Azure-LI-BYOS-Production, but entry?
CVE-2022-29599: no packages for Image SLES15-SP3-SAP-Azure-VLI-BYOS-Production, but entry?
CVE-2022-29599: no packages for Image SLES15-SP3-SAPCAL-Azure, but entry?
CVE-2022-29599: no packages for Image SLES15-SP3-SAPCAL-EC2-HVM, but entry?
CVE-2022-29599: no packages for Image SLES15-SP3-SAPCAL-GCE, but entry?
CVE-2022-29599: no packages for Image SLES15-SP4-Manager-Server-4-3, but entry?
CVE-2022-29599: no packages for Image SLES15-SP4-Manager-Server-4-3-Azure-llc, but entry?
CVE-2022-29599: no packages for Image SLES15-SP4-Manager-Server-4-3-Azure-ltd, but entry?
CVE-2022-29599: no packages for Image SLES15-SP4-Manager-Server-4-3-BYOS, but entry?
CVE-2022-29599: no packages for Image SLES15-SP4-Manager-Server-4-3-BYOS-Azure, but entry?
CVE-2022-29599: no packages for Image SLES15-SP4-Manager-Server-4-3-BYOS-EC2, but entry?
CVE-2022-29599: no packages for Image SLES15-SP4-Manager-Server-4-3-BYOS-GCE, but entry?
CVE-2022-29599: no packages for Image SLES15-SP4-Manager-Server-4-3-EC2-llc, but entry?
CVE-2022-29599: no packages for Image SLES15-SP4-Manager-Server-4-3-EC2-ltd, but entry?
CVE-2022-29599: no packages for Image SLES15-SP4-SAP, but entry?
CVE-2022-29599: no packages for Image SLES15-SP4-SAP-Azure, but entry?
CVE-2022-29599: no packages for Image SLES15-SP4-SAP-Azure-LI-BYOS, but entry?
CVE-2022-29599: no packages for Image SLES15-SP4-SAP-Azure-LI-BYOS-Production, but entry?
CVE-2022-29599: no packages for Image SLES15-SP4-SAP-Azure-VLI-BYOS, but entry?
CVE-2022-29599: no packages for Image SLES15-SP4-SAP-Azure-VLI-BYOS-Production, but entry?
CVE-2022-29599: no packages for Image SLES15-SP4-SAP-EC2, but entry?
CVE-2022-29599: no packages for Image SLES15-SP4-SAP-GCE, but entry?
CVE-2022-29599: no packages for Image SLES15-SP4-SAPCAL, but entry?
CVE-2022-29599: no packages for Image SLES15-SP4-SAPCAL-Azure, but entry?
CVE-2022-29599: no packages for Image SLES15-SP4-SAPCAL-EC2, but entry?
CVE-2022-29599: no packages for Image SLES15-SP4-SAPCAL-GCE, but entry?
CVE-2022-29599: no packages for Image SLES15-SP5-SAP-Azure, but entry?
CVE-2022-29599: no packages for Image SLES15-SP5-SAP-Azure-LI-BYOS, but entry?
CVE-2022-29599: no packages for Image SLES15-SP5-SAP-Azure-LI-BYOS-Production, but entry?
CVE-2022-29599: no packages for Image SLES15-SP5-SAP-Azure-VLI-BYOS, but entry?
CVE-2022-29599: no packages for Image SLES15-SP5-SAP-Azure-VLI-BYOS-Production, but entry?
CVE-2022-29599: no packages for Image SLES15-SP5-SAP-EC2, but entry?
CVE-2022-29599: no packages for Image SLES15-SP5-SAP-GCE, but entry?
CVE-2022-29599: no packages for Image SLES15-SP5-SAPCAL-Azure, but entry?
CVE-2022-29599: no packages for Image SLES15-SP5-SAPCAL-EC2, but entry?
CVE-2022-29599: no packages for Image SLES15-SP5-SAPCAL-GCE, but entry?
CVE-2022-29599: no packages for Image SLES15-SP6-SAP, but entry?
CVE-2022-29599: no packages for Image SLES15-SP6-SAP-Azure, but entry?
CVE-2022-29599: no packages for Image SLES15-SP6-SAP-Azure-LI-BYOS, but entry?
CVE-2022-29599: no packages for Image SLES15-SP6-SAP-Azure-LI-BYOS-Production, but entry?
CVE-2022-29599: no packages for Image SLES15-SP6-SAP-Azure-VLI-BYOS, but entry?
CVE-2022-29599: no packages for Image SLES15-SP6-SAP-Azure-VLI-BYOS-Production, but entry?
CVE-2022-29599: no packages for Image SLES15-SP6-SAP-EC2, but entry?
CVE-2022-29599: no packages for Image SLES15-SP6-SAP-GCE, but entry?
CVE-2022-29599: no packages for Image SLES15-SP6-SAPCAL, but entry?
CVE-2022-29599: no packages for Image SLES15-SP6-SAPCAL-Azure, but entry?
CVE-2022-29599: no packages for Image SLES15-SP6-SAPCAL-EC2, but entry?
CVE-2022-29599: no packages for Image SLES15-SP6-SAPCAL-GCE, but entry?
CVE-2022-29599: no packages for SUSE CaaS Platform 4.0, but entry?
CVE-2022-29599: no packages for SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS, but entry?
CVE-2022-29599: no packages for SUSE Linux Enterprise Module for Basesystem 15 SP4, but entry?
CVE-2022-29599: no packages for SUSE Linux Enterprise Module for Basesystem 15 SP5, but entry?
CVE-2022-29599: no packages for SUSE Linux Enterprise Module for Basesystem 15 SP6, but entry?
CVE-2022-29599: no packages for SUSE Linux Enterprise Module for Package Hub 15 SP4, but entry?
CVE-2022-29599: no packages for SUSE Linux Enterprise Module for Package Hub 15 SP5, but entry?
CVE-2022-29599: no packages for SUSE Linux Enterprise Module for Package Hub 15 SP6, but entry?
CVE-2022-29599: no packages for SUSE Linux Enterprise Module for Web and Scripting 15 SP4, but entry?
CVE-2022-29599: no packages for SUSE Linux Enterprise Module for Web and Scripting 15 SP5, but entry?
CVE-2022-29599: no packages for SUSE Linux Enterprise Module for Web and Scripting 15 SP6, but entry?
CVE-2022-29599: no packages for SUSE Linux Enterprise Server 15 SP1-LTSS, but entry?
CVE-2022-29599: no packages for SUSE Linux Enterprise Server 15 SP4-TERADATA, but entry?
CVE-2022-29599: no packages for SUSE Linux Enterprise Server for SAP Applications 15 SP1, but entry?
CVE-2022-29599: no packages for SUSE Linux Enterprise Workstation Extension 15 SP4, but entry?
CVE-2022-29599: no packages for SUSE Linux Enterprise Workstation Extension 15 SP5, but entry?
CVE-2022-29599: no packages for SUSE Linux Enterprise Workstation Extension 15 SP6, but entry?
CVE-2022-29599: no packages for SUSE Manager Proxy 4.2, but entry?
CVE-2022-29599: no packages for SUSE Manager Retail Branch Server 4.2, but entry?
CVE-2022-29599: no packages for SUSE Manager Server 4.2, but entry?
CVE-2022-29599: no packages for SUSE Manager Server Module 4.2, but entry?
CVE-2022-29599: no packages for SUSE Manager Server Module 4.3, but entry?
CVE-2022-29599: no packages for Container bci/kiwi:9.24.43-8.6, but entry?
CVE-2022-29599: no packages for Container bci/openjdk:11-7.1, but entry?
CVE-2022-29599: no packages for Container bci/openjdk:17-7.1, but entry?
CVE-2022-29599: no packages for Container bci/openjdk:latest, but entry?
CVE-2022-29599: no packages for Container suse/manager/5.0/x86_64/server-attestation:5.0.0-beta2.2.16, but entry?
CVE-2022-29599: no packages for Container suse/manager/5.0/x86_64/server:5.0.0-beta1.2.122, but entry?
CVE-2022-29599: no packages for Image SLES15-SP2-SAP-Azure, but entry?
CVE-2022-29599: no packages for Image SLES15-SP2-SAP-Azure-LI-BYOS-Production, but entry?
CVE-2022-29599: no packages for Image SLES15-SP2-SAP-Azure-VLI-BYOS-Production, but entry?
CVE-2022-29599: no packages for Image SLES15-SP2-SAP-BYOS-Azure, but entry?
CVE-2022-29599: no packages for Image SLES15-SP2-SAP-BYOS-EC2-HVM, but entry?
CVE-2022-29599: no packages for Image SLES15-SP2-SAP-BYOS-GCE, but entry?
CVE-2022-29599: no packages for Image SLES15-SP2-SAP-EC2-HVM, but entry?
CVE-2022-29599: no packages for Image SLES15-SP2-SAP-GCE, but entry?
CVE-2022-29599: no packages for Image SLES15-SP3-Manager-4-2-Server-BYOS-Azure, but entry?
CVE-2022-29599: no packages for Image SLES15-SP3-Manager-4-2-Server-BYOS-EC2-HVM, but entry?
CVE-2022-29599: no packages for Image SLES15-SP3-Manager-4-2-Server-BYOS-GCE, but entry?
CVE-2022-29599: no packages for Image SLES15-SP3-SAP-Azure-LI-BYOS-Production, but entry?
CVE-2022-29599: no packages for Image SLES15-SP3-SAP-Azure-VLI-BYOS-Production, but entry?
CVE-2022-29599: no packages for Image SLES15-SP3-SAPCAL-Azure, but entry?
CVE-2022-29599: no packages for Image SLES15-SP3-SAPCAL-EC2-HVM, but entry?
CVE-2022-29599: no packages for Image SLES15-SP3-SAPCAL-GCE, but entry?
CVE-2022-29599: no packages for Image SLES15-SP4-Manager-Server-4-3, but entry?
CVE-2022-29599: no packages for Image SLES15-SP4-Manager-Server-4-3-Azure-llc, but entry?
CVE-2022-29599: no packages for Image SLES15-SP4-Manager-Server-4-3-Azure-ltd, but entry?
CVE-2022-29599: no packages for Image SLES15-SP4-Manager-Server-4-3-BYOS, but entry?
CVE-2022-29599: no packages for Image SLES15-SP4-Manager-Server-4-3-BYOS-Azure, but entry?
CVE-2022-29599: no packages for Image SLES15-SP4-Manager-Server-4-3-BYOS-EC2, but entry?
CVE-2022-29599: no packages for Image SLES15-SP4-Manager-Server-4-3-BYOS-GCE, but entry?
CVE-2022-29599: no packages for Image SLES15-SP4-Manager-Server-4-3-EC2-llc, but entry?
CVE-2022-29599: no packages for Image SLES15-SP4-Manager-Server-4-3-EC2-ltd, but entry?
CVE-2022-29599: no packages for Image SLES15-SP4-SAP, but entry?
CVE-2022-29599: no packages for Image SLES15-SP4-SAP-Azure, but entry?
CVE-2022-29599: no packages for Image SLES15-SP4-SAP-Azure-LI-BYOS, but entry?
CVE-2022-29599: no packages for Image SLES15-SP4-SAP-Azure-LI-BYOS-Production, but entry?
CVE-2022-29599: no packages for Image SLES15-SP4-SAP-Azure-VLI-BYOS, but entry?
CVE-2022-29599: no packages for Image SLES15-SP4-SAP-Azure-VLI-BYOS-Production, but entry?
CVE-2022-29599: no packages for Image SLES15-SP4-SAP-EC2, but entry?
CVE-2022-29599: no packages for Image SLES15-SP4-SAP-GCE, but entry?
CVE-2022-29599: no packages for Image SLES15-SP4-SAPCAL, but entry?
CVE-2022-29599: no packages for Image SLES15-SP4-SAPCAL-Azure, but entry?
CVE-2022-29599: no packages for Image SLES15-SP4-SAPCAL-EC2, but entry?
CVE-2022-29599: no packages for Image SLES15-SP4-SAPCAL-GCE, but entry?
CVE-2022-29599: no packages for Image SLES15-SP5-SAP-Azure, but entry?
CVE-2022-29599: no packages for Image SLES15-SP5-SAP-Azure-LI-BYOS, but entry?
CVE-2022-29599: no packages for Image SLES15-SP5-SAP-Azure-LI-BYOS-Production, but entry?
CVE-2022-29599: no packages for Image SLES15-SP5-SAP-Azure-VLI-BYOS, but entry?
CVE-2022-29599: no packages for Image SLES15-SP5-SAP-Azure-VLI-BYOS-Production, but entry?
CVE-2022-29599: no packages for Image SLES15-SP5-SAP-EC2, but entry?
CVE-2022-29599: no packages for Image SLES15-SP5-SAP-GCE, but entry?
CVE-2022-29599: no packages for Image SLES15-SP5-SAPCAL-Azure, but entry?
CVE-2022-29599: no packages for Image SLES15-SP5-SAPCAL-EC2, but entry?
CVE-2022-29599: no packages for Image SLES15-SP5-SAPCAL-GCE, but entry?
CVE-2022-29599: no packages for Image SLES15-SP6-SAP, but entry?
CVE-2022-29599: no packages for Image SLES15-SP6-SAP-Azure, but entry?
CVE-2022-29599: no packages for Image SLES15-SP6-SAP-Azure-LI-BYOS, but entry?
CVE-2022-29599: no packages for Image SLES15-SP6-SAP-Azure-LI-BYOS-Production, but entry?
CVE-2022-29599: no packages for Image SLES15-SP6-SAP-Azure-VLI-BYOS, but entry?
CVE-2022-29599: no packages for Image SLES15-SP6-SAP-Azure-VLI-BYOS-Production, but entry?
CVE-2022-29599: no packages for Image SLES15-SP6-SAP-EC2, but entry?
CVE-2022-29599: no packages for Image SLES15-SP6-SAP-GCE, but entry?
CVE-2022-29599: no packages for Image SLES15-SP6-SAPCAL, but entry?
CVE-2022-29599: no packages for Image SLES15-SP6-SAPCAL-Azure, but entry?
CVE-2022-29599: no packages for Image SLES15-SP6-SAPCAL-EC2, but entry?
CVE-2022-29599: no packages for Image SLES15-SP6-SAPCAL-GCE, but entry?
CVE-2022-29599: no packages for SUSE CaaS Platform 4.0, but entry?
CVE-2022-29599: no packages for SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS, but entry?
CVE-2022-29599: no packages for SUSE Linux Enterprise Module for Basesystem 15 SP4, but entry?
CVE-2022-29599: no packages for SUSE Linux Enterprise Module for Basesystem 15 SP5, but entry?
CVE-2022-29599: no packages for SUSE Linux Enterprise Module for Basesystem 15 SP6, but entry?
CVE-2022-29599: no packages for SUSE Linux Enterprise Module for Package Hub 15 SP4, but entry?
CVE-2022-29599: no packages for SUSE Linux Enterprise Module for Package Hub 15 SP5, but entry?
CVE-2022-29599: no packages for SUSE Linux Enterprise Module for Package Hub 15 SP6, but entry?
CVE-2022-29599: no packages for SUSE Linux Enterprise Module for Web and Scripting 15 SP4, but entry?
CVE-2022-29599: no packages for SUSE Linux Enterprise Module for Web and Scripting 15 SP5, but entry?
CVE-2022-29599: no packages for SUSE Linux Enterprise Module for Web and Scripting 15 SP6, but entry?
CVE-2022-29599: no packages for SUSE Linux Enterprise Server 15 SP1-LTSS, but entry?
CVE-2022-29599: no packages for SUSE Linux Enterprise Server 15 SP4-TERADATA, but entry?
CVE-2022-29599: no packages for SUSE Linux Enterprise Server for SAP Applications 15 SP1, but entry?
CVE-2022-29599: no packages for SUSE Linux Enterprise Workstation Extension 15 SP4, but entry?
CVE-2022-29599: no packages for SUSE Linux Enterprise Workstation Extension 15 SP5, but entry?
CVE-2022-29599: no packages for SUSE Linux Enterprise Workstation Extension 15 SP6, but entry?
CVE-2022-29599: no packages for SUSE Manager Proxy 4.2, but entry?
CVE-2022-29599: no packages for SUSE Manager Retail Branch Server 4.2, but entry?
CVE-2022-29599: no packages for SUSE Manager Server 4.2, but entry?
CVE-2022-29599: no packages for SUSE Manager Server Module 4.2, but entry?
CVE-2022-29599: no packages for SUSE Manager Server Module 4.3, but entry?
no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2022-29581
skipping CVE-2022-29582 as CVE page is older than CVRF-CVE file.
no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2022-29526
skipping CVE-2022-29501 as CVE page is older than CVRF-CVE file.
skipping CVE-2022-29500 as CVE page is older than CVRF-CVE file.
skipping CVE-2022-29458 as CVE page is older than CVRF-CVE file.
skipping CVE-2022-29404 as CVE page is older than CVRF-CVE file.
no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2022-29244
no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2022-29217
no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2022-29181
skipping CVE-2022-29187 as CVE page is older than CVRF-CVE file.
no cpe found for SUSE Manager Tools Beta for SLE Micro 5 in CVE-2022-29170
no cpe found for SUSE Manager Tools for SLE Micro 5 in CVE-2022-29170
no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2022-29162
no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2022-29155
skipping CVE-2022-29156 as CVE page is older than CVRF-CVE file.
no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2022-29154
no cpe found for SUSE Package Hub 15 SP6 in CVE-2022-28948
no cpe found for SUSE Package Hub 15 SP3 in CVE-2022-28946
no cpe found for SUSE Package Hub 15 SP4 in CVE-2022-28946
no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2022-28748
skipping CVE-2022-28893 as CVE page is older than CVRF-CVE file.
skipping CVE-2022-28805 as CVE page is older than CVRF-CVE file.
skipping CVE-2022-28796 as CVE page is older than CVRF-CVE file.
--- /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2022-28748.xml 2024-10-01 01:50:21.513806000 +0200
+++ /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2022-28748.xml.new 2024-10-29 01:42:30.950770000 +0100
@@ -14,13 +14,13 @@
1
- 143
- 2024-09-30T23:50:20Z
+ 144
+ 2024-10-29T00:42:30Z
current
2022-04-11T11:44:37Z
- 2024-09-30T23:50:20Z
+ 2024-10-29T00:42:30Z
cve-database/bin/generate-cvrf-cve.pl
2020-12-27T01:00:00Z
@@ -3224,41 +3224,41 @@
ocfs2-kmp-default-4.12.14-122.121.2 as a component of Image SLES12-SP5-EC2-SAP-On-Demand
-
- kernel-default-4.12.14-122.121.2 as a component of Image SLES12-SP5-GCE-BYOS
+
+ kernel-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-BYOS
kernel-default-4.12.14-122.121.2 as a component of Image SLES12-SP5-GCE-On-Demand
-
- cluster-md-kmp-default-4.12.14-122.121.2 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+ cluster-md-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
-
- dlm-kmp-default-4.12.14-122.121.2 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+ dlm-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
-
- gfs2-kmp-default-4.12.14-122.121.2 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+ gfs2-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
-
- kernel-default-4.12.14-122.121.2 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+ kernel-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
-
- ocfs2-kmp-default-4.12.14-122.121.2 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+ ocfs2-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
-
- cluster-md-kmp-default-4.12.14-122.121.2 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
+ cluster-md-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
-
- dlm-kmp-default-4.12.14-122.121.2 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
+ dlm-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
-
- gfs2-kmp-default-4.12.14-122.121.2 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
+ gfs2-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
-
- kernel-default-4.12.14-122.121.2 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
+ kernel-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
-
- ocfs2-kmp-default-4.12.14-122.121.2 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
+ ocfs2-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
cluster-md-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-SAP-Azure-LI-BYOS-Production
@@ -6634,18 +6634,18 @@
Image SLES12-SP5-EC2-SAP-On-Demand:gfs2-kmp-default-4.12.14-122.121.2
Image SLES12-SP5-EC2-SAP-On-Demand:kernel-default-4.12.14-122.121.2
Image SLES12-SP5-EC2-SAP-On-Demand:ocfs2-kmp-default-4.12.14-122.121.2
- Image SLES12-SP5-GCE-BYOS:kernel-default-4.12.14-122.121.2
+ Image SLES12-SP5-GCE-BYOS:kernel-default-4.12.14-122.225.1
Image SLES12-SP5-GCE-On-Demand:kernel-default-4.12.14-122.121.2
- Image SLES12-SP5-GCE-SAP-BYOS:cluster-md-kmp-default-4.12.14-122.121.2
- Image SLES12-SP5-GCE-SAP-BYOS:dlm-kmp-default-4.12.14-122.121.2
- Image SLES12-SP5-GCE-SAP-BYOS:gfs2-kmp-default-4.12.14-122.121.2
- Image SLES12-SP5-GCE-SAP-BYOS:kernel-default-4.12.14-122.121.2
- Image SLES12-SP5-GCE-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.121.2
- Image SLES12-SP5-GCE-SAP-On-Demand:cluster-md-kmp-default-4.12.14-122.121.2
- Image SLES12-SP5-GCE-SAP-On-Demand:dlm-kmp-default-4.12.14-122.121.2
- Image SLES12-SP5-GCE-SAP-On-Demand:gfs2-kmp-default-4.12.14-122.121.2
- Image SLES12-SP5-GCE-SAP-On-Demand:kernel-default-4.12.14-122.121.2
- Image SLES12-SP5-GCE-SAP-On-Demand:ocfs2-kmp-default-4.12.14-122.121.2
+ Image SLES12-SP5-GCE-SAP-BYOS:cluster-md-kmp-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-BYOS:dlm-kmp-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-BYOS:gfs2-kmp-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-BYOS:kernel-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:cluster-md-kmp-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:dlm-kmp-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:gfs2-kmp-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:kernel-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:ocfs2-kmp-default-4.12.14-122.225.1
Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:cluster-md-kmp-default-4.12.14-122.225.1
Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:dlm-kmp-default-4.12.14-122.225.1
Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:gfs2-kmp-default-4.12.14-122.225.1
no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2022-28737
skipping CVE-2022-28739 as CVE page is older than CVRF-CVE file.
skipping CVE-2022-28738 as CVE page is older than CVRF-CVE file.
no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2022-28736
no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2022-28734
skipping CVE-2022-28735 as CVE page is older than CVRF-CVE file.
no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2022-28733
skipping CVE-2022-28693 as CVE page is older than CVRF-CVE file.
skipping CVE-2022-28615 as CVE page is older than CVRF-CVE file.
skipping CVE-2022-28614 as CVE page is older than CVRF-CVE file.
skipping CVE-2022-28506 as CVE page is older than CVRF-CVE file.
no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2022-28463
CVE-2022-28366: no packages for SUSE Linux Enterprise Module for Package Hub 15 SP5, but entry?
CVE-2022-28366: no packages for Image SLES15-SP4-SAP-Azure, but entry?
CVE-2022-28366: no packages for SUSE Linux Enterprise Module for Package Hub 15 SP4, but entry?
CVE-2022-28366: no packages for Image SLES15-SP6-SAP-Azure-LI-BYOS-Production, but entry?
CVE-2022-28366: no packages for SUSE Linux Enterprise Workstation Extension 15 SP4, but entry?
CVE-2022-28366: no packages for Image SLES15-SP4-SAP, but entry?
CVE-2022-28366: no packages for SUSE Manager Retail Branch Server 4.2, but entry?
CVE-2022-28366: no packages for Image SLES15-SP4-Manager-Server-4-3, but entry?
CVE-2022-28366: no packages for Image SLES15-SP4-Manager-Server-4-3-EC2-llc, but entry?
CVE-2022-28366: no packages for SUSE Manager Proxy 4.2, but entry?
CVE-2022-28366: no packages for Container suse/manager/5.0/x86_64/server:5.0.0-beta1.2.122, but entry?
CVE-2022-28366: no packages for Image SLES15-SP4-SAP-Azure-LI-BYOS, but entry?
CVE-2022-28366: no packages for Image SLES15-SP2-SAP-Azure-LI-BYOS-Production, but entry?
CVE-2022-28366: no packages for Image SLES15-SP4-SAP-Azure-LI-BYOS-Production, but entry?
CVE-2022-28366: no packages for SUSE Manager Server 4.2, but entry?
CVE-2022-28366: no packages for Image SLES15-SP3-SAPCAL-EC2-HVM, but entry?
CVE-2022-28366: no packages for Image SLES15-SP4-Manager-Server-4-3-BYOS, but entry?
CVE-2022-28366: no packages for Image SLES15-SP6-SAP, but entry?
CVE-2022-28366: no packages for Image SLES15-SP3-SAPCAL-GCE, but entry?
CVE-2022-28366: no packages for Image SLES15-SP2-SAP-Azure, but entry?
CVE-2022-28366: no packages for Image SLES15-SP4-SAPCAL-GCE, but entry?
CVE-2022-28366: no packages for SUSE Linux Enterprise Module for Basesystem 15 SP5, but entry?
CVE-2022-28366: no packages for Image SLES15-SP4-Manager-Server-4-3-EC2-ltd, but entry?
CVE-2022-28366: no packages for Image SLES15-SP3-SAPCAL-Azure, but entry?
CVE-2022-28366: no packages for Image SLES15-SP3-SAP-Azure-VLI-BYOS-Production, but entry?
CVE-2022-28366: no packages for SUSE Linux Enterprise Module for Basesystem 15 SP6, but entry?
CVE-2022-28366: no packages for Image SLES15-SP5-SAP-Azure-LI-BYOS-Production, but entry?
CVE-2022-28366: no packages for Image SLES15-SP5-SAP-Azure-VLI-BYOS, but entry?
CVE-2022-28366: no packages for Image SLES15-SP6-SAPCAL, but entry?
CVE-2022-28366: no packages for Image SLES15-SP4-Manager-Server-4-3-Azure-llc, but entry?
CVE-2022-28366: no packages for Image SLES15-SP2-SAP-BYOS-GCE, but entry?
CVE-2022-28366: no packages for Container bci/openjdk:17-7.1, but entry?
CVE-2022-28366: no packages for SUSE Linux Enterprise Module for Package Hub 15 SP6, but entry?
CVE-2022-28366: no packages for SUSE Linux Enterprise Module for Basesystem 15 SP4, but entry?
CVE-2022-28366: no packages for Image SLES15-SP6-SAPCAL-EC2, but entry?
CVE-2022-28366: no packages for Image SLES15-SP4-SAPCAL, but entry?
CVE-2022-28366: no packages for SUSE Linux Enterprise Module for Web and Scripting 15 SP6, but entry?
CVE-2022-28366: no packages for Container bci/openjdk:latest, but entry?
CVE-2022-28366: no packages for Image SLES15-SP5-SAP-EC2, but entry?
CVE-2022-28366: no packages for SUSE Linux Enterprise Module for Web and Scripting 15 SP5, but entry?
CVE-2022-28366: no packages for Image SLES15-SP4-Manager-Server-4-3-Azure-ltd, but entry?
CVE-2022-28366: no packages for Image SLES15-SP2-SAP-BYOS-Azure, but entry?
CVE-2022-28366: no packages for SUSE Linux Enterprise Server 15 SP1-LTSS, but entry?
CVE-2022-28366: no packages for Container bci/openjdk-devel:17-7.2, but entry?
CVE-2022-28366: no packages for Image SLES15-SP5-SAPCAL-Azure, but entry?
CVE-2022-28366: no packages for SUSE Linux Enterprise Workstation Extension 15 SP5, but entry?
CVE-2022-28366: no packages for Image SLES15-SP5-SAP-GCE, but entry?
CVE-2022-28366: no packages for Image SLES15-SP4-Manager-Server-4-3-BYOS-Azure, but entry?
CVE-2022-28366: no packages for Image SLES15-SP6-SAP-GCE, but entry?
CVE-2022-28366: no packages for Container bci/openjdk-devel:11-6.2, but entry?
CVE-2022-28366: no packages for Image SLES15-SP4-Manager-Server-4-3-BYOS-GCE, but entry?
CVE-2022-28366: no packages for Image SLES15-SP6-SAPCAL-GCE, but entry?
CVE-2022-28366: no packages for Image SLES15-SP4-SAP-Azure-VLI-BYOS-Production, but entry?
CVE-2022-28366: no packages for Image SLES15-SP5-SAPCAL-GCE, but entry?
CVE-2022-28366: no packages for Image SLES15-SP6-SAP-Azure, but entry?
CVE-2022-28366: no packages for Image SLES15-SP5-SAP-Azure-LI-BYOS, but entry?
CVE-2022-28366: no packages for Image SLES15-SP4-Manager-Server-4-3-BYOS-EC2, but entry?
CVE-2022-28366: no packages for SUSE CaaS Platform 4.0, but entry?
CVE-2022-28366: no packages for Image SLES15-SP5-SAP-Azure-VLI-BYOS-Production, but entry?
CVE-2022-28366: no packages for Container suse/manager/5.0/x86_64/server-attestation:5.0.0-beta2.2.16, but entry?
CVE-2022-28366: no packages for Image SLES15-SP6-SAP-Azure-VLI-BYOS, but entry?
CVE-2022-28366: no packages for Image SLES15-SP5-SAP-Azure, but entry?
CVE-2022-28366: no packages for Image SLES15-SP2-SAP-Azure-VLI-BYOS-Production, but entry?
CVE-2022-28366: no packages for Image SLES15-SP6-SAPCAL-Azure, but entry?
CVE-2022-28366: no packages for Image SLES15-SP2-SAP-BYOS-EC2-HVM, but entry?
CVE-2022-28366: no packages for Image SLES15-SP2-SAP-GCE, but entry?
CVE-2022-28366: no packages for Image SLES15-SP4-SAPCAL-EC2, but entry?
CVE-2022-28366: no packages for SUSE Linux Enterprise Module for Web and Scripting 15 SP4, but entry?
CVE-2022-28366: no packages for Image SLES15-SP4-SAPCAL-Azure, but entry?
CVE-2022-28366: no packages for Image SLES15-SP5-SAPCAL-EC2, but entry?
CVE-2022-28366: no packages for Container bci/openjdk:11-7.1, but entry?
CVE-2022-28366: no packages for SUSE Linux Enterprise Server for SAP Applications 15 SP1, but entry?
CVE-2022-28366: no packages for Image SLES15-SP4-SAP-EC2, but entry?
CVE-2022-28366: no packages for SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS, but entry?
CVE-2022-28366: no packages for Container bci/kiwi:9.24.43-8.6, but entry?
CVE-2022-28366: no packages for Container bci/openjdk-devel:17-14.11, but entry?
CVE-2022-28366: no packages for Image SLES15-SP6-SAP-EC2, but entry?
CVE-2022-28366: no packages for Image SLES15-SP4-SAP-GCE, but entry?
CVE-2022-28366: no packages for Image SLES15-SP6-SAP-Azure-LI-BYOS, but entry?
CVE-2022-28366: no packages for Image SLES15-SP4-SAP-Azure-VLI-BYOS, but entry?
CVE-2022-28366: no packages for SUSE Linux Enterprise Server 15 SP4-TERADATA, but entry?
CVE-2022-28366: no packages for Image SLES15-SP2-SAP-EC2-HVM, but entry?
CVE-2022-28366: no packages for Image SLES15-SP6-SAP-Azure-VLI-BYOS-Production, but entry?
CVE-2022-28366: no packages for SUSE Manager Server Module 4.3, but entry?
CVE-2022-28366: no packages for SUSE Linux Enterprise Workstation Extension 15 SP6, but entry?
CVE-2022-28366: no packages for Image SLES15-SP3-SAP-Azure-LI-BYOS-Production, but entry?
CVE-2022-28366: no packages for Container bci/kiwi:9.24.43-8.6, but entry?
CVE-2022-28366: no packages for Container bci/openjdk-devel:11-6.2, but entry?
CVE-2022-28366: no packages for Container bci/openjdk-devel:17-14.11, but entry?
CVE-2022-28366: no packages for Container bci/openjdk-devel:17-7.2, but entry?
CVE-2022-28366: no packages for Container bci/openjdk:11-7.1, but entry?
CVE-2022-28366: no packages for Container bci/openjdk:17-7.1, but entry?
CVE-2022-28366: no packages for Container bci/openjdk:latest, but entry?
CVE-2022-28366: no packages for Container suse/manager/5.0/x86_64/server-attestation:5.0.0-beta2.2.16, but entry?
CVE-2022-28366: no packages for Container suse/manager/5.0/x86_64/server:5.0.0-beta1.2.122, but entry?
CVE-2022-28366: no packages for Image SLES15-SP2-SAP-Azure, but entry?
CVE-2022-28366: no packages for Image SLES15-SP2-SAP-Azure-LI-BYOS-Production, but entry?
CVE-2022-28366: no packages for Image SLES15-SP2-SAP-Azure-VLI-BYOS-Production, but entry?
CVE-2022-28366: no packages for Image SLES15-SP2-SAP-BYOS-Azure, but entry?
CVE-2022-28366: no packages for Image SLES15-SP2-SAP-BYOS-EC2-HVM, but entry?
CVE-2022-28366: no packages for Image SLES15-SP2-SAP-BYOS-GCE, but entry?
CVE-2022-28366: no packages for Image SLES15-SP2-SAP-EC2-HVM, but entry?
CVE-2022-28366: no packages for Image SLES15-SP2-SAP-GCE, but entry?
CVE-2022-28366: no packages for Image SLES15-SP3-SAP-Azure-LI-BYOS-Production, but entry?
CVE-2022-28366: no packages for Image SLES15-SP3-SAP-Azure-VLI-BYOS-Production, but entry?
CVE-2022-28366: no packages for Image SLES15-SP3-SAPCAL-Azure, but entry?
CVE-2022-28366: no packages for Image SLES15-SP3-SAPCAL-EC2-HVM, but entry?
CVE-2022-28366: no packages for Image SLES15-SP3-SAPCAL-GCE, but entry?
CVE-2022-28366: no packages for Image SLES15-SP4-Manager-Server-4-3, but entry?
CVE-2022-28366: no packages for Image SLES15-SP4-Manager-Server-4-3-Azure-llc, but entry?
CVE-2022-28366: no packages for Image SLES15-SP4-Manager-Server-4-3-Azure-ltd, but entry?
CVE-2022-28366: no packages for Image SLES15-SP4-Manager-Server-4-3-BYOS, but entry?
CVE-2022-28366: no packages for Image SLES15-SP4-Manager-Server-4-3-BYOS-Azure, but entry?
CVE-2022-28366: no packages for Image SLES15-SP4-Manager-Server-4-3-BYOS-EC2, but entry?
CVE-2022-28366: no packages for Image SLES15-SP4-Manager-Server-4-3-BYOS-GCE, but entry?
CVE-2022-28366: no packages for Image SLES15-SP4-Manager-Server-4-3-EC2-llc, but entry?
CVE-2022-28366: no packages for Image SLES15-SP4-Manager-Server-4-3-EC2-ltd, but entry?
CVE-2022-28366: no packages for Image SLES15-SP4-SAP, but entry?
CVE-2022-28366: no packages for Image SLES15-SP4-SAP-Azure, but entry?
CVE-2022-28366: no packages for Image SLES15-SP4-SAP-Azure-LI-BYOS, but entry?
CVE-2022-28366: no packages for Image SLES15-SP4-SAP-Azure-LI-BYOS-Production, but entry?
CVE-2022-28366: no packages for Image SLES15-SP4-SAP-Azure-VLI-BYOS, but entry?
CVE-2022-28366: no packages for Image SLES15-SP4-SAP-Azure-VLI-BYOS-Production, but entry?
CVE-2022-28366: no packages for Image SLES15-SP4-SAP-EC2, but entry?
CVE-2022-28366: no packages for Image SLES15-SP4-SAP-GCE, but entry?
CVE-2022-28366: no packages for Image SLES15-SP4-SAPCAL, but entry?
CVE-2022-28366: no packages for Image SLES15-SP4-SAPCAL-Azure, but entry?
CVE-2022-28366: no packages for Image SLES15-SP4-SAPCAL-EC2, but entry?
CVE-2022-28366: no packages for Image SLES15-SP4-SAPCAL-GCE, but entry?
CVE-2022-28366: no packages for Image SLES15-SP5-SAP-Azure, but entry?
CVE-2022-28366: no packages for Image SLES15-SP5-SAP-Azure-LI-BYOS, but entry?
CVE-2022-28366: no packages for Image SLES15-SP5-SAP-Azure-LI-BYOS-Production, but entry?
CVE-2022-28366: no packages for Image SLES15-SP5-SAP-Azure-VLI-BYOS, but entry?
CVE-2022-28366: no packages for Image SLES15-SP5-SAP-Azure-VLI-BYOS-Production, but entry?
CVE-2022-28366: no packages for Image SLES15-SP5-SAP-EC2, but entry?
CVE-2022-28366: no packages for Image SLES15-SP5-SAP-GCE, but entry?
CVE-2022-28366: no packages for Image SLES15-SP5-SAPCAL-Azure, but entry?
CVE-2022-28366: no packages for Image SLES15-SP5-SAPCAL-EC2, but entry?
CVE-2022-28366: no packages for Image SLES15-SP5-SAPCAL-GCE, but entry?
CVE-2022-28366: no packages for Image SLES15-SP6-SAP, but entry?
CVE-2022-28366: no packages for Image SLES15-SP6-SAP-Azure, but entry?
CVE-2022-28366: no packages for Image SLES15-SP6-SAP-Azure-LI-BYOS, but entry?
CVE-2022-28366: no packages for Image SLES15-SP6-SAP-Azure-LI-BYOS-Production, but entry?
CVE-2022-28366: no packages for Image SLES15-SP6-SAP-Azure-VLI-BYOS, but entry?
CVE-2022-28366: no packages for Image SLES15-SP6-SAP-Azure-VLI-BYOS-Production, but entry?
CVE-2022-28366: no packages for Image SLES15-SP6-SAP-EC2, but entry?
CVE-2022-28366: no packages for Image SLES15-SP6-SAP-GCE, but entry?
CVE-2022-28366: no packages for Image SLES15-SP6-SAPCAL, but entry?
CVE-2022-28366: no packages for Image SLES15-SP6-SAPCAL-Azure, but entry?
CVE-2022-28366: no packages for Image SLES15-SP6-SAPCAL-EC2, but entry?
CVE-2022-28366: no packages for Image SLES15-SP6-SAPCAL-GCE, but entry?
CVE-2022-28366: no packages for SUSE CaaS Platform 4.0, but entry?
CVE-2022-28366: no packages for SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS, but entry?
CVE-2022-28366: no packages for SUSE Linux Enterprise Module for Basesystem 15 SP4, but entry?
CVE-2022-28366: no packages for SUSE Linux Enterprise Module for Basesystem 15 SP5, but entry?
CVE-2022-28366: no packages for SUSE Linux Enterprise Module for Basesystem 15 SP6, but entry?
CVE-2022-28366: no packages for SUSE Linux Enterprise Module for Package Hub 15 SP4, but entry?
CVE-2022-28366: no packages for SUSE Linux Enterprise Module for Package Hub 15 SP5, but entry?
CVE-2022-28366: no packages for SUSE Linux Enterprise Module for Package Hub 15 SP6, but entry?
CVE-2022-28366: no packages for SUSE Linux Enterprise Module for Web and Scripting 15 SP4, but entry?
CVE-2022-28366: no packages for SUSE Linux Enterprise Module for Web and Scripting 15 SP5, but entry?
CVE-2022-28366: no packages for SUSE Linux Enterprise Module for Web and Scripting 15 SP6, but entry?
CVE-2022-28366: no packages for SUSE Linux Enterprise Server 15 SP1-LTSS, but entry?
CVE-2022-28366: no packages for SUSE Linux Enterprise Server 15 SP4-TERADATA, but entry?
CVE-2022-28366: no packages for SUSE Linux Enterprise Server for SAP Applications 15 SP1, but entry?
CVE-2022-28366: no packages for SUSE Linux Enterprise Workstation Extension 15 SP4, but entry?
CVE-2022-28366: no packages for SUSE Linux Enterprise Workstation Extension 15 SP5, but entry?
CVE-2022-28366: no packages for SUSE Linux Enterprise Workstation Extension 15 SP6, but entry?
CVE-2022-28366: no packages for SUSE Manager Proxy 4.2, but entry?
CVE-2022-28366: no packages for SUSE Manager Retail Branch Server 4.2, but entry?
CVE-2022-28366: no packages for SUSE Manager Server 4.2, but entry?
CVE-2022-28366: no packages for SUSE Manager Server Module 4.3, but entry?
CVE-2022-28366: no packages for Container bci/kiwi:9.24.43-8.6, but entry?
CVE-2022-28366: no packages for Container bci/openjdk-devel:11-6.2, but entry?
CVE-2022-28366: no packages for Container bci/openjdk-devel:17-14.11, but entry?
CVE-2022-28366: no packages for Container bci/openjdk-devel:17-7.2, but entry?
CVE-2022-28366: no packages for Container bci/openjdk:11-7.1, but entry?
CVE-2022-28366: no packages for Container bci/openjdk:17-7.1, but entry?
CVE-2022-28366: no packages for Container bci/openjdk:latest, but entry?
CVE-2022-28366: no packages for Container suse/manager/5.0/x86_64/server-attestation:5.0.0-beta2.2.16, but entry?
CVE-2022-28366: no packages for Container suse/manager/5.0/x86_64/server:5.0.0-beta1.2.122, but entry?
CVE-2022-28366: no packages for Image SLES15-SP2-SAP-Azure, but entry?
CVE-2022-28366: no packages for Image SLES15-SP2-SAP-Azure-LI-BYOS-Production, but entry?
CVE-2022-28366: no packages for Image SLES15-SP2-SAP-Azure-VLI-BYOS-Production, but entry?
CVE-2022-28366: no packages for Image SLES15-SP2-SAP-BYOS-Azure, but entry?
CVE-2022-28366: no packages for Image SLES15-SP2-SAP-BYOS-EC2-HVM, but entry?
CVE-2022-28366: no packages for Image SLES15-SP2-SAP-BYOS-GCE, but entry?
CVE-2022-28366: no packages for Image SLES15-SP2-SAP-EC2-HVM, but entry?
CVE-2022-28366: no packages for Image SLES15-SP2-SAP-GCE, but entry?
CVE-2022-28366: no packages for Image SLES15-SP3-SAP-Azure-LI-BYOS-Production, but entry?
CVE-2022-28366: no packages for Image SLES15-SP3-SAP-Azure-VLI-BYOS-Production, but entry?
CVE-2022-28366: no packages for Image SLES15-SP3-SAPCAL-Azure, but entry?
CVE-2022-28366: no packages for Image SLES15-SP3-SAPCAL-EC2-HVM, but entry?
CVE-2022-28366: no packages for Image SLES15-SP3-SAPCAL-GCE, but entry?
CVE-2022-28366: no packages for Image SLES15-SP4-Manager-Server-4-3, but entry?
CVE-2022-28366: no packages for Image SLES15-SP4-Manager-Server-4-3-Azure-llc, but entry?
CVE-2022-28366: no packages for Image SLES15-SP4-Manager-Server-4-3-Azure-ltd, but entry?
CVE-2022-28366: no packages for Image SLES15-SP4-Manager-Server-4-3-BYOS, but entry?
CVE-2022-28366: no packages for Image SLES15-SP4-Manager-Server-4-3-BYOS-Azure, but entry?
CVE-2022-28366: no packages for Image SLES15-SP4-Manager-Server-4-3-BYOS-EC2, but entry?
CVE-2022-28366: no packages for Image SLES15-SP4-Manager-Server-4-3-BYOS-GCE, but entry?
CVE-2022-28366: no packages for Image SLES15-SP4-Manager-Server-4-3-EC2-llc, but entry?
CVE-2022-28366: no packages for Image SLES15-SP4-Manager-Server-4-3-EC2-ltd, but entry?
CVE-2022-28366: no packages for Image SLES15-SP4-SAP, but entry?
CVE-2022-28366: no packages for Image SLES15-SP4-SAP-Azure, but entry?
CVE-2022-28366: no packages for Image SLES15-SP4-SAP-Azure-LI-BYOS, but entry?
CVE-2022-28366: no packages for Image SLES15-SP4-SAP-Azure-LI-BYOS-Production, but entry?
CVE-2022-28366: no packages for Image SLES15-SP4-SAP-Azure-VLI-BYOS, but entry?
CVE-2022-28366: no packages for Image SLES15-SP4-SAP-Azure-VLI-BYOS-Production, but entry?
CVE-2022-28366: no packages for Image SLES15-SP4-SAP-EC2, but entry?
CVE-2022-28366: no packages for Image SLES15-SP4-SAP-GCE, but entry?
CVE-2022-28366: no packages for Image SLES15-SP4-SAPCAL, but entry?
CVE-2022-28366: no packages for Image SLES15-SP4-SAPCAL-Azure, but entry?
CVE-2022-28366: no packages for Image SLES15-SP4-SAPCAL-EC2, but entry?
CVE-2022-28366: no packages for Image SLES15-SP4-SAPCAL-GCE, but entry?
CVE-2022-28366: no packages for Image SLES15-SP5-SAP-Azure, but entry?
CVE-2022-28366: no packages for Image SLES15-SP5-SAP-Azure-LI-BYOS, but entry?
CVE-2022-28366: no packages for Image SLES15-SP5-SAP-Azure-LI-BYOS-Production, but entry?
CVE-2022-28366: no packages for Image SLES15-SP5-SAP-Azure-VLI-BYOS, but entry?
CVE-2022-28366: no packages for Image SLES15-SP5-SAP-Azure-VLI-BYOS-Production, but entry?
CVE-2022-28366: no packages for Image SLES15-SP5-SAP-EC2, but entry?
CVE-2022-28366: no packages for Image SLES15-SP5-SAP-GCE, but entry?
CVE-2022-28366: no packages for Image SLES15-SP5-SAPCAL-Azure, but entry?
CVE-2022-28366: no packages for Image SLES15-SP5-SAPCAL-EC2, but entry?
CVE-2022-28366: no packages for Image SLES15-SP5-SAPCAL-GCE, but entry?
CVE-2022-28366: no packages for Image SLES15-SP6-SAP, but entry?
CVE-2022-28366: no packages for Image SLES15-SP6-SAP-Azure, but entry?
CVE-2022-28366: no packages for Image SLES15-SP6-SAP-Azure-LI-BYOS, but entry?
CVE-2022-28366: no packages for Image SLES15-SP6-SAP-Azure-LI-BYOS-Production, but entry?
CVE-2022-28366: no packages for Image SLES15-SP6-SAP-Azure-VLI-BYOS, but entry?
CVE-2022-28366: no packages for Image SLES15-SP6-SAP-Azure-VLI-BYOS-Production, but entry?
CVE-2022-28366: no packages for Image SLES15-SP6-SAP-EC2, but entry?
CVE-2022-28366: no packages for Image SLES15-SP6-SAP-GCE, but entry?
CVE-2022-28366: no packages for Image SLES15-SP6-SAPCAL, but entry?
CVE-2022-28366: no packages for Image SLES15-SP6-SAPCAL-Azure, but entry?
CVE-2022-28366: no packages for Image SLES15-SP6-SAPCAL-EC2, but entry?
CVE-2022-28366: no packages for Image SLES15-SP6-SAPCAL-GCE, but entry?
CVE-2022-28366: no packages for SUSE CaaS Platform 4.0, but entry?
CVE-2022-28366: no packages for SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS, but entry?
CVE-2022-28366: no packages for SUSE Linux Enterprise Module for Basesystem 15 SP4, but entry?
CVE-2022-28366: no packages for SUSE Linux Enterprise Module for Basesystem 15 SP5, but entry?
CVE-2022-28366: no packages for SUSE Linux Enterprise Module for Basesystem 15 SP6, but entry?
CVE-2022-28366: no packages for SUSE Linux Enterprise Module for Package Hub 15 SP4, but entry?
CVE-2022-28366: no packages for SUSE Linux Enterprise Module for Package Hub 15 SP5, but entry?
CVE-2022-28366: no packages for SUSE Linux Enterprise Module for Package Hub 15 SP6, but entry?
CVE-2022-28366: no packages for SUSE Linux Enterprise Module for Web and Scripting 15 SP4, but entry?
CVE-2022-28366: no packages for SUSE Linux Enterprise Module for Web and Scripting 15 SP5, but entry?
CVE-2022-28366: no packages for SUSE Linux Enterprise Module for Web and Scripting 15 SP6, but entry?
CVE-2022-28366: no packages for SUSE Linux Enterprise Server 15 SP1-LTSS, but entry?
CVE-2022-28366: no packages for SUSE Linux Enterprise Server 15 SP4-TERADATA, but entry?
CVE-2022-28366: no packages for SUSE Linux Enterprise Server for SAP Applications 15 SP1, but entry?
CVE-2022-28366: no packages for SUSE Linux Enterprise Workstation Extension 15 SP4, but entry?
CVE-2022-28366: no packages for SUSE Linux Enterprise Workstation Extension 15 SP5, but entry?
CVE-2022-28366: no packages for SUSE Linux Enterprise Workstation Extension 15 SP6, but entry?
CVE-2022-28366: no packages for SUSE Manager Proxy 4.2, but entry?
CVE-2022-28366: no packages for SUSE Manager Retail Branch Server 4.2, but entry?
CVE-2022-28366: no packages for SUSE Manager Server 4.2, but entry?
CVE-2022-28366: no packages for SUSE Manager Server Module 4.3, but entry?
no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2022-28356
no cpe found for SUSE Package Hub 15 SP3 in CVE-2022-28347
skipping CVE-2022-28350 as CVE page is older than CVRF-CVE file.
skipping CVE-2022-28349 as CVE page is older than CVRF-CVE file.
skipping CVE-2022-28348 as CVE page is older than CVRF-CVE file.
no cpe found for SUSE Package Hub 15 SP3 in CVE-2022-28346
no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2022-28327
skipping CVE-2022-28330 as CVE page is older than CVRF-CVE file.
no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2022-28131
skipping CVE-2022-28321 as CVE page is older than CVRF-CVE file.
skipping CVE-2022-28289 as CVE page is older than CVRF-CVE file.
skipping CVE-2022-28288 as CVE page is older than CVRF-CVE file.
skipping CVE-2022-28287 as CVE page is older than CVRF-CVE file.
skipping CVE-2022-28286 as CVE page is older than CVRF-CVE file.
skipping CVE-2022-28285 as CVE page is older than CVRF-CVE file.
skipping CVE-2022-28284 as CVE page is older than CVRF-CVE file.
skipping CVE-2022-28283 as CVE page is older than CVRF-CVE file.
skipping CVE-2022-28282 as CVE page is older than CVRF-CVE file.
skipping CVE-2022-28281 as CVE page is older than CVRF-CVE file.
skipping CVE-2022-28199 as CVE page is older than CVRF-CVE file.
no cpe found for SUSE Package Hub 15 SP3 in CVE-2022-28085
skipping CVE-2022-28066 as CVE page is older than CVRF-CVE file.
skipping CVE-2022-27950 as CVE page is older than CVRF-CVE file.
skipping CVE-2022-27943 as CVE page is older than CVRF-CVE file.
skipping CVE-2022-27780 as CVE page is older than CVRF-CVE file.
skipping CVE-2022-27779 as CVE page is older than CVRF-CVE file.
skipping CVE-2022-27778 as CVE page is older than CVRF-CVE file.
skipping CVE-2022-27777 as CVE page is older than CVRF-CVE file.
skipping CVE-2022-27776 as CVE page is older than CVRF-CVE file.
skipping CVE-2022-27775 as CVE page is older than CVRF-CVE file.
skipping CVE-2022-27774 as CVE page is older than CVRF-CVE file.
skipping CVE-2022-27672 as CVE page is older than CVRF-CVE file.
no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2022-27664
no cpe found for SUSE Manager Client Tools for RHEL, Liberty and Clones 9-CLIENT-TOOLS in CVE-2022-27664
no cpe found for SUSE Manager Tools Beta for SLE Micro 5 in CVE-2022-27664
no cpe found for SUSE Manager Tools for SLE Micro 5 in CVE-2022-27664
no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2022-27651
no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2022-27649
no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2022-27536
skipping CVE-2022-27458 as CVE page is older than CVRF-CVE file.
skipping CVE-2022-27457 as CVE page is older than CVRF-CVE file.
skipping CVE-2022-27456 as CVE page is older than CVRF-CVE file.
skipping CVE-2022-27455 as CVE page is older than CVRF-CVE file.
skipping CVE-2022-27452 as CVE page is older than CVRF-CVE file.
skipping CVE-2022-27451 as CVE page is older than CVRF-CVE file.
skipping CVE-2022-27449 as CVE page is older than CVRF-CVE file.
skipping CVE-2022-27448 as CVE page is older than CVRF-CVE file.
skipping CVE-2022-27447 as CVE page is older than CVRF-CVE file.
skipping CVE-2022-27446 as CVE page is older than CVRF-CVE file.
skipping CVE-2022-27445 as CVE page is older than CVRF-CVE file.
skipping CVE-2022-27444 as CVE page is older than CVRF-CVE file.
no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2022-27239
skipping CVE-2022-27406 as CVE page is older than CVRF-CVE file.
skipping CVE-2022-27405 as CVE page is older than CVRF-CVE file.
skipping CVE-2022-27404 as CVE page is older than CVRF-CVE file.
skipping CVE-2022-27387 as CVE page is older than CVRF-CVE file.
skipping CVE-2022-27386 as CVE page is older than CVRF-CVE file.
skipping CVE-2022-27385 as CVE page is older than CVRF-CVE file.
skipping CVE-2022-27384 as CVE page is older than CVRF-CVE file.
skipping CVE-2022-27383 as CVE page is older than CVRF-CVE file.
skipping CVE-2022-27382 as CVE page is older than CVRF-CVE file.
skipping CVE-2022-27381 as CVE page is older than CVRF-CVE file.
skipping CVE-2022-27380 as CVE page is older than CVRF-CVE file.
skipping CVE-2022-27379 as CVE page is older than CVRF-CVE file.
skipping CVE-2022-27378 as CVE page is older than CVRF-CVE file.
skipping CVE-2022-27377 as CVE page is older than CVRF-CVE file.
skipping CVE-2022-27376 as CVE page is older than CVRF-CVE file.
skipping CVE-2022-27337 as CVE page is older than CVRF-CVE file.
no cpe found for SUSE Package Hub 15 SP3 in CVE-2022-27227
no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2022-27191
no cpe found for SUSE Manager Client Tools for RHEL, Liberty and Clones 9-CLIENT-TOOLS in CVE-2022-27191
no cpe found for SUSE Manager Tools for SLE Micro 5 in CVE-2022-27191
no cpe found for SUSE Package Hub 15 SP6 in CVE-2022-27191
skipping CVE-2022-27223 as CVE page is older than CVRF-CVE file.
no cpe found for SUSE Package Hub 15 SP3 in CVE-2022-27114
skipping CVE-2022-26981 as CVE page is older than CVRF-CVE file.
skipping CVE-2022-26878 as CVE page is older than CVRF-CVE file.
skipping CVE-2022-26719 as CVE page is older than CVRF-CVE file.
skipping CVE-2022-26717 as CVE page is older than CVRF-CVE file.
skipping CVE-2022-26716 as CVE page is older than CVRF-CVE file.
skipping CVE-2022-26710 as CVE page is older than CVRF-CVE file.
skipping CVE-2022-26709 as CVE page is older than CVRF-CVE file.
skipping CVE-2022-26700 as CVE page is older than CVRF-CVE file.
skipping CVE-2022-26691 as CVE page is older than CVRF-CVE file.
no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2022-26520
no cpe found for SUSE Package Hub 15 SP3 in CVE-2022-26505
no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2022-26490
no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2022-26365
skipping CVE-2022-26488 as CVE page is older than CVRF-CVE file.
skipping CVE-2022-26486 as CVE page is older than CVRF-CVE file.
skipping CVE-2022-26485 as CVE page is older than CVRF-CVE file.
skipping CVE-2022-26387 as CVE page is older than CVRF-CVE file.
skipping CVE-2022-26386 as CVE page is older than CVRF-CVE file.
skipping CVE-2022-26385 as CVE page is older than CVRF-CVE file.
skipping CVE-2022-26384 as CVE page is older than CVRF-CVE file.
skipping CVE-2022-26383 as CVE page is older than CVRF-CVE file.
skipping CVE-2022-26382 as CVE page is older than CVRF-CVE file.
skipping CVE-2022-26381 as CVE page is older than CVRF-CVE file.
skipping CVE-2022-26377 as CVE page is older than CVRF-CVE file.
skipping CVE-2022-26373 as CVE page is older than CVRF-CVE file.
no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2022-26364
no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2022-26363
no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2022-26362
no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2022-26354
skipping CVE-2022-26353 as CVE page is older than CVRF-CVE file.
skipping CVE-2022-26280 as CVE page is older than CVRF-CVE file.
no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2022-25881
skipping CVE-2022-25857 as CVE page is older than CVRF-CVE file.
skipping CVE-2022-25762 as CVE page is older than CVRF-CVE file.
skipping CVE-2022-25647 as CVE page is older than CVRF-CVE file.
skipping CVE-2022-25636 as CVE page is older than CVRF-CVE file.
skipping CVE-2022-25634 as CVE page is older than CVRF-CVE file.
skipping CVE-2022-25375 as CVE page is older than CVRF-CVE file.
skipping CVE-2022-25368 as CVE page is older than CVRF-CVE file.
no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2022-25236
skipping CVE-2022-25315 as CVE page is older than CVRF-CVE file.
skipping CVE-2022-25314 as CVE page is older than CVRF-CVE file.
skipping CVE-2022-25313 as CVE page is older than CVRF-CVE file.
skipping CVE-2022-25310 as CVE page is older than CVRF-CVE file.
skipping CVE-2022-25309 as CVE page is older than CVRF-CVE file.
skipping CVE-2022-25308 as CVE page is older than CVRF-CVE file.
skipping CVE-2022-25265 as CVE page is older than CVRF-CVE file.
skipping CVE-2022-25258 as CVE page is older than CVRF-CVE file.
skipping CVE-2022-25255 as CVE page is older than CVRF-CVE file.
--- /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2022-25236.xml 2024-10-19 02:03:16.314454000 +0200
+++ /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2022-25236.xml.new 2024-10-29 01:43:14.257982000 +0100
@@ -14,13 +14,13 @@
1
- 256
- 2024-10-19T00:03:15Z
+ 257
+ 2024-10-29T00:43:13Z
current
2022-02-17T02:52:33Z
- 2024-10-19T00:03:15Z
+ 2024-10-29T00:43:13Z
cve-database/bin/generate-cvrf-cve.pl
2020-12-27T01:00:00Z
@@ -3225,9 +3225,6 @@
libexpat-devel-32bit-2.4.6-1.1
-
- libexpat1
-
libexpat1-2.0.1-88.42.22.1
@@ -3258,9 +3255,6 @@
libexpat1-2.5.0-2.188
-
- libexpat1-32bit
-
libexpat1-32bit-2.0.1-88.42.22.1
@@ -3489,6 +3483,24 @@
python313-x86-64-v3-3.13.0~b3-1.1
+
+ python314-3.14.0~a1-1.1
+
+
+ python314-curses-3.14.0~a1-1.1
+
+
+ python314-dbm-3.14.0~a1-1.1
+
+
+ python314-idle-3.14.0~a1-1.1
+
+
+ python314-tk-3.14.0~a1-1.1
+
+
+ python314-x86-64-v3-3.14.0~a1-1.1
+
python36-3.6.15-6.67.4
@@ -6864,6 +6876,24 @@
python313-x86-64-v3-3.13.0~b3-1.1 as a component of openSUSE Tumbleweed
+
+ python314-3.14.0~a1-1.1 as a component of openSUSE Tumbleweed
+
+
+ python314-curses-3.14.0~a1-1.1 as a component of openSUSE Tumbleweed
+
+
+ python314-dbm-3.14.0~a1-1.1 as a component of openSUSE Tumbleweed
+
+
+ python314-idle-3.14.0~a1-1.1 as a component of openSUSE Tumbleweed
+
+
+ python314-tk-3.14.0~a1-1.1 as a component of openSUSE Tumbleweed
+
+
+ python314-x86-64-v3-3.14.0~a1-1.1 as a component of openSUSE Tumbleweed
+
python38-3.8.14-1.1 as a component of openSUSE Tumbleweed
@@ -6924,12 +6954,6 @@
expat as a component of SUSE Linux Enterprise Server for SAP Applications 12 SP5
-
- libexpat1 as a component of SUSE Linux Enterprise Server for SAP Applications 12 SP5
-
-
- libexpat1-32bit as a component of SUSE Linux Enterprise Server for SAP Applications 12 SP5
-
@@ -8043,6 +8067,12 @@
openSUSE Tumbleweed:python313-idle-3.13.0~b3-1.1
openSUSE Tumbleweed:python313-tk-3.13.0~b3-1.1
openSUSE Tumbleweed:python313-x86-64-v3-3.13.0~b3-1.1
+ openSUSE Tumbleweed:python314-3.14.0~a1-1.1
+ openSUSE Tumbleweed:python314-curses-3.14.0~a1-1.1
+ openSUSE Tumbleweed:python314-dbm-3.14.0~a1-1.1
+ openSUSE Tumbleweed:python314-idle-3.14.0~a1-1.1
+ openSUSE Tumbleweed:python314-tk-3.14.0~a1-1.1
+ openSUSE Tumbleweed:python314-x86-64-v3-3.14.0~a1-1.1
openSUSE Tumbleweed:python38-3.8.14-1.1
openSUSE Tumbleweed:python38-32bit-3.8.14-1.1
openSUSE Tumbleweed:python38-curses-3.8.14-1.1
skipping CVE-2022-25235 as CVE page is older than CVRF-CVE file.
skipping CVE-2022-25147 as CVE page is older than CVRF-CVE file.
no cpe found for SUSE Package Hub 15 SP3 in CVE-2022-24976
no cpe found for SUSE Package Hub 15 SP4 in CVE-2022-24976
no cpe found for SUSE Package Hub 15 SP3 in CVE-2022-24952
no cpe found for SUSE Package Hub 15 SP4 in CVE-2022-24952
skipping CVE-2022-24958 as CVE page is older than CVRF-CVE file.
no cpe found for SUSE Package Hub 15 SP3 in CVE-2022-24951
no cpe found for SUSE Package Hub 15 SP4 in CVE-2022-24951
no cpe found for SUSE Package Hub 15 SP3 in CVE-2022-24950
no cpe found for SUSE Package Hub 15 SP4 in CVE-2022-24950
no cpe found for SUSE Package Hub 15 SP3 in CVE-2022-24949
no cpe found for SUSE Package Hub 15 SP4 in CVE-2022-24949
skipping CVE-2022-24919 as CVE page is older than CVRF-CVE file.
skipping CVE-2022-24918 as CVE page is older than CVRF-CVE file.
skipping CVE-2022-24917 as CVE page is older than CVRF-CVE file.
skipping CVE-2022-24903 as CVE page is older than CVRF-CVE file.
CVE-2022-24839: no packages for SUSE Linux Enterprise Workstation Extension 15 SP6, but entry?
CVE-2022-24839: no packages for Image SLES15-SP3-SAP-Azure-LI-BYOS-Production, but entry?
CVE-2022-24839: no packages for Image SLES15-SP6-SAP-Azure-VLI-BYOS-Production, but entry?
CVE-2022-24839: no packages for Image SLES15-SP2-SAP-EC2-HVM, but entry?
CVE-2022-24839: no packages for SUSE Manager Server Module 4.3, but entry?
CVE-2022-24839: no packages for Image SLES15-SP6-SAP-Azure-LI-BYOS, but entry?
CVE-2022-24839: no packages for Image SLES15-SP4-SAP-Azure-VLI-BYOS, but entry?
CVE-2022-24839: no packages for SUSE Linux Enterprise Server 15 SP4-TERADATA, but entry?
CVE-2022-24839: no packages for Image SLES15-SP6-SAP-EC2, but entry?
CVE-2022-24839: no packages for Image SLES15-SP4-SAP-GCE, but entry?
CVE-2022-24839: no packages for Container bci/openjdk-devel:17-14.11, but entry?
CVE-2022-24839: no packages for Container bci/openjdk:11-7.1, but entry?
CVE-2022-24839: no packages for Image SLES15-SP4-SAP-EC2, but entry?
CVE-2022-24839: no packages for SUSE Linux Enterprise Server for SAP Applications 15 SP1, but entry?
CVE-2022-24839: no packages for Container bci/kiwi:9.24.43-8.6, but entry?
CVE-2022-24839: no packages for SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS, but entry?
CVE-2022-24839: no packages for Image SLES15-SP5-SAPCAL-EC2, but entry?
CVE-2022-24839: no packages for Image SLES15-SP4-SAPCAL-Azure, but entry?
CVE-2022-24839: no packages for Image SLES15-SP4-SAPCAL-EC2, but entry?
CVE-2022-24839: no packages for SUSE Linux Enterprise Module for Web and Scripting 15 SP4, but entry?
CVE-2022-24839: no packages for Image SLES15-SP2-SAP-GCE, but entry?
CVE-2022-24839: no packages for Image SLES15-SP6-SAPCAL-Azure, but entry?
CVE-2022-24839: no packages for Image SLES15-SP2-SAP-BYOS-EC2-HVM, but entry?
CVE-2022-24839: no packages for Image SLES15-SP2-SAP-Azure-VLI-BYOS-Production, but entry?
CVE-2022-24839: no packages for Image SLES15-SP5-SAP-Azure, but entry?
CVE-2022-24839: no packages for Container suse/manager/5.0/x86_64/server-attestation:5.0.0-beta2.2.16, but entry?
CVE-2022-24839: no packages for Image SLES15-SP6-SAP-Azure-VLI-BYOS, but entry?
CVE-2022-24839: no packages for Image SLES15-SP5-SAP-Azure-VLI-BYOS-Production, but entry?
CVE-2022-24839: no packages for SUSE CaaS Platform 4.0, but entry?
CVE-2022-24839: no packages for Image SLES15-SP4-Manager-Server-4-3-BYOS-EC2, but entry?
CVE-2022-24839: no packages for Image SLES15-SP5-SAP-Azure-LI-BYOS, but entry?
CVE-2022-24839: no packages for Image SLES15-SP4-SAP-Azure-VLI-BYOS-Production, but entry?
CVE-2022-24839: no packages for Image SLES15-SP5-SAPCAL-GCE, but entry?
CVE-2022-24839: no packages for Image SLES15-SP6-SAP-Azure, but entry?
CVE-2022-24839: no packages for Container bci/openjdk-devel:11-6.2, but entry?
CVE-2022-24839: no packages for Image SLES15-SP4-Manager-Server-4-3-BYOS-GCE, but entry?
CVE-2022-24839: no packages for Image SLES15-SP6-SAPCAL-GCE, but entry?
CVE-2022-24839: no packages for Image SLES15-SP4-Manager-Server-4-3-BYOS-Azure, but entry?
CVE-2022-24839: no packages for Image SLES15-SP6-SAP-GCE, but entry?
CVE-2022-24839: no packages for SUSE Linux Enterprise Workstation Extension 15 SP5, but entry?
CVE-2022-24839: no packages for Image SLES15-SP5-SAP-GCE, but entry?
CVE-2022-24839: no packages for Image SLES15-SP5-SAPCAL-Azure, but entry?
CVE-2022-24839: no packages for Container bci/openjdk-devel:17-7.2, but entry?
CVE-2022-24839: no packages for SUSE Linux Enterprise Server 15 SP1-LTSS, but entry?
CVE-2022-24839: no packages for Image SLES15-SP2-SAP-BYOS-Azure, but entry?
CVE-2022-24839: no packages for Image SLES15-SP4-Manager-Server-4-3-Azure-ltd, but entry?
CVE-2022-24839: no packages for Image SLES15-SP5-SAP-EC2, but entry?
CVE-2022-24839: no packages for SUSE Linux Enterprise Module for Web and Scripting 15 SP5, but entry?
CVE-2022-24839: no packages for SUSE Linux Enterprise Module for Web and Scripting 15 SP6, but entry?
CVE-2022-24839: no packages for Container bci/openjdk:latest, but entry?
CVE-2022-24839: no packages for Image SLES15-SP6-SAPCAL-EC2, but entry?
CVE-2022-24839: no packages for Image SLES15-SP4-SAPCAL, but entry?
CVE-2022-24839: no packages for SUSE Linux Enterprise Module for Basesystem 15 SP4, but entry?
CVE-2022-24839: no packages for SUSE Linux Enterprise Module for Package Hub 15 SP6, but entry?
CVE-2022-24839: no packages for Image SLES15-SP2-SAP-BYOS-GCE, but entry?
CVE-2022-24839: no packages for Container bci/openjdk:17-7.1, but entry?
CVE-2022-24839: no packages for Image SLES15-SP4-Manager-Server-4-3-Azure-llc, but entry?
CVE-2022-24839: no packages for Image SLES15-SP5-SAP-Azure-VLI-BYOS, but entry?
CVE-2022-24839: no packages for Image SLES15-SP6-SAPCAL, but entry?
CVE-2022-24839: no packages for SUSE Linux Enterprise Module for Basesystem 15 SP6, but entry?
CVE-2022-24839: no packages for Image SLES15-SP5-SAP-Azure-LI-BYOS-Production, but entry?
CVE-2022-24839: no packages for Image SLES15-SP3-SAP-Azure-VLI-BYOS-Production, but entry?
CVE-2022-24839: no packages for Image SLES15-SP3-SAPCAL-Azure, but entry?
CVE-2022-24839: no packages for Image SLES15-SP4-Manager-Server-4-3-EC2-ltd, but entry?
CVE-2022-24839: no packages for Image SLES15-SP4-SAPCAL-GCE, but entry?
CVE-2022-24839: no packages for SUSE Linux Enterprise Module for Basesystem 15 SP5, but entry?
CVE-2022-24839: no packages for Image SLES15-SP2-SAP-Azure, but entry?
CVE-2022-24839: no packages for Image SLES15-SP3-SAPCAL-GCE, but entry?
CVE-2022-24839: no packages for Image SLES15-SP6-SAP, but entry?
CVE-2022-24839: no packages for Image SLES15-SP4-Manager-Server-4-3-BYOS, but entry?
CVE-2022-24839: no packages for Image SLES15-SP4-SAP-Azure-LI-BYOS, but entry?
CVE-2022-24839: no packages for Image SLES15-SP2-SAP-Azure-LI-BYOS-Production, but entry?
CVE-2022-24839: no packages for Image SLES15-SP3-SAPCAL-EC2-HVM, but entry?
CVE-2022-24839: no packages for SUSE Manager Server 4.2, but entry?
CVE-2022-24839: no packages for Image SLES15-SP4-SAP-Azure-LI-BYOS-Production, but entry?
CVE-2022-24839: no packages for Container suse/manager/5.0/x86_64/server:5.0.0-beta1.2.122, but entry?
CVE-2022-24839: no packages for SUSE Manager Proxy 4.2, but entry?
CVE-2022-24839: no packages for Image SLES15-SP4-Manager-Server-4-3-EC2-llc, but entry?
CVE-2022-24839: no packages for Image SLES15-SP4-Manager-Server-4-3, but entry?
CVE-2022-24839: no packages for Image SLES15-SP4-SAP, but entry?
CVE-2022-24839: no packages for SUSE Manager Retail Branch Server 4.2, but entry?
CVE-2022-24839: no packages for SUSE Linux Enterprise Workstation Extension 15 SP4, but entry?
CVE-2022-24839: no packages for SUSE Linux Enterprise Module for Package Hub 15 SP4, but entry?
CVE-2022-24839: no packages for Image SLES15-SP6-SAP-Azure-LI-BYOS-Production, but entry?
CVE-2022-24839: no packages for Image SLES15-SP4-SAP-Azure, but entry?
CVE-2022-24839: no packages for SUSE Linux Enterprise Module for Package Hub 15 SP5, but entry?
CVE-2022-24839: no packages for Container bci/kiwi:9.24.43-8.6, but entry?
CVE-2022-24839: no packages for Container bci/openjdk-devel:11-6.2, but entry?
CVE-2022-24839: no packages for Container bci/openjdk-devel:17-14.11, but entry?
CVE-2022-24839: no packages for Container bci/openjdk-devel:17-7.2, but entry?
CVE-2022-24839: no packages for Container bci/openjdk:11-7.1, but entry?
CVE-2022-24839: no packages for Container bci/openjdk:17-7.1, but entry?
CVE-2022-24839: no packages for Container bci/openjdk:latest, but entry?
CVE-2022-24839: no packages for Container suse/manager/5.0/x86_64/server-attestation:5.0.0-beta2.2.16, but entry?
CVE-2022-24839: no packages for Container suse/manager/5.0/x86_64/server:5.0.0-beta1.2.122, but entry?
CVE-2022-24839: no packages for Image SLES15-SP2-SAP-Azure, but entry?
CVE-2022-24839: no packages for Image SLES15-SP2-SAP-Azure-LI-BYOS-Production, but entry?
CVE-2022-24839: no packages for Image SLES15-SP2-SAP-Azure-VLI-BYOS-Production, but entry?
CVE-2022-24839: no packages for Image SLES15-SP2-SAP-BYOS-Azure, but entry?
CVE-2022-24839: no packages for Image SLES15-SP2-SAP-BYOS-EC2-HVM, but entry?
CVE-2022-24839: no packages for Image SLES15-SP2-SAP-BYOS-GCE, but entry?
CVE-2022-24839: no packages for Image SLES15-SP2-SAP-EC2-HVM, but entry?
CVE-2022-24839: no packages for Image SLES15-SP2-SAP-GCE, but entry?
CVE-2022-24839: no packages for Image SLES15-SP3-SAP-Azure-LI-BYOS-Production, but entry?
CVE-2022-24839: no packages for Image SLES15-SP3-SAP-Azure-VLI-BYOS-Production, but entry?
CVE-2022-24839: no packages for Image SLES15-SP3-SAPCAL-Azure, but entry?
CVE-2022-24839: no packages for Image SLES15-SP3-SAPCAL-EC2-HVM, but entry?
CVE-2022-24839: no packages for Image SLES15-SP3-SAPCAL-GCE, but entry?
CVE-2022-24839: no packages for Image SLES15-SP4-Manager-Server-4-3, but entry?
CVE-2022-24839: no packages for Image SLES15-SP4-Manager-Server-4-3-Azure-llc, but entry?
CVE-2022-24839: no packages for Image SLES15-SP4-Manager-Server-4-3-Azure-ltd, but entry?
CVE-2022-24839: no packages for Image SLES15-SP4-Manager-Server-4-3-BYOS, but entry?
CVE-2022-24839: no packages for Image SLES15-SP4-Manager-Server-4-3-BYOS-Azure, but entry?
CVE-2022-24839: no packages for Image SLES15-SP4-Manager-Server-4-3-BYOS-EC2, but entry?
CVE-2022-24839: no packages for Image SLES15-SP4-Manager-Server-4-3-BYOS-GCE, but entry?
CVE-2022-24839: no packages for Image SLES15-SP4-Manager-Server-4-3-EC2-llc, but entry?
CVE-2022-24839: no packages for Image SLES15-SP4-Manager-Server-4-3-EC2-ltd, but entry?
CVE-2022-24839: no packages for Image SLES15-SP4-SAP, but entry?
CVE-2022-24839: no packages for Image SLES15-SP4-SAP-Azure, but entry?
CVE-2022-24839: no packages for Image SLES15-SP4-SAP-Azure-LI-BYOS, but entry?
CVE-2022-24839: no packages for Image SLES15-SP4-SAP-Azure-LI-BYOS-Production, but entry?
CVE-2022-24839: no packages for Image SLES15-SP4-SAP-Azure-VLI-BYOS, but entry?
CVE-2022-24839: no packages for Image SLES15-SP4-SAP-Azure-VLI-BYOS-Production, but entry?
CVE-2022-24839: no packages for Image SLES15-SP4-SAP-EC2, but entry?
CVE-2022-24839: no packages for Image SLES15-SP4-SAP-GCE, but entry?
CVE-2022-24839: no packages for Image SLES15-SP4-SAPCAL, but entry?
CVE-2022-24839: no packages for Image SLES15-SP4-SAPCAL-Azure, but entry?
CVE-2022-24839: no packages for Image SLES15-SP4-SAPCAL-EC2, but entry?
CVE-2022-24839: no packages for Image SLES15-SP4-SAPCAL-GCE, but entry?
CVE-2022-24839: no packages for Image SLES15-SP5-SAP-Azure, but entry?
CVE-2022-24839: no packages for Image SLES15-SP5-SAP-Azure-LI-BYOS, but entry?
CVE-2022-24839: no packages for Image SLES15-SP5-SAP-Azure-LI-BYOS-Production, but entry?
CVE-2022-24839: no packages for Image SLES15-SP5-SAP-Azure-VLI-BYOS, but entry?
CVE-2022-24839: no packages for Image SLES15-SP5-SAP-Azure-VLI-BYOS-Production, but entry?
CVE-2022-24839: no packages for Image SLES15-SP5-SAP-EC2, but entry?
CVE-2022-24839: no packages for Image SLES15-SP5-SAP-GCE, but entry?
CVE-2022-24839: no packages for Image SLES15-SP5-SAPCAL-Azure, but entry?
CVE-2022-24839: no packages for Image SLES15-SP5-SAPCAL-EC2, but entry?
CVE-2022-24839: no packages for Image SLES15-SP5-SAPCAL-GCE, but entry?
CVE-2022-24839: no packages for Image SLES15-SP6-SAP, but entry?
CVE-2022-24839: no packages for Image SLES15-SP6-SAP-Azure, but entry?
CVE-2022-24839: no packages for Image SLES15-SP6-SAP-Azure-LI-BYOS, but entry?
CVE-2022-24839: no packages for Image SLES15-SP6-SAP-Azure-LI-BYOS-Production, but entry?
CVE-2022-24839: no packages for Image SLES15-SP6-SAP-Azure-VLI-BYOS, but entry?
CVE-2022-24839: no packages for Image SLES15-SP6-SAP-Azure-VLI-BYOS-Production, but entry?
CVE-2022-24839: no packages for Image SLES15-SP6-SAP-EC2, but entry?
CVE-2022-24839: no packages for Image SLES15-SP6-SAP-GCE, but entry?
CVE-2022-24839: no packages for Image SLES15-SP6-SAPCAL, but entry?
CVE-2022-24839: no packages for Image SLES15-SP6-SAPCAL-Azure, but entry?
CVE-2022-24839: no packages for Image SLES15-SP6-SAPCAL-EC2, but entry?
CVE-2022-24839: no packages for Image SLES15-SP6-SAPCAL-GCE, but entry?
CVE-2022-24839: no packages for SUSE CaaS Platform 4.0, but entry?
CVE-2022-24839: no packages for SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS, but entry?
CVE-2022-24839: no packages for SUSE Linux Enterprise Module for Basesystem 15 SP4, but entry?
CVE-2022-24839: no packages for SUSE Linux Enterprise Module for Basesystem 15 SP5, but entry?
CVE-2022-24839: no packages for SUSE Linux Enterprise Module for Basesystem 15 SP6, but entry?
CVE-2022-24839: no packages for SUSE Linux Enterprise Module for Package Hub 15 SP4, but entry?
CVE-2022-24839: no packages for SUSE Linux Enterprise Module for Package Hub 15 SP5, but entry?
CVE-2022-24839: no packages for SUSE Linux Enterprise Module for Package Hub 15 SP6, but entry?
CVE-2022-24839: no packages for SUSE Linux Enterprise Module for Web and Scripting 15 SP4, but entry?
CVE-2022-24839: no packages for SUSE Linux Enterprise Module for Web and Scripting 15 SP5, but entry?
CVE-2022-24839: no packages for SUSE Linux Enterprise Module for Web and Scripting 15 SP6, but entry?
CVE-2022-24839: no packages for SUSE Linux Enterprise Server 15 SP1-LTSS, but entry?
CVE-2022-24839: no packages for SUSE Linux Enterprise Server 15 SP4-TERADATA, but entry?
CVE-2022-24839: no packages for SUSE Linux Enterprise Server for SAP Applications 15 SP1, but entry?
CVE-2022-24839: no packages for SUSE Linux Enterprise Workstation Extension 15 SP4, but entry?
CVE-2022-24839: no packages for SUSE Linux Enterprise Workstation Extension 15 SP5, but entry?
CVE-2022-24839: no packages for SUSE Linux Enterprise Workstation Extension 15 SP6, but entry?
CVE-2022-24839: no packages for SUSE Manager Proxy 4.2, but entry?
CVE-2022-24839: no packages for SUSE Manager Retail Branch Server 4.2, but entry?
CVE-2022-24839: no packages for SUSE Manager Server 4.2, but entry?
CVE-2022-24839: no packages for SUSE Manager Server Module 4.3, but entry?
CVE-2022-24839: no packages for Container bci/kiwi:9.24.43-8.6, but entry?
CVE-2022-24839: no packages for Container bci/openjdk-devel:11-6.2, but entry?
CVE-2022-24839: no packages for Container bci/openjdk-devel:17-14.11, but entry?
CVE-2022-24839: no packages for Container bci/openjdk-devel:17-7.2, but entry?
CVE-2022-24839: no packages for Container bci/openjdk:11-7.1, but entry?
CVE-2022-24839: no packages for Container bci/openjdk:17-7.1, but entry?
CVE-2022-24839: no packages for Container bci/openjdk:latest, but entry?
CVE-2022-24839: no packages for Container suse/manager/5.0/x86_64/server-attestation:5.0.0-beta2.2.16, but entry?
CVE-2022-24839: no packages for Container suse/manager/5.0/x86_64/server:5.0.0-beta1.2.122, but entry?
CVE-2022-24839: no packages for Image SLES15-SP2-SAP-Azure, but entry?
CVE-2022-24839: no packages for Image SLES15-SP2-SAP-Azure-LI-BYOS-Production, but entry?
CVE-2022-24839: no packages for Image SLES15-SP2-SAP-Azure-VLI-BYOS-Production, but entry?
CVE-2022-24839: no packages for Image SLES15-SP2-SAP-BYOS-Azure, but entry?
CVE-2022-24839: no packages for Image SLES15-SP2-SAP-BYOS-EC2-HVM, but entry?
CVE-2022-24839: no packages for Image SLES15-SP2-SAP-BYOS-GCE, but entry?
CVE-2022-24839: no packages for Image SLES15-SP2-SAP-EC2-HVM, but entry?
CVE-2022-24839: no packages for Image SLES15-SP2-SAP-GCE, but entry?
CVE-2022-24839: no packages for Image SLES15-SP3-SAP-Azure-LI-BYOS-Production, but entry?
CVE-2022-24839: no packages for Image SLES15-SP3-SAP-Azure-VLI-BYOS-Production, but entry?
CVE-2022-24839: no packages for Image SLES15-SP3-SAPCAL-Azure, but entry?
CVE-2022-24839: no packages for Image SLES15-SP3-SAPCAL-EC2-HVM, but entry?
CVE-2022-24839: no packages for Image SLES15-SP3-SAPCAL-GCE, but entry?
CVE-2022-24839: no packages for Image SLES15-SP4-Manager-Server-4-3, but entry?
CVE-2022-24839: no packages for Image SLES15-SP4-Manager-Server-4-3-Azure-llc, but entry?
CVE-2022-24839: no packages for Image SLES15-SP4-Manager-Server-4-3-Azure-ltd, but entry?
CVE-2022-24839: no packages for Image SLES15-SP4-Manager-Server-4-3-BYOS, but entry?
CVE-2022-24839: no packages for Image SLES15-SP4-Manager-Server-4-3-BYOS-Azure, but entry?
CVE-2022-24839: no packages for Image SLES15-SP4-Manager-Server-4-3-BYOS-EC2, but entry?
CVE-2022-24839: no packages for Image SLES15-SP4-Manager-Server-4-3-BYOS-GCE, but entry?
CVE-2022-24839: no packages for Image SLES15-SP4-Manager-Server-4-3-EC2-llc, but entry?
CVE-2022-24839: no packages for Image SLES15-SP4-Manager-Server-4-3-EC2-ltd, but entry?
CVE-2022-24839: no packages for Image SLES15-SP4-SAP, but entry?
CVE-2022-24839: no packages for Image SLES15-SP4-SAP-Azure, but entry?
CVE-2022-24839: no packages for Image SLES15-SP4-SAP-Azure-LI-BYOS, but entry?
CVE-2022-24839: no packages for Image SLES15-SP4-SAP-Azure-LI-BYOS-Production, but entry?
CVE-2022-24839: no packages for Image SLES15-SP4-SAP-Azure-VLI-BYOS, but entry?
CVE-2022-24839: no packages for Image SLES15-SP4-SAP-Azure-VLI-BYOS-Production, but entry?
CVE-2022-24839: no packages for Image SLES15-SP4-SAP-EC2, but entry?
CVE-2022-24839: no packages for Image SLES15-SP4-SAP-GCE, but entry?
CVE-2022-24839: no packages for Image SLES15-SP4-SAPCAL, but entry?
CVE-2022-24839: no packages for Image SLES15-SP4-SAPCAL-Azure, but entry?
CVE-2022-24839: no packages for Image SLES15-SP4-SAPCAL-EC2, but entry?
CVE-2022-24839: no packages for Image SLES15-SP4-SAPCAL-GCE, but entry?
CVE-2022-24839: no packages for Image SLES15-SP5-SAP-Azure, but entry?
CVE-2022-24839: no packages for Image SLES15-SP5-SAP-Azure-LI-BYOS, but entry?
CVE-2022-24839: no packages for Image SLES15-SP5-SAP-Azure-LI-BYOS-Production, but entry?
CVE-2022-24839: no packages for Image SLES15-SP5-SAP-Azure-VLI-BYOS, but entry?
CVE-2022-24839: no packages for Image SLES15-SP5-SAP-Azure-VLI-BYOS-Production, but entry?
CVE-2022-24839: no packages for Image SLES15-SP5-SAP-EC2, but entry?
CVE-2022-24839: no packages for Image SLES15-SP5-SAP-GCE, but entry?
CVE-2022-24839: no packages for Image SLES15-SP5-SAPCAL-Azure, but entry?
CVE-2022-24839: no packages for Image SLES15-SP5-SAPCAL-EC2, but entry?
CVE-2022-24839: no packages for Image SLES15-SP5-SAPCAL-GCE, but entry?
CVE-2022-24839: no packages for Image SLES15-SP6-SAP, but entry?
CVE-2022-24839: no packages for Image SLES15-SP6-SAP-Azure, but entry?
CVE-2022-24839: no packages for Image SLES15-SP6-SAP-Azure-LI-BYOS, but entry?
CVE-2022-24839: no packages for Image SLES15-SP6-SAP-Azure-LI-BYOS-Production, but entry?
CVE-2022-24839: no packages for Image SLES15-SP6-SAP-Azure-VLI-BYOS, but entry?
CVE-2022-24839: no packages for Image SLES15-SP6-SAP-Azure-VLI-BYOS-Production, but entry?
CVE-2022-24839: no packages for Image SLES15-SP6-SAP-EC2, but entry?
CVE-2022-24839: no packages for Image SLES15-SP6-SAP-GCE, but entry?
CVE-2022-24839: no packages for Image SLES15-SP6-SAPCAL, but entry?
CVE-2022-24839: no packages for Image SLES15-SP6-SAPCAL-Azure, but entry?
CVE-2022-24839: no packages for Image SLES15-SP6-SAPCAL-EC2, but entry?
CVE-2022-24839: no packages for Image SLES15-SP6-SAPCAL-GCE, but entry?
CVE-2022-24839: no packages for SUSE CaaS Platform 4.0, but entry?
CVE-2022-24839: no packages for SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS, but entry?
CVE-2022-24839: no packages for SUSE Linux Enterprise Module for Basesystem 15 SP4, but entry?
CVE-2022-24839: no packages for SUSE Linux Enterprise Module for Basesystem 15 SP5, but entry?
CVE-2022-24839: no packages for SUSE Linux Enterprise Module for Basesystem 15 SP6, but entry?
CVE-2022-24839: no packages for SUSE Linux Enterprise Module for Package Hub 15 SP4, but entry?
CVE-2022-24839: no packages for SUSE Linux Enterprise Module for Package Hub 15 SP5, but entry?
CVE-2022-24839: no packages for SUSE Linux Enterprise Module for Package Hub 15 SP6, but entry?
CVE-2022-24839: no packages for SUSE Linux Enterprise Module for Web and Scripting 15 SP4, but entry?
CVE-2022-24839: no packages for SUSE Linux Enterprise Module for Web and Scripting 15 SP5, but entry?
CVE-2022-24839: no packages for SUSE Linux Enterprise Module for Web and Scripting 15 SP6, but entry?
CVE-2022-24839: no packages for SUSE Linux Enterprise Server 15 SP1-LTSS, but entry?
CVE-2022-24839: no packages for SUSE Linux Enterprise Server 15 SP4-TERADATA, but entry?
CVE-2022-24839: no packages for SUSE Linux Enterprise Server for SAP Applications 15 SP1, but entry?
CVE-2022-24839: no packages for SUSE Linux Enterprise Workstation Extension 15 SP4, but entry?
CVE-2022-24839: no packages for SUSE Linux Enterprise Workstation Extension 15 SP5, but entry?
CVE-2022-24839: no packages for SUSE Linux Enterprise Workstation Extension 15 SP6, but entry?
CVE-2022-24839: no packages for SUSE Manager Proxy 4.2, but entry?
CVE-2022-24839: no packages for SUSE Manager Retail Branch Server 4.2, but entry?
CVE-2022-24839: no packages for SUSE Manager Server 4.2, but entry?
CVE-2022-24839: no packages for SUSE Manager Server Module 4.3, but entry?
no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2022-24836
no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2022-24834
no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2022-24828
no cpe found for SUSE Package Hub 15 SP3 in CVE-2022-24828
no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2022-24823
no cpe found for SUSE Liberty Linux 7 LTSS in CVE-2022-24801
skipping CVE-2022-24810 as CVE page is older than CVRF-CVE file.
skipping CVE-2022-24809 as CVE page is older than CVRF-CVE file.
skipping CVE-2022-24808 as CVE page is older than CVRF-CVE file.
skipping CVE-2022-24807 as CVE page is older than CVRF-CVE file.
skipping CVE-2022-24806 as CVE page is older than CVRF-CVE file.
skipping CVE-2022-24805 as CVE page is older than CVRF-CVE file.
no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2022-24795
skipping CVE-2022-24790 as CVE page is older than CVRF-CVE file.
no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2022-24769
no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2022-24765
no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2022-24761
no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2022-24736
no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2022-24735
no cpe found for SUSE Package Hub 15 SP3 in CVE-2022-24715
no cpe found for SUSE Package Hub 15 SP3 in CVE-2022-24714
skipping CVE-2022-24713 as CVE page is older than CVRF-CVE file.
no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2022-24675
skipping CVE-2022-24599 as CVE page is older than CVRF-CVE file.
skipping CVE-2022-24407 as CVE page is older than CVRF-CVE file.
skipping CVE-2022-24349 as CVE page is older than CVRF-CVE file.
skipping CVE-2022-24302 as CVE page is older than CVRF-CVE file.
no cpe found for SUSE Package Hub 15 SP3 in CVE-2022-24191
no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2022-24130
no cpe found for SUSE Package Hub 15 SP3 in CVE-2022-24128
no cpe found for SUSE Package Hub 15 SP4 in CVE-2022-24128
skipping CVE-2022-24122 as CVE page is older than CVRF-CVE file.
skipping CVE-2022-24107 as CVE page is older than CVRF-CVE file.
skipping CVE-2022-24106 as CVE page is older than CVRF-CVE file.
skipping CVE-2022-24052 as CVE page is older than CVRF-CVE file.
skipping CVE-2022-24051 as CVE page is older than CVRF-CVE file.
skipping CVE-2022-24050 as CVE page is older than CVRF-CVE file.
skipping CVE-2022-24048 as CVE page is older than CVRF-CVE file.
skipping CVE-2022-23990 as CVE page is older than CVRF-CVE file.
no cpe found for SUSE Package Hub 15 SP3 in CVE-2022-23959
no cpe found for SUSE Package Hub 15 SP4 in CVE-2022-23959
skipping CVE-2022-23943 as CVE page is older than CVRF-CVE file.
no cpe found for SUSE Package Hub 15 SP3 in CVE-2022-23833
skipping CVE-2022-23853 as CVE page is older than CVRF-CVE file.
skipping CVE-2022-23852 as CVE page is older than CVRF-CVE file.
no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2022-23825
skipping CVE-2022-23830 as CVE page is older than CVRF-CVE file.
no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2022-23824
no cpe found for SUSE Package Hub 15 SP4 in CVE-2022-23808
skipping CVE-2022-23820 as CVE page is older than CVRF-CVE file.
skipping CVE-2022-23816 as CVE page is older than CVRF-CVE file.
no cpe found for SUSE Package Hub 15 SP1 in CVE-2022-23807
no cpe found for SUSE Package Hub 15 SP2 in CVE-2022-23807
no cpe found for SUSE Package Hub 15 SP3 in CVE-2022-23807
no cpe found for SUSE Package Hub 15 SP4 in CVE-2022-23807
no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2022-23806
no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2022-23648
no cpe found for SUSE Package Hub 15 SP3 in CVE-2022-23648
no cpe found for SUSE Package Hub 15 SP4 in CVE-2022-23648
skipping CVE-2022-23634 as CVE page is older than CVRF-CVE file.
skipping CVE-2022-23633 as CVE page is older than CVRF-CVE file.
no cpe found for SUSE Package Hub 15 SP3 in CVE-2022-23607
no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2022-23552
no cpe found for SUSE Manager Tools Beta for SLE Micro 5 in CVE-2022-23552
no cpe found for SUSE Manager Tools for SLE Micro 5 in CVE-2022-23552
no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2022-23527
skipping CVE-2022-23526 as CVE page is older than CVRF-CVE file.
skipping CVE-2022-23525 as CVE page is older than CVRF-CVE file.
skipping CVE-2022-23524 as CVE page is older than CVRF-CVE file.
skipping CVE-2022-23521 as CVE page is older than CVRF-CVE file.
skipping CVE-2022-23520 as CVE page is older than CVRF-CVE file.
skipping CVE-2022-23519 as CVE page is older than CVRF-CVE file.
skipping CVE-2022-23518 as CVE page is older than CVRF-CVE file.
skipping CVE-2022-23517 as CVE page is older than CVRF-CVE file.
skipping CVE-2022-23516 as CVE page is older than CVRF-CVE file.
skipping CVE-2022-23515 as CVE page is older than CVRF-CVE file.
skipping CVE-2022-23514 as CVE page is older than CVRF-CVE file.
no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2022-23493
skipping CVE-2022-23491 as CVE page is older than CVRF-CVE file.
no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2022-23484
no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2022-23483
no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2022-23482
no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2022-23481
no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2022-23480
no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2022-23479
no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2022-23478
no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2022-23477
no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2022-23471
no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2022-23468
no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2022-23308
skipping CVE-2022-23437 as CVE page is older than CVRF-CVE file.
no cpe found for SUSE Package Hub 15 SP2 in CVE-2022-23307
no cpe found for SUSE Package Hub 15 SP3 in CVE-2022-23307
no cpe found for SUSE Package Hub 15 SP2 in CVE-2022-23305
no cpe found for SUSE Package Hub 15 SP3 in CVE-2022-23305
no cpe found for SUSE Package Hub 15 SP2 in CVE-2022-23302
no cpe found for SUSE Package Hub 15 SP3 in CVE-2022-23302
skipping CVE-2022-23222 as CVE page is older than CVRF-CVE file.
CVE-2022-23181: no packages for Image SLES12-SP5-GCE-SAP-BYOS, but entry?
CVE-2022-23181: no packages for HPE Helion OpenStack 8, but entry?
CVE-2022-23181: no packages for Image SLES12-SP5-Azure-SAP-BYOS, but entry?
CVE-2022-23181: no packages for SUSE OpenStack Cloud Crowbar 8, but entry?
CVE-2022-23181: no packages for SUSE Linux Enterprise Software Development Kit 12 SP5, but entry?
CVE-2022-23181: no packages for Image SLES12-SP5-Azure-SAP-On-Demand, but entry?
CVE-2022-23181: no packages for Image SLES12-SP4-SAP-Azure-LI-BYOS-Production, but entry?
CVE-2022-23181: no packages for Image SLES12-SP5-GCE-SAP-On-Demand, but entry?
CVE-2022-23181: no packages for Image SLES12-SP5-SAP-Azure-LI-BYOS-Production, but entry?
CVE-2022-23181: no packages for Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production, but entry?
CVE-2022-23181: no packages for SUSE OpenStack Cloud 8, but entry?
CVE-2022-23181: no packages for Image SLES12-SP5-EC2-SAP-On-Demand, but entry?
CVE-2022-23181: no packages for Image SLES12-SP4-SAP-Azure-BYOS, but entry?
CVE-2022-23181: no packages for Image SLES12-SP5-EC2-SAP-BYOS, but entry?
CVE-2022-23181: no packages for Image SLES12-SP4-SAP-Azure-VLI-BYOS-Production, but entry?
CVE-2022-23181: no packages for HPE Helion OpenStack 8, but entry?
CVE-2022-23181: no packages for Image SLES12-SP4-SAP-Azure-BYOS, but entry?
CVE-2022-23181: no packages for Image SLES12-SP4-SAP-Azure-LI-BYOS-Production, but entry?
CVE-2022-23181: no packages for Image SLES12-SP4-SAP-Azure-VLI-BYOS-Production, but entry?
CVE-2022-23181: no packages for Image SLES12-SP5-Azure-SAP-BYOS, but entry?
CVE-2022-23181: no packages for Image SLES12-SP5-Azure-SAP-On-Demand, but entry?
CVE-2022-23181: no packages for Image SLES12-SP5-EC2-SAP-BYOS, but entry?
CVE-2022-23181: no packages for Image SLES12-SP5-EC2-SAP-On-Demand, but entry?
CVE-2022-23181: no packages for Image SLES12-SP5-GCE-SAP-BYOS, but entry?
CVE-2022-23181: no packages for Image SLES12-SP5-GCE-SAP-On-Demand, but entry?
CVE-2022-23181: no packages for Image SLES12-SP5-SAP-Azure-LI-BYOS-Production, but entry?
CVE-2022-23181: no packages for Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production, but entry?
CVE-2022-23181: no packages for SUSE Linux Enterprise Software Development Kit 12 SP5, but entry?
CVE-2022-23181: no packages for SUSE OpenStack Cloud 8, but entry?
CVE-2022-23181: no packages for SUSE OpenStack Cloud Crowbar 8, but entry?
CVE-2022-23181: no packages for HPE Helion OpenStack 8, but entry?
CVE-2022-23181: no packages for Image SLES12-SP4-SAP-Azure-BYOS, but entry?
CVE-2022-23181: no packages for Image SLES12-SP4-SAP-Azure-LI-BYOS-Production, but entry?
CVE-2022-23181: no packages for Image SLES12-SP4-SAP-Azure-VLI-BYOS-Production, but entry?
CVE-2022-23181: no packages for Image SLES12-SP5-Azure-SAP-BYOS, but entry?
CVE-2022-23181: no packages for Image SLES12-SP5-Azure-SAP-On-Demand, but entry?
CVE-2022-23181: no packages for Image SLES12-SP5-EC2-SAP-BYOS, but entry?
CVE-2022-23181: no packages for Image SLES12-SP5-EC2-SAP-On-Demand, but entry?
CVE-2022-23181: no packages for Image SLES12-SP5-GCE-SAP-BYOS, but entry?
CVE-2022-23181: no packages for Image SLES12-SP5-GCE-SAP-On-Demand, but entry?
CVE-2022-23181: no packages for Image SLES12-SP5-SAP-Azure-LI-BYOS-Production, but entry?
CVE-2022-23181: no packages for Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production, but entry?
CVE-2022-23181: no packages for SUSE Linux Enterprise Software Development Kit 12 SP5, but entry?
CVE-2022-23181: no packages for SUSE OpenStack Cloud 8, but entry?
CVE-2022-23181: no packages for SUSE OpenStack Cloud Crowbar 8, but entry?
skipping CVE-2022-23219 as CVE page is older than CVRF-CVE file.
skipping CVE-2022-23218 as CVE page is older than CVRF-CVE file.
skipping CVE-2022-23134 as CVE page is older than CVRF-CVE file.
skipping CVE-2022-23133 as CVE page is older than CVRF-CVE file.
skipping CVE-2022-23132 as CVE page is older than CVRF-CVE file.
skipping CVE-2022-23131 as CVE page is older than CVRF-CVE file.
no cpe found for SUSE Package Hub 15 SP3 in CVE-2022-23098
no cpe found for SUSE Package Hub 15 SP3 in CVE-2022-23097
no cpe found for SUSE Package Hub 15 SP3 in CVE-2022-23096
skipping CVE-2022-22967 as CVE page is older than CVRF-CVE file.
skipping CVE-2022-22941 as CVE page is older than CVRF-CVE file.
skipping CVE-2022-22936 as CVE page is older than CVRF-CVE file.
skipping CVE-2022-22935 as CVE page is older than CVRF-CVE file.
skipping CVE-2022-22934 as CVE page is older than CVRF-CVE file.
no cpe found for SUSE Package Hub 15 SP3 in CVE-2022-22818
skipping CVE-2022-22844 as CVE page is older than CVRF-CVE file.
skipping CVE-2022-22827 as CVE page is older than CVRF-CVE file.
skipping CVE-2022-22826 as CVE page is older than CVRF-CVE file.
skipping CVE-2022-22825 as CVE page is older than CVRF-CVE file.
skipping CVE-2022-22824 as CVE page is older than CVRF-CVE file.
skipping CVE-2022-22823 as CVE page is older than CVRF-CVE file.
skipping CVE-2022-22822 as CVE page is older than CVRF-CVE file.
no cpe found for SUSE Package Hub 15 SP5 in CVE-2022-22816
no cpe found for SUSE Package Hub 15 SP5 in CVE-2022-22815
skipping CVE-2022-22721 as CVE page is older than CVRF-CVE file.
no cpe found for SUSE Package Hub 15 SP3 in CVE-2022-22707
skipping CVE-2022-22719 as CVE page is older than CVRF-CVE file.
skipping CVE-2022-22677 as CVE page is older than CVRF-CVE file.
skipping CVE-2022-22662 as CVE page is older than CVRF-CVE file.
skipping CVE-2022-22637 as CVE page is older than CVRF-CVE file.
skipping CVE-2022-22629 as CVE page is older than CVRF-CVE file.
skipping CVE-2022-22628 as CVE page is older than CVRF-CVE file.
skipping CVE-2022-22624 as CVE page is older than CVRF-CVE file.
skipping CVE-2022-22620 as CVE page is older than CVRF-CVE file.
skipping CVE-2022-22075 as CVE page is older than CVRF-CVE file.
skipping CVE-2022-22058 as CVE page is older than CVRF-CVE file.
no cpe found for SUSE Package Hub 15 SP3 in CVE-2022-21950
no cpe found for SUSE Package Hub 15 SP4 in CVE-2022-21950
no cpe found for SUSE Package Hub 15 SP3 in CVE-2022-21944
no cpe found for SUSE Package Hub 15 SP3 in CVE-2022-21797
CVE-2022-21724: no packages for SUSE Manager Retail Branch Server 4.1, but entry?
CVE-2022-21724: no packages for SUSE Manager Server 4.1, but entry?
CVE-2022-21724: no packages for SUSE Manager Proxy 4.1, but entry?
CVE-2022-21724: no packages for SUSE Manager Proxy 4.1, but entry?
CVE-2022-21724: no packages for SUSE Manager Retail Branch Server 4.1, but entry?
CVE-2022-21724: no packages for SUSE Manager Server 4.1, but entry?
CVE-2022-21724: no packages for SUSE Manager Proxy 4.1, but entry?
CVE-2022-21724: no packages for SUSE Manager Retail Branch Server 4.1, but entry?
CVE-2022-21724: no packages for SUSE Manager Server 4.1, but entry?
no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2022-21716
no cpe found for SUSE Package Hub 15 SP3 in CVE-2022-21699
no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2022-21698
no cpe found for SUSE Package Hub 15 SP2 in CVE-2022-21653
no cpe found for SUSE Package Hub 15 SP3 in CVE-2022-21653
skipping CVE-2022-21628 as CVE page is older than CVRF-CVE file.
skipping CVE-2022-21626 as CVE page is older than CVRF-CVE file.
skipping CVE-2022-21624 as CVE page is older than CVRF-CVE file.
skipping CVE-2022-21619 as CVE page is older than CVRF-CVE file.
skipping CVE-2022-21618 as CVE page is older than CVRF-CVE file.
skipping CVE-2022-21597 as CVE page is older than CVRF-CVE file.
skipping CVE-2022-21595 as CVE page is older than CVRF-CVE file.
skipping CVE-2022-21549 as CVE page is older than CVRF-CVE file.
skipping CVE-2022-21541 as CVE page is older than CVRF-CVE file.
skipping CVE-2022-21540 as CVE page is older than CVRF-CVE file.
no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2022-21499
skipping CVE-2022-21505 as CVE page is older than CVRF-CVE file.
skipping CVE-2022-21504 as CVE page is older than CVRF-CVE file.
skipping CVE-2022-21496 as CVE page is older than CVRF-CVE file.
skipping CVE-2022-21476 as CVE page is older than CVRF-CVE file.
skipping CVE-2022-21449 as CVE page is older than CVRF-CVE file.
skipping CVE-2022-21443 as CVE page is older than CVRF-CVE file.
skipping CVE-2022-21434 as CVE page is older than CVRF-CVE file.
skipping CVE-2022-21426 as CVE page is older than CVRF-CVE file.
skipping CVE-2022-21385 as CVE page is older than CVRF-CVE file.
skipping CVE-2022-21366 as CVE page is older than CVRF-CVE file.
skipping CVE-2022-21365 as CVE page is older than CVRF-CVE file.
skipping CVE-2022-21360 as CVE page is older than CVRF-CVE file.
skipping CVE-2022-21349 as CVE page is older than CVRF-CVE file.
skipping CVE-2022-21341 as CVE page is older than CVRF-CVE file.
skipping CVE-2022-21340 as CVE page is older than CVRF-CVE file.
skipping CVE-2022-21305 as CVE page is older than CVRF-CVE file.
skipping CVE-2022-21299 as CVE page is older than CVRF-CVE file.
skipping CVE-2022-21296 as CVE page is older than CVRF-CVE file.
skipping CVE-2022-21294 as CVE page is older than CVRF-CVE file.
skipping CVE-2022-21293 as CVE page is older than CVRF-CVE file.
skipping CVE-2022-21291 as CVE page is older than CVRF-CVE file.
skipping CVE-2022-21283 as CVE page is older than CVRF-CVE file.
skipping CVE-2022-21282 as CVE page is older than CVRF-CVE file.
skipping CVE-2022-21277 as CVE page is older than CVRF-CVE file.
skipping CVE-2022-21248 as CVE page is older than CVRF-CVE file.
no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2022-21233
no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2022-21216
no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2022-21180
no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2022-21166
no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2022-21151
no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2022-21127
no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2022-21125
no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2022-21123
no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2022-20796
no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2022-20792
no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2022-20785
no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2022-20771
no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2022-20770
no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2022-20369
skipping CVE-2022-20572 as CVE page is older than CVRF-CVE file.
skipping CVE-2022-20567 as CVE page is older than CVRF-CVE file.
skipping CVE-2022-20421 as CVE page is older than CVRF-CVE file.
skipping CVE-2022-20382 as CVE page is older than CVRF-CVE file.
skipping CVE-2022-20371 as CVE page is older than CVRF-CVE file.
no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2022-20368
--- /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2022-20368.xml 2024-10-01 01:53:45.989069000 +0200
+++ /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2022-20368.xml.new 2024-10-29 01:45:56.656966000 +0100
@@ -14,13 +14,13 @@
1
- 109
- 2024-09-30T23:53:45Z
+ 110
+ 2024-10-29T00:45:56Z
current
2022-08-12T23:36:50Z
- 2024-09-30T23:53:45Z
+ 2024-10-29T00:45:56Z
cve-database/bin/generate-cvrf-cve.pl
2020-12-27T01:00:00Z
@@ -3397,41 +3397,41 @@
ocfs2-kmp-default-4.12.14-122.133.1 as a component of Image SLES12-SP5-EC2-SAP-On-Demand
-
- kernel-default-4.12.14-122.133.1 as a component of Image SLES12-SP5-GCE-BYOS
+
+ kernel-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-BYOS
kernel-default-4.12.14-122.133.1 as a component of Image SLES12-SP5-GCE-On-Demand
-
- cluster-md-kmp-default-4.12.14-122.133.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+ cluster-md-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
-
- dlm-kmp-default-4.12.14-122.133.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+ dlm-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
-
- gfs2-kmp-default-4.12.14-122.133.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+ gfs2-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
-
- kernel-default-4.12.14-122.133.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+ kernel-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
-
- ocfs2-kmp-default-4.12.14-122.133.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+ ocfs2-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
-
- cluster-md-kmp-default-4.12.14-122.133.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
+ cluster-md-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
-
- dlm-kmp-default-4.12.14-122.133.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
+ dlm-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
-
- gfs2-kmp-default-4.12.14-122.133.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
+ gfs2-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
-
- kernel-default-4.12.14-122.133.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
+ kernel-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
-
- ocfs2-kmp-default-4.12.14-122.133.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
+ ocfs2-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
cluster-md-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-SAP-Azure-LI-BYOS-Production
@@ -6907,18 +6907,18 @@
Image SLES12-SP5-EC2-SAP-On-Demand:gfs2-kmp-default-4.12.14-122.133.1
Image SLES12-SP5-EC2-SAP-On-Demand:kernel-default-4.12.14-122.133.1
Image SLES12-SP5-EC2-SAP-On-Demand:ocfs2-kmp-default-4.12.14-122.133.1
- Image SLES12-SP5-GCE-BYOS:kernel-default-4.12.14-122.133.1
+ Image SLES12-SP5-GCE-BYOS:kernel-default-4.12.14-122.225.1
Image SLES12-SP5-GCE-On-Demand:kernel-default-4.12.14-122.133.1
- Image SLES12-SP5-GCE-SAP-BYOS:cluster-md-kmp-default-4.12.14-122.133.1
- Image SLES12-SP5-GCE-SAP-BYOS:dlm-kmp-default-4.12.14-122.133.1
- Image SLES12-SP5-GCE-SAP-BYOS:gfs2-kmp-default-4.12.14-122.133.1
- Image SLES12-SP5-GCE-SAP-BYOS:kernel-default-4.12.14-122.133.1
- Image SLES12-SP5-GCE-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.133.1
- Image SLES12-SP5-GCE-SAP-On-Demand:cluster-md-kmp-default-4.12.14-122.133.1
- Image SLES12-SP5-GCE-SAP-On-Demand:dlm-kmp-default-4.12.14-122.133.1
- Image SLES12-SP5-GCE-SAP-On-Demand:gfs2-kmp-default-4.12.14-122.133.1
- Image SLES12-SP5-GCE-SAP-On-Demand:kernel-default-4.12.14-122.133.1
- Image SLES12-SP5-GCE-SAP-On-Demand:ocfs2-kmp-default-4.12.14-122.133.1
+ Image SLES12-SP5-GCE-SAP-BYOS:cluster-md-kmp-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-BYOS:dlm-kmp-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-BYOS:gfs2-kmp-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-BYOS:kernel-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:cluster-md-kmp-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:dlm-kmp-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:gfs2-kmp-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:kernel-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:ocfs2-kmp-default-4.12.14-122.225.1
Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:cluster-md-kmp-default-4.12.14-122.225.1
Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:dlm-kmp-default-4.12.14-122.225.1
Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:gfs2-kmp-default-4.12.14-122.225.1
no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2022-20154
skipping CVE-2022-20158 as CVE page is older than CVRF-CVE file.
skipping CVE-2022-20153 as CVE page is older than CVRF-CVE file.
skipping CVE-2022-20148 as CVE page is older than CVRF-CVE file.
no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2022-20132
skipping CVE-2022-20119 as CVE page is older than CVRF-CVE file.
skipping CVE-2022-20118 as CVE page is older than CVRF-CVE file.
skipping CVE-2022-20117 as CVE page is older than CVRF-CVE file.
skipping CVE-2022-20009 as CVE page is older than CVRF-CVE file.
no cpe found for SUSE Package Hub 15 SP3 in CVE-2022-20001
no entry found for CVE-2022-6083 / /home/securitybot/prod/cve-database/cvelist/2022/6xxxx/CVE-2022-6083.json:No such file or directory
No V5 entry found for CVE-2022-6083 / /home/securitybot/prod/cve-database/cvelistV5/cves/2022/6xxxx/CVE-2022-6083.json:No such file or directory
no cpe found for SUSE Package Hub 15 SP3 in CVE-2022-6083
no cpe found for SUSE Package Hub 15 SP4 in CVE-2022-6083
no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2022-4904
no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2022-4900
no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2022-4899
skipping CVE-2022-4883 as CVE page is older than CVRF-CVE file.
skipping CVE-2022-4842 as CVE page is older than CVRF-CVE file.
skipping CVE-2022-4744 as CVE page is older than CVRF-CVE file.
skipping CVE-2022-4743 as CVE page is older than CVRF-CVE file.
skipping CVE-2022-4696 as CVE page is older than CVRF-CVE file.
skipping CVE-2022-4662 as CVE page is older than CVRF-CVE file.
skipping CVE-2022-4645 as CVE page is older than CVRF-CVE file.
no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2022-4515
skipping CVE-2022-4543 as CVE page is older than CVRF-CVE file.
no cpe found for SUSE Package Hub 15 SP3 in CVE-2022-4440
no cpe found for SUSE Package Hub 15 SP4 in CVE-2022-4440
no cpe found for openSUSE Leap 15.5 NonFree in CVE-2022-4440
skipping CVE-2022-4450 as CVE page is older than CVRF-CVE file.
no cpe found for SUSE Package Hub 15 SP3 in CVE-2022-4439
no cpe found for SUSE Package Hub 15 SP4 in CVE-2022-4439
no cpe found for openSUSE Leap 15.5 NonFree in CVE-2022-4439
no cpe found for SUSE Package Hub 15 SP3 in CVE-2022-4438
no cpe found for SUSE Package Hub 15 SP4 in CVE-2022-4438
no cpe found for openSUSE Leap 15.5 NonFree in CVE-2022-4438
no cpe found for SUSE Package Hub 15 SP3 in CVE-2022-4437
no cpe found for SUSE Package Hub 15 SP4 in CVE-2022-4437
no cpe found for openSUSE Leap 15.5 NonFree in CVE-2022-4437
no cpe found for SUSE Package Hub 15 SP3 in CVE-2022-4436
no cpe found for SUSE Package Hub 15 SP4 in CVE-2022-4436
no cpe found for openSUSE Leap 15.5 NonFree in CVE-2022-4436
skipping CVE-2022-4415 as CVE page is older than CVRF-CVE file.
no cpe found for SUSE Linux Enterprise Server 15 SP3-BCL in CVE-2022-4378
no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2022-4378
skipping CVE-2022-4382 as CVE page is older than CVRF-CVE file.
skipping CVE-2022-4379 as CVE page is older than CVRF-CVE file.
skipping CVE-2022-4345 as CVE page is older than CVRF-CVE file.
skipping CVE-2022-4344 as CVE page is older than CVRF-CVE file.
skipping CVE-2022-4338 as CVE page is older than CVRF-CVE file.
skipping CVE-2022-4337 as CVE page is older than CVRF-CVE file.
skipping CVE-2022-4304 as CVE page is older than CVRF-CVE file.
no cpe found for SUSE Package Hub 15 SP3 in CVE-2022-4262
no cpe found for SUSE Package Hub 15 SP4 in CVE-2022-4262
no cpe found for openSUSE Leap 15.5 NonFree in CVE-2022-4262
skipping CVE-2022-4293 as CVE page is older than CVRF-CVE file.
skipping CVE-2022-4292 as CVE page is older than CVRF-CVE file.
skipping CVE-2022-4285 as CVE page is older than CVRF-CVE file.
skipping CVE-2022-4283 as CVE page is older than CVRF-CVE file.
skipping CVE-2022-4269 as CVE page is older than CVRF-CVE file.
skipping CVE-2022-4254 as CVE page is older than CVRF-CVE file.
skipping CVE-2022-4203 as CVE page is older than CVRF-CVE file.
no cpe found for SUSE Package Hub 15 SP3 in CVE-2022-4195
no cpe found for SUSE Package Hub 15 SP4 in CVE-2022-4195
no cpe found for SUSE Package Hub 15 SP3 in CVE-2022-4194
no cpe found for SUSE Package Hub 15 SP4 in CVE-2022-4194
no cpe found for SUSE Package Hub 15 SP3 in CVE-2022-4193
no cpe found for SUSE Package Hub 15 SP4 in CVE-2022-4193
no cpe found for SUSE Package Hub 15 SP3 in CVE-2022-4192
no cpe found for SUSE Package Hub 15 SP4 in CVE-2022-4192
no cpe found for SUSE Package Hub 15 SP3 in CVE-2022-4191
no cpe found for SUSE Package Hub 15 SP4 in CVE-2022-4191
no cpe found for SUSE Package Hub 15 SP3 in CVE-2022-4190
no cpe found for SUSE Package Hub 15 SP4 in CVE-2022-4190
no cpe found for SUSE Package Hub 15 SP3 in CVE-2022-4189
no cpe found for SUSE Package Hub 15 SP4 in CVE-2022-4189
no cpe found for SUSE Package Hub 15 SP3 in CVE-2022-4188
no cpe found for SUSE Package Hub 15 SP4 in CVE-2022-4188
no cpe found for SUSE Package Hub 15 SP3 in CVE-2022-4187
no cpe found for SUSE Package Hub 15 SP4 in CVE-2022-4187
no cpe found for SUSE Package Hub 15 SP3 in CVE-2022-4186
no cpe found for SUSE Package Hub 15 SP4 in CVE-2022-4186
no cpe found for SUSE Package Hub 15 SP3 in CVE-2022-4185
no cpe found for SUSE Package Hub 15 SP4 in CVE-2022-4185
no cpe found for SUSE Package Hub 15 SP3 in CVE-2022-4184
no cpe found for SUSE Package Hub 15 SP4 in CVE-2022-4184
no cpe found for SUSE Package Hub 15 SP3 in CVE-2022-4183
no cpe found for SUSE Package Hub 15 SP4 in CVE-2022-4183
no cpe found for SUSE Package Hub 15 SP3 in CVE-2022-4182
no cpe found for SUSE Package Hub 15 SP4 in CVE-2022-4182
no cpe found for SUSE Package Hub 15 SP3 in CVE-2022-4181
no cpe found for SUSE Package Hub 15 SP4 in CVE-2022-4181
no cpe found for SUSE Package Hub 15 SP3 in CVE-2022-4180
no cpe found for SUSE Package Hub 15 SP4 in CVE-2022-4180
no cpe found for SUSE Package Hub 15 SP3 in CVE-2022-4179
no cpe found for SUSE Package Hub 15 SP4 in CVE-2022-4179
no cpe found for SUSE Package Hub 15 SP3 in CVE-2022-4178
no cpe found for SUSE Package Hub 15 SP4 in CVE-2022-4178
no cpe found for SUSE Package Hub 15 SP3 in CVE-2022-4177
no cpe found for SUSE Package Hub 15 SP4 in CVE-2022-4177
no cpe found for SUSE Package Hub 15 SP3 in CVE-2022-4176
no cpe found for SUSE Package Hub 15 SP4 in CVE-2022-4176
no cpe found for SUSE Package Hub 15 SP3 in CVE-2022-4175
no cpe found for SUSE Package Hub 15 SP4 in CVE-2022-4175
no cpe found for SUSE Package Hub 15 SP3 in CVE-2022-4174
no cpe found for SUSE Package Hub 15 SP4 in CVE-2022-4174
no cpe found for SUSE Package Hub 15 SP4 in CVE-2022-4170
no cpe found for SUSE Package Hub 15 SP5 in CVE-2022-4170
skipping CVE-2022-4172 as CVE page is older than CVRF-CVE file.
no cpe found for SUSE Package Hub 15 SP3 in CVE-2022-4135
no cpe found for SUSE Package Hub 15 SP4 in CVE-2022-4135
skipping CVE-2022-4144 as CVE page is older than CVRF-CVE file.
skipping CVE-2022-4141 as CVE page is older than CVRF-CVE file.
skipping CVE-2022-4139 as CVE page is older than CVRF-CVE file.
skipping CVE-2022-4132 as CVE page is older than CVRF-CVE file.
skipping CVE-2022-4129 as CVE page is older than CVRF-CVE file.
skipping CVE-2022-4128 as CVE page is older than CVRF-CVE file.
skipping CVE-2022-4127 as CVE page is older than CVRF-CVE file.
no cpe found for SUSE Linux Enterprise Server 15 SP3-BCL in CVE-2022-4095
no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2022-4095
no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2022-4065
no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2022-3970
skipping CVE-2022-3996 as CVE page is older than CVRF-CVE file.
skipping CVE-2022-3977 as CVE page is older than CVRF-CVE file.
no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2022-3964
skipping CVE-2022-3953 as CVE page is older than CVRF-CVE file.
no cpe found for SUSE Package Hub 15 SP3 in CVE-2022-3890
no cpe found for SUSE Package Hub 15 SP4 in CVE-2022-3890
skipping CVE-2022-3924 as CVE page is older than CVRF-CVE file.
skipping CVE-2022-3910 as CVE page is older than CVRF-CVE file.
skipping CVE-2022-3903 as CVE page is older than CVRF-CVE file.
no cpe found for SUSE Package Hub 15 SP3 in CVE-2022-3889
no cpe found for SUSE Package Hub 15 SP4 in CVE-2022-3889
no cpe found for openSUSE Leap 15.5 NonFree in CVE-2022-3889
no cpe found for SUSE Package Hub 15 SP3 in CVE-2022-3888
no cpe found for SUSE Package Hub 15 SP4 in CVE-2022-3888
no cpe found for openSUSE Leap 15.5 NonFree in CVE-2022-3888
no cpe found for SUSE Package Hub 15 SP3 in CVE-2022-3887
no cpe found for SUSE Package Hub 15 SP4 in CVE-2022-3887
no cpe found for openSUSE Leap 15.5 NonFree in CVE-2022-3887
no cpe found for SUSE Package Hub 15 SP3 in CVE-2022-3886
no cpe found for SUSE Package Hub 15 SP4 in CVE-2022-3886
no cpe found for openSUSE Leap 15.5 NonFree in CVE-2022-3886
no cpe found for SUSE Package Hub 15 SP3 in CVE-2022-3885
no cpe found for SUSE Package Hub 15 SP4 in CVE-2022-3885
no cpe found for openSUSE Leap 15.5 NonFree in CVE-2022-3885
no cpe found for SUSE Package Hub 15 SP3 in CVE-2022-3723
no cpe found for SUSE Package Hub 15 SP4 in CVE-2022-3723
no cpe found for openSUSE Leap 15.5 NonFree in CVE-2022-3723
skipping CVE-2022-3872 as CVE page is older than CVRF-CVE file.
skipping CVE-2022-3857 as CVE page is older than CVRF-CVE file.
skipping CVE-2022-3854 as CVE page is older than CVRF-CVE file.
skipping CVE-2022-3821 as CVE page is older than CVRF-CVE file.
skipping CVE-2022-3787 as CVE page is older than CVRF-CVE file.
skipping CVE-2022-3786 as CVE page is older than CVRF-CVE file.
skipping CVE-2022-3775 as CVE page is older than CVRF-CVE file.
skipping CVE-2022-3757 as CVE page is older than CVRF-CVE file.
skipping CVE-2022-3756 as CVE page is older than CVRF-CVE file.
skipping CVE-2022-3755 as CVE page is older than CVRF-CVE file.
skipping CVE-2022-3736 as CVE page is older than CVRF-CVE file.
skipping CVE-2022-3725 as CVE page is older than CVRF-CVE file.
skipping CVE-2022-3724 as CVE page is older than CVRF-CVE file.
skipping CVE-2022-3719 as CVE page is older than CVRF-CVE file.
skipping CVE-2022-3718 as CVE page is older than CVRF-CVE file.
skipping CVE-2022-3717 as CVE page is older than CVRF-CVE file.
skipping CVE-2022-3715 as CVE page is older than CVRF-CVE file.
skipping CVE-2022-3707 as CVE page is older than CVRF-CVE file.
skipping CVE-2022-3705 as CVE page is older than CVRF-CVE file.
no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2022-3676
no cpe found for SUSE Package Hub 15 SP3 in CVE-2022-3661
no cpe found for SUSE Package Hub 15 SP4 in CVE-2022-3661
no cpe found for SUSE Package Hub 15 SP3 in CVE-2022-3660
no cpe found for SUSE Package Hub 15 SP4 in CVE-2022-3660
no cpe found for SUSE Package Hub 15 SP3 in CVE-2022-3659
no cpe found for SUSE Package Hub 15 SP4 in CVE-2022-3659
no cpe found for SUSE Package Hub 15 SP3 in CVE-2022-3658
no cpe found for SUSE Package Hub 15 SP4 in CVE-2022-3658
no cpe found for SUSE Package Hub 15 SP3 in CVE-2022-3657
no cpe found for SUSE Package Hub 15 SP4 in CVE-2022-3657
no cpe found for SUSE Package Hub 15 SP3 in CVE-2022-3656
no cpe found for SUSE Package Hub 15 SP4 in CVE-2022-3656
no cpe found for SUSE Package Hub 15 SP3 in CVE-2022-3655
no cpe found for SUSE Package Hub 15 SP4 in CVE-2022-3655
no cpe found for SUSE Package Hub 15 SP3 in CVE-2022-3654
no cpe found for SUSE Package Hub 15 SP4 in CVE-2022-3654
no cpe found for SUSE Package Hub 15 SP3 in CVE-2022-3653
no cpe found for SUSE Package Hub 15 SP4 in CVE-2022-3653
no cpe found for SUSE Package Hub 15 SP3 in CVE-2022-3652
no cpe found for SUSE Package Hub 15 SP4 in CVE-2022-3652
no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2022-3647
skipping CVE-2022-3650 as CVE page is older than CVRF-CVE file.
skipping CVE-2022-3649 as CVE page is older than CVRF-CVE file.
no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2022-3646
skipping CVE-2022-3643 as CVE page is older than CVRF-CVE file.
skipping CVE-2022-3642 as CVE page is older than CVRF-CVE file.
skipping CVE-2022-3640 as CVE page is older than CVRF-CVE file.
no cpe found for SUSE Linux Enterprise Server 15 SP3-BCL in CVE-2022-3635
no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2022-3635
skipping CVE-2022-3637 as CVE page is older than CVRF-CVE file.
skipping CVE-2022-3636 as CVE page is older than CVRF-CVE file.
no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2022-3629
skipping CVE-2022-3633 as CVE page is older than CVRF-CVE file.
skipping CVE-2022-3630 as CVE page is older than CVRF-CVE file.
skipping CVE-2022-3628 as CVE page is older than CVRF-CVE file.
skipping CVE-2022-3627 as CVE page is older than CVRF-CVE file.
skipping CVE-2022-3626 as CVE page is older than CVRF-CVE file.
skipping CVE-2022-3625 as CVE page is older than CVRF-CVE file.
skipping CVE-2022-3624 as CVE page is older than CVRF-CVE file.
skipping CVE-2022-3623 as CVE page is older than CVRF-CVE file.
skipping CVE-2022-3621 as CVE page is older than CVRF-CVE file.
skipping CVE-2022-3619 as CVE page is older than CVRF-CVE file.
skipping CVE-2022-3606 as CVE page is older than CVRF-CVE file.
skipping CVE-2022-3602 as CVE page is older than CVRF-CVE file.
skipping CVE-2022-3599 as CVE page is older than CVRF-CVE file.
skipping CVE-2022-3598 as CVE page is older than CVRF-CVE file.
skipping CVE-2022-3597 as CVE page is older than CVRF-CVE file.
skipping CVE-2022-3595 as CVE page is older than CVRF-CVE file.
skipping CVE-2022-3594 as CVE page is older than CVRF-CVE file.
no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2022-3586
skipping CVE-2022-3592 as CVE page is older than CVRF-CVE file.
skipping CVE-2022-3591 as CVE page is older than CVRF-CVE file.
no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2022-3566
skipping CVE-2022-3577 as CVE page is older than CVRF-CVE file.
skipping CVE-2022-3570 as CVE page is older than CVRF-CVE file.
skipping CVE-2022-3567 as CVE page is older than CVRF-CVE file.
no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2022-3565
no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2022-3564
no cpe found for SUSE Liberty Linux 7 LTSS in CVE-2022-3560
no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2022-3560
skipping CVE-2022-3563 as CVE page is older than CVRF-CVE file.
no cpe found for SUSE Package Hub 15 SP3 in CVE-2022-3559
no cpe found for SUSE Package Hub 15 SP4 in CVE-2022-3559
no cpe found for SUSE Package Hub 15 SP5 in CVE-2022-3559
no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2022-3550
skipping CVE-2022-3555 as CVE page is older than CVRF-CVE file.
skipping CVE-2022-3554 as CVE page is older than CVRF-CVE file.
skipping CVE-2022-3553 as CVE page is older than CVRF-CVE file.
skipping CVE-2022-3551 as CVE page is older than CVRF-CVE file.
no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2022-3545
no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2022-3535
skipping CVE-2022-3544 as CVE page is older than CVRF-CVE file.
skipping CVE-2022-3543 as CVE page is older than CVRF-CVE file.
skipping CVE-2022-3542 as CVE page is older than CVRF-CVE file.
skipping CVE-2022-3541 as CVE page is older than CVRF-CVE file.
skipping CVE-2022-3534 as CVE page is older than CVRF-CVE file.
skipping CVE-2022-3533 as CVE page is older than CVRF-CVE file.
skipping CVE-2022-3532 as CVE page is older than CVRF-CVE file.
skipping CVE-2022-3531 as CVE page is older than CVRF-CVE file.
skipping CVE-2022-3526 as CVE page is older than CVRF-CVE file.
skipping CVE-2022-3524 as CVE page is older than CVRF-CVE file.
skipping CVE-2022-3523 as CVE page is older than CVRF-CVE file.
skipping CVE-2022-3522 as CVE page is older than CVRF-CVE file.
skipping CVE-2022-3521 as CVE page is older than CVRF-CVE file.
skipping CVE-2022-3520 as CVE page is older than CVRF-CVE file.
skipping CVE-2022-3515 as CVE page is older than CVRF-CVE file.
no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2022-3500
skipping CVE-2022-3491 as CVE page is older than CVRF-CVE file.
skipping CVE-2022-3488 as CVE page is older than CVRF-CVE file.
skipping CVE-2022-3479 as CVE page is older than CVRF-CVE file.
no cpe found for SUSE Package Hub 15 SP3 in CVE-2022-3450
no cpe found for SUSE Package Hub 15 SP4 in CVE-2022-3450
no cpe found for openSUSE Leap 15.5 NonFree in CVE-2022-3450
no cpe found for SUSE Package Hub 15 SP3 in CVE-2022-3449
no cpe found for SUSE Package Hub 15 SP4 in CVE-2022-3449
no cpe found for openSUSE Leap 15.5 NonFree in CVE-2022-3449
no cpe found for SUSE Package Hub 15 SP3 in CVE-2022-3448
no cpe found for SUSE Package Hub 15 SP4 in CVE-2022-3448
no cpe found for openSUSE Leap 15.5 NonFree in CVE-2022-3448
no cpe found for SUSE Package Hub 15 SP3 in CVE-2022-3447
no cpe found for SUSE Package Hub 15 SP4 in CVE-2022-3447
no cpe found for openSUSE Leap 15.5 NonFree in CVE-2022-3447
no cpe found for SUSE Package Hub 15 SP3 in CVE-2022-3446
no cpe found for SUSE Package Hub 15 SP4 in CVE-2022-3446
no cpe found for openSUSE Leap 15.5 NonFree in CVE-2022-3446
no cpe found for SUSE Package Hub 15 SP3 in CVE-2022-3445
no cpe found for SUSE Package Hub 15 SP4 in CVE-2022-3445
no cpe found for openSUSE Leap 15.5 NonFree in CVE-2022-3445
no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2022-3437
no cpe found for SUSE Package Hub 15 SP3 in CVE-2022-3437
no cpe found for SUSE Package Hub 15 SP4 in CVE-2022-3437
skipping CVE-2022-3435 as CVE page is older than CVRF-CVE file.
no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2022-3424
no cpe found for SUSE Package Hub 15 SP3 in CVE-2022-3373
no cpe found for SUSE Package Hub 15 SP4 in CVE-2022-3373
no cpe found for SUSE Package Hub 15 SP3 in CVE-2022-3370
no cpe found for SUSE Package Hub 15 SP4 in CVE-2022-3370
no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2022-3341
skipping CVE-2022-3358 as CVE page is older than CVRF-CVE file.
skipping CVE-2022-3352 as CVE page is older than CVRF-CVE file.
skipping CVE-2022-3344 as CVE page is older than CVRF-CVE file.
no cpe found for SUSE Package Hub 15 SP3 in CVE-2022-3318
no cpe found for SUSE Package Hub 15 SP4 in CVE-2022-3318
skipping CVE-2022-3324 as CVE page is older than CVRF-CVE file.
no cpe found for SUSE Package Hub 15 SP3 in CVE-2022-3317
no cpe found for SUSE Package Hub 15 SP4 in CVE-2022-3317
no cpe found for SUSE Package Hub 15 SP3 in CVE-2022-3316
no cpe found for SUSE Package Hub 15 SP4 in CVE-2022-3316
no cpe found for SUSE Package Hub 15 SP3 in CVE-2022-3315
no cpe found for SUSE Package Hub 15 SP4 in CVE-2022-3315
no cpe found for SUSE Package Hub 15 SP3 in CVE-2022-3314
no cpe found for SUSE Package Hub 15 SP4 in CVE-2022-3314
no cpe found for SUSE Package Hub 15 SP3 in CVE-2022-3313
no cpe found for SUSE Package Hub 15 SP4 in CVE-2022-3313
no cpe found for SUSE Package Hub 15 SP3 in CVE-2022-3312
no cpe found for SUSE Package Hub 15 SP4 in CVE-2022-3312
no cpe found for SUSE Package Hub 15 SP3 in CVE-2022-3311
no cpe found for SUSE Package Hub 15 SP4 in CVE-2022-3311
no cpe found for SUSE Package Hub 15 SP3 in CVE-2022-3310
no cpe found for SUSE Package Hub 15 SP4 in CVE-2022-3310
no cpe found for SUSE Package Hub 15 SP3 in CVE-2022-3309
no cpe found for SUSE Package Hub 15 SP4 in CVE-2022-3309
no cpe found for SUSE Package Hub 15 SP3 in CVE-2022-3308
no cpe found for SUSE Package Hub 15 SP4 in CVE-2022-3308
no cpe found for SUSE Package Hub 15 SP3 in CVE-2022-3307
no cpe found for SUSE Package Hub 15 SP4 in CVE-2022-3307
no cpe found for SUSE Package Hub 15 SP3 in CVE-2022-3306
no cpe found for SUSE Package Hub 15 SP4 in CVE-2022-3306
no cpe found for SUSE Package Hub 15 SP3 in CVE-2022-3305
no cpe found for SUSE Package Hub 15 SP4 in CVE-2022-3305
no cpe found for SUSE Package Hub 15 SP3 in CVE-2022-3304
no cpe found for SUSE Package Hub 15 SP4 in CVE-2022-3304
no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2022-3303
no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2022-3294
skipping CVE-2022-3297 as CVE page is older than CVRF-CVE file.
skipping CVE-2022-3296 as CVE page is older than CVRF-CVE file.
skipping CVE-2022-3278 as CVE page is older than CVRF-CVE file.
no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2022-3239
skipping CVE-2022-3256 as CVE page is older than CVRF-CVE file.
no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2022-3204
skipping CVE-2022-3238 as CVE page is older than CVRF-CVE file.
skipping CVE-2022-3235 as CVE page is older than CVRF-CVE file.
skipping CVE-2022-3234 as CVE page is older than CVRF-CVE file.
skipping CVE-2022-3219 as CVE page is older than CVRF-CVE file.
skipping CVE-2022-3213 as CVE page is older than CVRF-CVE file.
no cpe found for SUSE Package Hub 15 SP3 in CVE-2022-3201
no cpe found for SUSE Package Hub 15 SP4 in CVE-2022-3201
no cpe found for openSUSE Leap 15.5 NonFree in CVE-2022-3201
skipping CVE-2022-3202 as CVE page is older than CVRF-CVE file.
no cpe found for SUSE Package Hub 15 SP3 in CVE-2022-3200
no cpe found for SUSE Package Hub 15 SP4 in CVE-2022-3200
no cpe found for openSUSE Leap 15.5 NonFree in CVE-2022-3200
no cpe found for SUSE Package Hub 15 SP3 in CVE-2022-3199
no cpe found for SUSE Package Hub 15 SP4 in CVE-2022-3199
no cpe found for openSUSE Leap 15.5 NonFree in CVE-2022-3199
no cpe found for SUSE Package Hub 15 SP3 in CVE-2022-3198
no cpe found for SUSE Package Hub 15 SP4 in CVE-2022-3198
no cpe found for openSUSE Leap 15.5 NonFree in CVE-2022-3198
no cpe found for SUSE Package Hub 15 SP3 in CVE-2022-3197
no cpe found for SUSE Package Hub 15 SP4 in CVE-2022-3197
no cpe found for openSUSE Leap 15.5 NonFree in CVE-2022-3197
no cpe found for SUSE Package Hub 15 SP3 in CVE-2022-3196
no cpe found for SUSE Package Hub 15 SP4 in CVE-2022-3196
no cpe found for openSUSE Leap 15.5 NonFree in CVE-2022-3196
no cpe found for SUSE Package Hub 15 SP3 in CVE-2022-3195
no cpe found for SUSE Package Hub 15 SP4 in CVE-2022-3195
skipping CVE-2022-3190 as CVE page is older than CVRF-CVE file.
skipping CVE-2022-3176 as CVE page is older than CVRF-CVE file.
no cpe found for SUSE Linux Enterprise Installer Updates 15 SP1 in CVE-2022-3171
no cpe found for SUSE Linux Enterprise Installer Updates 15 SP2 in CVE-2022-3171
no cpe found for SUSE Linux Enterprise Installer Updates 15 SP1 in CVE-2022-3171
no cpe found for SUSE Linux Enterprise Installer Updates 15 SP2 in CVE-2022-3171
no cpe found for SUSE Linux Enterprise Installer Updates 15 SP1 in CVE-2022-3171
no cpe found for SUSE Linux Enterprise Installer Updates 15 SP2 in CVE-2022-3171
no cpe found for SUSE Linux Enterprise Installer Updates 15 SP1 in CVE-2022-3171
no cpe found for SUSE Linux Enterprise Installer Updates 15 SP2 in CVE-2022-3171
no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2022-3171
no cpe found for SUSE Linux Enterprise Installer Updates 15 SP1 in CVE-2022-3171
no cpe found for SUSE Linux Enterprise Installer Updates 15 SP2 in CVE-2022-3171
no cpe found for SUSE Linux Enterprise Installer Updates 15 SP1 in CVE-2022-3171
no cpe found for SUSE Linux Enterprise Installer Updates 15 SP2 in CVE-2022-3171
no cpe found for SUSE Linux Enterprise Installer Updates 15 SP1 in CVE-2022-3171
no cpe found for SUSE Linux Enterprise Installer Updates 15 SP2 in CVE-2022-3171
no cpe found for SUSE Linux Enterprise Installer Updates 15 SP1 in CVE-2022-3171
no cpe found for SUSE Linux Enterprise Installer Updates 15 SP2 in CVE-2022-3171
no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2022-3162
skipping CVE-2022-3170 as CVE page is older than CVRF-CVE file.
skipping CVE-2022-3169 as CVE page is older than CVRF-CVE file.
skipping CVE-2022-3165 as CVE page is older than CVRF-CVE file.
skipping CVE-2022-3155 as CVE page is older than CVRF-CVE file.
skipping CVE-2022-3153 as CVE page is older than CVRF-CVE file.
skipping CVE-2022-3134 as CVE page is older than CVRF-CVE file.
no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2022-3109
skipping CVE-2022-3115 as CVE page is older than CVRF-CVE file.
skipping CVE-2022-3114 as CVE page is older than CVRF-CVE file.
skipping CVE-2022-3113 as CVE page is older than CVRF-CVE file.
skipping CVE-2022-3112 as CVE page is older than CVRF-CVE file.
skipping CVE-2022-3111 as CVE page is older than CVRF-CVE file.
skipping CVE-2022-3110 as CVE page is older than CVRF-CVE file.
No V5 entry found for CVE-2022-3102 / /home/securitybot/prod/cve-database/cvelistV5/cves/2022/3xxxx/CVE-2022-3102.json:No such file or directory
skipping CVE-2022-3108 as CVE page is older than CVRF-CVE file.
skipping CVE-2022-3107 as CVE page is older than CVRF-CVE file.
skipping CVE-2022-3106 as CVE page is older than CVRF-CVE file.
skipping CVE-2022-3105 as CVE page is older than CVRF-CVE file.
skipping CVE-2022-3104 as CVE page is older than CVRF-CVE file.
skipping CVE-2022-3103 as CVE page is older than CVRF-CVE file.
no cpe found for SUSE Package Hub 15 SP3 in CVE-2022-3075
no cpe found for SUSE Package Hub 15 SP4 in CVE-2022-3075
no cpe found for openSUSE Leap 15.5 NonFree in CVE-2022-3075
skipping CVE-2022-3099 as CVE page is older than CVRF-CVE file.
skipping CVE-2022-3094 as CVE page is older than CVRF-CVE file.
skipping CVE-2022-3080 as CVE page is older than CVRF-CVE file.
skipping CVE-2022-3078 as CVE page is older than CVRF-CVE file.
skipping CVE-2022-3077 as CVE page is older than CVRF-CVE file.
no cpe found for SUSE Package Hub 15 SP3 in CVE-2022-3071
no cpe found for SUSE Package Hub 15 SP4 in CVE-2022-3071
no cpe found for SUSE Package Hub 15 SP3 in CVE-2022-3058
no cpe found for SUSE Package Hub 15 SP4 in CVE-2022-3058
skipping CVE-2022-3061 as CVE page is older than CVRF-CVE file.
no cpe found for SUSE Package Hub 15 SP3 in CVE-2022-3057
no cpe found for SUSE Package Hub 15 SP4 in CVE-2022-3057
no cpe found for SUSE Package Hub 15 SP3 in CVE-2022-3056
no cpe found for SUSE Package Hub 15 SP4 in CVE-2022-3056
no cpe found for SUSE Package Hub 15 SP3 in CVE-2022-3055
no cpe found for SUSE Package Hub 15 SP4 in CVE-2022-3055
no cpe found for SUSE Package Hub 15 SP3 in CVE-2022-3054
no cpe found for SUSE Package Hub 15 SP4 in CVE-2022-3054
no cpe found for SUSE Package Hub 15 SP3 in CVE-2022-3053
no cpe found for SUSE Package Hub 15 SP4 in CVE-2022-3053
no cpe found for SUSE Package Hub 15 SP3 in CVE-2022-3052
no cpe found for SUSE Package Hub 15 SP4 in CVE-2022-3052
no cpe found for SUSE Package Hub 15 SP3 in CVE-2022-3051
no cpe found for SUSE Package Hub 15 SP4 in CVE-2022-3051
no cpe found for SUSE Package Hub 15 SP3 in CVE-2022-3050
no cpe found for SUSE Package Hub 15 SP4 in CVE-2022-3050
no cpe found for SUSE Package Hub 15 SP3 in CVE-2022-3049
no cpe found for SUSE Package Hub 15 SP4 in CVE-2022-3049
no cpe found for SUSE Package Hub 15 SP3 in CVE-2022-3048
no cpe found for SUSE Package Hub 15 SP4 in CVE-2022-3048
no cpe found for SUSE Package Hub 15 SP3 in CVE-2022-3047
no cpe found for SUSE Package Hub 15 SP4 in CVE-2022-3047
no cpe found for SUSE Package Hub 15 SP3 in CVE-2022-3046
no cpe found for SUSE Package Hub 15 SP4 in CVE-2022-3046
no cpe found for SUSE Package Hub 15 SP3 in CVE-2022-3045
no cpe found for SUSE Package Hub 15 SP4 in CVE-2022-3045
no cpe found for SUSE Package Hub 15 SP3 in CVE-2022-3044
no cpe found for SUSE Package Hub 15 SP4 in CVE-2022-3044
no cpe found for SUSE Package Hub 15 SP3 in CVE-2022-3043
no cpe found for SUSE Package Hub 15 SP4 in CVE-2022-3043
no cpe found for SUSE Package Hub 15 SP3 in CVE-2022-3042
no cpe found for SUSE Package Hub 15 SP4 in CVE-2022-3042
no cpe found for SUSE Package Hub 15 SP3 in CVE-2022-3041
no cpe found for SUSE Package Hub 15 SP4 in CVE-2022-3041
no cpe found for SUSE Package Hub 15 SP3 in CVE-2022-3040
no cpe found for SUSE Package Hub 15 SP4 in CVE-2022-3040
no cpe found for SUSE Package Hub 15 SP3 in CVE-2022-3039
no cpe found for SUSE Package Hub 15 SP4 in CVE-2022-3039
no cpe found for SUSE Package Hub 15 SP3 in CVE-2022-3038
no cpe found for SUSE Package Hub 15 SP4 in CVE-2022-3038
skipping CVE-2022-3037 as CVE page is older than CVRF-CVE file.
no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2022-3028
skipping CVE-2022-3016 as CVE page is older than CVRF-CVE file.
no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2022-2990
no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2022-2989
no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2022-2977
skipping CVE-2022-2982 as CVE page is older than CVRF-CVE file.
skipping CVE-2022-2980 as CVE page is older than CVRF-CVE file.
skipping CVE-2022-2978 as CVE page is older than CVRF-CVE file.
no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2022-2964
--- /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2022-2964.xml 2024-10-22 03:04:00.023606000 +0200
+++ /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2022-2964.xml.new 2024-10-29 01:47:33.806886000 +0100
@@ -14,13 +14,13 @@
1
- 97
- 2024-10-22T01:03:59Z
+ 98
+ 2024-10-29T00:47:33Z
current
2022-08-24T23:41:28Z
- 2024-10-22T01:03:59Z
+ 2024-10-29T00:47:33Z
cve-database/bin/generate-cvrf-cve.pl
2020-12-27T01:00:00Z
@@ -3133,41 +3133,41 @@
ocfs2-kmp-default-4.12.14-122.139.1 as a component of Image SLES12-SP5-EC2-SAP-On-Demand
-
- kernel-default-4.12.14-122.139.1 as a component of Image SLES12-SP5-GCE-BYOS
+
+ kernel-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-BYOS
kernel-default-4.12.14-122.139.1 as a component of Image SLES12-SP5-GCE-On-Demand
-
- cluster-md-kmp-default-4.12.14-122.139.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+ cluster-md-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
-
- dlm-kmp-default-4.12.14-122.139.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+ dlm-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
-
- gfs2-kmp-default-4.12.14-122.139.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+ gfs2-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
-
- kernel-default-4.12.14-122.139.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+ kernel-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
-
- ocfs2-kmp-default-4.12.14-122.139.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+ ocfs2-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
-
- cluster-md-kmp-default-4.12.14-122.139.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
+ cluster-md-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
-
- dlm-kmp-default-4.12.14-122.139.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
+ dlm-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
-
- gfs2-kmp-default-4.12.14-122.139.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
+ gfs2-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
-
- kernel-default-4.12.14-122.139.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
+ kernel-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
-
- ocfs2-kmp-default-4.12.14-122.139.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
+ ocfs2-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
cluster-md-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-SAP-Azure-LI-BYOS-Production
@@ -6660,18 +6660,18 @@
Image SLES12-SP5-EC2-SAP-On-Demand:gfs2-kmp-default-4.12.14-122.139.1
Image SLES12-SP5-EC2-SAP-On-Demand:kernel-default-4.12.14-122.139.1
Image SLES12-SP5-EC2-SAP-On-Demand:ocfs2-kmp-default-4.12.14-122.139.1
- Image SLES12-SP5-GCE-BYOS:kernel-default-4.12.14-122.139.1
+ Image SLES12-SP5-GCE-BYOS:kernel-default-4.12.14-122.225.1
Image SLES12-SP5-GCE-On-Demand:kernel-default-4.12.14-122.139.1
- Image SLES12-SP5-GCE-SAP-BYOS:cluster-md-kmp-default-4.12.14-122.139.1
- Image SLES12-SP5-GCE-SAP-BYOS:dlm-kmp-default-4.12.14-122.139.1
- Image SLES12-SP5-GCE-SAP-BYOS:gfs2-kmp-default-4.12.14-122.139.1
- Image SLES12-SP5-GCE-SAP-BYOS:kernel-default-4.12.14-122.139.1
- Image SLES12-SP5-GCE-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.139.1
- Image SLES12-SP5-GCE-SAP-On-Demand:cluster-md-kmp-default-4.12.14-122.139.1
- Image SLES12-SP5-GCE-SAP-On-Demand:dlm-kmp-default-4.12.14-122.139.1
- Image SLES12-SP5-GCE-SAP-On-Demand:gfs2-kmp-default-4.12.14-122.139.1
- Image SLES12-SP5-GCE-SAP-On-Demand:kernel-default-4.12.14-122.139.1
- Image SLES12-SP5-GCE-SAP-On-Demand:ocfs2-kmp-default-4.12.14-122.139.1
+ Image SLES12-SP5-GCE-SAP-BYOS:cluster-md-kmp-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-BYOS:dlm-kmp-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-BYOS:gfs2-kmp-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-BYOS:kernel-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:cluster-md-kmp-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:dlm-kmp-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:gfs2-kmp-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:kernel-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:ocfs2-kmp-default-4.12.14-122.225.1
Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:cluster-md-kmp-default-4.12.14-122.225.1
Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:dlm-kmp-default-4.12.14-122.225.1
Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:gfs2-kmp-default-4.12.14-122.225.1
no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2022-2880
skipping CVE-2022-2963 as CVE page is older than CVRF-CVE file.
skipping CVE-2022-2962 as CVE page is older than CVRF-CVE file.
skipping CVE-2022-2961 as CVE page is older than CVRF-CVE file.
skipping CVE-2022-2959 as CVE page is older than CVRF-CVE file.
skipping CVE-2022-2953 as CVE page is older than CVRF-CVE file.
skipping CVE-2022-2946 as CVE page is older than CVRF-CVE file.
skipping CVE-2022-2938 as CVE page is older than CVRF-CVE file.
skipping CVE-2022-2929 as CVE page is older than CVRF-CVE file.
skipping CVE-2022-2928 as CVE page is older than CVRF-CVE file.
skipping CVE-2022-2923 as CVE page is older than CVRF-CVE file.
skipping CVE-2022-2906 as CVE page is older than CVRF-CVE file.
skipping CVE-2022-2905 as CVE page is older than CVRF-CVE file.
skipping CVE-2022-2889 as CVE page is older than CVRF-CVE file.
skipping CVE-2022-2881 as CVE page is older than CVRF-CVE file.
no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2022-2879
no cpe found for SUSE Package Hub 15 SP3 in CVE-2022-2861
no cpe found for SUSE Package Hub 15 SP4 in CVE-2022-2861
skipping CVE-2022-2874 as CVE page is older than CVRF-CVE file.
skipping CVE-2022-2873 as CVE page is older than CVRF-CVE file.
skipping CVE-2022-2869 as CVE page is older than CVRF-CVE file.
skipping CVE-2022-2868 as CVE page is older than CVRF-CVE file.
skipping CVE-2022-2867 as CVE page is older than CVRF-CVE file.
skipping CVE-2022-2862 as CVE page is older than CVRF-CVE file.
no cpe found for SUSE Package Hub 15 SP3 in CVE-2022-2860
no cpe found for SUSE Package Hub 15 SP4 in CVE-2022-2860
no cpe found for SUSE Package Hub 15 SP3 in CVE-2022-2859
no cpe found for SUSE Package Hub 15 SP4 in CVE-2022-2859
no cpe found for SUSE Package Hub 15 SP3 in CVE-2022-2858
no cpe found for SUSE Package Hub 15 SP4 in CVE-2022-2858
no cpe found for SUSE Package Hub 15 SP3 in CVE-2022-2857
no cpe found for SUSE Package Hub 15 SP4 in CVE-2022-2857
no cpe found for SUSE Package Hub 15 SP3 in CVE-2022-2856
no cpe found for SUSE Package Hub 15 SP4 in CVE-2022-2856
no cpe found for SUSE Package Hub 15 SP3 in CVE-2022-2855
no cpe found for SUSE Package Hub 15 SP4 in CVE-2022-2855
no cpe found for SUSE Package Hub 15 SP3 in CVE-2022-2854
no cpe found for SUSE Package Hub 15 SP4 in CVE-2022-2854
no cpe found for SUSE Package Hub 15 SP3 in CVE-2022-2853
no cpe found for SUSE Package Hub 15 SP4 in CVE-2022-2853
no cpe found for SUSE Package Hub 15 SP3 in CVE-2022-2852
no cpe found for SUSE Package Hub 15 SP4 in CVE-2022-2852
no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2022-2850
skipping CVE-2022-2849 as CVE page is older than CVRF-CVE file.
skipping CVE-2022-2845 as CVE page is older than CVRF-CVE file.
skipping CVE-2022-2819 as CVE page is older than CVRF-CVE file.
skipping CVE-2022-2817 as CVE page is older than CVRF-CVE file.
skipping CVE-2022-2816 as CVE page is older than CVRF-CVE file.
skipping CVE-2022-2795 as CVE page is older than CVRF-CVE file.
skipping CVE-2022-2785 as CVE page is older than CVRF-CVE file.
no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2022-2663
skipping CVE-2022-2719 as CVE page is older than CVRF-CVE file.
no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2022-2639
no cpe found for SUSE Package Hub 15 SP3 in CVE-2022-2624
no cpe found for SUSE Package Hub 15 SP4 in CVE-2022-2624
skipping CVE-2022-2625 as CVE page is older than CVRF-CVE file.
no cpe found for SUSE Package Hub 15 SP3 in CVE-2022-2623
no cpe found for SUSE Package Hub 15 SP4 in CVE-2022-2623
no cpe found for SUSE Package Hub 15 SP3 in CVE-2022-2622
no cpe found for SUSE Package Hub 15 SP4 in CVE-2022-2622
no cpe found for SUSE Package Hub 15 SP3 in CVE-2022-2621
no cpe found for SUSE Package Hub 15 SP4 in CVE-2022-2621
no cpe found for SUSE Package Hub 15 SP3 in CVE-2022-2620
no cpe found for SUSE Package Hub 15 SP4 in CVE-2022-2620
no cpe found for SUSE Package Hub 15 SP3 in CVE-2022-2619
no cpe found for SUSE Package Hub 15 SP4 in CVE-2022-2619
no cpe found for SUSE Package Hub 15 SP3 in CVE-2022-2618
no cpe found for SUSE Package Hub 15 SP4 in CVE-2022-2618
no cpe found for SUSE Package Hub 15 SP3 in CVE-2022-2617
no cpe found for SUSE Package Hub 15 SP4 in CVE-2022-2617
no cpe found for SUSE Package Hub 15 SP3 in CVE-2022-2616
no cpe found for SUSE Package Hub 15 SP4 in CVE-2022-2616
no cpe found for SUSE Package Hub 15 SP3 in CVE-2022-2615
no cpe found for SUSE Package Hub 15 SP4 in CVE-2022-2615
no cpe found for SUSE Package Hub 15 SP3 in CVE-2022-2614
no cpe found for SUSE Package Hub 15 SP4 in CVE-2022-2614
no cpe found for SUSE Package Hub 15 SP3 in CVE-2022-2613
no cpe found for SUSE Package Hub 15 SP4 in CVE-2022-2613
no cpe found for SUSE Package Hub 15 SP3 in CVE-2022-2612
no cpe found for SUSE Package Hub 15 SP4 in CVE-2022-2612
no cpe found for SUSE Package Hub 15 SP3 in CVE-2022-2611
no cpe found for SUSE Package Hub 15 SP4 in CVE-2022-2611
no cpe found for SUSE Package Hub 15 SP3 in CVE-2022-2610
no cpe found for SUSE Package Hub 15 SP4 in CVE-2022-2610
no cpe found for SUSE Package Hub 15 SP3 in CVE-2022-2609
no cpe found for SUSE Package Hub 15 SP4 in CVE-2022-2609
no cpe found for SUSE Package Hub 15 SP3 in CVE-2022-2608
no cpe found for SUSE Package Hub 15 SP4 in CVE-2022-2608
no cpe found for SUSE Package Hub 15 SP3 in CVE-2022-2607
no cpe found for SUSE Package Hub 15 SP4 in CVE-2022-2607
no cpe found for SUSE Package Hub 15 SP3 in CVE-2022-2606
no cpe found for SUSE Package Hub 15 SP4 in CVE-2022-2606
no cpe found for SUSE Package Hub 15 SP3 in CVE-2022-2605
no cpe found for SUSE Package Hub 15 SP4 in CVE-2022-2605
no cpe found for SUSE Package Hub 15 SP3 in CVE-2022-2604
no cpe found for SUSE Package Hub 15 SP4 in CVE-2022-2604
no cpe found for SUSE Package Hub 15 SP3 in CVE-2022-2603
no cpe found for SUSE Package Hub 15 SP4 in CVE-2022-2603
skipping CVE-2022-2602 as CVE page is older than CVRF-CVE file.
skipping CVE-2022-2601 as CVE page is older than CVRF-CVE file.
skipping CVE-2022-2598 as CVE page is older than CVRF-CVE file.
no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2022-2588
skipping CVE-2022-2590 as CVE page is older than CVRF-CVE file.
skipping CVE-2022-2586 as CVE page is older than CVRF-CVE file.
skipping CVE-2022-2585 as CVE page is older than CVRF-CVE file.
skipping CVE-2022-2581 as CVE page is older than CVRF-CVE file.
skipping CVE-2022-2580 as CVE page is older than CVRF-CVE file.
skipping CVE-2022-2571 as CVE page is older than CVRF-CVE file.
skipping CVE-2022-2526 as CVE page is older than CVRF-CVE file.
skipping CVE-2022-2522 as CVE page is older than CVRF-CVE file.
skipping CVE-2022-2521 as CVE page is older than CVRF-CVE file.
skipping CVE-2022-2520 as CVE page is older than CVRF-CVE file.
skipping CVE-2022-2519 as CVE page is older than CVRF-CVE file.
skipping CVE-2022-2509 as CVE page is older than CVRF-CVE file.
skipping CVE-2022-2505 as CVE page is older than CVRF-CVE file.
no cpe found for SUSE Package Hub 15 SP3 in CVE-2022-2481
no cpe found for SUSE Package Hub 15 SP4 in CVE-2022-2481
no cpe found for SUSE Package Hub 15 SP3 in CVE-2022-2480
no cpe found for SUSE Package Hub 15 SP4 in CVE-2022-2480
no cpe found for SUSE Package Hub 15 SP3 in CVE-2022-2479
no cpe found for SUSE Package Hub 15 SP4 in CVE-2022-2479
no cpe found for SUSE Package Hub 15 SP3 in CVE-2022-2478
no cpe found for SUSE Package Hub 15 SP4 in CVE-2022-2478
no cpe found for SUSE Package Hub 15 SP3 in CVE-2022-2477
no cpe found for SUSE Package Hub 15 SP4 in CVE-2022-2477
skipping CVE-2022-2476 as CVE page is older than CVRF-CVE file.
skipping CVE-2022-2469 as CVE page is older than CVRF-CVE file.
no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2022-2385
skipping CVE-2022-2380 as CVE page is older than CVRF-CVE file.
no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2022-2318
skipping CVE-2022-2345 as CVE page is older than CVRF-CVE file.
skipping CVE-2022-2344 as CVE page is older than CVRF-CVE file.
skipping CVE-2022-2343 as CVE page is older than CVRF-CVE file.
skipping CVE-2022-2327 as CVE page is older than CVRF-CVE file.
skipping CVE-2022-2320 as CVE page is older than CVRF-CVE file.
skipping CVE-2022-2319 as CVE page is older than CVRF-CVE file.
no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2022-2309
no cpe found for SUSE Package Hub 15 SP3 in CVE-2022-2301
no cpe found for SUSE Package Hub 15 SP4 in CVE-2022-2301
skipping CVE-2022-2308 as CVE page is older than CVRF-CVE file.
skipping CVE-2022-2304 as CVE page is older than CVRF-CVE file.
no cpe found for SUSE Package Hub 15 SP3 in CVE-2022-2296
no cpe found for SUSE Package Hub 15 SP4 in CVE-2022-2296
no cpe found for SUSE Package Hub 15 SP3 in CVE-2022-2295
no cpe found for SUSE Package Hub 15 SP4 in CVE-2022-2295
no cpe found for SUSE Package Hub 15 SP3 in CVE-2022-2294
no cpe found for SUSE Package Hub 15 SP4 in CVE-2022-2294
skipping CVE-2022-2289 as CVE page is older than CVRF-CVE file.
skipping CVE-2022-2288 as CVE page is older than CVRF-CVE file.
skipping CVE-2022-2287 as CVE page is older than CVRF-CVE file.
skipping CVE-2022-2286 as CVE page is older than CVRF-CVE file.
skipping CVE-2022-2285 as CVE page is older than CVRF-CVE file.
skipping CVE-2022-2284 as CVE page is older than CVRF-CVE file.
skipping CVE-2022-2274 as CVE page is older than CVRF-CVE file.
skipping CVE-2022-2264 as CVE page is older than CVRF-CVE file.
skipping CVE-2022-2257 as CVE page is older than CVRF-CVE file.
skipping CVE-2022-2255 as CVE page is older than CVRF-CVE file.
skipping CVE-2022-2231 as CVE page is older than CVRF-CVE file.
skipping CVE-2022-2211 as CVE page is older than CVRF-CVE file.
skipping CVE-2022-2210 as CVE page is older than CVRF-CVE file.
skipping CVE-2022-2209 as CVE page is older than CVRF-CVE file.
skipping CVE-2022-2208 as CVE page is older than CVRF-CVE file.
skipping CVE-2022-2207 as CVE page is older than CVRF-CVE file.
skipping CVE-2022-2206 as CVE page is older than CVRF-CVE file.
skipping CVE-2022-2200 as CVE page is older than CVRF-CVE file.
skipping CVE-2022-2196 as CVE page is older than CVRF-CVE file.
no cpe found for SUSE Package Hub 15 SP3 in CVE-2022-2165
no cpe found for SUSE Package Hub 15 SP4 in CVE-2022-2165
skipping CVE-2022-2183 as CVE page is older than CVRF-CVE file.
skipping CVE-2022-2182 as CVE page is older than CVRF-CVE file.
skipping CVE-2022-2175 as CVE page is older than CVRF-CVE file.
no cpe found for SUSE Package Hub 15 SP3 in CVE-2022-2164
no cpe found for SUSE Package Hub 15 SP4 in CVE-2022-2164
no cpe found for SUSE Package Hub 15 SP3 in CVE-2022-2163
no cpe found for SUSE Package Hub 15 SP4 in CVE-2022-2163
no cpe found for SUSE Package Hub 15 SP3 in CVE-2022-2162
no cpe found for SUSE Package Hub 15 SP4 in CVE-2022-2162
no cpe found for SUSE Package Hub 15 SP3 in CVE-2022-2161
no cpe found for SUSE Package Hub 15 SP4 in CVE-2022-2161
no cpe found for SUSE Package Hub 15 SP3 in CVE-2022-2160
no cpe found for SUSE Package Hub 15 SP4 in CVE-2022-2160
no cpe found for SUSE Package Hub 15 SP3 in CVE-2022-2158
no cpe found for SUSE Package Hub 15 SP4 in CVE-2022-2158
no cpe found for SUSE Package Hub 15 SP3 in CVE-2022-2157
no cpe found for SUSE Package Hub 15 SP4 in CVE-2022-2157
no cpe found for SUSE Package Hub 15 SP3 in CVE-2022-2156
no cpe found for SUSE Package Hub 15 SP4 in CVE-2022-2156
no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2022-2127
skipping CVE-2022-2153 as CVE page is older than CVRF-CVE file.
skipping CVE-2022-2132 as CVE page is older than CVRF-CVE file.
skipping CVE-2022-2129 as CVE page is older than CVRF-CVE file.
no cpe found for SUSE Package Hub 15 SP4 in CVE-2022-2121
skipping CVE-2022-2126 as CVE page is older than CVRF-CVE file.
skipping CVE-2022-2125 as CVE page is older than CVRF-CVE file.
skipping CVE-2022-2124 as CVE page is older than CVRF-CVE file.
skipping CVE-2022-2122 as CVE page is older than CVRF-CVE file.
no cpe found for SUSE Package Hub 15 SP3 in CVE-2022-2120
no cpe found for SUSE Package Hub 15 SP4 in CVE-2022-2120
no cpe found for SUSE Package Hub 15 SP3 in CVE-2022-2119
no cpe found for SUSE Package Hub 15 SP4 in CVE-2022-2119
no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2022-2084
skipping CVE-2022-2097 as CVE page is older than CVRF-CVE file.
skipping CVE-2022-2085 as CVE page is older than CVRF-CVE file.
no cpe found for SUSE Package Hub 15 SP4 in CVE-2022-2061
skipping CVE-2022-2078 as CVE page is older than CVRF-CVE file.
skipping CVE-2022-2068 as CVE page is older than CVRF-CVE file.
skipping CVE-2022-2058 as CVE page is older than CVRF-CVE file.
skipping CVE-2022-2057 as CVE page is older than CVRF-CVE file.
skipping CVE-2022-2056 as CVE page is older than CVRF-CVE file.
CVE-2022-2048: no packages for SUSE Manager Server Module 4.2, but entry?
CVE-2022-2048: no packages for Image SLES15-SP4-Manager-Server-4-3-BYOS-EC2, but entry?
CVE-2022-2048: no packages for Image SLES15-SP5-SAP-Azure-LI-BYOS, but entry?
CVE-2022-2048: no packages for Image SLES15-SP4-SAP-Azure-VLI-BYOS-Production, but entry?
CVE-2022-2048: no packages for Image SLES15-SP5-SAPCAL-GCE, but entry?
CVE-2022-2048: no packages for Image SLES15-SP6-SAP-Azure, but entry?
CVE-2022-2048: no packages for Container bci/openjdk-devel:11-6.2, but entry?
CVE-2022-2048: no packages for Image SLES15-SP4-Manager-Server-4-3-BYOS-GCE, but entry?
CVE-2022-2048: no packages for Image SLES15-SP6-SAPCAL-GCE, but entry?
CVE-2022-2048: no packages for Image SLES15-SP4-Manager-Server-4-3-BYOS-Azure, but entry?
CVE-2022-2048: no packages for Image SLES15-SP6-SAP-GCE, but entry?
CVE-2022-2048: no packages for Image SLES15-SP3-Manager-4-2-Server-BYOS-EC2-HVM, but entry?
CVE-2022-2048: no packages for SUSE Linux Enterprise Workstation Extension 15 SP5, but entry?
CVE-2022-2048: no packages for Image SLES15-SP5-SAP-GCE, but entry?
CVE-2022-2048: no packages for Image SLES15-SP5-SAPCAL-Azure, but entry?
CVE-2022-2048: no packages for Container bci/openjdk-devel:17-7.2, but entry?
CVE-2022-2048: no packages for SUSE Linux Enterprise Server 15 SP1-LTSS, but entry?
CVE-2022-2048: no packages for Image SLES15-SP6-SAPCAL-Azure, but entry?
CVE-2022-2048: no packages for Image SLES15-SP2-SAP-BYOS-EC2-HVM, but entry?
CVE-2022-2048: no packages for Image SLES15-SP2-SAP-Azure-VLI-BYOS-Production, but entry?
CVE-2022-2048: no packages for Image SLES15-SP5-SAP-Azure, but entry?
CVE-2022-2048: no packages for Container suse/manager/5.0/x86_64/server-attestation:5.0.0-beta2.2.16, but entry?
CVE-2022-2048: no packages for Image SLES15-SP6-SAP-Azure-VLI-BYOS, but entry?
CVE-2022-2048: no packages for Image SLES15-SP5-SAP-Azure-VLI-BYOS-Production, but entry?
CVE-2022-2048: no packages for SUSE CaaS Platform 4.0, but entry?
CVE-2022-2048: no packages for Container bci/openjdk-devel:17-14.11, but entry?
CVE-2022-2048: no packages for Container bci/openjdk:11-7.1, but entry?
CVE-2022-2048: no packages for Image SLES15-SP4-SAP-EC2, but entry?
CVE-2022-2048: no packages for SUSE Linux Enterprise Server for SAP Applications 15 SP1, but entry?
CVE-2022-2048: no packages for Container bci/kiwi:9.24.43-8.6, but entry?
CVE-2022-2048: no packages for SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS, but entry?
CVE-2022-2048: no packages for Image SLES15-SP5-SAPCAL-EC2, but entry?
CVE-2022-2048: no packages for Image SLES15-SP4-SAPCAL-Azure, but entry?
CVE-2022-2048: no packages for Image SLES15-SP4-SAPCAL-EC2, but entry?
CVE-2022-2048: no packages for SUSE Linux Enterprise Module for Web and Scripting 15 SP4, but entry?
CVE-2022-2048: no packages for Image SLES15-SP3-Manager-4-2-Server-BYOS-Azure, but entry?
CVE-2022-2048: no packages for Image SLES15-SP2-SAP-GCE, but entry?
CVE-2022-2048: no packages for SUSE Linux Enterprise Workstation Extension 15 SP6, but entry?
CVE-2022-2048: no packages for Image SLES15-SP3-SAP-Azure-LI-BYOS-Production, but entry?
CVE-2022-2048: no packages for Image SLES15-SP2-SAP-EC2-HVM, but entry?
CVE-2022-2048: no packages for Image SLES15-SP6-SAP-Azure-VLI-BYOS-Production, but entry?
CVE-2022-2048: no packages for SUSE Manager Server Module 4.3, but entry?
CVE-2022-2048: no packages for Image SLES15-SP6-SAP-Azure-LI-BYOS, but entry?
CVE-2022-2048: no packages for Image SLES15-SP4-SAP-Azure-VLI-BYOS, but entry?
CVE-2022-2048: no packages for SUSE Linux Enterprise Server 15 SP4-TERADATA, but entry?
CVE-2022-2048: no packages for Image SLES15-SP6-SAP-EC2, but entry?
CVE-2022-2048: no packages for Image SLES15-SP4-SAP-GCE, but entry?
CVE-2022-2048: no packages for SUSE Manager Proxy 4.2, but entry?
CVE-2022-2048: no packages for Image SLES15-SP4-Manager-Server-4-3-EC2-llc, but entry?
CVE-2022-2048: no packages for Image SLES15-SP4-Manager-Server-4-3, but entry?
CVE-2022-2048: no packages for Image SLES15-SP4-SAP, but entry?
CVE-2022-2048: no packages for SUSE Manager Retail Branch Server 4.2, but entry?
CVE-2022-2048: no packages for SUSE Linux Enterprise Workstation Extension 15 SP4, but entry?
CVE-2022-2048: no packages for SUSE Linux Enterprise Module for Package Hub 15 SP4, but entry?
CVE-2022-2048: no packages for Image SLES15-SP6-SAP-Azure-LI-BYOS-Production, but entry?
CVE-2022-2048: no packages for Image SLES15-SP4-SAP-Azure, but entry?
CVE-2022-2048: no packages for SUSE Linux Enterprise Module for Package Hub 15 SP5, but entry?
CVE-2022-2048: no packages for Image SLES15-SP4-SAPCAL-GCE, but entry?
CVE-2022-2048: no packages for SUSE Linux Enterprise Module for Basesystem 15 SP5, but entry?
CVE-2022-2048: no packages for Image SLES15-SP2-SAP-Azure, but entry?
CVE-2022-2048: no packages for Image SLES15-SP3-SAPCAL-GCE, but entry?
CVE-2022-2048: no packages for Image SLES15-SP6-SAP, but entry?
CVE-2022-2048: no packages for Image SLES15-SP4-Manager-Server-4-3-BYOS, but entry?
CVE-2022-2048: no packages for Image SLES15-SP4-SAP-Azure-LI-BYOS, but entry?
CVE-2022-2048: no packages for Image SLES15-SP2-SAP-Azure-LI-BYOS-Production, but entry?
CVE-2022-2048: no packages for Image SLES15-SP3-SAPCAL-EC2-HVM, but entry?
CVE-2022-2048: no packages for SUSE Manager Server 4.2, but entry?
CVE-2022-2048: no packages for Image SLES15-SP4-SAP-Azure-LI-BYOS-Production, but entry?
CVE-2022-2048: no packages for Container suse/manager/5.0/x86_64/server:5.0.0-beta1.2.122, but entry?
CVE-2022-2048: no packages for SUSE Linux Enterprise Module for Basesystem 15 SP4, but entry?
CVE-2022-2048: no packages for Image SLES15-SP2-SAP-BYOS-GCE, but entry?
CVE-2022-2048: no packages for Container bci/openjdk:17-7.1, but entry?
CVE-2022-2048: no packages for Image SLES15-SP4-Manager-Server-4-3-Azure-llc, but entry?
CVE-2022-2048: no packages for Image SLES15-SP5-SAP-Azure-VLI-BYOS, but entry?
CVE-2022-2048: no packages for Image SLES15-SP6-SAPCAL, but entry?
CVE-2022-2048: no packages for SUSE Linux Enterprise Module for Basesystem 15 SP6, but entry?
CVE-2022-2048: no packages for Image SLES15-SP5-SAP-Azure-LI-BYOS-Production, but entry?
CVE-2022-2048: no packages for Image SLES15-SP3-SAP-Azure-VLI-BYOS-Production, but entry?
CVE-2022-2048: no packages for Image SLES15-SP3-SAPCAL-Azure, but entry?
CVE-2022-2048: no packages for Image SLES15-SP4-Manager-Server-4-3-EC2-ltd, but entry?
CVE-2022-2048: no packages for Image SLES15-SP2-SAP-BYOS-Azure, but entry?
CVE-2022-2048: no packages for Image SLES15-SP4-Manager-Server-4-3-Azure-ltd, but entry?
CVE-2022-2048: no packages for Image SLES15-SP5-SAP-EC2, but entry?
CVE-2022-2048: no packages for SUSE Linux Enterprise Module for Web and Scripting 15 SP5, but entry?
CVE-2022-2048: no packages for SUSE Linux Enterprise Module for Web and Scripting 15 SP6, but entry?
CVE-2022-2048: no packages for Container bci/openjdk:latest, but entry?
CVE-2022-2048: no packages for Image SLES15-SP3-Manager-4-2-Server-BYOS-GCE, but entry?
CVE-2022-2048: no packages for Image SLES15-SP6-SAPCAL-EC2, but entry?
CVE-2022-2048: no packages for Image SLES15-SP4-SAPCAL, but entry?
CVE-2022-2048: no packages for Container bci/kiwi:9.24.43-8.6, but entry?
CVE-2022-2048: no packages for Container bci/openjdk-devel:11-6.2, but entry?
CVE-2022-2048: no packages for Container bci/openjdk-devel:17-14.11, but entry?
CVE-2022-2048: no packages for Container bci/openjdk-devel:17-7.2, but entry?
CVE-2022-2048: no packages for Container bci/openjdk:11-7.1, but entry?
CVE-2022-2048: no packages for Container bci/openjdk:17-7.1, but entry?
CVE-2022-2048: no packages for Container bci/openjdk:latest, but entry?
CVE-2022-2048: no packages for Container suse/manager/5.0/x86_64/server-attestation:5.0.0-beta2.2.16, but entry?
CVE-2022-2048: no packages for Container suse/manager/5.0/x86_64/server:5.0.0-beta1.2.122, but entry?
CVE-2022-2048: no packages for Image SLES15-SP2-SAP-Azure, but entry?
CVE-2022-2048: no packages for Image SLES15-SP2-SAP-Azure-LI-BYOS-Production, but entry?
CVE-2022-2048: no packages for Image SLES15-SP2-SAP-Azure-VLI-BYOS-Production, but entry?
CVE-2022-2048: no packages for Image SLES15-SP2-SAP-BYOS-Azure, but entry?
CVE-2022-2048: no packages for Image SLES15-SP2-SAP-BYOS-EC2-HVM, but entry?
CVE-2022-2048: no packages for Image SLES15-SP2-SAP-BYOS-GCE, but entry?
CVE-2022-2048: no packages for Image SLES15-SP2-SAP-EC2-HVM, but entry?
CVE-2022-2048: no packages for Image SLES15-SP2-SAP-GCE, but entry?
CVE-2022-2048: no packages for Image SLES15-SP3-Manager-4-2-Server-BYOS-Azure, but entry?
CVE-2022-2048: no packages for Image SLES15-SP3-Manager-4-2-Server-BYOS-EC2-HVM, but entry?
CVE-2022-2048: no packages for Image SLES15-SP3-Manager-4-2-Server-BYOS-GCE, but entry?
CVE-2022-2048: no packages for Image SLES15-SP3-SAP-Azure-LI-BYOS-Production, but entry?
CVE-2022-2048: no packages for Image SLES15-SP3-SAP-Azure-VLI-BYOS-Production, but entry?
CVE-2022-2048: no packages for Image SLES15-SP3-SAPCAL-Azure, but entry?
CVE-2022-2048: no packages for Image SLES15-SP3-SAPCAL-EC2-HVM, but entry?
CVE-2022-2048: no packages for Image SLES15-SP3-SAPCAL-GCE, but entry?
CVE-2022-2048: no packages for Image SLES15-SP4-Manager-Server-4-3, but entry?
CVE-2022-2048: no packages for Image SLES15-SP4-Manager-Server-4-3-Azure-llc, but entry?
CVE-2022-2048: no packages for Image SLES15-SP4-Manager-Server-4-3-Azure-ltd, but entry?
CVE-2022-2048: no packages for Image SLES15-SP4-Manager-Server-4-3-BYOS, but entry?
CVE-2022-2048: no packages for Image SLES15-SP4-Manager-Server-4-3-BYOS-Azure, but entry?
CVE-2022-2048: no packages for Image SLES15-SP4-Manager-Server-4-3-BYOS-EC2, but entry?
CVE-2022-2048: no packages for Image SLES15-SP4-Manager-Server-4-3-BYOS-GCE, but entry?
CVE-2022-2048: no packages for Image SLES15-SP4-Manager-Server-4-3-EC2-llc, but entry?
CVE-2022-2048: no packages for Image SLES15-SP4-Manager-Server-4-3-EC2-ltd, but entry?
CVE-2022-2048: no packages for Image SLES15-SP4-SAP, but entry?
CVE-2022-2048: no packages for Image SLES15-SP4-SAP-Azure, but entry?
CVE-2022-2048: no packages for Image SLES15-SP4-SAP-Azure-LI-BYOS, but entry?
CVE-2022-2048: no packages for Image SLES15-SP4-SAP-Azure-LI-BYOS-Production, but entry?
CVE-2022-2048: no packages for Image SLES15-SP4-SAP-Azure-VLI-BYOS, but entry?
CVE-2022-2048: no packages for Image SLES15-SP4-SAP-Azure-VLI-BYOS-Production, but entry?
CVE-2022-2048: no packages for Image SLES15-SP4-SAP-EC2, but entry?
CVE-2022-2048: no packages for Image SLES15-SP4-SAP-GCE, but entry?
CVE-2022-2048: no packages for Image SLES15-SP4-SAPCAL, but entry?
CVE-2022-2048: no packages for Image SLES15-SP4-SAPCAL-Azure, but entry?
CVE-2022-2048: no packages for Image SLES15-SP4-SAPCAL-EC2, but entry?
CVE-2022-2048: no packages for Image SLES15-SP4-SAPCAL-GCE, but entry?
CVE-2022-2048: no packages for Image SLES15-SP5-SAP-Azure, but entry?
CVE-2022-2048: no packages for Image SLES15-SP5-SAP-Azure-LI-BYOS, but entry?
CVE-2022-2048: no packages for Image SLES15-SP5-SAP-Azure-LI-BYOS-Production, but entry?
CVE-2022-2048: no packages for Image SLES15-SP5-SAP-Azure-VLI-BYOS, but entry?
CVE-2022-2048: no packages for Image SLES15-SP5-SAP-Azure-VLI-BYOS-Production, but entry?
CVE-2022-2048: no packages for Image SLES15-SP5-SAP-EC2, but entry?
CVE-2022-2048: no packages for Image SLES15-SP5-SAP-GCE, but entry?
CVE-2022-2048: no packages for Image SLES15-SP5-SAPCAL-Azure, but entry?
CVE-2022-2048: no packages for Image SLES15-SP5-SAPCAL-EC2, but entry?
CVE-2022-2048: no packages for Image SLES15-SP5-SAPCAL-GCE, but entry?
CVE-2022-2048: no packages for Image SLES15-SP6-SAP, but entry?
CVE-2022-2048: no packages for Image SLES15-SP6-SAP-Azure, but entry?
CVE-2022-2048: no packages for Image SLES15-SP6-SAP-Azure-LI-BYOS, but entry?
CVE-2022-2048: no packages for Image SLES15-SP6-SAP-Azure-LI-BYOS-Production, but entry?
CVE-2022-2048: no packages for Image SLES15-SP6-SAP-Azure-VLI-BYOS, but entry?
CVE-2022-2048: no packages for Image SLES15-SP6-SAP-Azure-VLI-BYOS-Production, but entry?
CVE-2022-2048: no packages for Image SLES15-SP6-SAP-EC2, but entry?
CVE-2022-2048: no packages for Image SLES15-SP6-SAP-GCE, but entry?
CVE-2022-2048: no packages for Image SLES15-SP6-SAPCAL, but entry?
CVE-2022-2048: no packages for Image SLES15-SP6-SAPCAL-Azure, but entry?
CVE-2022-2048: no packages for Image SLES15-SP6-SAPCAL-EC2, but entry?
CVE-2022-2048: no packages for Image SLES15-SP6-SAPCAL-GCE, but entry?
CVE-2022-2048: no packages for SUSE CaaS Platform 4.0, but entry?
CVE-2022-2048: no packages for SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS, but entry?
CVE-2022-2048: no packages for SUSE Linux Enterprise Module for Basesystem 15 SP4, but entry?
CVE-2022-2048: no packages for SUSE Linux Enterprise Module for Basesystem 15 SP5, but entry?
CVE-2022-2048: no packages for SUSE Linux Enterprise Module for Basesystem 15 SP6, but entry?
CVE-2022-2048: no packages for SUSE Linux Enterprise Module for Package Hub 15 SP4, but entry?
CVE-2022-2048: no packages for SUSE Linux Enterprise Module for Package Hub 15 SP5, but entry?
CVE-2022-2048: no packages for SUSE Linux Enterprise Module for Web and Scripting 15 SP4, but entry?
CVE-2022-2048: no packages for SUSE Linux Enterprise Module for Web and Scripting 15 SP5, but entry?
CVE-2022-2048: no packages for SUSE Linux Enterprise Module for Web and Scripting 15 SP6, but entry?
CVE-2022-2048: no packages for SUSE Linux Enterprise Server 15 SP1-LTSS, but entry?
CVE-2022-2048: no packages for SUSE Linux Enterprise Server 15 SP4-TERADATA, but entry?
CVE-2022-2048: no packages for SUSE Linux Enterprise Server for SAP Applications 15 SP1, but entry?
CVE-2022-2048: no packages for SUSE Linux Enterprise Workstation Extension 15 SP4, but entry?
CVE-2022-2048: no packages for SUSE Linux Enterprise Workstation Extension 15 SP5, but entry?
CVE-2022-2048: no packages for SUSE Linux Enterprise Workstation Extension 15 SP6, but entry?
CVE-2022-2048: no packages for SUSE Manager Proxy 4.2, but entry?
CVE-2022-2048: no packages for SUSE Manager Retail Branch Server 4.2, but entry?
CVE-2022-2048: no packages for SUSE Manager Server 4.2, but entry?
CVE-2022-2048: no packages for SUSE Manager Server Module 4.2, but entry?
CVE-2022-2048: no packages for SUSE Manager Server Module 4.3, but entry?
CVE-2022-2048: no packages for Container bci/kiwi:9.24.43-8.6, but entry?
CVE-2022-2048: no packages for Container bci/openjdk-devel:11-6.2, but entry?
CVE-2022-2048: no packages for Container bci/openjdk-devel:17-14.11, but entry?
CVE-2022-2048: no packages for Container bci/openjdk-devel:17-7.2, but entry?
CVE-2022-2048: no packages for Container bci/openjdk:11-7.1, but entry?
CVE-2022-2048: no packages for Container bci/openjdk:17-7.1, but entry?
CVE-2022-2048: no packages for Container bci/openjdk:latest, but entry?
CVE-2022-2048: no packages for Container suse/manager/5.0/x86_64/server-attestation:5.0.0-beta2.2.16, but entry?
CVE-2022-2048: no packages for Container suse/manager/5.0/x86_64/server:5.0.0-beta1.2.122, but entry?
CVE-2022-2048: no packages for Image SLES15-SP2-SAP-Azure, but entry?
CVE-2022-2048: no packages for Image SLES15-SP2-SAP-Azure-LI-BYOS-Production, but entry?
CVE-2022-2048: no packages for Image SLES15-SP2-SAP-Azure-VLI-BYOS-Production, but entry?
CVE-2022-2048: no packages for Image SLES15-SP2-SAP-BYOS-Azure, but entry?
CVE-2022-2048: no packages for Image SLES15-SP2-SAP-BYOS-EC2-HVM, but entry?
CVE-2022-2048: no packages for Image SLES15-SP2-SAP-BYOS-GCE, but entry?
CVE-2022-2048: no packages for Image SLES15-SP2-SAP-EC2-HVM, but entry?
CVE-2022-2048: no packages for Image SLES15-SP2-SAP-GCE, but entry?
CVE-2022-2048: no packages for Image SLES15-SP3-Manager-4-2-Server-BYOS-Azure, but entry?
CVE-2022-2048: no packages for Image SLES15-SP3-Manager-4-2-Server-BYOS-EC2-HVM, but entry?
CVE-2022-2048: no packages for Image SLES15-SP3-Manager-4-2-Server-BYOS-GCE, but entry?
CVE-2022-2048: no packages for Image SLES15-SP3-SAP-Azure-LI-BYOS-Production, but entry?
CVE-2022-2048: no packages for Image SLES15-SP3-SAP-Azure-VLI-BYOS-Production, but entry?
CVE-2022-2048: no packages for Image SLES15-SP3-SAPCAL-Azure, but entry?
CVE-2022-2048: no packages for Image SLES15-SP3-SAPCAL-EC2-HVM, but entry?
CVE-2022-2048: no packages for Image SLES15-SP3-SAPCAL-GCE, but entry?
CVE-2022-2048: no packages for Image SLES15-SP4-Manager-Server-4-3, but entry?
CVE-2022-2048: no packages for Image SLES15-SP4-Manager-Server-4-3-Azure-llc, but entry?
CVE-2022-2048: no packages for Image SLES15-SP4-Manager-Server-4-3-Azure-ltd, but entry?
CVE-2022-2048: no packages for Image SLES15-SP4-Manager-Server-4-3-BYOS, but entry?
CVE-2022-2048: no packages for Image SLES15-SP4-Manager-Server-4-3-BYOS-Azure, but entry?
CVE-2022-2048: no packages for Image SLES15-SP4-Manager-Server-4-3-BYOS-EC2, but entry?
CVE-2022-2048: no packages for Image SLES15-SP4-Manager-Server-4-3-BYOS-GCE, but entry?
CVE-2022-2048: no packages for Image SLES15-SP4-Manager-Server-4-3-EC2-llc, but entry?
CVE-2022-2048: no packages for Image SLES15-SP4-Manager-Server-4-3-EC2-ltd, but entry?
CVE-2022-2048: no packages for Image SLES15-SP4-SAP, but entry?
CVE-2022-2048: no packages for Image SLES15-SP4-SAP-Azure, but entry?
CVE-2022-2048: no packages for Image SLES15-SP4-SAP-Azure-LI-BYOS, but entry?
CVE-2022-2048: no packages for Image SLES15-SP4-SAP-Azure-LI-BYOS-Production, but entry?
CVE-2022-2048: no packages for Image SLES15-SP4-SAP-Azure-VLI-BYOS, but entry?
CVE-2022-2048: no packages for Image SLES15-SP4-SAP-Azure-VLI-BYOS-Production, but entry?
CVE-2022-2048: no packages for Image SLES15-SP4-SAP-EC2, but entry?
CVE-2022-2048: no packages for Image SLES15-SP4-SAP-GCE, but entry?
CVE-2022-2048: no packages for Image SLES15-SP4-SAPCAL, but entry?
CVE-2022-2048: no packages for Image SLES15-SP4-SAPCAL-Azure, but entry?
CVE-2022-2048: no packages for Image SLES15-SP4-SAPCAL-EC2, but entry?
CVE-2022-2048: no packages for Image SLES15-SP4-SAPCAL-GCE, but entry?
CVE-2022-2048: no packages for Image SLES15-SP5-SAP-Azure, but entry?
CVE-2022-2048: no packages for Image SLES15-SP5-SAP-Azure-LI-BYOS, but entry?
CVE-2022-2048: no packages for Image SLES15-SP5-SAP-Azure-LI-BYOS-Production, but entry?
CVE-2022-2048: no packages for Image SLES15-SP5-SAP-Azure-VLI-BYOS, but entry?
CVE-2022-2048: no packages for Image SLES15-SP5-SAP-Azure-VLI-BYOS-Production, but entry?
CVE-2022-2048: no packages for Image SLES15-SP5-SAP-EC2, but entry?
CVE-2022-2048: no packages for Image SLES15-SP5-SAP-GCE, but entry?
CVE-2022-2048: no packages for Image SLES15-SP5-SAPCAL-Azure, but entry?
CVE-2022-2048: no packages for Image SLES15-SP5-SAPCAL-EC2, but entry?
CVE-2022-2048: no packages for Image SLES15-SP5-SAPCAL-GCE, but entry?
CVE-2022-2048: no packages for Image SLES15-SP6-SAP, but entry?
CVE-2022-2048: no packages for Image SLES15-SP6-SAP-Azure, but entry?
CVE-2022-2048: no packages for Image SLES15-SP6-SAP-Azure-LI-BYOS, but entry?
CVE-2022-2048: no packages for Image SLES15-SP6-SAP-Azure-LI-BYOS-Production, but entry?
CVE-2022-2048: no packages for Image SLES15-SP6-SAP-Azure-VLI-BYOS, but entry?
CVE-2022-2048: no packages for Image SLES15-SP6-SAP-Azure-VLI-BYOS-Production, but entry?
CVE-2022-2048: no packages for Image SLES15-SP6-SAP-EC2, but entry?
CVE-2022-2048: no packages for Image SLES15-SP6-SAP-GCE, but entry?
CVE-2022-2048: no packages for Image SLES15-SP6-SAPCAL, but entry?
CVE-2022-2048: no packages for Image SLES15-SP6-SAPCAL-Azure, but entry?
CVE-2022-2048: no packages for Image SLES15-SP6-SAPCAL-EC2, but entry?
CVE-2022-2048: no packages for Image SLES15-SP6-SAPCAL-GCE, but entry?
CVE-2022-2048: no packages for SUSE CaaS Platform 4.0, but entry?
CVE-2022-2048: no packages for SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS, but entry?
CVE-2022-2048: no packages for SUSE Linux Enterprise Module for Basesystem 15 SP4, but entry?
CVE-2022-2048: no packages for SUSE Linux Enterprise Module for Basesystem 15 SP5, but entry?
CVE-2022-2048: no packages for SUSE Linux Enterprise Module for Basesystem 15 SP6, but entry?
CVE-2022-2048: no packages for SUSE Linux Enterprise Module for Package Hub 15 SP4, but entry?
CVE-2022-2048: no packages for SUSE Linux Enterprise Module for Package Hub 15 SP5, but entry?
CVE-2022-2048: no packages for SUSE Linux Enterprise Module for Web and Scripting 15 SP4, but entry?
CVE-2022-2048: no packages for SUSE Linux Enterprise Module for Web and Scripting 15 SP5, but entry?
CVE-2022-2048: no packages for SUSE Linux Enterprise Module for Web and Scripting 15 SP6, but entry?
CVE-2022-2048: no packages for SUSE Linux Enterprise Server 15 SP1-LTSS, but entry?
CVE-2022-2048: no packages for SUSE Linux Enterprise Server 15 SP4-TERADATA, but entry?
CVE-2022-2048: no packages for SUSE Linux Enterprise Server for SAP Applications 15 SP1, but entry?
CVE-2022-2048: no packages for SUSE Linux Enterprise Workstation Extension 15 SP4, but entry?
CVE-2022-2048: no packages for SUSE Linux Enterprise Workstation Extension 15 SP5, but entry?
CVE-2022-2048: no packages for SUSE Linux Enterprise Workstation Extension 15 SP6, but entry?
CVE-2022-2048: no packages for SUSE Manager Proxy 4.2, but entry?
CVE-2022-2048: no packages for SUSE Manager Retail Branch Server 4.2, but entry?
CVE-2022-2048: no packages for SUSE Manager Server 4.2, but entry?
CVE-2022-2048: no packages for SUSE Manager Server Module 4.2, but entry?
CVE-2022-2048: no packages for SUSE Manager Server Module 4.3, but entry?
CVE-2022-2047: no packages for Image SLES15-SP3-Manager-4-2-Server-BYOS-GCE, but entry?
CVE-2022-2047: no packages for SUSE Linux Enterprise Module for Web and Scripting 15 SP6, but entry?
CVE-2022-2047: no packages for Container bci/openjdk:latest, but entry?
CVE-2022-2047: no packages for Image SLES15-SP6-SAPCAL-EC2, but entry?
CVE-2022-2047: no packages for Image SLES15-SP4-SAPCAL, but entry?
CVE-2022-2047: no packages for Image SLES15-SP4-Manager-Server-4-3-Azure-ltd, but entry?
CVE-2022-2047: no packages for Image SLES15-SP2-SAP-BYOS-Azure, but entry?
CVE-2022-2047: no packages for Image SLES15-SP5-SAP-EC2, but entry?
CVE-2022-2047: no packages for SUSE Linux Enterprise Module for Web and Scripting 15 SP5, but entry?
CVE-2022-2047: no packages for SUSE Linux Enterprise Module for Basesystem 15 SP6, but entry?
CVE-2022-2047: no packages for Image SLES15-SP5-SAP-Azure-LI-BYOS-Production, but entry?
CVE-2022-2047: no packages for Image SLES15-SP5-SAP-Azure-VLI-BYOS, but entry?
CVE-2022-2047: no packages for Image SLES15-SP6-SAPCAL, but entry?
CVE-2022-2047: no packages for Image SLES15-SP4-Manager-Server-4-3-EC2-ltd, but entry?
CVE-2022-2047: no packages for Image SLES15-SP3-SAPCAL-Azure, but entry?
CVE-2022-2047: no packages for Image SLES15-SP3-SAP-Azure-VLI-BYOS-Production, but entry?
CVE-2022-2047: no packages for SUSE Linux Enterprise Module for Basesystem 15 SP4, but entry?
CVE-2022-2047: no packages for Image SLES15-SP4-Manager-Server-4-3-Azure-llc, but entry?
CVE-2022-2047: no packages for Image SLES15-SP2-SAP-BYOS-GCE, but entry?
CVE-2022-2047: no packages for Container bci/openjdk:17-7.1, but entry?
CVE-2022-2047: no packages for Image SLES15-SP4-SAP-Azure-LI-BYOS, but entry?
CVE-2022-2047: no packages for Image SLES15-SP2-SAP-Azure-LI-BYOS-Production, but entry?
CVE-2022-2047: no packages for Image SLES15-SP4-SAP-Azure-LI-BYOS-Production, but entry?
CVE-2022-2047: no packages for Image SLES15-SP3-SAPCAL-EC2-HVM, but entry?
CVE-2022-2047: no packages for SUSE Manager Server 4.2, but entry?
CVE-2022-2047: no packages for Image SLES15-SP4-Manager-Server-4-3-BYOS, but entry?
CVE-2022-2047: no packages for Container suse/manager/5.0/x86_64/server:5.0.0-beta1.2.122, but entry?
CVE-2022-2047: no packages for Image SLES15-SP2-SAP-Azure, but entry?
CVE-2022-2047: no packages for Image SLES15-SP4-SAPCAL-GCE, but entry?
CVE-2022-2047: no packages for SUSE Linux Enterprise Module for Basesystem 15 SP5, but entry?
CVE-2022-2047: no packages for Image SLES15-SP6-SAP, but entry?
CVE-2022-2047: no packages for Image SLES15-SP3-SAPCAL-GCE, but entry?
CVE-2022-2047: no packages for SUSE Linux Enterprise Module for Package Hub 15 SP4, but entry?
CVE-2022-2047: no packages for Image SLES15-SP6-SAP-Azure-LI-BYOS-Production, but entry?
CVE-2022-2047: no packages for SUSE Linux Enterprise Workstation Extension 15 SP4, but entry?
CVE-2022-2047: no packages for SUSE Linux Enterprise Module for Package Hub 15 SP5, but entry?
CVE-2022-2047: no packages for Image SLES15-SP4-SAP-Azure, but entry?
CVE-2022-2047: no packages for Image SLES15-SP4-Manager-Server-4-3-EC2-llc, but entry?
CVE-2022-2047: no packages for SUSE Manager Proxy 4.2, but entry?
CVE-2022-2047: no packages for Image SLES15-SP4-SAP, but entry?
CVE-2022-2047: no packages for SUSE Manager Retail Branch Server 4.2, but entry?
CVE-2022-2047: no packages for Image SLES15-SP4-Manager-Server-4-3, but entry?
CVE-2022-2047: no packages for Image SLES15-SP6-SAP-Azure-LI-BYOS, but entry?
CVE-2022-2047: no packages for Image SLES15-SP4-SAP-Azure-VLI-BYOS, but entry?
CVE-2022-2047: no packages for SUSE Linux Enterprise Server 15 SP4-TERADATA, but entry?
CVE-2022-2047: no packages for Image SLES15-SP6-SAP-EC2, but entry?
CVE-2022-2047: no packages for Image SLES15-SP4-SAP-GCE, but entry?
CVE-2022-2047: no packages for Image SLES15-SP6-SAP-Azure-VLI-BYOS-Production, but entry?
CVE-2022-2047: no packages for Image SLES15-SP2-SAP-EC2-HVM, but entry?
CVE-2022-2047: no packages for SUSE Manager Server Module 4.3, but entry?
CVE-2022-2047: no packages for SUSE Linux Enterprise Workstation Extension 15 SP6, but entry?
CVE-2022-2047: no packages for Image SLES15-SP3-SAP-Azure-LI-BYOS-Production, but entry?
CVE-2022-2047: no packages for Image SLES15-SP3-Manager-4-2-Server-BYOS-Azure, but entry?
CVE-2022-2047: no packages for Image SLES15-SP2-SAP-GCE, but entry?
CVE-2022-2047: no packages for Container bci/openjdk:11-7.1, but entry?
CVE-2022-2047: no packages for SUSE Linux Enterprise Server for SAP Applications 15 SP1, but entry?
CVE-2022-2047: no packages for Image SLES15-SP4-SAP-EC2, but entry?
CVE-2022-2047: no packages for SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS, but entry?
CVE-2022-2047: no packages for Container bci/kiwi:9.24.43-8.6, but entry?
CVE-2022-2047: no packages for Container bci/openjdk-devel:17-14.11, but entry?
CVE-2022-2047: no packages for Image SLES15-SP4-SAPCAL-EC2, but entry?
CVE-2022-2047: no packages for SUSE Linux Enterprise Module for Web and Scripting 15 SP4, but entry?
CVE-2022-2047: no packages for Image SLES15-SP4-SAPCAL-Azure, but entry?
CVE-2022-2047: no packages for Image SLES15-SP5-SAPCAL-EC2, but entry?
CVE-2022-2047: no packages for SUSE CaaS Platform 4.0, but entry?
CVE-2022-2047: no packages for Image SLES15-SP5-SAP-Azure-VLI-BYOS-Production, but entry?
CVE-2022-2047: no packages for Image SLES15-SP2-SAP-Azure-VLI-BYOS-Production, but entry?
CVE-2022-2047: no packages for Image SLES15-SP6-SAPCAL-Azure, but entry?
CVE-2022-2047: no packages for Image SLES15-SP2-SAP-BYOS-EC2-HVM, but entry?
CVE-2022-2047: no packages for Container suse/manager/5.0/x86_64/server-attestation:5.0.0-beta2.2.16, but entry?
CVE-2022-2047: no packages for Image SLES15-SP6-SAP-Azure-VLI-BYOS, but entry?
CVE-2022-2047: no packages for Image SLES15-SP5-SAP-Azure, but entry?
CVE-2022-2047: no packages for SUSE Linux Enterprise Workstation Extension 15 SP5, but entry?
CVE-2022-2047: no packages for Image SLES15-SP5-SAP-GCE, but entry?
CVE-2022-2047: no packages for SUSE Linux Enterprise Server 15 SP1-LTSS, but entry?
CVE-2022-2047: no packages for Container bci/openjdk-devel:17-7.2, but entry?
CVE-2022-2047: no packages for Image SLES15-SP5-SAPCAL-Azure, but entry?
CVE-2022-2047: no packages for Image SLES15-SP4-SAP-Azure-VLI-BYOS-Production, but entry?
CVE-2022-2047: no packages for Image SLES15-SP5-SAPCAL-GCE, but entry?
CVE-2022-2047: no packages for Image SLES15-SP6-SAP-Azure, but entry?
CVE-2022-2047: no packages for SUSE Manager Server Module 4.2, but entry?
CVE-2022-2047: no packages for Image SLES15-SP5-SAP-Azure-LI-BYOS, but entry?
CVE-2022-2047: no packages for Image SLES15-SP4-Manager-Server-4-3-BYOS-EC2, but entry?
CVE-2022-2047: no packages for Image SLES15-SP4-Manager-Server-4-3-BYOS-Azure, but entry?
CVE-2022-2047: no packages for Image SLES15-SP6-SAP-GCE, but entry?
CVE-2022-2047: no packages for Image SLES15-SP3-Manager-4-2-Server-BYOS-EC2-HVM, but entry?
CVE-2022-2047: no packages for Container bci/openjdk-devel:11-6.2, but entry?
CVE-2022-2047: no packages for Image SLES15-SP4-Manager-Server-4-3-BYOS-GCE, but entry?
CVE-2022-2047: no packages for Image SLES15-SP6-SAPCAL-GCE, but entry?
CVE-2022-2047: no packages for Container bci/kiwi:9.24.43-8.6, but entry?
CVE-2022-2047: no packages for Container bci/openjdk-devel:11-6.2, but entry?
CVE-2022-2047: no packages for Container bci/openjdk-devel:17-14.11, but entry?
CVE-2022-2047: no packages for Container bci/openjdk-devel:17-7.2, but entry?
CVE-2022-2047: no packages for Container bci/openjdk:11-7.1, but entry?
CVE-2022-2047: no packages for Container bci/openjdk:17-7.1, but entry?
CVE-2022-2047: no packages for Container bci/openjdk:latest, but entry?
CVE-2022-2047: no packages for Container suse/manager/5.0/x86_64/server-attestation:5.0.0-beta2.2.16, but entry?
CVE-2022-2047: no packages for Container suse/manager/5.0/x86_64/server:5.0.0-beta1.2.122, but entry?
CVE-2022-2047: no packages for Image SLES15-SP2-SAP-Azure, but entry?
CVE-2022-2047: no packages for Image SLES15-SP2-SAP-Azure-LI-BYOS-Production, but entry?
CVE-2022-2047: no packages for Image SLES15-SP2-SAP-Azure-VLI-BYOS-Production, but entry?
CVE-2022-2047: no packages for Image SLES15-SP2-SAP-BYOS-Azure, but entry?
CVE-2022-2047: no packages for Image SLES15-SP2-SAP-BYOS-EC2-HVM, but entry?
CVE-2022-2047: no packages for Image SLES15-SP2-SAP-BYOS-GCE, but entry?
CVE-2022-2047: no packages for Image SLES15-SP2-SAP-EC2-HVM, but entry?
CVE-2022-2047: no packages for Image SLES15-SP2-SAP-GCE, but entry?
CVE-2022-2047: no packages for Image SLES15-SP3-Manager-4-2-Server-BYOS-Azure, but entry?
CVE-2022-2047: no packages for Image SLES15-SP3-Manager-4-2-Server-BYOS-EC2-HVM, but entry?
CVE-2022-2047: no packages for Image SLES15-SP3-Manager-4-2-Server-BYOS-GCE, but entry?
CVE-2022-2047: no packages for Image SLES15-SP3-SAP-Azure-LI-BYOS-Production, but entry?
CVE-2022-2047: no packages for Image SLES15-SP3-SAP-Azure-VLI-BYOS-Production, but entry?
CVE-2022-2047: no packages for Image SLES15-SP3-SAPCAL-Azure, but entry?
CVE-2022-2047: no packages for Image SLES15-SP3-SAPCAL-EC2-HVM, but entry?
CVE-2022-2047: no packages for Image SLES15-SP3-SAPCAL-GCE, but entry?
CVE-2022-2047: no packages for Image SLES15-SP4-Manager-Server-4-3, but entry?
CVE-2022-2047: no packages for Image SLES15-SP4-Manager-Server-4-3-Azure-llc, but entry?
CVE-2022-2047: no packages for Image SLES15-SP4-Manager-Server-4-3-Azure-ltd, but entry?
CVE-2022-2047: no packages for Image SLES15-SP4-Manager-Server-4-3-BYOS, but entry?
CVE-2022-2047: no packages for Image SLES15-SP4-Manager-Server-4-3-BYOS-Azure, but entry?
CVE-2022-2047: no packages for Image SLES15-SP4-Manager-Server-4-3-BYOS-EC2, but entry?
CVE-2022-2047: no packages for Image SLES15-SP4-Manager-Server-4-3-BYOS-GCE, but entry?
CVE-2022-2047: no packages for Image SLES15-SP4-Manager-Server-4-3-EC2-llc, but entry?
CVE-2022-2047: no packages for Image SLES15-SP4-Manager-Server-4-3-EC2-ltd, but entry?
CVE-2022-2047: no packages for Image SLES15-SP4-SAP, but entry?
CVE-2022-2047: no packages for Image SLES15-SP4-SAP-Azure, but entry?
CVE-2022-2047: no packages for Image SLES15-SP4-SAP-Azure-LI-BYOS, but entry?
CVE-2022-2047: no packages for Image SLES15-SP4-SAP-Azure-LI-BYOS-Production, but entry?
CVE-2022-2047: no packages for Image SLES15-SP4-SAP-Azure-VLI-BYOS, but entry?
CVE-2022-2047: no packages for Image SLES15-SP4-SAP-Azure-VLI-BYOS-Production, but entry?
CVE-2022-2047: no packages for Image SLES15-SP4-SAP-EC2, but entry?
CVE-2022-2047: no packages for Image SLES15-SP4-SAP-GCE, but entry?
CVE-2022-2047: no packages for Image SLES15-SP4-SAPCAL, but entry?
CVE-2022-2047: no packages for Image SLES15-SP4-SAPCAL-Azure, but entry?
CVE-2022-2047: no packages for Image SLES15-SP4-SAPCAL-EC2, but entry?
CVE-2022-2047: no packages for Image SLES15-SP4-SAPCAL-GCE, but entry?
CVE-2022-2047: no packages for Image SLES15-SP5-SAP-Azure, but entry?
CVE-2022-2047: no packages for Image SLES15-SP5-SAP-Azure-LI-BYOS, but entry?
CVE-2022-2047: no packages for Image SLES15-SP5-SAP-Azure-LI-BYOS-Production, but entry?
CVE-2022-2047: no packages for Image SLES15-SP5-SAP-Azure-VLI-BYOS, but entry?
CVE-2022-2047: no packages for Image SLES15-SP5-SAP-Azure-VLI-BYOS-Production, but entry?
CVE-2022-2047: no packages for Image SLES15-SP5-SAP-EC2, but entry?
CVE-2022-2047: no packages for Image SLES15-SP5-SAP-GCE, but entry?
CVE-2022-2047: no packages for Image SLES15-SP5-SAPCAL-Azure, but entry?
CVE-2022-2047: no packages for Image SLES15-SP5-SAPCAL-EC2, but entry?
CVE-2022-2047: no packages for Image SLES15-SP5-SAPCAL-GCE, but entry?
CVE-2022-2047: no packages for Image SLES15-SP6-SAP, but entry?
CVE-2022-2047: no packages for Image SLES15-SP6-SAP-Azure, but entry?
CVE-2022-2047: no packages for Image SLES15-SP6-SAP-Azure-LI-BYOS, but entry?
CVE-2022-2047: no packages for Image SLES15-SP6-SAP-Azure-LI-BYOS-Production, but entry?
CVE-2022-2047: no packages for Image SLES15-SP6-SAP-Azure-VLI-BYOS, but entry?
CVE-2022-2047: no packages for Image SLES15-SP6-SAP-Azure-VLI-BYOS-Production, but entry?
CVE-2022-2047: no packages for Image SLES15-SP6-SAP-EC2, but entry?
CVE-2022-2047: no packages for Image SLES15-SP6-SAP-GCE, but entry?
CVE-2022-2047: no packages for Image SLES15-SP6-SAPCAL, but entry?
CVE-2022-2047: no packages for Image SLES15-SP6-SAPCAL-Azure, but entry?
CVE-2022-2047: no packages for Image SLES15-SP6-SAPCAL-EC2, but entry?
CVE-2022-2047: no packages for Image SLES15-SP6-SAPCAL-GCE, but entry?
CVE-2022-2047: no packages for SUSE CaaS Platform 4.0, but entry?
CVE-2022-2047: no packages for SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS, but entry?
CVE-2022-2047: no packages for SUSE Linux Enterprise Module for Basesystem 15 SP4, but entry?
CVE-2022-2047: no packages for SUSE Linux Enterprise Module for Basesystem 15 SP5, but entry?
CVE-2022-2047: no packages for SUSE Linux Enterprise Module for Basesystem 15 SP6, but entry?
CVE-2022-2047: no packages for SUSE Linux Enterprise Module for Package Hub 15 SP4, but entry?
CVE-2022-2047: no packages for SUSE Linux Enterprise Module for Package Hub 15 SP5, but entry?
CVE-2022-2047: no packages for SUSE Linux Enterprise Module for Web and Scripting 15 SP4, but entry?
CVE-2022-2047: no packages for SUSE Linux Enterprise Module for Web and Scripting 15 SP5, but entry?
CVE-2022-2047: no packages for SUSE Linux Enterprise Module for Web and Scripting 15 SP6, but entry?
CVE-2022-2047: no packages for SUSE Linux Enterprise Server 15 SP1-LTSS, but entry?
CVE-2022-2047: no packages for SUSE Linux Enterprise Server 15 SP4-TERADATA, but entry?
CVE-2022-2047: no packages for SUSE Linux Enterprise Server for SAP Applications 15 SP1, but entry?
CVE-2022-2047: no packages for SUSE Linux Enterprise Workstation Extension 15 SP4, but entry?
CVE-2022-2047: no packages for SUSE Linux Enterprise Workstation Extension 15 SP5, but entry?
CVE-2022-2047: no packages for SUSE Linux Enterprise Workstation Extension 15 SP6, but entry?
CVE-2022-2047: no packages for SUSE Manager Proxy 4.2, but entry?
CVE-2022-2047: no packages for SUSE Manager Retail Branch Server 4.2, but entry?
CVE-2022-2047: no packages for SUSE Manager Server 4.2, but entry?
CVE-2022-2047: no packages for SUSE Manager Server Module 4.2, but entry?
CVE-2022-2047: no packages for SUSE Manager Server Module 4.3, but entry?
CVE-2022-2047: no packages for Container bci/kiwi:9.24.43-8.6, but entry?
CVE-2022-2047: no packages for Container bci/openjdk-devel:11-6.2, but entry?
CVE-2022-2047: no packages for Container bci/openjdk-devel:17-14.11, but entry?
CVE-2022-2047: no packages for Container bci/openjdk-devel:17-7.2, but entry?
CVE-2022-2047: no packages for Container bci/openjdk:11-7.1, but entry?
CVE-2022-2047: no packages for Container bci/openjdk:17-7.1, but entry?
CVE-2022-2047: no packages for Container bci/openjdk:latest, but entry?
CVE-2022-2047: no packages for Container suse/manager/5.0/x86_64/server-attestation:5.0.0-beta2.2.16, but entry?
CVE-2022-2047: no packages for Container suse/manager/5.0/x86_64/server:5.0.0-beta1.2.122, but entry?
CVE-2022-2047: no packages for Image SLES15-SP2-SAP-Azure, but entry?
CVE-2022-2047: no packages for Image SLES15-SP2-SAP-Azure-LI-BYOS-Production, but entry?
CVE-2022-2047: no packages for Image SLES15-SP2-SAP-Azure-VLI-BYOS-Production, but entry?
CVE-2022-2047: no packages for Image SLES15-SP2-SAP-BYOS-Azure, but entry?
CVE-2022-2047: no packages for Image SLES15-SP2-SAP-BYOS-EC2-HVM, but entry?
CVE-2022-2047: no packages for Image SLES15-SP2-SAP-BYOS-GCE, but entry?
CVE-2022-2047: no packages for Image SLES15-SP2-SAP-EC2-HVM, but entry?
CVE-2022-2047: no packages for Image SLES15-SP2-SAP-GCE, but entry?
CVE-2022-2047: no packages for Image SLES15-SP3-Manager-4-2-Server-BYOS-Azure, but entry?
CVE-2022-2047: no packages for Image SLES15-SP3-Manager-4-2-Server-BYOS-EC2-HVM, but entry?
CVE-2022-2047: no packages for Image SLES15-SP3-Manager-4-2-Server-BYOS-GCE, but entry?
CVE-2022-2047: no packages for Image SLES15-SP3-SAP-Azure-LI-BYOS-Production, but entry?
CVE-2022-2047: no packages for Image SLES15-SP3-SAP-Azure-VLI-BYOS-Production, but entry?
CVE-2022-2047: no packages for Image SLES15-SP3-SAPCAL-Azure, but entry?
CVE-2022-2047: no packages for Image SLES15-SP3-SAPCAL-EC2-HVM, but entry?
CVE-2022-2047: no packages for Image SLES15-SP3-SAPCAL-GCE, but entry?
CVE-2022-2047: no packages for Image SLES15-SP4-Manager-Server-4-3, but entry?
CVE-2022-2047: no packages for Image SLES15-SP4-Manager-Server-4-3-Azure-llc, but entry?
CVE-2022-2047: no packages for Image SLES15-SP4-Manager-Server-4-3-Azure-ltd, but entry?
CVE-2022-2047: no packages for Image SLES15-SP4-Manager-Server-4-3-BYOS, but entry?
CVE-2022-2047: no packages for Image SLES15-SP4-Manager-Server-4-3-BYOS-Azure, but entry?
CVE-2022-2047: no packages for Image SLES15-SP4-Manager-Server-4-3-BYOS-EC2, but entry?
CVE-2022-2047: no packages for Image SLES15-SP4-Manager-Server-4-3-BYOS-GCE, but entry?
CVE-2022-2047: no packages for Image SLES15-SP4-Manager-Server-4-3-EC2-llc, but entry?
CVE-2022-2047: no packages for Image SLES15-SP4-Manager-Server-4-3-EC2-ltd, but entry?
CVE-2022-2047: no packages for Image SLES15-SP4-SAP, but entry?
CVE-2022-2047: no packages for Image SLES15-SP4-SAP-Azure, but entry?
CVE-2022-2047: no packages for Image SLES15-SP4-SAP-Azure-LI-BYOS, but entry?
CVE-2022-2047: no packages for Image SLES15-SP4-SAP-Azure-LI-BYOS-Production, but entry?
CVE-2022-2047: no packages for Image SLES15-SP4-SAP-Azure-VLI-BYOS, but entry?
CVE-2022-2047: no packages for Image SLES15-SP4-SAP-Azure-VLI-BYOS-Production, but entry?
CVE-2022-2047: no packages for Image SLES15-SP4-SAP-EC2, but entry?
CVE-2022-2047: no packages for Image SLES15-SP4-SAP-GCE, but entry?
CVE-2022-2047: no packages for Image SLES15-SP4-SAPCAL, but entry?
CVE-2022-2047: no packages for Image SLES15-SP4-SAPCAL-Azure, but entry?
CVE-2022-2047: no packages for Image SLES15-SP4-SAPCAL-EC2, but entry?
CVE-2022-2047: no packages for Image SLES15-SP4-SAPCAL-GCE, but entry?
CVE-2022-2047: no packages for Image SLES15-SP5-SAP-Azure, but entry?
CVE-2022-2047: no packages for Image SLES15-SP5-SAP-Azure-LI-BYOS, but entry?
CVE-2022-2047: no packages for Image SLES15-SP5-SAP-Azure-LI-BYOS-Production, but entry?
CVE-2022-2047: no packages for Image SLES15-SP5-SAP-Azure-VLI-BYOS, but entry?
CVE-2022-2047: no packages for Image SLES15-SP5-SAP-Azure-VLI-BYOS-Production, but entry?
CVE-2022-2047: no packages for Image SLES15-SP5-SAP-EC2, but entry?
CVE-2022-2047: no packages for Image SLES15-SP5-SAP-GCE, but entry?
CVE-2022-2047: no packages for Image SLES15-SP5-SAPCAL-Azure, but entry?
CVE-2022-2047: no packages for Image SLES15-SP5-SAPCAL-EC2, but entry?
CVE-2022-2047: no packages for Image SLES15-SP5-SAPCAL-GCE, but entry?
CVE-2022-2047: no packages for Image SLES15-SP6-SAP, but entry?
CVE-2022-2047: no packages for Image SLES15-SP6-SAP-Azure, but entry?
CVE-2022-2047: no packages for Image SLES15-SP6-SAP-Azure-LI-BYOS, but entry?
CVE-2022-2047: no packages for Image SLES15-SP6-SAP-Azure-LI-BYOS-Production, but entry?
CVE-2022-2047: no packages for Image SLES15-SP6-SAP-Azure-VLI-BYOS, but entry?
CVE-2022-2047: no packages for Image SLES15-SP6-SAP-Azure-VLI-BYOS-Production, but entry?
CVE-2022-2047: no packages for Image SLES15-SP6-SAP-EC2, but entry?
CVE-2022-2047: no packages for Image SLES15-SP6-SAP-GCE, but entry?
CVE-2022-2047: no packages for Image SLES15-SP6-SAPCAL, but entry?
CVE-2022-2047: no packages for Image SLES15-SP6-SAPCAL-Azure, but entry?
CVE-2022-2047: no packages for Image SLES15-SP6-SAPCAL-EC2, but entry?
CVE-2022-2047: no packages for Image SLES15-SP6-SAPCAL-GCE, but entry?
CVE-2022-2047: no packages for SUSE CaaS Platform 4.0, but entry?
CVE-2022-2047: no packages for SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS, but entry?
CVE-2022-2047: no packages for SUSE Linux Enterprise Module for Basesystem 15 SP4, but entry?
CVE-2022-2047: no packages for SUSE Linux Enterprise Module for Basesystem 15 SP5, but entry?
CVE-2022-2047: no packages for SUSE Linux Enterprise Module for Basesystem 15 SP6, but entry?
CVE-2022-2047: no packages for SUSE Linux Enterprise Module for Package Hub 15 SP4, but entry?
CVE-2022-2047: no packages for SUSE Linux Enterprise Module for Package Hub 15 SP5, but entry?
CVE-2022-2047: no packages for SUSE Linux Enterprise Module for Web and Scripting 15 SP4, but entry?
CVE-2022-2047: no packages for SUSE Linux Enterprise Module for Web and Scripting 15 SP5, but entry?
CVE-2022-2047: no packages for SUSE Linux Enterprise Module for Web and Scripting 15 SP6, but entry?
CVE-2022-2047: no packages for SUSE Linux Enterprise Server 15 SP1-LTSS, but entry?
CVE-2022-2047: no packages for SUSE Linux Enterprise Server 15 SP4-TERADATA, but entry?
CVE-2022-2047: no packages for SUSE Linux Enterprise Server for SAP Applications 15 SP1, but entry?
CVE-2022-2047: no packages for SUSE Linux Enterprise Workstation Extension 15 SP4, but entry?
CVE-2022-2047: no packages for SUSE Linux Enterprise Workstation Extension 15 SP5, but entry?
CVE-2022-2047: no packages for SUSE Linux Enterprise Workstation Extension 15 SP6, but entry?
CVE-2022-2047: no packages for SUSE Manager Proxy 4.2, but entry?
CVE-2022-2047: no packages for SUSE Manager Retail Branch Server 4.2, but entry?
CVE-2022-2047: no packages for SUSE Manager Server 4.2, but entry?
CVE-2022-2047: no packages for SUSE Manager Server Module 4.2, but entry?
CVE-2022-2047: no packages for SUSE Manager Server Module 4.3, but entry?
no cpe found for SUSE Package Hub 15 SP3 in CVE-2022-2011
no cpe found for SUSE Package Hub 15 SP4 in CVE-2022-2011
skipping CVE-2022-2042 as CVE page is older than CVRF-CVE file.
skipping CVE-2022-2031 as CVE page is older than CVRF-CVE file.
no cpe found for SUSE Package Hub 15 SP3 in CVE-2022-2010
no cpe found for SUSE Package Hub 15 SP4 in CVE-2022-2010
no cpe found for SUSE Package Hub 15 SP3 in CVE-2022-2008
no cpe found for SUSE Package Hub 15 SP4 in CVE-2022-2008
no cpe found for SUSE Package Hub 15 SP3 in CVE-2022-2007
no cpe found for SUSE Package Hub 15 SP4 in CVE-2022-2007
no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2022-1996
no cpe found for SUSE Package Hub 15 SP3 in CVE-2022-1996
no cpe found for SUSE Package Hub 15 SP4 in CVE-2022-1996
skipping CVE-2022-2000 as CVE page is older than CVRF-CVE file.
skipping CVE-2022-1998 as CVE page is older than CVRF-CVE file.
no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2022-1974
no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2022-1966
skipping CVE-2022-1973 as CVE page is older than CVRF-CVE file.
skipping CVE-2022-1972 as CVE page is older than CVRF-CVE file.
skipping CVE-2022-1968 as CVE page is older than CVRF-CVE file.
no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2022-1962
no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2022-1949
CVE-2022-1941: no packages for Image SLES15-SP6-SAP-Azure-LI-BYOS-Production, but entry?
CVE-2022-1941: no packages for SUSE Manager Retail Branch Server 4.2, but entry?
CVE-2022-1941: no packages for SUSE Manager Proxy 4.2, but entry?
CVE-2022-1941: no packages for SUSE Enterprise Storage 7.1, but entry?
CVE-2022-1941: no packages for Image SLES15-SP4-SAP-Azure-LI-BYOS, but entry?
CVE-2022-1941: no packages for SUSE Manager Server 4.2, but entry?
CVE-2022-1941: no packages for Image SLES15-SP4-SAP-Azure-LI-BYOS-Production, but entry?
CVE-2022-1941: no packages for Image SLES15-SP3-SAP-Azure-VLI-BYOS-Production, but entry?
CVE-2022-1941: no packages for Image SLES15-SP5-SAP-Azure-VLI-BYOS, but entry?
CVE-2022-1941: no packages for Image SLES15-SP5-SAP-Azure-LI-BYOS-Production, but entry?
CVE-2022-1941: no packages for SUSE Linux Enterprise Server 15 SP3-LTSS, but entry?
CVE-2022-1941: no packages for SUSE Linux Enterprise Real Time 15 SP3, but entry?
CVE-2022-1941: no packages for Image SLES15-SP5-SAP-Azure-LI-BYOS, but entry?
CVE-2022-1941: no packages for Image SLES15-SP4-SAP-Azure-VLI-BYOS-Production, but entry?
CVE-2022-1941: no packages for SUSE Linux Enterprise Module for Server Applications 15 SP5, but entry?
CVE-2022-1941: no packages for SUSE Linux Enterprise Module for Server Applications 15 SP4, but entry?
CVE-2022-1941: no packages for Image SLES15-SP5-SAP-Azure-VLI-BYOS-Production, but entry?
CVE-2022-1941: no packages for Image SLES15-SP6-SAP-Azure-VLI-BYOS, but entry?
CVE-2022-1941: no packages for SUSE Linux Enterprise Module for Server Applications 15 SP6, but entry?
CVE-2022-1941: no packages for Image SLES15-SP4-SAP-Azure-VLI-BYOS, but entry?
CVE-2022-1941: no packages for Image SLES15-SP6-SAP-Azure-LI-BYOS, but entry?
CVE-2022-1941: no packages for SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS, but entry?
CVE-2022-1941: no packages for SUSE Linux Enterprise Server for SAP Applications 15 SP3, but entry?
CVE-2022-1941: no packages for Image SLES15-SP3-SAP-Azure-LI-BYOS-Production, but entry?
CVE-2022-1941: no packages for SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS, but entry?
CVE-2022-1941: no packages for Image SLES15-SP6-SAP-Azure-VLI-BYOS-Production, but entry?
no cpe found for SUSE Linux Enterprise Installer Updates 15 SP1 in CVE-2022-1941
no cpe found for SUSE Linux Enterprise Installer Updates 15 SP2 in CVE-2022-1941
no cpe found for SUSE Linux Enterprise Installer Updates 15 SP1 in CVE-2022-1941
no cpe found for SUSE Linux Enterprise Installer Updates 15 SP2 in CVE-2022-1941
no cpe found for SUSE Linux Enterprise Installer Updates 15 SP1 in CVE-2022-1941
no cpe found for SUSE Linux Enterprise Installer Updates 15 SP2 in CVE-2022-1941
no cpe found for SUSE Linux Enterprise Installer Updates 15 SP1 in CVE-2022-1941
no cpe found for SUSE Linux Enterprise Installer Updates 15 SP2 in CVE-2022-1941
no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2022-1941
no cpe found for SUSE Linux Enterprise Installer Updates 15 SP1 in CVE-2022-1941
no cpe found for SUSE Linux Enterprise Installer Updates 15 SP2 in CVE-2022-1941
no cpe found for SUSE Linux Enterprise Installer Updates 15 SP1 in CVE-2022-1941
no cpe found for SUSE Linux Enterprise Installer Updates 15 SP2 in CVE-2022-1941
no cpe found for SUSE Linux Enterprise Installer Updates 15 SP1 in CVE-2022-1941
no cpe found for SUSE Linux Enterprise Installer Updates 15 SP2 in CVE-2022-1941
no cpe found for SUSE Linux Enterprise Installer Updates 15 SP1 in CVE-2022-1941
no cpe found for SUSE Linux Enterprise Installer Updates 15 SP2 in CVE-2022-1941
CVE-2022-1941: no packages for Image SLES15-SP3-SAP-Azure-LI-BYOS-Production, but entry?
CVE-2022-1941: no packages for Image SLES15-SP3-SAP-Azure-VLI-BYOS-Production, but entry?
CVE-2022-1941: no packages for Image SLES15-SP4-SAP-Azure-LI-BYOS, but entry?
CVE-2022-1941: no packages for Image SLES15-SP4-SAP-Azure-LI-BYOS-Production, but entry?
CVE-2022-1941: no packages for Image SLES15-SP4-SAP-Azure-VLI-BYOS, but entry?
CVE-2022-1941: no packages for Image SLES15-SP4-SAP-Azure-VLI-BYOS-Production, but entry?
CVE-2022-1941: no packages for Image SLES15-SP5-SAP-Azure-LI-BYOS, but entry?
CVE-2022-1941: no packages for Image SLES15-SP5-SAP-Azure-LI-BYOS-Production, but entry?
CVE-2022-1941: no packages for Image SLES15-SP5-SAP-Azure-VLI-BYOS, but entry?
CVE-2022-1941: no packages for Image SLES15-SP5-SAP-Azure-VLI-BYOS-Production, but entry?
CVE-2022-1941: no packages for Image SLES15-SP6-SAP-Azure-LI-BYOS, but entry?
CVE-2022-1941: no packages for Image SLES15-SP6-SAP-Azure-LI-BYOS-Production, but entry?
CVE-2022-1941: no packages for Image SLES15-SP6-SAP-Azure-VLI-BYOS, but entry?
CVE-2022-1941: no packages for Image SLES15-SP6-SAP-Azure-VLI-BYOS-Production, but entry?
CVE-2022-1941: no packages for SUSE Enterprise Storage 7.1, but entry?
CVE-2022-1941: no packages for SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS, but entry?
CVE-2022-1941: no packages for SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS, but entry?
CVE-2022-1941: no packages for SUSE Linux Enterprise Module for Server Applications 15 SP4, but entry?
CVE-2022-1941: no packages for SUSE Linux Enterprise Module for Server Applications 15 SP5, but entry?
CVE-2022-1941: no packages for SUSE Linux Enterprise Module for Server Applications 15 SP6, but entry?
CVE-2022-1941: no packages for SUSE Linux Enterprise Real Time 15 SP3, but entry?
CVE-2022-1941: no packages for SUSE Linux Enterprise Server 15 SP3-LTSS, but entry?
CVE-2022-1941: no packages for SUSE Linux Enterprise Server for SAP Applications 15 SP3, but entry?
CVE-2022-1941: no packages for SUSE Manager Proxy 4.2, but entry?
CVE-2022-1941: no packages for SUSE Manager Retail Branch Server 4.2, but entry?
CVE-2022-1941: no packages for SUSE Manager Server 4.2, but entry?
CVE-2022-1941: no packages for Image SLES15-SP3-SAP-Azure-LI-BYOS-Production, but entry?
CVE-2022-1941: no packages for Image SLES15-SP3-SAP-Azure-VLI-BYOS-Production, but entry?
CVE-2022-1941: no packages for Image SLES15-SP4-SAP-Azure-LI-BYOS, but entry?
CVE-2022-1941: no packages for Image SLES15-SP4-SAP-Azure-LI-BYOS-Production, but entry?
CVE-2022-1941: no packages for Image SLES15-SP4-SAP-Azure-VLI-BYOS, but entry?
CVE-2022-1941: no packages for Image SLES15-SP4-SAP-Azure-VLI-BYOS-Production, but entry?
CVE-2022-1941: no packages for Image SLES15-SP5-SAP-Azure-LI-BYOS, but entry?
CVE-2022-1941: no packages for Image SLES15-SP5-SAP-Azure-LI-BYOS-Production, but entry?
CVE-2022-1941: no packages for Image SLES15-SP5-SAP-Azure-VLI-BYOS, but entry?
CVE-2022-1941: no packages for Image SLES15-SP5-SAP-Azure-VLI-BYOS-Production, but entry?
CVE-2022-1941: no packages for Image SLES15-SP6-SAP-Azure-LI-BYOS, but entry?
CVE-2022-1941: no packages for Image SLES15-SP6-SAP-Azure-LI-BYOS-Production, but entry?
CVE-2022-1941: no packages for Image SLES15-SP6-SAP-Azure-VLI-BYOS, but entry?
CVE-2022-1941: no packages for Image SLES15-SP6-SAP-Azure-VLI-BYOS-Production, but entry?
CVE-2022-1941: no packages for SUSE Enterprise Storage 7.1, but entry?
CVE-2022-1941: no packages for SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS, but entry?
CVE-2022-1941: no packages for SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS, but entry?
CVE-2022-1941: no packages for SUSE Linux Enterprise Module for Server Applications 15 SP4, but entry?
CVE-2022-1941: no packages for SUSE Linux Enterprise Module for Server Applications 15 SP5, but entry?
CVE-2022-1941: no packages for SUSE Linux Enterprise Module for Server Applications 15 SP6, but entry?
CVE-2022-1941: no packages for SUSE Linux Enterprise Real Time 15 SP3, but entry?
CVE-2022-1941: no packages for SUSE Linux Enterprise Server 15 SP3-LTSS, but entry?
CVE-2022-1941: no packages for SUSE Linux Enterprise Server for SAP Applications 15 SP3, but entry?
CVE-2022-1941: no packages for SUSE Manager Proxy 4.2, but entry?
CVE-2022-1941: no packages for SUSE Manager Retail Branch Server 4.2, but entry?
CVE-2022-1941: no packages for SUSE Manager Server 4.2, but entry?
skipping CVE-2022-1943 as CVE page is older than CVRF-CVE file.
skipping CVE-2022-1942 as CVE page is older than CVRF-CVE file.
skipping CVE-2022-1927 as CVE page is older than CVRF-CVE file.
skipping CVE-2022-1925 as CVE page is older than CVRF-CVE file.
skipping CVE-2022-1924 as CVE page is older than CVRF-CVE file.
skipping CVE-2022-1923 as CVE page is older than CVRF-CVE file.
skipping CVE-2022-1922 as CVE page is older than CVRF-CVE file.
skipping CVE-2022-1921 as CVE page is older than CVRF-CVE file.
skipping CVE-2022-1920 as CVE page is older than CVRF-CVE file.
no cpe found for SUSE Package Hub 15 SP3 in CVE-2022-1876
no cpe found for SUSE Package Hub 15 SP4 in CVE-2022-1876
skipping CVE-2022-1898 as CVE page is older than CVRF-CVE file.
skipping CVE-2022-1897 as CVE page is older than CVRF-CVE file.
skipping CVE-2022-1886 as CVE page is older than CVRF-CVE file.
skipping CVE-2022-1882 as CVE page is older than CVRF-CVE file.
no cpe found for SUSE Package Hub 15 SP3 in CVE-2022-1875
no cpe found for SUSE Package Hub 15 SP4 in CVE-2022-1875
no cpe found for SUSE Package Hub 15 SP3 in CVE-2022-1874
no cpe found for SUSE Package Hub 15 SP4 in CVE-2022-1874
no cpe found for SUSE Package Hub 15 SP3 in CVE-2022-1873
no cpe found for SUSE Package Hub 15 SP4 in CVE-2022-1873
no cpe found for SUSE Package Hub 15 SP3 in CVE-2022-1872
no cpe found for SUSE Package Hub 15 SP4 in CVE-2022-1872
no cpe found for SUSE Package Hub 15 SP3 in CVE-2022-1871
no cpe found for SUSE Package Hub 15 SP4 in CVE-2022-1871
no cpe found for SUSE Package Hub 15 SP3 in CVE-2022-1870
no cpe found for SUSE Package Hub 15 SP4 in CVE-2022-1870
no cpe found for SUSE Package Hub 15 SP3 in CVE-2022-1869
no cpe found for SUSE Package Hub 15 SP4 in CVE-2022-1869
no cpe found for SUSE Package Hub 15 SP3 in CVE-2022-1868
no cpe found for SUSE Package Hub 15 SP4 in CVE-2022-1868
no cpe found for SUSE Package Hub 15 SP3 in CVE-2022-1867
no cpe found for SUSE Package Hub 15 SP4 in CVE-2022-1867
no cpe found for SUSE Package Hub 15 SP3 in CVE-2022-1866
no cpe found for SUSE Package Hub 15 SP4 in CVE-2022-1866
no cpe found for SUSE Package Hub 15 SP3 in CVE-2022-1865
no cpe found for SUSE Package Hub 15 SP4 in CVE-2022-1865
no cpe found for SUSE Package Hub 15 SP3 in CVE-2022-1864
no cpe found for SUSE Package Hub 15 SP4 in CVE-2022-1864
no cpe found for SUSE Package Hub 15 SP3 in CVE-2022-1863
no cpe found for SUSE Package Hub 15 SP4 in CVE-2022-1863
no cpe found for SUSE Package Hub 15 SP3 in CVE-2022-1862
no cpe found for SUSE Package Hub 15 SP4 in CVE-2022-1862
no cpe found for SUSE Package Hub 15 SP3 in CVE-2022-1861
no cpe found for SUSE Package Hub 15 SP4 in CVE-2022-1861
no cpe found for SUSE Package Hub 15 SP3 in CVE-2022-1860
no cpe found for SUSE Package Hub 15 SP4 in CVE-2022-1860
no cpe found for SUSE Package Hub 15 SP3 in CVE-2022-1859
no cpe found for SUSE Package Hub 15 SP4 in CVE-2022-1859
no cpe found for SUSE Package Hub 15 SP3 in CVE-2022-1858
no cpe found for SUSE Package Hub 15 SP4 in CVE-2022-1858
no cpe found for SUSE Package Hub 15 SP3 in CVE-2022-1857
no cpe found for SUSE Package Hub 15 SP4 in CVE-2022-1857
no cpe found for SUSE Package Hub 15 SP3 in CVE-2022-1856
no cpe found for SUSE Package Hub 15 SP4 in CVE-2022-1856
no cpe found for SUSE Package Hub 15 SP3 in CVE-2022-1855
no cpe found for SUSE Package Hub 15 SP4 in CVE-2022-1855
no cpe found for SUSE Package Hub 15 SP3 in CVE-2022-1854
no cpe found for SUSE Package Hub 15 SP4 in CVE-2022-1854
no cpe found for SUSE Package Hub 15 SP3 in CVE-2022-1853
no cpe found for SUSE Package Hub 15 SP4 in CVE-2022-1853
skipping CVE-2022-1852 as CVE page is older than CVRF-CVE file.
skipping CVE-2022-1851 as CVE page is older than CVRF-CVE file.
no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2022-1798
skipping CVE-2022-1802 as CVE page is older than CVRF-CVE file.
no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2022-1734
skipping CVE-2022-1796 as CVE page is older than CVRF-CVE file.
skipping CVE-2022-1789 as CVE page is older than CVRF-CVE file.
skipping CVE-2022-1785 as CVE page is older than CVRF-CVE file.
skipping CVE-2022-1771 as CVE page is older than CVRF-CVE file.
skipping CVE-2022-1769 as CVE page is older than CVRF-CVE file.
skipping CVE-2022-1736 as CVE page is older than CVRF-CVE file.
skipping CVE-2022-1735 as CVE page is older than CVRF-CVE file.
no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2022-1729
skipping CVE-2022-1733 as CVE page is older than CVRF-CVE file.
skipping CVE-2022-1725 as CVE page is older than CVRF-CVE file.
skipping CVE-2022-1720 as CVE page is older than CVRF-CVE file.
no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2022-1708
no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2022-1706
no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2022-1705
no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2022-1679
CVE-2022-1664: no packages for Container bci/rust:1.63-4.11, but entry?
CVE-2022-1664: no packages for Image SLES15-SP4-SAPCAL-GCE, but entry?
CVE-2022-1664: no packages for Image SLES15-SP6-Hardened-BYOS-Azure, but entry?
CVE-2022-1664: no packages for Image SLES15-SP6-EC2, but entry?
CVE-2022-1664: no packages for SUSE Linux Enterprise Module for Basesystem 15 SP5, but entry?
CVE-2022-1664: no packages for Container suse/postgres:13.10-22.1, but entry?
CVE-2022-1664: no packages for Image SLES15-SP4-CHOST-BYOS, but entry?
CVE-2022-1664: no packages for Container suse/sles/15.7/virt-launcher:1.1.1.33.5, but entry?
CVE-2022-1664: no packages for Image SLES12-SP5-EC2-ECS-On-Demand, but entry?
CVE-2022-1664: no packages for Image SLES15-SP2-SAP-Azure, but entry?
CVE-2022-1664: no packages for Container suse/sles/15.6/virt-handler:1.1.1.24.478, but entry?
CVE-2022-1664: no packages for Image SLES15-SP5-Azure-Standard, but entry?
CVE-2022-1664: no packages for Container bci/golang:oldstable-openssl-34.5, but entry?
CVE-2022-1664: no packages for Container bci/nodejs:16-7.1, but entry?
CVE-2022-1664: no packages for Container bci/rust:1.79-1.4.3, but entry?
CVE-2022-1664: no packages for Image SLES15-SP1-SAP-Azure-VLI-BYOS-Production, but entry?
CVE-2022-1664: no packages for Container rancher/elemental-teal/5.4:latest, but entry?
CVE-2022-1664: no packages for Image SLES12-SP5-Azure-SAP-BYOS, but entry?
CVE-2022-1664: no packages for Image SLES15-SP5-Micro-5-5, but entry?
CVE-2022-1664: no packages for Image SLES15-SP3-BYOS-EC2-HVM, but entry?
CVE-2022-1664: no packages for Image SLES15-SP3-SAPCAL-GCE, but entry?
CVE-2022-1664: no packages for Image SLES12-SP5-Azure-HPC-On-Demand, but entry?
CVE-2022-1664: no packages for Image SLES15-SP6-SAP, but entry?
CVE-2022-1664: no packages for Image SLES15-SP6-Azure-Standard, but entry?
CVE-2022-1664: no packages for Container bci/bci-init:15.3.21.55, but entry?
CVE-2022-1664: no packages for Container rancher/elemental-builder-image/5.3:latest, but entry?
CVE-2022-1664: no packages for Image SLES15-SP4-Micro-5-4-BYOS-GCE, but entry?
CVE-2022-1664: no packages for Image SLES15-SP4-Manager-Server-4-3-BYOS, but entry?
CVE-2022-1664: no packages for Image SLES15-SP3-SAP-BYOS-Azure, but entry?
CVE-2022-1664: no packages for SUSE Linux Enterprise Server for SAP Applications 12 SP5, but entry?
CVE-2022-1664: no packages for Image SLES15-SP4-SAP-Azure-LI-BYOS, but entry?
CVE-2022-1664: no packages for Image SLES15-SP3-SAPCAL-EC2-HVM, but entry?
CVE-2022-1664: no packages for Container bci/php-fpm:8-31.4, but entry?
CVE-2022-1664: no packages for Image SLES15-SP4-SAP-Azure-LI-BYOS-Production, but entry?
CVE-2022-1664: no packages for Image SLES15-SP2-SAP-Azure-LI-BYOS-Production, but entry?
CVE-2022-1664: no packages for Image SLES15-SP6-SAP-Hardened-BYOS, but entry?
CVE-2022-1664: no packages for Container suse/sle-micro/5.4/toolbox:11.1-3.2.10, but entry?
CVE-2022-1664: no packages for Image SLES15-SP4-BYOS-GCE, but entry?
CVE-2022-1664: no packages for Image SLES15-SP5-Micro-5-5-BYOS-GCE, but entry?
CVE-2022-1664: no packages for Image SLES15-SP4-SAP-Hardened-GCE, but entry?
CVE-2022-1664: no packages for Image SLES15-SP6-BYOS, but entry?
CVE-2022-1664: no packages for Container suse/manager/5.0/x86_64/server:5.0.0-beta1.2.122, but entry?
CVE-2022-1664: no packages for Image SLES15-SP5-CHOST-BYOS-Azure, but entry?
CVE-2022-1664: no packages for Container suse/sles/15.5/libguestfs-tools:0.58.0.17.143, but entry?
CVE-2022-1664: no packages for Image SLES15-SP3-CHOST-BYOS-EC2, but entry?
CVE-2022-1664: no packages for Image SLES12-SP5-Azure-BYOS, but entry?
CVE-2022-1664: no packages for Image SLES15-SP6-SAP-BYOS, but entry?
CVE-2022-1664: no packages for Image SLES15-SP4-Micro-5-4, but entry?
CVE-2022-1664: no packages for Image SLES15-SP4-Hardened-BYOS-EC2, but entry?
CVE-2022-1664: no packages for Image SLES15-SP5-Manager-Server-5-0-BYOS-EC2, but entry?
CVE-2022-1664: no packages for Image SLES15-SP6-CHOST-BYOS-GDC, but entry?
CVE-2022-1664: no packages for Container bci/bci-sle15-kernel-module-devel:15.5.3.2, but entry?
CVE-2022-1664: no packages for Image SLES12-SP5-Azure-Standard-On-Demand, but entry?
CVE-2022-1664: no packages for Container suse/sle-micro/5.2/toolbox:11.1-6.2.139, but entry?
CVE-2022-1664: no packages for Container ses/7.1/cephcsi/cephcsi:v3.7.0.0, but entry?
CVE-2022-1664: no packages for Container bci/rust:1.80, but entry?
CVE-2022-1664: no packages for Image SLES15-SP4-Manager-Server-4-3-EC2-llc, but entry?
CVE-2022-1664: no packages for Container suse/sles/15.5/virt-launcher:0.58.0.20.46, but entry?
CVE-2022-1664: no packages for Image SLES15-SP4-HPC-BYOS-Azure, but entry?
CVE-2022-1664: no packages for Image SLES15-SP6-CHOST-BYOS-GCE, but entry?
CVE-2022-1664: no packages for Image SLES15-SP3-Micro-5-2-BYOS-GCE, but entry?
CVE-2022-1664: no packages for Container bci/golang:1.21-2.34.5, but entry?
CVE-2022-1664: no packages for Image SLES15-SP4-Azure-Basic, but entry?
CVE-2022-1664: no packages for Image SLES15-SP4-Manager-Server-4-3, but entry?
CVE-2022-1664: no packages for Image SLES12-SP5-GCE-SAP-BYOS, but entry?
CVE-2022-1664: no packages for Container bci/php-apache:8-4.1, but entry?
CVE-2022-1664: no packages for Container suse/pcp:5.3.7-36.5, but entry?
CVE-2022-1664: no packages for Container bci/bci-sle15-kernel-module-devel:15.5, but entry?
CVE-2022-1664: no packages for Image SLES15-SP4-SAP, but entry?
CVE-2022-1664: no packages for Image SLES15-SP5-HPC-GCE, but entry?
CVE-2022-1664: no packages for Image SLES15-SP3-CHOST-BYOS-Aliyun, but entry?
CVE-2022-1664: no packages for Image SLES15-SP4-Manager-Proxy-4-3-BYOS-EC2, but entry?
CVE-2022-1664: no packages for Container bci/php:8-4.1, but entry?
CVE-2022-1664: no packages for Image SLES15-SP4-CHOST-BYOS-SAP-CCloud, but entry?
CVE-2022-1664: no packages for Container bci/openjdk:11-32.33, but entry?
CVE-2022-1664: no packages for Container bci/rust:1.77, but entry?
CVE-2022-1664: no packages for Image SLES15-SP5-CHOST-BYOS-Aliyun, but entry?
CVE-2022-1664: no packages for Image SLES15-SP5-Micro-5-5-Azure, but entry?
CVE-2022-1664: no packages for Image SLES15-SP5-CHOST-BYOS-GDC, but entry?
CVE-2022-1664: no packages for SUSE Linux Enterprise Micro 5.3, but entry?
CVE-2022-1664: no packages for Image SLES12-SP5-GCE-On-Demand, but entry?
CVE-2022-1664: no packages for Image SLES15-SP4-SAP-BYOS-EC2, but entry?
CVE-2022-1664: no packages for Image SLES15-SP6-SAP-Azure-LI-BYOS-Production, but entry?
CVE-2022-1664: no packages for Container suse/manager/5.0/x86_64/server-hub-xmlrpc-api:5.0.0-beta1.1.86, but entry?
CVE-2022-1664: no packages for Image SLES15-SP4-SAP-Azure, but entry?
CVE-2022-1664: no packages for Image SLES15-SP5-Micro-5-5-BYOS-EC2, but entry?
CVE-2022-1664: no packages for Image SLES15-SP6-SAP-BYOS-EC2, but entry?
CVE-2022-1664: no packages for Image SLES15-SP3-CHOST-BYOS-GCE, but entry?
CVE-2022-1664: no packages for SUSE Linux Enterprise Server 12 SP3-TERADATA, but entry?
CVE-2022-1664: no packages for Container suse/sle-micro/5.5:2.0.2-4.2.20, but entry?
CVE-2022-1664: no packages for Container bci/rust:1.66, but entry?
CVE-2022-1664: no packages for Image SLES15-SP6-BYOS-Azure, but entry?
CVE-2022-1664: no packages for Container ses/7.1/rook/ceph:1.10.1.16.4.5.328, but entry?
CVE-2022-1664: no packages for Image SLES15-SP4-SAP-Hardened-BYOS, but entry?
CVE-2022-1664: no packages for Container suse/sle-micro/5.5/toolbox:12.1-2.2.1, but entry?
CVE-2022-1664: no packages for Image SLES15-SP4-Micro-5-4-BYOS-EC2, but entry?
CVE-2022-1664: no packages for Image SLES15-SP2-SAP-BYOS-Azure, but entry?
CVE-2022-1664: no packages for Container suse/sle-micro-rancher/5.4:latest, but entry?
CVE-2022-1664: no packages for Image SLES15-SP6-SAP-BYOS-Azure, but entry?
CVE-2022-1664: no packages for Image SLES12-SP5-Azure-HPC-BYOS, but entry?
CVE-2022-1664: no packages for Container bci/golang:1.18-18.40, but entry?
CVE-2022-1664: no packages for Image SLES15-SP4-Manager-Server-4-3-Azure-ltd, but entry?
CVE-2022-1664: no packages for Image SLES15-SP6-CHOST-BYOS-SAP-CCloud, but entry?
CVE-2022-1664: no packages for Image SLES15-SP6-HPC, but entry?
CVE-2022-1664: no packages for Image SLES15-SP5-CHOST-BYOS-EC2, but entry?
CVE-2022-1664: no packages for Container rancher/elemental-teal-iso/5.3:latest, but entry?
CVE-2022-1664: no packages for Image SLES15-SP3-SAP-BYOS-EC2-HVM, but entry?
CVE-2022-1664: no packages for Image SLES15-SP5-SAP-EC2, but entry?
CVE-2022-1664: no packages for Image SLES15-SP5-SAP-Hardened-GCE, but entry?
CVE-2022-1664: no packages for Image SLES15-SP3-Manager-4-2-Proxy-BYOS-EC2-HVM, but entry?
CVE-2022-1664: no packages for Image SLES12-SP4-SAP-Azure-LI-BYOS-Production, but entry?
CVE-2022-1664: no packages for Image SLES15-SP3-HPC-BYOS-GCE, but entry?
CVE-2022-1664: no packages for Image SLES15-SP6-HPC-BYOS-GCE, but entry?
CVE-2022-1664: no packages for Image SLES12-SP5-EC2-BYOS, but entry?
CVE-2022-1664: no packages for Image SLES15-SP3-SAP-BYOS-GCE, but entry?
CVE-2022-1664: no packages for Image SLES15-SP3-Micro-5-2-BYOS-Azure, but entry?
CVE-2022-1664: no packages for Container bci/ruby:latest, but entry?
CVE-2022-1664: no packages for Image SLES15-SP4-SAP-Hardened-BYOS-GCE, but entry?
CVE-2022-1664: no packages for Container bci/bci-init:15.4.24.39, but entry?
CVE-2022-1664: no packages for Container suse/postgres:14.8-11.1, but entry?
CVE-2022-1664: no packages for Container rancher/elemental-teal-rt/5.3:latest, but entry?
CVE-2022-1664: no packages for Image SLES15-SP5-HPC-BYOS-Azure, but entry?
CVE-2022-1664: no packages for Image SLES15-SP5-Micro-5-5-GCE, but entry?
CVE-2022-1664: no packages for Image SLES15-SP5-Micro-5-5-BYOS, but entry?
CVE-2022-1664: no packages for Container bci/rust:oldstable-3.3, but entry?
CVE-2022-1664: no packages for Image SLES15-SP6-EC2-ECS-HVM, but entry?
CVE-2022-1664: no packages for Image SLES15-SP4-Micro-5-3-BYOS, but entry?
CVE-2022-1664: no packages for Image SLES15-SP3-Manager-4-2-Server-BYOS-GCE, but entry?
CVE-2022-1664: no packages for Image SLES15-SP5-SAP-Hardened-BYOS-GCE, but entry?
CVE-2022-1664: no packages for Image SLES12-SP5-GCE-SAP-On-Demand, but entry?
CVE-2022-1664: no packages for Container bci/rust:1.60-6.35, but entry?
CVE-2022-1664: no packages for Image SLES15-SP3-CHOST-BYOS-Azure, but entry?
CVE-2022-1664: no packages for Image SLES15-SP4-HPC-EC2, but entry?
CVE-2022-1664: no packages for Image SLES15-SP4-Micro-5-3-BYOS-GCE, but entry?
CVE-2022-1664: no packages for Container bci/php-fpm:8-4.1, but entry?
CVE-2022-1664: no packages for Image SLES15-SP5-HPC-BYOS-EC2, but entry?
CVE-2022-1664: no packages for Image SLES15-SP6-SAPCAL-EC2, but entry?
CVE-2022-1664: no packages for Image SLES15-SP4-Micro-5-4-BYOS-Azure, but entry?
CVE-2022-1664: no packages for Image SLES15-SP4-SAPCAL, but entry?
CVE-2022-1664: no packages for Image SLES15-SP3-HPC-BYOS-EC2-HVM, but entry?
CVE-2022-1664: no packages for Image SLES15-SP4-Hardened-BYOS-Azure, but entry?
CVE-2022-1664: no packages for Image SLES15-SP6-HPC-BYOS-Azure, but entry?
CVE-2022-1664: no packages for Container ses/7.1/ceph/haproxy:2.0.14.3.5.330, but entry?
CVE-2022-1664: no packages for Image SLES15-SP5-Azure-Basic, but entry?
CVE-2022-1664: no packages for Container suse/rmt-mariadb:10.11-36.1, but entry?
CVE-2022-1664: no packages for Image SLES15-SP5-Manager-Server-5-0-BYOS-Azure, but entry?
CVE-2022-1664: no packages for Image SLES15-SP4-SAP-BYOS-GCE, but entry?
CVE-2022-1664: no packages for Container caasp/v4/helm-tiller:2.16.12, but entry?
CVE-2022-1664: no packages for Image SLES15-SP4-SAP-BYOS, but entry?
CVE-2022-1664: no packages for Container rancher/elemental-teal-rt/5.4:latest, but entry?
CVE-2022-1664: no packages for SUSE Linux Enterprise Module for Basesystem 15 SP4, but entry?
CVE-2022-1664: no packages for Image SLES15-SP3-BYOS-Azure, but entry?
CVE-2022-1664: no packages for Image SLES15-SP6-CHOST-BYOS-Aliyun, but entry?
CVE-2022-1664: no packages for Container suse/postgres:15, but entry?
CVE-2022-1664: no packages for Image SLES15-SP5-BYOS-GCE, but entry?
CVE-2022-1664: no packages for Container bci/bci-init:15.4, but entry?
CVE-2022-1664: no packages for Image SLES15-SP2-SAP-BYOS-GCE, but entry?
CVE-2022-1664: no packages for Image SLES12-SP5-Azure-SAP-On-Demand, but entry?
CVE-2022-1664: no packages for Container bci/openjdk:17-7.1, but entry?
CVE-2022-1664: no packages for Container suse/postgres:16.2-36.4, but entry?
CVE-2022-1664: no packages for Image SLES15-SP6-SAP-Hardened-BYOS-GCE, but entry?
CVE-2022-1664: no packages for Image SLES15-SP4-Micro-5-3-BYOS-Azure, but entry?
CVE-2022-1664: no packages for Image SLES15-SP4-Manager-Server-4-3-Azure-llc, but entry?
CVE-2022-1664: no packages for Container suse/manager/4.3/proxy-tftpd:latest, but entry?
CVE-2022-1664: no packages for Image SLES15-SP5-Manager-Proxy-5-0-BYOS, but entry?
CVE-2022-1664: no packages for Image SLES15-SP4-SAP-Hardened, but entry?
CVE-2022-1664: no packages for SUSE Linux Enterprise Module for Basesystem 15 SP3, but entry?
CVE-2022-1664: no packages for Image SLES15-SP6-CHOST-BYOS-Azure, but entry?
CVE-2022-1664: no packages for Image SLES15-SP4-BYOS, but entry?
CVE-2022-1664: no packages for Image SLES15-SP6-SAPCAL, but entry?
CVE-2022-1664: no packages for Image SLES15-SP5-SAP-Azure-VLI-BYOS, but entry?
CVE-2022-1664: no packages for Container suse/manager/5.0/x86_64/proxy-httpd:5.0.0-beta1.2.94, but entry?
CVE-2022-1664: no packages for Image SLES15-SP4-HPC-BYOS, but entry?
CVE-2022-1664: no packages for Image SLES15-SP4-EC2, but entry?
CVE-2022-1664: no packages for Container ses/7.1/ceph/keepalived:2.0.19.3.5.316, but entry?
CVE-2022-1664: no packages for Container suse/sle-micro/5.1/toolbox:11.1-2.2.318, but entry?
CVE-2022-1664: no packages for Image SLES15-SP5-SAP-Azure-LI-BYOS-Production, but entry?
CVE-2022-1664: no packages for Container bci/golang:1.16-30.88, but entry?
CVE-2022-1664: no packages for Image SLES15-SP5-EC2, but entry?
CVE-2022-1664: no packages for SUSE Linux Enterprise Module for Basesystem 15 SP6, but entry?
CVE-2022-1664: no packages for Image SLES15-SP4-Micro-5-4-GCE, but entry?
CVE-2022-1664: no packages for Container bci/golang:1.22, but entry?
CVE-2022-1664: no packages for Image SLES15-SP3-Manager-4-2-Proxy-BYOS-Azure, but entry?
CVE-2022-1664: no packages for Image SLES15-SP3-SAP-Azure-VLI-BYOS-Production, but entry?
CVE-2022-1664: no packages for Image SLES15-SP3-HPC-BYOS-Azure, but entry?
CVE-2022-1664: no packages for Container suse/sles/15.6/libguestfs-tools:1.1.1.23.352, but entry?
CVE-2022-1664: no packages for Image SLES15-SP6-Hardened-BYOS-EC2, but entry?
CVE-2022-1664: no packages for Image SLES15-SP3-Micro-5-2-BYOS-EC2-HVM, but entry?
CVE-2022-1664: no packages for Image SLES15-SP3-SAPCAL-Azure, but entry?
CVE-2022-1664: no packages for Image SLES15-SP6-BYOS-GCE, but entry?
CVE-2022-1664: no packages for Container bci/rust:1.61-7.35, but entry?
CVE-2022-1664: no packages for Image SLES15-SP4-Manager-Server-4-3-EC2-ltd, but entry?
CVE-2022-1664: no packages for Image SLES15-SP6-Hardened-BYOS, but entry?
CVE-2022-1664: no packages for Container bci/bci-init:15.5.6.1, but entry?
CVE-2022-1664: no packages for Image SLES15-SP4-CHOST-BYOS-EC2, but entry?
CVE-2022-1664: no packages for Image SLES15-SP6-SAP-Hardened-BYOS-Azure, but entry?
CVE-2022-1664: no packages for Container trento/trento-runner:1.1.0-build4.19.12, but entry?
CVE-2022-1664: no packages for Image SLES15-SP4-EC2-ECS-HVM, but entry?
CVE-2022-1664: no packages for Image SLES15-SP2-SAP-BYOS-EC2-HVM, but entry?
CVE-2022-1664: no packages for Container bci/golang:stable-openssl-34.5, but entry?
CVE-2022-1664: no packages for Container suse/sles/15.5/cdi-importer:1.55.0.17.295, but entry?
CVE-2022-1664: no packages for Image SLES15-SP6-SAPCAL-Azure, but entry?
CVE-2022-1664: no packages for Image SLES15-SP4-CHOST-BYOS-Aliyun, but entry?
CVE-2022-1664: no packages for Image SLES15-SP6-HPC-BYOS, but entry?
CVE-2022-1664: no packages for Image SLES15-SP4-SUSE-Rancher-Setup-BYOS, but entry?
CVE-2022-1664: no packages for Image SLES15-SP4-Hardened-BYOS-GCE, but entry?
CVE-2022-1664: no packages for Image SLES15-SP4-HPC-BYOS-GCE, but entry?
CVE-2022-1664: no packages for Image SLES15-SP4-Micro-5-3-EC2, but entry?
CVE-2022-1664: no packages for Image SLES15-SP4-Azure-Standard, but entry?
CVE-2022-1664: no packages for Container bci/php:8-31.4, but entry?
CVE-2022-1664: no packages for Image SLES15-SP6-Azure-Basic, but entry?
CVE-2022-1664: no packages for Image SLES15-SP2-SAP-Azure-VLI-BYOS-Production, but entry?
CVE-2022-1664: no packages for Container suse/sle-micro/5.3/toolbox:11.1-5.2.37, but entry?
CVE-2022-1664: no packages for Image SLES15-SP4-SAP-Hardened-EC2, but entry?
CVE-2022-1664: no packages for Image SLES15-SP4-BYOS-EC2, but entry?
CVE-2022-1664: no packages for Image SLES15-SP5-SAP-Azure, but entry?
CVE-2022-1664: no packages for Container suse/manager/5.0/x86_64/server-attestation:5.0.0-beta2.2.16, but entry?
CVE-2022-1664: no packages for Container bci/rust:1.65, but entry?
CVE-2022-1664: no packages for Image SLES15-SP5-Manager-Proxy-5-0-BYOS-GCE, but entry?
CVE-2022-1664: no packages for Image SLES15-SP5-Hardened-BYOS-Azure, but entry?
CVE-2022-1664: no packages for Image SLES15-SP6-SAP-Azure-VLI-BYOS, but entry?
CVE-2022-1664: no packages for Container suse/rmt-server:2.17-17.3, but entry?
CVE-2022-1664: no packages for Container suse/sle-micro/rt-5.5:2.0.2-3.2.23, but entry?
CVE-2022-1664: no packages for SUSE Linux Enterprise Micro 5.1, but entry?
CVE-2022-1664: no packages for Image SLES15-SP5-SAP-Azure-VLI-BYOS-Production, but entry?
CVE-2022-1664: no packages for Container suse/nginx:1.21-36.4, but entry?
CVE-2022-1664: no packages for Image SLES15-SP5-BYOS-Azure, but entry?
CVE-2022-1664: no packages for Container suse/sle-micro-rancher/5.2:latest, but entry?
CVE-2022-1664: no packages for Container bci/nodejs:18-6.1, but entry?
CVE-2022-1664: no packages for Image SLES12-SP5-Azure-Basic-On-Demand, but entry?
CVE-2022-1664: no packages for Image SLES15-SP4-CHOST-BYOS-GCE, but entry?
CVE-2022-1664: no packages for Image SLES15-SP4-SAP-Hardened-BYOS-EC2, but entry?
CVE-2022-1664: no packages for Image SLES15-SP6-HPC-BYOS-EC2, but entry?
CVE-2022-1664: no packages for SUSE Linux Enterprise Server 12 SP5, but entry?
CVE-2022-1664: no packages for Image SLES15-SP4, but entry?
CVE-2022-1664: no packages for Container bci/spack:0.21.2-2.1, but entry?
CVE-2022-1664: no packages for Container bci/nodejs:20-31.5, but entry?
CVE-2022-1664: no packages for Image SLES15-SP4-HPC-Azure, but entry?
CVE-2022-1664: no packages for Container suse/manager/4.3/proxy-httpd:latest, but entry?
CVE-2022-1664: no packages for Image SLES15-SP5-SAP-Hardened-EC2, but entry?
CVE-2022-1664: no packages for Image SLES15-SP3-Micro-5-1-BYOS-GCE, but entry?
CVE-2022-1664: no packages for Image SLES15-SP5-HPC-Azure, but entry?
CVE-2022-1664: no packages for Image SLES15-SP4-HPC, but entry?
CVE-2022-1664: no packages for Container bci/rust:1.59-9.95, but entry?
CVE-2022-1664: no packages for Image SLES15-SP6-Hardened-BYOS-GCE, but entry?
CVE-2022-1664: no packages for Image SLES15-SP4-SAP-Hardened-Azure, but entry?
CVE-2022-1664: no packages for Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production, but entry?
CVE-2022-1664: no packages for Image SLES15-SP4-HPC-BYOS-EC2, but entry?
CVE-2022-1664: no packages for Image SLES15-SP4-Manager-Server-4-3-BYOS-EC2, but entry?
CVE-2022-1664: no packages for Container suse/postgres:12.14-21.1, but entry?
CVE-2022-1664: no packages for Image SLES15-SP5-Micro-5-5-EC2, but entry?
CVE-2022-1664: no packages for Image SLES15-SP5-SAP-Azure-LI-BYOS, but entry?
CVE-2022-1664: no packages for Container bci/nodejs:14-35.31, but entry?
CVE-2022-1664: no packages for Image SLES15-SP4-SAP-Azure-VLI-BYOS-Production, but entry?
CVE-2022-1664: no packages for Image SLES15-SP4-SAP-BYOS-Azure, but entry?
CVE-2022-1664: no packages for Image SLES15-SP5-CHOST-BYOS-GCE, but entry?
CVE-2022-1664: no packages for Image SLES15-SP6-SAP-Azure, but entry?
CVE-2022-1664: no packages for Image SLES15-SP5-SAPCAL-GCE, but entry?
CVE-2022-1664: no packages for Image SLES12-SP5-SAP-Azure-LI-BYOS-Production, but entry?
CVE-2022-1664: no packages for Image SLES15-SP6-HPC-Azure, but entry?
CVE-2022-1664: no packages for Image SLES15-SP4-Manager-Server-4-3-BYOS-GCE, but entry?
CVE-2022-1664: no packages for Container bci/rust:1.67, but entry?
CVE-2022-1664: no packages for Container bci/python:3.11-42.5, but entry?
CVE-2022-1664: no packages for Container bci/openjdk-devel:11-6.2, but entry?
CVE-2022-1664: no packages for Image SLES15-SP2-BYOS-Azure, but entry?
CVE-2022-1664: no packages for Image SLES15-SP6-SAPCAL-GCE, but entry?
CVE-2022-1664: no packages for Image SLES15-SP6-SAP-Hardened-GCE, but entry?
CVE-2022-1664: no packages for Image SLES15-SP4-Hardened-BYOS, but entry?
CVE-2022-1664: no packages for Image SLES15-SP6-SAP-GCE, but entry?
CVE-2022-1664: no packages for Container bci/python:3.9-20.43, but entry?
CVE-2022-1664: no packages for Image SLES15-SP4-Manager-Server-4-3-BYOS-Azure, but entry?
CVE-2022-1664: no packages for Container rancher/elemental-teal/5.3:latest, but entry?
CVE-2022-1664: no packages for Image SLES15-SP5-Manager-Proxy-5-0-BYOS-Azure, but entry?
CVE-2022-1664: no packages for Image SLES15-SP3-Manager-4-2-Server-BYOS-EC2-HVM, but entry?
CVE-2022-1664: no packages for Image SLES15-SP5-SAP-BYOS-Azure, but entry?
CVE-2022-1664: no packages for Image SLES15-SP5-BYOS-EC2, but entry?
CVE-2022-1664: no packages for Image SLES15-SP5-SAP-GCE, but entry?
CVE-2022-1664: no packages for Image SLES15-SP6, but entry?
CVE-2022-1664: no packages for Container bci/rust:1.62-5.2, but entry?
CVE-2022-1664: no packages for Image SLES15-SP5-Manager-Server-5-0-BYOS-GCE, but entry?
CVE-2022-1664: no packages for Image SLES15-SP4-SAP-Hardened-BYOS-Azure, but entry?
CVE-2022-1664: no packages for Image SLES15-SP5-CHOST-BYOS-SAP-CCloud, but entry?
CVE-2022-1664: no packages for Image SLES12-SP5-GCE-BYOS, but entry?
CVE-2022-1664: no packages for Container suse/sle-micro/kvm-5.5:2.0.2-2.2.20, but entry?
CVE-2022-1664: no packages for Container suse/hpc/warewulf4-x86_64/sle-hpc-node:15.6.17.5.5, but entry?
CVE-2022-1664: no packages for Container suse/sles/15.7/virt-handler:1.1.1.29.4, but entry?
CVE-2022-1664: no packages for Image SLES15-SP5-SAPCAL-Azure, but entry?
CVE-2022-1664: no packages for Container suse/389-ds:2.2-36.3, but entry?
CVE-2022-1664: no packages for Image SLES15-SP4-BYOS-Azure, but entry?
CVE-2022-1664: no packages for Container suse/sles/15.6/virt-launcher:1.1.1.28.74, but entry?
CVE-2022-1664: no packages for Container bci/openjdk-devel:17-7.2, but entry?
CVE-2022-1664: no packages for Container suse/sles/15.7/libguestfs-tools:1.1.1.28.5, but entry?
CVE-2022-1664: no packages for Image SLES15-SP6-SAP-Hardened, but entry?
CVE-2022-1664: no packages for Image SLES15-SP3-SAP-Azure-LI-BYOS-Production, but entry?
CVE-2022-1664: no packages for Container bci/openjdk-devel:11-36.80, but entry?
CVE-2022-1664: no packages for Image SLES15-SP4-Micro-5-3-GCE, but entry?
CVE-2022-1664: no packages for Image SLES15-SP5-HPC-BYOS-GCE, but entry?
CVE-2022-1664: no packages for Container suse/sles/15.5/virt-handler:0.58.0.18.193, but entry?
CVE-2022-1664: no packages for Image SLES15-SP5-Manager-Server-5-0-BYOS, but entry?
CVE-2022-1664: no packages for openSUSE Leap Micro 5.3, but entry?
CVE-2022-1664: no packages for Container caasp/v4/cilium:1.6.6, but entry?
CVE-2022-1664: no packages for Image SLES15-SP4-HPC-GCE, but entry?
CVE-2022-1664: no packages for Image SLES15-SP6-BYOS-EC2, but entry?
CVE-2022-1664: no packages for Container bci/php-apache:8-31.4, but entry?
CVE-2022-1664: no packages for Image SLES15-SP2-SAP-EC2-HVM, but entry?
CVE-2022-1664: no packages for Image SLES15-SP6-SAP-Azure-VLI-BYOS-Production, but entry?
CVE-2022-1664: no packages for Image SLES15-SP3-Micro-5-1-BYOS-Azure, but entry?
CVE-2022-1664: no packages for Image SLES12-SP5-EC2-SAP-BYOS, but entry?
CVE-2022-1664: no packages for Image SLES15-SP4-Micro-5-4-BYOS, but entry?
CVE-2022-1664: no packages for Image SLES12-SP5-EC2-On-Demand, but entry?
CVE-2022-1664: no packages for Image SLES15-SP5-Micro-5-5-BYOS-Azure, but entry?
CVE-2022-1664: no packages for Container suse/sle-micro-rancher/5.3:latest, but entry?
CVE-2022-1664: no packages for Image SLES15-SP4-Manager-Proxy-4-3-BYOS-Azure, but entry?
CVE-2022-1664: no packages for SUSE Linux Enterprise Micro 5.2, but entry?
CVE-2022-1664: no packages for Image SLES15-SP5-SAP-Hardened-BYOS-Azure, but entry?
CVE-2022-1664: no packages for Container bci/golang:oldstable-3.4, but entry?
CVE-2022-1664: no packages for Container suse/manager/5.0/x86_64/server-migration-14-16:5.0.0-beta1.2.185, but entry?
CVE-2022-1664: no packages for Image SLES15-SP3-CHOST-BYOS-SAP-CCloud, but entry?
CVE-2022-1664: no packages for Image SLES15-SP4-Micro-5-3-BYOS-EC2, but entry?
CVE-2022-1664: no packages for Image SLES15-SP6-SAP-Hardened-BYOS-EC2, but entry?
CVE-2022-1664: no packages for Container rancher/elemental-teal-iso/5.4:latest, but entry?
CVE-2022-1664: no packages for Image SLES15-SP4-SAP-Azure-VLI-BYOS, but entry?
CVE-2022-1664: no packages for Image SLES12-SP4-SAP-Azure-VLI-BYOS-Production, but entry?
CVE-2022-1664: no packages for Image SLES15-SP6-SAP-Azure-LI-BYOS, but entry?
CVE-2022-1664: no packages for Image SLES15-SP6-GCE, but entry?
CVE-2022-1664: no packages for Image SLES15-SP4-Micro-5-3, but entry?
CVE-2022-1664: no packages for Image SLES15-SP6-SAP-EC2, but entry?
CVE-2022-1664: no packages for Image SLES15-SP3-Micro-5-1-BYOS-EC2-HVM, but entry?
CVE-2022-1664: no packages for Image SLES15-SP5-HPC-EC2, but entry?
CVE-2022-1664: no packages for Image SLES15-SP6-SAP-Hardened-Azure, but entry?
CVE-2022-1664: no packages for Image SLES15-SP4-SAP-GCE, but entry?
CVE-2022-1664: no packages for Image SLES15-SP4-Manager-Proxy-4-3-BYOS-GCE, but entry?
CVE-2022-1664: no packages for Image SLES15-SP5-SAP-BYOS-EC2, but entry?
CVE-2022-1664: no packages for Image SLES15-SP5-EC2-ECS-HVM, but entry?
CVE-2022-1664: no packages for Container bci/rust:1.64, but entry?
CVE-2022-1664: no packages for Container bci/golang:1.17-29.88, but entry?
CVE-2022-1664: no packages for Image SLES15-SP5-Hardened-BYOS-EC2, but entry?
CVE-2022-1664: no packages for Image SLES15-SP5-Manager-Proxy-5-0-BYOS-EC2, but entry?
CVE-2022-1664: no packages for Image SLES15-SP6-HPC-GCE, but entry?
CVE-2022-1664: no packages for Image SLES15-SP4-SAP-EC2, but entry?
CVE-2022-1664: no packages for Container bci/openjdk:11-7.1, but entry?
CVE-2022-1664: no packages for Image SLES15-SP4-GCE, but entry?
CVE-2022-1664: no packages for Image SLES15-SP6-SAP-Hardened-EC2, but entry?
CVE-2022-1664: no packages for Container bci/kiwi:9.24.43-8.6, but entry?
CVE-2022-1664: no packages for Image SLES15-SP6-CHOST-BYOS, but entry?
CVE-2022-1664: no packages for Container suse/pcp:5, but entry?
CVE-2022-1664: no packages for Image SLES15-SP3-BYOS-GCE, but entry?
CVE-2022-1664: no packages for Image SLES15-SP4-Micro-5-3-Azure, but entry?
CVE-2022-1664: no packages for Image SLES15-SP6-HPC-EC2, but entry?
CVE-2022-1664: no packages for Image SLES15-SP3-Manager-4-2-Proxy-BYOS-GCE, but entry?
CVE-2022-1664: no packages for Image SLES15-SP4-SUSE-Rancher-Setup-BYOS-EC2, but entry?
CVE-2022-1664: no packages for Image SLES15-SP4-Micro-5-4-Azure, but entry?
CVE-2022-1664: no packages for Image SLES15-SP5-SAPCAL-EC2, but entry?
CVE-2022-1664: no packages for Image SLES15-SP4-SAPCAL-Azure, but entry?
CVE-2022-1664: no packages for Image SLES15-SP4-Manager-Proxy-4-3-BYOS, but entry?
CVE-2022-1664: no packages for Container bci/nodejs:12-17.65, but entry?
CVE-2022-1664: no packages for Image SLES15-SP4-SAPCAL-EC2, but entry?
CVE-2022-1664: no packages for Image SLES15-SP5-GCE, but entry?
CVE-2022-1664: no packages for Image SLES15-SP5-Hardened-BYOS-GCE, but entry?
CVE-2022-1664: no packages for openSUSE Leap Micro 5.2, but entry?
CVE-2022-1664: no packages for Container trento/trento-db:14.5-rev1.0.0-build2.2.178, but entry?
CVE-2022-1664: no packages for Image SLES15-SP5-SAP-Hardened-Azure, but entry?
CVE-2022-1664: no packages for Image SLES15-SP3-Manager-4-2-Server-BYOS-Azure, but entry?
CVE-2022-1664: no packages for Image SLES15-SP4-Micro-5-4-EC2, but entry?
CVE-2022-1664: no packages for Image SLES15-SP5-SAP-BYOS-GCE, but entry?
CVE-2022-1664: no packages for Image SLES12-SP5-EC2-SAP-On-Demand, but entry?
CVE-2022-1664: no packages for Image SLES15-SP2-SAP-GCE, but entry?
CVE-2022-1664: no packages for Image SLES15-SP6-SAP-BYOS-GCE, but entry?
CVE-2022-1664: no packages for Image SLES15-SP5-SAP-Hardened-BYOS-EC2, but entry?
CVE-2022-1664: no packages for Container suse/manager/5.0/x86_64/proxy-tftpd:5.0.0-beta1.2.90, but entry?
CVE-2022-1664: no packages for Image SLES15-SP2-HPC-BYOS-Azure, but entry?
CVE-2022-1664: no packages for Image SLES15-SP6-CHOST-BYOS-EC2, but entry?
CVE-2022-1664: no packages for Container trento/trento-wanda:1.0.0-build1.5.2, but entry?
CVE-2022-1664: no packages for Image SLES15-SP1-SAP-Azure-LI-BYOS-Production, but entry?
CVE-2022-1664: no packages for Image SLES15-SP4-CHOST-BYOS-Azure, but entry?
no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2022-1664
CVE-2022-1664: no packages for Container bci/bci-init:15.3.21.55, but entry?
CVE-2022-1664: no packages for Container bci/bci-init:15.4, but entry?
CVE-2022-1664: no packages for Container bci/bci-init:15.4.24.39, but entry?
CVE-2022-1664: no packages for Container bci/bci-init:15.5.6.1, but entry?
CVE-2022-1664: no packages for Container bci/bci-sle15-kernel-module-devel:15.5, but entry?
CVE-2022-1664: no packages for Container bci/bci-sle15-kernel-module-devel:15.5.3.2, but entry?
CVE-2022-1664: no packages for Container bci/golang:1.16-30.88, but entry?
CVE-2022-1664: no packages for Container bci/golang:1.17-29.88, but entry?
CVE-2022-1664: no packages for Container bci/golang:1.18-18.40, but entry?
CVE-2022-1664: no packages for Container bci/golang:1.21-2.34.5, but entry?
CVE-2022-1664: no packages for Container bci/golang:1.22, but entry?
CVE-2022-1664: no packages for Container bci/golang:oldstable-3.4, but entry?
CVE-2022-1664: no packages for Container bci/golang:oldstable-openssl-34.5, but entry?
CVE-2022-1664: no packages for Container bci/golang:stable-openssl-34.5, but entry?
CVE-2022-1664: no packages for Container bci/kiwi:9.24.43-8.6, but entry?
CVE-2022-1664: no packages for Container bci/nodejs:12-17.65, but entry?
CVE-2022-1664: no packages for Container bci/nodejs:14-35.31, but entry?
CVE-2022-1664: no packages for Container bci/nodejs:16-7.1, but entry?
CVE-2022-1664: no packages for Container bci/nodejs:18-6.1, but entry?
CVE-2022-1664: no packages for Container bci/nodejs:20-31.5, but entry?
CVE-2022-1664: no packages for Container bci/openjdk-devel:11-36.80, but entry?
CVE-2022-1664: no packages for Container bci/openjdk-devel:11-6.2, but entry?
CVE-2022-1664: no packages for Container bci/openjdk-devel:17-7.2, but entry?
CVE-2022-1664: no packages for Container bci/openjdk:11-32.33, but entry?
CVE-2022-1664: no packages for Container bci/openjdk:11-7.1, but entry?
CVE-2022-1664: no packages for Container bci/openjdk:17-7.1, but entry?
CVE-2022-1664: no packages for Container bci/php-apache:8-31.4, but entry?
CVE-2022-1664: no packages for Container bci/php-apache:8-4.1, but entry?
CVE-2022-1664: no packages for Container bci/php-fpm:8-31.4, but entry?
CVE-2022-1664: no packages for Container bci/php-fpm:8-4.1, but entry?
CVE-2022-1664: no packages for Container bci/php:8-31.4, but entry?
CVE-2022-1664: no packages for Container bci/php:8-4.1, but entry?
CVE-2022-1664: no packages for Container bci/python:3.11-42.5, but entry?
CVE-2022-1664: no packages for Container bci/python:3.9-20.43, but entry?
CVE-2022-1664: no packages for Container bci/ruby:latest, but entry?
CVE-2022-1664: no packages for Container bci/rust:1.59-9.95, but entry?
CVE-2022-1664: no packages for Container bci/rust:1.60-6.35, but entry?
CVE-2022-1664: no packages for Container bci/rust:1.61-7.35, but entry?
CVE-2022-1664: no packages for Container bci/rust:1.62-5.2, but entry?
CVE-2022-1664: no packages for Container bci/rust:1.63-4.11, but entry?
CVE-2022-1664: no packages for Container bci/rust:1.64, but entry?
CVE-2022-1664: no packages for Container bci/rust:1.65, but entry?
CVE-2022-1664: no packages for Container bci/rust:1.66, but entry?
CVE-2022-1664: no packages for Container bci/rust:1.67, but entry?
CVE-2022-1664: no packages for Container bci/rust:1.77, but entry?
CVE-2022-1664: no packages for Container bci/rust:1.79-1.4.3, but entry?
CVE-2022-1664: no packages for Container bci/rust:1.80, but entry?
CVE-2022-1664: no packages for Container bci/rust:oldstable-3.3, but entry?
CVE-2022-1664: no packages for Container bci/spack:0.21.2-2.1, but entry?
CVE-2022-1664: no packages for Container caasp/v4/cilium:1.6.6, but entry?
CVE-2022-1664: no packages for Container caasp/v4/helm-tiller:2.16.12, but entry?
CVE-2022-1664: no packages for Container rancher/elemental-builder-image/5.3:latest, but entry?
CVE-2022-1664: no packages for Container rancher/elemental-teal-iso/5.3:latest, but entry?
CVE-2022-1664: no packages for Container rancher/elemental-teal-iso/5.4:latest, but entry?
CVE-2022-1664: no packages for Container rancher/elemental-teal-rt/5.3:latest, but entry?
CVE-2022-1664: no packages for Container rancher/elemental-teal-rt/5.4:latest, but entry?
CVE-2022-1664: no packages for Container rancher/elemental-teal/5.3:latest, but entry?
CVE-2022-1664: no packages for Container rancher/elemental-teal/5.4:latest, but entry?
CVE-2022-1664: no packages for Container ses/7.1/ceph/haproxy:2.0.14.3.5.330, but entry?
CVE-2022-1664: no packages for Container ses/7.1/ceph/keepalived:2.0.19.3.5.316, but entry?
CVE-2022-1664: no packages for Container ses/7.1/cephcsi/cephcsi:v3.7.0.0, but entry?
CVE-2022-1664: no packages for Container ses/7.1/rook/ceph:1.10.1.16.4.5.328, but entry?
CVE-2022-1664: no packages for Container suse/389-ds:2.2-36.3, but entry?
CVE-2022-1664: no packages for Container suse/hpc/warewulf4-x86_64/sle-hpc-node:15.6.17.5.5, but entry?
CVE-2022-1664: no packages for Container suse/manager/4.3/proxy-httpd:latest, but entry?
CVE-2022-1664: no packages for Container suse/manager/4.3/proxy-tftpd:latest, but entry?
CVE-2022-1664: no packages for Container suse/manager/5.0/x86_64/proxy-httpd:5.0.0-beta1.2.94, but entry?
CVE-2022-1664: no packages for Container suse/manager/5.0/x86_64/proxy-tftpd:5.0.0-beta1.2.90, but entry?
CVE-2022-1664: no packages for Container suse/manager/5.0/x86_64/server-attestation:5.0.0-beta2.2.16, but entry?
CVE-2022-1664: no packages for Container suse/manager/5.0/x86_64/server-hub-xmlrpc-api:5.0.0-beta1.1.86, but entry?
CVE-2022-1664: no packages for Container suse/manager/5.0/x86_64/server-migration-14-16:5.0.0-beta1.2.185, but entry?
CVE-2022-1664: no packages for Container suse/manager/5.0/x86_64/server:5.0.0-beta1.2.122, but entry?
CVE-2022-1664: no packages for Container suse/nginx:1.21-36.4, but entry?
CVE-2022-1664: no packages for Container suse/pcp:5, but entry?
CVE-2022-1664: no packages for Container suse/pcp:5.3.7-36.5, but entry?
CVE-2022-1664: no packages for Container suse/postgres:12.14-21.1, but entry?
CVE-2022-1664: no packages for Container suse/postgres:13.10-22.1, but entry?
CVE-2022-1664: no packages for Container suse/postgres:14.8-11.1, but entry?
CVE-2022-1664: no packages for Container suse/postgres:15, but entry?
CVE-2022-1664: no packages for Container suse/postgres:16.2-36.4, but entry?
CVE-2022-1664: no packages for Container suse/rmt-mariadb:10.11-36.1, but entry?
CVE-2022-1664: no packages for Container suse/rmt-server:2.17-17.3, but entry?
CVE-2022-1664: no packages for Container suse/sle-micro-rancher/5.2:latest, but entry?
CVE-2022-1664: no packages for Container suse/sle-micro-rancher/5.3:latest, but entry?
CVE-2022-1664: no packages for Container suse/sle-micro-rancher/5.4:latest, but entry?
CVE-2022-1664: no packages for Container suse/sle-micro/5.1/toolbox:11.1-2.2.318, but entry?
CVE-2022-1664: no packages for Container suse/sle-micro/5.2/toolbox:11.1-6.2.139, but entry?
CVE-2022-1664: no packages for Container suse/sle-micro/5.3/toolbox:11.1-5.2.37, but entry?
CVE-2022-1664: no packages for Container suse/sle-micro/5.4/toolbox:11.1-3.2.10, but entry?
CVE-2022-1664: no packages for Container suse/sle-micro/5.5/toolbox:12.1-2.2.1, but entry?
CVE-2022-1664: no packages for Container suse/sle-micro/5.5:2.0.2-4.2.20, but entry?
CVE-2022-1664: no packages for Container suse/sle-micro/kvm-5.5:2.0.2-2.2.20, but entry?
CVE-2022-1664: no packages for Container suse/sle-micro/rt-5.5:2.0.2-3.2.23, but entry?
CVE-2022-1664: no packages for Container suse/sles/15.5/cdi-importer:1.55.0.17.295, but entry?
CVE-2022-1664: no packages for Container suse/sles/15.5/libguestfs-tools:0.58.0.17.143, but entry?
CVE-2022-1664: no packages for Container suse/sles/15.5/virt-handler:0.58.0.18.193, but entry?
CVE-2022-1664: no packages for Container suse/sles/15.5/virt-launcher:0.58.0.20.46, but entry?
CVE-2022-1664: no packages for Container suse/sles/15.6/libguestfs-tools:1.1.1.23.352, but entry?
CVE-2022-1664: no packages for Container suse/sles/15.6/virt-handler:1.1.1.24.478, but entry?
CVE-2022-1664: no packages for Container suse/sles/15.6/virt-launcher:1.1.1.28.74, but entry?
CVE-2022-1664: no packages for Container suse/sles/15.7/libguestfs-tools:1.1.1.28.5, but entry?
CVE-2022-1664: no packages for Container suse/sles/15.7/virt-handler:1.1.1.29.4, but entry?
CVE-2022-1664: no packages for Container suse/sles/15.7/virt-launcher:1.1.1.33.5, but entry?
CVE-2022-1664: no packages for Container trento/trento-db:14.5-rev1.0.0-build2.2.178, but entry?
CVE-2022-1664: no packages for Container trento/trento-runner:1.1.0-build4.19.12, but entry?
CVE-2022-1664: no packages for Container trento/trento-wanda:1.0.0-build1.5.2, but entry?
CVE-2022-1664: no packages for Image SLES12-SP4-SAP-Azure-LI-BYOS-Production, but entry?
CVE-2022-1664: no packages for Image SLES12-SP4-SAP-Azure-VLI-BYOS-Production, but entry?
CVE-2022-1664: no packages for Image SLES12-SP5-Azure-BYOS, but entry?
CVE-2022-1664: no packages for Image SLES12-SP5-Azure-Basic-On-Demand, but entry?
CVE-2022-1664: no packages for Image SLES12-SP5-Azure-HPC-BYOS, but entry?
CVE-2022-1664: no packages for Image SLES12-SP5-Azure-HPC-On-Demand, but entry?
CVE-2022-1664: no packages for Image SLES12-SP5-Azure-SAP-BYOS, but entry?
CVE-2022-1664: no packages for Image SLES12-SP5-Azure-SAP-On-Demand, but entry?
CVE-2022-1664: no packages for Image SLES12-SP5-Azure-Standard-On-Demand, but entry?
CVE-2022-1664: no packages for Image SLES12-SP5-EC2-BYOS, but entry?
CVE-2022-1664: no packages for Image SLES12-SP5-EC2-ECS-On-Demand, but entry?
CVE-2022-1664: no packages for Image SLES12-SP5-EC2-On-Demand, but entry?
CVE-2022-1664: no packages for Image SLES12-SP5-EC2-SAP-BYOS, but entry?
CVE-2022-1664: no packages for Image SLES12-SP5-EC2-SAP-On-Demand, but entry?
CVE-2022-1664: no packages for Image SLES12-SP5-GCE-BYOS, but entry?
CVE-2022-1664: no packages for Image SLES12-SP5-GCE-On-Demand, but entry?
CVE-2022-1664: no packages for Image SLES12-SP5-GCE-SAP-BYOS, but entry?
CVE-2022-1664: no packages for Image SLES12-SP5-GCE-SAP-On-Demand, but entry?
CVE-2022-1664: no packages for Image SLES12-SP5-SAP-Azure-LI-BYOS-Production, but entry?
CVE-2022-1664: no packages for Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production, but entry?
CVE-2022-1664: no packages for Image SLES15-SP1-SAP-Azure-LI-BYOS-Production, but entry?
CVE-2022-1664: no packages for Image SLES15-SP1-SAP-Azure-VLI-BYOS-Production, but entry?
CVE-2022-1664: no packages for Image SLES15-SP2-BYOS-Azure, but entry?
CVE-2022-1664: no packages for Image SLES15-SP2-HPC-BYOS-Azure, but entry?
CVE-2022-1664: no packages for Image SLES15-SP2-SAP-Azure, but entry?
CVE-2022-1664: no packages for Image SLES15-SP2-SAP-Azure-LI-BYOS-Production, but entry?
CVE-2022-1664: no packages for Image SLES15-SP2-SAP-Azure-VLI-BYOS-Production, but entry?
CVE-2022-1664: no packages for Image SLES15-SP2-SAP-BYOS-Azure, but entry?
CVE-2022-1664: no packages for Image SLES15-SP2-SAP-BYOS-EC2-HVM, but entry?
CVE-2022-1664: no packages for Image SLES15-SP2-SAP-BYOS-GCE, but entry?
CVE-2022-1664: no packages for Image SLES15-SP2-SAP-EC2-HVM, but entry?
CVE-2022-1664: no packages for Image SLES15-SP2-SAP-GCE, but entry?
CVE-2022-1664: no packages for Image SLES15-SP3-BYOS-Azure, but entry?
CVE-2022-1664: no packages for Image SLES15-SP3-BYOS-EC2-HVM, but entry?
CVE-2022-1664: no packages for Image SLES15-SP3-BYOS-GCE, but entry?
CVE-2022-1664: no packages for Image SLES15-SP3-CHOST-BYOS-Aliyun, but entry?
CVE-2022-1664: no packages for Image SLES15-SP3-CHOST-BYOS-Azure, but entry?
CVE-2022-1664: no packages for Image SLES15-SP3-CHOST-BYOS-EC2, but entry?
CVE-2022-1664: no packages for Image SLES15-SP3-CHOST-BYOS-GCE, but entry?
CVE-2022-1664: no packages for Image SLES15-SP3-CHOST-BYOS-SAP-CCloud, but entry?
CVE-2022-1664: no packages for Image SLES15-SP3-HPC-BYOS-Azure, but entry?
CVE-2022-1664: no packages for Image SLES15-SP3-HPC-BYOS-EC2-HVM, but entry?
CVE-2022-1664: no packages for Image SLES15-SP3-HPC-BYOS-GCE, but entry?
CVE-2022-1664: no packages for Image SLES15-SP3-Manager-4-2-Proxy-BYOS-Azure, but entry?
CVE-2022-1664: no packages for Image SLES15-SP3-Manager-4-2-Proxy-BYOS-EC2-HVM, but entry?
CVE-2022-1664: no packages for Image SLES15-SP3-Manager-4-2-Proxy-BYOS-GCE, but entry?
CVE-2022-1664: no packages for Image SLES15-SP3-Manager-4-2-Server-BYOS-Azure, but entry?
CVE-2022-1664: no packages for Image SLES15-SP3-Manager-4-2-Server-BYOS-EC2-HVM, but entry?
CVE-2022-1664: no packages for Image SLES15-SP3-Manager-4-2-Server-BYOS-GCE, but entry?
CVE-2022-1664: no packages for Image SLES15-SP3-Micro-5-1-BYOS-Azure, but entry?
CVE-2022-1664: no packages for Image SLES15-SP3-Micro-5-1-BYOS-EC2-HVM, but entry?
CVE-2022-1664: no packages for Image SLES15-SP3-Micro-5-1-BYOS-GCE, but entry?
CVE-2022-1664: no packages for Image SLES15-SP3-Micro-5-2-BYOS-Azure, but entry?
CVE-2022-1664: no packages for Image SLES15-SP3-Micro-5-2-BYOS-EC2-HVM, but entry?
CVE-2022-1664: no packages for Image SLES15-SP3-Micro-5-2-BYOS-GCE, but entry?
CVE-2022-1664: no packages for Image SLES15-SP3-SAP-Azure-LI-BYOS-Production, but entry?
CVE-2022-1664: no packages for Image SLES15-SP3-SAP-Azure-VLI-BYOS-Production, but entry?
CVE-2022-1664: no packages for Image SLES15-SP3-SAP-BYOS-Azure, but entry?
CVE-2022-1664: no packages for Image SLES15-SP3-SAP-BYOS-EC2-HVM, but entry?
CVE-2022-1664: no packages for Image SLES15-SP3-SAP-BYOS-GCE, but entry?
CVE-2022-1664: no packages for Image SLES15-SP3-SAPCAL-Azure, but entry?
CVE-2022-1664: no packages for Image SLES15-SP3-SAPCAL-EC2-HVM, but entry?
CVE-2022-1664: no packages for Image SLES15-SP3-SAPCAL-GCE, but entry?
CVE-2022-1664: no packages for Image SLES15-SP4, but entry?
CVE-2022-1664: no packages for Image SLES15-SP4-Azure-Basic, but entry?
CVE-2022-1664: no packages for Image SLES15-SP4-Azure-Standard, but entry?
CVE-2022-1664: no packages for Image SLES15-SP4-BYOS, but entry?
CVE-2022-1664: no packages for Image SLES15-SP4-BYOS-Azure, but entry?
CVE-2022-1664: no packages for Image SLES15-SP4-BYOS-EC2, but entry?
CVE-2022-1664: no packages for Image SLES15-SP4-BYOS-GCE, but entry?
CVE-2022-1664: no packages for Image SLES15-SP4-CHOST-BYOS, but entry?
CVE-2022-1664: no packages for Image SLES15-SP4-CHOST-BYOS-Aliyun, but entry?
CVE-2022-1664: no packages for Image SLES15-SP4-CHOST-BYOS-Azure, but entry?
CVE-2022-1664: no packages for Image SLES15-SP4-CHOST-BYOS-EC2, but entry?
CVE-2022-1664: no packages for Image SLES15-SP4-CHOST-BYOS-GCE, but entry?
CVE-2022-1664: no packages for Image SLES15-SP4-CHOST-BYOS-SAP-CCloud, but entry?
CVE-2022-1664: no packages for Image SLES15-SP4-EC2, but entry?
CVE-2022-1664: no packages for Image SLES15-SP4-EC2-ECS-HVM, but entry?
CVE-2022-1664: no packages for Image SLES15-SP4-GCE, but entry?
CVE-2022-1664: no packages for Image SLES15-SP4-HPC, but entry?
CVE-2022-1664: no packages for Image SLES15-SP4-HPC-Azure, but entry?
CVE-2022-1664: no packages for Image SLES15-SP4-HPC-BYOS, but entry?
CVE-2022-1664: no packages for Image SLES15-SP4-HPC-BYOS-Azure, but entry?
CVE-2022-1664: no packages for Image SLES15-SP4-HPC-BYOS-EC2, but entry?
CVE-2022-1664: no packages for Image SLES15-SP4-HPC-BYOS-GCE, but entry?
CVE-2022-1664: no packages for Image SLES15-SP4-HPC-EC2, but entry?
CVE-2022-1664: no packages for Image SLES15-SP4-HPC-GCE, but entry?
CVE-2022-1664: no packages for Image SLES15-SP4-Hardened-BYOS, but entry?
CVE-2022-1664: no packages for Image SLES15-SP4-Hardened-BYOS-Azure, but entry?
CVE-2022-1664: no packages for Image SLES15-SP4-Hardened-BYOS-EC2, but entry?
CVE-2022-1664: no packages for Image SLES15-SP4-Hardened-BYOS-GCE, but entry?
CVE-2022-1664: no packages for Image SLES15-SP4-Manager-Proxy-4-3-BYOS, but entry?
CVE-2022-1664: no packages for Image SLES15-SP4-Manager-Proxy-4-3-BYOS-Azure, but entry?
CVE-2022-1664: no packages for Image SLES15-SP4-Manager-Proxy-4-3-BYOS-EC2, but entry?
CVE-2022-1664: no packages for Image SLES15-SP4-Manager-Proxy-4-3-BYOS-GCE, but entry?
CVE-2022-1664: no packages for Image SLES15-SP4-Manager-Server-4-3, but entry?
CVE-2022-1664: no packages for Image SLES15-SP4-Manager-Server-4-3-Azure-llc, but entry?
CVE-2022-1664: no packages for Image SLES15-SP4-Manager-Server-4-3-Azure-ltd, but entry?
CVE-2022-1664: no packages for Image SLES15-SP4-Manager-Server-4-3-BYOS, but entry?
CVE-2022-1664: no packages for Image SLES15-SP4-Manager-Server-4-3-BYOS-Azure, but entry?
CVE-2022-1664: no packages for Image SLES15-SP4-Manager-Server-4-3-BYOS-EC2, but entry?
CVE-2022-1664: no packages for Image SLES15-SP4-Manager-Server-4-3-BYOS-GCE, but entry?
CVE-2022-1664: no packages for Image SLES15-SP4-Manager-Server-4-3-EC2-llc, but entry?
CVE-2022-1664: no packages for Image SLES15-SP4-Manager-Server-4-3-EC2-ltd, but entry?
CVE-2022-1664: no packages for Image SLES15-SP4-Micro-5-3, but entry?
CVE-2022-1664: no packages for Image SLES15-SP4-Micro-5-3-Azure, but entry?
CVE-2022-1664: no packages for Image SLES15-SP4-Micro-5-3-BYOS, but entry?
CVE-2022-1664: no packages for Image SLES15-SP4-Micro-5-3-BYOS-Azure, but entry?
CVE-2022-1664: no packages for Image SLES15-SP4-Micro-5-3-BYOS-EC2, but entry?
CVE-2022-1664: no packages for Image SLES15-SP4-Micro-5-3-BYOS-GCE, but entry?
CVE-2022-1664: no packages for Image SLES15-SP4-Micro-5-3-EC2, but entry?
CVE-2022-1664: no packages for Image SLES15-SP4-Micro-5-3-GCE, but entry?
CVE-2022-1664: no packages for Image SLES15-SP4-Micro-5-4, but entry?
CVE-2022-1664: no packages for Image SLES15-SP4-Micro-5-4-Azure, but entry?
CVE-2022-1664: no packages for Image SLES15-SP4-Micro-5-4-BYOS, but entry?
CVE-2022-1664: no packages for Image SLES15-SP4-Micro-5-4-BYOS-Azure, but entry?
CVE-2022-1664: no packages for Image SLES15-SP4-Micro-5-4-BYOS-EC2, but entry?
CVE-2022-1664: no packages for Image SLES15-SP4-Micro-5-4-BYOS-GCE, but entry?
CVE-2022-1664: no packages for Image SLES15-SP4-Micro-5-4-EC2, but entry?
CVE-2022-1664: no packages for Image SLES15-SP4-Micro-5-4-GCE, but entry?
CVE-2022-1664: no packages for Image SLES15-SP4-SAP, but entry?
CVE-2022-1664: no packages for Image SLES15-SP4-SAP-Azure, but entry?
CVE-2022-1664: no packages for Image SLES15-SP4-SAP-Azure-LI-BYOS, but entry?
CVE-2022-1664: no packages for Image SLES15-SP4-SAP-Azure-LI-BYOS-Production, but entry?
CVE-2022-1664: no packages for Image SLES15-SP4-SAP-Azure-VLI-BYOS, but entry?
CVE-2022-1664: no packages for Image SLES15-SP4-SAP-Azure-VLI-BYOS-Production, but entry?
CVE-2022-1664: no packages for Image SLES15-SP4-SAP-BYOS, but entry?
CVE-2022-1664: no packages for Image SLES15-SP4-SAP-BYOS-Azure, but entry?
CVE-2022-1664: no packages for Image SLES15-SP4-SAP-BYOS-EC2, but entry?
CVE-2022-1664: no packages for Image SLES15-SP4-SAP-BYOS-GCE, but entry?
CVE-2022-1664: no packages for Image SLES15-SP4-SAP-EC2, but entry?
CVE-2022-1664: no packages for Image SLES15-SP4-SAP-GCE, but entry?
CVE-2022-1664: no packages for Image SLES15-SP4-SAP-Hardened, but entry?
CVE-2022-1664: no packages for Image SLES15-SP4-SAP-Hardened-Azure, but entry?
CVE-2022-1664: no packages for Image SLES15-SP4-SAP-Hardened-BYOS, but entry?
CVE-2022-1664: no packages for Image SLES15-SP4-SAP-Hardened-BYOS-Azure, but entry?
CVE-2022-1664: no packages for Image SLES15-SP4-SAP-Hardened-BYOS-EC2, but entry?
CVE-2022-1664: no packages for Image SLES15-SP4-SAP-Hardened-BYOS-GCE, but entry?
CVE-2022-1664: no packages for Image SLES15-SP4-SAP-Hardened-EC2, but entry?
CVE-2022-1664: no packages for Image SLES15-SP4-SAP-Hardened-GCE, but entry?
CVE-2022-1664: no packages for Image SLES15-SP4-SAPCAL, but entry?
CVE-2022-1664: no packages for Image SLES15-SP4-SAPCAL-Azure, but entry?
CVE-2022-1664: no packages for Image SLES15-SP4-SAPCAL-EC2, but entry?
CVE-2022-1664: no packages for Image SLES15-SP4-SAPCAL-GCE, but entry?
CVE-2022-1664: no packages for Image SLES15-SP4-SUSE-Rancher-Setup-BYOS, but entry?
CVE-2022-1664: no packages for Image SLES15-SP4-SUSE-Rancher-Setup-BYOS-EC2, but entry?
CVE-2022-1664: no packages for Image SLES15-SP5-Azure-Basic, but entry?
CVE-2022-1664: no packages for Image SLES15-SP5-Azure-Standard, but entry?
CVE-2022-1664: no packages for Image SLES15-SP5-BYOS-Azure, but entry?
CVE-2022-1664: no packages for Image SLES15-SP5-BYOS-EC2, but entry?
CVE-2022-1664: no packages for Image SLES15-SP5-BYOS-GCE, but entry?
CVE-2022-1664: no packages for Image SLES15-SP5-CHOST-BYOS-Aliyun, but entry?
CVE-2022-1664: no packages for Image SLES15-SP5-CHOST-BYOS-Azure, but entry?
CVE-2022-1664: no packages for Image SLES15-SP5-CHOST-BYOS-EC2, but entry?
CVE-2022-1664: no packages for Image SLES15-SP5-CHOST-BYOS-GCE, but entry?
CVE-2022-1664: no packages for Image SLES15-SP5-CHOST-BYOS-GDC, but entry?
CVE-2022-1664: no packages for Image SLES15-SP5-CHOST-BYOS-SAP-CCloud, but entry?
CVE-2022-1664: no packages for Image SLES15-SP5-EC2, but entry?
CVE-2022-1664: no packages for Image SLES15-SP5-EC2-ECS-HVM, but entry?
CVE-2022-1664: no packages for Image SLES15-SP5-GCE, but entry?
CVE-2022-1664: no packages for Image SLES15-SP5-HPC-Azure, but entry?
CVE-2022-1664: no packages for Image SLES15-SP5-HPC-BYOS-Azure, but entry?
CVE-2022-1664: no packages for Image SLES15-SP5-HPC-BYOS-EC2, but entry?
CVE-2022-1664: no packages for Image SLES15-SP5-HPC-BYOS-GCE, but entry?
CVE-2022-1664: no packages for Image SLES15-SP5-HPC-EC2, but entry?
CVE-2022-1664: no packages for Image SLES15-SP5-HPC-GCE, but entry?
CVE-2022-1664: no packages for Image SLES15-SP5-Hardened-BYOS-Azure, but entry?
CVE-2022-1664: no packages for Image SLES15-SP5-Hardened-BYOS-EC2, but entry?
CVE-2022-1664: no packages for Image SLES15-SP5-Hardened-BYOS-GCE, but entry?
CVE-2022-1664: no packages for Image SLES15-SP5-Manager-Proxy-5-0-BYOS, but entry?
CVE-2022-1664: no packages for Image SLES15-SP5-Manager-Proxy-5-0-BYOS-Azure, but entry?
CVE-2022-1664: no packages for Image SLES15-SP5-Manager-Proxy-5-0-BYOS-EC2, but entry?
CVE-2022-1664: no packages for Image SLES15-SP5-Manager-Proxy-5-0-BYOS-GCE, but entry?
CVE-2022-1664: no packages for Image SLES15-SP5-Manager-Server-5-0-BYOS, but entry?
CVE-2022-1664: no packages for Image SLES15-SP5-Manager-Server-5-0-BYOS-Azure, but entry?
CVE-2022-1664: no packages for Image SLES15-SP5-Manager-Server-5-0-BYOS-EC2, but entry?
CVE-2022-1664: no packages for Image SLES15-SP5-Manager-Server-5-0-BYOS-GCE, but entry?
CVE-2022-1664: no packages for Image SLES15-SP5-Micro-5-5, but entry?
CVE-2022-1664: no packages for Image SLES15-SP5-Micro-5-5-Azure, but entry?
CVE-2022-1664: no packages for Image SLES15-SP5-Micro-5-5-BYOS, but entry?
CVE-2022-1664: no packages for Image SLES15-SP5-Micro-5-5-BYOS-Azure, but entry?
CVE-2022-1664: no packages for Image SLES15-SP5-Micro-5-5-BYOS-EC2, but entry?
CVE-2022-1664: no packages for Image SLES15-SP5-Micro-5-5-BYOS-GCE, but entry?
CVE-2022-1664: no packages for Image SLES15-SP5-Micro-5-5-EC2, but entry?
CVE-2022-1664: no packages for Image SLES15-SP5-Micro-5-5-GCE, but entry?
CVE-2022-1664: no packages for Image SLES15-SP5-SAP-Azure, but entry?
CVE-2022-1664: no packages for Image SLES15-SP5-SAP-Azure-LI-BYOS, but entry?
CVE-2022-1664: no packages for Image SLES15-SP5-SAP-Azure-LI-BYOS-Production, but entry?
CVE-2022-1664: no packages for Image SLES15-SP5-SAP-Azure-VLI-BYOS, but entry?
CVE-2022-1664: no packages for Image SLES15-SP5-SAP-Azure-VLI-BYOS-Production, but entry?
CVE-2022-1664: no packages for Image SLES15-SP5-SAP-BYOS-Azure, but entry?
CVE-2022-1664: no packages for Image SLES15-SP5-SAP-BYOS-EC2, but entry?
CVE-2022-1664: no packages for Image SLES15-SP5-SAP-BYOS-GCE, but entry?
CVE-2022-1664: no packages for Image SLES15-SP5-SAP-EC2, but entry?
CVE-2022-1664: no packages for Image SLES15-SP5-SAP-GCE, but entry?
CVE-2022-1664: no packages for Image SLES15-SP5-SAP-Hardened-Azure, but entry?
CVE-2022-1664: no packages for Image SLES15-SP5-SAP-Hardened-BYOS-Azure, but entry?
CVE-2022-1664: no packages for Image SLES15-SP5-SAP-Hardened-BYOS-EC2, but entry?
CVE-2022-1664: no packages for Image SLES15-SP5-SAP-Hardened-BYOS-GCE, but entry?
CVE-2022-1664: no packages for Image SLES15-SP5-SAP-Hardened-EC2, but entry?
CVE-2022-1664: no packages for Image SLES15-SP5-SAP-Hardened-GCE, but entry?
CVE-2022-1664: no packages for Image SLES15-SP5-SAPCAL-Azure, but entry?
CVE-2022-1664: no packages for Image SLES15-SP5-SAPCAL-EC2, but entry?
CVE-2022-1664: no packages for Image SLES15-SP5-SAPCAL-GCE, but entry?
CVE-2022-1664: no packages for Image SLES15-SP6, but entry?
CVE-2022-1664: no packages for Image SLES15-SP6-Azure-Basic, but entry?
CVE-2022-1664: no packages for Image SLES15-SP6-Azure-Standard, but entry?
CVE-2022-1664: no packages for Image SLES15-SP6-BYOS, but entry?
CVE-2022-1664: no packages for Image SLES15-SP6-BYOS-Azure, but entry?
CVE-2022-1664: no packages for Image SLES15-SP6-BYOS-EC2, but entry?
CVE-2022-1664: no packages for Image SLES15-SP6-BYOS-GCE, but entry?
CVE-2022-1664: no packages for Image SLES15-SP6-CHOST-BYOS, but entry?
CVE-2022-1664: no packages for Image SLES15-SP6-CHOST-BYOS-Aliyun, but entry?
CVE-2022-1664: no packages for Image SLES15-SP6-CHOST-BYOS-Azure, but entry?
CVE-2022-1664: no packages for Image SLES15-SP6-CHOST-BYOS-EC2, but entry?
CVE-2022-1664: no packages for Image SLES15-SP6-CHOST-BYOS-GCE, but entry?
CVE-2022-1664: no packages for Image SLES15-SP6-CHOST-BYOS-GDC, but entry?
CVE-2022-1664: no packages for Image SLES15-SP6-CHOST-BYOS-SAP-CCloud, but entry?
CVE-2022-1664: no packages for Image SLES15-SP6-EC2, but entry?
CVE-2022-1664: no packages for Image SLES15-SP6-EC2-ECS-HVM, but entry?
CVE-2022-1664: no packages for Image SLES15-SP6-GCE, but entry?
CVE-2022-1664: no packages for Image SLES15-SP6-HPC, but entry?
CVE-2022-1664: no packages for Image SLES15-SP6-HPC-Azure, but entry?
CVE-2022-1664: no packages for Image SLES15-SP6-HPC-BYOS, but entry?
CVE-2022-1664: no packages for Image SLES15-SP6-HPC-BYOS-Azure, but entry?
CVE-2022-1664: no packages for Image SLES15-SP6-HPC-BYOS-EC2, but entry?
CVE-2022-1664: no packages for Image SLES15-SP6-HPC-BYOS-GCE, but entry?
CVE-2022-1664: no packages for Image SLES15-SP6-HPC-EC2, but entry?
CVE-2022-1664: no packages for Image SLES15-SP6-HPC-GCE, but entry?
CVE-2022-1664: no packages for Image SLES15-SP6-Hardened-BYOS, but entry?
CVE-2022-1664: no packages for Image SLES15-SP6-Hardened-BYOS-Azure, but entry?
CVE-2022-1664: no packages for Image SLES15-SP6-Hardened-BYOS-EC2, but entry?
CVE-2022-1664: no packages for Image SLES15-SP6-Hardened-BYOS-GCE, but entry?
CVE-2022-1664: no packages for Image SLES15-SP6-SAP, but entry?
CVE-2022-1664: no packages for Image SLES15-SP6-SAP-Azure, but entry?
CVE-2022-1664: no packages for Image SLES15-SP6-SAP-Azure-LI-BYOS, but entry?
CVE-2022-1664: no packages for Image SLES15-SP6-SAP-Azure-LI-BYOS-Production, but entry?
CVE-2022-1664: no packages for Image SLES15-SP6-SAP-Azure-VLI-BYOS, but entry?
CVE-2022-1664: no packages for Image SLES15-SP6-SAP-Azure-VLI-BYOS-Production, but entry?
CVE-2022-1664: no packages for Image SLES15-SP6-SAP-BYOS, but entry?
CVE-2022-1664: no packages for Image SLES15-SP6-SAP-BYOS-Azure, but entry?
CVE-2022-1664: no packages for Image SLES15-SP6-SAP-BYOS-EC2, but entry?
CVE-2022-1664: no packages for Image SLES15-SP6-SAP-BYOS-GCE, but entry?
CVE-2022-1664: no packages for Image SLES15-SP6-SAP-EC2, but entry?
CVE-2022-1664: no packages for Image SLES15-SP6-SAP-GCE, but entry?
CVE-2022-1664: no packages for Image SLES15-SP6-SAP-Hardened, but entry?
CVE-2022-1664: no packages for Image SLES15-SP6-SAP-Hardened-Azure, but entry?
CVE-2022-1664: no packages for Image SLES15-SP6-SAP-Hardened-BYOS, but entry?
CVE-2022-1664: no packages for Image SLES15-SP6-SAP-Hardened-BYOS-Azure, but entry?
CVE-2022-1664: no packages for Image SLES15-SP6-SAP-Hardened-BYOS-EC2, but entry?
CVE-2022-1664: no packages for Image SLES15-SP6-SAP-Hardened-BYOS-GCE, but entry?
CVE-2022-1664: no packages for Image SLES15-SP6-SAP-Hardened-EC2, but entry?
CVE-2022-1664: no packages for Image SLES15-SP6-SAP-Hardened-GCE, but entry?
CVE-2022-1664: no packages for Image SLES15-SP6-SAPCAL, but entry?
CVE-2022-1664: no packages for Image SLES15-SP6-SAPCAL-Azure, but entry?
CVE-2022-1664: no packages for Image SLES15-SP6-SAPCAL-EC2, but entry?
CVE-2022-1664: no packages for Image SLES15-SP6-SAPCAL-GCE, but entry?
CVE-2022-1664: no packages for SUSE Linux Enterprise Micro 5.1, but entry?
CVE-2022-1664: no packages for SUSE Linux Enterprise Micro 5.2, but entry?
CVE-2022-1664: no packages for SUSE Linux Enterprise Micro 5.3, but entry?
CVE-2022-1664: no packages for SUSE Linux Enterprise Module for Basesystem 15 SP3, but entry?
CVE-2022-1664: no packages for SUSE Linux Enterprise Module for Basesystem 15 SP4, but entry?
CVE-2022-1664: no packages for SUSE Linux Enterprise Module for Basesystem 15 SP5, but entry?
CVE-2022-1664: no packages for SUSE Linux Enterprise Module for Basesystem 15 SP6, but entry?
CVE-2022-1664: no packages for SUSE Linux Enterprise Server 12 SP3-TERADATA, but entry?
CVE-2022-1664: no packages for SUSE Linux Enterprise Server 12 SP5, but entry?
CVE-2022-1664: no packages for SUSE Linux Enterprise Server for SAP Applications 12 SP5, but entry?
CVE-2022-1664: no packages for openSUSE Leap Micro 5.2, but entry?
CVE-2022-1664: no packages for openSUSE Leap Micro 5.3, but entry?
CVE-2022-1664: no packages for Container bci/bci-init:15.3.21.55, but entry?
CVE-2022-1664: no packages for Container bci/bci-init:15.4, but entry?
CVE-2022-1664: no packages for Container bci/bci-init:15.4.24.39, but entry?
CVE-2022-1664: no packages for Container bci/bci-init:15.5.6.1, but entry?
CVE-2022-1664: no packages for Container bci/bci-sle15-kernel-module-devel:15.5, but entry?
CVE-2022-1664: no packages for Container bci/bci-sle15-kernel-module-devel:15.5.3.2, but entry?
CVE-2022-1664: no packages for Container bci/golang:1.16-30.88, but entry?
CVE-2022-1664: no packages for Container bci/golang:1.17-29.88, but entry?
CVE-2022-1664: no packages for Container bci/golang:1.18-18.40, but entry?
CVE-2022-1664: no packages for Container bci/golang:1.21-2.34.5, but entry?
CVE-2022-1664: no packages for Container bci/golang:1.22, but entry?
CVE-2022-1664: no packages for Container bci/golang:oldstable-3.4, but entry?
CVE-2022-1664: no packages for Container bci/golang:oldstable-openssl-34.5, but entry?
CVE-2022-1664: no packages for Container bci/golang:stable-openssl-34.5, but entry?
CVE-2022-1664: no packages for Container bci/kiwi:9.24.43-8.6, but entry?
CVE-2022-1664: no packages for Container bci/nodejs:12-17.65, but entry?
CVE-2022-1664: no packages for Container bci/nodejs:14-35.31, but entry?
CVE-2022-1664: no packages for Container bci/nodejs:16-7.1, but entry?
CVE-2022-1664: no packages for Container bci/nodejs:18-6.1, but entry?
CVE-2022-1664: no packages for Container bci/nodejs:20-31.5, but entry?
CVE-2022-1664: no packages for Container bci/openjdk-devel:11-36.80, but entry?
CVE-2022-1664: no packages for Container bci/openjdk-devel:11-6.2, but entry?
CVE-2022-1664: no packages for Container bci/openjdk-devel:17-7.2, but entry?
CVE-2022-1664: no packages for Container bci/openjdk:11-32.33, but entry?
CVE-2022-1664: no packages for Container bci/openjdk:11-7.1, but entry?
CVE-2022-1664: no packages for Container bci/openjdk:17-7.1, but entry?
CVE-2022-1664: no packages for Container bci/php-apache:8-31.4, but entry?
CVE-2022-1664: no packages for Container bci/php-apache:8-4.1, but entry?
CVE-2022-1664: no packages for Container bci/php-fpm:8-31.4, but entry?
CVE-2022-1664: no packages for Container bci/php-fpm:8-4.1, but entry?
CVE-2022-1664: no packages for Container bci/php:8-31.4, but entry?
CVE-2022-1664: no packages for Container bci/php:8-4.1, but entry?
CVE-2022-1664: no packages for Container bci/python:3.11-42.5, but entry?
CVE-2022-1664: no packages for Container bci/python:3.9-20.43, but entry?
CVE-2022-1664: no packages for Container bci/ruby:latest, but entry?
CVE-2022-1664: no packages for Container bci/rust:1.59-9.95, but entry?
CVE-2022-1664: no packages for Container bci/rust:1.60-6.35, but entry?
CVE-2022-1664: no packages for Container bci/rust:1.61-7.35, but entry?
CVE-2022-1664: no packages for Container bci/rust:1.62-5.2, but entry?
CVE-2022-1664: no packages for Container bci/rust:1.63-4.11, but entry?
CVE-2022-1664: no packages for Container bci/rust:1.64, but entry?
CVE-2022-1664: no packages for Container bci/rust:1.65, but entry?
CVE-2022-1664: no packages for Container bci/rust:1.66, but entry?
CVE-2022-1664: no packages for Container bci/rust:1.67, but entry?
CVE-2022-1664: no packages for Container bci/rust:1.77, but entry?
CVE-2022-1664: no packages for Container bci/rust:1.79-1.4.3, but entry?
CVE-2022-1664: no packages for Container bci/rust:1.80, but entry?
CVE-2022-1664: no packages for Container bci/rust:oldstable-3.3, but entry?
CVE-2022-1664: no packages for Container bci/spack:0.21.2-2.1, but entry?
CVE-2022-1664: no packages for Container caasp/v4/cilium:1.6.6, but entry?
CVE-2022-1664: no packages for Container caasp/v4/helm-tiller:2.16.12, but entry?
CVE-2022-1664: no packages for Container rancher/elemental-builder-image/5.3:latest, but entry?
CVE-2022-1664: no packages for Container rancher/elemental-teal-iso/5.3:latest, but entry?
CVE-2022-1664: no packages for Container rancher/elemental-teal-iso/5.4:latest, but entry?
CVE-2022-1664: no packages for Container rancher/elemental-teal-rt/5.3:latest, but entry?
CVE-2022-1664: no packages for Container rancher/elemental-teal-rt/5.4:latest, but entry?
CVE-2022-1664: no packages for Container rancher/elemental-teal/5.3:latest, but entry?
CVE-2022-1664: no packages for Container rancher/elemental-teal/5.4:latest, but entry?
CVE-2022-1664: no packages for Container ses/7.1/ceph/haproxy:2.0.14.3.5.330, but entry?
CVE-2022-1664: no packages for Container ses/7.1/ceph/keepalived:2.0.19.3.5.316, but entry?
CVE-2022-1664: no packages for Container ses/7.1/cephcsi/cephcsi:v3.7.0.0, but entry?
CVE-2022-1664: no packages for Container ses/7.1/rook/ceph:1.10.1.16.4.5.328, but entry?
CVE-2022-1664: no packages for Container suse/389-ds:2.2-36.3, but entry?
CVE-2022-1664: no packages for Container suse/hpc/warewulf4-x86_64/sle-hpc-node:15.6.17.5.5, but entry?
CVE-2022-1664: no packages for Container suse/manager/4.3/proxy-httpd:latest, but entry?
CVE-2022-1664: no packages for Container suse/manager/4.3/proxy-tftpd:latest, but entry?
CVE-2022-1664: no packages for Container suse/manager/5.0/x86_64/proxy-httpd:5.0.0-beta1.2.94, but entry?
CVE-2022-1664: no packages for Container suse/manager/5.0/x86_64/proxy-tftpd:5.0.0-beta1.2.90, but entry?
CVE-2022-1664: no packages for Container suse/manager/5.0/x86_64/server-attestation:5.0.0-beta2.2.16, but entry?
CVE-2022-1664: no packages for Container suse/manager/5.0/x86_64/server-hub-xmlrpc-api:5.0.0-beta1.1.86, but entry?
CVE-2022-1664: no packages for Container suse/manager/5.0/x86_64/server-migration-14-16:5.0.0-beta1.2.185, but entry?
CVE-2022-1664: no packages for Container suse/manager/5.0/x86_64/server:5.0.0-beta1.2.122, but entry?
CVE-2022-1664: no packages for Container suse/nginx:1.21-36.4, but entry?
CVE-2022-1664: no packages for Container suse/pcp:5, but entry?
CVE-2022-1664: no packages for Container suse/pcp:5.3.7-36.5, but entry?
CVE-2022-1664: no packages for Container suse/postgres:12.14-21.1, but entry?
CVE-2022-1664: no packages for Container suse/postgres:13.10-22.1, but entry?
CVE-2022-1664: no packages for Container suse/postgres:14.8-11.1, but entry?
CVE-2022-1664: no packages for Container suse/postgres:15, but entry?
CVE-2022-1664: no packages for Container suse/postgres:16.2-36.4, but entry?
CVE-2022-1664: no packages for Container suse/rmt-mariadb:10.11-36.1, but entry?
CVE-2022-1664: no packages for Container suse/rmt-server:2.17-17.3, but entry?
CVE-2022-1664: no packages for Container suse/sle-micro-rancher/5.2:latest, but entry?
CVE-2022-1664: no packages for Container suse/sle-micro-rancher/5.3:latest, but entry?
CVE-2022-1664: no packages for Container suse/sle-micro-rancher/5.4:latest, but entry?
CVE-2022-1664: no packages for Container suse/sle-micro/5.1/toolbox:11.1-2.2.318, but entry?
CVE-2022-1664: no packages for Container suse/sle-micro/5.2/toolbox:11.1-6.2.139, but entry?
CVE-2022-1664: no packages for Container suse/sle-micro/5.3/toolbox:11.1-5.2.37, but entry?
CVE-2022-1664: no packages for Container suse/sle-micro/5.4/toolbox:11.1-3.2.10, but entry?
CVE-2022-1664: no packages for Container suse/sle-micro/5.5/toolbox:12.1-2.2.1, but entry?
CVE-2022-1664: no packages for Container suse/sle-micro/5.5:2.0.2-4.2.20, but entry?
CVE-2022-1664: no packages for Container suse/sle-micro/kvm-5.5:2.0.2-2.2.20, but entry?
CVE-2022-1664: no packages for Container suse/sle-micro/rt-5.5:2.0.2-3.2.23, but entry?
CVE-2022-1664: no packages for Container suse/sles/15.5/cdi-importer:1.55.0.17.295, but entry?
CVE-2022-1664: no packages for Container suse/sles/15.5/libguestfs-tools:0.58.0.17.143, but entry?
CVE-2022-1664: no packages for Container suse/sles/15.5/virt-handler:0.58.0.18.193, but entry?
CVE-2022-1664: no packages for Container suse/sles/15.5/virt-launcher:0.58.0.20.46, but entry?
CVE-2022-1664: no packages for Container suse/sles/15.6/libguestfs-tools:1.1.1.23.352, but entry?
CVE-2022-1664: no packages for Container suse/sles/15.6/virt-handler:1.1.1.24.478, but entry?
CVE-2022-1664: no packages for Container suse/sles/15.6/virt-launcher:1.1.1.28.74, but entry?
CVE-2022-1664: no packages for Container suse/sles/15.7/libguestfs-tools:1.1.1.28.5, but entry?
CVE-2022-1664: no packages for Container suse/sles/15.7/virt-handler:1.1.1.29.4, but entry?
CVE-2022-1664: no packages for Container suse/sles/15.7/virt-launcher:1.1.1.33.5, but entry?
CVE-2022-1664: no packages for Container trento/trento-db:14.5-rev1.0.0-build2.2.178, but entry?
CVE-2022-1664: no packages for Container trento/trento-runner:1.1.0-build4.19.12, but entry?
CVE-2022-1664: no packages for Container trento/trento-wanda:1.0.0-build1.5.2, but entry?
CVE-2022-1664: no packages for Image SLES12-SP4-SAP-Azure-LI-BYOS-Production, but entry?
CVE-2022-1664: no packages for Image SLES12-SP4-SAP-Azure-VLI-BYOS-Production, but entry?
CVE-2022-1664: no packages for Image SLES12-SP5-Azure-BYOS, but entry?
CVE-2022-1664: no packages for Image SLES12-SP5-Azure-Basic-On-Demand, but entry?
CVE-2022-1664: no packages for Image SLES12-SP5-Azure-HPC-BYOS, but entry?
CVE-2022-1664: no packages for Image SLES12-SP5-Azure-HPC-On-Demand, but entry?
CVE-2022-1664: no packages for Image SLES12-SP5-Azure-SAP-BYOS, but entry?
CVE-2022-1664: no packages for Image SLES12-SP5-Azure-SAP-On-Demand, but entry?
CVE-2022-1664: no packages for Image SLES12-SP5-Azure-Standard-On-Demand, but entry?
CVE-2022-1664: no packages for Image SLES12-SP5-EC2-BYOS, but entry?
CVE-2022-1664: no packages for Image SLES12-SP5-EC2-ECS-On-Demand, but entry?
CVE-2022-1664: no packages for Image SLES12-SP5-EC2-On-Demand, but entry?
CVE-2022-1664: no packages for Image SLES12-SP5-EC2-SAP-BYOS, but entry?
CVE-2022-1664: no packages for Image SLES12-SP5-EC2-SAP-On-Demand, but entry?
CVE-2022-1664: no packages for Image SLES12-SP5-GCE-BYOS, but entry?
CVE-2022-1664: no packages for Image SLES12-SP5-GCE-On-Demand, but entry?
CVE-2022-1664: no packages for Image SLES12-SP5-GCE-SAP-BYOS, but entry?
CVE-2022-1664: no packages for Image SLES12-SP5-GCE-SAP-On-Demand, but entry?
CVE-2022-1664: no packages for Image SLES12-SP5-SAP-Azure-LI-BYOS-Production, but entry?
CVE-2022-1664: no packages for Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production, but entry?
CVE-2022-1664: no packages for Image SLES15-SP1-SAP-Azure-LI-BYOS-Production, but entry?
CVE-2022-1664: no packages for Image SLES15-SP1-SAP-Azure-VLI-BYOS-Production, but entry?
CVE-2022-1664: no packages for Image SLES15-SP2-BYOS-Azure, but entry?
CVE-2022-1664: no packages for Image SLES15-SP2-HPC-BYOS-Azure, but entry?
CVE-2022-1664: no packages for Image SLES15-SP2-SAP-Azure, but entry?
CVE-2022-1664: no packages for Image SLES15-SP2-SAP-Azure-LI-BYOS-Production, but entry?
CVE-2022-1664: no packages for Image SLES15-SP2-SAP-Azure-VLI-BYOS-Production, but entry?
CVE-2022-1664: no packages for Image SLES15-SP2-SAP-BYOS-Azure, but entry?
CVE-2022-1664: no packages for Image SLES15-SP2-SAP-BYOS-EC2-HVM, but entry?
CVE-2022-1664: no packages for Image SLES15-SP2-SAP-BYOS-GCE, but entry?
CVE-2022-1664: no packages for Image SLES15-SP2-SAP-EC2-HVM, but entry?
CVE-2022-1664: no packages for Image SLES15-SP2-SAP-GCE, but entry?
CVE-2022-1664: no packages for Image SLES15-SP3-BYOS-Azure, but entry?
CVE-2022-1664: no packages for Image SLES15-SP3-BYOS-EC2-HVM, but entry?
CVE-2022-1664: no packages for Image SLES15-SP3-BYOS-GCE, but entry?
CVE-2022-1664: no packages for Image SLES15-SP3-CHOST-BYOS-Aliyun, but entry?
CVE-2022-1664: no packages for Image SLES15-SP3-CHOST-BYOS-Azure, but entry?
CVE-2022-1664: no packages for Image SLES15-SP3-CHOST-BYOS-EC2, but entry?
CVE-2022-1664: no packages for Image SLES15-SP3-CHOST-BYOS-GCE, but entry?
CVE-2022-1664: no packages for Image SLES15-SP3-CHOST-BYOS-SAP-CCloud, but entry?
CVE-2022-1664: no packages for Image SLES15-SP3-HPC-BYOS-Azure, but entry?
CVE-2022-1664: no packages for Image SLES15-SP3-HPC-BYOS-EC2-HVM, but entry?
CVE-2022-1664: no packages for Image SLES15-SP3-HPC-BYOS-GCE, but entry?
CVE-2022-1664: no packages for Image SLES15-SP3-Manager-4-2-Proxy-BYOS-Azure, but entry?
CVE-2022-1664: no packages for Image SLES15-SP3-Manager-4-2-Proxy-BYOS-EC2-HVM, but entry?
CVE-2022-1664: no packages for Image SLES15-SP3-Manager-4-2-Proxy-BYOS-GCE, but entry?
CVE-2022-1664: no packages for Image SLES15-SP3-Manager-4-2-Server-BYOS-Azure, but entry?
CVE-2022-1664: no packages for Image SLES15-SP3-Manager-4-2-Server-BYOS-EC2-HVM, but entry?
CVE-2022-1664: no packages for Image SLES15-SP3-Manager-4-2-Server-BYOS-GCE, but entry?
CVE-2022-1664: no packages for Image SLES15-SP3-Micro-5-1-BYOS-Azure, but entry?
CVE-2022-1664: no packages for Image SLES15-SP3-Micro-5-1-BYOS-EC2-HVM, but entry?
CVE-2022-1664: no packages for Image SLES15-SP3-Micro-5-1-BYOS-GCE, but entry?
CVE-2022-1664: no packages for Image SLES15-SP3-Micro-5-2-BYOS-Azure, but entry?
CVE-2022-1664: no packages for Image SLES15-SP3-Micro-5-2-BYOS-EC2-HVM, but entry?
CVE-2022-1664: no packages for Image SLES15-SP3-Micro-5-2-BYOS-GCE, but entry?
CVE-2022-1664: no packages for Image SLES15-SP3-SAP-Azure-LI-BYOS-Production, but entry?
CVE-2022-1664: no packages for Image SLES15-SP3-SAP-Azure-VLI-BYOS-Production, but entry?
CVE-2022-1664: no packages for Image SLES15-SP3-SAP-BYOS-Azure, but entry?
CVE-2022-1664: no packages for Image SLES15-SP3-SAP-BYOS-EC2-HVM, but entry?
CVE-2022-1664: no packages for Image SLES15-SP3-SAP-BYOS-GCE, but entry?
CVE-2022-1664: no packages for Image SLES15-SP3-SAPCAL-Azure, but entry?
CVE-2022-1664: no packages for Image SLES15-SP3-SAPCAL-EC2-HVM, but entry?
CVE-2022-1664: no packages for Image SLES15-SP3-SAPCAL-GCE, but entry?
CVE-2022-1664: no packages for Image SLES15-SP4, but entry?
CVE-2022-1664: no packages for Image SLES15-SP4-Azure-Basic, but entry?
CVE-2022-1664: no packages for Image SLES15-SP4-Azure-Standard, but entry?
CVE-2022-1664: no packages for Image SLES15-SP4-BYOS, but entry?
CVE-2022-1664: no packages for Image SLES15-SP4-BYOS-Azure, but entry?
CVE-2022-1664: no packages for Image SLES15-SP4-BYOS-EC2, but entry?
CVE-2022-1664: no packages for Image SLES15-SP4-BYOS-GCE, but entry?
CVE-2022-1664: no packages for Image SLES15-SP4-CHOST-BYOS, but entry?
CVE-2022-1664: no packages for Image SLES15-SP4-CHOST-BYOS-Aliyun, but entry?
CVE-2022-1664: no packages for Image SLES15-SP4-CHOST-BYOS-Azure, but entry?
CVE-2022-1664: no packages for Image SLES15-SP4-CHOST-BYOS-EC2, but entry?
CVE-2022-1664: no packages for Image SLES15-SP4-CHOST-BYOS-GCE, but entry?
CVE-2022-1664: no packages for Image SLES15-SP4-CHOST-BYOS-SAP-CCloud, but entry?
CVE-2022-1664: no packages for Image SLES15-SP4-EC2, but entry?
CVE-2022-1664: no packages for Image SLES15-SP4-EC2-ECS-HVM, but entry?
CVE-2022-1664: no packages for Image SLES15-SP4-GCE, but entry?
CVE-2022-1664: no packages for Image SLES15-SP4-HPC, but entry?
CVE-2022-1664: no packages for Image SLES15-SP4-HPC-Azure, but entry?
CVE-2022-1664: no packages for Image SLES15-SP4-HPC-BYOS, but entry?
CVE-2022-1664: no packages for Image SLES15-SP4-HPC-BYOS-Azure, but entry?
CVE-2022-1664: no packages for Image SLES15-SP4-HPC-BYOS-EC2, but entry?
CVE-2022-1664: no packages for Image SLES15-SP4-HPC-BYOS-GCE, but entry?
CVE-2022-1664: no packages for Image SLES15-SP4-HPC-EC2, but entry?
CVE-2022-1664: no packages for Image SLES15-SP4-HPC-GCE, but entry?
CVE-2022-1664: no packages for Image SLES15-SP4-Hardened-BYOS, but entry?
CVE-2022-1664: no packages for Image SLES15-SP4-Hardened-BYOS-Azure, but entry?
CVE-2022-1664: no packages for Image SLES15-SP4-Hardened-BYOS-EC2, but entry?
CVE-2022-1664: no packages for Image SLES15-SP4-Hardened-BYOS-GCE, but entry?
CVE-2022-1664: no packages for Image SLES15-SP4-Manager-Proxy-4-3-BYOS, but entry?
CVE-2022-1664: no packages for Image SLES15-SP4-Manager-Proxy-4-3-BYOS-Azure, but entry?
CVE-2022-1664: no packages for Image SLES15-SP4-Manager-Proxy-4-3-BYOS-EC2, but entry?
CVE-2022-1664: no packages for Image SLES15-SP4-Manager-Proxy-4-3-BYOS-GCE, but entry?
CVE-2022-1664: no packages for Image SLES15-SP4-Manager-Server-4-3, but entry?
CVE-2022-1664: no packages for Image SLES15-SP4-Manager-Server-4-3-Azure-llc, but entry?
CVE-2022-1664: no packages for Image SLES15-SP4-Manager-Server-4-3-Azure-ltd, but entry?
CVE-2022-1664: no packages for Image SLES15-SP4-Manager-Server-4-3-BYOS, but entry?
CVE-2022-1664: no packages for Image SLES15-SP4-Manager-Server-4-3-BYOS-Azure, but entry?
CVE-2022-1664: no packages for Image SLES15-SP4-Manager-Server-4-3-BYOS-EC2, but entry?
CVE-2022-1664: no packages for Image SLES15-SP4-Manager-Server-4-3-BYOS-GCE, but entry?
CVE-2022-1664: no packages for Image SLES15-SP4-Manager-Server-4-3-EC2-llc, but entry?
CVE-2022-1664: no packages for Image SLES15-SP4-Manager-Server-4-3-EC2-ltd, but entry?
CVE-2022-1664: no packages for Image SLES15-SP4-Micro-5-3, but entry?
CVE-2022-1664: no packages for Image SLES15-SP4-Micro-5-3-Azure, but entry?
CVE-2022-1664: no packages for Image SLES15-SP4-Micro-5-3-BYOS, but entry?
CVE-2022-1664: no packages for Image SLES15-SP4-Micro-5-3-BYOS-Azure, but entry?
CVE-2022-1664: no packages for Image SLES15-SP4-Micro-5-3-BYOS-EC2, but entry?
CVE-2022-1664: no packages for Image SLES15-SP4-Micro-5-3-BYOS-GCE, but entry?
CVE-2022-1664: no packages for Image SLES15-SP4-Micro-5-3-EC2, but entry?
CVE-2022-1664: no packages for Image SLES15-SP4-Micro-5-3-GCE, but entry?
CVE-2022-1664: no packages for Image SLES15-SP4-Micro-5-4, but entry?
CVE-2022-1664: no packages for Image SLES15-SP4-Micro-5-4-Azure, but entry?
CVE-2022-1664: no packages for Image SLES15-SP4-Micro-5-4-BYOS, but entry?
CVE-2022-1664: no packages for Image SLES15-SP4-Micro-5-4-BYOS-Azure, but entry?
CVE-2022-1664: no packages for Image SLES15-SP4-Micro-5-4-BYOS-EC2, but entry?
CVE-2022-1664: no packages for Image SLES15-SP4-Micro-5-4-BYOS-GCE, but entry?
CVE-2022-1664: no packages for Image SLES15-SP4-Micro-5-4-EC2, but entry?
CVE-2022-1664: no packages for Image SLES15-SP4-Micro-5-4-GCE, but entry?
CVE-2022-1664: no packages for Image SLES15-SP4-SAP, but entry?
CVE-2022-1664: no packages for Image SLES15-SP4-SAP-Azure, but entry?
CVE-2022-1664: no packages for Image SLES15-SP4-SAP-Azure-LI-BYOS, but entry?
CVE-2022-1664: no packages for Image SLES15-SP4-SAP-Azure-LI-BYOS-Production, but entry?
CVE-2022-1664: no packages for Image SLES15-SP4-SAP-Azure-VLI-BYOS, but entry?
CVE-2022-1664: no packages for Image SLES15-SP4-SAP-Azure-VLI-BYOS-Production, but entry?
CVE-2022-1664: no packages for Image SLES15-SP4-SAP-BYOS, but entry?
CVE-2022-1664: no packages for Image SLES15-SP4-SAP-BYOS-Azure, but entry?
CVE-2022-1664: no packages for Image SLES15-SP4-SAP-BYOS-EC2, but entry?
CVE-2022-1664: no packages for Image SLES15-SP4-SAP-BYOS-GCE, but entry?
CVE-2022-1664: no packages for Image SLES15-SP4-SAP-EC2, but entry?
CVE-2022-1664: no packages for Image SLES15-SP4-SAP-GCE, but entry?
CVE-2022-1664: no packages for Image SLES15-SP4-SAP-Hardened, but entry?
CVE-2022-1664: no packages for Image SLES15-SP4-SAP-Hardened-Azure, but entry?
CVE-2022-1664: no packages for Image SLES15-SP4-SAP-Hardened-BYOS, but entry?
CVE-2022-1664: no packages for Image SLES15-SP4-SAP-Hardened-BYOS-Azure, but entry?
CVE-2022-1664: no packages for Image SLES15-SP4-SAP-Hardened-BYOS-EC2, but entry?
CVE-2022-1664: no packages for Image SLES15-SP4-SAP-Hardened-BYOS-GCE, but entry?
CVE-2022-1664: no packages for Image SLES15-SP4-SAP-Hardened-EC2, but entry?
CVE-2022-1664: no packages for Image SLES15-SP4-SAP-Hardened-GCE, but entry?
CVE-2022-1664: no packages for Image SLES15-SP4-SAPCAL, but entry?
CVE-2022-1664: no packages for Image SLES15-SP4-SAPCAL-Azure, but entry?
CVE-2022-1664: no packages for Image SLES15-SP4-SAPCAL-EC2, but entry?
CVE-2022-1664: no packages for Image SLES15-SP4-SAPCAL-GCE, but entry?
CVE-2022-1664: no packages for Image SLES15-SP4-SUSE-Rancher-Setup-BYOS, but entry?
CVE-2022-1664: no packages for Image SLES15-SP4-SUSE-Rancher-Setup-BYOS-EC2, but entry?
CVE-2022-1664: no packages for Image SLES15-SP5-Azure-Basic, but entry?
CVE-2022-1664: no packages for Image SLES15-SP5-Azure-Standard, but entry?
CVE-2022-1664: no packages for Image SLES15-SP5-BYOS-Azure, but entry?
CVE-2022-1664: no packages for Image SLES15-SP5-BYOS-EC2, but entry?
CVE-2022-1664: no packages for Image SLES15-SP5-BYOS-GCE, but entry?
CVE-2022-1664: no packages for Image SLES15-SP5-CHOST-BYOS-Aliyun, but entry?
CVE-2022-1664: no packages for Image SLES15-SP5-CHOST-BYOS-Azure, but entry?
CVE-2022-1664: no packages for Image SLES15-SP5-CHOST-BYOS-EC2, but entry?
CVE-2022-1664: no packages for Image SLES15-SP5-CHOST-BYOS-GCE, but entry?
CVE-2022-1664: no packages for Image SLES15-SP5-CHOST-BYOS-GDC, but entry?
CVE-2022-1664: no packages for Image SLES15-SP5-CHOST-BYOS-SAP-CCloud, but entry?
CVE-2022-1664: no packages for Image SLES15-SP5-EC2, but entry?
CVE-2022-1664: no packages for Image SLES15-SP5-EC2-ECS-HVM, but entry?
CVE-2022-1664: no packages for Image SLES15-SP5-GCE, but entry?
CVE-2022-1664: no packages for Image SLES15-SP5-HPC-Azure, but entry?
CVE-2022-1664: no packages for Image SLES15-SP5-HPC-BYOS-Azure, but entry?
CVE-2022-1664: no packages for Image SLES15-SP5-HPC-BYOS-EC2, but entry?
CVE-2022-1664: no packages for Image SLES15-SP5-HPC-BYOS-GCE, but entry?
CVE-2022-1664: no packages for Image SLES15-SP5-HPC-EC2, but entry?
CVE-2022-1664: no packages for Image SLES15-SP5-HPC-GCE, but entry?
CVE-2022-1664: no packages for Image SLES15-SP5-Hardened-BYOS-Azure, but entry?
CVE-2022-1664: no packages for Image SLES15-SP5-Hardened-BYOS-EC2, but entry?
CVE-2022-1664: no packages for Image SLES15-SP5-Hardened-BYOS-GCE, but entry?
CVE-2022-1664: no packages for Image SLES15-SP5-Manager-Proxy-5-0-BYOS, but entry?
CVE-2022-1664: no packages for Image SLES15-SP5-Manager-Proxy-5-0-BYOS-Azure, but entry?
CVE-2022-1664: no packages for Image SLES15-SP5-Manager-Proxy-5-0-BYOS-EC2, but entry?
CVE-2022-1664: no packages for Image SLES15-SP5-Manager-Proxy-5-0-BYOS-GCE, but entry?
CVE-2022-1664: no packages for Image SLES15-SP5-Manager-Server-5-0-BYOS, but entry?
CVE-2022-1664: no packages for Image SLES15-SP5-Manager-Server-5-0-BYOS-Azure, but entry?
CVE-2022-1664: no packages for Image SLES15-SP5-Manager-Server-5-0-BYOS-EC2, but entry?
CVE-2022-1664: no packages for Image SLES15-SP5-Manager-Server-5-0-BYOS-GCE, but entry?
CVE-2022-1664: no packages for Image SLES15-SP5-Micro-5-5, but entry?
CVE-2022-1664: no packages for Image SLES15-SP5-Micro-5-5-Azure, but entry?
CVE-2022-1664: no packages for Image SLES15-SP5-Micro-5-5-BYOS, but entry?
CVE-2022-1664: no packages for Image SLES15-SP5-Micro-5-5-BYOS-Azure, but entry?
CVE-2022-1664: no packages for Image SLES15-SP5-Micro-5-5-BYOS-EC2, but entry?
CVE-2022-1664: no packages for Image SLES15-SP5-Micro-5-5-BYOS-GCE, but entry?
CVE-2022-1664: no packages for Image SLES15-SP5-Micro-5-5-EC2, but entry?
CVE-2022-1664: no packages for Image SLES15-SP5-Micro-5-5-GCE, but entry?
CVE-2022-1664: no packages for Image SLES15-SP5-SAP-Azure, but entry?
CVE-2022-1664: no packages for Image SLES15-SP5-SAP-Azure-LI-BYOS, but entry?
CVE-2022-1664: no packages for Image SLES15-SP5-SAP-Azure-LI-BYOS-Production, but entry?
CVE-2022-1664: no packages for Image SLES15-SP5-SAP-Azure-VLI-BYOS, but entry?
CVE-2022-1664: no packages for Image SLES15-SP5-SAP-Azure-VLI-BYOS-Production, but entry?
CVE-2022-1664: no packages for Image SLES15-SP5-SAP-BYOS-Azure, but entry?
CVE-2022-1664: no packages for Image SLES15-SP5-SAP-BYOS-EC2, but entry?
CVE-2022-1664: no packages for Image SLES15-SP5-SAP-BYOS-GCE, but entry?
CVE-2022-1664: no packages for Image SLES15-SP5-SAP-EC2, but entry?
CVE-2022-1664: no packages for Image SLES15-SP5-SAP-GCE, but entry?
CVE-2022-1664: no packages for Image SLES15-SP5-SAP-Hardened-Azure, but entry?
CVE-2022-1664: no packages for Image SLES15-SP5-SAP-Hardened-BYOS-Azure, but entry?
CVE-2022-1664: no packages for Image SLES15-SP5-SAP-Hardened-BYOS-EC2, but entry?
CVE-2022-1664: no packages for Image SLES15-SP5-SAP-Hardened-BYOS-GCE, but entry?
CVE-2022-1664: no packages for Image SLES15-SP5-SAP-Hardened-EC2, but entry?
CVE-2022-1664: no packages for Image SLES15-SP5-SAP-Hardened-GCE, but entry?
CVE-2022-1664: no packages for Image SLES15-SP5-SAPCAL-Azure, but entry?
CVE-2022-1664: no packages for Image SLES15-SP5-SAPCAL-EC2, but entry?
CVE-2022-1664: no packages for Image SLES15-SP5-SAPCAL-GCE, but entry?
CVE-2022-1664: no packages for Image SLES15-SP6, but entry?
CVE-2022-1664: no packages for Image SLES15-SP6-Azure-Basic, but entry?
CVE-2022-1664: no packages for Image SLES15-SP6-Azure-Standard, but entry?
CVE-2022-1664: no packages for Image SLES15-SP6-BYOS, but entry?
CVE-2022-1664: no packages for Image SLES15-SP6-BYOS-Azure, but entry?
CVE-2022-1664: no packages for Image SLES15-SP6-BYOS-EC2, but entry?
CVE-2022-1664: no packages for Image SLES15-SP6-BYOS-GCE, but entry?
CVE-2022-1664: no packages for Image SLES15-SP6-CHOST-BYOS, but entry?
CVE-2022-1664: no packages for Image SLES15-SP6-CHOST-BYOS-Aliyun, but entry?
CVE-2022-1664: no packages for Image SLES15-SP6-CHOST-BYOS-Azure, but entry?
CVE-2022-1664: no packages for Image SLES15-SP6-CHOST-BYOS-EC2, but entry?
CVE-2022-1664: no packages for Image SLES15-SP6-CHOST-BYOS-GCE, but entry?
CVE-2022-1664: no packages for Image SLES15-SP6-CHOST-BYOS-GDC, but entry?
CVE-2022-1664: no packages for Image SLES15-SP6-CHOST-BYOS-SAP-CCloud, but entry?
CVE-2022-1664: no packages for Image SLES15-SP6-EC2, but entry?
CVE-2022-1664: no packages for Image SLES15-SP6-EC2-ECS-HVM, but entry?
CVE-2022-1664: no packages for Image SLES15-SP6-GCE, but entry?
CVE-2022-1664: no packages for Image SLES15-SP6-HPC, but entry?
CVE-2022-1664: no packages for Image SLES15-SP6-HPC-Azure, but entry?
CVE-2022-1664: no packages for Image SLES15-SP6-HPC-BYOS, but entry?
CVE-2022-1664: no packages for Image SLES15-SP6-HPC-BYOS-Azure, but entry?
CVE-2022-1664: no packages for Image SLES15-SP6-HPC-BYOS-EC2, but entry?
CVE-2022-1664: no packages for Image SLES15-SP6-HPC-BYOS-GCE, but entry?
CVE-2022-1664: no packages for Image SLES15-SP6-HPC-EC2, but entry?
CVE-2022-1664: no packages for Image SLES15-SP6-HPC-GCE, but entry?
CVE-2022-1664: no packages for Image SLES15-SP6-Hardened-BYOS, but entry?
CVE-2022-1664: no packages for Image SLES15-SP6-Hardened-BYOS-Azure, but entry?
CVE-2022-1664: no packages for Image SLES15-SP6-Hardened-BYOS-EC2, but entry?
CVE-2022-1664: no packages for Image SLES15-SP6-Hardened-BYOS-GCE, but entry?
CVE-2022-1664: no packages for Image SLES15-SP6-SAP, but entry?
CVE-2022-1664: no packages for Image SLES15-SP6-SAP-Azure, but entry?
CVE-2022-1664: no packages for Image SLES15-SP6-SAP-Azure-LI-BYOS, but entry?
CVE-2022-1664: no packages for Image SLES15-SP6-SAP-Azure-LI-BYOS-Production, but entry?
CVE-2022-1664: no packages for Image SLES15-SP6-SAP-Azure-VLI-BYOS, but entry?
CVE-2022-1664: no packages for Image SLES15-SP6-SAP-Azure-VLI-BYOS-Production, but entry?
CVE-2022-1664: no packages for Image SLES15-SP6-SAP-BYOS, but entry?
CVE-2022-1664: no packages for Image SLES15-SP6-SAP-BYOS-Azure, but entry?
CVE-2022-1664: no packages for Image SLES15-SP6-SAP-BYOS-EC2, but entry?
CVE-2022-1664: no packages for Image SLES15-SP6-SAP-BYOS-GCE, but entry?
CVE-2022-1664: no packages for Image SLES15-SP6-SAP-EC2, but entry?
CVE-2022-1664: no packages for Image SLES15-SP6-SAP-GCE, but entry?
CVE-2022-1664: no packages for Image SLES15-SP6-SAP-Hardened, but entry?
CVE-2022-1664: no packages for Image SLES15-SP6-SAP-Hardened-Azure, but entry?
CVE-2022-1664: no packages for Image SLES15-SP6-SAP-Hardened-BYOS, but entry?
CVE-2022-1664: no packages for Image SLES15-SP6-SAP-Hardened-BYOS-Azure, but entry?
CVE-2022-1664: no packages for Image SLES15-SP6-SAP-Hardened-BYOS-EC2, but entry?
CVE-2022-1664: no packages for Image SLES15-SP6-SAP-Hardened-BYOS-GCE, but entry?
CVE-2022-1664: no packages for Image SLES15-SP6-SAP-Hardened-EC2, but entry?
CVE-2022-1664: no packages for Image SLES15-SP6-SAP-Hardened-GCE, but entry?
CVE-2022-1664: no packages for Image SLES15-SP6-SAPCAL, but entry?
CVE-2022-1664: no packages for Image SLES15-SP6-SAPCAL-Azure, but entry?
CVE-2022-1664: no packages for Image SLES15-SP6-SAPCAL-EC2, but entry?
CVE-2022-1664: no packages for Image SLES15-SP6-SAPCAL-GCE, but entry?
CVE-2022-1664: no packages for SUSE Linux Enterprise Micro 5.1, but entry?
CVE-2022-1664: no packages for SUSE Linux Enterprise Micro 5.2, but entry?
CVE-2022-1664: no packages for SUSE Linux Enterprise Micro 5.3, but entry?
CVE-2022-1664: no packages for SUSE Linux Enterprise Module for Basesystem 15 SP3, but entry?
CVE-2022-1664: no packages for SUSE Linux Enterprise Module for Basesystem 15 SP4, but entry?
CVE-2022-1664: no packages for SUSE Linux Enterprise Module for Basesystem 15 SP5, but entry?
CVE-2022-1664: no packages for SUSE Linux Enterprise Module for Basesystem 15 SP6, but entry?
CVE-2022-1664: no packages for SUSE Linux Enterprise Server 12 SP3-TERADATA, but entry?
CVE-2022-1664: no packages for SUSE Linux Enterprise Server 12 SP5, but entry?
CVE-2022-1664: no packages for SUSE Linux Enterprise Server for SAP Applications 12 SP5, but entry?
CVE-2022-1664: no packages for openSUSE Leap Micro 5.2, but entry?
CVE-2022-1664: no packages for openSUSE Leap Micro 5.3, but entry?
skipping CVE-2022-1678 as CVE page is older than CVRF-CVE file.
skipping CVE-2022-1674 as CVE page is older than CVRF-CVE file.
skipping CVE-2022-1671 as CVE page is older than CVRF-CVE file.
no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2022-1652
skipping CVE-2022-1651 as CVE page is older than CVRF-CVE file.
no cpe found for SUSE Package Hub 15 SP3 in CVE-2022-1641
no cpe found for SUSE Package Hub 15 SP3 in CVE-2022-1640
no cpe found for SUSE Package Hub 15 SP3 in CVE-2022-1639
no cpe found for SUSE Package Hub 15 SP3 in CVE-2022-1638
no cpe found for SUSE Package Hub 15 SP3 in CVE-2022-1637
no cpe found for SUSE Package Hub 15 SP3 in CVE-2022-1636
no cpe found for SUSE Package Hub 15 SP3 in CVE-2022-1635
no cpe found for SUSE Package Hub 15 SP3 in CVE-2022-1634
no cpe found for SUSE Package Hub 15 SP3 in CVE-2022-1633
no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2022-1615
skipping CVE-2022-1629 as CVE page is older than CVRF-CVE file.
skipping CVE-2022-1623 as CVE page is older than CVRF-CVE file.
skipping CVE-2022-1622 as CVE page is older than CVRF-CVE file.
skipping CVE-2022-1621 as CVE page is older than CVRF-CVE file.
skipping CVE-2022-1620 as CVE page is older than CVRF-CVE file.
skipping CVE-2022-1619 as CVE page is older than CVRF-CVE file.
skipping CVE-2022-1616 as CVE page is older than CVRF-CVE file.
no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2022-1586
skipping CVE-2022-1587 as CVE page is older than CVRF-CVE file.
no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2022-1552
skipping CVE-2022-1529 as CVE page is older than CVRF-CVE file.
no cpe found for SUSE Package Hub 15 SP3 in CVE-2022-1507
skipping CVE-2022-1508 as CVE page is older than CVRF-CVE file.
no cpe found for SUSE Package Hub 15 SP3 in CVE-2022-1501
no cpe found for SUSE Package Hub 15 SP3 in CVE-2022-1500
no cpe found for SUSE Package Hub 15 SP3 in CVE-2022-1499
no cpe found for SUSE Package Hub 15 SP3 in CVE-2022-1498
no cpe found for SUSE Package Hub 15 SP3 in CVE-2022-1497
no cpe found for SUSE Package Hub 15 SP3 in CVE-2022-1496
no cpe found for SUSE Package Hub 15 SP3 in CVE-2022-1495
no cpe found for SUSE Package Hub 15 SP3 in CVE-2022-1494
no cpe found for SUSE Package Hub 15 SP3 in CVE-2022-1493
no cpe found for SUSE Package Hub 15 SP4 in CVE-2022-1493
no cpe found for SUSE Package Hub 15 SP3 in CVE-2022-1492
no cpe found for SUSE Package Hub 15 SP3 in CVE-2022-1491
no cpe found for SUSE Package Hub 15 SP3 in CVE-2022-1490
no cpe found for SUSE Package Hub 15 SP3 in CVE-2022-1489
no cpe found for SUSE Package Hub 15 SP3 in CVE-2022-1488
no cpe found for SUSE Package Hub 15 SP3 in CVE-2022-1487
no cpe found for SUSE Package Hub 15 SP3 in CVE-2022-1486
no cpe found for SUSE Package Hub 15 SP3 in CVE-2022-1485
no cpe found for SUSE Package Hub 15 SP3 in CVE-2022-1484
no cpe found for SUSE Package Hub 15 SP3 in CVE-2022-1483
no cpe found for SUSE Package Hub 15 SP3 in CVE-2022-1482
no cpe found for SUSE Package Hub 15 SP3 in CVE-2022-1481
no cpe found for SUSE Package Hub 15 SP3 in CVE-2022-1480
no cpe found for SUSE Package Hub 15 SP3 in CVE-2022-1479
no cpe found for SUSE Package Hub 15 SP3 in CVE-2022-1478
no cpe found for SUSE Package Hub 15 SP3 in CVE-2022-1477
skipping CVE-2022-1473 as CVE page is older than CVRF-CVE file.
no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2022-1462
skipping CVE-2022-1434 as CVE page is older than CVRF-CVE file.
skipping CVE-2022-1420 as CVE page is older than CVRF-CVE file.
skipping CVE-2022-1415 as CVE page is older than CVRF-CVE file.
skipping CVE-2022-1381 as CVE page is older than CVRF-CVE file.
no cpe found for SUSE Package Hub 15 SP3 in CVE-2022-1364
skipping CVE-2022-1355 as CVE page is older than CVRF-CVE file.
skipping CVE-2022-1354 as CVE page is older than CVRF-CVE file.
no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2022-1348
skipping CVE-2022-1350 as CVE page is older than CVRF-CVE file.
skipping CVE-2022-1343 as CVE page is older than CVRF-CVE file.
no cpe found for SUSE Package Hub 15 SP4 in CVE-2022-1328
no cpe found for SUSE Package Hub 15 SP3 in CVE-2022-1314
no cpe found for SUSE Package Hub 15 SP4 in CVE-2022-1314
no cpe found for SUSE Package Hub 15 SP3 in CVE-2022-1313
no cpe found for SUSE Package Hub 15 SP3 in CVE-2022-1312
no cpe found for SUSE Package Hub 15 SP3 in CVE-2022-1311
no cpe found for SUSE Package Hub 15 SP3 in CVE-2022-1310
no cpe found for SUSE Package Hub 15 SP4 in CVE-2022-1310
no cpe found for SUSE Package Hub 15 SP3 in CVE-2022-1309
no cpe found for SUSE Package Hub 15 SP3 in CVE-2022-1308
no cpe found for SUSE Package Hub 15 SP3 in CVE-2022-1307
no cpe found for SUSE Package Hub 15 SP3 in CVE-2022-1306
no cpe found for SUSE Package Hub 15 SP3 in CVE-2022-1305
no cpe found for SUSE Package Hub 15 SP4 in CVE-2022-1305
skipping CVE-2022-1304 as CVE page is older than CVRF-CVE file.
skipping CVE-2022-1292 as CVE page is older than CVRF-CVE file.
no cpe found for SUSE Liberty Linux 7 LTSS in CVE-2022-1271
no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2022-1271
skipping CVE-2022-1270 as CVE page is older than CVRF-CVE file.
skipping CVE-2022-1263 as CVE page is older than CVRF-CVE file.
skipping CVE-2022-1247 as CVE page is older than CVRF-CVE file.
no cpe found for SUSE Package Hub 15 SP3 in CVE-2022-1232
no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2022-1227
skipping CVE-2022-1215 as CVE page is older than CVRF-CVE file.
skipping CVE-2022-1210 as CVE page is older than CVRF-CVE file.
skipping CVE-2022-1205 as CVE page is older than CVRF-CVE file.
skipping CVE-2022-1204 as CVE page is older than CVRF-CVE file.
no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2022-1184
skipping CVE-2022-1199 as CVE page is older than CVRF-CVE file.
skipping CVE-2022-1198 as CVE page is older than CVRF-CVE file.
skipping CVE-2022-1197 as CVE page is older than CVRF-CVE file.
skipping CVE-2022-1196 as CVE page is older than CVRF-CVE file.
skipping CVE-2022-1195 as CVE page is older than CVRF-CVE file.
no cpe found for SUSE Package Hub 15 SP3 in CVE-2022-1146
skipping CVE-2022-1183 as CVE page is older than CVRF-CVE file.
skipping CVE-2022-1160 as CVE page is older than CVRF-CVE file.
skipping CVE-2022-1158 as CVE page is older than CVRF-CVE file.
skipping CVE-2022-1154 as CVE page is older than CVRF-CVE file.
no cpe found for SUSE Package Hub 15 SP3 in CVE-2022-1145
no cpe found for SUSE Package Hub 15 SP3 in CVE-2022-1144
no cpe found for SUSE Package Hub 15 SP3 in CVE-2022-1143
no cpe found for SUSE Package Hub 15 SP3 in CVE-2022-1142
no cpe found for SUSE Package Hub 15 SP3 in CVE-2022-1141
no cpe found for SUSE Package Hub 15 SP3 in CVE-2022-1139
no cpe found for SUSE Package Hub 15 SP3 in CVE-2022-1138
no cpe found for SUSE Package Hub 15 SP4 in CVE-2022-1138
no cpe found for SUSE Package Hub 15 SP3 in CVE-2022-1137
no cpe found for SUSE Package Hub 15 SP3 in CVE-2022-1136
no cpe found for SUSE Package Hub 15 SP3 in CVE-2022-1135
no cpe found for SUSE Package Hub 15 SP3 in CVE-2022-1134
no cpe found for SUSE Package Hub 15 SP3 in CVE-2022-1133
no cpe found for SUSE Package Hub 15 SP3 in CVE-2022-1132
no cpe found for SUSE Package Hub 15 SP3 in CVE-2022-1131
no cpe found for SUSE Package Hub 15 SP3 in CVE-2022-1130
no cpe found for SUSE Package Hub 15 SP3 in CVE-2022-1129
no cpe found for SUSE Package Hub 15 SP3 in CVE-2022-1128
no cpe found for SUSE Package Hub 15 SP3 in CVE-2022-1127
no cpe found for SUSE Package Hub 15 SP3 in CVE-2022-1125
no cpe found for SUSE Package Hub 15 SP4 in CVE-2022-1125
skipping CVE-2022-1122 as CVE page is older than CVRF-CVE file.
skipping CVE-2022-1116 as CVE page is older than CVRF-CVE file.
skipping CVE-2022-1115 as CVE page is older than CVRF-CVE file.
skipping CVE-2022-1114 as CVE page is older than CVRF-CVE file.
no cpe found for SUSE Package Hub 15 SP3 in CVE-2022-1096
skipping CVE-2022-1097 as CVE page is older than CVRF-CVE file.
no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2022-1053
skipping CVE-2022-1056 as CVE page is older than CVRF-CVE file.
skipping CVE-2022-1055 as CVE page is older than CVRF-CVE file.
no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2022-1050
skipping CVE-2022-1043 as CVE page is older than CVRF-CVE file.
no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2022-1016
no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2022-1012
no cpe found for SUSE Liberty Linux 7 LTSS in CVE-2022-1011
skipping CVE-2022-0998 as CVE page is older than CVRF-CVE file.
no cpe found for SUSE Package Hub 15 SP3 in CVE-2022-0980
skipping CVE-2022-0995 as CVE page is older than CVRF-CVE file.
skipping CVE-2022-0987 as CVE page is older than CVRF-CVE file.
no cpe found for SUSE Package Hub 15 SP3 in CVE-2022-0979
no cpe found for SUSE Package Hub 15 SP3 in CVE-2022-0978
no cpe found for SUSE Package Hub 15 SP3 in CVE-2022-0977
no cpe found for SUSE Package Hub 15 SP3 in CVE-2022-0976
no cpe found for SUSE Package Hub 15 SP3 in CVE-2022-0975
no cpe found for SUSE Package Hub 15 SP3 in CVE-2022-0974
no cpe found for SUSE Package Hub 15 SP3 in CVE-2022-0973
no cpe found for SUSE Package Hub 15 SP3 in CVE-2022-0972
no cpe found for SUSE Package Hub 15 SP3 in CVE-2022-0971
skipping CVE-2022-0959 as CVE page is older than CVRF-CVE file.
skipping CVE-2022-0943 as CVE page is older than CVRF-CVE file.
skipping CVE-2022-0924 as CVE page is older than CVRF-CVE file.
skipping CVE-2022-0909 as CVE page is older than CVRF-CVE file.
skipping CVE-2022-0908 as CVE page is older than CVRF-CVE file.
skipping CVE-2022-0907 as CVE page is older than CVRF-CVE file.
skipping CVE-2022-0891 as CVE page is older than CVRF-CVE file.
skipping CVE-2022-0865 as CVE page is older than CVRF-CVE file.
skipping CVE-2022-0860 as CVE page is older than CVRF-CVE file.
skipping CVE-2022-0856 as CVE page is older than CVRF-CVE file.
skipping CVE-2022-0854 as CVE page is older than CVRF-CVE file.
no cpe found for SUSE Package Hub 15 SP4 in CVE-2022-0813
skipping CVE-2022-0843 as CVE page is older than CVRF-CVE file.
no cpe found for SUSE Package Hub 15 SP3 in CVE-2022-0809
no cpe found for SUSE Package Hub 15 SP3 in CVE-2022-0808
no cpe found for SUSE Package Hub 15 SP3 in CVE-2022-0807
no cpe found for SUSE Package Hub 15 SP3 in CVE-2022-0806
no cpe found for SUSE Package Hub 15 SP3 in CVE-2022-0805
no cpe found for SUSE Package Hub 15 SP3 in CVE-2022-0804
no cpe found for SUSE Package Hub 15 SP3 in CVE-2022-0803
no cpe found for SUSE Package Hub 15 SP3 in CVE-2022-0802
no cpe found for SUSE Package Hub 15 SP3 in CVE-2022-0801
no cpe found for SUSE Package Hub 15 SP3 in CVE-2022-0800
no cpe found for SUSE Package Hub 15 SP3 in CVE-2022-0799
no cpe found for SUSE Package Hub 15 SP3 in CVE-2022-0798
no cpe found for SUSE Package Hub 15 SP3 in CVE-2022-0797
no cpe found for SUSE Package Hub 15 SP4 in CVE-2022-0797
no cpe found for SUSE Package Hub 15 SP3 in CVE-2022-0796
no cpe found for SUSE Package Hub 15 SP3 in CVE-2022-0795
no cpe found for SUSE Package Hub 15 SP3 in CVE-2022-0794
no cpe found for SUSE Package Hub 15 SP3 in CVE-2022-0793
no cpe found for SUSE Package Hub 15 SP3 in CVE-2022-0792
no cpe found for SUSE Package Hub 15 SP3 in CVE-2022-0791
no cpe found for SUSE Package Hub 15 SP3 in CVE-2022-0790
no cpe found for SUSE Package Hub 15 SP3 in CVE-2022-0789
no cpe found for SUSE Package Hub 15 SP3 in CVE-2022-0730
skipping CVE-2022-0778 as CVE page is older than CVRF-CVE file.
skipping CVE-2022-0742 as CVE page is older than CVRF-CVE file.
skipping CVE-2022-0729 as CVE page is older than CVRF-CVE file.
skipping CVE-2022-0714 as CVE page is older than CVRF-CVE file.
no cpe found for SUSE Package Hub 15 SP3 in CVE-2022-0699
skipping CVE-2022-0696 as CVE page is older than CVRF-CVE file.
skipping CVE-2022-0685 as CVE page is older than CVRF-CVE file.
skipping CVE-2022-0670 as CVE page is older than CVRF-CVE file.
skipping CVE-2022-0669 as CVE page is older than CVRF-CVE file.
skipping CVE-2022-0667 as CVE page is older than CVRF-CVE file.
skipping CVE-2022-0646 as CVE page is older than CVRF-CVE file.
skipping CVE-2022-0635 as CVE page is older than CVRF-CVE file.
skipping CVE-2022-0629 as CVE page is older than CVRF-CVE file.
no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2022-0617
skipping CVE-2022-0615 as CVE page is older than CVRF-CVE file.
no cpe found for SUSE Package Hub 15 SP3 in CVE-2022-0610
no cpe found for SUSE Package Hub 15 SP3 in CVE-2022-0609
no cpe found for SUSE Package Hub 15 SP3 in CVE-2022-0608
no cpe found for SUSE Package Hub 15 SP3 in CVE-2022-0607
no cpe found for SUSE Package Hub 15 SP3 in CVE-2022-0606
no cpe found for SUSE Package Hub 15 SP3 in CVE-2022-0605
no cpe found for SUSE Package Hub 15 SP3 in CVE-2022-0604
no cpe found for SUSE Package Hub 15 SP3 in CVE-2022-0603
skipping CVE-2022-0586 as CVE page is older than CVRF-CVE file.
skipping CVE-2022-0585 as CVE page is older than CVRF-CVE file.
skipping CVE-2022-0583 as CVE page is older than CVRF-CVE file.
skipping CVE-2022-0582 as CVE page is older than CVRF-CVE file.
skipping CVE-2022-0581 as CVE page is older than CVRF-CVE file.
skipping CVE-2022-0572 as CVE page is older than CVRF-CVE file.
no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2022-0562
skipping CVE-2022-0563 as CVE page is older than CVRF-CVE file.
no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2022-0561
skipping CVE-2022-0554 as CVE page is older than CVRF-CVE file.
skipping CVE-2022-0547 as CVE page is older than CVRF-CVE file.
no cpe found for SUSE Package Hub 15 SP3 in CVE-2022-0534
no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2022-0530
no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2022-0529
skipping CVE-2022-0516 as CVE page is older than CVRF-CVE file.
skipping CVE-2022-0500 as CVE page is older than CVRF-CVE file.
skipping CVE-2022-0494 as CVE page is older than CVRF-CVE file.
skipping CVE-2022-0480 as CVE page is older than CVRF-CVE file.
no cpe found for SUSE Package Hub 15 SP3 in CVE-2022-0470
no cpe found for SUSE Package Hub 15 SP3 in CVE-2022-0469
no cpe found for SUSE Package Hub 15 SP3 in CVE-2022-0468
no cpe found for SUSE Package Hub 15 SP3 in CVE-2022-0467
no cpe found for SUSE Package Hub 15 SP3 in CVE-2022-0466
no cpe found for SUSE Package Hub 15 SP3 in CVE-2022-0465
no cpe found for SUSE Package Hub 15 SP3 in CVE-2022-0464
no cpe found for SUSE Package Hub 15 SP3 in CVE-2022-0463
no cpe found for SUSE Package Hub 15 SP3 in CVE-2022-0462
no cpe found for SUSE Package Hub 15 SP3 in CVE-2022-0461
no cpe found for SUSE Package Hub 15 SP3 in CVE-2022-0460
no cpe found for SUSE Package Hub 15 SP3 in CVE-2022-0459
no cpe found for SUSE Package Hub 15 SP3 in CVE-2022-0457
no cpe found for SUSE Package Hub 15 SP3 in CVE-2022-0456
no cpe found for SUSE Package Hub 15 SP3 in CVE-2022-0455
no cpe found for SUSE Package Hub 15 SP3 in CVE-2022-0454
no cpe found for SUSE Package Hub 15 SP3 in CVE-2022-0453
no cpe found for SUSE Package Hub 15 SP3 in CVE-2022-0452
skipping CVE-2022-0443 as CVE page is older than CVRF-CVE file.
skipping CVE-2022-0433 as CVE page is older than CVRF-CVE file.
skipping CVE-2022-0417 as CVE page is older than CVRF-CVE file.
skipping CVE-2022-0413 as CVE page is older than CVRF-CVE file.
skipping CVE-2022-0408 as CVE page is older than CVRF-CVE file.
skipping CVE-2022-0407 as CVE page is older than CVRF-CVE file.
skipping CVE-2022-0396 as CVE page is older than CVRF-CVE file.
skipping CVE-2022-0393 as CVE page is older than CVRF-CVE file.
skipping CVE-2022-0392 as CVE page is older than CVRF-CVE file.
no cpe found for SUSE Package Hub 15 SP4 in CVE-2022-0367
skipping CVE-2022-0382 as CVE page is older than CVRF-CVE file.
skipping CVE-2022-0368 as CVE page is older than CVRF-CVE file.
skipping CVE-2022-0361 as CVE page is older than CVRF-CVE file.
skipping CVE-2022-0359 as CVE page is older than CVRF-CVE file.
skipping CVE-2022-0358 as CVE page is older than CVRF-CVE file.
skipping CVE-2022-0351 as CVE page is older than CVRF-CVE file.
no cpe found for SUSE Package Hub 15 SP3 in CVE-2022-0311
skipping CVE-2022-0319 as CVE page is older than CVRF-CVE file.
skipping CVE-2022-0318 as CVE page is older than CVRF-CVE file.
no cpe found for SUSE Package Hub 15 SP3 in CVE-2022-0310
no cpe found for SUSE Package Hub 15 SP3 in CVE-2022-0309
no cpe found for SUSE Package Hub 15 SP3 in CVE-2022-0308
no cpe found for SUSE Package Hub 15 SP3 in CVE-2022-0307
no cpe found for SUSE Package Hub 15 SP3 in CVE-2022-0306
no cpe found for SUSE Package Hub 15 SP3 in CVE-2022-0305
no cpe found for SUSE Package Hub 15 SP3 in CVE-2022-0304
No V5 entry found for CVE-2022-0303 / /home/securitybot/prod/cve-database/cvelistV5/cves/2022/0xxxx/CVE-2022-0303.json:No such file or directory
no cpe found for SUSE Package Hub 15 SP3 in CVE-2022-0303
no cpe found for SUSE Package Hub 15 SP3 in CVE-2022-0302
no cpe found for SUSE Package Hub 15 SP3 in CVE-2022-0301
no cpe found for SUSE Package Hub 15 SP3 in CVE-2022-0300
no cpe found for SUSE Package Hub 15 SP3 in CVE-2022-0298
no cpe found for SUSE Package Hub 15 SP3 in CVE-2022-0297
no cpe found for SUSE Package Hub 15 SP3 in CVE-2022-0296
no cpe found for SUSE Package Hub 15 SP3 in CVE-2022-0295
no cpe found for SUSE Package Hub 15 SP3 in CVE-2022-0294
no cpe found for SUSE Package Hub 15 SP3 in CVE-2022-0293
no cpe found for SUSE Package Hub 15 SP3 in CVE-2022-0292
no cpe found for SUSE Package Hub 15 SP3 in CVE-2022-0291
no cpe found for SUSE Package Hub 15 SP3 in CVE-2022-0290
no cpe found for SUSE Package Hub 15 SP3 in CVE-2022-0289
skipping CVE-2022-0286 as CVE page is older than CVRF-CVE file.
skipping CVE-2022-0264 as CVE page is older than CVRF-CVE file.
skipping CVE-2022-0261 as CVE page is older than CVRF-CVE file.
no cpe found for SUSE Package Hub 15 SP3 in CVE-2022-0217
no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2022-0216
skipping CVE-2022-0213 as CVE page is older than CVRF-CVE file.
skipping CVE-2022-0204 as CVE page is older than CVRF-CVE file.
skipping CVE-2022-0185 as CVE page is older than CVRF-CVE file.
skipping CVE-2022-0175 as CVE page is older than CVRF-CVE file.
skipping CVE-2022-0171 as CVE page is older than CVRF-CVE file.
skipping CVE-2022-0168 as CVE page is older than CVRF-CVE file.
skipping CVE-2022-0158 as CVE page is older than CVRF-CVE file.
no cpe found for SUSE Manager Tools Beta for SLE Micro 5 in CVE-2022-0155
no cpe found for SUSE Manager Tools for SLE Micro 5 in CVE-2022-0155
skipping CVE-2022-0156 as CVE page is older than CVRF-CVE file.
no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2022-0135
no cpe found for SUSE Package Hub 15 SP3 in CVE-2022-0120
skipping CVE-2022-0128 as CVE page is older than CVRF-CVE file.
no cpe found for SUSE Package Hub 15 SP3 in CVE-2022-0118
no cpe found for SUSE Package Hub 15 SP3 in CVE-2022-0117
no cpe found for SUSE Package Hub 15 SP3 in CVE-2022-0116
no cpe found for SUSE Package Hub 15 SP3 in CVE-2022-0115
no cpe found for SUSE Package Hub 15 SP3 in CVE-2022-0114
no cpe found for SUSE Package Hub 15 SP3 in CVE-2022-0113
no cpe found for SUSE Package Hub 15 SP3 in CVE-2022-0112
no cpe found for SUSE Package Hub 15 SP3 in CVE-2022-0111
no cpe found for SUSE Package Hub 15 SP3 in CVE-2022-0110
no cpe found for SUSE Package Hub 15 SP3 in CVE-2022-0109
no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2022-0108
no cpe found for SUSE Package Hub 15 SP3 in CVE-2022-0108
no cpe found for SUSE Package Hub 15 SP3 in CVE-2022-0107
no cpe found for SUSE Package Hub 15 SP3 in CVE-2022-0106
no cpe found for SUSE Package Hub 15 SP3 in CVE-2022-0105
no cpe found for SUSE Package Hub 15 SP3 in CVE-2022-0104
no cpe found for SUSE Package Hub 15 SP3 in CVE-2022-0103
no cpe found for SUSE Package Hub 15 SP3 in CVE-2022-0102
no cpe found for SUSE Package Hub 15 SP3 in CVE-2022-0101
no cpe found for SUSE Package Hub 15 SP3 in CVE-2022-0100
no cpe found for SUSE Package Hub 15 SP3 in CVE-2022-0099
no cpe found for SUSE Package Hub 15 SP3 in CVE-2022-0098
no cpe found for SUSE Package Hub 15 SP3 in CVE-2022-0097
no cpe found for SUSE Package Hub 15 SP3 in CVE-2022-0096
no entry found for CVE-2021-81810 / /home/securitybot/prod/cve-database/cvelist/2021/81xxxx/CVE-2021-81810.json:No such file or directory
No V5 entry found for CVE-2021-81810 / /home/securitybot/prod/cve-database/cvelistV5/cves/2021/81xxxx/CVE-2021-81810.json:No such file or directory
notsure where SUSE WebYast 1.3 is contained?
no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2021-47620
skipping CVE-2021-47624 as CVE page is older than CVRF-CVE file.
skipping CVE-2021-47623 as CVE page is older than CVRF-CVE file.
skipping CVE-2021-47622 as CVE page is older than CVRF-CVE file.
--- /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2021-47620.xml 2024-10-20 02:10:04.216761000 +0200
+++ /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2021-47620.xml.new 2024-10-29 01:50:22.231175000 +0100
@@ -14,13 +14,13 @@
1
- 40
- 2024-10-20T00:10:03Z
+ 41
+ 2024-10-29T00:50:21Z
current
2024-06-21T23:46:53Z
- 2024-10-20T00:10:03Z
+ 2024-10-29T00:50:21Z
cve-database/bin/generate-cvrf-cve.pl
2020-12-27T01:00:00Z
@@ -3797,24 +3797,9 @@
kernel-default as a component of SUSE Linux Enterprise Server for SAP Applications 12 SP5
-
- kernel-default-base as a component of SUSE Linux Enterprise Server for SAP Applications 12 SP5
-
-
- kernel-default-devel as a component of SUSE Linux Enterprise Server for SAP Applications 12 SP5
-
-
- kernel-devel as a component of SUSE Linux Enterprise Server for SAP Applications 12 SP5
-
-
- kernel-macros as a component of SUSE Linux Enterprise Server for SAP Applications 12 SP5
-
kernel-source as a component of SUSE Linux Enterprise Server for SAP Applications 12 SP5
-
- kernel-devel-azure as a component of SUSE Linux Enterprise Server for SAP Applications 12 SP5
-
kernel-source-azure as a component of SUSE Linux Enterprise Server for SAP Applications 12 SP5
@@ -4572,11 +4557,6 @@
SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros
SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source
SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default
- SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base
- SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel
- SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel
- SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure
- SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros
SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source
SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure
SUSE Real Time Module 15 SP6:kernel-devel-rt
no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2021-47619
--- /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2021-47619.xml 2024-10-20 02:10:05.036732000 +0200
+++ /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2021-47619.xml.new 2024-10-29 01:50:23.048030000 +0100
@@ -14,13 +14,13 @@
1
- 38
- 2024-10-20T00:10:04Z
+ 39
+ 2024-10-29T00:50:22Z
current
2024-06-20T23:45:16Z
- 2024-10-20T00:10:04Z
+ 2024-10-29T00:50:22Z
cve-database/bin/generate-cvrf-cve.pl
2020-12-27T01:00:00Z
@@ -170,6 +170,21 @@
Image SLES12-SP5-EC2-BYOS
+
+
+ Image SLES12-SP5-GCE-BYOS
+
+
+
+
+ Image SLES12-SP5-GCE-SAP-BYOS
+
+
+
+
+ Image SLES12-SP5-GCE-SAP-On-Demand
+
+
Image SLES12-SP5-SAP-Azure-LI-BYOS-Production
@@ -2010,6 +2025,39 @@
kernel-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-EC2-BYOS
+
+ kernel-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-BYOS
+
+
+ cluster-md-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ dlm-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ gfs2-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ kernel-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ ocfs2-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ cluster-md-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
+
+ dlm-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
+
+ gfs2-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
+
+ kernel-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
+
+ ocfs2-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
cluster-md-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-SAP-Azure-LI-BYOS-Production
@@ -4035,18 +4083,6 @@
kernel-default as a component of SUSE Linux Enterprise Server for SAP Applications 12 SP5
-
- kernel-default-base as a component of SUSE Linux Enterprise Server for SAP Applications 12 SP5
-
-
- kernel-default-devel as a component of SUSE Linux Enterprise Server for SAP Applications 12 SP5
-
-
- kernel-devel as a component of SUSE Linux Enterprise Server for SAP Applications 12 SP5
-
-
- kernel-macros as a component of SUSE Linux Enterprise Server for SAP Applications 12 SP5
-
kernel-source as a component of SUSE Linux Enterprise Server for SAP Applications 12 SP5
@@ -4208,6 +4244,17 @@
Image SLES12-SP5-Azure-SAP-BYOS:kernel-default-4.12.14-122.225.1
Image SLES12-SP5-Azure-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.225.1
Image SLES12-SP5-EC2-BYOS:kernel-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-BYOS:kernel-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-BYOS:cluster-md-kmp-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-BYOS:dlm-kmp-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-BYOS:gfs2-kmp-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-BYOS:kernel-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:cluster-md-kmp-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:dlm-kmp-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:gfs2-kmp-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:kernel-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:ocfs2-kmp-default-4.12.14-122.225.1
Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:cluster-md-kmp-default-4.12.14-122.225.1
Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:dlm-kmp-default-4.12.14-122.225.1
Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:gfs2-kmp-default-4.12.14-122.225.1
skipping CVE-2021-47618 as CVE page is older than CVRF-CVE file.
skipping CVE-2021-47617 as CVE page is older than CVRF-CVE file.
skipping CVE-2021-47616 as CVE page is older than CVRF-CVE file.
skipping CVE-2021-47615 as CVE page is older than CVRF-CVE file.
skipping CVE-2021-47614 as CVE page is older than CVRF-CVE file.
skipping CVE-2021-47613 as CVE page is older than CVRF-CVE file.
skipping CVE-2021-47612 as CVE page is older than CVRF-CVE file.
skipping CVE-2021-47611 as CVE page is older than CVRF-CVE file.
skipping CVE-2021-47610 as CVE page is older than CVRF-CVE file.
skipping CVE-2021-47609 as CVE page is older than CVRF-CVE file.
skipping CVE-2021-47608 as CVE page is older than CVRF-CVE file.
skipping CVE-2021-47607 as CVE page is older than CVRF-CVE file.
--- /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2021-47606.xml 2024-10-17 01:57:27.875590000 +0200
+++ /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2021-47606.xml.new 2024-10-29 01:50:23.850996000 +0100
@@ -14,13 +14,13 @@
1
- 33
- 2024-10-16T23:57:27Z
+ 34
+ 2024-10-29T00:50:23Z
current
2024-06-20T23:45:19Z
- 2024-10-16T23:57:27Z
+ 2024-10-29T00:50:23Z
cve-database/bin/generate-cvrf-cve.pl
2020-12-27T01:00:00Z
@@ -179,6 +179,21 @@
Image SLES12-SP5-EC2-BYOS
+
+
+ Image SLES12-SP5-GCE-BYOS
+
+
+
+
+ Image SLES12-SP5-GCE-SAP-BYOS
+
+
+
+
+ Image SLES12-SP5-GCE-SAP-On-Demand
+
+
Image SLES12-SP5-SAP-Azure-LI-BYOS-Production
@@ -1662,6 +1677,39 @@
kernel-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-EC2-BYOS
+
+ kernel-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-BYOS
+
+
+ cluster-md-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ dlm-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ gfs2-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ kernel-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ ocfs2-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ cluster-md-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
+
+ dlm-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
+
+ gfs2-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
+
+ kernel-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
+
+ ocfs2-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
cluster-md-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-SAP-Azure-LI-BYOS-Production
@@ -3363,6 +3411,17 @@
Image SLES12-SP5-Azure-SAP-BYOS:kernel-default-4.12.14-122.225.1
Image SLES12-SP5-Azure-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.225.1
Image SLES12-SP5-EC2-BYOS:kernel-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-BYOS:kernel-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-BYOS:cluster-md-kmp-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-BYOS:dlm-kmp-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-BYOS:gfs2-kmp-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-BYOS:kernel-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:cluster-md-kmp-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:dlm-kmp-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:gfs2-kmp-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:kernel-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:ocfs2-kmp-default-4.12.14-122.225.1
Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:cluster-md-kmp-default-4.12.14-122.225.1
Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:dlm-kmp-default-4.12.14-122.225.1
Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:gfs2-kmp-default-4.12.14-122.225.1
no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2021-47600
skipping CVE-2021-47605 as CVE page is older than CVRF-CVE file.
skipping CVE-2021-47604 as CVE page is older than CVRF-CVE file.
skipping CVE-2021-47603 as CVE page is older than CVRF-CVE file.
skipping CVE-2021-47602 as CVE page is older than CVRF-CVE file.
skipping CVE-2021-47601 as CVE page is older than CVRF-CVE file.
--- /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2021-47600.xml 2024-10-20 02:10:19.828498000 +0200
+++ /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2021-47600.xml.new 2024-10-29 01:50:24.612943000 +0100
@@ -14,13 +14,13 @@
1
- 47
- 2024-10-20T00:10:19Z
+ 48
+ 2024-10-29T00:50:24Z
current
2024-06-20T23:45:20Z
- 2024-10-20T00:10:19Z
+ 2024-10-29T00:50:24Z
cve-database/bin/generate-cvrf-cve.pl
2020-12-27T01:00:00Z
@@ -1828,6 +1828,36 @@
kernel-livepatch-5_14_21-150500_55_73-default-1-150500.11.3.1
+
+ kernel-livepatch-5_3_18-150200_24_166-default-15-150200.2.1
+
+
+ kernel-livepatch-5_3_18-150200_24_169-default-15-150200.2.1
+
+
+ kernel-livepatch-5_3_18-150200_24_172-default-13-150200.2.1
+
+
+ kernel-livepatch-5_3_18-150200_24_175-default-14-150200.2.1
+
+
+ kernel-livepatch-5_3_18-150200_24_178-default-11-150200.2.1
+
+
+ kernel-livepatch-5_3_18-150200_24_183-default-9-150200.5.6.1
+
+
+ kernel-livepatch-5_3_18-150200_24_188-default-8-150200.5.6.1
+
+
+ kernel-livepatch-5_3_18-150200_24_191-default-7-150200.5.6.1
+
+
+ kernel-livepatch-5_3_18-150200_24_194-default-4-150200.5.6.1
+
+
+ kernel-livepatch-5_3_18-150200_24_197-default-3-150200.5.6.1
+
kernel-livepatch-5_3_18-150200_24_200-default-1-150200.5.3.1
@@ -4324,6 +4354,36 @@
kernel-rt-5.14.21-150500.13.61.1 as a component of openSUSE Leap Micro 5.5
+
+ kernel-livepatch-5_3_18-150200_24_166-default-15-150200.2.1 as a component of SUSE Linux Enterprise Live Patching 15 SP2
+
+
+ kernel-livepatch-5_3_18-150200_24_169-default-15-150200.2.1 as a component of SUSE Linux Enterprise Live Patching 15 SP2
+
+
+ kernel-livepatch-5_3_18-150200_24_172-default-13-150200.2.1 as a component of SUSE Linux Enterprise Live Patching 15 SP2
+
+
+ kernel-livepatch-5_3_18-150200_24_175-default-14-150200.2.1 as a component of SUSE Linux Enterprise Live Patching 15 SP2
+
+
+ kernel-livepatch-5_3_18-150200_24_178-default-11-150200.2.1 as a component of SUSE Linux Enterprise Live Patching 15 SP2
+
+
+ kernel-livepatch-5_3_18-150200_24_183-default-9-150200.5.6.1 as a component of SUSE Linux Enterprise Live Patching 15 SP2
+
+
+ kernel-livepatch-5_3_18-150200_24_188-default-8-150200.5.6.1 as a component of SUSE Linux Enterprise Live Patching 15 SP2
+
+
+ kernel-livepatch-5_3_18-150200_24_191-default-7-150200.5.6.1 as a component of SUSE Linux Enterprise Live Patching 15 SP2
+
+
+ kernel-livepatch-5_3_18-150200_24_194-default-4-150200.5.6.1 as a component of SUSE Linux Enterprise Live Patching 15 SP2
+
+
+ kernel-livepatch-5_3_18-150200_24_197-default-3-150200.5.6.1 as a component of SUSE Linux Enterprise Live Patching 15 SP2
+
kernel-default as a component of SUSE Linux Enterprise High Performance Computing 12 SP5
@@ -4477,18 +4537,6 @@
kernel-default as a component of SUSE Linux Enterprise Server for SAP Applications 12 SP5
-
- kernel-default-base as a component of SUSE Linux Enterprise Server for SAP Applications 12 SP5
-
-
- kernel-default-devel as a component of SUSE Linux Enterprise Server for SAP Applications 12 SP5
-
-
- kernel-devel as a component of SUSE Linux Enterprise Server for SAP Applications 12 SP5
-
-
- kernel-macros as a component of SUSE Linux Enterprise Server for SAP Applications 12 SP5
-
kernel-source as a component of SUSE Linux Enterprise Server for SAP Applications 12 SP5
@@ -5303,6 +5351,18 @@
openSUSE Leap Micro 5.5:kernel-default-base-5.14.21-150500.55.73.1.150500.6.33.8
openSUSE Leap Micro 5.5:kernel-rt-5.14.21-150500.13.61.1
+
+ SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_166-default-15-150200.2.1
+ SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_169-default-15-150200.2.1
+ SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_172-default-13-150200.2.1
+ SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_175-default-14-150200.2.1
+ SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_178-default-11-150200.2.1
+ SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_183-default-9-150200.5.6.1
+ SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_188-default-8-150200.5.6.1
+ SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_191-default-7-150200.5.6.1
+ SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_194-default-4-150200.5.6.1
+ SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_197-default-3-150200.5.6.1
+
SUSE Linux Enterprise High Performance Computing 12 SP5:kernel-default
SUSE Linux Enterprise High Performance Computing 12 SP5:kernel-source
@@ -5323,10 +5383,6 @@
SUSE Linux Enterprise Server 12 SP5:kernel-macros
SUSE Linux Enterprise Server 12 SP5:kernel-source
SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default
- SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base
- SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel
- SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel
- SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros
SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source
SUSE Real Time Module 15 SP6:kernel-devel-rt
SUSE Real Time Module 15 SP6:kernel-source-rt
--- /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2021-47599.xml 2024-10-16 02:14:47.302237000 +0200
+++ /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2021-47599.xml.new 2024-10-29 01:50:25.459991000 +0100
@@ -14,13 +14,13 @@
1
- 31
- 2024-10-16T00:14:46Z
+ 32
+ 2024-10-29T00:50:24Z
current
2024-06-20T23:45:20Z
- 2024-10-16T00:14:46Z
+ 2024-10-29T00:50:24Z
cve-database/bin/generate-cvrf-cve.pl
2020-12-27T01:00:00Z
@@ -126,6 +126,21 @@
Image SLES12-SP5-EC2-BYOS
+
+
+ Image SLES12-SP5-GCE-BYOS
+
+
+
+
+ Image SLES12-SP5-GCE-SAP-BYOS
+
+
+
+
+ Image SLES12-SP5-GCE-SAP-On-Demand
+
+
Image SLES12-SP5-SAP-Azure-LI-BYOS-Production
@@ -1517,6 +1532,39 @@
kernel-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-EC2-BYOS
+
+ kernel-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-BYOS
+
+
+ cluster-md-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ dlm-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ gfs2-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ kernel-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ ocfs2-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ cluster-md-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
+
+ dlm-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
+
+ gfs2-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
+
+ kernel-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
+
+ ocfs2-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
cluster-md-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-SAP-Azure-LI-BYOS-Production
@@ -3078,6 +3126,17 @@
Image SLES12-SP5-Azure-SAP-BYOS:kernel-default-4.12.14-122.225.1
Image SLES12-SP5-Azure-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.225.1
Image SLES12-SP5-EC2-BYOS:kernel-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-BYOS:kernel-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-BYOS:cluster-md-kmp-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-BYOS:dlm-kmp-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-BYOS:gfs2-kmp-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-BYOS:kernel-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:cluster-md-kmp-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:dlm-kmp-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:gfs2-kmp-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:kernel-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:ocfs2-kmp-default-4.12.14-122.225.1
Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:cluster-md-kmp-default-4.12.14-122.225.1
Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:dlm-kmp-default-4.12.14-122.225.1
Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:gfs2-kmp-default-4.12.14-122.225.1
no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2021-47598
--- /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2021-47598.xml 2024-10-20 02:10:22.071910000 +0200
+++ /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2021-47598.xml.new 2024-10-29 01:50:26.258968000 +0100
@@ -14,13 +14,13 @@
1
- 31
- 2024-10-20T00:10:20Z
+ 32
+ 2024-10-29T00:50:25Z
current
2024-06-20T23:45:20Z
- 2024-10-20T00:10:20Z
+ 2024-10-29T00:50:25Z
cve-database/bin/generate-cvrf-cve.pl
2020-12-27T01:00:00Z
@@ -1600,18 +1600,180 @@
kernel-kvmsmall-vdso-5.14.21-150500.55.73.1
+
+ kernel-livepatch-5_14_21-150400_24_100-default-13-150400.2.1
+
+
+ kernel-livepatch-5_14_21-150400_24_103-default-11-150400.2.1
+
+
+ kernel-livepatch-5_14_21-150400_24_108-default-10-150400.9.8.1
+
+
+ kernel-livepatch-5_14_21-150400_24_111-default-8-150400.9.6.1
+
+
+ kernel-livepatch-5_14_21-150400_24_116-default-8-150400.9.8.1
+
+
+ kernel-livepatch-5_14_21-150400_24_119-default-7-150400.9.6.1
+
+
+ kernel-livepatch-5_14_21-150400_24_122-default-5-150400.9.6.1
+
+
+ kernel-livepatch-5_14_21-150400_24_125-default-3-150400.9.6.1
+
kernel-livepatch-5_14_21-150400_24_128-default-1-150400.9.3.1
+
+ kernel-livepatch-5_14_21-150400_24_88-default-15-150400.2.1
+
+
+ kernel-livepatch-5_14_21-150400_24_92-default-14-150400.2.1
+
+
+ kernel-livepatch-5_14_21-150400_24_97-default-13-150400.2.1
+
+
+ kernel-livepatch-5_14_21-150500_13_18-rt-15-150500.2.1
+
+
+ kernel-livepatch-5_14_21-150500_13_21-rt-14-150500.2.1
+
+
+ kernel-livepatch-5_14_21-150500_13_24-rt-14-150500.2.1
+
+
+ kernel-livepatch-5_14_21-150500_13_27-rt-13-150500.2.1
+
+
+ kernel-livepatch-5_14_21-150500_13_30-rt-12-150500.2.1
+
+
+ kernel-livepatch-5_14_21-150500_13_35-rt-10-150500.11.8.1
+
+
+ kernel-livepatch-5_14_21-150500_13_38-rt-8-150500.11.6.1
+
+
+ kernel-livepatch-5_14_21-150500_13_47-rt-8-150500.11.6.1
+
+
+ kernel-livepatch-5_14_21-150500_13_52-rt-6-150500.11.8.1
+
+
+ kernel-livepatch-5_14_21-150500_13_55-rt-6-150500.11.6.1
+
+
+ kernel-livepatch-5_14_21-150500_13_58-rt-5-150500.11.6.1
+
+
+ kernel-livepatch-5_14_21-150500_13_61-rt-3-150500.11.6.1
+
kernel-livepatch-5_14_21-150500_13_64-rt-1-150500.11.3.1
+
+ kernel-livepatch-5_14_21-150500_55_28-default-15-150500.2.1
+
+
+ kernel-livepatch-5_14_21-150500_55_31-default-14-150500.2.1
+
+
+ kernel-livepatch-5_14_21-150500_55_36-default-13-150500.2.1
+
+
+ kernel-livepatch-5_14_21-150500_55_39-default-13-150500.2.1
+
+
+ kernel-livepatch-5_14_21-150500_55_44-default-12-150500.2.1
+
+
+ kernel-livepatch-5_14_21-150500_55_49-default-10-150500.11.8.1
+
+
+ kernel-livepatch-5_14_21-150500_55_52-default-8-150500.11.6.1
+
+
+ kernel-livepatch-5_14_21-150500_55_59-default-8-150500.11.10.1
+
+
+ kernel-livepatch-5_14_21-150500_55_62-default-6-150500.11.6.1
+
+
+ kernel-livepatch-5_14_21-150500_55_65-default-6-150500.11.6.1
+
+
+ kernel-livepatch-5_14_21-150500_55_68-default-5-150500.11.6.1
+
kernel-livepatch-5_14_21-150500_55_73-default-1-150500.11.3.1
+
+ kernel-livepatch-5_3_18-150200_24_166-default-15-150200.2.1
+
+
+ kernel-livepatch-5_3_18-150200_24_169-default-15-150200.2.1
+
+
+ kernel-livepatch-5_3_18-150200_24_172-default-13-150200.2.1
+
+
+ kernel-livepatch-5_3_18-150200_24_175-default-14-150200.2.1
+
+
+ kernel-livepatch-5_3_18-150200_24_178-default-11-150200.2.1
+
+
+ kernel-livepatch-5_3_18-150200_24_183-default-9-150200.5.6.1
+
+
+ kernel-livepatch-5_3_18-150200_24_188-default-8-150200.5.6.1
+
+
+ kernel-livepatch-5_3_18-150200_24_191-default-7-150200.5.6.1
+
+
+ kernel-livepatch-5_3_18-150200_24_194-default-4-150200.5.6.1
+
+
+ kernel-livepatch-5_3_18-150200_24_197-default-3-150200.5.6.1
+
kernel-livepatch-5_3_18-150200_24_200-default-1-150200.5.3.1
+
+ kernel-livepatch-5_3_18-150300_59_138-default-15-150300.2.1
+
+
+ kernel-livepatch-5_3_18-150300_59_141-default-14-150300.2.1
+
+
+ kernel-livepatch-5_3_18-150300_59_144-default-13-150300.2.1
+
+
+ kernel-livepatch-5_3_18-150300_59_147-default-13-150300.2.1
+
+
+ kernel-livepatch-5_3_18-150300_59_150-default-12-150300.2.1
+
+
+ kernel-livepatch-5_3_18-150300_59_153-default-9-150300.7.6.1
+
+
+ kernel-livepatch-5_3_18-150300_59_158-default-8-150300.7.6.1
+
+
+ kernel-livepatch-5_3_18-150300_59_161-default-7-150300.7.6.1
+
+
+ kernel-livepatch-5_3_18-150300_59_164-default-4-150300.7.6.1
+
+
+ kernel-livepatch-5_3_18-150300_59_167-default-3-150300.7.6.1
+
kernel-livepatch-5_3_18-150300_59_170-default-1-150300.7.3.1
@@ -3604,6 +3766,168 @@
kernel-rt-5.14.21-150500.13.64.1 as a component of openSUSE Leap Micro 5.5
+
+ kernel-livepatch-5_3_18-150200_24_166-default-15-150200.2.1 as a component of SUSE Linux Enterprise Live Patching 15 SP2
+
+
+ kernel-livepatch-5_3_18-150200_24_169-default-15-150200.2.1 as a component of SUSE Linux Enterprise Live Patching 15 SP2
+
+
+ kernel-livepatch-5_3_18-150200_24_172-default-13-150200.2.1 as a component of SUSE Linux Enterprise Live Patching 15 SP2
+
+
+ kernel-livepatch-5_3_18-150200_24_175-default-14-150200.2.1 as a component of SUSE Linux Enterprise Live Patching 15 SP2
+
+
+ kernel-livepatch-5_3_18-150200_24_178-default-11-150200.2.1 as a component of SUSE Linux Enterprise Live Patching 15 SP2
+
+
+ kernel-livepatch-5_3_18-150200_24_183-default-9-150200.5.6.1 as a component of SUSE Linux Enterprise Live Patching 15 SP2
+
+
+ kernel-livepatch-5_3_18-150200_24_188-default-8-150200.5.6.1 as a component of SUSE Linux Enterprise Live Patching 15 SP2
+
+
+ kernel-livepatch-5_3_18-150200_24_191-default-7-150200.5.6.1 as a component of SUSE Linux Enterprise Live Patching 15 SP2
+
+
+ kernel-livepatch-5_3_18-150200_24_194-default-4-150200.5.6.1 as a component of SUSE Linux Enterprise Live Patching 15 SP2
+
+
+ kernel-livepatch-5_3_18-150200_24_197-default-3-150200.5.6.1 as a component of SUSE Linux Enterprise Live Patching 15 SP2
+
+
+ kernel-livepatch-5_3_18-150300_59_138-default-15-150300.2.1 as a component of SUSE Linux Enterprise Live Patching 15 SP3
+
+
+ kernel-livepatch-5_3_18-150300_59_141-default-14-150300.2.1 as a component of SUSE Linux Enterprise Live Patching 15 SP3
+
+
+ kernel-livepatch-5_3_18-150300_59_144-default-13-150300.2.1 as a component of SUSE Linux Enterprise Live Patching 15 SP3
+
+
+ kernel-livepatch-5_3_18-150300_59_147-default-13-150300.2.1 as a component of SUSE Linux Enterprise Live Patching 15 SP3
+
+
+ kernel-livepatch-5_3_18-150300_59_150-default-12-150300.2.1 as a component of SUSE Linux Enterprise Live Patching 15 SP3
+
+
+ kernel-livepatch-5_3_18-150300_59_153-default-9-150300.7.6.1 as a component of SUSE Linux Enterprise Live Patching 15 SP3
+
+
+ kernel-livepatch-5_3_18-150300_59_158-default-8-150300.7.6.1 as a component of SUSE Linux Enterprise Live Patching 15 SP3
+
+
+ kernel-livepatch-5_3_18-150300_59_161-default-7-150300.7.6.1 as a component of SUSE Linux Enterprise Live Patching 15 SP3
+
+
+ kernel-livepatch-5_3_18-150300_59_164-default-4-150300.7.6.1 as a component of SUSE Linux Enterprise Live Patching 15 SP3
+
+
+ kernel-livepatch-5_3_18-150300_59_167-default-3-150300.7.6.1 as a component of SUSE Linux Enterprise Live Patching 15 SP3
+
+
+ kernel-livepatch-5_14_21-150400_24_100-default-13-150400.2.1 as a component of SUSE Linux Enterprise Live Patching 15 SP4
+
+
+ kernel-livepatch-5_14_21-150400_24_103-default-11-150400.2.1 as a component of SUSE Linux Enterprise Live Patching 15 SP4
+
+
+ kernel-livepatch-5_14_21-150400_24_108-default-10-150400.9.8.1 as a component of SUSE Linux Enterprise Live Patching 15 SP4
+
+
+ kernel-livepatch-5_14_21-150400_24_111-default-8-150400.9.6.1 as a component of SUSE Linux Enterprise Live Patching 15 SP4
+
+
+ kernel-livepatch-5_14_21-150400_24_116-default-8-150400.9.8.1 as a component of SUSE Linux Enterprise Live Patching 15 SP4
+
+
+ kernel-livepatch-5_14_21-150400_24_119-default-7-150400.9.6.1 as a component of SUSE Linux Enterprise Live Patching 15 SP4
+
+
+ kernel-livepatch-5_14_21-150400_24_122-default-5-150400.9.6.1 as a component of SUSE Linux Enterprise Live Patching 15 SP4
+
+
+ kernel-livepatch-5_14_21-150400_24_125-default-3-150400.9.6.1 as a component of SUSE Linux Enterprise Live Patching 15 SP4
+
+
+ kernel-livepatch-5_14_21-150400_24_88-default-15-150400.2.1 as a component of SUSE Linux Enterprise Live Patching 15 SP4
+
+
+ kernel-livepatch-5_14_21-150400_24_92-default-14-150400.2.1 as a component of SUSE Linux Enterprise Live Patching 15 SP4
+
+
+ kernel-livepatch-5_14_21-150400_24_97-default-13-150400.2.1 as a component of SUSE Linux Enterprise Live Patching 15 SP4
+
+
+ kernel-livepatch-5_14_21-150500_13_18-rt-15-150500.2.1 as a component of SUSE Linux Enterprise Live Patching 15 SP5
+
+
+ kernel-livepatch-5_14_21-150500_13_21-rt-14-150500.2.1 as a component of SUSE Linux Enterprise Live Patching 15 SP5
+
+
+ kernel-livepatch-5_14_21-150500_13_24-rt-14-150500.2.1 as a component of SUSE Linux Enterprise Live Patching 15 SP5
+
+
+ kernel-livepatch-5_14_21-150500_13_27-rt-13-150500.2.1 as a component of SUSE Linux Enterprise Live Patching 15 SP5
+
+
+ kernel-livepatch-5_14_21-150500_13_30-rt-12-150500.2.1 as a component of SUSE Linux Enterprise Live Patching 15 SP5
+
+
+ kernel-livepatch-5_14_21-150500_13_35-rt-10-150500.11.8.1 as a component of SUSE Linux Enterprise Live Patching 15 SP5
+
+
+ kernel-livepatch-5_14_21-150500_13_38-rt-8-150500.11.6.1 as a component of SUSE Linux Enterprise Live Patching 15 SP5
+
+
+ kernel-livepatch-5_14_21-150500_13_47-rt-8-150500.11.6.1 as a component of SUSE Linux Enterprise Live Patching 15 SP5
+
+
+ kernel-livepatch-5_14_21-150500_13_52-rt-6-150500.11.8.1 as a component of SUSE Linux Enterprise Live Patching 15 SP5
+
+
+ kernel-livepatch-5_14_21-150500_13_55-rt-6-150500.11.6.1 as a component of SUSE Linux Enterprise Live Patching 15 SP5
+
+
+ kernel-livepatch-5_14_21-150500_13_58-rt-5-150500.11.6.1 as a component of SUSE Linux Enterprise Live Patching 15 SP5
+
+
+ kernel-livepatch-5_14_21-150500_13_61-rt-3-150500.11.6.1 as a component of SUSE Linux Enterprise Live Patching 15 SP5
+
+
+ kernel-livepatch-5_14_21-150500_55_28-default-15-150500.2.1 as a component of SUSE Linux Enterprise Live Patching 15 SP5
+
+
+ kernel-livepatch-5_14_21-150500_55_31-default-14-150500.2.1 as a component of SUSE Linux Enterprise Live Patching 15 SP5
+
+
+ kernel-livepatch-5_14_21-150500_55_36-default-13-150500.2.1 as a component of SUSE Linux Enterprise Live Patching 15 SP5
+
+
+ kernel-livepatch-5_14_21-150500_55_39-default-13-150500.2.1 as a component of SUSE Linux Enterprise Live Patching 15 SP5
+
+
+ kernel-livepatch-5_14_21-150500_55_44-default-12-150500.2.1 as a component of SUSE Linux Enterprise Live Patching 15 SP5
+
+
+ kernel-livepatch-5_14_21-150500_55_49-default-10-150500.11.8.1 as a component of SUSE Linux Enterprise Live Patching 15 SP5
+
+
+ kernel-livepatch-5_14_21-150500_55_52-default-8-150500.11.6.1 as a component of SUSE Linux Enterprise Live Patching 15 SP5
+
+
+ kernel-livepatch-5_14_21-150500_55_59-default-8-150500.11.10.1 as a component of SUSE Linux Enterprise Live Patching 15 SP5
+
+
+ kernel-livepatch-5_14_21-150500_55_62-default-6-150500.11.6.1 as a component of SUSE Linux Enterprise Live Patching 15 SP5
+
+
+ kernel-livepatch-5_14_21-150500_55_65-default-6-150500.11.6.1 as a component of SUSE Linux Enterprise Live Patching 15 SP5
+
+
+ kernel-livepatch-5_14_21-150500_55_68-default-5-150500.11.6.1 as a component of SUSE Linux Enterprise Live Patching 15 SP5
+
kernel-default as a component of SUSE Linux Enterprise High Performance Computing 12 SP5
@@ -3796,24 +4120,9 @@
kernel-default as a component of SUSE Linux Enterprise Server for SAP Applications 12 SP5
-
- kernel-default-base as a component of SUSE Linux Enterprise Server for SAP Applications 12 SP5
-
-
- kernel-default-devel as a component of SUSE Linux Enterprise Server for SAP Applications 12 SP5
-
-
- kernel-devel as a component of SUSE Linux Enterprise Server for SAP Applications 12 SP5
-
-
- kernel-macros as a component of SUSE Linux Enterprise Server for SAP Applications 12 SP5
-
kernel-source as a component of SUSE Linux Enterprise Server for SAP Applications 12 SP5
-
- kernel-devel-azure as a component of SUSE Linux Enterprise Server for SAP Applications 12 SP5
-
kernel-source-azure as a component of SUSE Linux Enterprise Server for SAP Applications 12 SP5
@@ -4545,6 +4854,62 @@
openSUSE Leap Micro 5.5:kernel-default-base-5.14.21-150500.55.73.1.150500.6.33.8
openSUSE Leap Micro 5.5:kernel-rt-5.14.21-150500.13.64.1
+
+ SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_166-default-15-150200.2.1
+ SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_169-default-15-150200.2.1
+ SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_172-default-13-150200.2.1
+ SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_175-default-14-150200.2.1
+ SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_178-default-11-150200.2.1
+ SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_183-default-9-150200.5.6.1
+ SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_188-default-8-150200.5.6.1
+ SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_191-default-7-150200.5.6.1
+ SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_194-default-4-150200.5.6.1
+ SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_197-default-3-150200.5.6.1
+ SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_138-default-15-150300.2.1
+ SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_141-default-14-150300.2.1
+ SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_144-default-13-150300.2.1
+ SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_147-default-13-150300.2.1
+ SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_150-default-12-150300.2.1
+ SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_153-default-9-150300.7.6.1
+ SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_158-default-8-150300.7.6.1
+ SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_161-default-7-150300.7.6.1
+ SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_164-default-4-150300.7.6.1
+ SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_167-default-3-150300.7.6.1
+ SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_100-default-13-150400.2.1
+ SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_103-default-11-150400.2.1
+ SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_108-default-10-150400.9.8.1
+ SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_111-default-8-150400.9.6.1
+ SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_116-default-8-150400.9.8.1
+ SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_119-default-7-150400.9.6.1
+ SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_122-default-5-150400.9.6.1
+ SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_125-default-3-150400.9.6.1
+ SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_88-default-15-150400.2.1
+ SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_92-default-14-150400.2.1
+ SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_97-default-13-150400.2.1
+ SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_18-rt-15-150500.2.1
+ SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_21-rt-14-150500.2.1
+ SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_24-rt-14-150500.2.1
+ SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_27-rt-13-150500.2.1
+ SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_30-rt-12-150500.2.1
+ SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_35-rt-10-150500.11.8.1
+ SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_38-rt-8-150500.11.6.1
+ SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_47-rt-8-150500.11.6.1
+ SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_52-rt-6-150500.11.8.1
+ SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_55-rt-6-150500.11.6.1
+ SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-5-150500.11.6.1
+ SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_61-rt-3-150500.11.6.1
+ SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_28-default-15-150500.2.1
+ SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_31-default-14-150500.2.1
+ SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_36-default-13-150500.2.1
+ SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_39-default-13-150500.2.1
+ SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_44-default-12-150500.2.1
+ SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_49-default-10-150500.11.8.1
+ SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_52-default-8-150500.11.6.1
+ SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_59-default-8-150500.11.10.1
+ SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-6-150500.11.6.1
+ SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_65-default-6-150500.11.6.1
+ SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_68-default-5-150500.11.6.1
+
SUSE Linux Enterprise High Performance Computing 12 SP5:kernel-default
SUSE Linux Enterprise High Performance Computing 12 SP5:kernel-source
@@ -4610,11 +4975,6 @@
SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros
SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source
SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default
- SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base
- SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel
- SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel
- SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure
- SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros
SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source
SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure
SUSE Real Time Module 15 SP6:kernel-devel-rt
no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2021-47597
--- /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2021-47597.xml 2024-10-20 02:10:23.130847000 +0200
+++ /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2021-47597.xml.new 2024-10-29 01:50:27.215805000 +0100
@@ -14,13 +14,13 @@
1
- 38
- 2024-10-20T00:10:22Z
+ 39
+ 2024-10-29T00:50:26Z
current
2024-06-20T23:45:21Z
- 2024-10-20T00:10:22Z
+ 2024-10-29T00:50:26Z
cve-database/bin/generate-cvrf-cve.pl
2020-12-27T01:00:00Z
@@ -185,6 +185,21 @@
Image SLES12-SP5-EC2-BYOS
+
+
+ Image SLES12-SP5-GCE-BYOS
+
+
+
+
+ Image SLES12-SP5-GCE-SAP-BYOS
+
+
+
+
+ Image SLES12-SP5-GCE-SAP-On-Demand
+
+
Image SLES12-SP5-SAP-Azure-LI-BYOS-Production
@@ -1838,6 +1853,39 @@
kernel-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-EC2-BYOS
+
+ kernel-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-BYOS
+
+
+ cluster-md-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ dlm-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ gfs2-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ kernel-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ ocfs2-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ cluster-md-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
+
+ dlm-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
+
+ gfs2-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
+
+ kernel-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
+
+ ocfs2-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
cluster-md-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-SAP-Azure-LI-BYOS-Production
@@ -3850,6 +3898,17 @@
Image SLES12-SP5-Azure-SAP-BYOS:kernel-default-4.12.14-122.225.1
Image SLES12-SP5-Azure-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.225.1
Image SLES12-SP5-EC2-BYOS:kernel-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-BYOS:kernel-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-BYOS:cluster-md-kmp-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-BYOS:dlm-kmp-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-BYOS:gfs2-kmp-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-BYOS:kernel-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:cluster-md-kmp-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:dlm-kmp-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:gfs2-kmp-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:kernel-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:ocfs2-kmp-default-4.12.14-122.225.1
Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:cluster-md-kmp-default-4.12.14-122.225.1
Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:dlm-kmp-default-4.12.14-122.225.1
Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:gfs2-kmp-default-4.12.14-122.225.1
skipping CVE-2021-47596 as CVE page is older than CVRF-CVE file.
skipping CVE-2021-47595 as CVE page is older than CVRF-CVE file.
skipping CVE-2021-47594 as CVE page is older than CVRF-CVE file.
skipping CVE-2021-47593 as CVE page is older than CVRF-CVE file.
skipping CVE-2021-47592 as CVE page is older than CVRF-CVE file.
skipping CVE-2021-47591 as CVE page is older than CVRF-CVE file.
skipping CVE-2021-47590 as CVE page is older than CVRF-CVE file.
skipping CVE-2021-47589 as CVE page is older than CVRF-CVE file.
--- /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2021-47588.xml 2024-10-16 02:14:50.137542000 +0200
+++ /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2021-47588.xml.new 2024-10-29 01:50:28.005795000 +0100
@@ -14,13 +14,13 @@
1
- 30
- 2024-10-16T00:14:49Z
+ 31
+ 2024-10-29T00:50:27Z
current
2024-06-20T23:45:23Z
- 2024-10-16T00:14:49Z
+ 2024-10-29T00:50:27Z
cve-database/bin/generate-cvrf-cve.pl
2020-12-27T01:00:00Z
@@ -148,6 +148,21 @@
Image SLES12-SP5-EC2-BYOS
+
+
+ Image SLES12-SP5-GCE-BYOS
+
+
+
+
+ Image SLES12-SP5-GCE-SAP-BYOS
+
+
+
+
+ Image SLES12-SP5-GCE-SAP-On-Demand
+
+
Image SLES12-SP5-SAP-Azure-LI-BYOS-Production
@@ -1518,6 +1533,39 @@
kernel-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-EC2-BYOS
+
+ kernel-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-BYOS
+
+
+ cluster-md-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ dlm-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ gfs2-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ kernel-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ ocfs2-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ cluster-md-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
+
+ dlm-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
+
+ gfs2-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
+
+ kernel-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
+
+ ocfs2-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
cluster-md-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-SAP-Azure-LI-BYOS-Production
@@ -3086,6 +3134,17 @@
Image SLES12-SP5-Azure-SAP-BYOS:kernel-default-4.12.14-122.225.1
Image SLES12-SP5-Azure-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.225.1
Image SLES12-SP5-EC2-BYOS:kernel-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-BYOS:kernel-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-BYOS:cluster-md-kmp-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-BYOS:dlm-kmp-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-BYOS:gfs2-kmp-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-BYOS:kernel-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:cluster-md-kmp-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:dlm-kmp-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:gfs2-kmp-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:kernel-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:ocfs2-kmp-default-4.12.14-122.225.1
Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:cluster-md-kmp-default-4.12.14-122.225.1
Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:dlm-kmp-default-4.12.14-122.225.1
Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:gfs2-kmp-default-4.12.14-122.225.1
no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2021-47582
skipping CVE-2021-47587 as CVE page is older than CVRF-CVE file.
skipping CVE-2021-47586 as CVE page is older than CVRF-CVE file.
skipping CVE-2021-47585 as CVE page is older than CVRF-CVE file.
skipping CVE-2021-47584 as CVE page is older than CVRF-CVE file.
skipping CVE-2021-47583 as CVE page is older than CVRF-CVE file.
--- /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2021-47582.xml 2024-10-20 02:10:36.562587000 +0200
+++ /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2021-47582.xml.new 2024-10-29 01:50:29.021695000 +0100
@@ -14,13 +14,13 @@
1
- 36
- 2024-10-20T00:10:36Z
+ 37
+ 2024-10-29T00:50:28Z
current
2024-06-20T23:45:24Z
- 2024-10-20T00:10:36Z
+ 2024-10-29T00:50:28Z
cve-database/bin/generate-cvrf-cve.pl
2020-12-27T01:00:00Z
@@ -149,6 +149,21 @@
Image SLES12-SP5-EC2-BYOS
+
+
+ Image SLES12-SP5-GCE-BYOS
+
+
+
+
+ Image SLES12-SP5-GCE-SAP-BYOS
+
+
+
+
+ Image SLES12-SP5-GCE-SAP-On-Demand
+
+
Image SLES12-SP5-SAP-Azure-LI-BYOS-Production
@@ -1847,6 +1862,39 @@
kernel-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-EC2-BYOS
+
+ kernel-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-BYOS
+
+
+ cluster-md-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ dlm-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ gfs2-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ kernel-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ ocfs2-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ cluster-md-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
+
+ dlm-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
+
+ gfs2-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
+
+ kernel-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
+
+ ocfs2-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
cluster-md-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-SAP-Azure-LI-BYOS-Production
@@ -3659,18 +3707,6 @@
kernel-default as a component of SUSE Linux Enterprise Server for SAP Applications 12 SP5
-
- kernel-default-base as a component of SUSE Linux Enterprise Server for SAP Applications 12 SP5
-
-
- kernel-default-devel as a component of SUSE Linux Enterprise Server for SAP Applications 12 SP5
-
-
- kernel-devel as a component of SUSE Linux Enterprise Server for SAP Applications 12 SP5
-
-
- kernel-macros as a component of SUSE Linux Enterprise Server for SAP Applications 12 SP5
-
kernel-source as a component of SUSE Linux Enterprise Server for SAP Applications 12 SP5
@@ -3837,6 +3873,17 @@
Image SLES12-SP5-Azure-SAP-BYOS:kernel-default-4.12.14-122.225.1
Image SLES12-SP5-Azure-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.225.1
Image SLES12-SP5-EC2-BYOS:kernel-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-BYOS:kernel-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-BYOS:cluster-md-kmp-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-BYOS:dlm-kmp-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-BYOS:gfs2-kmp-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-BYOS:kernel-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:cluster-md-kmp-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:dlm-kmp-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:gfs2-kmp-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:kernel-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:ocfs2-kmp-default-4.12.14-122.225.1
Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:cluster-md-kmp-default-4.12.14-122.225.1
Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:dlm-kmp-default-4.12.14-122.225.1
Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:gfs2-kmp-default-4.12.14-122.225.1
@@ -4443,10 +4490,6 @@
SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros
SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source
SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default
- SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base
- SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel
- SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel
- SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros
SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source
SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default
SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel
no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2021-47580
skipping CVE-2021-47581 as CVE page is older than CVRF-CVE file.
--- /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2021-47580.xml 2024-10-20 02:10:38.207537000 +0200
+++ /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2021-47580.xml.new 2024-10-29 01:50:29.773697000 +0100
@@ -14,13 +14,13 @@
1
- 40
- 2024-10-20T00:10:37Z
+ 41
+ 2024-10-29T00:50:29Z
current
2024-06-20T23:45:24Z
- 2024-10-20T00:10:37Z
+ 2024-10-29T00:50:29Z
cve-database/bin/generate-cvrf-cve.pl
2020-12-27T01:00:00Z
@@ -182,6 +182,21 @@
Image SLES12-SP5-EC2-BYOS
+
+
+ Image SLES12-SP5-GCE-BYOS
+
+
+
+
+ Image SLES12-SP5-GCE-SAP-BYOS
+
+
+
+
+ Image SLES12-SP5-GCE-SAP-On-Demand
+
+
Image SLES12-SP5-SAP-Azure-LI-BYOS-Production
@@ -2122,6 +2137,39 @@
kernel-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-EC2-BYOS
+
+ kernel-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-BYOS
+
+
+ cluster-md-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ dlm-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ gfs2-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ kernel-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ ocfs2-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ cluster-md-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
+
+ dlm-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
+
+ gfs2-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
+
+ kernel-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
+
+ ocfs2-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
cluster-md-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-SAP-Azure-LI-BYOS-Production
@@ -4267,18 +4315,6 @@
kernel-default as a component of SUSE Linux Enterprise Server for SAP Applications 12 SP5
-
- kernel-default-base as a component of SUSE Linux Enterprise Server for SAP Applications 12 SP5
-
-
- kernel-default-devel as a component of SUSE Linux Enterprise Server for SAP Applications 12 SP5
-
-
- kernel-devel as a component of SUSE Linux Enterprise Server for SAP Applications 12 SP5
-
-
- kernel-macros as a component of SUSE Linux Enterprise Server for SAP Applications 12 SP5
-
kernel-source as a component of SUSE Linux Enterprise Server for SAP Applications 12 SP5
@@ -4426,6 +4462,17 @@
Image SLES12-SP5-Azure-SAP-BYOS:kernel-default-4.12.14-122.225.1
Image SLES12-SP5-Azure-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.225.1
Image SLES12-SP5-EC2-BYOS:kernel-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-BYOS:kernel-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-BYOS:cluster-md-kmp-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-BYOS:dlm-kmp-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-BYOS:gfs2-kmp-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-BYOS:kernel-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:cluster-md-kmp-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:dlm-kmp-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:gfs2-kmp-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:kernel-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:ocfs2-kmp-default-4.12.14-122.225.1
Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:cluster-md-kmp-default-4.12.14-122.225.1
Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:dlm-kmp-default-4.12.14-122.225.1
Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:gfs2-kmp-default-4.12.14-122.225.1
no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2021-47571
skipping CVE-2021-47579 as CVE page is older than CVRF-CVE file.
skipping CVE-2021-47578 as CVE page is older than CVRF-CVE file.
skipping CVE-2021-47577 as CVE page is older than CVRF-CVE file.
skipping CVE-2021-47576 as CVE page is older than CVRF-CVE file.
skipping CVE-2021-47575 as CVE page is older than CVRF-CVE file.
skipping CVE-2021-47574 as CVE page is older than CVRF-CVE file.
skipping CVE-2021-47573 as CVE page is older than CVRF-CVE file.
skipping CVE-2021-47572 as CVE page is older than CVRF-CVE file.
skipping CVE-2021-47570 as CVE page is older than CVRF-CVE file.
skipping CVE-2021-47569 as CVE page is older than CVRF-CVE file.
skipping CVE-2021-47568 as CVE page is older than CVRF-CVE file.
skipping CVE-2021-47567 as CVE page is older than CVRF-CVE file.
no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2021-47559
skipping CVE-2021-47565 as CVE page is older than CVRF-CVE file.
skipping CVE-2021-47564 as CVE page is older than CVRF-CVE file.
skipping CVE-2021-47563 as CVE page is older than CVRF-CVE file.
skipping CVE-2021-47562 as CVE page is older than CVRF-CVE file.
skipping CVE-2021-47561 as CVE page is older than CVRF-CVE file.
skipping CVE-2021-47560 as CVE page is older than CVRF-CVE file.
--- /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2021-47559.xml 2024-10-18 02:13:30.520552000 +0200
+++ /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2021-47559.xml.new 2024-10-29 01:50:31.551061000 +0100
@@ -14,13 +14,13 @@
1
- 41
- 2024-10-18T00:13:27Z
+ 42
+ 2024-10-29T00:50:31Z
current
2024-05-27T23:38:28Z
- 2024-10-18T00:13:27Z
+ 2024-10-29T00:50:31Z
cve-database/bin/generate-cvrf-cve.pl
2020-12-27T01:00:00Z
@@ -126,6 +126,21 @@
Image SLES12-SP5-EC2-BYOS
+
+
+ Image SLES12-SP5-GCE-BYOS
+
+
+
+
+ Image SLES12-SP5-GCE-SAP-BYOS
+
+
+
+
+ Image SLES12-SP5-GCE-SAP-On-Demand
+
+
Image SLES12-SP5-SAP-Azure-LI-BYOS-Production
@@ -1943,6 +1958,39 @@
kernel-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-EC2-BYOS
+
+ kernel-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-BYOS
+
+
+ cluster-md-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ dlm-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ gfs2-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ kernel-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ ocfs2-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ cluster-md-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
+
+ dlm-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
+
+ gfs2-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
+
+ kernel-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
+
+ ocfs2-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
cluster-md-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-SAP-Azure-LI-BYOS-Production
@@ -4034,6 +4082,17 @@
Image SLES12-SP5-Azure-SAP-BYOS:kernel-default-4.12.14-122.225.1
Image SLES12-SP5-Azure-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.225.1
Image SLES12-SP5-EC2-BYOS:kernel-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-BYOS:kernel-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-BYOS:cluster-md-kmp-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-BYOS:dlm-kmp-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-BYOS:gfs2-kmp-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-BYOS:kernel-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:cluster-md-kmp-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:dlm-kmp-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:gfs2-kmp-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:kernel-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:ocfs2-kmp-default-4.12.14-122.225.1
Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:cluster-md-kmp-default-4.12.14-122.225.1
Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:dlm-kmp-default-4.12.14-122.225.1
Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:gfs2-kmp-default-4.12.14-122.225.1
no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2021-47549
skipping CVE-2021-47558 as CVE page is older than CVRF-CVE file.
skipping CVE-2021-47557 as CVE page is older than CVRF-CVE file.
skipping CVE-2021-47556 as CVE page is older than CVRF-CVE file.
skipping CVE-2021-47555 as CVE page is older than CVRF-CVE file.
skipping CVE-2021-47554 as CVE page is older than CVRF-CVE file.
skipping CVE-2021-47553 as CVE page is older than CVRF-CVE file.
skipping CVE-2021-47552 as CVE page is older than CVRF-CVE file.
skipping CVE-2021-47551 as CVE page is older than CVRF-CVE file.
skipping CVE-2021-47550 as CVE page is older than CVRF-CVE file.
--- /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2021-47549.xml 2024-10-22 03:12:45.144551000 +0200
+++ /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2021-47549.xml.new 2024-10-29 01:50:32.417198000 +0100
@@ -14,13 +14,13 @@
1
- 34
- 2024-10-22T01:12:44Z
+ 35
+ 2024-10-29T00:50:31Z
current
2024-05-28T23:40:22Z
- 2024-10-22T01:12:44Z
+ 2024-10-29T00:50:31Z
cve-database/bin/generate-cvrf-cve.pl
2020-12-27T01:00:00Z
@@ -158,6 +158,21 @@
Image SLES12-SP5-Azure-SAP-BYOS
+
+
+ Image SLES12-SP5-GCE-BYOS
+
+
+
+
+ Image SLES12-SP5-GCE-SAP-BYOS
+
+
+
+
+ Image SLES12-SP5-GCE-SAP-On-Demand
+
+
Image SLES15-SP3-BYOS-Azure
@@ -2141,6 +2156,39 @@
ocfs2-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-Azure-SAP-BYOS
+
+ kernel-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-BYOS
+
+
+ cluster-md-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ dlm-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ gfs2-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ kernel-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ ocfs2-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ cluster-md-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
+
+ dlm-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
+
+ gfs2-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
+
+ kernel-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
+
+ ocfs2-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
kernel-default-5.3.18-150300.59.164.1 as a component of Image SLES15-SP3-BYOS-Azure
@@ -4428,6 +4476,17 @@
Image SLES12-SP5-Azure-SAP-BYOS:gfs2-kmp-default-4.12.14-122.228.1
Image SLES12-SP5-Azure-SAP-BYOS:kernel-default-4.12.14-122.228.1
Image SLES12-SP5-Azure-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.228.1
+ Image SLES12-SP5-GCE-BYOS:kernel-default-4.12.14-122.228.1
+ Image SLES12-SP5-GCE-SAP-BYOS:cluster-md-kmp-default-4.12.14-122.228.1
+ Image SLES12-SP5-GCE-SAP-BYOS:dlm-kmp-default-4.12.14-122.228.1
+ Image SLES12-SP5-GCE-SAP-BYOS:gfs2-kmp-default-4.12.14-122.228.1
+ Image SLES12-SP5-GCE-SAP-BYOS:kernel-default-4.12.14-122.228.1
+ Image SLES12-SP5-GCE-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.228.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:cluster-md-kmp-default-4.12.14-122.228.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:dlm-kmp-default-4.12.14-122.228.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:gfs2-kmp-default-4.12.14-122.228.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:kernel-default-4.12.14-122.228.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:ocfs2-kmp-default-4.12.14-122.228.1
Image SLES15-SP3-BYOS-Azure:kernel-default-5.3.18-150300.59.164.1
Image SLES15-SP3-BYOS-EC2-HVM:kernel-default-5.3.18-150300.59.164.1
Image SLES15-SP3-BYOS-GCE:kernel-default-5.3.18-150300.59.164.1
skipping CVE-2021-47548 as CVE page is older than CVRF-CVE file.
skipping CVE-2021-47547 as CVE page is older than CVRF-CVE file.
skipping CVE-2021-47546 as CVE page is older than CVRF-CVE file.
skipping CVE-2021-47544 as CVE page is older than CVRF-CVE file.
no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2021-47542
--- /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2021-47542.xml 2024-10-22 03:12:50.630269000 +0200
+++ /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2021-47542.xml.new 2024-10-29 01:50:33.881943000 +0100
@@ -14,13 +14,13 @@
1
- 42
- 2024-10-22T01:12:50Z
+ 43
+ 2024-10-29T00:50:33Z
current
2024-05-28T23:40:24Z
- 2024-10-22T01:12:50Z
+ 2024-10-29T00:50:33Z
cve-database/bin/generate-cvrf-cve.pl
2020-12-27T01:00:00Z
@@ -151,6 +151,21 @@
Image SLES12-SP5-EC2-BYOS
+
+
+ Image SLES12-SP5-GCE-BYOS
+
+
+
+
+ Image SLES12-SP5-GCE-SAP-BYOS
+
+
+
+
+ Image SLES12-SP5-GCE-SAP-On-Demand
+
+
Image SLES12-SP5-SAP-Azure-LI-BYOS-Production
@@ -2238,6 +2253,39 @@
kernel-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-EC2-BYOS
+
+ kernel-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-BYOS
+
+
+ cluster-md-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ dlm-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ gfs2-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ kernel-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ ocfs2-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ cluster-md-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
+
+ dlm-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
+
+ gfs2-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
+
+ kernel-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
+
+ ocfs2-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
cluster-md-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-SAP-Azure-LI-BYOS-Production
@@ -4626,6 +4674,17 @@
Image SLES12-SP5-Azure-SAP-BYOS:kernel-default-4.12.14-122.225.1
Image SLES12-SP5-Azure-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.225.1
Image SLES12-SP5-EC2-BYOS:kernel-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-BYOS:kernel-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-BYOS:cluster-md-kmp-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-BYOS:dlm-kmp-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-BYOS:gfs2-kmp-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-BYOS:kernel-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:cluster-md-kmp-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:dlm-kmp-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:gfs2-kmp-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:kernel-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:ocfs2-kmp-default-4.12.14-122.225.1
Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:cluster-md-kmp-default-4.12.14-122.225.1
Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:dlm-kmp-default-4.12.14-122.225.1
Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:gfs2-kmp-default-4.12.14-122.225.1
skipping CVE-2021-47541 as CVE page is older than CVRF-CVE file.
skipping CVE-2021-47540 as CVE page is older than CVRF-CVE file.
skipping CVE-2021-47539 as CVE page is older than CVRF-CVE file.
skipping CVE-2021-47538 as CVE page is older than CVRF-CVE file.
skipping CVE-2021-47537 as CVE page is older than CVRF-CVE file.
skipping CVE-2021-47536 as CVE page is older than CVRF-CVE file.
skipping CVE-2021-47535 as CVE page is older than CVRF-CVE file.
skipping CVE-2021-47534 as CVE page is older than CVRF-CVE file.
skipping CVE-2021-47533 as CVE page is older than CVRF-CVE file.
skipping CVE-2021-47532 as CVE page is older than CVRF-CVE file.
skipping CVE-2021-47531 as CVE page is older than CVRF-CVE file.
skipping CVE-2021-47530 as CVE page is older than CVRF-CVE file.
skipping CVE-2021-47529 as CVE page is older than CVRF-CVE file.
skipping CVE-2021-47528 as CVE page is older than CVRF-CVE file.
no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2021-47516
skipping CVE-2021-47526 as CVE page is older than CVRF-CVE file.
skipping CVE-2021-47525 as CVE page is older than CVRF-CVE file.
skipping CVE-2021-47524 as CVE page is older than CVRF-CVE file.
skipping CVE-2021-47523 as CVE page is older than CVRF-CVE file.
skipping CVE-2021-47522 as CVE page is older than CVRF-CVE file.
skipping CVE-2021-47521 as CVE page is older than CVRF-CVE file.
skipping CVE-2021-47520 as CVE page is older than CVRF-CVE file.
skipping CVE-2021-47519 as CVE page is older than CVRF-CVE file.
skipping CVE-2021-47518 as CVE page is older than CVRF-CVE file.
skipping CVE-2021-47517 as CVE page is older than CVRF-CVE file.
--- /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2021-47516.xml 2024-10-22 03:13:17.189373000 +0200
+++ /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2021-47516.xml.new 2024-10-29 01:50:34.932885000 +0100
@@ -14,13 +14,13 @@
1
- 40
- 2024-10-22T01:13:15Z
+ 41
+ 2024-10-29T00:50:34Z
current
2024-05-28T23:40:29Z
- 2024-10-22T01:13:15Z
+ 2024-10-29T00:50:34Z
cve-database/bin/generate-cvrf-cve.pl
2020-12-27T01:00:00Z
@@ -156,6 +156,21 @@
Image SLES12-SP5-EC2-BYOS
+
+
+ Image SLES12-SP5-GCE-BYOS
+
+
+
+
+ Image SLES12-SP5-GCE-SAP-BYOS
+
+
+
+
+ Image SLES12-SP5-GCE-SAP-On-Demand
+
+
Image SLES12-SP5-SAP-Azure-LI-BYOS-Production
@@ -2222,6 +2237,39 @@
kernel-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-EC2-BYOS
+
+ kernel-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-BYOS
+
+
+ cluster-md-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ dlm-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ gfs2-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ kernel-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ ocfs2-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ cluster-md-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
+
+ dlm-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
+
+ gfs2-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
+
+ kernel-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
+
+ ocfs2-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
cluster-md-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-SAP-Azure-LI-BYOS-Production
@@ -4600,6 +4648,17 @@
Image SLES12-SP5-Azure-SAP-BYOS:kernel-default-4.12.14-122.225.1
Image SLES12-SP5-Azure-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.225.1
Image SLES12-SP5-EC2-BYOS:kernel-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-BYOS:kernel-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-BYOS:cluster-md-kmp-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-BYOS:dlm-kmp-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-BYOS:gfs2-kmp-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-BYOS:kernel-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:cluster-md-kmp-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:dlm-kmp-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:gfs2-kmp-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:kernel-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:ocfs2-kmp-default-4.12.14-122.225.1
Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:cluster-md-kmp-default-4.12.14-122.225.1
Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:dlm-kmp-default-4.12.14-122.225.1
Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:gfs2-kmp-default-4.12.14-122.225.1
no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2021-47506
skipping CVE-2021-47515 as CVE page is older than CVRF-CVE file.
skipping CVE-2021-47514 as CVE page is older than CVRF-CVE file.
skipping CVE-2021-47513 as CVE page is older than CVRF-CVE file.
skipping CVE-2021-47512 as CVE page is older than CVRF-CVE file.
skipping CVE-2021-47511 as CVE page is older than CVRF-CVE file.
skipping CVE-2021-47510 as CVE page is older than CVRF-CVE file.
skipping CVE-2021-47509 as CVE page is older than CVRF-CVE file.
skipping CVE-2021-47508 as CVE page is older than CVRF-CVE file.
skipping CVE-2021-47507 as CVE page is older than CVRF-CVE file.
no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2021-47501
skipping CVE-2021-47505 as CVE page is older than CVRF-CVE file.
skipping CVE-2021-47504 as CVE page is older than CVRF-CVE file.
skipping CVE-2021-47503 as CVE page is older than CVRF-CVE file.
skipping CVE-2021-47502 as CVE page is older than CVRF-CVE file.
--- /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2021-47501.xml 2024-10-22 03:13:31.947626000 +0200
+++ /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2021-47501.xml.new 2024-10-29 01:50:36.205860000 +0100
@@ -14,13 +14,13 @@
1
- 42
- 2024-10-22T01:13:30Z
+ 43
+ 2024-10-29T00:50:35Z
current
2024-05-27T23:38:33Z
- 2024-10-22T01:13:30Z
+ 2024-10-29T00:50:35Z
cve-database/bin/generate-cvrf-cve.pl
2020-12-27T01:00:00Z
@@ -131,6 +131,21 @@
Image SLES12-SP5-EC2-BYOS
+
+
+ Image SLES12-SP5-GCE-BYOS
+
+
+
+
+ Image SLES12-SP5-GCE-SAP-BYOS
+
+
+
+
+ Image SLES12-SP5-GCE-SAP-On-Demand
+
+
Image SLES12-SP5-SAP-Azure-LI-BYOS-Production
@@ -2156,6 +2171,39 @@
kernel-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-EC2-BYOS
+
+ kernel-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-BYOS
+
+
+ cluster-md-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ dlm-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ gfs2-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ kernel-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ ocfs2-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ cluster-md-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
+
+ dlm-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
+
+ gfs2-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
+
+ kernel-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
+
+ ocfs2-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
cluster-md-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-SAP-Azure-LI-BYOS-Production
@@ -4456,6 +4504,17 @@
Image SLES12-SP5-Azure-SAP-BYOS:kernel-default-4.12.14-122.225.1
Image SLES12-SP5-Azure-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.225.1
Image SLES12-SP5-EC2-BYOS:kernel-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-BYOS:kernel-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-BYOS:cluster-md-kmp-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-BYOS:dlm-kmp-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-BYOS:gfs2-kmp-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-BYOS:kernel-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:cluster-md-kmp-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:dlm-kmp-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:gfs2-kmp-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:kernel-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:ocfs2-kmp-default-4.12.14-122.225.1
Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:cluster-md-kmp-default-4.12.14-122.225.1
Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:dlm-kmp-default-4.12.14-122.225.1
Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:gfs2-kmp-default-4.12.14-122.225.1
no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2021-47500
no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2021-47496
skipping CVE-2021-47499 as CVE page is older than CVRF-CVE file.
skipping CVE-2021-47498 as CVE page is older than CVRF-CVE file.
skipping CVE-2021-47497 as CVE page is older than CVRF-CVE file.
skipping CVE-2021-47495 as CVE page is older than CVRF-CVE file.
skipping CVE-2021-47494 as CVE page is older than CVRF-CVE file.
skipping CVE-2021-47493 as CVE page is older than CVRF-CVE file.
skipping CVE-2021-47492 as CVE page is older than CVRF-CVE file.
skipping CVE-2021-47491 as CVE page is older than CVRF-CVE file.
skipping CVE-2021-47490 as CVE page is older than CVRF-CVE file.
skipping CVE-2021-47489 as CVE page is older than CVRF-CVE file.
skipping CVE-2021-47488 as CVE page is older than CVRF-CVE file.
no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2021-47483
skipping CVE-2021-47486 as CVE page is older than CVRF-CVE file.
skipping CVE-2021-47485 as CVE page is older than CVRF-CVE file.
skipping CVE-2021-47484 as CVE page is older than CVRF-CVE file.
no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2021-47468
skipping CVE-2021-47482 as CVE page is older than CVRF-CVE file.
skipping CVE-2021-47481 as CVE page is older than CVRF-CVE file.
skipping CVE-2021-47480 as CVE page is older than CVRF-CVE file.
skipping CVE-2021-47479 as CVE page is older than CVRF-CVE file.
skipping CVE-2021-47478 as CVE page is older than CVRF-CVE file.
skipping CVE-2021-47477 as CVE page is older than CVRF-CVE file.
skipping CVE-2021-47476 as CVE page is older than CVRF-CVE file.
skipping CVE-2021-47475 as CVE page is older than CVRF-CVE file.
skipping CVE-2021-47474 as CVE page is older than CVRF-CVE file.
skipping CVE-2021-47473 as CVE page is older than CVRF-CVE file.
skipping CVE-2021-47472 as CVE page is older than CVRF-CVE file.
skipping CVE-2021-47471 as CVE page is older than CVRF-CVE file.
skipping CVE-2021-47470 as CVE page is older than CVRF-CVE file.
skipping CVE-2021-47469 as CVE page is older than CVRF-CVE file.
--- /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2021-47468.xml 2024-10-22 03:14:12.950444000 +0200
+++ /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2021-47468.xml.new 2024-10-29 01:50:38.990695000 +0100
@@ -14,13 +14,13 @@
1
- 42
- 2024-10-22T01:14:12Z
+ 43
+ 2024-10-29T00:50:38Z
current
2024-05-27T23:38:38Z
- 2024-10-22T01:14:12Z
+ 2024-10-29T00:50:38Z
cve-database/bin/generate-cvrf-cve.pl
2020-12-27T01:00:00Z
@@ -176,6 +176,21 @@
Image SLES12-SP5-EC2-BYOS
+
+
+ Image SLES12-SP5-GCE-BYOS
+
+
+
+
+ Image SLES12-SP5-GCE-SAP-BYOS
+
+
+
+
+ Image SLES12-SP5-GCE-SAP-On-Demand
+
+
Image SLES12-SP5-SAP-Azure-LI-BYOS-Production
@@ -2333,6 +2348,39 @@
kernel-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-EC2-BYOS
+
+ kernel-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-BYOS
+
+
+ cluster-md-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ dlm-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ gfs2-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ kernel-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ ocfs2-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ cluster-md-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
+
+ dlm-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
+
+ gfs2-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
+
+ kernel-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
+
+ ocfs2-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
cluster-md-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-SAP-Azure-LI-BYOS-Production
@@ -4809,6 +4857,17 @@
Image SLES12-SP5-Azure-SAP-BYOS:kernel-default-4.12.14-122.225.1
Image SLES12-SP5-Azure-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.225.1
Image SLES12-SP5-EC2-BYOS:kernel-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-BYOS:kernel-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-BYOS:cluster-md-kmp-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-BYOS:dlm-kmp-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-BYOS:gfs2-kmp-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-BYOS:kernel-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:cluster-md-kmp-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:dlm-kmp-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:gfs2-kmp-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:kernel-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:ocfs2-kmp-default-4.12.14-122.225.1
Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:cluster-md-kmp-default-4.12.14-122.225.1
Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:dlm-kmp-default-4.12.14-122.225.1
Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:gfs2-kmp-default-4.12.14-122.225.1
no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2021-47441
skipping CVE-2021-47467 as CVE page is older than CVRF-CVE file.
skipping CVE-2021-47466 as CVE page is older than CVRF-CVE file.
skipping CVE-2021-47465 as CVE page is older than CVRF-CVE file.
skipping CVE-2021-47464 as CVE page is older than CVRF-CVE file.
skipping CVE-2021-47463 as CVE page is older than CVRF-CVE file.
skipping CVE-2021-47462 as CVE page is older than CVRF-CVE file.
skipping CVE-2021-47461 as CVE page is older than CVRF-CVE file.
skipping CVE-2021-47460 as CVE page is older than CVRF-CVE file.
skipping CVE-2021-47459 as CVE page is older than CVRF-CVE file.
skipping CVE-2021-47458 as CVE page is older than CVRF-CVE file.
skipping CVE-2021-47457 as CVE page is older than CVRF-CVE file.
skipping CVE-2021-47456 as CVE page is older than CVRF-CVE file.
skipping CVE-2021-47455 as CVE page is older than CVRF-CVE file.
skipping CVE-2021-47454 as CVE page is older than CVRF-CVE file.
skipping CVE-2021-47453 as CVE page is older than CVRF-CVE file.
skipping CVE-2021-47452 as CVE page is older than CVRF-CVE file.
skipping CVE-2021-47451 as CVE page is older than CVRF-CVE file.
skipping CVE-2021-47450 as CVE page is older than CVRF-CVE file.
skipping CVE-2021-47449 as CVE page is older than CVRF-CVE file.
skipping CVE-2021-47448 as CVE page is older than CVRF-CVE file.
skipping CVE-2021-47447 as CVE page is older than CVRF-CVE file.
skipping CVE-2021-47446 as CVE page is older than CVRF-CVE file.
skipping CVE-2021-47445 as CVE page is older than CVRF-CVE file.
skipping CVE-2021-47444 as CVE page is older than CVRF-CVE file.
skipping CVE-2021-47443 as CVE page is older than CVRF-CVE file.
skipping CVE-2021-47442 as CVE page is older than CVRF-CVE file.
--- /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2021-47441.xml 2024-10-22 03:14:39.053571000 +0200
+++ /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2021-47441.xml.new 2024-10-29 01:50:39.766642000 +0100
@@ -14,13 +14,13 @@
1
- 42
- 2024-10-22T01:14:38Z
+ 43
+ 2024-10-29T00:50:39Z
current
2024-05-24T23:46:04Z
- 2024-10-22T01:14:38Z
+ 2024-10-29T00:50:39Z
cve-database/bin/generate-cvrf-cve.pl
2020-12-27T01:00:00Z
@@ -230,6 +230,21 @@
Image SLES12-SP5-EC2-BYOS
+
+
+ Image SLES12-SP5-GCE-BYOS
+
+
+
+
+ Image SLES12-SP5-GCE-SAP-BYOS
+
+
+
+
+ Image SLES12-SP5-GCE-SAP-On-Demand
+
+
Image SLES12-SP5-SAP-Azure-LI-BYOS-Production
@@ -2361,6 +2376,39 @@
kernel-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-EC2-BYOS
+
+ kernel-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-BYOS
+
+
+ cluster-md-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ dlm-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ gfs2-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ kernel-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ ocfs2-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ cluster-md-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
+
+ dlm-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
+
+ gfs2-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
+
+ kernel-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
+
+ ocfs2-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
cluster-md-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-SAP-Azure-LI-BYOS-Production
@@ -4869,6 +4917,17 @@
Image SLES12-SP5-Azure-SAP-BYOS:kernel-default-4.12.14-122.225.1
Image SLES12-SP5-Azure-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.225.1
Image SLES12-SP5-EC2-BYOS:kernel-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-BYOS:kernel-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-BYOS:cluster-md-kmp-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-BYOS:dlm-kmp-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-BYOS:gfs2-kmp-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-BYOS:kernel-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:cluster-md-kmp-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:dlm-kmp-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:gfs2-kmp-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:kernel-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:ocfs2-kmp-default-4.12.14-122.225.1
Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:cluster-md-kmp-default-4.12.14-122.225.1
Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:dlm-kmp-default-4.12.14-122.225.1
Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:gfs2-kmp-default-4.12.14-122.225.1
no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2021-47438
skipping CVE-2021-47440 as CVE page is older than CVRF-CVE file.
skipping CVE-2021-47439 as CVE page is older than CVRF-CVE file.
--- /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2021-47438.xml 2024-10-22 03:14:42.118439000 +0200
+++ /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2021-47438.xml.new 2024-10-29 01:50:40.776094000 +0100
@@ -14,13 +14,13 @@
1
- 47
- 2024-10-22T01:14:41Z
+ 48
+ 2024-10-29T00:50:40Z
current
2024-05-24T23:46:05Z
- 2024-10-22T01:14:41Z
+ 2024-10-29T00:50:40Z
cve-database/bin/generate-cvrf-cve.pl
2020-12-27T01:00:00Z
@@ -2082,41 +2082,41 @@
ocfs2-kmp-default-4.12.14-122.222.1 as a component of Image SLES12-SP5-EC2-SAP-On-Demand
-
- kernel-default-4.12.14-122.222.1 as a component of Image SLES12-SP5-GCE-BYOS
+
+ kernel-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-BYOS
kernel-default-4.12.14-122.222.1 as a component of Image SLES12-SP5-GCE-On-Demand
-
- cluster-md-kmp-default-4.12.14-122.222.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+ cluster-md-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
-
- dlm-kmp-default-4.12.14-122.222.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+ dlm-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
-
- gfs2-kmp-default-4.12.14-122.222.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+ gfs2-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
-
- kernel-default-4.12.14-122.222.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+ kernel-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
-
- ocfs2-kmp-default-4.12.14-122.222.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+ ocfs2-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
-
- cluster-md-kmp-default-4.12.14-122.222.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
+ cluster-md-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
-
- dlm-kmp-default-4.12.14-122.222.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
+ dlm-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
-
- gfs2-kmp-default-4.12.14-122.222.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
+ gfs2-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
-
- kernel-default-4.12.14-122.222.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
+ kernel-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
-
- ocfs2-kmp-default-4.12.14-122.222.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
+ ocfs2-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
cluster-md-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-SAP-Azure-LI-BYOS-Production
@@ -4196,18 +4196,18 @@
Image SLES12-SP5-EC2-SAP-On-Demand:gfs2-kmp-default-4.12.14-122.222.1
Image SLES12-SP5-EC2-SAP-On-Demand:kernel-default-4.12.14-122.222.1
Image SLES12-SP5-EC2-SAP-On-Demand:ocfs2-kmp-default-4.12.14-122.222.1
- Image SLES12-SP5-GCE-BYOS:kernel-default-4.12.14-122.222.1
+ Image SLES12-SP5-GCE-BYOS:kernel-default-4.12.14-122.225.1
Image SLES12-SP5-GCE-On-Demand:kernel-default-4.12.14-122.222.1
- Image SLES12-SP5-GCE-SAP-BYOS:cluster-md-kmp-default-4.12.14-122.222.1
- Image SLES12-SP5-GCE-SAP-BYOS:dlm-kmp-default-4.12.14-122.222.1
- Image SLES12-SP5-GCE-SAP-BYOS:gfs2-kmp-default-4.12.14-122.222.1
- Image SLES12-SP5-GCE-SAP-BYOS:kernel-default-4.12.14-122.222.1
- Image SLES12-SP5-GCE-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.222.1
- Image SLES12-SP5-GCE-SAP-On-Demand:cluster-md-kmp-default-4.12.14-122.222.1
- Image SLES12-SP5-GCE-SAP-On-Demand:dlm-kmp-default-4.12.14-122.222.1
- Image SLES12-SP5-GCE-SAP-On-Demand:gfs2-kmp-default-4.12.14-122.222.1
- Image SLES12-SP5-GCE-SAP-On-Demand:kernel-default-4.12.14-122.222.1
- Image SLES12-SP5-GCE-SAP-On-Demand:ocfs2-kmp-default-4.12.14-122.222.1
+ Image SLES12-SP5-GCE-SAP-BYOS:cluster-md-kmp-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-BYOS:dlm-kmp-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-BYOS:gfs2-kmp-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-BYOS:kernel-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:cluster-md-kmp-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:dlm-kmp-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:gfs2-kmp-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:kernel-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:ocfs2-kmp-default-4.12.14-122.225.1
Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:cluster-md-kmp-default-4.12.14-122.225.1
Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:dlm-kmp-default-4.12.14-122.225.1
Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:gfs2-kmp-default-4.12.14-122.225.1
no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2021-47434
skipping CVE-2021-47437 as CVE page is older than CVRF-CVE file.
skipping CVE-2021-47436 as CVE page is older than CVRF-CVE file.
skipping CVE-2021-47435 as CVE page is older than CVRF-CVE file.
no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2021-47425
skipping CVE-2021-47433 as CVE page is older than CVRF-CVE file.
skipping CVE-2021-47432 as CVE page is older than CVRF-CVE file.
skipping CVE-2021-47431 as CVE page is older than CVRF-CVE file.
skipping CVE-2021-47430 as CVE page is older than CVRF-CVE file.
skipping CVE-2021-47429 as CVE page is older than CVRF-CVE file.
skipping CVE-2021-47428 as CVE page is older than CVRF-CVE file.
skipping CVE-2021-47427 as CVE page is older than CVRF-CVE file.
skipping CVE-2021-47426 as CVE page is older than CVRF-CVE file.
--- /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2021-47425.xml 2024-10-22 03:14:54.994263000 +0200
+++ /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2021-47425.xml.new 2024-10-29 01:50:41.977029000 +0100
@@ -14,13 +14,13 @@
1
- 35
- 2024-10-22T01:14:54Z
+ 36
+ 2024-10-29T00:50:41Z
current
2024-05-24T23:46:07Z
- 2024-10-22T01:14:54Z
+ 2024-10-29T00:50:41Z
cve-database/bin/generate-cvrf-cve.pl
2020-12-27T01:00:00Z
@@ -127,6 +127,21 @@
Image SLES12-SP5-Azure-SAP-BYOS
+
+
+ Image SLES12-SP5-GCE-BYOS
+
+
+
+
+ Image SLES12-SP5-GCE-SAP-BYOS
+
+
+
+
+ Image SLES12-SP5-GCE-SAP-On-Demand
+
+
Image SLES15-SP3-BYOS-Azure
@@ -2182,6 +2197,39 @@
ocfs2-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-Azure-SAP-BYOS
+
+ kernel-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-BYOS
+
+
+ cluster-md-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ dlm-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ gfs2-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ kernel-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ ocfs2-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ cluster-md-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
+
+ dlm-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
+
+ gfs2-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
+
+ kernel-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
+
+ ocfs2-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
kernel-default-5.3.18-150300.59.164.1 as a component of Image SLES15-SP3-BYOS-Azure
@@ -4527,6 +4575,17 @@
Image SLES12-SP5-Azure-SAP-BYOS:gfs2-kmp-default-4.12.14-122.228.1
Image SLES12-SP5-Azure-SAP-BYOS:kernel-default-4.12.14-122.228.1
Image SLES12-SP5-Azure-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.228.1
+ Image SLES12-SP5-GCE-BYOS:kernel-default-4.12.14-122.228.1
+ Image SLES12-SP5-GCE-SAP-BYOS:cluster-md-kmp-default-4.12.14-122.228.1
+ Image SLES12-SP5-GCE-SAP-BYOS:dlm-kmp-default-4.12.14-122.228.1
+ Image SLES12-SP5-GCE-SAP-BYOS:gfs2-kmp-default-4.12.14-122.228.1
+ Image SLES12-SP5-GCE-SAP-BYOS:kernel-default-4.12.14-122.228.1
+ Image SLES12-SP5-GCE-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.228.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:cluster-md-kmp-default-4.12.14-122.228.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:dlm-kmp-default-4.12.14-122.228.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:gfs2-kmp-default-4.12.14-122.228.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:kernel-default-4.12.14-122.228.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:ocfs2-kmp-default-4.12.14-122.228.1
Image SLES15-SP3-BYOS-Azure:kernel-default-5.3.18-150300.59.164.1
Image SLES15-SP3-BYOS-EC2-HVM:kernel-default-5.3.18-150300.59.164.1
Image SLES15-SP3-BYOS-GCE:kernel-default-5.3.18-150300.59.164.1
no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2021-47423
skipping CVE-2021-47424 as CVE page is older than CVRF-CVE file.
skipping CVE-2021-47422 as CVE page is older than CVRF-CVE file.
skipping CVE-2021-47421 as CVE page is older than CVRF-CVE file.
skipping CVE-2021-47420 as CVE page is older than CVRF-CVE file.
skipping CVE-2021-47419 as CVE page is older than CVRF-CVE file.
skipping CVE-2021-47418 as CVE page is older than CVRF-CVE file.
skipping CVE-2021-47417 as CVE page is older than CVRF-CVE file.
skipping CVE-2021-47416 as CVE page is older than CVRF-CVE file.
skipping CVE-2021-47415 as CVE page is older than CVRF-CVE file.
skipping CVE-2021-47414 as CVE page is older than CVRF-CVE file.
skipping CVE-2021-47413 as CVE page is older than CVRF-CVE file.
skipping CVE-2021-47412 as CVE page is older than CVRF-CVE file.
no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2021-47408
skipping CVE-2021-47410 as CVE page is older than CVRF-CVE file.
skipping CVE-2021-47409 as CVE page is older than CVRF-CVE file.
no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2021-47407
no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2021-47405
skipping CVE-2021-47406 as CVE page is older than CVRF-CVE file.
--- /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2021-47405.xml 2024-10-22 03:15:15.188183000 +0200
+++ /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2021-47405.xml.new 2024-10-29 01:50:45.192027000 +0100
@@ -14,13 +14,13 @@
1
- 42
- 2024-10-22T01:15:14Z
+ 43
+ 2024-10-29T00:50:44Z
current
2024-05-24T23:46:08Z
- 2024-10-22T01:15:14Z
+ 2024-10-29T00:50:44Z
cve-database/bin/generate-cvrf-cve.pl
2020-12-27T01:00:00Z
@@ -134,6 +134,21 @@
Image SLES12-SP5-EC2-BYOS
+
+
+ Image SLES12-SP5-GCE-BYOS
+
+
+
+
+ Image SLES12-SP5-GCE-SAP-BYOS
+
+
+
+
+ Image SLES12-SP5-GCE-SAP-On-Demand
+
+
Image SLES12-SP5-SAP-Azure-LI-BYOS-Production
@@ -2221,6 +2236,39 @@
kernel-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-EC2-BYOS
+
+ kernel-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-BYOS
+
+
+ cluster-md-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ dlm-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ gfs2-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ kernel-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ ocfs2-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ cluster-md-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
+
+ dlm-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
+
+ gfs2-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
+
+ kernel-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
+
+ ocfs2-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
cluster-md-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-SAP-Azure-LI-BYOS-Production
@@ -4592,6 +4640,17 @@
Image SLES12-SP5-Azure-SAP-BYOS:kernel-default-4.12.14-122.225.1
Image SLES12-SP5-Azure-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.225.1
Image SLES12-SP5-EC2-BYOS:kernel-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-BYOS:kernel-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-BYOS:cluster-md-kmp-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-BYOS:dlm-kmp-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-BYOS:gfs2-kmp-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-BYOS:kernel-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:cluster-md-kmp-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:dlm-kmp-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:gfs2-kmp-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:kernel-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:ocfs2-kmp-default-4.12.14-122.225.1
Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:cluster-md-kmp-default-4.12.14-122.225.1
Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:dlm-kmp-default-4.12.14-122.225.1
Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:gfs2-kmp-default-4.12.14-122.225.1
no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2021-47403
skipping CVE-2021-47404 as CVE page is older than CVRF-CVE file.
--- /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2021-47403.xml 2024-10-22 03:15:17.235605000 +0200
+++ /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2021-47403.xml.new 2024-10-29 01:50:45.913897000 +0100
@@ -14,13 +14,13 @@
1
- 40
- 2024-10-22T01:15:16Z
+ 41
+ 2024-10-29T00:50:45Z
current
2024-05-24T23:46:08Z
- 2024-10-22T01:15:16Z
+ 2024-10-29T00:50:45Z
cve-database/bin/generate-cvrf-cve.pl
2020-12-27T01:00:00Z
@@ -118,6 +118,21 @@
Image SLES12-SP5-EC2-BYOS
+
+
+ Image SLES12-SP5-GCE-BYOS
+
+
+
+
+ Image SLES12-SP5-GCE-SAP-BYOS
+
+
+
+
+ Image SLES12-SP5-GCE-SAP-On-Demand
+
+
Image SLES12-SP5-SAP-Azure-LI-BYOS-Production
@@ -1928,6 +1943,39 @@
kernel-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-EC2-BYOS
+
+ kernel-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-BYOS
+
+
+ cluster-md-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ dlm-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ gfs2-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ kernel-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ ocfs2-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ cluster-md-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
+
+ dlm-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
+
+ gfs2-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
+
+ kernel-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
+
+ ocfs2-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
cluster-md-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-SAP-Azure-LI-BYOS-Production
@@ -3957,6 +4005,17 @@
Image SLES12-SP5-Azure-SAP-BYOS:kernel-default-4.12.14-122.225.1
Image SLES12-SP5-Azure-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.225.1
Image SLES12-SP5-EC2-BYOS:kernel-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-BYOS:kernel-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-BYOS:cluster-md-kmp-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-BYOS:dlm-kmp-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-BYOS:gfs2-kmp-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-BYOS:kernel-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:cluster-md-kmp-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:dlm-kmp-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:gfs2-kmp-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:kernel-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:ocfs2-kmp-default-4.12.14-122.225.1
Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:cluster-md-kmp-default-4.12.14-122.225.1
Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:dlm-kmp-default-4.12.14-122.225.1
Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:gfs2-kmp-default-4.12.14-122.225.1
no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2021-47402
--- /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2021-47402.xml 2024-10-22 03:15:18.182572000 +0200
+++ /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2021-47402.xml.new 2024-10-29 01:50:46.836088000 +0100
@@ -14,13 +14,13 @@
1
- 40
- 2024-10-22T01:15:17Z
+ 41
+ 2024-10-29T00:50:46Z
current
2024-05-27T23:39:01Z
- 2024-10-22T01:15:17Z
+ 2024-10-29T00:50:46Z
cve-database/bin/generate-cvrf-cve.pl
2020-12-27T01:00:00Z
@@ -1969,12 +1969,21 @@
kernel-livepatch-5_3_18-150200_24_183-default-8-150200.5.6.1
+
+ kernel-livepatch-5_3_18-150200_24_183-default-9-150200.5.6.1
+
kernel-livepatch-5_3_18-150200_24_188-default-7-150200.5.6.1
+
+ kernel-livepatch-5_3_18-150200_24_188-default-8-150200.5.6.1
+
kernel-livepatch-5_3_18-150200_24_191-default-6-150200.5.6.1
+
+ kernel-livepatch-5_3_18-150200_24_191-default-7-150200.5.6.1
+
kernel-livepatch-5_3_18-150200_24_194-default-1-150200.5.3.1
@@ -2002,12 +2011,21 @@
kernel-livepatch-5_3_18-150300_59_153-default-8-150300.7.6.1
+
+ kernel-livepatch-5_3_18-150300_59_153-default-9-150300.7.6.1
+
kernel-livepatch-5_3_18-150300_59_158-default-7-150300.7.6.1
+
+ kernel-livepatch-5_3_18-150300_59_158-default-8-150300.7.6.1
+
kernel-livepatch-5_3_18-150300_59_161-default-6-150300.7.6.1
+
+ kernel-livepatch-5_3_18-150300_59_161-default-7-150300.7.6.1
+
kernel-livepatch-5_3_18-150300_59_164-default-1-150300.7.3.1
@@ -4204,6 +4222,24 @@
klp-build-0~20240731.edfe0bf-1.1 as a component of openSUSE Tumbleweed
+
+ kernel-livepatch-5_3_18-150200_24_183-default-9-150200.5.6.1 as a component of SUSE Linux Enterprise Live Patching 15 SP2
+
+
+ kernel-livepatch-5_3_18-150200_24_188-default-8-150200.5.6.1 as a component of SUSE Linux Enterprise Live Patching 15 SP2
+
+
+ kernel-livepatch-5_3_18-150200_24_191-default-7-150200.5.6.1 as a component of SUSE Linux Enterprise Live Patching 15 SP2
+
+
+ kernel-livepatch-5_3_18-150300_59_153-default-9-150300.7.6.1 as a component of SUSE Linux Enterprise Live Patching 15 SP3
+
+
+ kernel-livepatch-5_3_18-150300_59_158-default-8-150300.7.6.1 as a component of SUSE Linux Enterprise Live Patching 15 SP3
+
+
+ kernel-livepatch-5_3_18-150300_59_161-default-7-150300.7.6.1 as a component of SUSE Linux Enterprise Live Patching 15 SP3
+
kernel-default as a component of SUSE Linux Enterprise High Performance Computing 12 SP5
@@ -5307,6 +5343,14 @@
openSUSE Leap Micro 5.5:kernel-rt-5.14.21-150500.13.64.1
openSUSE Tumbleweed:klp-build-0~20240731.edfe0bf-1.1
+
+ SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_183-default-9-150200.5.6.1
+ SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_188-default-8-150200.5.6.1
+ SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_191-default-7-150200.5.6.1
+ SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_153-default-9-150300.7.6.1
+ SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_158-default-8-150300.7.6.1
+ SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_161-default-7-150300.7.6.1
+
SUSE Linux Enterprise High Performance Computing 12 SP5:kernel-default
SUSE Linux Enterprise High Performance Computing 12 SP5:kernel-source
no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2021-47399
skipping CVE-2021-47401 as CVE page is older than CVRF-CVE file.
skipping CVE-2021-47400 as CVE page is older than CVRF-CVE file.
--- /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2021-47399.xml 2024-10-22 03:15:21.205397000 +0200
+++ /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2021-47399.xml.new 2024-10-29 01:50:47.630734000 +0100
@@ -14,13 +14,13 @@
1
- 39
- 2024-10-22T01:15:20Z
+ 40
+ 2024-10-29T00:50:47Z
current
2024-05-27T23:39:02Z
- 2024-10-22T01:15:20Z
+ 2024-10-29T00:50:47Z
cve-database/bin/generate-cvrf-cve.pl
2020-12-27T01:00:00Z
@@ -183,6 +183,21 @@
Image SLES12-SP5-EC2-BYOS
+
+
+ Image SLES12-SP5-GCE-BYOS
+
+
+
+
+ Image SLES12-SP5-GCE-SAP-BYOS
+
+
+
+
+ Image SLES12-SP5-GCE-SAP-On-Demand
+
+
Image SLES12-SP5-SAP-Azure-LI-BYOS-Production
@@ -2249,6 +2264,39 @@
kernel-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-EC2-BYOS
+
+ kernel-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-BYOS
+
+
+ cluster-md-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ dlm-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ gfs2-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ kernel-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ ocfs2-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ cluster-md-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
+
+ dlm-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
+
+ gfs2-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
+
+ kernel-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
+
+ ocfs2-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
cluster-md-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-SAP-Azure-LI-BYOS-Production
@@ -4654,6 +4702,17 @@
Image SLES12-SP5-Azure-SAP-BYOS:kernel-default-4.12.14-122.225.1
Image SLES12-SP5-Azure-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.225.1
Image SLES12-SP5-EC2-BYOS:kernel-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-BYOS:kernel-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-BYOS:cluster-md-kmp-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-BYOS:dlm-kmp-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-BYOS:gfs2-kmp-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-BYOS:kernel-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:cluster-md-kmp-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:dlm-kmp-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:gfs2-kmp-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:kernel-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:ocfs2-kmp-default-4.12.14-122.225.1
Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:cluster-md-kmp-default-4.12.14-122.225.1
Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:dlm-kmp-default-4.12.14-122.225.1
Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:gfs2-kmp-default-4.12.14-122.225.1
no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2021-47395
skipping CVE-2021-47398 as CVE page is older than CVRF-CVE file.
skipping CVE-2021-47397 as CVE page is older than CVRF-CVE file.
skipping CVE-2021-47396 as CVE page is older than CVRF-CVE file.
--- /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2021-47395.xml 2024-10-22 03:15:24.474220000 +0200
+++ /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2021-47395.xml.new 2024-10-29 01:50:48.395752000 +0100
@@ -14,13 +14,13 @@
1
- 39
- 2024-10-22T01:15:23Z
+ 40
+ 2024-10-29T00:50:47Z
current
2024-05-27T23:39:04Z
- 2024-10-22T01:15:23Z
+ 2024-10-29T00:50:47Z
cve-database/bin/generate-cvrf-cve.pl
2020-12-27T01:00:00Z
@@ -175,6 +175,21 @@
Image SLES12-SP5-EC2-BYOS
+
+
+ Image SLES12-SP5-GCE-BYOS
+
+
+
+
+ Image SLES12-SP5-GCE-SAP-BYOS
+
+
+
+
+ Image SLES12-SP5-GCE-SAP-On-Demand
+
+
Image SLES12-SP5-SAP-Azure-LI-BYOS-Production
@@ -2241,6 +2256,39 @@
kernel-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-EC2-BYOS
+
+ kernel-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-BYOS
+
+
+ cluster-md-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ dlm-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ gfs2-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ kernel-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ ocfs2-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ cluster-md-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
+
+ dlm-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
+
+ gfs2-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
+
+ kernel-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
+
+ ocfs2-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
cluster-md-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-SAP-Azure-LI-BYOS-Production
@@ -4638,6 +4686,17 @@
Image SLES12-SP5-Azure-SAP-BYOS:kernel-default-4.12.14-122.225.1
Image SLES12-SP5-Azure-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.225.1
Image SLES12-SP5-EC2-BYOS:kernel-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-BYOS:kernel-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-BYOS:cluster-md-kmp-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-BYOS:dlm-kmp-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-BYOS:gfs2-kmp-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-BYOS:kernel-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:cluster-md-kmp-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:dlm-kmp-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:gfs2-kmp-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:kernel-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:ocfs2-kmp-default-4.12.14-122.225.1
Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:cluster-md-kmp-default-4.12.14-122.225.1
Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:dlm-kmp-default-4.12.14-122.225.1
Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:gfs2-kmp-default-4.12.14-122.225.1
no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2021-47388
skipping CVE-2021-47394 as CVE page is older than CVRF-CVE file.
skipping CVE-2021-47393 as CVE page is older than CVRF-CVE file.
skipping CVE-2021-47392 as CVE page is older than CVRF-CVE file.
skipping CVE-2021-47391 as CVE page is older than CVRF-CVE file.
skipping CVE-2021-47390 as CVE page is older than CVRF-CVE file.
skipping CVE-2021-47389 as CVE page is older than CVRF-CVE file.
--- /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2021-47388.xml 2024-10-22 03:15:32.684303000 +0200
+++ /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2021-47388.xml.new 2024-10-29 01:50:49.580667000 +0100
@@ -14,13 +14,13 @@
1
- 42
- 2024-10-22T01:15:32Z
+ 43
+ 2024-10-29T00:50:48Z
current
2024-05-24T23:46:09Z
- 2024-10-22T01:15:32Z
+ 2024-10-29T00:50:48Z
cve-database/bin/generate-cvrf-cve.pl
2020-12-27T01:00:00Z
@@ -143,6 +143,21 @@
Image SLES12-SP5-EC2-BYOS
+
+
+ Image SLES12-SP5-GCE-BYOS
+
+
+
+
+ Image SLES12-SP5-GCE-SAP-BYOS
+
+
+
+
+ Image SLES12-SP5-GCE-SAP-On-Demand
+
+
Image SLES12-SP5-SAP-Azure-LI-BYOS-Production
@@ -2235,6 +2250,39 @@
kernel-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-EC2-BYOS
+
+ kernel-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-BYOS
+
+
+ cluster-md-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ dlm-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ gfs2-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ kernel-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ ocfs2-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ cluster-md-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
+
+ dlm-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
+
+ gfs2-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
+
+ kernel-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
+
+ ocfs2-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
cluster-md-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-SAP-Azure-LI-BYOS-Production
@@ -4618,6 +4666,17 @@
Image SLES12-SP5-Azure-SAP-BYOS:kernel-default-4.12.14-122.225.1
Image SLES12-SP5-Azure-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.225.1
Image SLES12-SP5-EC2-BYOS:kernel-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-BYOS:kernel-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-BYOS:cluster-md-kmp-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-BYOS:dlm-kmp-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-BYOS:gfs2-kmp-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-BYOS:kernel-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:cluster-md-kmp-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:dlm-kmp-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:gfs2-kmp-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:kernel-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:ocfs2-kmp-default-4.12.14-122.225.1
Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:cluster-md-kmp-default-4.12.14-122.225.1
Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:dlm-kmp-default-4.12.14-122.225.1
Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:gfs2-kmp-default-4.12.14-122.225.1
no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2021-47387
--- /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2021-47387.xml 2024-10-22 03:15:33.484236000 +0200
+++ /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2021-47387.xml.new 2024-10-29 01:50:50.398124000 +0100
@@ -14,13 +14,13 @@
1
- 36
- 2024-10-22T01:15:32Z
+ 37
+ 2024-10-29T00:50:49Z
current
2024-05-27T23:39:06Z
- 2024-10-22T01:15:32Z
+ 2024-10-29T00:50:49Z
cve-database/bin/generate-cvrf-cve.pl
2020-12-27T01:00:00Z
@@ -164,6 +164,21 @@
Container suse/sle-micro/rt-5.5:2.0.4-4.5.76
+
+
+ Image SLES12-SP5-GCE-BYOS
+
+
+
+
+ Image SLES12-SP5-GCE-SAP-BYOS
+
+
+
+
+ Image SLES12-SP5-GCE-SAP-On-Demand
+
+
Image SLES15-SP3-BYOS-Azure
@@ -2132,6 +2147,39 @@
kernel-rt-5.14.21-150500.13.58.1 as a component of Container suse/sle-micro/rt-5.5:2.0.4-4.5.76
+
+ kernel-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-BYOS
+
+
+ cluster-md-kmp-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ dlm-kmp-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ gfs2-kmp-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ kernel-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ ocfs2-kmp-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ cluster-md-kmp-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
+
+ dlm-kmp-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
+
+ gfs2-kmp-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
+
+ kernel-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
+
+ ocfs2-kmp-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
kernel-default-5.3.18-150300.59.164.1 as a component of Image SLES15-SP3-BYOS-Azure
@@ -4425,6 +4473,17 @@
Container suse/sle-micro-rancher/5.4:latest:kernel-default-5.14.21-150400.24.122.2
Container suse/sle-micro/kvm-5.5:2.0.4-3.5.69:kernel-default-base-5.14.21-150500.55.68.1.150500.6.31.1
Container suse/sle-micro/rt-5.5:2.0.4-4.5.76:kernel-rt-5.14.21-150500.13.58.1
+ Image SLES12-SP5-GCE-BYOS:kernel-default-4.12.14-122.231.1
+ Image SLES12-SP5-GCE-SAP-BYOS:cluster-md-kmp-default-4.12.14-122.231.1
+ Image SLES12-SP5-GCE-SAP-BYOS:dlm-kmp-default-4.12.14-122.231.1
+ Image SLES12-SP5-GCE-SAP-BYOS:gfs2-kmp-default-4.12.14-122.231.1
+ Image SLES12-SP5-GCE-SAP-BYOS:kernel-default-4.12.14-122.231.1
+ Image SLES12-SP5-GCE-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.231.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:cluster-md-kmp-default-4.12.14-122.231.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:dlm-kmp-default-4.12.14-122.231.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:gfs2-kmp-default-4.12.14-122.231.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:kernel-default-4.12.14-122.231.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:ocfs2-kmp-default-4.12.14-122.231.1
Image SLES15-SP3-BYOS-Azure:kernel-default-5.3.18-150300.59.164.1
Image SLES15-SP3-BYOS-EC2-HVM:kernel-default-5.3.18-150300.59.164.1
Image SLES15-SP3-BYOS-GCE:kernel-default-5.3.18-150300.59.164.1
no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2021-47383
skipping CVE-2021-47386 as CVE page is older than CVRF-CVE file.
skipping CVE-2021-47385 as CVE page is older than CVRF-CVE file.
skipping CVE-2021-47384 as CVE page is older than CVRF-CVE file.
--- /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2021-47383.xml 2024-10-17 01:58:52.686612000 +0200
+++ /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2021-47383.xml.new 2024-10-29 01:50:51.182071000 +0100
@@ -14,13 +14,13 @@
1
- 52
- 2024-10-16T23:58:52Z
+ 53
+ 2024-10-29T00:50:50Z
current
2024-05-24T23:46:10Z
- 2024-10-16T23:58:52Z
+ 2024-10-29T00:50:50Z
cve-database/bin/generate-cvrf-cve.pl
2020-12-27T01:00:00Z
@@ -2229,12 +2229,21 @@
kernel-livepatch-5_3_18-150200_24_183-default-8-150200.5.6.1
+
+ kernel-livepatch-5_3_18-150200_24_183-default-9-150200.5.6.1
+
kernel-livepatch-5_3_18-150200_24_188-default-7-150200.5.6.1
+
+ kernel-livepatch-5_3_18-150200_24_188-default-8-150200.5.6.1
+
kernel-livepatch-5_3_18-150200_24_191-default-6-150200.5.6.1
+
+ kernel-livepatch-5_3_18-150200_24_191-default-7-150200.5.6.1
+
kernel-livepatch-5_3_18-150200_24_194-default-1-150200.5.3.1
@@ -2268,12 +2277,21 @@
kernel-livepatch-5_3_18-150300_59_153-default-8-150300.7.6.1
+
+ kernel-livepatch-5_3_18-150300_59_153-default-9-150300.7.6.1
+
kernel-livepatch-5_3_18-150300_59_158-default-7-150300.7.6.1
+
+ kernel-livepatch-5_3_18-150300_59_158-default-8-150300.7.6.1
+
kernel-livepatch-5_3_18-150300_59_161-default-6-150300.7.6.1
+
+ kernel-livepatch-5_3_18-150300_59_161-default-7-150300.7.6.1
+
kernel-livepatch-5_3_18-150300_59_164-default-1-150300.7.3.1
@@ -2550,9 +2568,15 @@
kgraft-patch-4_12_14-122_201-default-8-8.10.1
+
+ kgraft-patch-4_12_14-122_201-default-9-8.10.1
+
kgraft-patch-4_12_14-122_216-default-6-8.6.1
+
+ kgraft-patch-4_12_14-122_216-default-7-8.6.1
+
kgraft-patch-4_12_14-122_219-default-1-8.3.1
@@ -5094,6 +5118,30 @@
kernel-rt-5.14.21-150500.13.58.1 as a component of openSUSE Leap Micro 5.5
+
+ kgraft-patch-4_12_14-122_201-default-9-8.10.1 as a component of SUSE Linux Enterprise Live Patching 12 SP5
+
+
+ kgraft-patch-4_12_14-122_216-default-7-8.6.1 as a component of SUSE Linux Enterprise Live Patching 12 SP5
+
+
+ kernel-livepatch-5_3_18-150200_24_183-default-9-150200.5.6.1 as a component of SUSE Linux Enterprise Live Patching 15 SP2
+
+
+ kernel-livepatch-5_3_18-150200_24_188-default-8-150200.5.6.1 as a component of SUSE Linux Enterprise Live Patching 15 SP2
+
+
+ kernel-livepatch-5_3_18-150200_24_191-default-7-150200.5.6.1 as a component of SUSE Linux Enterprise Live Patching 15 SP2
+
+
+ kernel-livepatch-5_3_18-150300_59_153-default-9-150300.7.6.1 as a component of SUSE Linux Enterprise Live Patching 15 SP3
+
+
+ kernel-livepatch-5_3_18-150300_59_158-default-8-150300.7.6.1 as a component of SUSE Linux Enterprise Live Patching 15 SP3
+
+
+ kernel-livepatch-5_3_18-150300_59_161-default-7-150300.7.6.1 as a component of SUSE Linux Enterprise Live Patching 15 SP3
+
kernel-default as a component of SUSE Linux Enterprise Micro 5.0
@@ -6171,6 +6219,16 @@
openSUSE Leap Micro 5.5:kernel-default-base-5.14.21-150500.55.68.1.150500.6.31.1
openSUSE Leap Micro 5.5:kernel-rt-5.14.21-150500.13.58.1
+
+ SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_201-default-9-8.10.1
+ SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_216-default-7-8.6.1
+ SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_183-default-9-150200.5.6.1
+ SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_188-default-8-150200.5.6.1
+ SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_191-default-7-150200.5.6.1
+ SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_153-default-9-150300.7.6.1
+ SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_158-default-8-150300.7.6.1
+ SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_161-default-7-150300.7.6.1
+
SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default
SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel
no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2021-47378
skipping CVE-2021-47382 as CVE page is older than CVRF-CVE file.
skipping CVE-2021-47381 as CVE page is older than CVRF-CVE file.
skipping CVE-2021-47380 as CVE page is older than CVRF-CVE file.
skipping CVE-2021-47379 as CVE page is older than CVRF-CVE file.
--- /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2021-47378.xml 2024-10-17 01:58:55.230465000 +0200
+++ /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2021-47378.xml.new 2024-10-29 01:50:52.250045000 +0100
@@ -14,13 +14,13 @@
1
- 43
- 2024-10-16T23:58:54Z
+ 44
+ 2024-10-29T00:50:51Z
current
2024-05-24T23:46:11Z
- 2024-10-16T23:58:54Z
+ 2024-10-29T00:50:51Z
cve-database/bin/generate-cvrf-cve.pl
2020-12-27T01:00:00Z
@@ -2072,12 +2072,21 @@
kernel-livepatch-5_3_18-150200_24_183-default-8-150200.5.6.1
+
+ kernel-livepatch-5_3_18-150200_24_183-default-9-150200.5.6.1
+
kernel-livepatch-5_3_18-150200_24_188-default-7-150200.5.6.1
+
+ kernel-livepatch-5_3_18-150200_24_188-default-8-150200.5.6.1
+
kernel-livepatch-5_3_18-150200_24_191-default-6-150200.5.6.1
+
+ kernel-livepatch-5_3_18-150200_24_191-default-7-150200.5.6.1
+
kernel-livepatch-5_3_18-150200_24_194-default-1-150200.5.3.1
@@ -2105,12 +2114,21 @@
kernel-livepatch-5_3_18-150300_59_153-default-8-150300.7.6.1
+
+ kernel-livepatch-5_3_18-150300_59_153-default-9-150300.7.6.1
+
kernel-livepatch-5_3_18-150300_59_158-default-7-150300.7.6.1
+
+ kernel-livepatch-5_3_18-150300_59_158-default-8-150300.7.6.1
+
kernel-livepatch-5_3_18-150300_59_161-default-6-150300.7.6.1
+
+ kernel-livepatch-5_3_18-150300_59_161-default-7-150300.7.6.1
+
kernel-livepatch-5_3_18-150300_59_164-default-1-150300.7.3.1
@@ -2324,9 +2342,15 @@
kgraft-patch-4_12_14-122_201-default-8-8.10.1
+
+ kgraft-patch-4_12_14-122_201-default-9-8.10.1
+
kgraft-patch-4_12_14-122_216-default-6-8.6.1
+
+ kgraft-patch-4_12_14-122_216-default-7-8.6.1
+
kgraft-patch-4_12_14-122_219-default-1-8.3.1
@@ -4700,6 +4724,30 @@
kernel-rt-5.14.21-150500.13.58.1 as a component of openSUSE Leap Micro 5.5
+
+ kgraft-patch-4_12_14-122_201-default-9-8.10.1 as a component of SUSE Linux Enterprise Live Patching 12 SP5
+
+
+ kgraft-patch-4_12_14-122_216-default-7-8.6.1 as a component of SUSE Linux Enterprise Live Patching 12 SP5
+
+
+ kernel-livepatch-5_3_18-150200_24_183-default-9-150200.5.6.1 as a component of SUSE Linux Enterprise Live Patching 15 SP2
+
+
+ kernel-livepatch-5_3_18-150200_24_188-default-8-150200.5.6.1 as a component of SUSE Linux Enterprise Live Patching 15 SP2
+
+
+ kernel-livepatch-5_3_18-150200_24_191-default-7-150200.5.6.1 as a component of SUSE Linux Enterprise Live Patching 15 SP2
+
+
+ kernel-livepatch-5_3_18-150300_59_153-default-9-150300.7.6.1 as a component of SUSE Linux Enterprise Live Patching 15 SP3
+
+
+ kernel-livepatch-5_3_18-150300_59_158-default-8-150300.7.6.1 as a component of SUSE Linux Enterprise Live Patching 15 SP3
+
+
+ kernel-livepatch-5_3_18-150300_59_161-default-7-150300.7.6.1 as a component of SUSE Linux Enterprise Live Patching 15 SP3
+
kernel-default-livepatch as a component of SUSE Linux Enterprise Live Patching 15 SP6
@@ -5766,6 +5814,16 @@
openSUSE Leap Micro 5.5:kernel-default-base-5.14.21-150500.55.68.1.150500.6.31.1
openSUSE Leap Micro 5.5:kernel-rt-5.14.21-150500.13.58.1
+
+ SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_201-default-9-8.10.1
+ SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_216-default-7-8.6.1
+ SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_183-default-9-150200.5.6.1
+ SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_188-default-8-150200.5.6.1
+ SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_191-default-7-150200.5.6.1
+ SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_153-default-9-150300.7.6.1
+ SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_158-default-8-150300.7.6.1
+ SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_161-default-7-150300.7.6.1
+
SUSE Linux Enterprise Live Patching 15 SP6:kernel-default
SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch
no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2021-47375
skipping CVE-2021-47377 as CVE page is older than CVRF-CVE file.
skipping CVE-2021-47376 as CVE page is older than CVRF-CVE file.
no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2021-47373
skipping CVE-2021-47374 as CVE page is older than CVRF-CVE file.
--- /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2021-47373.xml 2024-10-22 03:15:46.971555000 +0200
+++ /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2021-47373.xml.new 2024-10-29 01:50:53.847986000 +0100
@@ -14,13 +14,13 @@
1
- 35
- 2024-10-22T01:15:46Z
+ 36
+ 2024-10-29T00:50:53Z
current
2024-05-24T23:46:12Z
- 2024-10-22T01:15:46Z
+ 2024-10-29T00:50:53Z
cve-database/bin/generate-cvrf-cve.pl
2020-12-27T01:00:00Z
@@ -110,6 +110,21 @@
Image SLES12-SP5-Azure-SAP-BYOS
+
+
+ Image SLES12-SP5-GCE-BYOS
+
+
+
+
+ Image SLES12-SP5-GCE-SAP-BYOS
+
+
+
+
+ Image SLES12-SP5-GCE-SAP-On-Demand
+
+
Image SLES15-SP4-BYOS
@@ -1908,6 +1923,39 @@
ocfs2-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-Azure-SAP-BYOS
+
+ kernel-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-BYOS
+
+
+ cluster-md-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ dlm-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ gfs2-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ kernel-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ ocfs2-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ cluster-md-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
+
+ dlm-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
+
+ gfs2-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
+
+ kernel-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
+
+ ocfs2-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
kernel-default-5.14.21-150400.24.122.2 as a component of Image SLES15-SP4-BYOS
@@ -3841,6 +3889,17 @@
Image SLES12-SP5-Azure-SAP-BYOS:gfs2-kmp-default-4.12.14-122.228.1
Image SLES12-SP5-Azure-SAP-BYOS:kernel-default-4.12.14-122.228.1
Image SLES12-SP5-Azure-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.228.1
+ Image SLES12-SP5-GCE-BYOS:kernel-default-4.12.14-122.228.1
+ Image SLES12-SP5-GCE-SAP-BYOS:cluster-md-kmp-default-4.12.14-122.228.1
+ Image SLES12-SP5-GCE-SAP-BYOS:dlm-kmp-default-4.12.14-122.228.1
+ Image SLES12-SP5-GCE-SAP-BYOS:gfs2-kmp-default-4.12.14-122.228.1
+ Image SLES12-SP5-GCE-SAP-BYOS:kernel-default-4.12.14-122.228.1
+ Image SLES12-SP5-GCE-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.228.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:cluster-md-kmp-default-4.12.14-122.228.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:dlm-kmp-default-4.12.14-122.228.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:gfs2-kmp-default-4.12.14-122.228.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:kernel-default-4.12.14-122.228.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:ocfs2-kmp-default-4.12.14-122.228.1
Image SLES15-SP4-BYOS:kernel-default-5.14.21-150400.24.122.2
Image SLES15-SP4-BYOS-Azure:kernel-default-5.14.21-150400.24.122.2
Image SLES15-SP4-BYOS-EC2:kernel-default-5.14.21-150400.24.122.2
no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2021-47372
skipping CVE-2021-47371 as CVE page is older than CVRF-CVE file.
skipping CVE-2021-47370 as CVE page is older than CVRF-CVE file.
skipping CVE-2021-47369 as CVE page is older than CVRF-CVE file.
skipping CVE-2021-47368 as CVE page is older than CVRF-CVE file.
skipping CVE-2021-47367 as CVE page is older than CVRF-CVE file.
skipping CVE-2021-47366 as CVE page is older than CVRF-CVE file.
skipping CVE-2021-47365 as CVE page is older than CVRF-CVE file.
skipping CVE-2021-47364 as CVE page is older than CVRF-CVE file.
skipping CVE-2021-47363 as CVE page is older than CVRF-CVE file.
skipping CVE-2021-47362 as CVE page is older than CVRF-CVE file.
skipping CVE-2021-47361 as CVE page is older than CVRF-CVE file.
skipping CVE-2021-47360 as CVE page is older than CVRF-CVE file.
skipping CVE-2021-47359 as CVE page is older than CVRF-CVE file.
skipping CVE-2021-47358 as CVE page is older than CVRF-CVE file.
skipping CVE-2021-47356 as CVE page is older than CVRF-CVE file.
skipping CVE-2021-47355 as CVE page is older than CVRF-CVE file.
skipping CVE-2021-47354 as CVE page is older than CVRF-CVE file.
skipping CVE-2021-47353 as CVE page is older than CVRF-CVE file.
skipping CVE-2021-47352 as CVE page is older than CVRF-CVE file.
skipping CVE-2021-47351 as CVE page is older than CVRF-CVE file.
skipping CVE-2021-47350 as CVE page is older than CVRF-CVE file.
skipping CVE-2021-47349 as CVE page is older than CVRF-CVE file.
skipping CVE-2021-47348 as CVE page is older than CVRF-CVE file.
skipping CVE-2021-47347 as CVE page is older than CVRF-CVE file.
skipping CVE-2021-47346 as CVE page is older than CVRF-CVE file.
skipping CVE-2021-47345 as CVE page is older than CVRF-CVE file.
skipping CVE-2021-47344 as CVE page is older than CVRF-CVE file.
skipping CVE-2021-47343 as CVE page is older than CVRF-CVE file.
skipping CVE-2021-47342 as CVE page is older than CVRF-CVE file.
--- /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2021-47341.xml 2024-10-22 03:16:20.373265000 +0200
+++ /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2021-47341.xml.new 2024-10-29 01:50:55.480952000 +0100
@@ -14,13 +14,13 @@
1
- 21
- 2024-10-22T01:16:19Z
+ 22
+ 2024-10-29T00:50:54Z
current
2024-05-22T23:39:47Z
- 2024-10-22T01:16:19Z
+ 2024-10-29T00:50:54Z
cve-database/bin/generate-cvrf-cve.pl
2020-12-27T01:00:00Z
@@ -150,6 +150,21 @@
Image SLES12-SP5-Azure-SAP-BYOS
+
+
+ Image SLES12-SP5-GCE-BYOS
+
+
+
+
+ Image SLES12-SP5-GCE-SAP-BYOS
+
+
+
+
+ Image SLES12-SP5-GCE-SAP-On-Demand
+
+
Image SLES15-SP3-BYOS-Azure
@@ -1210,6 +1225,39 @@
ocfs2-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-Azure-SAP-BYOS
+
+ kernel-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-BYOS
+
+
+ cluster-md-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ dlm-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ gfs2-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ kernel-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ ocfs2-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ cluster-md-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
+
+ dlm-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
+
+ gfs2-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
+
+ kernel-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
+
+ ocfs2-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
kernel-default-5.3.18-150300.59.164.1 as a component of Image SLES15-SP3-BYOS-Azure
@@ -2472,6 +2520,17 @@
Image SLES12-SP5-Azure-SAP-BYOS:gfs2-kmp-default-4.12.14-122.228.1
Image SLES12-SP5-Azure-SAP-BYOS:kernel-default-4.12.14-122.228.1
Image SLES12-SP5-Azure-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.228.1
+ Image SLES12-SP5-GCE-BYOS:kernel-default-4.12.14-122.228.1
+ Image SLES12-SP5-GCE-SAP-BYOS:cluster-md-kmp-default-4.12.14-122.228.1
+ Image SLES12-SP5-GCE-SAP-BYOS:dlm-kmp-default-4.12.14-122.228.1
+ Image SLES12-SP5-GCE-SAP-BYOS:gfs2-kmp-default-4.12.14-122.228.1
+ Image SLES12-SP5-GCE-SAP-BYOS:kernel-default-4.12.14-122.228.1
+ Image SLES12-SP5-GCE-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.228.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:cluster-md-kmp-default-4.12.14-122.228.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:dlm-kmp-default-4.12.14-122.228.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:gfs2-kmp-default-4.12.14-122.228.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:kernel-default-4.12.14-122.228.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:ocfs2-kmp-default-4.12.14-122.228.1
Image SLES15-SP3-BYOS-Azure:kernel-default-5.3.18-150300.59.164.1
Image SLES15-SP3-BYOS-EC2-HVM:kernel-default-5.3.18-150300.59.164.1
Image SLES15-SP3-BYOS-GCE:kernel-default-5.3.18-150300.59.164.1
skipping CVE-2021-47340 as CVE page is older than CVRF-CVE file.
skipping CVE-2021-47339 as CVE page is older than CVRF-CVE file.
skipping CVE-2021-47338 as CVE page is older than CVRF-CVE file.
skipping CVE-2021-47337 as CVE page is older than CVRF-CVE file.
skipping CVE-2021-47336 as CVE page is older than CVRF-CVE file.
skipping CVE-2021-47335 as CVE page is older than CVRF-CVE file.
skipping CVE-2021-47334 as CVE page is older than CVRF-CVE file.
skipping CVE-2021-47333 as CVE page is older than CVRF-CVE file.
skipping CVE-2021-47332 as CVE page is older than CVRF-CVE file.
skipping CVE-2021-47331 as CVE page is older than CVRF-CVE file.
skipping CVE-2021-47330 as CVE page is older than CVRF-CVE file.
skipping CVE-2021-47329 as CVE page is older than CVRF-CVE file.
skipping CVE-2021-47328 as CVE page is older than CVRF-CVE file.
skipping CVE-2021-47327 as CVE page is older than CVRF-CVE file.
skipping CVE-2021-47326 as CVE page is older than CVRF-CVE file.
skipping CVE-2021-47325 as CVE page is older than CVRF-CVE file.
skipping CVE-2021-47324 as CVE page is older than CVRF-CVE file.
skipping CVE-2021-47323 as CVE page is older than CVRF-CVE file.
skipping CVE-2021-47322 as CVE page is older than CVRF-CVE file.
skipping CVE-2021-47321 as CVE page is older than CVRF-CVE file.
skipping CVE-2021-47320 as CVE page is older than CVRF-CVE file.
skipping CVE-2021-47319 as CVE page is older than CVRF-CVE file.
skipping CVE-2021-47318 as CVE page is older than CVRF-CVE file.
skipping CVE-2021-47317 as CVE page is older than CVRF-CVE file.
skipping CVE-2021-47316 as CVE page is older than CVRF-CVE file.
skipping CVE-2021-47315 as CVE page is older than CVRF-CVE file.
skipping CVE-2021-47314 as CVE page is older than CVRF-CVE file.
skipping CVE-2021-47313 as CVE page is older than CVRF-CVE file.
skipping CVE-2021-47312 as CVE page is older than CVRF-CVE file.
skipping CVE-2021-47311 as CVE page is older than CVRF-CVE file.
skipping CVE-2021-47310 as CVE page is older than CVRF-CVE file.
skipping CVE-2021-47308 as CVE page is older than CVRF-CVE file.
skipping CVE-2021-47307 as CVE page is older than CVRF-CVE file.
skipping CVE-2021-47306 as CVE page is older than CVRF-CVE file.
skipping CVE-2021-47305 as CVE page is older than CVRF-CVE file.
skipping CVE-2021-47304 as CVE page is older than CVRF-CVE file.
skipping CVE-2021-47303 as CVE page is older than CVRF-CVE file.
skipping CVE-2021-47302 as CVE page is older than CVRF-CVE file.
skipping CVE-2021-47301 as CVE page is older than CVRF-CVE file.
skipping CVE-2021-47300 as CVE page is older than CVRF-CVE file.
skipping CVE-2021-47299 as CVE page is older than CVRF-CVE file.
skipping CVE-2021-47298 as CVE page is older than CVRF-CVE file.
skipping CVE-2021-47296 as CVE page is older than CVRF-CVE file.
--- /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2021-47295.xml 2024-10-19 02:20:41.618681000 +0200
+++ /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2021-47295.xml.new 2024-10-29 01:50:57.071755000 +0100
@@ -14,13 +14,13 @@
1
- 22
- 2024-10-19T00:20:41Z
+ 23
+ 2024-10-29T00:50:56Z
current
2024-05-22T23:39:56Z
- 2024-10-19T00:20:41Z
+ 2024-10-29T00:50:56Z
cve-database/bin/generate-cvrf-cve.pl
2020-12-27T01:00:00Z
@@ -79,6 +79,21 @@
Image SLES12-SP5-EC2-BYOS
+
+
+ Image SLES12-SP5-GCE-BYOS
+
+
+
+
+ Image SLES12-SP5-GCE-SAP-BYOS
+
+
+
+
+ Image SLES12-SP5-GCE-SAP-On-Demand
+
+
Image SLES12-SP5-SAP-Azure-LI-BYOS-Production
@@ -861,6 +876,39 @@
kernel-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-EC2-BYOS
+
+ kernel-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-BYOS
+
+
+ cluster-md-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ dlm-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ gfs2-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ kernel-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ ocfs2-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ cluster-md-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
+
+ dlm-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
+
+ gfs2-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
+
+ kernel-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
+
+ ocfs2-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
cluster-md-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-SAP-Azure-LI-BYOS-Production
@@ -1795,6 +1843,17 @@
Image SLES12-SP5-Azure-SAP-BYOS:kernel-default-4.12.14-122.225.1
Image SLES12-SP5-Azure-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.225.1
Image SLES12-SP5-EC2-BYOS:kernel-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-BYOS:kernel-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-BYOS:cluster-md-kmp-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-BYOS:dlm-kmp-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-BYOS:gfs2-kmp-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-BYOS:kernel-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:cluster-md-kmp-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:dlm-kmp-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:gfs2-kmp-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:kernel-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:ocfs2-kmp-default-4.12.14-122.225.1
Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:cluster-md-kmp-default-4.12.14-122.225.1
Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:dlm-kmp-default-4.12.14-122.225.1
Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:gfs2-kmp-default-4.12.14-122.225.1
skipping CVE-2021-47293 as CVE page is older than CVRF-CVE file.
skipping CVE-2021-47292 as CVE page is older than CVRF-CVE file.
--- /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2021-47291.xml 2024-10-22 03:17:07.700314000 +0200
+++ /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2021-47291.xml.new 2024-10-29 01:50:58.449729000 +0100
@@ -14,13 +14,13 @@
1
- 21
- 2024-10-22T01:17:07Z
+ 22
+ 2024-10-29T00:50:57Z
current
2024-05-22T23:39:57Z
- 2024-10-22T01:17:07Z
+ 2024-10-29T00:50:57Z
cve-database/bin/generate-cvrf-cve.pl
2020-12-27T01:00:00Z
@@ -878,18 +878,33 @@
kernel-livepatch-5_3_18-150200_24_183-default-8-150200.5.6.1
+
+ kernel-livepatch-5_3_18-150200_24_183-default-9-150200.5.6.1
+
kernel-livepatch-5_3_18-150200_24_188-default-7-150200.5.6.1
+
+ kernel-livepatch-5_3_18-150200_24_188-default-8-150200.5.6.1
+
kernel-livepatch-5_3_18-150200_24_191-default-6-150200.5.6.1
+
+ kernel-livepatch-5_3_18-150200_24_191-default-7-150200.5.6.1
+
kernel-livepatch-5_3_18-150200_24_194-default-3-150200.5.6.1
+
+ kernel-livepatch-5_3_18-150200_24_194-default-4-150200.5.6.1
+
kernel-livepatch-5_3_18-150200_24_197-default-2-150200.5.6.1
+
+ kernel-livepatch-5_3_18-150200_24_197-default-3-150200.5.6.1
+
kernel-livepatch-5_3_18-150200_24_200-default-1-150200.5.3.1
@@ -914,18 +929,33 @@
kernel-livepatch-5_3_18-150300_59_153-default-8-150300.7.6.1
+
+ kernel-livepatch-5_3_18-150300_59_153-default-9-150300.7.6.1
+
kernel-livepatch-5_3_18-150300_59_158-default-7-150300.7.6.1
+
+ kernel-livepatch-5_3_18-150300_59_158-default-8-150300.7.6.1
+
kernel-livepatch-5_3_18-150300_59_161-default-6-150300.7.6.1
+
+ kernel-livepatch-5_3_18-150300_59_161-default-7-150300.7.6.1
+
kernel-livepatch-5_3_18-150300_59_164-default-3-150300.7.6.1
+
+ kernel-livepatch-5_3_18-150300_59_164-default-4-150300.7.6.1
+
kernel-livepatch-5_3_18-150300_59_167-default-2-150300.7.6.1
+
+ kernel-livepatch-5_3_18-150300_59_167-default-3-150300.7.6.1
+
kernel-livepatch-5_3_18-150300_59_170-default-1-150300.7.3.1
@@ -1532,6 +1562,36 @@
reiserfs-kmp-default-5.3.18-150300.59.170.1 as a component of SUSE Linux Enterprise Server for SAP Applications 15 SP3
+
+ kernel-livepatch-5_3_18-150200_24_183-default-9-150200.5.6.1 as a component of SUSE Linux Enterprise Live Patching 15 SP2
+
+
+ kernel-livepatch-5_3_18-150200_24_188-default-8-150200.5.6.1 as a component of SUSE Linux Enterprise Live Patching 15 SP2
+
+
+ kernel-livepatch-5_3_18-150200_24_191-default-7-150200.5.6.1 as a component of SUSE Linux Enterprise Live Patching 15 SP2
+
+
+ kernel-livepatch-5_3_18-150200_24_194-default-4-150200.5.6.1 as a component of SUSE Linux Enterprise Live Patching 15 SP2
+
+
+ kernel-livepatch-5_3_18-150200_24_197-default-3-150200.5.6.1 as a component of SUSE Linux Enterprise Live Patching 15 SP2
+
+
+ kernel-livepatch-5_3_18-150300_59_153-default-9-150300.7.6.1 as a component of SUSE Linux Enterprise Live Patching 15 SP3
+
+
+ kernel-livepatch-5_3_18-150300_59_158-default-8-150300.7.6.1 as a component of SUSE Linux Enterprise Live Patching 15 SP3
+
+
+ kernel-livepatch-5_3_18-150300_59_161-default-7-150300.7.6.1 as a component of SUSE Linux Enterprise Live Patching 15 SP3
+
+
+ kernel-livepatch-5_3_18-150300_59_164-default-4-150300.7.6.1 as a component of SUSE Linux Enterprise Live Patching 15 SP3
+
+
+ kernel-livepatch-5_3_18-150300_59_167-default-3-150300.7.6.1 as a component of SUSE Linux Enterprise Live Patching 15 SP3
+
kernel-default as a component of SUSE Linux Enterprise High Performance Computing 12 SP5
@@ -2273,6 +2333,18 @@
SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.170.1
SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.170.1
+
+ SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_183-default-9-150200.5.6.1
+ SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_188-default-8-150200.5.6.1
+ SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_191-default-7-150200.5.6.1
+ SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_194-default-4-150200.5.6.1
+ SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_197-default-3-150200.5.6.1
+ SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_153-default-9-150300.7.6.1
+ SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_158-default-8-150300.7.6.1
+ SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_161-default-7-150300.7.6.1
+ SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_164-default-4-150300.7.6.1
+ SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_167-default-3-150300.7.6.1
+
SUSE Linux Enterprise High Performance Computing 12 SP5:kernel-default
SUSE Linux Enterprise High Performance Computing 12 SP5:kernel-source
skipping CVE-2021-47290 as CVE page is older than CVRF-CVE file.
--- /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2021-47289.xml 2024-10-22 03:17:09.390200000 +0200
+++ /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2021-47289.xml.new 2024-10-29 01:50:59.112687000 +0100
@@ -14,13 +14,13 @@
1
- 20
- 2024-10-22T01:17:08Z
+ 21
+ 2024-10-29T00:50:58Z
current
2024-05-22T23:39:58Z
- 2024-10-22T01:17:08Z
+ 2024-10-29T00:50:58Z
cve-database/bin/generate-cvrf-cve.pl
2020-12-27T01:00:00Z
@@ -87,6 +87,21 @@
Image SLES12-SP5-Azure-SAP-BYOS
+
+
+ Image SLES12-SP5-GCE-BYOS
+
+
+
+
+ Image SLES12-SP5-GCE-SAP-BYOS
+
+
+
+
+ Image SLES12-SP5-GCE-SAP-On-Demand
+
+
Image SLES15-SP3-BYOS-Azure
@@ -1219,6 +1234,39 @@
ocfs2-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-Azure-SAP-BYOS
+
+ kernel-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-BYOS
+
+
+ cluster-md-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ dlm-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ gfs2-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ kernel-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ ocfs2-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ cluster-md-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
+
+ dlm-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
+
+ gfs2-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
+
+ kernel-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
+
+ ocfs2-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
kernel-default-5.3.18-150300.59.164.1 as a component of Image SLES15-SP3-BYOS-Azure
@@ -2687,6 +2735,17 @@
Image SLES12-SP5-Azure-SAP-BYOS:gfs2-kmp-default-4.12.14-122.228.1
Image SLES12-SP5-Azure-SAP-BYOS:kernel-default-4.12.14-122.228.1
Image SLES12-SP5-Azure-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.228.1
+ Image SLES12-SP5-GCE-BYOS:kernel-default-4.12.14-122.228.1
+ Image SLES12-SP5-GCE-SAP-BYOS:cluster-md-kmp-default-4.12.14-122.228.1
+ Image SLES12-SP5-GCE-SAP-BYOS:dlm-kmp-default-4.12.14-122.228.1
+ Image SLES12-SP5-GCE-SAP-BYOS:gfs2-kmp-default-4.12.14-122.228.1
+ Image SLES12-SP5-GCE-SAP-BYOS:kernel-default-4.12.14-122.228.1
+ Image SLES12-SP5-GCE-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.228.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:cluster-md-kmp-default-4.12.14-122.228.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:dlm-kmp-default-4.12.14-122.228.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:gfs2-kmp-default-4.12.14-122.228.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:kernel-default-4.12.14-122.228.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:ocfs2-kmp-default-4.12.14-122.228.1
Image SLES15-SP3-BYOS-Azure:kernel-default-5.3.18-150300.59.164.1
Image SLES15-SP3-BYOS-EC2-HVM:kernel-default-5.3.18-150300.59.164.1
Image SLES15-SP3-BYOS-GCE:kernel-default-5.3.18-150300.59.164.1
skipping CVE-2021-47288 as CVE page is older than CVRF-CVE file.
skipping CVE-2021-47287 as CVE page is older than CVRF-CVE file.
skipping CVE-2021-47286 as CVE page is older than CVRF-CVE file.
skipping CVE-2021-47285 as CVE page is older than CVRF-CVE file.
skipping CVE-2021-47284 as CVE page is older than CVRF-CVE file.
skipping CVE-2021-47283 as CVE page is older than CVRF-CVE file.
skipping CVE-2021-47282 as CVE page is older than CVRF-CVE file.
skipping CVE-2021-47280 as CVE page is older than CVRF-CVE file.
skipping CVE-2021-47279 as CVE page is older than CVRF-CVE file.
skipping CVE-2021-47278 as CVE page is older than CVRF-CVE file.
skipping CVE-2021-47277 as CVE page is older than CVRF-CVE file.
skipping CVE-2021-47275 as CVE page is older than CVRF-CVE file.
skipping CVE-2021-47274 as CVE page is older than CVRF-CVE file.
skipping CVE-2021-47273 as CVE page is older than CVRF-CVE file.
skipping CVE-2021-47272 as CVE page is older than CVRF-CVE file.
skipping CVE-2021-47271 as CVE page is older than CVRF-CVE file.
skipping CVE-2021-47270 as CVE page is older than CVRF-CVE file.
skipping CVE-2021-47269 as CVE page is older than CVRF-CVE file.
skipping CVE-2021-47268 as CVE page is older than CVRF-CVE file.
skipping CVE-2021-47267 as CVE page is older than CVRF-CVE file.
skipping CVE-2021-47266 as CVE page is older than CVRF-CVE file.
skipping CVE-2021-47265 as CVE page is older than CVRF-CVE file.
skipping CVE-2021-47264 as CVE page is older than CVRF-CVE file.
skipping CVE-2021-47263 as CVE page is older than CVRF-CVE file.
skipping CVE-2021-47262 as CVE page is older than CVRF-CVE file.
skipping CVE-2021-47261 as CVE page is older than CVRF-CVE file.
skipping CVE-2021-47260 as CVE page is older than CVRF-CVE file.
skipping CVE-2021-47259 as CVE page is older than CVRF-CVE file.
skipping CVE-2021-47258 as CVE page is older than CVRF-CVE file.
--- /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2021-47257.xml 2024-10-22 03:17:40.194634000 +0200
+++ /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2021-47257.xml.new 2024-10-29 01:51:00.854078000 +0100
@@ -14,13 +14,13 @@
1
- 15
- 2024-10-22T01:17:39Z
+ 16
+ 2024-10-29T00:51:00Z
current
2024-05-22T23:40:05Z
- 2024-10-22T01:17:39Z
+ 2024-10-29T00:51:00Z
cve-database/bin/generate-cvrf-cve.pl
2020-12-27T01:00:00Z
@@ -60,6 +60,21 @@
Image SLES12-SP5-Azure-SAP-BYOS
+
+
+ Image SLES12-SP5-GCE-BYOS
+
+
+
+
+ Image SLES12-SP5-GCE-SAP-BYOS
+
+
+
+
+ Image SLES12-SP5-GCE-SAP-On-Demand
+
+
SUSE Enterprise Storage 7.1
@@ -364,6 +379,253 @@
openSUSE Leap 15.6
+
+
+ SLES 15 SP1 CHOST Images for Amazon EC2 suse-sles-15-sp1-chost-byos-v20210304-hvm-ssd-x86_64
+ SLES 15 SP1 CHOST Images for Amazon EC2 suse-sles-15-sp1-chost-byos-v20220127-hvm-ssd-x86_64
+ SLES 15 SP1 CHOST Images for Amazon EC2 suse-sles-15-sp1-chost-byos-v20220715-hvm-ssd-x86_64
+
+
+ SLES 15 SP2 CHOST Images for Amazon EC2 suse-sles-15-sp2-chost-byos-v20210610-hvm-ssd-x86_64
+ SLES 15 SP2 CHOST Images for Amazon EC2 suse-sles-15-sp2-chost-byos-v20210722-hvm-ssd-x86_64
+ SLES 15 SP2 CHOST Images for Amazon EC2 suse-sles-15-sp2-chost-byos-v20210913-hvm-ssd-x86_64
+ SLES 15 SP2 CHOST Images for Amazon EC2 suse-sles-15-sp2-chost-byos-v20211025-hvm-ssd-x86_64
+ SLES 15 SP2 CHOST Images for Amazon EC2 suse-sles-15-sp2-chost-byos-v20220126-hvm-ssd-x86_64
+ SLES 15 SP2 CHOST Images for Amazon EC2 suse-sles-15-sp2-chost-byos-v20220718-hvm-ssd-x86_64
+
+
+ SLES 15 SP3 CHOST Images for Amazon EC2 suse-sles-15-sp3-chost-byos-v20210729-hvm-ssd-x86_64
+ SLES 15 SP3 CHOST Images for Amazon EC2 suse-sles-15-sp3-chost-byos-v20210827-hvm-ssd-x86_64
+ SLES 15 SP3 CHOST Images for Amazon EC2 suse-sles-15-sp3-chost-byos-v20210927-hvm-ssd-x86_64
+ SLES 15 SP3 CHOST Images for Amazon EC2 suse-sles-15-sp3-chost-byos-v20211004-hvm-ssd-x86_64
+ SLES 15 SP3 CHOST Images for Amazon EC2 suse-sles-15-sp3-chost-byos-v20211101-hvm-ssd-x86_64
+ SLES 15 SP3 CHOST Images for Amazon EC2 suse-sles-15-sp3-chost-byos-v20211202-hvm-ssd-x86_64
+ SLES 15 SP3 CHOST Images for Amazon EC2 suse-sles-15-sp3-chost-byos-v20220103-hvm-ssd-x86_64
+ SLES 15 SP3 CHOST Images for Amazon EC2 suse-sles-15-sp3-chost-byos-v20220126-hvm-ssd-x86_64
+ SLES 15 SP3 CHOST Images for Amazon EC2 suse-sles-15-sp3-chost-byos-v20220222-hvm-ssd-x86_64
+ SLES 15 SP3 CHOST Images for Amazon EC2 suse-sles-15-sp3-chost-byos-v20220310-hvm-ssd-x86_64
+ SLES 15 SP3 CHOST Images for Amazon EC2 suse-sles-15-sp3-chost-byos-v20220411-hvm-ssd-x86_64
+ SLES 15 SP3 CHOST Images for Amazon EC2 suse-sles-15-sp3-chost-byos-v20220510-hvm-ssd-x86_64
+ SLES 15 SP3 CHOST Images for Amazon EC2 suse-sles-15-sp3-chost-byos-v20220608-hvm-ssd-x86_64
+ SLES 15 SP3 CHOST Images for Amazon EC2 suse-sles-15-sp3-chost-byos-v20220708-hvm-ssd-x86_64
+ SLES 15 SP3 CHOST Images for Amazon EC2 suse-sles-15-sp3-chost-byos-v20220718-hvm-ssd-x86_64
+ SLES 15 SP3 CHOST Images for Amazon EC2 suse-sles-15-sp3-chost-byos-v20220818-hvm-ssd-x86_64
+ SLES 15 SP3 CHOST Images for Amazon EC2 suse-sles-15-sp3-chost-byos-v20220916-hvm-ssd-x86_64
+ SLES 15 SP3 CHOST Images for Amazon EC2 suse-sles-15-sp3-chost-byos-v20220921-hvm-ssd-x86_64
+ SLES 15 SP3 CHOST Images for Amazon EC2 suse-sles-15-sp3-chost-byos-v20221019-hvm-ssd-x86_64
+ SLES 15 SP3 CHOST Images for Amazon EC2 suse-sles-15-sp3-chost-byos-v20221119-hvm-ssd-x86_64
+ SLES 15 SP3 CHOST Images for Amazon EC2 suse-sles-15-sp3-chost-byos-v20221215-hvm-ssd-x86_64
+ SLES 15 SP3 CHOST Images for Amazon EC2 suse-sles-15-sp3-chost-byos-v20230313-hvm-ssd-x86_64
+ SLES 15 SP3 CHOST Images for Amazon EC2 suse-sles-15-sp3-chost-byos-v20230613-hvm-ssd-x86_64
+ SLES 15 SP3 CHOST Images for Amazon EC2 suse-sles-15-sp3-chost-byos-v20240807-hvm-ssd-x86_64
+ SLES 15 SP3 CHOST Images for Amazon EC2 suse-sles-15-sp3-chost-byos-v20240912-hvm-ssd-x86_64
+
+
+ SLES 15 SP4 CHOST Images for Amazon EC2 suse-sles-15-sp4-chost-byos-v20220718-hvm-ssd-x86_64
+ SLES 15 SP4 CHOST Images for Amazon EC2 suse-sles-15-sp4-chost-byos-v20220721-hvm-ssd-x86_64
+ SLES 15 SP4 CHOST Images for Amazon EC2 suse-sles-15-sp4-chost-byos-v20220819-hvm-ssd-x86_64
+ SLES 15 SP4 CHOST Images for Amazon EC2 suse-sles-15-sp4-chost-byos-v20220916-hvm-ssd-x86_64
+ SLES 15 SP4 CHOST Images for Amazon EC2 suse-sles-15-sp4-chost-byos-v20220923-hvm-ssd-x86_64
+ SLES 15 SP4 CHOST Images for Amazon EC2 suse-sles-15-sp4-chost-byos-v20221018-hvm-ssd-x86_64
+ SLES 15 SP4 CHOST Images for Amazon EC2 suse-sles-15-sp4-chost-byos-v20221118-hvm-ssd-x86_64
+ SLES 15 SP4 CHOST Images for Amazon EC2 suse-sles-15-sp4-chost-byos-v20221215-hvm-ssd-x86_64
+ SLES 15 SP4 CHOST Images for Amazon EC2 suse-sles-15-sp4-chost-byos-v20230111-hvm-ssd-x86_64
+ SLES 15 SP4 CHOST Images for Amazon EC2 suse-sles-15-sp4-chost-byos-v20230210-hvm-ssd-x86_64
+ SLES 15 SP4 CHOST Images for Amazon EC2 suse-sles-15-sp4-chost-byos-v20230310-hvm-ssd-x86_64
+ SLES 15 SP4 CHOST Images for Amazon EC2 suse-sles-15-sp4-chost-byos-v20230410-hvm-ssd-x86_64
+ SLES 15 SP4 CHOST Images for Amazon EC2 suse-sles-15-sp4-chost-byos-v20230510-hvm-ssd-x86_64
+ SLES 15 SP4 CHOST Images for Amazon EC2 suse-sles-15-sp4-chost-byos-v20230606-hvm-ssd-x86_64
+ SLES 15 SP4 CHOST Images for Amazon EC2 suse-sles-15-sp4-chost-byos-v20230704-hvm-ssd-x86_64
+ SLES 15 SP4 CHOST Images for Amazon EC2 suse-sles-15-sp4-chost-byos-v20230803-hvm-ssd-x86_64
+ SLES 15 SP4 CHOST Images for Amazon EC2 suse-sles-15-sp4-chost-byos-v20230901-hvm-ssd-x86_64
+ SLES 15 SP4 CHOST Images for Amazon EC2 suse-sles-15-sp4-chost-byos-v20230928-hvm-ssd-x86_64
+ SLES 15 SP4 CHOST Images for Amazon EC2 suse-sles-15-sp4-chost-byos-v20231027-hvm-ssd-x86_64
+ SLES 15 SP4 CHOST Images for Amazon EC2 suse-sles-15-sp4-chost-byos-v20231127-hvm-ssd-x86_64
+ SLES 15 SP4 CHOST Images for Amazon EC2 suse-sles-15-sp4-chost-byos-v20231212-hvm-ssd-x86_64
+ SLES 15 SP4 CHOST Images for Amazon EC2 suse-sles-15-sp4-chost-byos-v20240312-hvm-ssd-x86_64
+ SLES 15 SP4 CHOST Images for Amazon EC2 suse-sles-15-sp4-chost-byos-v20240612-hvm-ssd-x86_64
+ SLES 15 SP4 CHOST Images for Amazon EC2 suse-sles-15-sp4-chost-byos-v20240809-hvm-ssd-x86_64
+ SLES 15 SP4 CHOST Images for Amazon EC2 suse-sles-15-sp4-chost-byos-v20240912-hvm-ssd-x86_64
+
+
+ SLES 15 SP1 CHOST Images for Google sles-15-sp1-chost-byos-v20210202
+ SLES 15 SP1 CHOST Images for Google sles-15-sp1-chost-byos-v20210304
+ SLES 15 SP1 CHOST Images for Google sles-15-sp1-chost-byos-v20220127
+ SLES 15 SP1 CHOST Images for Google sles-15-sp1-chost-byos-v20220715-x86-64
+
+
+ SLES 15 SP2 CHOST Images for Google sles-15-sp2-chost-byos-v20210202
+ SLES 15 SP2 CHOST Images for Google sles-15-sp2-chost-byos-v20210304
+ SLES 15 SP2 CHOST Images for Google sles-15-sp2-chost-byos-v20210405
+ SLES 15 SP2 CHOST Images for Google sles-15-sp2-chost-byos-v20210506
+ SLES 15 SP2 CHOST Images for Google sles-15-sp2-chost-byos-v20210610
+ SLES 15 SP2 CHOST Images for Google sles-15-sp2-chost-byos-v20210722
+ SLES 15 SP2 CHOST Images for Google sles-15-sp2-chost-byos-v20210913
+ SLES 15 SP2 CHOST Images for Google sles-15-sp2-chost-byos-v20211025
+ SLES 15 SP2 CHOST Images for Google sles-15-sp2-chost-byos-v20220126
+ SLES 15 SP2 CHOST Images for Google sles-15-sp2-chost-byos-v20220718-x86-64
+
+
+ SLES 15 SP3 CHOST Images for Google sles-15-sp3-chost-byos-v20210729
+ SLES 15 SP3 CHOST Images for Google sles-15-sp3-chost-byos-v20210827
+ SLES 15 SP3 CHOST Images for Google sles-15-sp3-chost-byos-v20210927
+ SLES 15 SP3 CHOST Images for Google sles-15-sp3-chost-byos-v20211004
+ SLES 15 SP3 CHOST Images for Google sles-15-sp3-chost-byos-v20211101
+ SLES 15 SP3 CHOST Images for Google sles-15-sp3-chost-byos-v20211202
+ SLES 15 SP3 CHOST Images for Google sles-15-sp3-chost-byos-v20220103
+ SLES 15 SP3 CHOST Images for Google sles-15-sp3-chost-byos-v20220126
+ SLES 15 SP3 CHOST Images for Google sles-15-sp3-chost-byos-v20220222
+ SLES 15 SP3 CHOST Images for Google sles-15-sp3-chost-byos-v20220310
+ SLES 15 SP3 CHOST Images for Google sles-15-sp3-chost-byos-v20220411-x86-64
+ SLES 15 SP3 CHOST Images for Google sles-15-sp3-chost-byos-v20220510-x86-64
+ SLES 15 SP3 CHOST Images for Google sles-15-sp3-chost-byos-v20220608-x86-64
+ SLES 15 SP3 CHOST Images for Google sles-15-sp3-chost-byos-v20220708-x86-64
+ SLES 15 SP3 CHOST Images for Google sles-15-sp3-chost-byos-v20220718-x86-64
+ SLES 15 SP3 CHOST Images for Google sles-15-sp3-chost-byos-v20220818-x86-64
+ SLES 15 SP3 CHOST Images for Google sles-15-sp3-chost-byos-v20220916-x86-64
+ SLES 15 SP3 CHOST Images for Google sles-15-sp3-chost-byos-v20221019-x86-64
+ SLES 15 SP3 CHOST Images for Google sles-15-sp3-chost-byos-v20221118-x86-64
+ SLES 15 SP3 CHOST Images for Google sles-15-sp3-chost-byos-v20221215-x86-64
+ SLES 15 SP3 CHOST Images for Google sles-15-sp3-chost-byos-v20230313-x86-64
+ SLES 15 SP3 CHOST Images for Google sles-15-sp3-chost-byos-v20230613-x86-64
+ SLES 15 SP3 CHOST Images for Google sles-15-sp3-chost-byos-v20240807-x86-64
+ SLES 15 SP3 CHOST Images for Google sles-15-sp3-chost-byos-v20240912-x86-64
+
+
+ SLES 15 SP4 CHOST Images for Google sles-15-sp4-chost-byos-v20220718-x86-64
+ SLES 15 SP4 CHOST Images for Google sles-15-sp4-chost-byos-v20220721-x86-64
+ SLES 15 SP4 CHOST Images for Google sles-15-sp4-chost-byos-v20220818-x86-64
+ SLES 15 SP4 CHOST Images for Google sles-15-sp4-chost-byos-v20220916-x86-64
+ SLES 15 SP4 CHOST Images for Google sles-15-sp4-chost-byos-v20221018-x86-64
+ SLES 15 SP4 CHOST Images for Google sles-15-sp4-chost-byos-v20221118-x86-64
+ SLES 15 SP4 CHOST Images for Google sles-15-sp4-chost-byos-v20221215-arm64
+ SLES 15 SP4 CHOST Images for Google sles-15-sp4-chost-byos-v20221215-x86-64
+ SLES 15 SP4 CHOST Images for Google sles-15-sp4-chost-byos-v20230111-arm64
+ SLES 15 SP4 CHOST Images for Google sles-15-sp4-chost-byos-v20230111-x86-64
+ SLES 15 SP4 CHOST Images for Google sles-15-sp4-chost-byos-v20230210-arm64
+ SLES 15 SP4 CHOST Images for Google sles-15-sp4-chost-byos-v20230210-x86-64
+ SLES 15 SP4 CHOST Images for Google sles-15-sp4-chost-byos-v20230310-arm64
+ SLES 15 SP4 CHOST Images for Google sles-15-sp4-chost-byos-v20230310-x86-64
+ SLES 15 SP4 CHOST Images for Google sles-15-sp4-chost-byos-v20230410-arm64
+ SLES 15 SP4 CHOST Images for Google sles-15-sp4-chost-byos-v20230410-x86-64
+ SLES 15 SP4 CHOST Images for Google sles-15-sp4-chost-byos-v20230510-arm64
+ SLES 15 SP4 CHOST Images for Google sles-15-sp4-chost-byos-v20230510-x86-64
+ SLES 15 SP4 CHOST Images for Google sles-15-sp4-chost-byos-v20230606-arm64
+ SLES 15 SP4 CHOST Images for Google sles-15-sp4-chost-byos-v20230606-x86-64
+ SLES 15 SP4 CHOST Images for Google sles-15-sp4-chost-byos-v20230704-arm64
+ SLES 15 SP4 CHOST Images for Google sles-15-sp4-chost-byos-v20230704-x86-64
+ SLES 15 SP4 CHOST Images for Google sles-15-sp4-chost-byos-v20230804-arm64
+ SLES 15 SP4 CHOST Images for Google sles-15-sp4-chost-byos-v20230804-x86-64
+ SLES 15 SP4 CHOST Images for Google sles-15-sp4-chost-byos-v20230901-arm64
+ SLES 15 SP4 CHOST Images for Google sles-15-sp4-chost-byos-v20230901-x86-64
+ SLES 15 SP4 CHOST Images for Google sles-15-sp4-chost-byos-v20230928-arm64
+ SLES 15 SP4 CHOST Images for Google sles-15-sp4-chost-byos-v20230928-x86-64
+ SLES 15 SP4 CHOST Images for Google sles-15-sp4-chost-byos-v20231027-arm64
+ SLES 15 SP4 CHOST Images for Google sles-15-sp4-chost-byos-v20231027-x86-64
+ SLES 15 SP4 CHOST Images for Google sles-15-sp4-chost-byos-v20231127-arm64
+ SLES 15 SP4 CHOST Images for Google sles-15-sp4-chost-byos-v20231127-x86-64
+ SLES 15 SP4 CHOST Images for Google sles-15-sp4-chost-byos-v20231212-arm64
+ SLES 15 SP4 CHOST Images for Google sles-15-sp4-chost-byos-v20231212-x86-64
+ SLES 15 SP4 CHOST Images for Google sles-15-sp4-chost-byos-v20240312-arm64
+ SLES 15 SP4 CHOST Images for Google sles-15-sp4-chost-byos-v20240312-x86-64
+ SLES 15 SP4 CHOST Images for Google sles-15-sp4-chost-byos-v20240612-arm64
+ SLES 15 SP4 CHOST Images for Google sles-15-sp4-chost-byos-v20240612-x86-64
+ SLES 15 SP4 CHOST Images for Google sles-15-sp4-chost-byos-v20240809-arm64
+ SLES 15 SP4 CHOST Images for Google sles-15-sp4-chost-byos-v20240809-x86-64
+ SLES 15 SP4 CHOST Images for Google sles-15-sp4-chost-byos-v20240912-arm64
+ SLES 15 SP4 CHOST Images for Google sles-15-sp4-chost-byos-v20240912-x86-64
+
+
+ SLES 15 SP1 CHOST Images for Microsoft Azure suse-sles-15-sp1-chost-byos-v20210202
+ SLES 15 SP1 CHOST Images for Microsoft Azure suse-sles-15-sp1-chost-byos-v20210304
+ SLES 15 SP1 CHOST Images for Microsoft Azure suse-sles-15-sp1-chost-byos-v20220127
+ SLES 15 SP1 CHOST Images for Microsoft Azure suse-sles-15-sp1-chost-byos-v20220715-x86_64
+
+
+ SLES 15 SP2 CHOST Images for Microsoft Azure suse-sles-15-sp2-chost-byos-v20210202
+ SLES 15 SP2 CHOST Images for Microsoft Azure suse-sles-15-sp2-chost-byos-v20210304
+ SLES 15 SP2 CHOST Images for Microsoft Azure suse-sles-15-sp2-chost-byos-v20210405
+ SLES 15 SP2 CHOST Images for Microsoft Azure suse-sles-15-sp2-chost-byos-v20210506
+ SLES 15 SP2 CHOST Images for Microsoft Azure suse-sles-15-sp2-chost-byos-v20210610
+ SLES 15 SP2 CHOST Images for Microsoft Azure suse-sles-15-sp2-chost-byos-v20210722
+ SLES 15 SP2 CHOST Images for Microsoft Azure suse-sles-15-sp2-chost-byos-v20210913
+ SLES 15 SP2 CHOST Images for Microsoft Azure suse-sles-15-sp2-chost-byos-v20211025
+ SLES 15 SP2 CHOST Images for Microsoft Azure suse-sles-15-sp2-chost-byos-v20220126
+ SLES 15 SP2 CHOST Images for Microsoft Azure suse-sles-15-sp2-chost-byos-v20220718-x86_64
+
+
+ SLES 15 SP3 CHOST Images for Microsoft Azure suse-sles-15-sp3-chost-byos-v20210729
+ SLES 15 SP3 CHOST Images for Microsoft Azure suse-sles-15-sp3-chost-byos-v20210827
+ SLES 15 SP3 CHOST Images for Microsoft Azure suse-sles-15-sp3-chost-byos-v20210927
+ SLES 15 SP3 CHOST Images for Microsoft Azure suse-sles-15-sp3-chost-byos-v20211004
+ SLES 15 SP3 CHOST Images for Microsoft Azure suse-sles-15-sp3-chost-byos-v20211101
+ SLES 15 SP3 CHOST Images for Microsoft Azure suse-sles-15-sp3-chost-byos-v20211202
+ SLES 15 SP3 CHOST Images for Microsoft Azure suse-sles-15-sp3-chost-byos-v20220103
+ SLES 15 SP3 CHOST Images for Microsoft Azure suse-sles-15-sp3-chost-byos-v20220126
+ SLES 15 SP3 CHOST Images for Microsoft Azure suse-sles-15-sp3-chost-byos-v20220222
+ SLES 15 SP3 CHOST Images for Microsoft Azure suse-sles-15-sp3-chost-byos-v20220310
+ SLES 15 SP3 CHOST Images for Microsoft Azure suse-sles-15-sp3-chost-byos-v20220411-x86_64
+ SLES 15 SP3 CHOST Images for Microsoft Azure suse-sles-15-sp3-chost-byos-v20220510-x86_64
+ SLES 15 SP3 CHOST Images for Microsoft Azure suse-sles-15-sp3-chost-byos-v20220609-x86_64
+ SLES 15 SP3 CHOST Images for Microsoft Azure suse-sles-15-sp3-chost-byos-v20220708-x86_64
+ SLES 15 SP3 CHOST Images for Microsoft Azure suse-sles-15-sp3-chost-byos-v20220718-x86_64
+ SLES 15 SP3 CHOST Images for Microsoft Azure suse-sles-15-sp3-chost-byos-v20220818-x86_64
+ SLES 15 SP3 CHOST Images for Microsoft Azure suse-sles-15-sp3-chost-byos-v20220916-x86_64
+ SLES 15 SP3 CHOST Images for Microsoft Azure suse-sles-15-sp3-chost-byos-v20220921-x86_64
+ SLES 15 SP3 CHOST Images for Microsoft Azure suse-sles-15-sp3-chost-byos-v20221019-x86_64
+ SLES 15 SP3 CHOST Images for Microsoft Azure suse-sles-15-sp3-chost-byos-v20221119-x86_64
+ SLES 15 SP3 CHOST Images for Microsoft Azure suse-sles-15-sp3-chost-byos-v20221215-x86_64
+ SLES 15 SP3 CHOST Images for Microsoft Azure suse-sles-15-sp3-chost-byos-v20230313-x86_64
+ SLES 15 SP3 CHOST Images for Microsoft Azure suse-sles-15-sp3-chost-byos-v20230613-x86_64
+ SLES 15 SP3 CHOST Images for Microsoft Azure suse-sles-15-sp3-chost-byos-v20240807-x86_64
+ SLES 15 SP3 CHOST Images for Microsoft Azure suse-sles-15-sp3-chost-byos-v20240912-x86_64
+
+
+ SLES 15 SP4 CHOST Images for Microsoft Azure suse-sles-15-sp4-chost-byos-v20220718-x86_64
+ SLES 15 SP4 CHOST Images for Microsoft Azure suse-sles-15-sp4-chost-byos-v20220721-x86_64
+ SLES 15 SP4 CHOST Images for Microsoft Azure suse-sles-15-sp4-chost-byos-v20220819-x86_64
+ SLES 15 SP4 CHOST Images for Microsoft Azure suse-sles-15-sp4-chost-byos-v20220916-x86_64
+ SLES 15 SP4 CHOST Images for Microsoft Azure suse-sles-15-sp4-chost-byos-v20220923-x86_64
+ SLES 15 SP4 CHOST Images for Microsoft Azure suse-sles-15-sp4-chost-byos-v20221018-x86_64
+ SLES 15 SP4 CHOST Images for Microsoft Azure suse-sles-15-sp4-chost-byos-v20221118-x86_64
+ SLES 15 SP4 CHOST Images for Microsoft Azure suse-sles-15-sp4-chost-byos-v20221215-arm64
+ SLES 15 SP4 CHOST Images for Microsoft Azure suse-sles-15-sp4-chost-byos-v20221215-x86_64
+ SLES 15 SP4 CHOST Images for Microsoft Azure suse-sles-15-sp4-chost-byos-v20230111-arm64
+ SLES 15 SP4 CHOST Images for Microsoft Azure suse-sles-15-sp4-chost-byos-v20230111-x86_64
+ SLES 15 SP4 CHOST Images for Microsoft Azure suse-sles-15-sp4-chost-byos-v20230210-arm64
+ SLES 15 SP4 CHOST Images for Microsoft Azure suse-sles-15-sp4-chost-byos-v20230210-x86_64
+ SLES 15 SP4 CHOST Images for Microsoft Azure suse-sles-15-sp4-chost-byos-v20230310-arm64
+ SLES 15 SP4 CHOST Images for Microsoft Azure suse-sles-15-sp4-chost-byos-v20230310-x86_64
+ SLES 15 SP4 CHOST Images for Microsoft Azure suse-sles-15-sp4-chost-byos-v20230410-arm64
+ SLES 15 SP4 CHOST Images for Microsoft Azure suse-sles-15-sp4-chost-byos-v20230410-x86_64
+ SLES 15 SP4 CHOST Images for Microsoft Azure suse-sles-15-sp4-chost-byos-v20230510-arm64
+ SLES 15 SP4 CHOST Images for Microsoft Azure suse-sles-15-sp4-chost-byos-v20230510-x86_64
+ SLES 15 SP4 CHOST Images for Microsoft Azure suse-sles-15-sp4-chost-byos-v20230606-arm64
+ SLES 15 SP4 CHOST Images for Microsoft Azure suse-sles-15-sp4-chost-byos-v20230606-x86_64
+ SLES 15 SP4 CHOST Images for Microsoft Azure suse-sles-15-sp4-chost-byos-v20230704-arm64
+ SLES 15 SP4 CHOST Images for Microsoft Azure suse-sles-15-sp4-chost-byos-v20230704-x86_64
+ SLES 15 SP4 CHOST Images for Microsoft Azure suse-sles-15-sp4-chost-byos-v20230803-arm64
+ SLES 15 SP4 CHOST Images for Microsoft Azure suse-sles-15-sp4-chost-byos-v20230803-x86_64
+ SLES 15 SP4 CHOST Images for Microsoft Azure suse-sles-15-sp4-chost-byos-v20230901-arm64
+ SLES 15 SP4 CHOST Images for Microsoft Azure suse-sles-15-sp4-chost-byos-v20230901-x86_64
+ SLES 15 SP4 CHOST Images for Microsoft Azure suse-sles-15-sp4-chost-byos-v20230928-arm64
+ SLES 15 SP4 CHOST Images for Microsoft Azure suse-sles-15-sp4-chost-byos-v20230928-x86_64
+ SLES 15 SP4 CHOST Images for Microsoft Azure suse-sles-15-sp4-chost-byos-v20231027-arm64
+ SLES 15 SP4 CHOST Images for Microsoft Azure suse-sles-15-sp4-chost-byos-v20231027-x86_64
+ SLES 15 SP4 CHOST Images for Microsoft Azure suse-sles-15-sp4-chost-byos-v20231127-arm64
+ SLES 15 SP4 CHOST Images for Microsoft Azure suse-sles-15-sp4-chost-byos-v20231127-x86_64
+ SLES 15 SP4 CHOST Images for Microsoft Azure suse-sles-15-sp4-chost-byos-v20231212-arm64
+ SLES 15 SP4 CHOST Images for Microsoft Azure suse-sles-15-sp4-chost-byos-v20231212-x86_64
+ SLES 15 SP4 CHOST Images for Microsoft Azure suse-sles-15-sp4-chost-byos-v20240312-arm64
+ SLES 15 SP4 CHOST Images for Microsoft Azure suse-sles-15-sp4-chost-byos-v20240312-x86_64
+ SLES 15 SP4 CHOST Images for Microsoft Azure suse-sles-15-sp4-chost-byos-v20240612-arm64
+ SLES 15 SP4 CHOST Images for Microsoft Azure suse-sles-15-sp4-chost-byos-v20240612-x86_64
+ SLES 15 SP4 CHOST Images for Microsoft Azure suse-sles-15-sp4-chost-byos-v20240809-arm64
+ SLES 15 SP4 CHOST Images for Microsoft Azure suse-sles-15-sp4-chost-byos-v20240809-x86_64
+ SLES 15 SP4 CHOST Images for Microsoft Azure suse-sles-15-sp4-chost-byos-v20240912-arm64
+ SLES 15 SP4 CHOST Images for Microsoft Azure suse-sles-15-sp4-chost-byos-v20240912-x86_64
+
+
bpftool-4.18.0-553.16.1.el8_10
@@ -640,6 +902,39 @@
ocfs2-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-Azure-SAP-BYOS
+
+ kernel-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-BYOS
+
+
+ cluster-md-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ dlm-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ gfs2-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ kernel-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ ocfs2-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ cluster-md-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
+
+ dlm-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
+
+ gfs2-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
+
+ kernel-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
+
+ ocfs2-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
bpftool-4.18.0-553.16.1.el8_10 as a component of SUSE Liberty Linux 8
@@ -1531,6 +1826,17 @@
Image SLES12-SP5-Azure-SAP-BYOS:gfs2-kmp-default-4.12.14-122.228.1
Image SLES12-SP5-Azure-SAP-BYOS:kernel-default-4.12.14-122.228.1
Image SLES12-SP5-Azure-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.228.1
+ Image SLES12-SP5-GCE-BYOS:kernel-default-4.12.14-122.228.1
+ Image SLES12-SP5-GCE-SAP-BYOS:cluster-md-kmp-default-4.12.14-122.228.1
+ Image SLES12-SP5-GCE-SAP-BYOS:dlm-kmp-default-4.12.14-122.228.1
+ Image SLES12-SP5-GCE-SAP-BYOS:gfs2-kmp-default-4.12.14-122.228.1
+ Image SLES12-SP5-GCE-SAP-BYOS:kernel-default-4.12.14-122.228.1
+ Image SLES12-SP5-GCE-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.228.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:cluster-md-kmp-default-4.12.14-122.228.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:dlm-kmp-default-4.12.14-122.228.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:gfs2-kmp-default-4.12.14-122.228.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:kernel-default-4.12.14-122.228.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:ocfs2-kmp-default-4.12.14-122.228.1
SUSE Liberty Linux 8:bpftool-4.18.0-553.16.1.el8_10
SUSE Liberty Linux 8:kernel-4.18.0-553.16.1.el8_10
SUSE Liberty Linux 8:kernel-abi-stablelists-4.18.0-553.16.1.el8_10
@@ -1736,6 +2042,229 @@
openSUSE Leap 15.6:ocfs2-kmp-default
openSUSE Leap 15.6:reiserfs-kmp-default
+
+ chost:amazon/suse-sles-15-sp1-chost-byos-v20210304-hvm-ssd-x86_64
+ chost:amazon/suse-sles-15-sp1-chost-byos-v20220127-hvm-ssd-x86_64
+ chost:amazon/suse-sles-15-sp1-chost-byos-v20220715-hvm-ssd-x86_64
+ chost:amazon/suse-sles-15-sp2-chost-byos-v20210610-hvm-ssd-x86_64
+ chost:amazon/suse-sles-15-sp2-chost-byos-v20210722-hvm-ssd-x86_64
+ chost:amazon/suse-sles-15-sp2-chost-byos-v20210913-hvm-ssd-x86_64
+ chost:amazon/suse-sles-15-sp2-chost-byos-v20211025-hvm-ssd-x86_64
+ chost:amazon/suse-sles-15-sp2-chost-byos-v20220126-hvm-ssd-x86_64
+ chost:amazon/suse-sles-15-sp2-chost-byos-v20220718-hvm-ssd-x86_64
+ chost:amazon/suse-sles-15-sp3-chost-byos-v20210729-hvm-ssd-x86_64
+ chost:amazon/suse-sles-15-sp3-chost-byos-v20210827-hvm-ssd-x86_64
+ chost:amazon/suse-sles-15-sp3-chost-byos-v20210927-hvm-ssd-x86_64
+ chost:amazon/suse-sles-15-sp3-chost-byos-v20211004-hvm-ssd-x86_64
+ chost:amazon/suse-sles-15-sp3-chost-byos-v20211101-hvm-ssd-x86_64
+ chost:amazon/suse-sles-15-sp3-chost-byos-v20211202-hvm-ssd-x86_64
+ chost:amazon/suse-sles-15-sp3-chost-byos-v20220103-hvm-ssd-x86_64
+ chost:amazon/suse-sles-15-sp3-chost-byos-v20220126-hvm-ssd-x86_64
+ chost:amazon/suse-sles-15-sp3-chost-byos-v20220222-hvm-ssd-x86_64
+ chost:amazon/suse-sles-15-sp3-chost-byos-v20220310-hvm-ssd-x86_64
+ chost:amazon/suse-sles-15-sp3-chost-byos-v20220411-hvm-ssd-x86_64
+ chost:amazon/suse-sles-15-sp3-chost-byos-v20220510-hvm-ssd-x86_64
+ chost:amazon/suse-sles-15-sp3-chost-byos-v20220608-hvm-ssd-x86_64
+ chost:amazon/suse-sles-15-sp3-chost-byos-v20220708-hvm-ssd-x86_64
+ chost:amazon/suse-sles-15-sp3-chost-byos-v20220718-hvm-ssd-x86_64
+ chost:amazon/suse-sles-15-sp3-chost-byos-v20220818-hvm-ssd-x86_64
+ chost:amazon/suse-sles-15-sp3-chost-byos-v20220916-hvm-ssd-x86_64
+ chost:amazon/suse-sles-15-sp3-chost-byos-v20220921-hvm-ssd-x86_64
+ chost:amazon/suse-sles-15-sp3-chost-byos-v20221019-hvm-ssd-x86_64
+ chost:amazon/suse-sles-15-sp3-chost-byos-v20221119-hvm-ssd-x86_64
+ chost:amazon/suse-sles-15-sp3-chost-byos-v20221215-hvm-ssd-x86_64
+ chost:amazon/suse-sles-15-sp3-chost-byos-v20230313-hvm-ssd-x86_64
+ chost:amazon/suse-sles-15-sp3-chost-byos-v20230613-hvm-ssd-x86_64
+ chost:amazon/suse-sles-15-sp3-chost-byos-v20240807-hvm-ssd-x86_64
+ chost:amazon/suse-sles-15-sp3-chost-byos-v20240912-hvm-ssd-x86_64
+ chost:amazon/suse-sles-15-sp4-chost-byos-v20220718-hvm-ssd-x86_64
+ chost:amazon/suse-sles-15-sp4-chost-byos-v20220721-hvm-ssd-x86_64
+ chost:amazon/suse-sles-15-sp4-chost-byos-v20220819-hvm-ssd-x86_64
+ chost:amazon/suse-sles-15-sp4-chost-byos-v20220916-hvm-ssd-x86_64
+ chost:amazon/suse-sles-15-sp4-chost-byos-v20220923-hvm-ssd-x86_64
+ chost:amazon/suse-sles-15-sp4-chost-byos-v20221018-hvm-ssd-x86_64
+ chost:amazon/suse-sles-15-sp4-chost-byos-v20221118-hvm-ssd-x86_64
+ chost:amazon/suse-sles-15-sp4-chost-byos-v20221215-hvm-ssd-x86_64
+ chost:amazon/suse-sles-15-sp4-chost-byos-v20230111-hvm-ssd-x86_64
+ chost:amazon/suse-sles-15-sp4-chost-byos-v20230210-hvm-ssd-x86_64
+ chost:amazon/suse-sles-15-sp4-chost-byos-v20230310-hvm-ssd-x86_64
+ chost:amazon/suse-sles-15-sp4-chost-byos-v20230410-hvm-ssd-x86_64
+ chost:amazon/suse-sles-15-sp4-chost-byos-v20230510-hvm-ssd-x86_64
+ chost:amazon/suse-sles-15-sp4-chost-byos-v20230606-hvm-ssd-x86_64
+ chost:amazon/suse-sles-15-sp4-chost-byos-v20230704-hvm-ssd-x86_64
+ chost:amazon/suse-sles-15-sp4-chost-byos-v20230803-hvm-ssd-x86_64
+ chost:amazon/suse-sles-15-sp4-chost-byos-v20230901-hvm-ssd-x86_64
+ chost:amazon/suse-sles-15-sp4-chost-byos-v20230928-hvm-ssd-x86_64
+ chost:amazon/suse-sles-15-sp4-chost-byos-v20231027-hvm-ssd-x86_64
+ chost:amazon/suse-sles-15-sp4-chost-byos-v20231127-hvm-ssd-x86_64
+ chost:amazon/suse-sles-15-sp4-chost-byos-v20231212-hvm-ssd-x86_64
+ chost:amazon/suse-sles-15-sp4-chost-byos-v20240312-hvm-ssd-x86_64
+ chost:amazon/suse-sles-15-sp4-chost-byos-v20240612-hvm-ssd-x86_64
+ chost:amazon/suse-sles-15-sp4-chost-byos-v20240809-hvm-ssd-x86_64
+ chost:amazon/suse-sles-15-sp4-chost-byos-v20240912-hvm-ssd-x86_64
+ chost:google/sles-15-sp1-chost-byos-v20210202
+ chost:google/sles-15-sp1-chost-byos-v20210304
+ chost:google/sles-15-sp1-chost-byos-v20220127
+ chost:google/sles-15-sp1-chost-byos-v20220715-x86-64
+ chost:google/sles-15-sp2-chost-byos-v20210202
+ chost:google/sles-15-sp2-chost-byos-v20210304
+ chost:google/sles-15-sp2-chost-byos-v20210405
+ chost:google/sles-15-sp2-chost-byos-v20210506
+ chost:google/sles-15-sp2-chost-byos-v20210610
+ chost:google/sles-15-sp2-chost-byos-v20210722
+ chost:google/sles-15-sp2-chost-byos-v20210913
+ chost:google/sles-15-sp2-chost-byos-v20211025
+ chost:google/sles-15-sp2-chost-byos-v20220126
+ chost:google/sles-15-sp2-chost-byos-v20220718-x86-64
+ chost:google/sles-15-sp3-chost-byos-v20210729
+ chost:google/sles-15-sp3-chost-byos-v20210827
+ chost:google/sles-15-sp3-chost-byos-v20210927
+ chost:google/sles-15-sp3-chost-byos-v20211004
+ chost:google/sles-15-sp3-chost-byos-v20211101
+ chost:google/sles-15-sp3-chost-byos-v20211202
+ chost:google/sles-15-sp3-chost-byos-v20220103
+ chost:google/sles-15-sp3-chost-byos-v20220126
+ chost:google/sles-15-sp3-chost-byos-v20220222
+ chost:google/sles-15-sp3-chost-byos-v20220310
+ chost:google/sles-15-sp3-chost-byos-v20220411-x86-64
+ chost:google/sles-15-sp3-chost-byos-v20220510-x86-64
+ chost:google/sles-15-sp3-chost-byos-v20220608-x86-64
+ chost:google/sles-15-sp3-chost-byos-v20220708-x86-64
+ chost:google/sles-15-sp3-chost-byos-v20220718-x86-64
+ chost:google/sles-15-sp3-chost-byos-v20220818-x86-64
+ chost:google/sles-15-sp3-chost-byos-v20220916-x86-64
+ chost:google/sles-15-sp3-chost-byos-v20221019-x86-64
+ chost:google/sles-15-sp3-chost-byos-v20221118-x86-64
+ chost:google/sles-15-sp3-chost-byos-v20221215-x86-64
+ chost:google/sles-15-sp3-chost-byos-v20230313-x86-64
+ chost:google/sles-15-sp3-chost-byos-v20230613-x86-64
+ chost:google/sles-15-sp3-chost-byos-v20240807-x86-64
+ chost:google/sles-15-sp3-chost-byos-v20240912-x86-64
+ chost:google/sles-15-sp4-chost-byos-v20220718-x86-64
+ chost:google/sles-15-sp4-chost-byos-v20220721-x86-64
+ chost:google/sles-15-sp4-chost-byos-v20220818-x86-64
+ chost:google/sles-15-sp4-chost-byos-v20220916-x86-64
+ chost:google/sles-15-sp4-chost-byos-v20221018-x86-64
+ chost:google/sles-15-sp4-chost-byos-v20221118-x86-64
+ chost:google/sles-15-sp4-chost-byos-v20221215-arm64
+ chost:google/sles-15-sp4-chost-byos-v20221215-x86-64
+ chost:google/sles-15-sp4-chost-byos-v20230111-arm64
+ chost:google/sles-15-sp4-chost-byos-v20230111-x86-64
+ chost:google/sles-15-sp4-chost-byos-v20230210-arm64
+ chost:google/sles-15-sp4-chost-byos-v20230210-x86-64
+ chost:google/sles-15-sp4-chost-byos-v20230310-arm64
+ chost:google/sles-15-sp4-chost-byos-v20230310-x86-64
+ chost:google/sles-15-sp4-chost-byos-v20230410-arm64
+ chost:google/sles-15-sp4-chost-byos-v20230410-x86-64
+ chost:google/sles-15-sp4-chost-byos-v20230510-arm64
+ chost:google/sles-15-sp4-chost-byos-v20230510-x86-64
+ chost:google/sles-15-sp4-chost-byos-v20230606-arm64
+ chost:google/sles-15-sp4-chost-byos-v20230606-x86-64
+ chost:google/sles-15-sp4-chost-byos-v20230704-arm64
+ chost:google/sles-15-sp4-chost-byos-v20230704-x86-64
+ chost:google/sles-15-sp4-chost-byos-v20230804-arm64
+ chost:google/sles-15-sp4-chost-byos-v20230804-x86-64
+ chost:google/sles-15-sp4-chost-byos-v20230901-arm64
+ chost:google/sles-15-sp4-chost-byos-v20230901-x86-64
+ chost:google/sles-15-sp4-chost-byos-v20230928-arm64
+ chost:google/sles-15-sp4-chost-byos-v20230928-x86-64
+ chost:google/sles-15-sp4-chost-byos-v20231027-arm64
+ chost:google/sles-15-sp4-chost-byos-v20231027-x86-64
+ chost:google/sles-15-sp4-chost-byos-v20231127-arm64
+ chost:google/sles-15-sp4-chost-byos-v20231127-x86-64
+ chost:google/sles-15-sp4-chost-byos-v20231212-arm64
+ chost:google/sles-15-sp4-chost-byos-v20231212-x86-64
+ chost:google/sles-15-sp4-chost-byos-v20240312-arm64
+ chost:google/sles-15-sp4-chost-byos-v20240312-x86-64
+ chost:google/sles-15-sp4-chost-byos-v20240612-arm64
+ chost:google/sles-15-sp4-chost-byos-v20240612-x86-64
+ chost:google/sles-15-sp4-chost-byos-v20240809-arm64
+ chost:google/sles-15-sp4-chost-byos-v20240809-x86-64
+ chost:google/sles-15-sp4-chost-byos-v20240912-arm64
+ chost:google/sles-15-sp4-chost-byos-v20240912-x86-64
+ chost:microsoft/suse-sles-15-sp1-chost-byos-v20210202
+ chost:microsoft/suse-sles-15-sp1-chost-byos-v20210304
+ chost:microsoft/suse-sles-15-sp1-chost-byos-v20220127
+ chost:microsoft/suse-sles-15-sp1-chost-byos-v20220715-x86_64
+ chost:microsoft/suse-sles-15-sp2-chost-byos-v20210202
+ chost:microsoft/suse-sles-15-sp2-chost-byos-v20210304
+ chost:microsoft/suse-sles-15-sp2-chost-byos-v20210405
+ chost:microsoft/suse-sles-15-sp2-chost-byos-v20210506
+ chost:microsoft/suse-sles-15-sp2-chost-byos-v20210610
+ chost:microsoft/suse-sles-15-sp2-chost-byos-v20210722
+ chost:microsoft/suse-sles-15-sp2-chost-byos-v20210913
+ chost:microsoft/suse-sles-15-sp2-chost-byos-v20211025
+ chost:microsoft/suse-sles-15-sp2-chost-byos-v20220126
+ chost:microsoft/suse-sles-15-sp2-chost-byos-v20220718-x86_64
+ chost:microsoft/suse-sles-15-sp3-chost-byos-v20210729
+ chost:microsoft/suse-sles-15-sp3-chost-byos-v20210827
+ chost:microsoft/suse-sles-15-sp3-chost-byos-v20210927
+ chost:microsoft/suse-sles-15-sp3-chost-byos-v20211004
+ chost:microsoft/suse-sles-15-sp3-chost-byos-v20211101
+ chost:microsoft/suse-sles-15-sp3-chost-byos-v20211202
+ chost:microsoft/suse-sles-15-sp3-chost-byos-v20220103
+ chost:microsoft/suse-sles-15-sp3-chost-byos-v20220126
+ chost:microsoft/suse-sles-15-sp3-chost-byos-v20220222
+ chost:microsoft/suse-sles-15-sp3-chost-byos-v20220310
+ chost:microsoft/suse-sles-15-sp3-chost-byos-v20220411-x86_64
+ chost:microsoft/suse-sles-15-sp3-chost-byos-v20220510-x86_64
+ chost:microsoft/suse-sles-15-sp3-chost-byos-v20220609-x86_64
+ chost:microsoft/suse-sles-15-sp3-chost-byos-v20220708-x86_64
+ chost:microsoft/suse-sles-15-sp3-chost-byos-v20220718-x86_64
+ chost:microsoft/suse-sles-15-sp3-chost-byos-v20220818-x86_64
+ chost:microsoft/suse-sles-15-sp3-chost-byos-v20220916-x86_64
+ chost:microsoft/suse-sles-15-sp3-chost-byos-v20220921-x86_64
+ chost:microsoft/suse-sles-15-sp3-chost-byos-v20221019-x86_64
+ chost:microsoft/suse-sles-15-sp3-chost-byos-v20221119-x86_64
+ chost:microsoft/suse-sles-15-sp3-chost-byos-v20221215-x86_64
+ chost:microsoft/suse-sles-15-sp3-chost-byos-v20230313-x86_64
+ chost:microsoft/suse-sles-15-sp3-chost-byos-v20230613-x86_64
+ chost:microsoft/suse-sles-15-sp3-chost-byos-v20240807-x86_64
+ chost:microsoft/suse-sles-15-sp3-chost-byos-v20240912-x86_64
+ chost:microsoft/suse-sles-15-sp4-chost-byos-v20220718-x86_64
+ chost:microsoft/suse-sles-15-sp4-chost-byos-v20220721-x86_64
+ chost:microsoft/suse-sles-15-sp4-chost-byos-v20220819-x86_64
+ chost:microsoft/suse-sles-15-sp4-chost-byos-v20220916-x86_64
+ chost:microsoft/suse-sles-15-sp4-chost-byos-v20220923-x86_64
+ chost:microsoft/suse-sles-15-sp4-chost-byos-v20221018-x86_64
+ chost:microsoft/suse-sles-15-sp4-chost-byos-v20221118-x86_64
+ chost:microsoft/suse-sles-15-sp4-chost-byos-v20221215-arm64
+ chost:microsoft/suse-sles-15-sp4-chost-byos-v20221215-x86_64
+ chost:microsoft/suse-sles-15-sp4-chost-byos-v20230111-arm64
+ chost:microsoft/suse-sles-15-sp4-chost-byos-v20230111-x86_64
+ chost:microsoft/suse-sles-15-sp4-chost-byos-v20230210-arm64
+ chost:microsoft/suse-sles-15-sp4-chost-byos-v20230210-x86_64
+ chost:microsoft/suse-sles-15-sp4-chost-byos-v20230310-arm64
+ chost:microsoft/suse-sles-15-sp4-chost-byos-v20230310-x86_64
+ chost:microsoft/suse-sles-15-sp4-chost-byos-v20230410-arm64
+ chost:microsoft/suse-sles-15-sp4-chost-byos-v20230410-x86_64
+ chost:microsoft/suse-sles-15-sp4-chost-byos-v20230510-arm64
+ chost:microsoft/suse-sles-15-sp4-chost-byos-v20230510-x86_64
+ chost:microsoft/suse-sles-15-sp4-chost-byos-v20230606-arm64
+ chost:microsoft/suse-sles-15-sp4-chost-byos-v20230606-x86_64
+ chost:microsoft/suse-sles-15-sp4-chost-byos-v20230704-arm64
+ chost:microsoft/suse-sles-15-sp4-chost-byos-v20230704-x86_64
+ chost:microsoft/suse-sles-15-sp4-chost-byos-v20230803-arm64
+ chost:microsoft/suse-sles-15-sp4-chost-byos-v20230803-x86_64
+ chost:microsoft/suse-sles-15-sp4-chost-byos-v20230901-arm64
+ chost:microsoft/suse-sles-15-sp4-chost-byos-v20230901-x86_64
+ chost:microsoft/suse-sles-15-sp4-chost-byos-v20230928-arm64
+ chost:microsoft/suse-sles-15-sp4-chost-byos-v20230928-x86_64
+ chost:microsoft/suse-sles-15-sp4-chost-byos-v20231027-arm64
+ chost:microsoft/suse-sles-15-sp4-chost-byos-v20231027-x86_64
+ chost:microsoft/suse-sles-15-sp4-chost-byos-v20231127-arm64
+ chost:microsoft/suse-sles-15-sp4-chost-byos-v20231127-x86_64
+ chost:microsoft/suse-sles-15-sp4-chost-byos-v20231212-arm64
+ chost:microsoft/suse-sles-15-sp4-chost-byos-v20231212-x86_64
+ chost:microsoft/suse-sles-15-sp4-chost-byos-v20240312-arm64
+ chost:microsoft/suse-sles-15-sp4-chost-byos-v20240312-x86_64
+ chost:microsoft/suse-sles-15-sp4-chost-byos-v20240612-arm64
+ chost:microsoft/suse-sles-15-sp4-chost-byos-v20240612-x86_64
+ chost:microsoft/suse-sles-15-sp4-chost-byos-v20240809-arm64
+ chost:microsoft/suse-sles-15-sp4-chost-byos-v20240809-x86_64
+ chost:microsoft/suse-sles-15-sp4-chost-byos-v20240912-arm64
+ chost:microsoft/suse-sles-15-sp4-chost-byos-v20240912-x86_64
+
skipping CVE-2021-47255 as CVE page is older than CVRF-CVE file.
skipping CVE-2021-47254 as CVE page is older than CVRF-CVE file.
skipping CVE-2021-47253 as CVE page is older than CVRF-CVE file.
skipping CVE-2021-47252 as CVE page is older than CVRF-CVE file.
skipping CVE-2021-47251 as CVE page is older than CVRF-CVE file.
skipping CVE-2021-47248 as CVE page is older than CVRF-CVE file.
skipping CVE-2021-47247 as CVE page is older than CVRF-CVE file.
skipping CVE-2021-47246 as CVE page is older than CVRF-CVE file.
skipping CVE-2021-47245 as CVE page is older than CVRF-CVE file.
skipping CVE-2021-47244 as CVE page is older than CVRF-CVE file.
skipping CVE-2021-47243 as CVE page is older than CVRF-CVE file.
skipping CVE-2021-47242 as CVE page is older than CVRF-CVE file.
skipping CVE-2021-47241 as CVE page is older than CVRF-CVE file.
skipping CVE-2021-47240 as CVE page is older than CVRF-CVE file.
skipping CVE-2021-47239 as CVE page is older than CVRF-CVE file.
no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2021-47219
skipping CVE-2021-47237 as CVE page is older than CVRF-CVE file.
skipping CVE-2021-47236 as CVE page is older than CVRF-CVE file.
skipping CVE-2021-47235 as CVE page is older than CVRF-CVE file.
skipping CVE-2021-47234 as CVE page is older than CVRF-CVE file.
skipping CVE-2021-47233 as CVE page is older than CVRF-CVE file.
skipping CVE-2021-47232 as CVE page is older than CVRF-CVE file.
skipping CVE-2021-47231 as CVE page is older than CVRF-CVE file.
skipping CVE-2021-47230 as CVE page is older than CVRF-CVE file.
skipping CVE-2021-47229 as CVE page is older than CVRF-CVE file.
skipping CVE-2021-47228 as CVE page is older than CVRF-CVE file.
skipping CVE-2021-47227 as CVE page is older than CVRF-CVE file.
skipping CVE-2021-47226 as CVE page is older than CVRF-CVE file.
skipping CVE-2021-47225 as CVE page is older than CVRF-CVE file.
skipping CVE-2021-47224 as CVE page is older than CVRF-CVE file.
skipping CVE-2021-47223 as CVE page is older than CVRF-CVE file.
skipping CVE-2021-47222 as CVE page is older than CVRF-CVE file.
skipping CVE-2021-47221 as CVE page is older than CVRF-CVE file.
skipping CVE-2021-47220 as CVE page is older than CVRF-CVE file.
--- /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2021-47219.xml 2024-10-22 03:18:22.911357000 +0200
+++ /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2021-47219.xml.new 2024-10-29 01:51:03.515893000 +0100
@@ -14,13 +14,13 @@
1
- 51
- 2024-10-22T01:18:21Z
+ 52
+ 2024-10-29T00:51:02Z
current
2024-04-16T23:37:43Z
- 2024-10-22T01:18:21Z
+ 2024-10-29T00:51:02Z
cve-database/bin/generate-cvrf-cve.pl
2020-12-27T01:00:00Z
@@ -174,6 +174,21 @@
Image SLES12-SP5-EC2-BYOS
+
+
+ Image SLES12-SP5-GCE-BYOS
+
+
+
+
+ Image SLES12-SP5-GCE-SAP-BYOS
+
+
+
+
+ Image SLES12-SP5-GCE-SAP-On-Demand
+
+
Image SLES12-SP5-SAP-Azure-LI-BYOS-Production
@@ -2316,6 +2331,39 @@
kernel-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-EC2-BYOS
+
+ kernel-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-BYOS
+
+
+ cluster-md-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ dlm-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ gfs2-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ kernel-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ ocfs2-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ cluster-md-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
+
+ dlm-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
+
+ gfs2-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
+
+ kernel-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
+
+ ocfs2-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
cluster-md-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-SAP-Azure-LI-BYOS-Production
@@ -4768,6 +4816,17 @@
Image SLES12-SP5-Azure-SAP-BYOS:kernel-default-4.12.14-122.225.1
Image SLES12-SP5-Azure-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.225.1
Image SLES12-SP5-EC2-BYOS:kernel-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-BYOS:kernel-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-BYOS:cluster-md-kmp-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-BYOS:dlm-kmp-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-BYOS:gfs2-kmp-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-BYOS:kernel-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:cluster-md-kmp-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:dlm-kmp-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:gfs2-kmp-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:kernel-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:ocfs2-kmp-default-4.12.14-122.225.1
Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:cluster-md-kmp-default-4.12.14-122.225.1
Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:dlm-kmp-default-4.12.14-122.225.1
Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:gfs2-kmp-default-4.12.14-122.225.1
skipping CVE-2021-47218 as CVE page is older than CVRF-CVE file.
skipping CVE-2021-47217 as CVE page is older than CVRF-CVE file.
skipping CVE-2021-47216 as CVE page is older than CVRF-CVE file.
skipping CVE-2021-47215 as CVE page is older than CVRF-CVE file.
skipping CVE-2021-47214 as CVE page is older than CVRF-CVE file.
no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2021-47197
skipping CVE-2021-47212 as CVE page is older than CVRF-CVE file.
skipping CVE-2021-47211 as CVE page is older than CVRF-CVE file.
skipping CVE-2021-47210 as CVE page is older than CVRF-CVE file.
skipping CVE-2021-47209 as CVE page is older than CVRF-CVE file.
skipping CVE-2021-47207 as CVE page is older than CVRF-CVE file.
skipping CVE-2021-47206 as CVE page is older than CVRF-CVE file.
skipping CVE-2021-47205 as CVE page is older than CVRF-CVE file.
skipping CVE-2021-47204 as CVE page is older than CVRF-CVE file.
skipping CVE-2021-47203 as CVE page is older than CVRF-CVE file.
skipping CVE-2021-47202 as CVE page is older than CVRF-CVE file.
skipping CVE-2021-47201 as CVE page is older than CVRF-CVE file.
skipping CVE-2021-47200 as CVE page is older than CVRF-CVE file.
skipping CVE-2021-47199 as CVE page is older than CVRF-CVE file.
skipping CVE-2021-47198 as CVE page is older than CVRF-CVE file.
--- /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2021-47197.xml 2024-10-22 03:18:48.795518000 +0200
+++ /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2021-47197.xml.new 2024-10-29 01:51:04.597880000 +0100
@@ -14,13 +14,13 @@
1
- 44
- 2024-10-22T01:18:47Z
+ 45
+ 2024-10-29T00:51:04Z
current
2024-04-16T23:37:47Z
- 2024-10-22T01:18:47Z
+ 2024-10-29T00:51:04Z
cve-database/bin/generate-cvrf-cve.pl
2020-12-27T01:00:00Z
@@ -157,6 +157,21 @@
Image SLES12-SP5-EC2-BYOS
+
+
+ Image SLES12-SP5-GCE-BYOS
+
+
+
+
+ Image SLES12-SP5-GCE-SAP-BYOS
+
+
+
+
+ Image SLES12-SP5-GCE-SAP-On-Demand
+
+
Image SLES12-SP5-SAP-Azure-LI-BYOS-Production
@@ -2001,6 +2016,39 @@
kernel-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-EC2-BYOS
+
+ kernel-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-BYOS
+
+
+ cluster-md-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ dlm-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ gfs2-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ kernel-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ ocfs2-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ cluster-md-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
+
+ dlm-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
+
+ gfs2-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
+
+ kernel-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
+
+ ocfs2-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
cluster-md-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-SAP-Azure-LI-BYOS-Production
@@ -4024,6 +4072,17 @@
Image SLES12-SP5-Azure-SAP-BYOS:kernel-default-4.12.14-122.225.1
Image SLES12-SP5-Azure-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.225.1
Image SLES12-SP5-EC2-BYOS:kernel-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-BYOS:kernel-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-BYOS:cluster-md-kmp-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-BYOS:dlm-kmp-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-BYOS:gfs2-kmp-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-BYOS:kernel-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:cluster-md-kmp-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:dlm-kmp-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:gfs2-kmp-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:kernel-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:ocfs2-kmp-default-4.12.14-122.225.1
Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:cluster-md-kmp-default-4.12.14-122.225.1
Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:dlm-kmp-default-4.12.14-122.225.1
Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:gfs2-kmp-default-4.12.14-122.225.1
no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2021-47194
skipping CVE-2021-47196 as CVE page is older than CVRF-CVE file.
skipping CVE-2021-47195 as CVE page is older than CVRF-CVE file.
--- /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2021-47194.xml 2024-10-22 03:18:52.339301000 +0200
+++ /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2021-47194.xml.new 2024-10-29 01:51:05.824780000 +0100
@@ -14,13 +14,13 @@
1
- 51
- 2024-10-22T01:18:51Z
+ 52
+ 2024-10-29T00:51:04Z
current
2024-04-16T23:37:48Z
- 2024-10-22T01:18:51Z
+ 2024-10-29T00:51:04Z
cve-database/bin/generate-cvrf-cve.pl
2020-12-27T01:00:00Z
@@ -136,6 +136,21 @@
Image SLES12-SP5-EC2-BYOS
+
+
+ Image SLES12-SP5-GCE-BYOS
+
+
+
+
+ Image SLES12-SP5-GCE-SAP-BYOS
+
+
+
+
+ Image SLES12-SP5-GCE-SAP-On-Demand
+
+
Image SLES12-SP5-SAP-Azure-LI-BYOS-Production
@@ -2324,6 +2339,39 @@
kernel-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-EC2-BYOS
+
+ kernel-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-BYOS
+
+
+ cluster-md-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ dlm-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ gfs2-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ kernel-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ ocfs2-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ cluster-md-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
+
+ dlm-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
+
+ gfs2-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
+
+ kernel-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
+
+ ocfs2-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
cluster-md-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-SAP-Azure-LI-BYOS-Production
@@ -4754,6 +4802,17 @@
Image SLES12-SP5-Azure-SAP-BYOS:kernel-default-4.12.14-122.225.1
Image SLES12-SP5-Azure-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.225.1
Image SLES12-SP5-EC2-BYOS:kernel-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-BYOS:kernel-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-BYOS:cluster-md-kmp-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-BYOS:dlm-kmp-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-BYOS:gfs2-kmp-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-BYOS:kernel-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:cluster-md-kmp-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:dlm-kmp-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:gfs2-kmp-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:kernel-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:ocfs2-kmp-default-4.12.14-122.225.1
Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:cluster-md-kmp-default-4.12.14-122.225.1
Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:dlm-kmp-default-4.12.14-122.225.1
Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:gfs2-kmp-default-4.12.14-122.225.1
no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2021-47191
skipping CVE-2021-47193 as CVE page is older than CVRF-CVE file.
skipping CVE-2021-47192 as CVE page is older than CVRF-CVE file.
--- /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2021-47191.xml 2024-10-22 03:18:56.521598000 +0200
+++ /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2021-47191.xml.new 2024-10-29 01:51:06.540768000 +0100
@@ -14,13 +14,13 @@
1
- 55
- 2024-10-22T01:18:55Z
+ 56
+ 2024-10-29T00:51:06Z
current
2024-04-16T23:37:49Z
- 2024-10-22T01:18:55Z
+ 2024-10-29T00:51:06Z
cve-database/bin/generate-cvrf-cve.pl
2020-12-27T01:00:00Z
@@ -2147,41 +2147,41 @@
ocfs2-kmp-default-4.12.14-122.222.1 as a component of Image SLES12-SP5-EC2-SAP-On-Demand
-
- kernel-default-4.12.14-122.222.1 as a component of Image SLES12-SP5-GCE-BYOS
+
+ kernel-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-BYOS
kernel-default-4.12.14-122.222.1 as a component of Image SLES12-SP5-GCE-On-Demand
-
- cluster-md-kmp-default-4.12.14-122.222.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+ cluster-md-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
-
- dlm-kmp-default-4.12.14-122.222.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+ dlm-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
-
- gfs2-kmp-default-4.12.14-122.222.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+ gfs2-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
-
- kernel-default-4.12.14-122.222.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+ kernel-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
-
- ocfs2-kmp-default-4.12.14-122.222.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+ ocfs2-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
-
- cluster-md-kmp-default-4.12.14-122.222.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
+ cluster-md-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
-
- dlm-kmp-default-4.12.14-122.222.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
+ dlm-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
-
- gfs2-kmp-default-4.12.14-122.222.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
+ gfs2-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
-
- kernel-default-4.12.14-122.222.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
+ kernel-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
-
- ocfs2-kmp-default-4.12.14-122.222.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
+ ocfs2-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
cluster-md-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-SAP-Azure-LI-BYOS-Production
@@ -4294,18 +4294,18 @@
Image SLES12-SP5-EC2-SAP-On-Demand:gfs2-kmp-default-4.12.14-122.222.1
Image SLES12-SP5-EC2-SAP-On-Demand:kernel-default-4.12.14-122.222.1
Image SLES12-SP5-EC2-SAP-On-Demand:ocfs2-kmp-default-4.12.14-122.222.1
- Image SLES12-SP5-GCE-BYOS:kernel-default-4.12.14-122.222.1
+ Image SLES12-SP5-GCE-BYOS:kernel-default-4.12.14-122.225.1
Image SLES12-SP5-GCE-On-Demand:kernel-default-4.12.14-122.222.1
- Image SLES12-SP5-GCE-SAP-BYOS:cluster-md-kmp-default-4.12.14-122.222.1
- Image SLES12-SP5-GCE-SAP-BYOS:dlm-kmp-default-4.12.14-122.222.1
- Image SLES12-SP5-GCE-SAP-BYOS:gfs2-kmp-default-4.12.14-122.222.1
- Image SLES12-SP5-GCE-SAP-BYOS:kernel-default-4.12.14-122.222.1
- Image SLES12-SP5-GCE-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.222.1
- Image SLES12-SP5-GCE-SAP-On-Demand:cluster-md-kmp-default-4.12.14-122.222.1
- Image SLES12-SP5-GCE-SAP-On-Demand:dlm-kmp-default-4.12.14-122.222.1
- Image SLES12-SP5-GCE-SAP-On-Demand:gfs2-kmp-default-4.12.14-122.222.1
- Image SLES12-SP5-GCE-SAP-On-Demand:kernel-default-4.12.14-122.222.1
- Image SLES12-SP5-GCE-SAP-On-Demand:ocfs2-kmp-default-4.12.14-122.222.1
+ Image SLES12-SP5-GCE-SAP-BYOS:cluster-md-kmp-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-BYOS:dlm-kmp-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-BYOS:gfs2-kmp-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-BYOS:kernel-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:cluster-md-kmp-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:dlm-kmp-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:gfs2-kmp-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:kernel-default-4.12.14-122.225.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:ocfs2-kmp-default-4.12.14-122.225.1
Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:cluster-md-kmp-default-4.12.14-122.225.1
Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:dlm-kmp-default-4.12.14-122.225.1
Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:gfs2-kmp-default-4.12.14-122.225.1
no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2021-47183
skipping CVE-2021-47190 as CVE page is older than CVRF-CVE file.
skipping CVE-2021-47189 as CVE page is older than CVRF-CVE file.
skipping CVE-2021-47188 as CVE page is older than CVRF-CVE file.
skipping CVE-2021-47187 as CVE page is older than CVRF-CVE file.
skipping CVE-2021-47186 as CVE page is older than CVRF-CVE file.
skipping CVE-2021-47185 as CVE page is older than CVRF-CVE file.
skipping CVE-2021-47184 as CVE page is older than CVRF-CVE file.
no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2021-47182
skipping CVE-2021-47181 as CVE page is older than CVRF-CVE file.
skipping CVE-2021-47180 as CVE page is older than CVRF-CVE file.
skipping CVE-2021-47179 as CVE page is older than CVRF-CVE file.
skipping CVE-2021-47178 as CVE page is older than CVRF-CVE file.
skipping CVE-2021-47177 as CVE page is older than CVRF-CVE file.
skipping CVE-2021-47176 as CVE page is older than CVRF-CVE file.
skipping CVE-2021-47175 as CVE page is older than CVRF-CVE file.
skipping CVE-2021-47174 as CVE page is older than CVRF-CVE file.
skipping CVE-2021-47173 as CVE page is older than CVRF-CVE file.
skipping CVE-2021-47172 as CVE page is older than CVRF-CVE file.
skipping CVE-2021-47171 as CVE page is older than CVRF-CVE file.
skipping CVE-2021-47170 as CVE page is older than CVRF-CVE file.
skipping CVE-2021-47169 as CVE page is older than CVRF-CVE file.
skipping CVE-2021-47168 as CVE page is older than CVRF-CVE file.
skipping CVE-2021-47167 as CVE page is older than CVRF-CVE file.
skipping CVE-2021-47166 as CVE page is older than CVRF-CVE file.
skipping CVE-2021-47165 as CVE page is older than CVRF-CVE file.
skipping CVE-2021-47164 as CVE page is older than CVRF-CVE file.
skipping CVE-2021-47162 as CVE page is older than CVRF-CVE file.
skipping CVE-2021-47161 as CVE page is older than CVRF-CVE file.
skipping CVE-2021-47160 as CVE page is older than CVRF-CVE file.
skipping CVE-2021-47159 as CVE page is older than CVRF-CVE file.
skipping CVE-2021-47158 as CVE page is older than CVRF-CVE file.
skipping CVE-2021-47153 as CVE page is older than CVRF-CVE file.
skipping CVE-2021-47152 as CVE page is older than CVRF-CVE file.
skipping CVE-2021-47151 as CVE page is older than CVRF-CVE file.
skipping CVE-2021-47150 as CVE page is older than CVRF-CVE file.
skipping CVE-2021-47149 as CVE page is older than CVRF-CVE file.
skipping CVE-2021-47148 as CVE page is older than CVRF-CVE file.
skipping CVE-2021-47147 as CVE page is older than CVRF-CVE file.
skipping CVE-2021-47144 as CVE page is older than CVRF-CVE file.
skipping CVE-2021-47143 as CVE page is older than CVRF-CVE file.
skipping CVE-2021-47142 as CVE page is older than CVRF-CVE file.
skipping CVE-2021-47141 as CVE page is older than CVRF-CVE file.
skipping CVE-2021-47140 as CVE page is older than CVRF-CVE file.
skipping CVE-2021-47139 as CVE page is older than CVRF-CVE file.
skipping CVE-2021-47138 as CVE page is older than CVRF-CVE file.
skipping CVE-2021-47137 as CVE page is older than CVRF-CVE file.
skipping CVE-2021-47136 as CVE page is older than CVRF-CVE file.
skipping CVE-2021-47135 as CVE page is older than CVRF-CVE file.
skipping CVE-2021-47134 as CVE page is older than CVRF-CVE file.
skipping CVE-2021-47133 as CVE page is older than CVRF-CVE file.
skipping CVE-2021-47132 as CVE page is older than CVRF-CVE file.
skipping CVE-2021-47130 as CVE page is older than CVRF-CVE file.
skipping CVE-2021-47129 as CVE page is older than CVRF-CVE file.
skipping CVE-2021-47128 as CVE page is older than CVRF-CVE file.
skipping CVE-2021-47127 as CVE page is older than CVRF-CVE file.
skipping CVE-2021-47126 as CVE page is older than CVRF-CVE file.
skipping CVE-2021-47125 as CVE page is older than CVRF-CVE file.
skipping CVE-2021-47124 as CVE page is older than CVRF-CVE file.
skipping CVE-2021-47123 as CVE page is older than CVRF-CVE file.
skipping CVE-2021-47122 as CVE page is older than CVRF-CVE file.
skipping CVE-2021-47121 as CVE page is older than CVRF-CVE file.
skipping CVE-2021-47120 as CVE page is older than CVRF-CVE file.
skipping CVE-2021-47119 as CVE page is older than CVRF-CVE file.
skipping CVE-2021-47118 as CVE page is older than CVRF-CVE file.
skipping CVE-2021-47117 as CVE page is older than CVRF-CVE file.
skipping CVE-2021-47116 as CVE page is older than CVRF-CVE file.
skipping CVE-2021-47114 as CVE page is older than CVRF-CVE file.
skipping CVE-2021-47113 as CVE page is older than CVRF-CVE file.
skipping CVE-2021-47112 as CVE page is older than CVRF-CVE file.
skipping CVE-2021-47111 as CVE page is older than CVRF-CVE file.
skipping CVE-2021-47110 as CVE page is older than CVRF-CVE file.
skipping CVE-2021-47109 as CVE page is older than CVRF-CVE file.
skipping CVE-2021-47108 as CVE page is older than CVRF-CVE file.
skipping CVE-2021-47107 as CVE page is older than CVRF-CVE file.
skipping CVE-2021-47106 as CVE page is older than CVRF-CVE file.
skipping CVE-2021-47105 as CVE page is older than CVRF-CVE file.
skipping CVE-2021-47104 as CVE page is older than CVRF-CVE file.
skipping CVE-2021-47102 as CVE page is older than CVRF-CVE file.
skipping CVE-2021-47101 as CVE page is older than CVRF-CVE file.
skipping CVE-2021-47100 as CVE page is older than CVRF-CVE file.
skipping CVE-2021-47099 as CVE page is older than CVRF-CVE file.
skipping CVE-2021-47098 as CVE page is older than CVRF-CVE file.
skipping CVE-2021-47097 as CVE page is older than CVRF-CVE file.
skipping CVE-2021-47096 as CVE page is older than CVRF-CVE file.
skipping CVE-2021-47095 as CVE page is older than CVRF-CVE file.
skipping CVE-2021-47094 as CVE page is older than CVRF-CVE file.
skipping CVE-2021-47093 as CVE page is older than CVRF-CVE file.
skipping CVE-2021-47092 as CVE page is older than CVRF-CVE file.
skipping CVE-2021-47091 as CVE page is older than CVRF-CVE file.
skipping CVE-2021-47090 as CVE page is older than CVRF-CVE file.
skipping CVE-2021-47089 as CVE page is older than CVRF-CVE file.
skipping CVE-2021-47088 as CVE page is older than CVRF-CVE file.
skipping CVE-2021-47087 as CVE page is older than CVRF-CVE file.
skipping CVE-2021-47086 as CVE page is older than CVRF-CVE file.
skipping CVE-2021-47084 as CVE page is older than CVRF-CVE file.
skipping CVE-2021-47083 as CVE page is older than CVRF-CVE file.
skipping CVE-2021-47082 as CVE page is older than CVRF-CVE file.
skipping CVE-2021-47081 as CVE page is older than CVRF-CVE file.
skipping CVE-2021-47080 as CVE page is older than CVRF-CVE file.
skipping CVE-2021-47079 as CVE page is older than CVRF-CVE file.
skipping CVE-2021-47078 as CVE page is older than CVRF-CVE file.
skipping CVE-2021-47077 as CVE page is older than CVRF-CVE file.
skipping CVE-2021-47076 as CVE page is older than CVRF-CVE file.
skipping CVE-2021-47075 as CVE page is older than CVRF-CVE file.
skipping CVE-2021-47074 as CVE page is older than CVRF-CVE file.
skipping CVE-2021-47073 as CVE page is older than CVRF-CVE file.
skipping CVE-2021-47072 as CVE page is older than CVRF-CVE file.
skipping CVE-2021-47071 as CVE page is older than CVRF-CVE file.
skipping CVE-2021-47070 as CVE page is older than CVRF-CVE file.
skipping CVE-2021-47069 as CVE page is older than CVRF-CVE file.
skipping CVE-2021-47068 as CVE page is older than CVRF-CVE file.
skipping CVE-2021-47067 as CVE page is older than CVRF-CVE file.
skipping CVE-2021-47066 as CVE page is older than CVRF-CVE file.
skipping CVE-2021-47065 as CVE page is older than CVRF-CVE file.
skipping CVE-2021-47064 as CVE page is older than CVRF-CVE file.
skipping CVE-2021-47063 as CVE page is older than CVRF-CVE file.
skipping CVE-2021-47062 as CVE page is older than CVRF-CVE file.
skipping CVE-2021-47061 as CVE page is older than CVRF-CVE file.
skipping CVE-2021-47060 as CVE page is older than CVRF-CVE file.
skipping CVE-2021-47059 as CVE page is older than CVRF-CVE file.
skipping CVE-2021-47058 as CVE page is older than CVRF-CVE file.
skipping CVE-2021-47057 as CVE page is older than CVRF-CVE file.
skipping CVE-2021-47056 as CVE page is older than CVRF-CVE file.
skipping CVE-2021-47055 as CVE page is older than CVRF-CVE file.
skipping CVE-2021-47054 as CVE page is older than CVRF-CVE file.
skipping CVE-2021-47053 as CVE page is older than CVRF-CVE file.
skipping CVE-2021-47052 as CVE page is older than CVRF-CVE file.
skipping CVE-2021-47051 as CVE page is older than CVRF-CVE file.
skipping CVE-2021-47050 as CVE page is older than CVRF-CVE file.
skipping CVE-2021-47049 as CVE page is older than CVRF-CVE file.
skipping CVE-2021-47048 as CVE page is older than CVRF-CVE file.
skipping CVE-2021-47047 as CVE page is older than CVRF-CVE file.
skipping CVE-2021-47046 as CVE page is older than CVRF-CVE file.
skipping CVE-2021-47045 as CVE page is older than CVRF-CVE file.
skipping CVE-2021-47044 as CVE page is older than CVRF-CVE file.
skipping CVE-2021-47043 as CVE page is older than CVRF-CVE file.
skipping CVE-2021-47042 as CVE page is older than CVRF-CVE file.
skipping CVE-2021-47041 as CVE page is older than CVRF-CVE file.
skipping CVE-2021-47040 as CVE page is older than CVRF-CVE file.
skipping CVE-2021-47039 as CVE page is older than CVRF-CVE file.
skipping CVE-2021-47038 as CVE page is older than CVRF-CVE file.
skipping CVE-2021-47037 as CVE page is older than CVRF-CVE file.
skipping CVE-2021-47036 as CVE page is older than CVRF-CVE file.
skipping CVE-2021-47035 as CVE page is older than CVRF-CVE file.
skipping CVE-2021-47034 as CVE page is older than CVRF-CVE file.
skipping CVE-2021-47033 as CVE page is older than CVRF-CVE file.
skipping CVE-2021-47032 as CVE page is older than CVRF-CVE file.
skipping CVE-2021-47031 as CVE page is older than CVRF-CVE file.
skipping CVE-2021-47030 as CVE page is older than CVRF-CVE file.
skipping CVE-2021-47029 as CVE page is older than CVRF-CVE file.
skipping CVE-2021-47028 as CVE page is older than CVRF-CVE file.
skipping CVE-2021-47027 as CVE page is older than CVRF-CVE file.
skipping CVE-2021-47026 as CVE page is older than CVRF-CVE file.
skipping CVE-2021-47025 as CVE page is older than CVRF-CVE file.
skipping CVE-2021-47024 as CVE page is older than CVRF-CVE file.
skipping CVE-2021-47023 as CVE page is older than CVRF-CVE file.
skipping CVE-2021-47022 as CVE page is older than CVRF-CVE file.
skipping CVE-2021-47021 as CVE page is older than CVRF-CVE file.
skipping CVE-2021-47020 as CVE page is older than CVRF-CVE file.
skipping CVE-2021-47019 as CVE page is older than CVRF-CVE file.
skipping CVE-2021-47018 as CVE page is older than CVRF-CVE file.
skipping CVE-2021-47017 as CVE page is older than CVRF-CVE file.
skipping CVE-2021-47016 as CVE page is older than CVRF-CVE file.
skipping CVE-2021-47015 as CVE page is older than CVRF-CVE file.
skipping CVE-2021-47014 as CVE page is older than CVRF-CVE file.
skipping CVE-2021-47013 as CVE page is older than CVRF-CVE file.
skipping CVE-2021-47012 as CVE page is older than CVRF-CVE file.
skipping CVE-2021-47011 as CVE page is older than CVRF-CVE file.
skipping CVE-2021-47010 as CVE page is older than CVRF-CVE file.
skipping CVE-2021-47009 as CVE page is older than CVRF-CVE file.
skipping CVE-2021-47008 as CVE page is older than CVRF-CVE file.
skipping CVE-2021-47007 as CVE page is older than CVRF-CVE file.
skipping CVE-2021-47006 as CVE page is older than CVRF-CVE file.
skipping CVE-2021-47005 as CVE page is older than CVRF-CVE file.
skipping CVE-2021-47004 as CVE page is older than CVRF-CVE file.
skipping CVE-2021-47003 as CVE page is older than CVRF-CVE file.
skipping CVE-2021-47002 as CVE page is older than CVRF-CVE file.
skipping CVE-2021-47001 as CVE page is older than CVRF-CVE file.
skipping CVE-2021-47000 as CVE page is older than CVRF-CVE file.
skipping CVE-2021-46999 as CVE page is older than CVRF-CVE file.
skipping CVE-2021-46998 as CVE page is older than CVRF-CVE file.
skipping CVE-2021-46997 as CVE page is older than CVRF-CVE file.
skipping CVE-2021-46996 as CVE page is older than CVRF-CVE file.
skipping CVE-2021-46995 as CVE page is older than CVRF-CVE file.
skipping CVE-2021-46994 as CVE page is older than CVRF-CVE file.
skipping CVE-2021-46993 as CVE page is older than CVRF-CVE file.
skipping CVE-2021-46992 as CVE page is older than CVRF-CVE file.
skipping CVE-2021-46991 as CVE page is older than CVRF-CVE file.
skipping CVE-2021-46990 as CVE page is older than CVRF-CVE file.
skipping CVE-2021-46989 as CVE page is older than CVRF-CVE file.
skipping CVE-2021-46988 as CVE page is older than CVRF-CVE file.
skipping CVE-2021-46987 as CVE page is older than CVRF-CVE file.
skipping CVE-2021-46986 as CVE page is older than CVRF-CVE file.
skipping CVE-2021-46985 as CVE page is older than CVRF-CVE file.
skipping CVE-2021-46984 as CVE page is older than CVRF-CVE file.
skipping CVE-2021-46983 as CVE page is older than CVRF-CVE file.
skipping CVE-2021-46982 as CVE page is older than CVRF-CVE file.
skipping CVE-2021-46981 as CVE page is older than CVRF-CVE file.
skipping CVE-2021-46980 as CVE page is older than CVRF-CVE file.
skipping CVE-2021-46979 as CVE page is older than CVRF-CVE file.
skipping CVE-2021-46978 as CVE page is older than CVRF-CVE file.
skipping CVE-2021-46977 as CVE page is older than CVRF-CVE file.
skipping CVE-2021-46976 as CVE page is older than CVRF-CVE file.
skipping CVE-2021-46975 as CVE page is older than CVRF-CVE file.
skipping CVE-2021-46974 as CVE page is older than CVRF-CVE file.
skipping CVE-2021-46973 as CVE page is older than CVRF-CVE file.
skipping CVE-2021-46972 as CVE page is older than CVRF-CVE file.
skipping CVE-2021-46971 as CVE page is older than CVRF-CVE file.
skipping CVE-2021-46970 as CVE page is older than CVRF-CVE file.
skipping CVE-2021-46969 as CVE page is older than CVRF-CVE file.
skipping CVE-2021-46968 as CVE page is older than CVRF-CVE file.
skipping CVE-2021-46967 as CVE page is older than CVRF-CVE file.
skipping CVE-2021-46966 as CVE page is older than CVRF-CVE file.
skipping CVE-2021-46965 as CVE page is older than CVRF-CVE file.
skipping CVE-2021-46964 as CVE page is older than CVRF-CVE file.
skipping CVE-2021-46962 as CVE page is older than CVRF-CVE file.
skipping CVE-2021-46961 as CVE page is older than CVRF-CVE file.
skipping CVE-2021-46960 as CVE page is older than CVRF-CVE file.
skipping CVE-2021-46959 as CVE page is older than CVRF-CVE file.
skipping CVE-2021-46958 as CVE page is older than CVRF-CVE file.
skipping CVE-2021-46957 as CVE page is older than CVRF-CVE file.
skipping CVE-2021-46956 as CVE page is older than CVRF-CVE file.
--- /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2021-46955.xml 2024-10-22 03:22:53.309197000 +0200
+++ /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2021-46955.xml.new 2024-10-29 01:51:12.717922000 +0100
@@ -14,13 +14,13 @@
1
- 47
- 2024-10-22T01:22:52Z
+ 48
+ 2024-10-29T00:51:12Z
current
2024-02-29T00:38:52Z
- 2024-10-22T01:22:52Z
+ 2024-10-29T00:51:12Z
cve-database/bin/generate-cvrf-cve.pl
2020-12-27T01:00:00Z
@@ -1343,9 +1343,15 @@
kernel-livepatch-5_3_18-150200_24_183-default-8-150200.5.6.1
+
+ kernel-livepatch-5_3_18-150200_24_183-default-9-150200.5.6.1
+
kernel-livepatch-5_3_18-150200_24_188-default-7-150200.5.6.1
+
+ kernel-livepatch-5_3_18-150200_24_188-default-8-150200.5.6.1
+
kernel-livepatch-5_3_18-150200_24_191-default-1-150200.5.3.1
@@ -1379,9 +1385,15 @@
kernel-livepatch-5_3_18-150300_59_153-default-8-150300.7.6.1
+
+ kernel-livepatch-5_3_18-150300_59_153-default-9-150300.7.6.1
+
kernel-livepatch-5_3_18-150300_59_158-default-7-150300.7.6.1
+
+ kernel-livepatch-5_3_18-150300_59_158-default-8-150300.7.6.1
+
kernel-livepatch-5_3_18-150300_59_161-default-1-150300.7.3.1
@@ -1535,9 +1547,15 @@
kgraft-patch-4_12_14-122_201-default-8-8.10.1
+
+ kgraft-patch-4_12_14-122_201-default-9-8.10.1
+
kgraft-patch-4_12_14-122_216-default-6-8.6.1
+
+ kgraft-patch-4_12_14-122_216-default-7-8.6.1
+
kgraft-patch-4_12_14-122_219-default-1-8.3.1
@@ -2513,6 +2531,24 @@
kernel-default-extra-4.12.14-122.219.1 as a component of SUSE Linux Enterprise Workstation Extension 12 SP5
+
+ kgraft-patch-4_12_14-122_201-default-9-8.10.1 as a component of SUSE Linux Enterprise Live Patching 12 SP5
+
+
+ kgraft-patch-4_12_14-122_216-default-7-8.6.1 as a component of SUSE Linux Enterprise Live Patching 12 SP5
+
+
+ kernel-livepatch-5_3_18-150200_24_183-default-9-150200.5.6.1 as a component of SUSE Linux Enterprise Live Patching 15 SP2
+
+
+ kernel-livepatch-5_3_18-150200_24_188-default-8-150200.5.6.1 as a component of SUSE Linux Enterprise Live Patching 15 SP2
+
+
+ kernel-livepatch-5_3_18-150300_59_153-default-9-150300.7.6.1 as a component of SUSE Linux Enterprise Live Patching 15 SP3
+
+
+ kernel-livepatch-5_3_18-150300_59_158-default-8-150300.7.6.1 as a component of SUSE Linux Enterprise Live Patching 15 SP3
+
kernel-default as a component of SUSE CaaS Platform 4.0
@@ -3494,6 +3530,14 @@
SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1
SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.219.1
+
+ SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_201-default-9-8.10.1
+ SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_216-default-7-8.6.1
+ SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_183-default-9-150200.5.6.1
+ SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_188-default-8-150200.5.6.1
+ SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_153-default-9-150300.7.6.1
+ SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_158-default-8-150300.7.6.1
+
SUSE CaaS Platform 4.0:kernel-default
SUSE CaaS Platform 4.0:kernel-default-base
skipping CVE-2021-46954 as CVE page is older than CVRF-CVE file.
skipping CVE-2021-46953 as CVE page is older than CVRF-CVE file.
skipping CVE-2021-46952 as CVE page is older than CVRF-CVE file.
skipping CVE-2021-46951 as CVE page is older than CVRF-CVE file.
skipping CVE-2021-46950 as CVE page is older than CVRF-CVE file.
skipping CVE-2021-46949 as CVE page is older than CVRF-CVE file.
skipping CVE-2021-46948 as CVE page is older than CVRF-CVE file.
skipping CVE-2021-46947 as CVE page is older than CVRF-CVE file.
skipping CVE-2021-46946 as CVE page is older than CVRF-CVE file.
skipping CVE-2021-46945 as CVE page is older than CVRF-CVE file.
skipping CVE-2021-46944 as CVE page is older than CVRF-CVE file.
skipping CVE-2021-46943 as CVE page is older than CVRF-CVE file.
skipping CVE-2021-46942 as CVE page is older than CVRF-CVE file.
skipping CVE-2021-46941 as CVE page is older than CVRF-CVE file.
skipping CVE-2021-46940 as CVE page is older than CVRF-CVE file.
skipping CVE-2021-46939 as CVE page is older than CVRF-CVE file.
skipping CVE-2021-46938 as CVE page is older than CVRF-CVE file.
skipping CVE-2021-46937 as CVE page is older than CVRF-CVE file.
skipping CVE-2021-46936 as CVE page is older than CVRF-CVE file.
skipping CVE-2021-46935 as CVE page is older than CVRF-CVE file.
skipping CVE-2021-46934 as CVE page is older than CVRF-CVE file.
skipping CVE-2021-46933 as CVE page is older than CVRF-CVE file.
skipping CVE-2021-46932 as CVE page is older than CVRF-CVE file.
skipping CVE-2021-46931 as CVE page is older than CVRF-CVE file.
skipping CVE-2021-46930 as CVE page is older than CVRF-CVE file.
skipping CVE-2021-46929 as CVE page is older than CVRF-CVE file.
skipping CVE-2021-46928 as CVE page is older than CVRF-CVE file.
skipping CVE-2021-46927 as CVE page is older than CVRF-CVE file.
skipping CVE-2021-46926 as CVE page is older than CVRF-CVE file.
skipping CVE-2021-46925 as CVE page is older than CVRF-CVE file.
skipping CVE-2021-46924 as CVE page is older than CVRF-CVE file.
skipping CVE-2021-46923 as CVE page is older than CVRF-CVE file.
skipping CVE-2021-46922 as CVE page is older than CVRF-CVE file.
skipping CVE-2021-46920 as CVE page is older than CVRF-CVE file.
skipping CVE-2021-46919 as CVE page is older than CVRF-CVE file.
skipping CVE-2021-46918 as CVE page is older than CVRF-CVE file.
skipping CVE-2021-46917 as CVE page is older than CVRF-CVE file.
skipping CVE-2021-46916 as CVE page is older than CVRF-CVE file.
no cpe found for SUSE Package Hub 15 SP4 in CVE-2021-46898
no cpe found for SUSE Package Hub 15 SP5 in CVE-2021-46898
skipping CVE-2021-46914 as CVE page is older than CVRF-CVE file.
skipping CVE-2021-46913 as CVE page is older than CVRF-CVE file.
skipping CVE-2021-46912 as CVE page is older than CVRF-CVE file.
skipping CVE-2021-46911 as CVE page is older than CVRF-CVE file.
skipping CVE-2021-46910 as CVE page is older than CVRF-CVE file.
skipping CVE-2021-46909 as CVE page is older than CVRF-CVE file.
skipping CVE-2021-46908 as CVE page is older than CVRF-CVE file.
skipping CVE-2021-46907 as CVE page is older than CVRF-CVE file.
skipping CVE-2021-46906 as CVE page is older than CVRF-CVE file.
skipping CVE-2021-46905 as CVE page is older than CVRF-CVE file.
skipping CVE-2021-46904 as CVE page is older than CVRF-CVE file.
skipping CVE-2021-46848 as CVE page is older than CVRF-CVE file.
skipping CVE-2021-46829 as CVE page is older than CVRF-CVE file.
skipping CVE-2021-46828 as CVE page is older than CVRF-CVE file.
skipping CVE-2021-46822 as CVE page is older than CVRF-CVE file.
no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2021-46784
skipping CVE-2021-46774 as CVE page is older than CVRF-CVE file.
skipping CVE-2021-46766 as CVE page is older than CVRF-CVE file.
skipping CVE-2021-46744 as CVE page is older than CVRF-CVE file.
skipping CVE-2021-46705 as CVE page is older than CVRF-CVE file.
no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2021-46668
skipping CVE-2021-46669 as CVE page is older than CVRF-CVE file.
no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2021-46665
no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2021-46664
skipping CVE-2021-46663 as CVE page is older than CVRF-CVE file.
skipping CVE-2021-46661 as CVE page is older than CVRF-CVE file.
skipping CVE-2021-46659 as CVE page is older than CVRF-CVE file.
skipping CVE-2021-46658 as CVE page is older than CVRF-CVE file.
skipping CVE-2021-46657 as CVE page is older than CVRF-CVE file.
no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2021-46310
skipping CVE-2021-46312 as CVE page is older than CVRF-CVE file.
skipping CVE-2021-46283 as CVE page is older than CVRF-CVE file.
skipping CVE-2021-46195 as CVE page is older than CVRF-CVE file.
skipping CVE-2021-46174 as CVE page is older than CVRF-CVE file.
skipping CVE-2021-46101 as CVE page is older than CVRF-CVE file.
skipping CVE-2021-46059 as CVE page is older than CVRF-CVE file.
no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2021-45958
skipping CVE-2021-45985 as CVE page is older than CVRF-CVE file.
skipping CVE-2021-45960 as CVE page is older than CVRF-CVE file.
skipping CVE-2021-45942 as CVE page is older than CVRF-CVE file.
skipping CVE-2021-45931 as CVE page is older than CVRF-CVE file.
skipping CVE-2021-45930 as CVE page is older than CVRF-CVE file.
no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2021-45710
no cpe found for SUSE Package Hub 15 SP6 in CVE-2021-45710
no cpe found for SUSE Liberty Linux 7 LTSS in CVE-2021-45463
skipping CVE-2021-45480 as CVE page is older than CVRF-CVE file.
skipping CVE-2021-45469 as CVE page is older than CVRF-CVE file.
no cpe found for SUSE Package Hub 15 SP3 in CVE-2021-45452
no cpe found for SUSE Liberty Linux 7 LTSS in CVE-2021-45417
skipping CVE-2021-45402 as CVE page is older than CVRF-CVE file.
no cpe found for SUSE Package Hub 15 SP3 in CVE-2021-45342
no cpe found for SUSE Package Hub 15 SP4 in CVE-2021-45342
no cpe found for SUSE Package Hub 15 SP3 in CVE-2021-45341
no cpe found for SUSE Package Hub 15 SP4 in CVE-2021-45341
no cpe found for SUSE Package Hub 15 SP3 in CVE-2021-45116
no cpe found for SUSE Package Hub 15 SP3 in CVE-2021-45115
skipping CVE-2021-45100 as CVE page is older than CVRF-CVE file.
skipping CVE-2021-45083 as CVE page is older than CVRF-CVE file.
skipping CVE-2021-45082 as CVE page is older than CVRF-CVE file.
skipping CVE-2021-45079 as CVE page is older than CVRF-CVE file.
skipping CVE-2021-45078 as CVE page is older than CVRF-CVE file.
skipping CVE-2021-44964 as CVE page is older than CVRF-CVE file.
no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2021-44879
skipping CVE-2021-44906 as CVE page is older than CVRF-CVE file.
no cpe found for SUSE Package Hub 15 SP1 in CVE-2021-44847
no cpe found for SUSE Package Hub 15 SP2 in CVE-2021-44847
no cpe found for SUSE Package Hub 15 SP3 in CVE-2021-44847
no cpe found for SUSE Package Hub 15 SP3 in CVE-2021-44758
no cpe found for SUSE Package Hub 15 SP4 in CVE-2021-44758
skipping CVE-2021-44790 as CVE page is older than CVRF-CVE file.
no cpe found for SUSE Package Hub 15 SP3 in CVE-2021-44543
no cpe found for SUSE Package Hub 15 SP4 in CVE-2021-44543
skipping CVE-2021-44648 as CVE page is older than CVRF-CVE file.
skipping CVE-2021-44647 as CVE page is older than CVRF-CVE file.
skipping CVE-2021-44577 as CVE page is older than CVRF-CVE file.
skipping CVE-2021-44576 as CVE page is older than CVRF-CVE file.
skipping CVE-2021-44575 as CVE page is older than CVRF-CVE file.
skipping CVE-2021-44574 as CVE page is older than CVRF-CVE file.
skipping CVE-2021-44573 as CVE page is older than CVRF-CVE file.
skipping CVE-2021-44571 as CVE page is older than CVRF-CVE file.
skipping CVE-2021-44570 as CVE page is older than CVRF-CVE file.
skipping CVE-2021-44569 as CVE page is older than CVRF-CVE file.
skipping CVE-2021-44568 as CVE page is older than CVRF-CVE file.
no cpe found for SUSE Package Hub 15 SP3 in CVE-2021-44542
no cpe found for SUSE Package Hub 15 SP4 in CVE-2021-44542
no cpe found for SUSE Package Hub 15 SP3 in CVE-2021-44541
no cpe found for SUSE Package Hub 15 SP4 in CVE-2021-44541
no cpe found for SUSE Package Hub 15 SP3 in CVE-2021-44540
no cpe found for SUSE Package Hub 15 SP4 in CVE-2021-44540
no cpe found for SUSE Package Hub 15 SP3 in CVE-2021-44420
skipping CVE-2021-44269 as CVE page is older than CVRF-CVE file.
no cpe found for SUSE Liberty Linux 7 LTSS in CVE-2021-44227
skipping CVE-2021-44224 as CVE page is older than CVRF-CVE file.
skipping CVE-2021-44038 as CVE page is older than CVRF-CVE file.
skipping CVE-2021-43980 as CVE page is older than CVRF-CVE file.
skipping CVE-2021-43859 as CVE page is older than CVRF-CVE file.
no cpe found for SUSE Manager Tools Beta for SLE Micro 5 in CVE-2021-43815
no cpe found for SUSE Manager Tools for SLE Micro 5 in CVE-2021-43815
no cpe found for SUSE Manager Tools Beta for SLE Micro 5 in CVE-2021-43813
no cpe found for SUSE Manager Tools for SLE Micro 5 in CVE-2021-43813
no cpe found for SUSE Manager Tools Beta for SLE Micro 5 in CVE-2021-43798
no cpe found for SUSE Manager Tools for SLE Micro 5 in CVE-2021-43798
skipping CVE-2021-43809 as CVE page is older than CVRF-CVE file.
no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2021-43797
skipping CVE-2021-43618 as CVE page is older than CVRF-CVE file.
no cpe found for SUSE Package Hub 15 SP3 in CVE-2021-43579
no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2021-43565
skipping CVE-2021-43546 as CVE page is older than CVRF-CVE file.
skipping CVE-2021-43545 as CVE page is older than CVRF-CVE file.
skipping CVE-2021-43544 as CVE page is older than CVRF-CVE file.
skipping CVE-2021-43543 as CVE page is older than CVRF-CVE file.
skipping CVE-2021-43542 as CVE page is older than CVRF-CVE file.
skipping CVE-2021-43541 as CVE page is older than CVRF-CVE file.
skipping CVE-2021-43540 as CVE page is older than CVRF-CVE file.
skipping CVE-2021-43539 as CVE page is older than CVRF-CVE file.
skipping CVE-2021-43538 as CVE page is older than CVRF-CVE file.
skipping CVE-2021-43537 as CVE page is older than CVRF-CVE file.
skipping CVE-2021-43536 as CVE page is older than CVRF-CVE file.
skipping CVE-2021-43535 as CVE page is older than CVRF-CVE file.
skipping CVE-2021-43534 as CVE page is older than CVRF-CVE file.
skipping CVE-2021-43533 as CVE page is older than CVRF-CVE file.
skipping CVE-2021-43532 as CVE page is older than CVRF-CVE file.
skipping CVE-2021-43531 as CVE page is older than CVRF-CVE file.
skipping CVE-2021-43530 as CVE page is older than CVRF-CVE file.
skipping CVE-2021-43529 as CVE page is older than CVRF-CVE file.
skipping CVE-2021-43528 as CVE page is older than CVRF-CVE file.
skipping CVE-2021-43527 as CVE page is older than CVRF-CVE file.
skipping CVE-2021-43519 as CVE page is older than CVRF-CVE file.
skipping CVE-2021-43400 as CVE page is older than CVRF-CVE file.
skipping CVE-2021-43389 as CVE page is older than CVRF-CVE file.
no cpe found for SUSE Package Hub 15 SP4 in CVE-2021-43317
no cpe found for SUSE Package Hub 15 SP4 in CVE-2021-43316
no cpe found for SUSE Package Hub 15 SP4 in CVE-2021-43315
no cpe found for SUSE Package Hub 15 SP4 in CVE-2021-43314
no cpe found for SUSE Package Hub 15 SP4 in CVE-2021-43313
no cpe found for SUSE Package Hub 15 SP4 in CVE-2021-43312
no cpe found for SUSE Package Hub 15 SP4 in CVE-2021-43311
skipping CVE-2021-43267 as CVE page is older than CVRF-CVE file.
skipping CVE-2021-43138 as CVE page is older than CVRF-CVE file.
skipping CVE-2021-43085 as CVE page is older than CVRF-CVE file.
skipping CVE-2021-43057 as CVE page is older than CVRF-CVE file.
skipping CVE-2021-43056 as CVE page is older than CVRF-CVE file.
skipping CVE-2021-42762 as CVE page is older than CVRF-CVE file.
skipping CVE-2021-42740 as CVE page is older than CVRF-CVE file.
no cpe found for SUSE Package Hub 15 SP4 in CVE-2021-42717
no cpe found for SUSE Package Hub 15 SP5 in CVE-2021-42717
no cpe found for SUSE Package Hub 15 SP3 in CVE-2021-42716
no cpe found for SUSE Liberty Linux 7 LTSS in CVE-2021-42574
no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2021-42550
no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2021-42523
no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2021-42386
no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2021-42385
no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2021-42384
no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2021-42383
no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2021-42382
no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2021-42381
no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2021-42380
no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2021-42379
no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2021-42378
no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2021-42377
no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2021-42376
no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2021-42375
no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2021-42374
no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2021-42373
skipping CVE-2021-42340 as CVE page is older than CVRF-CVE file.
skipping CVE-2021-42327 as CVE page is older than CVRF-CVE file.
no cpe found for SUSE Liberty Linux 7 LTSS in CVE-2021-42097
no cpe found for SUSE Package Hub 15 SP2 in CVE-2021-42097
no cpe found for SUSE Package Hub 15 SP2 in CVE-2021-42096
no cpe found for SUSE Package Hub 15 SP3 in CVE-2021-42073
no cpe found for SUSE Package Hub 15 SP3 in CVE-2021-42072
skipping CVE-2021-42013 as CVE page is older than CVRF-CVE file.
skipping CVE-2021-41991 as CVE page is older than CVRF-CVE file.
skipping CVE-2021-41990 as CVE page is older than CVRF-CVE file.
skipping CVE-2021-41819 as CVE page is older than CVRF-CVE file.
skipping CVE-2021-41817 as CVE page is older than CVRF-CVE file.
skipping CVE-2021-41816 as CVE page is older than CVRF-CVE file.
skipping CVE-2021-41773 as CVE page is older than CVRF-CVE file.
No V5 entry found for CVE-2021-41741 / /home/securitybot/prod/cve-database/cvelistV5/cves/2021/41xxxx/CVE-2021-41741.json:No such file or directory
no cpe found for SUSE Package Hub 15 SP3 in CVE-2021-41741
skipping CVE-2021-41617 as CVE page is older than CVRF-CVE file.
no cpe found for SUSE Package Hub 15 SP4 in CVE-2021-41556
skipping CVE-2021-41524 as CVE page is older than CVRF-CVE file.
no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2021-41495
skipping CVE-2021-41411 as CVE page is older than CVRF-CVE file.
no cpe found for SUSE Package Hub 15 SP2 in CVE-2021-41259
no cpe found for SUSE Package Hub 15 SP3 in CVE-2021-41259
no cpe found for SUSE Package Hub 15 SP4 in CVE-2021-41259
no cpe found for SUSE Manager Tools Beta for SLE Micro 5 in CVE-2021-41244
no cpe found for SUSE Manager Tools for SLE Micro 5 in CVE-2021-41244
no cpe found for SUSE Package Hub 15 SP3 in CVE-2021-41241
no cpe found for SUSE Package Hub 15 SP3 in CVE-2021-41239
skipping CVE-2021-41229 as CVE page is older than CVRF-CVE file.
no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2021-41190
no cpe found for SUSE Package Hub 15 SP3 in CVE-2021-41190
no cpe found for SUSE Package Hub 15 SP1 in CVE-2021-41179
no cpe found for SUSE Package Hub 15 SP2 in CVE-2021-41179
no cpe found for SUSE Package Hub 15 SP3 in CVE-2021-41179
no cpe found for SUSE Package Hub 15 SP1 in CVE-2021-41178
no cpe found for SUSE Package Hub 15 SP2 in CVE-2021-41178
no cpe found for SUSE Package Hub 15 SP3 in CVE-2021-41178
no cpe found for SUSE Package Hub 15 SP1 in CVE-2021-41177
no cpe found for SUSE Package Hub 15 SP2 in CVE-2021-41177
no cpe found for SUSE Package Hub 15 SP3 in CVE-2021-41177
no cpe found for SUSE Manager Tools Beta for SLE Micro 5 in CVE-2021-41174
no cpe found for SUSE Manager Tools for SLE Micro 5 in CVE-2021-41174
no cpe found for SUSE Liberty Linux 7 LTSS in CVE-2021-41160
no cpe found for SUSE Liberty Linux 7 LTSS in CVE-2021-41159
skipping CVE-2021-41136 as CVE page is older than CVRF-CVE file.
no cpe found for SUSE Liberty Linux 7 LTSS in CVE-2021-41133
no cpe found for SUSE Package Hub 15 SP3 in CVE-2021-41116
no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2021-41072
skipping CVE-2021-41073 as CVE page is older than CVRF-CVE file.
no cpe found for SUSE Package Hub 15 SP3 in CVE-2021-40985
skipping CVE-2021-41035 as CVE page is older than CVRF-CVE file.
notsure where SUSE Linux Enterprise Module for Package Hub 15 SP2 is contained?
skipping CVE-2021-40633 as CVE page is older than CVRF-CVE file.
skipping CVE-2021-40528 as CVE page is older than CVRF-CVE file.
no cpe found for SUSE Package Hub 15 SP3 in CVE-2021-40516
skipping CVE-2021-40490 as CVE page is older than CVRF-CVE file.
no cpe found for SUSE Package Hub 15 SP4 in CVE-2021-40426
no cpe found for SUSE Package Hub 15 SP5 in CVE-2021-40426
skipping CVE-2021-40438 as CVE page is older than CVRF-CVE file.
skipping CVE-2021-40348 as CVE page is older than CVRF-CVE file.
no cpe found for SUSE Package Hub 15 SP3 in CVE-2021-40325
skipping CVE-2021-40330 as CVE page is older than CVRF-CVE file.
no cpe found for SUSE Package Hub 15 SP3 in CVE-2021-40324
skipping CVE-2021-40323 as CVE page is older than CVRF-CVE file.
no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2021-40153
skipping CVE-2021-40211 as CVE page is older than CVRF-CVE file.
skipping CVE-2021-39929 as CVE page is older than CVRF-CVE file.
skipping CVE-2021-39928 as CVE page is older than CVRF-CVE file.
skipping CVE-2021-39926 as CVE page is older than CVRF-CVE file.
skipping CVE-2021-39925 as CVE page is older than CVRF-CVE file.
skipping CVE-2021-39924 as CVE page is older than CVRF-CVE file.
skipping CVE-2021-39923 as CVE page is older than CVRF-CVE file.
skipping CVE-2021-39922 as CVE page is older than CVRF-CVE file.
skipping CVE-2021-39921 as CVE page is older than CVRF-CVE file.
skipping CVE-2021-39920 as CVE page is older than CVRF-CVE file.
skipping CVE-2021-39802 as CVE page is older than CVRF-CVE file.
skipping CVE-2021-39801 as CVE page is older than CVRF-CVE file.
skipping CVE-2021-39800 as CVE page is older than CVRF-CVE file.
skipping CVE-2021-39792 as CVE page is older than CVRF-CVE file.
skipping CVE-2021-39735 as CVE page is older than CVRF-CVE file.
skipping CVE-2021-39725 as CVE page is older than CVRF-CVE file.
skipping CVE-2021-39715 as CVE page is older than CVRF-CVE file.
skipping CVE-2021-39714 as CVE page is older than CVRF-CVE file.
skipping CVE-2021-39698 as CVE page is older than CVRF-CVE file.
skipping CVE-2021-39686 as CVE page is older than CVRF-CVE file.
skipping CVE-2021-39685 as CVE page is older than CVRF-CVE file.
skipping CVE-2021-39656 as CVE page is older than CVRF-CVE file.
skipping CVE-2021-39636 as CVE page is older than CVRF-CVE file.
skipping CVE-2021-39537 as CVE page is older than CVRF-CVE file.
skipping CVE-2021-39365 as CVE page is older than CVRF-CVE file.
skipping CVE-2021-39359 as CVE page is older than CVRF-CVE file.
skipping CVE-2021-39275 as CVE page is older than CVRF-CVE file.
no cpe found for SUSE Package Hub 15 SP4 in CVE-2021-39214
no cpe found for SUSE Package Hub 15 SP5 in CVE-2021-39214
no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2021-39191
skipping CVE-2021-39212 as CVE page is older than CVRF-CVE file.
no cpe found for SUSE Liberty Linux 7 LTSS in CVE-2021-39154
no cpe found for SUSE Liberty Linux 7 LTSS in CVE-2021-39152
skipping CVE-2021-39153 as CVE page is older than CVRF-CVE file.
no cpe found for SUSE Liberty Linux 7 LTSS in CVE-2021-39151
no cpe found for SUSE Liberty Linux 7 LTSS in CVE-2021-39149
skipping CVE-2021-39150 as CVE page is older than CVRF-CVE file.
no cpe found for SUSE Liberty Linux 7 LTSS in CVE-2021-39148
no cpe found for SUSE Liberty Linux 7 LTSS in CVE-2021-39146
skipping CVE-2021-39147 as CVE page is older than CVRF-CVE file.
no cpe found for SUSE Liberty Linux 7 LTSS in CVE-2021-39145
no cpe found for SUSE Liberty Linux 7 LTSS in CVE-2021-39141
skipping CVE-2021-39144 as CVE page is older than CVRF-CVE file.
no cpe found for SUSE Liberty Linux 7 LTSS in CVE-2021-39140
skipping CVE-2021-39139 as CVE page is older than CVRF-CVE file.
skipping CVE-2021-38604 as CVE page is older than CVRF-CVE file.
skipping CVE-2021-38593 as CVE page is older than CVRF-CVE file.
skipping CVE-2021-38578 as CVE page is older than CVRF-CVE file.
skipping CVE-2021-38510 as CVE page is older than CVRF-CVE file.
skipping CVE-2021-38509 as CVE page is older than CVRF-CVE file.
skipping CVE-2021-38508 as CVE page is older than CVRF-CVE file.
skipping CVE-2021-38507 as CVE page is older than CVRF-CVE file.
skipping CVE-2021-38506 as CVE page is older than CVRF-CVE file.
skipping CVE-2021-38505 as CVE page is older than CVRF-CVE file.
skipping CVE-2021-38504 as CVE page is older than CVRF-CVE file.
skipping CVE-2021-38503 as CVE page is older than CVRF-CVE file.
skipping CVE-2021-38501 as CVE page is older than CVRF-CVE file.
skipping CVE-2021-38500 as CVE page is older than CVRF-CVE file.
skipping CVE-2021-38499 as CVE page is older than CVRF-CVE file.
skipping CVE-2021-38498 as CVE page is older than CVRF-CVE file.
skipping CVE-2021-38497 as CVE page is older than CVRF-CVE file.
skipping CVE-2021-38496 as CVE page is older than CVRF-CVE file.
no cpe found for SUSE Package Hub 15 SP2 in CVE-2021-38385
no cpe found for SUSE Package Hub 15 SP3 in CVE-2021-38385
no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2021-38297
skipping CVE-2021-38300 as CVE page is older than CVRF-CVE file.
notsure where SUSE Linux Enterprise Module for Package Hub 15 SP1 is contained?
notsure where SUSE Linux Enterprise Module for Package Hub 15 is contained?
no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2021-38291
skipping CVE-2021-38209 as CVE page is older than CVRF-CVE file.
skipping CVE-2021-38207 as CVE page is older than CVRF-CVE file.
skipping CVE-2021-38206 as CVE page is older than CVRF-CVE file.
skipping CVE-2021-38205 as CVE page is older than CVRF-CVE file.
skipping CVE-2021-38203 as CVE page is older than CVRF-CVE file.
skipping CVE-2021-38202 as CVE page is older than CVRF-CVE file.
skipping CVE-2021-38201 as CVE page is older than CVRF-CVE file.
skipping CVE-2021-38200 as CVE page is older than CVRF-CVE file.
skipping CVE-2021-38199 as CVE page is older than CVRF-CVE file.
skipping CVE-2021-38185 as CVE page is older than CVRF-CVE file.
skipping CVE-2021-38166 as CVE page is older than CVRF-CVE file.
no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2021-38094
no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2021-38091
no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2021-38090
no cpe found for SUSE Package Hub 15 SP3 in CVE-2021-38022
no cpe found for SUSE Package Hub 15 SP3 in CVE-2021-38021
no cpe found for SUSE Package Hub 15 SP3 in CVE-2021-38020
no cpe found for SUSE Package Hub 15 SP3 in CVE-2021-38019
no cpe found for SUSE Package Hub 15 SP3 in CVE-2021-38018
no cpe found for SUSE Package Hub 15 SP3 in CVE-2021-38017
no cpe found for SUSE Package Hub 15 SP3 in CVE-2021-38016
no cpe found for SUSE Package Hub 15 SP3 in CVE-2021-38015
no cpe found for SUSE Package Hub 15 SP3 in CVE-2021-38014
no cpe found for SUSE Package Hub 15 SP3 in CVE-2021-38013
no cpe found for SUSE Package Hub 15 SP3 in CVE-2021-38012
no cpe found for SUSE Package Hub 15 SP3 in CVE-2021-38011
no cpe found for SUSE Package Hub 15 SP3 in CVE-2021-38010
no cpe found for SUSE Package Hub 15 SP3 in CVE-2021-38009
no cpe found for SUSE Package Hub 15 SP3 in CVE-2021-38008
no cpe found for SUSE Package Hub 15 SP3 in CVE-2021-38007
no cpe found for SUSE Package Hub 15 SP3 in CVE-2021-38006
no cpe found for SUSE Package Hub 15 SP3 in CVE-2021-38005
no cpe found for SUSE Package Hub 15 SP3 in CVE-2021-38003
no cpe found for SUSE Package Hub 15 SP3 in CVE-2021-38002
no cpe found for SUSE Package Hub 15 SP3 in CVE-2021-38001
no cpe found for SUSE Package Hub 15 SP3 in CVE-2021-38000
no cpe found for SUSE Package Hub 15 SP3 in CVE-2021-37999
no cpe found for SUSE Package Hub 15 SP3 in CVE-2021-37998
no cpe found for SUSE Package Hub 15 SP3 in CVE-2021-37997
no cpe found for SUSE Package Hub 15 SP3 in CVE-2021-37996
no cpe found for SUSE Package Hub 15 SP3 in CVE-2021-37995
no cpe found for SUSE Package Hub 15 SP3 in CVE-2021-37994
no cpe found for SUSE Package Hub 15 SP3 in CVE-2021-37993
no cpe found for SUSE Package Hub 15 SP3 in CVE-2021-37992
no cpe found for SUSE Package Hub 15 SP3 in CVE-2021-37991
no cpe found for SUSE Package Hub 15 SP3 in CVE-2021-37990
no cpe found for SUSE Package Hub 15 SP3 in CVE-2021-37989
no cpe found for SUSE Package Hub 15 SP3 in CVE-2021-37988
no cpe found for SUSE Package Hub 15 SP3 in CVE-2021-37987
no cpe found for SUSE Package Hub 15 SP3 in CVE-2021-37986
no cpe found for SUSE Package Hub 15 SP3 in CVE-2021-37985
no cpe found for SUSE Package Hub 15 SP3 in CVE-2021-37984
no cpe found for SUSE Package Hub 15 SP3 in CVE-2021-37983
no cpe found for SUSE Package Hub 15 SP3 in CVE-2021-37982
no cpe found for SUSE Package Hub 15 SP3 in CVE-2021-37981
no cpe found for SUSE Package Hub 15 SP3 in CVE-2021-37976
no cpe found for SUSE Package Hub 15 SP3 in CVE-2021-37975
no cpe found for SUSE Package Hub 15 SP3 in CVE-2021-37974
no cpe found for SUSE Package Hub 15 SP3 in CVE-2021-37973
no cpe found for SUSE Package Hub 15 SP3 in CVE-2021-37972
no cpe found for SUSE Package Hub 15 SP3 in CVE-2021-37971
no cpe found for SUSE Package Hub 15 SP3 in CVE-2021-37970
no cpe found for SUSE Package Hub 15 SP3 in CVE-2021-37969
no cpe found for SUSE Package Hub 15 SP3 in CVE-2021-37968
no cpe found for SUSE Package Hub 15 SP3 in CVE-2021-37967
no cpe found for SUSE Package Hub 15 SP3 in CVE-2021-37966
no cpe found for SUSE Package Hub 15 SP3 in CVE-2021-37965
no cpe found for SUSE Package Hub 15 SP3 in CVE-2021-37964
no cpe found for SUSE Package Hub 15 SP3 in CVE-2021-37963
no cpe found for SUSE Package Hub 15 SP3 in CVE-2021-37962
no cpe found for SUSE Package Hub 15 SP3 in CVE-2021-37961
no cpe found for SUSE Package Hub 15 SP3 in CVE-2021-37960
no cpe found for SUSE Package Hub 15 SP3 in CVE-2021-37959
no cpe found for SUSE Package Hub 15 SP3 in CVE-2021-37958
no cpe found for SUSE Package Hub 15 SP3 in CVE-2021-37957
no cpe found for SUSE Package Hub 15 SP3 in CVE-2021-37956
skipping CVE-2021-37750 as CVE page is older than CVRF-CVE file.
no cpe found for SUSE Package Hub 15 SP3 in CVE-2021-37692
no cpe found for SUSE Package Hub 15 SP3 in CVE-2021-37691
no cpe found for SUSE Package Hub 15 SP3 in CVE-2021-37690
no cpe found for SUSE Package Hub 15 SP3 in CVE-2021-37689
no cpe found for SUSE Package Hub 15 SP3 in CVE-2021-37688
no cpe found for SUSE Package Hub 15 SP3 in CVE-2021-37687
no cpe found for SUSE Package Hub 15 SP3 in CVE-2021-37686
no cpe found for SUSE Package Hub 15 SP3 in CVE-2021-37685
no cpe found for SUSE Package Hub 15 SP3 in CVE-2021-37684
no cpe found for SUSE Package Hub 15 SP3 in CVE-2021-37683
no cpe found for SUSE Package Hub 15 SP3 in CVE-2021-37682
no cpe found for SUSE Package Hub 15 SP3 in CVE-2021-37681
no cpe found for SUSE Package Hub 15 SP3 in CVE-2021-37680
no cpe found for SUSE Package Hub 15 SP3 in CVE-2021-37679
no cpe found for SUSE Package Hub 15 SP3 in CVE-2021-37678
no cpe found for SUSE Package Hub 15 SP3 in CVE-2021-37677
no cpe found for SUSE Package Hub 15 SP3 in CVE-2021-37676
no cpe found for SUSE Package Hub 15 SP3 in CVE-2021-37675
no cpe found for SUSE Package Hub 15 SP3 in CVE-2021-37674
no cpe found for SUSE Package Hub 15 SP3 in CVE-2021-37673
no cpe found for SUSE Package Hub 15 SP3 in CVE-2021-37672
no cpe found for SUSE Package Hub 15 SP3 in CVE-2021-37671
no cpe found for SUSE Package Hub 15 SP3 in CVE-2021-37670
no cpe found for SUSE Package Hub 15 SP3 in CVE-2021-37669
no cpe found for SUSE Package Hub 15 SP3 in CVE-2021-37668
no cpe found for SUSE Package Hub 15 SP3 in CVE-2021-37667
no cpe found for SUSE Package Hub 15 SP3 in CVE-2021-37666
no cpe found for SUSE Package Hub 15 SP3 in CVE-2021-37665
no cpe found for SUSE Package Hub 15 SP3 in CVE-2021-37664
no cpe found for SUSE Package Hub 15 SP3 in CVE-2021-37663
no cpe found for SUSE Package Hub 15 SP3 in CVE-2021-37662
no cpe found for SUSE Package Hub 15 SP3 in CVE-2021-37661
no cpe found for SUSE Package Hub 15 SP3 in CVE-2021-37660
no cpe found for SUSE Package Hub 15 SP3 in CVE-2021-37659
no cpe found for SUSE Package Hub 15 SP3 in CVE-2021-37658
no cpe found for SUSE Package Hub 15 SP3 in CVE-2021-37657
no cpe found for SUSE Package Hub 15 SP3 in CVE-2021-37656
no cpe found for SUSE Package Hub 15 SP3 in CVE-2021-37655
no cpe found for SUSE Package Hub 15 SP3 in CVE-2021-37654
no cpe found for SUSE Package Hub 15 SP3 in CVE-2021-37653
no cpe found for SUSE Package Hub 15 SP3 in CVE-2021-37652
no cpe found for SUSE Package Hub 15 SP3 in CVE-2021-37651
no cpe found for SUSE Package Hub 15 SP3 in CVE-2021-37650
no cpe found for SUSE Package Hub 15 SP3 in CVE-2021-37649
no cpe found for SUSE Package Hub 15 SP3 in CVE-2021-37648
no cpe found for SUSE Package Hub 15 SP3 in CVE-2021-37647
no cpe found for SUSE Package Hub 15 SP3 in CVE-2021-37646
no cpe found for SUSE Package Hub 15 SP3 in CVE-2021-37645
no cpe found for SUSE Package Hub 15 SP3 in CVE-2021-37644
no cpe found for SUSE Package Hub 15 SP3 in CVE-2021-37643
no cpe found for SUSE Package Hub 15 SP3 in CVE-2021-37642
no cpe found for SUSE Package Hub 15 SP3 in CVE-2021-37641
no cpe found for SUSE Package Hub 15 SP3 in CVE-2021-37640
no cpe found for SUSE Package Hub 15 SP3 in CVE-2021-37639
no cpe found for SUSE Package Hub 15 SP3 in CVE-2021-37638
no cpe found for SUSE Package Hub 15 SP3 in CVE-2021-37637
no cpe found for SUSE Package Hub 15 SP3 in CVE-2021-37636
no cpe found for SUSE Package Hub 15 SP3 in CVE-2021-37635
no cpe found for SUSE Package Hub 15 SP3 in CVE-2021-37601
skipping CVE-2021-37623 as CVE page is older than CVRF-CVE file.
skipping CVE-2021-37622 as CVE page is older than CVRF-CVE file.
skipping CVE-2021-37621 as CVE page is older than CVRF-CVE file.
skipping CVE-2021-37620 as CVE page is older than CVRF-CVE file.
skipping CVE-2021-37619 as CVE page is older than CVRF-CVE file.
skipping CVE-2021-37618 as CVE page is older than CVRF-CVE file.
skipping CVE-2021-37616 as CVE page is older than CVRF-CVE file.
skipping CVE-2021-37615 as CVE page is older than CVRF-CVE file.
skipping CVE-2021-37600 as CVE page is older than CVRF-CVE file.
skipping CVE-2021-37577 as CVE page is older than CVRF-CVE file.
CVE-2021-37533: no packages for SUSE Linux Enterprise Module for Web and Scripting 15 SP4, but entry?
CVE-2021-37533: no packages for Image SLES15-SP4-SAPCAL-EC2, but entry?
CVE-2021-37533: no packages for Image SLES15-SP5-SAPCAL-EC2, but entry?
CVE-2021-37533: no packages for Image SLES15-SP4-SAPCAL-Azure, but entry?
CVE-2021-37533: no packages for Image SLES15-SP4-SAP-EC2, but entry?
CVE-2021-37533: no packages for SUSE Linux Enterprise Server for SAP Applications 15 SP1, but entry?
CVE-2021-37533: no packages for Container bci/openjdk:11-7.1, but entry?
CVE-2021-37533: no packages for SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS, but entry?
CVE-2021-37533: no packages for Container bci/openjdk-devel:17-14.11, but entry?
CVE-2021-37533: no packages for Image SLES15-SP3-Manager-4-2-Server-BYOS-Azure, but entry?
CVE-2021-37533: no packages for Image SLES15-SP2-SAP-EC2-HVM, but entry?
CVE-2021-37533: no packages for Image SLES15-SP3-SAP-Azure-LI-BYOS-Production, but entry?
CVE-2021-37533: no packages for Image SLES15-SP6-SAP-EC2, but entry?
CVE-2021-37533: no packages for Image SLES15-SP3-Manager-4-2-Server-BYOS-EC2-HVM, but entry?
CVE-2021-37533: no packages for Image SLES15-SP4-Manager-Server-4-3-BYOS-GCE, but entry?
CVE-2021-37533: no packages for Image SLES15-SP6-SAP-Azure, but entry?
CVE-2021-37533: no packages for Image SLES15-SP5-SAPCAL-GCE, but entry?
CVE-2021-37533: no packages for Image SLES15-SP4-Manager-Server-4-3-BYOS-EC2, but entry?
CVE-2021-37533: no packages for SUSE Linux Enterprise Server 15 SP1-LTSS, but entry?
CVE-2021-37533: no packages for Image SLES15-SP6-SAP-Azure-VLI-BYOS, but entry?
CVE-2021-37533: no packages for Image SLES15-SP5-SAP-Azure, but entry?
CVE-2021-37533: no packages for Image SLES15-SP6-SAPCAL-Azure, but entry?
CVE-2021-37533: no packages for Image SLES15-SP5-SAP-Azure-VLI-BYOS-Production, but entry?
CVE-2021-37533: no packages for Image SLES15-SP4-Manager-Server-4-3-Azure-llc, but entry?
CVE-2021-37533: no packages for Image SLES15-SP2-SAP-BYOS-GCE, but entry?
CVE-2021-37533: no packages for Image SLES15-SP3-SAPCAL-Azure, but entry?
CVE-2021-37533: no packages for Image SLES15-SP5-SAP-Azure-LI-BYOS-Production, but entry?
CVE-2021-37533: no packages for SUSE Linux Enterprise Module for Basesystem 15 SP6, but entry?
CVE-2021-37533: no packages for Image SLES15-SP6-SAPCAL, but entry?
CVE-2021-37533: no packages for Image SLES15-SP5-SAP-Azure-VLI-BYOS, but entry?
CVE-2021-37533: no packages for SUSE Linux Enterprise Module for Web and Scripting 15 SP5, but entry?
CVE-2021-37533: no packages for Image SLES15-SP4-Manager-Server-4-3-Azure-ltd, but entry?
CVE-2021-37533: no packages for Image SLES15-SP3-Manager-4-2-Server-BYOS-GCE, but entry?
CVE-2021-37533: no packages for Image SLES15-SP4-Manager-Server-4-3, but entry?
CVE-2021-37533: no packages for SUSE Manager Proxy 4.2, but entry?
CVE-2021-37533: no packages for SUSE Linux Enterprise Module for Package Hub 15 SP5, but entry?
CVE-2021-37533: no packages for Image SLES15-SP4-SAP-Azure, but entry?
CVE-2021-37533: no packages for SUSE Linux Enterprise Workstation Extension 15 SP4, but entry?
CVE-2021-37533: no packages for Image SLES15-SP2-SAP-Azure, but entry?
CVE-2021-37533: no packages for SUSE Linux Enterprise Module for Basesystem 15 SP5, but entry?
CVE-2021-37533: no packages for Image SLES15-SP4-SAP-Azure-LI-BYOS-Production, but entry?
CVE-2021-37533: no packages for Image SLES15-SP2-SAP-Azure-LI-BYOS-Production, but entry?
CVE-2021-37533: no packages for Image SLES15-SP4-Manager-Server-4-3-BYOS, but entry?
CVE-2021-37533: no packages for Container bci/kiwi:9.24.43-8.6, but entry?
CVE-2021-37533: no packages for Image SLES15-SP2-SAP-GCE, but entry?
CVE-2021-37533: no packages for SUSE Manager Server Module 4.3, but entry?
CVE-2021-37533: no packages for Image SLES15-SP6-SAP-Azure-VLI-BYOS-Production, but entry?
CVE-2021-37533: no packages for SUSE Linux Enterprise Workstation Extension 15 SP6, but entry?
CVE-2021-37533: no packages for Image SLES15-SP4-SAP-GCE, but entry?
CVE-2021-37533: no packages for Image SLES15-SP4-SAP-Azure-VLI-BYOS, but entry?
CVE-2021-37533: no packages for Image SLES15-SP6-SAP-Azure-LI-BYOS, but entry?
CVE-2021-37533: no packages for SUSE Linux Enterprise Server 15 SP4-TERADATA, but entry?
CVE-2021-37533: no packages for Image SLES15-SP6-SAP-GCE, but entry?
CVE-2021-37533: no packages for Image SLES15-SP4-Manager-Server-4-3-BYOS-Azure, but entry?
CVE-2021-37533: no packages for Container bci/openjdk-devel:11-6.2, but entry?
CVE-2021-37533: no packages for Image SLES15-SP6-SAPCAL-GCE, but entry?
CVE-2021-37533: no packages for Image SLES15-SP4-SAP-Azure-VLI-BYOS-Production, but entry?
CVE-2021-37533: no packages for SUSE Manager Server Module 4.2, but entry?
CVE-2021-37533: no packages for Image SLES15-SP5-SAP-Azure-LI-BYOS, but entry?
CVE-2021-37533: no packages for Container bci/openjdk-devel:17-7.2, but entry?
CVE-2021-37533: no packages for Image SLES15-SP5-SAPCAL-Azure, but entry?
CVE-2021-37533: no packages for Image SLES15-SP5-SAP-GCE, but entry?
CVE-2021-37533: no packages for SUSE Linux Enterprise Workstation Extension 15 SP5, but entry?
CVE-2021-37533: no packages for Container suse/manager/5.0/x86_64/server-attestation:5.0.0-beta2.2.16, but entry?
CVE-2021-37533: no packages for Image SLES15-SP2-SAP-Azure-VLI-BYOS-Production, but entry?
CVE-2021-37533: no packages for Image SLES15-SP2-SAP-BYOS-EC2-HVM, but entry?
CVE-2021-37533: no packages for SUSE CaaS Platform 4.0, but entry?
CVE-2021-37533: no packages for Container bci/openjdk:17-7.1, but entry?
CVE-2021-37533: no packages for SUSE Linux Enterprise Module for Basesystem 15 SP4, but entry?
CVE-2021-37533: no packages for SUSE Linux Enterprise Module for Package Hub 15 SP6, but entry?
CVE-2021-37533: no packages for Image SLES15-SP4-Manager-Server-4-3-EC2-ltd, but entry?
CVE-2021-37533: no packages for Image SLES15-SP3-SAP-Azure-VLI-BYOS-Production, but entry?
CVE-2021-37533: no packages for Image SLES15-SP5-SAP-EC2, but entry?
CVE-2021-37533: no packages for Image SLES15-SP2-SAP-BYOS-Azure, but entry?
CVE-2021-37533: no packages for Image SLES15-SP6-SAPCAL-EC2, but entry?
CVE-2021-37533: no packages for Image SLES15-SP4-SAPCAL, but entry?
CVE-2021-37533: no packages for SUSE Linux Enterprise Module for Web and Scripting 15 SP6, but entry?
CVE-2021-37533: no packages for Container bci/openjdk:latest, but entry?
CVE-2021-37533: no packages for Image SLES15-SP4-SAP, but entry?
CVE-2021-37533: no packages for SUSE Manager Retail Branch Server 4.2, but entry?
CVE-2021-37533: no packages for Image SLES15-SP4-Manager-Server-4-3-EC2-llc, but entry?
CVE-2021-37533: no packages for SUSE Linux Enterprise Module for Package Hub 15 SP4, but entry?
CVE-2021-37533: no packages for Image SLES15-SP6-SAP-Azure-LI-BYOS-Production, but entry?
CVE-2021-37533: no packages for Image SLES15-SP6-SAP, but entry?
CVE-2021-37533: no packages for Image SLES15-SP3-SAPCAL-GCE, but entry?
CVE-2021-37533: no packages for Image SLES15-SP4-SAPCAL-GCE, but entry?
CVE-2021-37533: no packages for Container suse/manager/5.0/x86_64/server:5.0.0-beta1.2.122, but entry?
CVE-2021-37533: no packages for Image SLES15-SP4-SAP-Azure-LI-BYOS, but entry?
CVE-2021-37533: no packages for SUSE Manager Server 4.2, but entry?
CVE-2021-37533: no packages for Image SLES15-SP3-SAPCAL-EC2-HVM, but entry?
CVE-2021-37533: no packages for Container bci/kiwi:9.24.43-8.6, but entry?
CVE-2021-37533: no packages for Container bci/openjdk-devel:11-6.2, but entry?
CVE-2021-37533: no packages for Container bci/openjdk-devel:17-14.11, but entry?
CVE-2021-37533: no packages for Container bci/openjdk-devel:17-7.2, but entry?
CVE-2021-37533: no packages for Container bci/openjdk:11-7.1, but entry?
CVE-2021-37533: no packages for Container bci/openjdk:17-7.1, but entry?
CVE-2021-37533: no packages for Container bci/openjdk:latest, but entry?
CVE-2021-37533: no packages for Container suse/manager/5.0/x86_64/server-attestation:5.0.0-beta2.2.16, but entry?
CVE-2021-37533: no packages for Container suse/manager/5.0/x86_64/server:5.0.0-beta1.2.122, but entry?
CVE-2021-37533: no packages for Image SLES15-SP2-SAP-Azure, but entry?
CVE-2021-37533: no packages for Image SLES15-SP2-SAP-Azure-LI-BYOS-Production, but entry?
CVE-2021-37533: no packages for Image SLES15-SP2-SAP-Azure-VLI-BYOS-Production, but entry?
CVE-2021-37533: no packages for Image SLES15-SP2-SAP-BYOS-Azure, but entry?
CVE-2021-37533: no packages for Image SLES15-SP2-SAP-BYOS-EC2-HVM, but entry?
CVE-2021-37533: no packages for Image SLES15-SP2-SAP-BYOS-GCE, but entry?
CVE-2021-37533: no packages for Image SLES15-SP2-SAP-EC2-HVM, but entry?
CVE-2021-37533: no packages for Image SLES15-SP2-SAP-GCE, but entry?
CVE-2021-37533: no packages for Image SLES15-SP3-Manager-4-2-Server-BYOS-Azure, but entry?
CVE-2021-37533: no packages for Image SLES15-SP3-Manager-4-2-Server-BYOS-EC2-HVM, but entry?
CVE-2021-37533: no packages for Image SLES15-SP3-Manager-4-2-Server-BYOS-GCE, but entry?
CVE-2021-37533: no packages for Image SLES15-SP3-SAP-Azure-LI-BYOS-Production, but entry?
CVE-2021-37533: no packages for Image SLES15-SP3-SAP-Azure-VLI-BYOS-Production, but entry?
CVE-2021-37533: no packages for Image SLES15-SP3-SAPCAL-Azure, but entry?
CVE-2021-37533: no packages for Image SLES15-SP3-SAPCAL-EC2-HVM, but entry?
CVE-2021-37533: no packages for Image SLES15-SP3-SAPCAL-GCE, but entry?
CVE-2021-37533: no packages for Image SLES15-SP4-Manager-Server-4-3, but entry?
CVE-2021-37533: no packages for Image SLES15-SP4-Manager-Server-4-3-Azure-llc, but entry?
CVE-2021-37533: no packages for Image SLES15-SP4-Manager-Server-4-3-Azure-ltd, but entry?
CVE-2021-37533: no packages for Image SLES15-SP4-Manager-Server-4-3-BYOS, but entry?
CVE-2021-37533: no packages for Image SLES15-SP4-Manager-Server-4-3-BYOS-Azure, but entry?
CVE-2021-37533: no packages for Image SLES15-SP4-Manager-Server-4-3-BYOS-EC2, but entry?
CVE-2021-37533: no packages for Image SLES15-SP4-Manager-Server-4-3-BYOS-GCE, but entry?
CVE-2021-37533: no packages for Image SLES15-SP4-Manager-Server-4-3-EC2-llc, but entry?
CVE-2021-37533: no packages for Image SLES15-SP4-Manager-Server-4-3-EC2-ltd, but entry?
CVE-2021-37533: no packages for Image SLES15-SP4-SAP, but entry?
CVE-2021-37533: no packages for Image SLES15-SP4-SAP-Azure, but entry?
CVE-2021-37533: no packages for Image SLES15-SP4-SAP-Azure-LI-BYOS, but entry?
CVE-2021-37533: no packages for Image SLES15-SP4-SAP-Azure-LI-BYOS-Production, but entry?
CVE-2021-37533: no packages for Image SLES15-SP4-SAP-Azure-VLI-BYOS, but entry?
CVE-2021-37533: no packages for Image SLES15-SP4-SAP-Azure-VLI-BYOS-Production, but entry?
CVE-2021-37533: no packages for Image SLES15-SP4-SAP-EC2, but entry?
CVE-2021-37533: no packages for Image SLES15-SP4-SAP-GCE, but entry?
CVE-2021-37533: no packages for Image SLES15-SP4-SAPCAL, but entry?
CVE-2021-37533: no packages for Image SLES15-SP4-SAPCAL-Azure, but entry?
CVE-2021-37533: no packages for Image SLES15-SP4-SAPCAL-EC2, but entry?
CVE-2021-37533: no packages for Image SLES15-SP4-SAPCAL-GCE, but entry?
CVE-2021-37533: no packages for Image SLES15-SP5-SAP-Azure, but entry?
CVE-2021-37533: no packages for Image SLES15-SP5-SAP-Azure-LI-BYOS, but entry?
CVE-2021-37533: no packages for Image SLES15-SP5-SAP-Azure-LI-BYOS-Production, but entry?
CVE-2021-37533: no packages for Image SLES15-SP5-SAP-Azure-VLI-BYOS, but entry?
CVE-2021-37533: no packages for Image SLES15-SP5-SAP-Azure-VLI-BYOS-Production, but entry?
CVE-2021-37533: no packages for Image SLES15-SP5-SAP-EC2, but entry?
CVE-2021-37533: no packages for Image SLES15-SP5-SAP-GCE, but entry?
CVE-2021-37533: no packages for Image SLES15-SP5-SAPCAL-Azure, but entry?
CVE-2021-37533: no packages for Image SLES15-SP5-SAPCAL-EC2, but entry?
CVE-2021-37533: no packages for Image SLES15-SP5-SAPCAL-GCE, but entry?
CVE-2021-37533: no packages for Image SLES15-SP6-SAP, but entry?
CVE-2021-37533: no packages for Image SLES15-SP6-SAP-Azure, but entry?
CVE-2021-37533: no packages for Image SLES15-SP6-SAP-Azure-LI-BYOS, but entry?
CVE-2021-37533: no packages for Image SLES15-SP6-SAP-Azure-LI-BYOS-Production, but entry?
CVE-2021-37533: no packages for Image SLES15-SP6-SAP-Azure-VLI-BYOS, but entry?
CVE-2021-37533: no packages for Image SLES15-SP6-SAP-Azure-VLI-BYOS-Production, but entry?
CVE-2021-37533: no packages for Image SLES15-SP6-SAP-EC2, but entry?
CVE-2021-37533: no packages for Image SLES15-SP6-SAP-GCE, but entry?
CVE-2021-37533: no packages for Image SLES15-SP6-SAPCAL, but entry?
CVE-2021-37533: no packages for Image SLES15-SP6-SAPCAL-Azure, but entry?
CVE-2021-37533: no packages for Image SLES15-SP6-SAPCAL-EC2, but entry?
CVE-2021-37533: no packages for Image SLES15-SP6-SAPCAL-GCE, but entry?
CVE-2021-37533: no packages for SUSE CaaS Platform 4.0, but entry?
CVE-2021-37533: no packages for SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS, but entry?
CVE-2021-37533: no packages for SUSE Linux Enterprise Module for Basesystem 15 SP4, but entry?
CVE-2021-37533: no packages for SUSE Linux Enterprise Module for Basesystem 15 SP5, but entry?
CVE-2021-37533: no packages for SUSE Linux Enterprise Module for Basesystem 15 SP6, but entry?
CVE-2021-37533: no packages for SUSE Linux Enterprise Module for Package Hub 15 SP4, but entry?
CVE-2021-37533: no packages for SUSE Linux Enterprise Module for Package Hub 15 SP5, but entry?
CVE-2021-37533: no packages for SUSE Linux Enterprise Module for Package Hub 15 SP6, but entry?
CVE-2021-37533: no packages for SUSE Linux Enterprise Module for Web and Scripting 15 SP4, but entry?
CVE-2021-37533: no packages for SUSE Linux Enterprise Module for Web and Scripting 15 SP5, but entry?
CVE-2021-37533: no packages for SUSE Linux Enterprise Module for Web and Scripting 15 SP6, but entry?
CVE-2021-37533: no packages for SUSE Linux Enterprise Server 15 SP1-LTSS, but entry?
CVE-2021-37533: no packages for SUSE Linux Enterprise Server 15 SP4-TERADATA, but entry?
CVE-2021-37533: no packages for SUSE Linux Enterprise Server for SAP Applications 15 SP1, but entry?
CVE-2021-37533: no packages for SUSE Linux Enterprise Workstation Extension 15 SP4, but entry?
CVE-2021-37533: no packages for SUSE Linux Enterprise Workstation Extension 15 SP5, but entry?
CVE-2021-37533: no packages for SUSE Linux Enterprise Workstation Extension 15 SP6, but entry?
CVE-2021-37533: no packages for SUSE Manager Proxy 4.2, but entry?
CVE-2021-37533: no packages for SUSE Manager Retail Branch Server 4.2, but entry?
CVE-2021-37533: no packages for SUSE Manager Server 4.2, but entry?
CVE-2021-37533: no packages for SUSE Manager Server Module 4.2, but entry?
CVE-2021-37533: no packages for SUSE Manager Server Module 4.3, but entry?
CVE-2021-37533: no packages for Container bci/kiwi:9.24.43-8.6, but entry?
CVE-2021-37533: no packages for Container bci/openjdk-devel:11-6.2, but entry?
CVE-2021-37533: no packages for Container bci/openjdk-devel:17-14.11, but entry?
CVE-2021-37533: no packages for Container bci/openjdk-devel:17-7.2, but entry?
CVE-2021-37533: no packages for Container bci/openjdk:11-7.1, but entry?
CVE-2021-37533: no packages for Container bci/openjdk:17-7.1, but entry?
CVE-2021-37533: no packages for Container bci/openjdk:latest, but entry?
CVE-2021-37533: no packages for Container suse/manager/5.0/x86_64/server-attestation:5.0.0-beta2.2.16, but entry?
CVE-2021-37533: no packages for Container suse/manager/5.0/x86_64/server:5.0.0-beta1.2.122, but entry?
CVE-2021-37533: no packages for Image SLES15-SP2-SAP-Azure, but entry?
CVE-2021-37533: no packages for Image SLES15-SP2-SAP-Azure-LI-BYOS-Production, but entry?
CVE-2021-37533: no packages for Image SLES15-SP2-SAP-Azure-VLI-BYOS-Production, but entry?
CVE-2021-37533: no packages for Image SLES15-SP2-SAP-BYOS-Azure, but entry?
CVE-2021-37533: no packages for Image SLES15-SP2-SAP-BYOS-EC2-HVM, but entry?
CVE-2021-37533: no packages for Image SLES15-SP2-SAP-BYOS-GCE, but entry?
CVE-2021-37533: no packages for Image SLES15-SP2-SAP-EC2-HVM, but entry?
CVE-2021-37533: no packages for Image SLES15-SP2-SAP-GCE, but entry?
CVE-2021-37533: no packages for Image SLES15-SP3-Manager-4-2-Server-BYOS-Azure, but entry?
CVE-2021-37533: no packages for Image SLES15-SP3-Manager-4-2-Server-BYOS-EC2-HVM, but entry?
CVE-2021-37533: no packages for Image SLES15-SP3-Manager-4-2-Server-BYOS-GCE, but entry?
CVE-2021-37533: no packages for Image SLES15-SP3-SAP-Azure-LI-BYOS-Production, but entry?
CVE-2021-37533: no packages for Image SLES15-SP3-SAP-Azure-VLI-BYOS-Production, but entry?
CVE-2021-37533: no packages for Image SLES15-SP3-SAPCAL-Azure, but entry?
CVE-2021-37533: no packages for Image SLES15-SP3-SAPCAL-EC2-HVM, but entry?
CVE-2021-37533: no packages for Image SLES15-SP3-SAPCAL-GCE, but entry?
CVE-2021-37533: no packages for Image SLES15-SP4-Manager-Server-4-3, but entry?
CVE-2021-37533: no packages for Image SLES15-SP4-Manager-Server-4-3-Azure-llc, but entry?
CVE-2021-37533: no packages for Image SLES15-SP4-Manager-Server-4-3-Azure-ltd, but entry?
CVE-2021-37533: no packages for Image SLES15-SP4-Manager-Server-4-3-BYOS, but entry?
CVE-2021-37533: no packages for Image SLES15-SP4-Manager-Server-4-3-BYOS-Azure, but entry?
CVE-2021-37533: no packages for Image SLES15-SP4-Manager-Server-4-3-BYOS-EC2, but entry?
CVE-2021-37533: no packages for Image SLES15-SP4-Manager-Server-4-3-BYOS-GCE, but entry?
CVE-2021-37533: no packages for Image SLES15-SP4-Manager-Server-4-3-EC2-llc, but entry?
CVE-2021-37533: no packages for Image SLES15-SP4-Manager-Server-4-3-EC2-ltd, but entry?
CVE-2021-37533: no packages for Image SLES15-SP4-SAP, but entry?
CVE-2021-37533: no packages for Image SLES15-SP4-SAP-Azure, but entry?
CVE-2021-37533: no packages for Image SLES15-SP4-SAP-Azure-LI-BYOS, but entry?
CVE-2021-37533: no packages for Image SLES15-SP4-SAP-Azure-LI-BYOS-Production, but entry?
CVE-2021-37533: no packages for Image SLES15-SP4-SAP-Azure-VLI-BYOS, but entry?
CVE-2021-37533: no packages for Image SLES15-SP4-SAP-Azure-VLI-BYOS-Production, but entry?
CVE-2021-37533: no packages for Image SLES15-SP4-SAP-EC2, but entry?
CVE-2021-37533: no packages for Image SLES15-SP4-SAP-GCE, but entry?
CVE-2021-37533: no packages for Image SLES15-SP4-SAPCAL, but entry?
CVE-2021-37533: no packages for Image SLES15-SP4-SAPCAL-Azure, but entry?
CVE-2021-37533: no packages for Image SLES15-SP4-SAPCAL-EC2, but entry?
CVE-2021-37533: no packages for Image SLES15-SP4-SAPCAL-GCE, but entry?
CVE-2021-37533: no packages for Image SLES15-SP5-SAP-Azure, but entry?
CVE-2021-37533: no packages for Image SLES15-SP5-SAP-Azure-LI-BYOS, but entry?
CVE-2021-37533: no packages for Image SLES15-SP5-SAP-Azure-LI-BYOS-Production, but entry?
CVE-2021-37533: no packages for Image SLES15-SP5-SAP-Azure-VLI-BYOS, but entry?
CVE-2021-37533: no packages for Image SLES15-SP5-SAP-Azure-VLI-BYOS-Production, but entry?
CVE-2021-37533: no packages for Image SLES15-SP5-SAP-EC2, but entry?
CVE-2021-37533: no packages for Image SLES15-SP5-SAP-GCE, but entry?
CVE-2021-37533: no packages for Image SLES15-SP5-SAPCAL-Azure, but entry?
CVE-2021-37533: no packages for Image SLES15-SP5-SAPCAL-EC2, but entry?
CVE-2021-37533: no packages for Image SLES15-SP5-SAPCAL-GCE, but entry?
CVE-2021-37533: no packages for Image SLES15-SP6-SAP, but entry?
CVE-2021-37533: no packages for Image SLES15-SP6-SAP-Azure, but entry?
CVE-2021-37533: no packages for Image SLES15-SP6-SAP-Azure-LI-BYOS, but entry?
CVE-2021-37533: no packages for Image SLES15-SP6-SAP-Azure-LI-BYOS-Production, but entry?
CVE-2021-37533: no packages for Image SLES15-SP6-SAP-Azure-VLI-BYOS, but entry?
CVE-2021-37533: no packages for Image SLES15-SP6-SAP-Azure-VLI-BYOS-Production, but entry?
CVE-2021-37533: no packages for Image SLES15-SP6-SAP-EC2, but entry?
CVE-2021-37533: no packages for Image SLES15-SP6-SAP-GCE, but entry?
CVE-2021-37533: no packages for Image SLES15-SP6-SAPCAL, but entry?
CVE-2021-37533: no packages for Image SLES15-SP6-SAPCAL-Azure, but entry?
CVE-2021-37533: no packages for Image SLES15-SP6-SAPCAL-EC2, but entry?
CVE-2021-37533: no packages for Image SLES15-SP6-SAPCAL-GCE, but entry?
CVE-2021-37533: no packages for SUSE CaaS Platform 4.0, but entry?
CVE-2021-37533: no packages for SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS, but entry?
CVE-2021-37533: no packages for SUSE Linux Enterprise Module for Basesystem 15 SP4, but entry?
CVE-2021-37533: no packages for SUSE Linux Enterprise Module for Basesystem 15 SP5, but entry?
CVE-2021-37533: no packages for SUSE Linux Enterprise Module for Basesystem 15 SP6, but entry?
CVE-2021-37533: no packages for SUSE Linux Enterprise Module for Package Hub 15 SP4, but entry?
CVE-2021-37533: no packages for SUSE Linux Enterprise Module for Package Hub 15 SP5, but entry?
CVE-2021-37533: no packages for SUSE Linux Enterprise Module for Package Hub 15 SP6, but entry?
CVE-2021-37533: no packages for SUSE Linux Enterprise Module for Web and Scripting 15 SP4, but entry?
CVE-2021-37533: no packages for SUSE Linux Enterprise Module for Web and Scripting 15 SP5, but entry?
CVE-2021-37533: no packages for SUSE Linux Enterprise Module for Web and Scripting 15 SP6, but entry?
CVE-2021-37533: no packages for SUSE Linux Enterprise Server 15 SP1-LTSS, but entry?
CVE-2021-37533: no packages for SUSE Linux Enterprise Server 15 SP4-TERADATA, but entry?
CVE-2021-37533: no packages for SUSE Linux Enterprise Server for SAP Applications 15 SP1, but entry?
CVE-2021-37533: no packages for SUSE Linux Enterprise Workstation Extension 15 SP4, but entry?
CVE-2021-37533: no packages for SUSE Linux Enterprise Workstation Extension 15 SP5, but entry?
CVE-2021-37533: no packages for SUSE Linux Enterprise Workstation Extension 15 SP6, but entry?
CVE-2021-37533: no packages for SUSE Manager Proxy 4.2, but entry?
CVE-2021-37533: no packages for SUSE Manager Retail Branch Server 4.2, but entry?
CVE-2021-37533: no packages for SUSE Manager Server 4.2, but entry?
CVE-2021-37533: no packages for SUSE Manager Server Module 4.2, but entry?
CVE-2021-37533: no packages for SUSE Manager Server Module 4.3, but entry?
skipping CVE-2021-37322 as CVE page is older than CVRF-CVE file.
skipping CVE-2021-37137 as CVE page is older than CVRF-CVE file.
skipping CVE-2021-37136 as CVE page is older than CVRF-CVE file.
no cpe found for SUSE Package Hub 15 SP4 in CVE-2021-36977
skipping CVE-2021-36980 as CVE page is older than CVRF-CVE file.
skipping CVE-2021-36978 as CVE page is older than CVRF-CVE file.
skipping CVE-2021-36976 as CVE page is older than CVRF-CVE file.
skipping CVE-2021-36770 as CVE page is older than CVRF-CVE file.
no cpe found for SUSE Package Hub 15 SP3 in CVE-2021-36740
no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2021-36690
skipping CVE-2021-36493 as CVE page is older than CVRF-CVE file.
skipping CVE-2021-36386 as CVE page is older than CVRF-CVE file.
CVE-2021-36374: no packages for Image SLES15-SP4-SAPCAL-GCE, but entry?
CVE-2021-36374: no packages for Image SLES15-SP6-SAP, but entry?
CVE-2021-36374: no packages for Image SLES15-SP3-SAPCAL-GCE, but entry?
CVE-2021-36374: no packages for Image SLES15-SP3-SAPCAL-EC2-HVM, but entry?
CVE-2021-36374: no packages for SUSE Manager Server 4.2, but entry?
CVE-2021-36374: no packages for Image SLES15-SP4-SAP-Azure-LI-BYOS, but entry?
CVE-2021-36374: no packages for SUSE Manager Retail Branch Server 4.2, but entry?
CVE-2021-36374: no packages for Image SLES15-SP4-SAP, but entry?
CVE-2021-36374: no packages for Image SLES15-SP6-SAP-Azure-LI-BYOS-Production, but entry?
CVE-2021-36374: no packages for SUSE Linux Enterprise Module for Package Hub 15 SP4, but entry?
CVE-2021-36374: no packages for Image SLES15-SP2-SAP-BYOS-Azure, but entry?
CVE-2021-36374: no packages for Image SLES15-SP5-SAP-EC2, but entry?
CVE-2021-36374: no packages for Container bci/openjdk:latest, but entry?
CVE-2021-36374: no packages for SUSE Linux Enterprise Module for Web and Scripting 15 SP6, but entry?
CVE-2021-36374: no packages for Image SLES15-SP4-SAPCAL, but entry?
CVE-2021-36374: no packages for Image SLES15-SP6-SAPCAL-EC2, but entry?
CVE-2021-36374: no packages for SUSE Linux Enterprise Module for Basesystem 15 SP4, but entry?
CVE-2021-36374: no packages for Container bci/openjdk:17-7.1, but entry?
CVE-2021-36374: no packages for Image SLES15-SP3-SAP-Azure-VLI-BYOS-Production, but entry?
CVE-2021-36374: no packages for Image SLES15-SP2-SAP-Azure-VLI-BYOS-Production, but entry?
CVE-2021-36374: no packages for Image SLES15-SP2-SAP-BYOS-EC2-HVM, but entry?
CVE-2021-36374: no packages for Container suse/manager/5.0/x86_64/server-attestation:5.0.0-beta2.2.16, but entry?
CVE-2021-36374: no packages for SUSE CaaS Platform 4.0, but entry?
CVE-2021-36374: no packages for Image SLES15-SP4-SAP-Azure-VLI-BYOS-Production, but entry?
CVE-2021-36374: no packages for Image SLES15-SP5-SAP-Azure-LI-BYOS, but entry?
CVE-2021-36374: no packages for Image SLES15-SP6-SAP-GCE, but entry?
CVE-2021-36374: no packages for Image SLES15-SP6-SAPCAL-GCE, but entry?
CVE-2021-36374: no packages for Container bci/openjdk-devel:11-6.2, but entry?
CVE-2021-36374: no packages for Image SLES15-SP5-SAP-GCE, but entry?
CVE-2021-36374: no packages for SUSE Linux Enterprise Workstation Extension 15 SP5, but entry?
CVE-2021-36374: no packages for Container bci/openjdk-devel:17-7.2, but entry?
CVE-2021-36374: no packages for Image SLES15-SP5-SAPCAL-Azure, but entry?
CVE-2021-36374: no packages for Image SLES15-SP6-SAP-Azure-VLI-BYOS-Production, but entry?
CVE-2021-36374: no packages for SUSE Linux Enterprise Workstation Extension 15 SP6, but entry?
CVE-2021-36374: no packages for SUSE Linux Enterprise Server 15 SP4-TERADATA, but entry?
CVE-2021-36374: no packages for Image SLES15-SP4-SAP-Azure-VLI-BYOS, but entry?
CVE-2021-36374: no packages for Image SLES15-SP6-SAP-Azure-LI-BYOS, but entry?
CVE-2021-36374: no packages for Image SLES15-SP4-SAP-GCE, but entry?
CVE-2021-36374: no packages for Container bci/kiwi:9.24.43-8.6, but entry?
CVE-2021-36374: no packages for Image SLES15-SP2-SAP-GCE, but entry?
CVE-2021-36374: no packages for Image SLES15-SP2-SAP-Azure, but entry?
CVE-2021-36374: no packages for SUSE Linux Enterprise Module for Basesystem 15 SP5, but entry?
CVE-2021-36374: no packages for Image SLES15-SP4-SAP-Azure-LI-BYOS-Production, but entry?
CVE-2021-36374: no packages for Image SLES15-SP2-SAP-Azure-LI-BYOS-Production, but entry?
CVE-2021-36374: no packages for SUSE Manager Proxy 4.2, but entry?
CVE-2021-36374: no packages for SUSE Linux Enterprise Workstation Extension 15 SP4, but entry?
CVE-2021-36374: no packages for Image SLES15-SP4-SAP-Azure, but entry?
CVE-2021-36374: no packages for SUSE Linux Enterprise Module for Web and Scripting 15 SP5, but entry?
CVE-2021-36374: no packages for Image SLES15-SP2-SAP-BYOS-GCE, but entry?
CVE-2021-36374: no packages for Image SLES15-SP5-SAP-Azure-LI-BYOS-Production, but entry?
CVE-2021-36374: no packages for SUSE Linux Enterprise Module for Basesystem 15 SP6, but entry?
CVE-2021-36374: no packages for Image SLES15-SP6-SAPCAL, but entry?
CVE-2021-36374: no packages for Image SLES15-SP5-SAP-Azure-VLI-BYOS, but entry?
CVE-2021-36374: no packages for Image SLES15-SP3-SAPCAL-Azure, but entry?
CVE-2021-36374: no packages for Image SLES15-SP6-SAPCAL-Azure, but entry?
CVE-2021-36374: no packages for Image SLES15-SP6-SAP-Azure-VLI-BYOS, but entry?
CVE-2021-36374: no packages for Image SLES15-SP5-SAP-Azure, but entry?
CVE-2021-36374: no packages for Image SLES15-SP5-SAP-Azure-VLI-BYOS-Production, but entry?
CVE-2021-36374: no packages for Image SLES15-SP6-SAP-Azure, but entry?
CVE-2021-36374: no packages for Image SLES15-SP5-SAPCAL-GCE, but entry?
CVE-2021-36374: no packages for SUSE Linux Enterprise Server 15 SP1-LTSS, but entry?
CVE-2021-36374: no packages for Image SLES15-SP2-SAP-EC2-HVM, but entry?
CVE-2021-36374: no packages for Image SLES15-SP3-SAP-Azure-LI-BYOS-Production, but entry?
CVE-2021-36374: no packages for Image SLES15-SP6-SAP-EC2, but entry?
CVE-2021-36374: no packages for SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS, but entry?
CVE-2021-36374: no packages for Image SLES15-SP4-SAP-EC2, but entry?
CVE-2021-36374: no packages for SUSE Linux Enterprise Server for SAP Applications 15 SP1, but entry?
CVE-2021-36374: no packages for Container bci/openjdk:11-7.1, but entry?
CVE-2021-36374: no packages for Container bci/openjdk-devel:17-14.11, but entry?
CVE-2021-36374: no packages for SUSE Linux Enterprise Module for Web and Scripting 15 SP4, but entry?
CVE-2021-36374: no packages for Image SLES15-SP4-SAPCAL-EC2, but entry?
CVE-2021-36374: no packages for Image SLES15-SP5-SAPCAL-EC2, but entry?
CVE-2021-36374: no packages for Image SLES15-SP4-SAPCAL-Azure, but entry?
CVE-2021-36374: no packages for Container bci/kiwi:9.24.43-8.6, but entry?
CVE-2021-36374: no packages for Container bci/openjdk-devel:11-6.2, but entry?
CVE-2021-36374: no packages for Container bci/openjdk-devel:17-14.11, but entry?
CVE-2021-36374: no packages for Container bci/openjdk-devel:17-7.2, but entry?
CVE-2021-36374: no packages for Container bci/openjdk:11-7.1, but entry?
CVE-2021-36374: no packages for Container bci/openjdk:17-7.1, but entry?
CVE-2021-36374: no packages for Container bci/openjdk:latest, but entry?
CVE-2021-36374: no packages for Container suse/manager/5.0/x86_64/server-attestation:5.0.0-beta2.2.16, but entry?
CVE-2021-36374: no packages for Image SLES15-SP2-SAP-Azure, but entry?
CVE-2021-36374: no packages for Image SLES15-SP2-SAP-Azure-LI-BYOS-Production, but entry?
CVE-2021-36374: no packages for Image SLES15-SP2-SAP-Azure-VLI-BYOS-Production, but entry?
CVE-2021-36374: no packages for Image SLES15-SP2-SAP-BYOS-Azure, but entry?
CVE-2021-36374: no packages for Image SLES15-SP2-SAP-BYOS-EC2-HVM, but entry?
CVE-2021-36374: no packages for Image SLES15-SP2-SAP-BYOS-GCE, but entry?
CVE-2021-36374: no packages for Image SLES15-SP2-SAP-EC2-HVM, but entry?
CVE-2021-36374: no packages for Image SLES15-SP2-SAP-GCE, but entry?
CVE-2021-36374: no packages for Image SLES15-SP3-SAP-Azure-LI-BYOS-Production, but entry?
CVE-2021-36374: no packages for Image SLES15-SP3-SAP-Azure-VLI-BYOS-Production, but entry?
CVE-2021-36374: no packages for Image SLES15-SP3-SAPCAL-Azure, but entry?
CVE-2021-36374: no packages for Image SLES15-SP3-SAPCAL-EC2-HVM, but entry?
CVE-2021-36374: no packages for Image SLES15-SP3-SAPCAL-GCE, but entry?
CVE-2021-36374: no packages for Image SLES15-SP4-SAP, but entry?
CVE-2021-36374: no packages for Image SLES15-SP4-SAP-Azure, but entry?
CVE-2021-36374: no packages for Image SLES15-SP4-SAP-Azure-LI-BYOS, but entry?
CVE-2021-36374: no packages for Image SLES15-SP4-SAP-Azure-LI-BYOS-Production, but entry?
CVE-2021-36374: no packages for Image SLES15-SP4-SAP-Azure-VLI-BYOS, but entry?
CVE-2021-36374: no packages for Image SLES15-SP4-SAP-Azure-VLI-BYOS-Production, but entry?
CVE-2021-36374: no packages for Image SLES15-SP4-SAP-EC2, but entry?
CVE-2021-36374: no packages for Image SLES15-SP4-SAP-GCE, but entry?
CVE-2021-36374: no packages for Image SLES15-SP4-SAPCAL, but entry?
CVE-2021-36374: no packages for Image SLES15-SP4-SAPCAL-Azure, but entry?
CVE-2021-36374: no packages for Image SLES15-SP4-SAPCAL-EC2, but entry?
CVE-2021-36374: no packages for Image SLES15-SP4-SAPCAL-GCE, but entry?
CVE-2021-36374: no packages for Image SLES15-SP5-SAP-Azure, but entry?
CVE-2021-36374: no packages for Image SLES15-SP5-SAP-Azure-LI-BYOS, but entry?
CVE-2021-36374: no packages for Image SLES15-SP5-SAP-Azure-LI-BYOS-Production, but entry?
CVE-2021-36374: no packages for Image SLES15-SP5-SAP-Azure-VLI-BYOS, but entry?
CVE-2021-36374: no packages for Image SLES15-SP5-SAP-Azure-VLI-BYOS-Production, but entry?
CVE-2021-36374: no packages for Image SLES15-SP5-SAP-EC2, but entry?
CVE-2021-36374: no packages for Image SLES15-SP5-SAP-GCE, but entry?
CVE-2021-36374: no packages for Image SLES15-SP5-SAPCAL-Azure, but entry?
CVE-2021-36374: no packages for Image SLES15-SP5-SAPCAL-EC2, but entry?
CVE-2021-36374: no packages for Image SLES15-SP5-SAPCAL-GCE, but entry?
CVE-2021-36374: no packages for Image SLES15-SP6-SAP, but entry?
CVE-2021-36374: no packages for Image SLES15-SP6-SAP-Azure, but entry?
CVE-2021-36374: no packages for Image SLES15-SP6-SAP-Azure-LI-BYOS, but entry?
CVE-2021-36374: no packages for Image SLES15-SP6-SAP-Azure-LI-BYOS-Production, but entry?
CVE-2021-36374: no packages for Image SLES15-SP6-SAP-Azure-VLI-BYOS, but entry?
CVE-2021-36374: no packages for Image SLES15-SP6-SAP-Azure-VLI-BYOS-Production, but entry?
CVE-2021-36374: no packages for Image SLES15-SP6-SAP-EC2, but entry?
CVE-2021-36374: no packages for Image SLES15-SP6-SAP-GCE, but entry?
CVE-2021-36374: no packages for Image SLES15-SP6-SAPCAL, but entry?
CVE-2021-36374: no packages for Image SLES15-SP6-SAPCAL-Azure, but entry?
CVE-2021-36374: no packages for Image SLES15-SP6-SAPCAL-EC2, but entry?
CVE-2021-36374: no packages for Image SLES15-SP6-SAPCAL-GCE, but entry?
CVE-2021-36374: no packages for SUSE CaaS Platform 4.0, but entry?
CVE-2021-36374: no packages for SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS, but entry?
CVE-2021-36374: no packages for SUSE Linux Enterprise Module for Basesystem 15 SP4, but entry?
CVE-2021-36374: no packages for SUSE Linux Enterprise Module for Basesystem 15 SP5, but entry?
CVE-2021-36374: no packages for SUSE Linux Enterprise Module for Basesystem 15 SP6, but entry?
CVE-2021-36374: no packages for SUSE Linux Enterprise Module for Package Hub 15 SP4, but entry?
CVE-2021-36374: no packages for SUSE Linux Enterprise Module for Web and Scripting 15 SP4, but entry?
CVE-2021-36374: no packages for SUSE Linux Enterprise Module for Web and Scripting 15 SP5, but entry?
CVE-2021-36374: no packages for SUSE Linux Enterprise Module for Web and Scripting 15 SP6, but entry?
CVE-2021-36374: no packages for SUSE Linux Enterprise Server 15 SP1-LTSS, but entry?
CVE-2021-36374: no packages for SUSE Linux Enterprise Server 15 SP4-TERADATA, but entry?
CVE-2021-36374: no packages for SUSE Linux Enterprise Server for SAP Applications 15 SP1, but entry?
CVE-2021-36374: no packages for SUSE Linux Enterprise Workstation Extension 15 SP4, but entry?
CVE-2021-36374: no packages for SUSE Linux Enterprise Workstation Extension 15 SP5, but entry?
CVE-2021-36374: no packages for SUSE Linux Enterprise Workstation Extension 15 SP6, but entry?
CVE-2021-36374: no packages for SUSE Manager Proxy 4.2, but entry?
CVE-2021-36374: no packages for SUSE Manager Retail Branch Server 4.2, but entry?
CVE-2021-36374: no packages for SUSE Manager Server 4.2, but entry?
CVE-2021-36374: no packages for Container bci/kiwi:9.24.43-8.6, but entry?
CVE-2021-36374: no packages for Container bci/openjdk-devel:11-6.2, but entry?
CVE-2021-36374: no packages for Container bci/openjdk-devel:17-14.11, but entry?
CVE-2021-36374: no packages for Container bci/openjdk-devel:17-7.2, but entry?
CVE-2021-36374: no packages for Container bci/openjdk:11-7.1, but entry?
CVE-2021-36374: no packages for Container bci/openjdk:17-7.1, but entry?
CVE-2021-36374: no packages for Container bci/openjdk:latest, but entry?
CVE-2021-36374: no packages for Container suse/manager/5.0/x86_64/server-attestation:5.0.0-beta2.2.16, but entry?
CVE-2021-36374: no packages for Image SLES15-SP2-SAP-Azure, but entry?
CVE-2021-36374: no packages for Image SLES15-SP2-SAP-Azure-LI-BYOS-Production, but entry?
CVE-2021-36374: no packages for Image SLES15-SP2-SAP-Azure-VLI-BYOS-Production, but entry?
CVE-2021-36374: no packages for Image SLES15-SP2-SAP-BYOS-Azure, but entry?
CVE-2021-36374: no packages for Image SLES15-SP2-SAP-BYOS-EC2-HVM, but entry?
CVE-2021-36374: no packages for Image SLES15-SP2-SAP-BYOS-GCE, but entry?
CVE-2021-36374: no packages for Image SLES15-SP2-SAP-EC2-HVM, but entry?
CVE-2021-36374: no packages for Image SLES15-SP2-SAP-GCE, but entry?
CVE-2021-36374: no packages for Image SLES15-SP3-SAP-Azure-LI-BYOS-Production, but entry?
CVE-2021-36374: no packages for Image SLES15-SP3-SAP-Azure-VLI-BYOS-Production, but entry?
CVE-2021-36374: no packages for Image SLES15-SP3-SAPCAL-Azure, but entry?
CVE-2021-36374: no packages for Image SLES15-SP3-SAPCAL-EC2-HVM, but entry?
CVE-2021-36374: no packages for Image SLES15-SP3-SAPCAL-GCE, but entry?
CVE-2021-36374: no packages for Image SLES15-SP4-SAP, but entry?
CVE-2021-36374: no packages for Image SLES15-SP4-SAP-Azure, but entry?
CVE-2021-36374: no packages for Image SLES15-SP4-SAP-Azure-LI-BYOS, but entry?
CVE-2021-36374: no packages for Image SLES15-SP4-SAP-Azure-LI-BYOS-Production, but entry?
CVE-2021-36374: no packages for Image SLES15-SP4-SAP-Azure-VLI-BYOS, but entry?
CVE-2021-36374: no packages for Image SLES15-SP4-SAP-Azure-VLI-BYOS-Production, but entry?
CVE-2021-36374: no packages for Image SLES15-SP4-SAP-EC2, but entry?
CVE-2021-36374: no packages for Image SLES15-SP4-SAP-GCE, but entry?
CVE-2021-36374: no packages for Image SLES15-SP4-SAPCAL, but entry?
CVE-2021-36374: no packages for Image SLES15-SP4-SAPCAL-Azure, but entry?
CVE-2021-36374: no packages for Image SLES15-SP4-SAPCAL-EC2, but entry?
CVE-2021-36374: no packages for Image SLES15-SP4-SAPCAL-GCE, but entry?
CVE-2021-36374: no packages for Image SLES15-SP5-SAP-Azure, but entry?
CVE-2021-36374: no packages for Image SLES15-SP5-SAP-Azure-LI-BYOS, but entry?
CVE-2021-36374: no packages for Image SLES15-SP5-SAP-Azure-LI-BYOS-Production, but entry?
CVE-2021-36374: no packages for Image SLES15-SP5-SAP-Azure-VLI-BYOS, but entry?
CVE-2021-36374: no packages for Image SLES15-SP5-SAP-Azure-VLI-BYOS-Production, but entry?
CVE-2021-36374: no packages for Image SLES15-SP5-SAP-EC2, but entry?
CVE-2021-36374: no packages for Image SLES15-SP5-SAP-GCE, but entry?
CVE-2021-36374: no packages for Image SLES15-SP5-SAPCAL-Azure, but entry?
CVE-2021-36374: no packages for Image SLES15-SP5-SAPCAL-EC2, but entry?
CVE-2021-36374: no packages for Image SLES15-SP5-SAPCAL-GCE, but entry?
CVE-2021-36374: no packages for Image SLES15-SP6-SAP, but entry?
CVE-2021-36374: no packages for Image SLES15-SP6-SAP-Azure, but entry?
CVE-2021-36374: no packages for Image SLES15-SP6-SAP-Azure-LI-BYOS, but entry?
CVE-2021-36374: no packages for Image SLES15-SP6-SAP-Azure-LI-BYOS-Production, but entry?
CVE-2021-36374: no packages for Image SLES15-SP6-SAP-Azure-VLI-BYOS, but entry?
CVE-2021-36374: no packages for Image SLES15-SP6-SAP-Azure-VLI-BYOS-Production, but entry?
CVE-2021-36374: no packages for Image SLES15-SP6-SAP-EC2, but entry?
CVE-2021-36374: no packages for Image SLES15-SP6-SAP-GCE, but entry?
CVE-2021-36374: no packages for Image SLES15-SP6-SAPCAL, but entry?
CVE-2021-36374: no packages for Image SLES15-SP6-SAPCAL-Azure, but entry?
CVE-2021-36374: no packages for Image SLES15-SP6-SAPCAL-EC2, but entry?
CVE-2021-36374: no packages for Image SLES15-SP6-SAPCAL-GCE, but entry?
CVE-2021-36374: no packages for SUSE CaaS Platform 4.0, but entry?
CVE-2021-36374: no packages for SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS, but entry?
CVE-2021-36374: no packages for SUSE Linux Enterprise Module for Basesystem 15 SP4, but entry?
CVE-2021-36374: no packages for SUSE Linux Enterprise Module for Basesystem 15 SP5, but entry?
CVE-2021-36374: no packages for SUSE Linux Enterprise Module for Basesystem 15 SP6, but entry?
CVE-2021-36374: no packages for SUSE Linux Enterprise Module for Package Hub 15 SP4, but entry?
CVE-2021-36374: no packages for SUSE Linux Enterprise Module for Web and Scripting 15 SP4, but entry?
CVE-2021-36374: no packages for SUSE Linux Enterprise Module for Web and Scripting 15 SP5, but entry?
CVE-2021-36374: no packages for SUSE Linux Enterprise Module for Web and Scripting 15 SP6, but entry?
CVE-2021-36374: no packages for SUSE Linux Enterprise Server 15 SP1-LTSS, but entry?
CVE-2021-36374: no packages for SUSE Linux Enterprise Server 15 SP4-TERADATA, but entry?
CVE-2021-36374: no packages for SUSE Linux Enterprise Server for SAP Applications 15 SP1, but entry?
CVE-2021-36374: no packages for SUSE Linux Enterprise Workstation Extension 15 SP4, but entry?
CVE-2021-36374: no packages for SUSE Linux Enterprise Workstation Extension 15 SP5, but entry?
CVE-2021-36374: no packages for SUSE Linux Enterprise Workstation Extension 15 SP6, but entry?
CVE-2021-36374: no packages for SUSE Manager Proxy 4.2, but entry?
CVE-2021-36374: no packages for SUSE Manager Retail Branch Server 4.2, but entry?
CVE-2021-36374: no packages for SUSE Manager Server 4.2, but entry?
CVE-2021-36373: no packages for SUSE Linux Enterprise Workstation Extension 15 SP4, but entry?
CVE-2021-36373: no packages for Image SLES15-SP4-SAP-Azure, but entry?
CVE-2021-36373: no packages for SUSE Manager Proxy 4.2, but entry?
CVE-2021-36373: no packages for Image SLES15-SP2-SAP-Azure-LI-BYOS-Production, but entry?
CVE-2021-36373: no packages for Image SLES15-SP4-SAP-Azure-LI-BYOS-Production, but entry?
CVE-2021-36373: no packages for SUSE Linux Enterprise Module for Basesystem 15 SP5, but entry?
CVE-2021-36373: no packages for Image SLES15-SP2-SAP-Azure, but entry?
CVE-2021-36373: no packages for Image SLES15-SP5-SAP-Azure-VLI-BYOS, but entry?
CVE-2021-36373: no packages for Image SLES15-SP6-SAPCAL, but entry?
CVE-2021-36373: no packages for SUSE Linux Enterprise Module for Basesystem 15 SP6, but entry?
CVE-2021-36373: no packages for Image SLES15-SP5-SAP-Azure-LI-BYOS-Production, but entry?
CVE-2021-36373: no packages for Image SLES15-SP3-SAPCAL-Azure, but entry?
CVE-2021-36373: no packages for Image SLES15-SP2-SAP-BYOS-GCE, but entry?
CVE-2021-36373: no packages for SUSE Linux Enterprise Module for Web and Scripting 15 SP5, but entry?
CVE-2021-36373: no packages for SUSE Linux Enterprise Server 15 SP1-LTSS, but entry?
CVE-2021-36373: no packages for Image SLES15-SP5-SAPCAL-GCE, but entry?
CVE-2021-36373: no packages for Image SLES15-SP6-SAP-Azure, but entry?
CVE-2021-36373: no packages for Image SLES15-SP5-SAP-Azure-VLI-BYOS-Production, but entry?
CVE-2021-36373: no packages for Image SLES15-SP6-SAPCAL-Azure, but entry?
CVE-2021-36373: no packages for Image SLES15-SP5-SAP-Azure, but entry?
CVE-2021-36373: no packages for Image SLES15-SP6-SAP-Azure-VLI-BYOS, but entry?
CVE-2021-36373: no packages for Container bci/openjdk-devel:17-14.11, but entry?
CVE-2021-36373: no packages for SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS, but entry?
CVE-2021-36373: no packages for Container bci/openjdk:11-7.1, but entry?
CVE-2021-36373: no packages for SUSE Linux Enterprise Server for SAP Applications 15 SP1, but entry?
CVE-2021-36373: no packages for Image SLES15-SP4-SAP-EC2, but entry?
CVE-2021-36373: no packages for Image SLES15-SP4-SAPCAL-Azure, but entry?
CVE-2021-36373: no packages for Image SLES15-SP5-SAPCAL-EC2, but entry?
CVE-2021-36373: no packages for Image SLES15-SP4-SAPCAL-EC2, but entry?
CVE-2021-36373: no packages for SUSE Linux Enterprise Module for Web and Scripting 15 SP4, but entry?
CVE-2021-36373: no packages for Image SLES15-SP6-SAP-EC2, but entry?
CVE-2021-36373: no packages for Image SLES15-SP3-SAP-Azure-LI-BYOS-Production, but entry?
CVE-2021-36373: no packages for Image SLES15-SP2-SAP-EC2-HVM, but entry?
CVE-2021-36373: no packages for Image SLES15-SP6-SAP-Azure-LI-BYOS-Production, but entry?
CVE-2021-36373: no packages for SUSE Linux Enterprise Module for Package Hub 15 SP4, but entry?
CVE-2021-36373: no packages for SUSE Manager Retail Branch Server 4.2, but entry?
CVE-2021-36373: no packages for Image SLES15-SP4-SAP, but entry?
CVE-2021-36373: no packages for SUSE Manager Server 4.2, but entry?
CVE-2021-36373: no packages for Image SLES15-SP3-SAPCAL-EC2-HVM, but entry?
CVE-2021-36373: no packages for Image SLES15-SP4-SAP-Azure-LI-BYOS, but entry?
CVE-2021-36373: no packages for Image SLES15-SP4-SAPCAL-GCE, but entry?
CVE-2021-36373: no packages for Image SLES15-SP3-SAPCAL-GCE, but entry?
CVE-2021-36373: no packages for Image SLES15-SP6-SAP, but entry?
CVE-2021-36373: no packages for Image SLES15-SP3-SAP-Azure-VLI-BYOS-Production, but entry?
CVE-2021-36373: no packages for SUSE Linux Enterprise Module for Basesystem 15 SP4, but entry?
CVE-2021-36373: no packages for Container bci/openjdk:17-7.1, but entry?
CVE-2021-36373: no packages for Container bci/openjdk:latest, but entry?
CVE-2021-36373: no packages for SUSE Linux Enterprise Module for Web and Scripting 15 SP6, but entry?
CVE-2021-36373: no packages for Image SLES15-SP4-SAPCAL, but entry?
CVE-2021-36373: no packages for Image SLES15-SP6-SAPCAL-EC2, but entry?
CVE-2021-36373: no packages for Image SLES15-SP2-SAP-BYOS-Azure, but entry?
CVE-2021-36373: no packages for Image SLES15-SP5-SAP-EC2, but entry?
CVE-2021-36373: no packages for SUSE Linux Enterprise Workstation Extension 15 SP5, but entry?
CVE-2021-36373: no packages for Image SLES15-SP5-SAP-GCE, but entry?
CVE-2021-36373: no packages for Image SLES15-SP5-SAPCAL-Azure, but entry?
CVE-2021-36373: no packages for Container bci/openjdk-devel:17-7.2, but entry?
CVE-2021-36373: no packages for Image SLES15-SP5-SAP-Azure-LI-BYOS, but entry?
CVE-2021-36373: no packages for Image SLES15-SP4-SAP-Azure-VLI-BYOS-Production, but entry?
CVE-2021-36373: no packages for Image SLES15-SP6-SAPCAL-GCE, but entry?
CVE-2021-36373: no packages for Container bci/openjdk-devel:11-6.2, but entry?
CVE-2021-36373: no packages for Image SLES15-SP6-SAP-GCE, but entry?
CVE-2021-36373: no packages for SUSE CaaS Platform 4.0, but entry?
CVE-2021-36373: no packages for Image SLES15-SP2-SAP-BYOS-EC2-HVM, but entry?
CVE-2021-36373: no packages for Image SLES15-SP2-SAP-Azure-VLI-BYOS-Production, but entry?
CVE-2021-36373: no packages for Container suse/manager/5.0/x86_64/server-attestation:5.0.0-beta2.2.16, but entry?
CVE-2021-36373: no packages for Image SLES15-SP2-SAP-GCE, but entry?
CVE-2021-36373: no packages for Container bci/kiwi:9.24.43-8.6, but entry?
CVE-2021-36373: no packages for SUSE Linux Enterprise Server 15 SP4-TERADATA, but entry?
CVE-2021-36373: no packages for Image SLES15-SP6-SAP-Azure-LI-BYOS, but entry?
CVE-2021-36373: no packages for Image SLES15-SP4-SAP-Azure-VLI-BYOS, but entry?
CVE-2021-36373: no packages for Image SLES15-SP4-SAP-GCE, but entry?
CVE-2021-36373: no packages for SUSE Linux Enterprise Workstation Extension 15 SP6, but entry?
CVE-2021-36373: no packages for Image SLES15-SP6-SAP-Azure-VLI-BYOS-Production, but entry?
CVE-2021-36373: no packages for Container bci/kiwi:9.24.43-8.6, but entry?
CVE-2021-36373: no packages for Container bci/openjdk-devel:11-6.2, but entry?
CVE-2021-36373: no packages for Container bci/openjdk-devel:17-14.11, but entry?
CVE-2021-36373: no packages for Container bci/openjdk-devel:17-7.2, but entry?
CVE-2021-36373: no packages for Container bci/openjdk:11-7.1, but entry?
CVE-2021-36373: no packages for Container bci/openjdk:17-7.1, but entry?
CVE-2021-36373: no packages for Container bci/openjdk:latest, but entry?
CVE-2021-36373: no packages for Container suse/manager/5.0/x86_64/server-attestation:5.0.0-beta2.2.16, but entry?
CVE-2021-36373: no packages for Image SLES15-SP2-SAP-Azure, but entry?
CVE-2021-36373: no packages for Image SLES15-SP2-SAP-Azure-LI-BYOS-Production, but entry?
CVE-2021-36373: no packages for Image SLES15-SP2-SAP-Azure-VLI-BYOS-Production, but entry?
CVE-2021-36373: no packages for Image SLES15-SP2-SAP-BYOS-Azure, but entry?
CVE-2021-36373: no packages for Image SLES15-SP2-SAP-BYOS-EC2-HVM, but entry?
CVE-2021-36373: no packages for Image SLES15-SP2-SAP-BYOS-GCE, but entry?
CVE-2021-36373: no packages for Image SLES15-SP2-SAP-EC2-HVM, but entry?
CVE-2021-36373: no packages for Image SLES15-SP2-SAP-GCE, but entry?
CVE-2021-36373: no packages for Image SLES15-SP3-SAP-Azure-LI-BYOS-Production, but entry?
CVE-2021-36373: no packages for Image SLES15-SP3-SAP-Azure-VLI-BYOS-Production, but entry?
CVE-2021-36373: no packages for Image SLES15-SP3-SAPCAL-Azure, but entry?
CVE-2021-36373: no packages for Image SLES15-SP3-SAPCAL-EC2-HVM, but entry?
CVE-2021-36373: no packages for Image SLES15-SP3-SAPCAL-GCE, but entry?
CVE-2021-36373: no packages for Image SLES15-SP4-SAP, but entry?
CVE-2021-36373: no packages for Image SLES15-SP4-SAP-Azure, but entry?
CVE-2021-36373: no packages for Image SLES15-SP4-SAP-Azure-LI-BYOS, but entry?
CVE-2021-36373: no packages for Image SLES15-SP4-SAP-Azure-LI-BYOS-Production, but entry?
CVE-2021-36373: no packages for Image SLES15-SP4-SAP-Azure-VLI-BYOS, but entry?
CVE-2021-36373: no packages for Image SLES15-SP4-SAP-Azure-VLI-BYOS-Production, but entry?
CVE-2021-36373: no packages for Image SLES15-SP4-SAP-EC2, but entry?
CVE-2021-36373: no packages for Image SLES15-SP4-SAP-GCE, but entry?
CVE-2021-36373: no packages for Image SLES15-SP4-SAPCAL, but entry?
CVE-2021-36373: no packages for Image SLES15-SP4-SAPCAL-Azure, but entry?
CVE-2021-36373: no packages for Image SLES15-SP4-SAPCAL-EC2, but entry?
CVE-2021-36373: no packages for Image SLES15-SP4-SAPCAL-GCE, but entry?
CVE-2021-36373: no packages for Image SLES15-SP5-SAP-Azure, but entry?
CVE-2021-36373: no packages for Image SLES15-SP5-SAP-Azure-LI-BYOS, but entry?
CVE-2021-36373: no packages for Image SLES15-SP5-SAP-Azure-LI-BYOS-Production, but entry?
CVE-2021-36373: no packages for Image SLES15-SP5-SAP-Azure-VLI-BYOS, but entry?
CVE-2021-36373: no packages for Image SLES15-SP5-SAP-Azure-VLI-BYOS-Production, but entry?
CVE-2021-36373: no packages for Image SLES15-SP5-SAP-EC2, but entry?
CVE-2021-36373: no packages for Image SLES15-SP5-SAP-GCE, but entry?
CVE-2021-36373: no packages for Image SLES15-SP5-SAPCAL-Azure, but entry?
CVE-2021-36373: no packages for Image SLES15-SP5-SAPCAL-EC2, but entry?
CVE-2021-36373: no packages for Image SLES15-SP5-SAPCAL-GCE, but entry?
CVE-2021-36373: no packages for Image SLES15-SP6-SAP, but entry?
CVE-2021-36373: no packages for Image SLES15-SP6-SAP-Azure, but entry?
CVE-2021-36373: no packages for Image SLES15-SP6-SAP-Azure-LI-BYOS, but entry?
CVE-2021-36373: no packages for Image SLES15-SP6-SAP-Azure-LI-BYOS-Production, but entry?
CVE-2021-36373: no packages for Image SLES15-SP6-SAP-Azure-VLI-BYOS, but entry?
CVE-2021-36373: no packages for Image SLES15-SP6-SAP-Azure-VLI-BYOS-Production, but entry?
CVE-2021-36373: no packages for Image SLES15-SP6-SAP-EC2, but entry?
CVE-2021-36373: no packages for Image SLES15-SP6-SAP-GCE, but entry?
CVE-2021-36373: no packages for Image SLES15-SP6-SAPCAL, but entry?
CVE-2021-36373: no packages for Image SLES15-SP6-SAPCAL-Azure, but entry?
CVE-2021-36373: no packages for Image SLES15-SP6-SAPCAL-EC2, but entry?
CVE-2021-36373: no packages for Image SLES15-SP6-SAPCAL-GCE, but entry?
CVE-2021-36373: no packages for SUSE CaaS Platform 4.0, but entry?
CVE-2021-36373: no packages for SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS, but entry?
CVE-2021-36373: no packages for SUSE Linux Enterprise Module for Basesystem 15 SP4, but entry?
CVE-2021-36373: no packages for SUSE Linux Enterprise Module for Basesystem 15 SP5, but entry?
CVE-2021-36373: no packages for SUSE Linux Enterprise Module for Basesystem 15 SP6, but entry?
CVE-2021-36373: no packages for SUSE Linux Enterprise Module for Package Hub 15 SP4, but entry?
CVE-2021-36373: no packages for SUSE Linux Enterprise Module for Web and Scripting 15 SP4, but entry?
CVE-2021-36373: no packages for SUSE Linux Enterprise Module for Web and Scripting 15 SP5, but entry?
CVE-2021-36373: no packages for SUSE Linux Enterprise Module for Web and Scripting 15 SP6, but entry?
CVE-2021-36373: no packages for SUSE Linux Enterprise Server 15 SP1-LTSS, but entry?
CVE-2021-36373: no packages for SUSE Linux Enterprise Server 15 SP4-TERADATA, but entry?
CVE-2021-36373: no packages for SUSE Linux Enterprise Server for SAP Applications 15 SP1, but entry?
CVE-2021-36373: no packages for SUSE Linux Enterprise Workstation Extension 15 SP4, but entry?
CVE-2021-36373: no packages for SUSE Linux Enterprise Workstation Extension 15 SP5, but entry?
CVE-2021-36373: no packages for SUSE Linux Enterprise Workstation Extension 15 SP6, but entry?
CVE-2021-36373: no packages for SUSE Manager Proxy 4.2, but entry?
CVE-2021-36373: no packages for SUSE Manager Retail Branch Server 4.2, but entry?
CVE-2021-36373: no packages for SUSE Manager Server 4.2, but entry?
CVE-2021-36373: no packages for Container bci/kiwi:9.24.43-8.6, but entry?
CVE-2021-36373: no packages for Container bci/openjdk-devel:11-6.2, but entry?
CVE-2021-36373: no packages for Container bci/openjdk-devel:17-14.11, but entry?
CVE-2021-36373: no packages for Container bci/openjdk-devel:17-7.2, but entry?
CVE-2021-36373: no packages for Container bci/openjdk:11-7.1, but entry?
CVE-2021-36373: no packages for Container bci/openjdk:17-7.1, but entry?
CVE-2021-36373: no packages for Container bci/openjdk:latest, but entry?
CVE-2021-36373: no packages for Container suse/manager/5.0/x86_64/server-attestation:5.0.0-beta2.2.16, but entry?
CVE-2021-36373: no packages for Image SLES15-SP2-SAP-Azure, but entry?
CVE-2021-36373: no packages for Image SLES15-SP2-SAP-Azure-LI-BYOS-Production, but entry?
CVE-2021-36373: no packages for Image SLES15-SP2-SAP-Azure-VLI-BYOS-Production, but entry?
CVE-2021-36373: no packages for Image SLES15-SP2-SAP-BYOS-Azure, but entry?
CVE-2021-36373: no packages for Image SLES15-SP2-SAP-BYOS-EC2-HVM, but entry?
CVE-2021-36373: no packages for Image SLES15-SP2-SAP-BYOS-GCE, but entry?
CVE-2021-36373: no packages for Image SLES15-SP2-SAP-EC2-HVM, but entry?
CVE-2021-36373: no packages for Image SLES15-SP2-SAP-GCE, but entry?
CVE-2021-36373: no packages for Image SLES15-SP3-SAP-Azure-LI-BYOS-Production, but entry?
CVE-2021-36373: no packages for Image SLES15-SP3-SAP-Azure-VLI-BYOS-Production, but entry?
CVE-2021-36373: no packages for Image SLES15-SP3-SAPCAL-Azure, but entry?
CVE-2021-36373: no packages for Image SLES15-SP3-SAPCAL-EC2-HVM, but entry?
CVE-2021-36373: no packages for Image SLES15-SP3-SAPCAL-GCE, but entry?
CVE-2021-36373: no packages for Image SLES15-SP4-SAP, but entry?
CVE-2021-36373: no packages for Image SLES15-SP4-SAP-Azure, but entry?
CVE-2021-36373: no packages for Image SLES15-SP4-SAP-Azure-LI-BYOS, but entry?
CVE-2021-36373: no packages for Image SLES15-SP4-SAP-Azure-LI-BYOS-Production, but entry?
CVE-2021-36373: no packages for Image SLES15-SP4-SAP-Azure-VLI-BYOS, but entry?
CVE-2021-36373: no packages for Image SLES15-SP4-SAP-Azure-VLI-BYOS-Production, but entry?
CVE-2021-36373: no packages for Image SLES15-SP4-SAP-EC2, but entry?
CVE-2021-36373: no packages for Image SLES15-SP4-SAP-GCE, but entry?
CVE-2021-36373: no packages for Image SLES15-SP4-SAPCAL, but entry?
CVE-2021-36373: no packages for Image SLES15-SP4-SAPCAL-Azure, but entry?
CVE-2021-36373: no packages for Image SLES15-SP4-SAPCAL-EC2, but entry?
CVE-2021-36373: no packages for Image SLES15-SP4-SAPCAL-GCE, but entry?
CVE-2021-36373: no packages for Image SLES15-SP5-SAP-Azure, but entry?
CVE-2021-36373: no packages for Image SLES15-SP5-SAP-Azure-LI-BYOS, but entry?
CVE-2021-36373: no packages for Image SLES15-SP5-SAP-Azure-LI-BYOS-Production, but entry?
CVE-2021-36373: no packages for Image SLES15-SP5-SAP-Azure-VLI-BYOS, but entry?
CVE-2021-36373: no packages for Image SLES15-SP5-SAP-Azure-VLI-BYOS-Production, but entry?
CVE-2021-36373: no packages for Image SLES15-SP5-SAP-EC2, but entry?
CVE-2021-36373: no packages for Image SLES15-SP5-SAP-GCE, but entry?
CVE-2021-36373: no packages for Image SLES15-SP5-SAPCAL-Azure, but entry?
CVE-2021-36373: no packages for Image SLES15-SP5-SAPCAL-EC2, but entry?
CVE-2021-36373: no packages for Image SLES15-SP5-SAPCAL-GCE, but entry?
CVE-2021-36373: no packages for Image SLES15-SP6-SAP, but entry?
CVE-2021-36373: no packages for Image SLES15-SP6-SAP-Azure, but entry?
CVE-2021-36373: no packages for Image SLES15-SP6-SAP-Azure-LI-BYOS, but entry?
CVE-2021-36373: no packages for Image SLES15-SP6-SAP-Azure-LI-BYOS-Production, but entry?
CVE-2021-36373: no packages for Image SLES15-SP6-SAP-Azure-VLI-BYOS, but entry?
CVE-2021-36373: no packages for Image SLES15-SP6-SAP-Azure-VLI-BYOS-Production, but entry?
CVE-2021-36373: no packages for Image SLES15-SP6-SAP-EC2, but entry?
CVE-2021-36373: no packages for Image SLES15-SP6-SAP-GCE, but entry?
CVE-2021-36373: no packages for Image SLES15-SP6-SAPCAL, but entry?
CVE-2021-36373: no packages for Image SLES15-SP6-SAPCAL-Azure, but entry?
CVE-2021-36373: no packages for Image SLES15-SP6-SAPCAL-EC2, but entry?
CVE-2021-36373: no packages for Image SLES15-SP6-SAPCAL-GCE, but entry?
CVE-2021-36373: no packages for SUSE CaaS Platform 4.0, but entry?
CVE-2021-36373: no packages for SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS, but entry?
CVE-2021-36373: no packages for SUSE Linux Enterprise Module for Basesystem 15 SP4, but entry?
CVE-2021-36373: no packages for SUSE Linux Enterprise Module for Basesystem 15 SP5, but entry?
CVE-2021-36373: no packages for SUSE Linux Enterprise Module for Basesystem 15 SP6, but entry?
CVE-2021-36373: no packages for SUSE Linux Enterprise Module for Package Hub 15 SP4, but entry?
CVE-2021-36373: no packages for SUSE Linux Enterprise Module for Web and Scripting 15 SP4, but entry?
CVE-2021-36373: no packages for SUSE Linux Enterprise Module for Web and Scripting 15 SP5, but entry?
CVE-2021-36373: no packages for SUSE Linux Enterprise Module for Web and Scripting 15 SP6, but entry?
CVE-2021-36373: no packages for SUSE Linux Enterprise Server 15 SP1-LTSS, but entry?
CVE-2021-36373: no packages for SUSE Linux Enterprise Server 15 SP4-TERADATA, but entry?
CVE-2021-36373: no packages for SUSE Linux Enterprise Server for SAP Applications 15 SP1, but entry?
CVE-2021-36373: no packages for SUSE Linux Enterprise Workstation Extension 15 SP4, but entry?
CVE-2021-36373: no packages for SUSE Linux Enterprise Workstation Extension 15 SP5, but entry?
CVE-2021-36373: no packages for SUSE Linux Enterprise Workstation Extension 15 SP6, but entry?
CVE-2021-36373: no packages for SUSE Manager Proxy 4.2, but entry?
CVE-2021-36373: no packages for SUSE Manager Retail Branch Server 4.2, but entry?
CVE-2021-36373: no packages for SUSE Manager Server 4.2, but entry?
skipping CVE-2021-36370 as CVE page is older than CVRF-CVE file.
skipping CVE-2021-36368 as CVE page is older than CVRF-CVE file.
skipping CVE-2021-36222 as CVE page is older than CVRF-CVE file.
skipping CVE-2021-36217 as CVE page is older than CVRF-CVE file.
skipping CVE-2021-36160 as CVE page is older than CVRF-CVE file.
skipping CVE-2021-36087 as CVE page is older than CVRF-CVE file.
skipping CVE-2021-36086 as CVE page is older than CVRF-CVE file.
skipping CVE-2021-36085 as CVE page is older than CVRF-CVE file.
skipping CVE-2021-36084 as CVE page is older than CVRF-CVE file.
skipping CVE-2021-35942 as CVE page is older than CVRF-CVE file.
skipping CVE-2021-35939 as CVE page is older than CVRF-CVE file.
skipping CVE-2021-35938 as CVE page is older than CVRF-CVE file.
skipping CVE-2021-35937 as CVE page is older than CVRF-CVE file.
skipping CVE-2021-35619 as CVE page is older than CVRF-CVE file.
skipping CVE-2021-35604 as CVE page is older than CVRF-CVE file.
skipping CVE-2021-35603 as CVE page is older than CVRF-CVE file.
skipping CVE-2021-35588 as CVE page is older than CVRF-CVE file.
skipping CVE-2021-35578 as CVE page is older than CVRF-CVE file.
skipping CVE-2021-35567 as CVE page is older than CVRF-CVE file.
skipping CVE-2021-35561 as CVE page is older than CVRF-CVE file.
skipping CVE-2021-35560 as CVE page is older than CVRF-CVE file.
skipping CVE-2021-35550 as CVE page is older than CVRF-CVE file.
No V5 entry found for CVE-2021-35409 / /home/securitybot/prod/cve-database/cvelistV5/cves/2021/35xxxx/CVE-2021-35409.json:No such file or directory
no cpe found for SUSE Package Hub 15 SP3 in CVE-2021-35409
skipping CVE-2021-35465 as CVE page is older than CVRF-CVE file.
No V5 entry found for CVE-2021-35373 / /home/securitybot/prod/cve-database/cvelistV5/cves/2021/35xxxx/CVE-2021-35373.json:No such file or directory
No V5 entry found for CVE-2021-35057 / /home/securitybot/prod/cve-database/cvelistV5/cves/2021/35xxxx/CVE-2021-35057.json:No such file or directory
skipping CVE-2021-35039 as CVE page is older than CVRF-CVE file.
skipping CVE-2021-34866 as CVE page is older than CVRF-CVE file.
skipping CVE-2021-34798 as CVE page is older than CVRF-CVE file.
skipping CVE-2021-34557 as CVE page is older than CVRF-CVE file.
no cpe found for SUSE Package Hub 15 SP2 in CVE-2021-34550
no cpe found for SUSE Package Hub 15 SP3 in CVE-2021-34550
no cpe found for SUSE Package Hub 15 SP2 in CVE-2021-34549
no cpe found for SUSE Package Hub 15 SP3 in CVE-2021-34549
no cpe found for SUSE Package Hub 15 SP2 in CVE-2021-34548
no cpe found for SUSE Package Hub 15 SP3 in CVE-2021-34548
skipping CVE-2021-34406 as CVE page is older than CVRF-CVE file.
skipping CVE-2021-34403 as CVE page is older than CVRF-CVE file.
skipping CVE-2021-34402 as CVE page is older than CVRF-CVE file.
skipping CVE-2021-34401 as CVE page is older than CVRF-CVE file.
skipping CVE-2021-34335 as CVE page is older than CVRF-CVE file.
skipping CVE-2021-34334 as CVE page is older than CVRF-CVE file.
skipping CVE-2021-34183 as CVE page is older than CVRF-CVE file.
no cpe found for SUSE Package Hub 15 SP3 in CVE-2021-34055
no cpe found for SUSE Package Hub 15 SP4 in CVE-2021-34055
no cpe found for SUSE Package Hub 15 SP4 in CVE-2021-33844
no cpe found for SUSE Package Hub 15 SP5 in CVE-2021-33844
CVE-2021-33813: no packages for Image SLES15-SP5-SAPCAL-EC2, but entry?
CVE-2021-33813: no packages for Image SLES15-SP4-SAPCAL-Azure, but entry?
CVE-2021-33813: no packages for Image SLES15-SP4-SAPCAL-EC2, but entry?
CVE-2021-33813: no packages for SUSE Linux Enterprise Module for Web and Scripting 15 SP4, but entry?
CVE-2021-33813: no packages for Container bci/openjdk:11-7.1, but entry?
CVE-2021-33813: no packages for Image SLES15-SP4-SAP-EC2, but entry?
CVE-2021-33813: no packages for Image SLES15-SP6-SAP-EC2, but entry?
CVE-2021-33813: no packages for Image SLES15-SP3-SAP-Azure-LI-BYOS-Production, but entry?
CVE-2021-33813: no packages for Image SLES15-SP2-SAP-EC2-HVM, but entry?
CVE-2021-33813: no packages for Image SLES15-SP5-SAPCAL-GCE, but entry?
CVE-2021-33813: no packages for Image SLES15-SP6-SAP-Azure, but entry?
CVE-2021-33813: no packages for Image SLES15-SP5-SAP-Azure-VLI-BYOS-Production, but entry?
CVE-2021-33813: no packages for Image SLES15-SP5-SAP-Azure, but entry?
CVE-2021-33813: no packages for Image SLES15-SP6-SAP-Azure-VLI-BYOS, but entry?
CVE-2021-33813: no packages for Image SLES15-SP6-SAPCAL-Azure, but entry?
CVE-2021-33813: no packages for Image SLES15-SP3-SAPCAL-Azure, but entry?
CVE-2021-33813: no packages for Image SLES15-SP5-SAP-Azure-VLI-BYOS, but entry?
CVE-2021-33813: no packages for Image SLES15-SP6-SAPCAL, but entry?
CVE-2021-33813: no packages for SUSE Linux Enterprise Module for Basesystem 15 SP6, but entry?
CVE-2021-33813: no packages for Image SLES15-SP5-SAP-Azure-LI-BYOS-Production, but entry?
CVE-2021-33813: no packages for Image SLES15-SP2-SAP-BYOS-GCE, but entry?
CVE-2021-33813: no packages for Container bci/openjdk-devel:17-18.15, but entry?
CVE-2021-33813: no packages for SUSE Linux Enterprise Module for Web and Scripting 15 SP5, but entry?
CVE-2021-33813: no packages for Image SLES15-SP4-SAP-Azure, but entry?
CVE-2021-33813: no packages for SUSE Linux Enterprise Module for Package Hub 15 SP5, but entry?
CVE-2021-33813: no packages for SUSE Linux Enterprise Workstation Extension 15 SP4, but entry?
CVE-2021-33813: no packages for SUSE Manager Proxy 4.2, but entry?
CVE-2021-33813: no packages for Image SLES15-SP2-SAP-Azure-LI-BYOS-Production, but entry?
CVE-2021-33813: no packages for Image SLES15-SP4-SAP-Azure-LI-BYOS-Production, but entry?
CVE-2021-33813: no packages for SUSE Manager Server 4.3, but entry?
CVE-2021-33813: no packages for SUSE Linux Enterprise Module for Basesystem 15 SP5, but entry?
CVE-2021-33813: no packages for Image SLES15-SP2-SAP-Azure, but entry?
CVE-2021-33813: no packages for Image SLES15-SP2-SAP-GCE, but entry?
CVE-2021-33813: no packages for Container bci/openjdk-devel:11-16.17, but entry?
CVE-2021-33813: no packages for Container bci/kiwi:9.24.43-8.6, but entry?
CVE-2021-33813: no packages for Image SLES15-SP4-SAP-GCE, but entry?
CVE-2021-33813: no packages for Image SLES15-SP6-SAP-Azure-LI-BYOS, but entry?
CVE-2021-33813: no packages for Image SLES15-SP4-SAP-Azure-VLI-BYOS, but entry?
CVE-2021-33813: no packages for SUSE Linux Enterprise Workstation Extension 15 SP6, but entry?
CVE-2021-33813: no packages for Image SLES15-SP6-SAP-Azure-VLI-BYOS-Production, but entry?
CVE-2021-33813: no packages for Image SLES15-SP5-SAPCAL-Azure, but entry?
CVE-2021-33813: no packages for Container bci/openjdk-devel:17-7.2, but entry?
CVE-2021-33813: no packages for SUSE Linux Enterprise Workstation Extension 15 SP5, but entry?
CVE-2021-33813: no packages for Image SLES15-SP5-SAP-GCE, but entry?
CVE-2021-33813: no packages for Image SLES15-SP6-SAPCAL-GCE, but entry?
CVE-2021-33813: no packages for Image SLES15-SP6-SAP-GCE, but entry?
CVE-2021-33813: no packages for Image SLES15-SP5-SAP-Azure-LI-BYOS, but entry?
CVE-2021-33813: no packages for Image SLES15-SP4-SAP-Azure-VLI-BYOS-Production, but entry?
CVE-2021-33813: no packages for Container suse/manager/5.0/x86_64/server-attestation:5.0.0-beta2.2.16, but entry?
CVE-2021-33813: no packages for Image SLES15-SP2-SAP-BYOS-EC2-HVM, but entry?
CVE-2021-33813: no packages for Image SLES15-SP2-SAP-Azure-VLI-BYOS-Production, but entry?
CVE-2021-33813: no packages for SUSE Manager Retail Branch Server 4.3, but entry?
CVE-2021-33813: no packages for Image SLES15-SP3-SAP-Azure-VLI-BYOS-Production, but entry?
CVE-2021-33813: no packages for Container bci/openjdk:17-7.1, but entry?
CVE-2021-33813: no packages for SUSE Linux Enterprise Module for Basesystem 15 SP4, but entry?
CVE-2021-33813: no packages for SUSE Linux Enterprise Module for Package Hub 15 SP6, but entry?
CVE-2021-33813: no packages for Image SLES15-SP4-SAPCAL, but entry?
CVE-2021-33813: no packages for Image SLES15-SP6-SAPCAL-EC2, but entry?
CVE-2021-33813: no packages for Container bci/openjdk:latest, but entry?
CVE-2021-33813: no packages for SUSE Linux Enterprise Module for Web and Scripting 15 SP6, but entry?
CVE-2021-33813: no packages for Image SLES15-SP5-SAP-EC2, but entry?
CVE-2021-33813: no packages for Image SLES15-SP2-SAP-BYOS-Azure, but entry?
CVE-2021-33813: no packages for Image SLES15-SP6-SAP-Azure-LI-BYOS-Production, but entry?
CVE-2021-33813: no packages for SUSE Linux Enterprise Module for Package Hub 15 SP4, but entry?
CVE-2021-33813: no packages for SUSE Manager Proxy 4.3, but entry?
CVE-2021-33813: no packages for SUSE Manager Retail Branch Server 4.2, but entry?
CVE-2021-33813: no packages for Image SLES15-SP4-SAP, but entry?
CVE-2021-33813: no packages for Image SLES15-SP3-SAPCAL-EC2-HVM, but entry?
CVE-2021-33813: no packages for SUSE Manager Server 4.2, but entry?
CVE-2021-33813: no packages for Image SLES15-SP4-SAP-Azure-LI-BYOS, but entry?
CVE-2021-33813: no packages for Image SLES15-SP3-SAPCAL-GCE, but entry?
CVE-2021-33813: no packages for Image SLES15-SP6-SAP, but entry?
CVE-2021-33813: no packages for Image SLES15-SP4-SAPCAL-GCE, but entry?
no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2021-33813
CVE-2021-33813: no packages for Container bci/kiwi:9.24.43-8.6, but entry?
CVE-2021-33813: no packages for Container bci/openjdk-devel:11-16.17, but entry?
CVE-2021-33813: no packages for Container bci/openjdk-devel:17-18.15, but entry?
CVE-2021-33813: no packages for Container bci/openjdk-devel:17-7.2, but entry?
CVE-2021-33813: no packages for Container bci/openjdk:11-7.1, but entry?
CVE-2021-33813: no packages for Container bci/openjdk:17-7.1, but entry?
CVE-2021-33813: no packages for Container bci/openjdk:latest, but entry?
CVE-2021-33813: no packages for Container suse/manager/5.0/x86_64/server-attestation:5.0.0-beta2.2.16, but entry?
CVE-2021-33813: no packages for Image SLES15-SP2-SAP-Azure, but entry?
CVE-2021-33813: no packages for Image SLES15-SP2-SAP-Azure-LI-BYOS-Production, but entry?
CVE-2021-33813: no packages for Image SLES15-SP2-SAP-Azure-VLI-BYOS-Production, but entry?
CVE-2021-33813: no packages for Image SLES15-SP2-SAP-BYOS-Azure, but entry?
CVE-2021-33813: no packages for Image SLES15-SP2-SAP-BYOS-EC2-HVM, but entry?
CVE-2021-33813: no packages for Image SLES15-SP2-SAP-BYOS-GCE, but entry?
CVE-2021-33813: no packages for Image SLES15-SP2-SAP-EC2-HVM, but entry?
CVE-2021-33813: no packages for Image SLES15-SP2-SAP-GCE, but entry?
CVE-2021-33813: no packages for Image SLES15-SP3-SAP-Azure-LI-BYOS-Production, but entry?
CVE-2021-33813: no packages for Image SLES15-SP3-SAP-Azure-VLI-BYOS-Production, but entry?
CVE-2021-33813: no packages for Image SLES15-SP3-SAPCAL-Azure, but entry?
CVE-2021-33813: no packages for Image SLES15-SP3-SAPCAL-EC2-HVM, but entry?
CVE-2021-33813: no packages for Image SLES15-SP3-SAPCAL-GCE, but entry?
CVE-2021-33813: no packages for Image SLES15-SP4-SAP, but entry?
CVE-2021-33813: no packages for Image SLES15-SP4-SAP-Azure, but entry?
CVE-2021-33813: no packages for Image SLES15-SP4-SAP-Azure-LI-BYOS, but entry?
CVE-2021-33813: no packages for Image SLES15-SP4-SAP-Azure-LI-BYOS-Production, but entry?
CVE-2021-33813: no packages for Image SLES15-SP4-SAP-Azure-VLI-BYOS, but entry?
CVE-2021-33813: no packages for Image SLES15-SP4-SAP-Azure-VLI-BYOS-Production, but entry?
CVE-2021-33813: no packages for Image SLES15-SP4-SAP-EC2, but entry?
CVE-2021-33813: no packages for Image SLES15-SP4-SAP-GCE, but entry?
CVE-2021-33813: no packages for Image SLES15-SP4-SAPCAL, but entry?
CVE-2021-33813: no packages for Image SLES15-SP4-SAPCAL-Azure, but entry?
CVE-2021-33813: no packages for Image SLES15-SP4-SAPCAL-EC2, but entry?
CVE-2021-33813: no packages for Image SLES15-SP4-SAPCAL-GCE, but entry?
CVE-2021-33813: no packages for Image SLES15-SP5-SAP-Azure, but entry?
CVE-2021-33813: no packages for Image SLES15-SP5-SAP-Azure-LI-BYOS, but entry?
CVE-2021-33813: no packages for Image SLES15-SP5-SAP-Azure-LI-BYOS-Production, but entry?
CVE-2021-33813: no packages for Image SLES15-SP5-SAP-Azure-VLI-BYOS, but entry?
CVE-2021-33813: no packages for Image SLES15-SP5-SAP-Azure-VLI-BYOS-Production, but entry?
CVE-2021-33813: no packages for Image SLES15-SP5-SAP-EC2, but entry?
CVE-2021-33813: no packages for Image SLES15-SP5-SAP-GCE, but entry?
CVE-2021-33813: no packages for Image SLES15-SP5-SAPCAL-Azure, but entry?
CVE-2021-33813: no packages for Image SLES15-SP5-SAPCAL-EC2, but entry?
CVE-2021-33813: no packages for Image SLES15-SP5-SAPCAL-GCE, but entry?
CVE-2021-33813: no packages for Image SLES15-SP6-SAP, but entry?
CVE-2021-33813: no packages for Image SLES15-SP6-SAP-Azure, but entry?
CVE-2021-33813: no packages for Image SLES15-SP6-SAP-Azure-LI-BYOS, but entry?
CVE-2021-33813: no packages for Image SLES15-SP6-SAP-Azure-LI-BYOS-Production, but entry?
CVE-2021-33813: no packages for Image SLES15-SP6-SAP-Azure-VLI-BYOS, but entry?
CVE-2021-33813: no packages for Image SLES15-SP6-SAP-Azure-VLI-BYOS-Production, but entry?
CVE-2021-33813: no packages for Image SLES15-SP6-SAP-EC2, but entry?
CVE-2021-33813: no packages for Image SLES15-SP6-SAP-GCE, but entry?
CVE-2021-33813: no packages for Image SLES15-SP6-SAPCAL, but entry?
CVE-2021-33813: no packages for Image SLES15-SP6-SAPCAL-Azure, but entry?
CVE-2021-33813: no packages for Image SLES15-SP6-SAPCAL-EC2, but entry?
CVE-2021-33813: no packages for Image SLES15-SP6-SAPCAL-GCE, but entry?
CVE-2021-33813: no packages for SUSE Linux Enterprise Module for Basesystem 15 SP4, but entry?
CVE-2021-33813: no packages for SUSE Linux Enterprise Module for Basesystem 15 SP5, but entry?
CVE-2021-33813: no packages for SUSE Linux Enterprise Module for Basesystem 15 SP6, but entry?
CVE-2021-33813: no packages for SUSE Linux Enterprise Module for Package Hub 15 SP4, but entry?
CVE-2021-33813: no packages for SUSE Linux Enterprise Module for Package Hub 15 SP5, but entry?
CVE-2021-33813: no packages for SUSE Linux Enterprise Module for Package Hub 15 SP6, but entry?
CVE-2021-33813: no packages for SUSE Linux Enterprise Module for Web and Scripting 15 SP4, but entry?
CVE-2021-33813: no packages for SUSE Linux Enterprise Module for Web and Scripting 15 SP5, but entry?
CVE-2021-33813: no packages for SUSE Linux Enterprise Module for Web and Scripting 15 SP6, but entry?
CVE-2021-33813: no packages for SUSE Linux Enterprise Workstation Extension 15 SP4, but entry?
CVE-2021-33813: no packages for SUSE Linux Enterprise Workstation Extension 15 SP5, but entry?
CVE-2021-33813: no packages for SUSE Linux Enterprise Workstation Extension 15 SP6, but entry?
CVE-2021-33813: no packages for SUSE Manager Proxy 4.2, but entry?
CVE-2021-33813: no packages for SUSE Manager Proxy 4.3, but entry?
CVE-2021-33813: no packages for SUSE Manager Retail Branch Server 4.2, but entry?
CVE-2021-33813: no packages for SUSE Manager Retail Branch Server 4.3, but entry?
CVE-2021-33813: no packages for SUSE Manager Server 4.2, but entry?
CVE-2021-33813: no packages for SUSE Manager Server 4.3, but entry?
CVE-2021-33813: no packages for Container bci/kiwi:9.24.43-8.6, but entry?
CVE-2021-33813: no packages for Container bci/openjdk-devel:11-16.17, but entry?
CVE-2021-33813: no packages for Container bci/openjdk-devel:17-18.15, but entry?
CVE-2021-33813: no packages for Container bci/openjdk-devel:17-7.2, but entry?
CVE-2021-33813: no packages for Container bci/openjdk:11-7.1, but entry?
CVE-2021-33813: no packages for Container bci/openjdk:17-7.1, but entry?
CVE-2021-33813: no packages for Container bci/openjdk:latest, but entry?
CVE-2021-33813: no packages for Container suse/manager/5.0/x86_64/server-attestation:5.0.0-beta2.2.16, but entry?
CVE-2021-33813: no packages for Image SLES15-SP2-SAP-Azure, but entry?
CVE-2021-33813: no packages for Image SLES15-SP2-SAP-Azure-LI-BYOS-Production, but entry?
CVE-2021-33813: no packages for Image SLES15-SP2-SAP-Azure-VLI-BYOS-Production, but entry?
CVE-2021-33813: no packages for Image SLES15-SP2-SAP-BYOS-Azure, but entry?
CVE-2021-33813: no packages for Image SLES15-SP2-SAP-BYOS-EC2-HVM, but entry?
CVE-2021-33813: no packages for Image SLES15-SP2-SAP-BYOS-GCE, but entry?
CVE-2021-33813: no packages for Image SLES15-SP2-SAP-EC2-HVM, but entry?
CVE-2021-33813: no packages for Image SLES15-SP2-SAP-GCE, but entry?
CVE-2021-33813: no packages for Image SLES15-SP3-SAP-Azure-LI-BYOS-Production, but entry?
CVE-2021-33813: no packages for Image SLES15-SP3-SAP-Azure-VLI-BYOS-Production, but entry?
CVE-2021-33813: no packages for Image SLES15-SP3-SAPCAL-Azure, but entry?
CVE-2021-33813: no packages for Image SLES15-SP3-SAPCAL-EC2-HVM, but entry?
CVE-2021-33813: no packages for Image SLES15-SP3-SAPCAL-GCE, but entry?
CVE-2021-33813: no packages for Image SLES15-SP4-SAP, but entry?
CVE-2021-33813: no packages for Image SLES15-SP4-SAP-Azure, but entry?
CVE-2021-33813: no packages for Image SLES15-SP4-SAP-Azure-LI-BYOS, but entry?
CVE-2021-33813: no packages for Image SLES15-SP4-SAP-Azure-LI-BYOS-Production, but entry?
CVE-2021-33813: no packages for Image SLES15-SP4-SAP-Azure-VLI-BYOS, but entry?
CVE-2021-33813: no packages for Image SLES15-SP4-SAP-Azure-VLI-BYOS-Production, but entry?
CVE-2021-33813: no packages for Image SLES15-SP4-SAP-EC2, but entry?
CVE-2021-33813: no packages for Image SLES15-SP4-SAP-GCE, but entry?
CVE-2021-33813: no packages for Image SLES15-SP4-SAPCAL, but entry?
CVE-2021-33813: no packages for Image SLES15-SP4-SAPCAL-Azure, but entry?
CVE-2021-33813: no packages for Image SLES15-SP4-SAPCAL-EC2, but entry?
CVE-2021-33813: no packages for Image SLES15-SP4-SAPCAL-GCE, but entry?
CVE-2021-33813: no packages for Image SLES15-SP5-SAP-Azure, but entry?
CVE-2021-33813: no packages for Image SLES15-SP5-SAP-Azure-LI-BYOS, but entry?
CVE-2021-33813: no packages for Image SLES15-SP5-SAP-Azure-LI-BYOS-Production, but entry?
CVE-2021-33813: no packages for Image SLES15-SP5-SAP-Azure-VLI-BYOS, but entry?
CVE-2021-33813: no packages for Image SLES15-SP5-SAP-Azure-VLI-BYOS-Production, but entry?
CVE-2021-33813: no packages for Image SLES15-SP5-SAP-EC2, but entry?
CVE-2021-33813: no packages for Image SLES15-SP5-SAP-GCE, but entry?
CVE-2021-33813: no packages for Image SLES15-SP5-SAPCAL-Azure, but entry?
CVE-2021-33813: no packages for Image SLES15-SP5-SAPCAL-EC2, but entry?
CVE-2021-33813: no packages for Image SLES15-SP5-SAPCAL-GCE, but entry?
CVE-2021-33813: no packages for Image SLES15-SP6-SAP, but entry?
CVE-2021-33813: no packages for Image SLES15-SP6-SAP-Azure, but entry?
CVE-2021-33813: no packages for Image SLES15-SP6-SAP-Azure-LI-BYOS, but entry?
CVE-2021-33813: no packages for Image SLES15-SP6-SAP-Azure-LI-BYOS-Production, but entry?
CVE-2021-33813: no packages for Image SLES15-SP6-SAP-Azure-VLI-BYOS, but entry?
CVE-2021-33813: no packages for Image SLES15-SP6-SAP-Azure-VLI-BYOS-Production, but entry?
CVE-2021-33813: no packages for Image SLES15-SP6-SAP-EC2, but entry?
CVE-2021-33813: no packages for Image SLES15-SP6-SAP-GCE, but entry?
CVE-2021-33813: no packages for Image SLES15-SP6-SAPCAL, but entry?
CVE-2021-33813: no packages for Image SLES15-SP6-SAPCAL-Azure, but entry?
CVE-2021-33813: no packages for Image SLES15-SP6-SAPCAL-EC2, but entry?
CVE-2021-33813: no packages for Image SLES15-SP6-SAPCAL-GCE, but entry?
CVE-2021-33813: no packages for SUSE Linux Enterprise Module for Basesystem 15 SP4, but entry?
CVE-2021-33813: no packages for SUSE Linux Enterprise Module for Basesystem 15 SP5, but entry?
CVE-2021-33813: no packages for SUSE Linux Enterprise Module for Basesystem 15 SP6, but entry?
CVE-2021-33813: no packages for SUSE Linux Enterprise Module for Package Hub 15 SP4, but entry?
CVE-2021-33813: no packages for SUSE Linux Enterprise Module for Package Hub 15 SP5, but entry?
CVE-2021-33813: no packages for SUSE Linux Enterprise Module for Package Hub 15 SP6, but entry?
CVE-2021-33813: no packages for SUSE Linux Enterprise Module for Web and Scripting 15 SP4, but entry?
CVE-2021-33813: no packages for SUSE Linux Enterprise Module for Web and Scripting 15 SP5, but entry?
CVE-2021-33813: no packages for SUSE Linux Enterprise Module for Web and Scripting 15 SP6, but entry?
CVE-2021-33813: no packages for SUSE Linux Enterprise Workstation Extension 15 SP4, but entry?
CVE-2021-33813: no packages for SUSE Linux Enterprise Workstation Extension 15 SP5, but entry?
CVE-2021-33813: no packages for SUSE Linux Enterprise Workstation Extension 15 SP6, but entry?
CVE-2021-33813: no packages for SUSE Manager Proxy 4.2, but entry?
CVE-2021-33813: no packages for SUSE Manager Proxy 4.3, but entry?
CVE-2021-33813: no packages for SUSE Manager Retail Branch Server 4.2, but entry?
CVE-2021-33813: no packages for SUSE Manager Retail Branch Server 4.3, but entry?
CVE-2021-33813: no packages for SUSE Manager Server 4.2, but entry?
CVE-2021-33813: no packages for SUSE Manager Server 4.3, but entry?
no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2021-33655
no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2021-33631
skipping CVE-2021-33630 as CVE page is older than CVRF-CVE file.
no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2021-33621
no cpe found for SUSE Package Hub 15 SP3 in CVE-2021-33571
skipping CVE-2021-33574 as CVE page is older than CVRF-CVE file.
no cpe found for SUSE Liberty Linux 7 LTSS in CVE-2021-33516
CVE-2021-33503: no packages for SUSE Linux Enterprise Module for Web and Scripting 12, but entry?
CVE-2021-33503: no packages for SUSE Linux Enterprise High Availability Extension 12 SP3, but entry?
CVE-2021-33503: no packages for SUSE OpenStack Cloud 7, but entry?
CVE-2021-33503: no packages for SUSE Linux Enterprise High Availability Extension 12 SP4, but entry?
CVE-2021-33503: no packages for SUSE Linux Enterprise High Availability Extension 12 SP5, but entry?
CVE-2021-33503: no packages for SUSE Linux Enterprise High Availability Extension 12 SP3, but entry?
CVE-2021-33503: no packages for SUSE Linux Enterprise High Availability Extension 12 SP4, but entry?
CVE-2021-33503: no packages for SUSE Linux Enterprise High Availability Extension 12 SP5, but entry?
CVE-2021-33503: no packages for SUSE Linux Enterprise Module for Web and Scripting 12, but entry?
CVE-2021-33503: no packages for SUSE OpenStack Cloud 7, but entry?
CVE-2021-33503: no packages for SUSE Linux Enterprise High Availability Extension 12 SP3, but entry?
CVE-2021-33503: no packages for SUSE Linux Enterprise High Availability Extension 12 SP4, but entry?
CVE-2021-33503: no packages for SUSE Linux Enterprise High Availability Extension 12 SP5, but entry?
CVE-2021-33503: no packages for SUSE Linux Enterprise Module for Web and Scripting 12, but entry?
CVE-2021-33503: no packages for SUSE OpenStack Cloud 7, but entry?
skipping CVE-2021-33515 as CVE page is older than CVRF-CVE file.
no cpe found for SUSE Package Hub 15 SP3 in CVE-2021-33477
no cpe found for SUSE Package Hub 15 SP4 in CVE-2021-33477
no cpe found for SUSE Package Hub 15 SP3 in CVE-2021-33293
skipping CVE-2021-33294 as CVE page is older than CVRF-CVE file.
no cpe found for SUSE Package Hub 15 SP3 in CVE-2021-33203
skipping CVE-2021-33193 as CVE page is older than CVRF-CVE file.
skipping CVE-2021-33155 as CVE page is older than CVRF-CVE file.
skipping CVE-2021-33139 as CVE page is older than CVRF-CVE file.
skipping CVE-2021-33135 as CVE page is older than CVRF-CVE file.
skipping CVE-2021-33114 as CVE page is older than CVRF-CVE file.
skipping CVE-2021-33113 as CVE page is older than CVRF-CVE file.
no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2021-33061
skipping CVE-2021-33034 as CVE page is older than CVRF-CVE file.
no cpe found for SUSE Package Hub 15 SP2 in CVE-2021-32920
no cpe found for SUSE Package Hub 15 SP3 in CVE-2021-32920
no cpe found for SUSE Package Hub 15 SP2 in CVE-2021-32919
no cpe found for SUSE Package Hub 15 SP3 in CVE-2021-32919
no cpe found for SUSE Package Hub 15 SP2 in CVE-2021-32918
no cpe found for SUSE Package Hub 15 SP3 in CVE-2021-32918
no cpe found for SUSE Package Hub 15 SP2 in CVE-2021-32917
no cpe found for SUSE Package Hub 15 SP3 in CVE-2021-32917
no cpe found for SUSE Package Hub 15 SP4 in CVE-2021-32837
skipping CVE-2021-32815 as CVE page is older than CVRF-CVE file.
no cpe found for SUSE Package Hub 15 SP1 in CVE-2021-32802
no cpe found for SUSE Package Hub 15 SP2 in CVE-2021-32802
no cpe found for SUSE Package Hub 15 SP3 in CVE-2021-32802
no cpe found for SUSE Package Hub 15 SP1 in CVE-2021-32801
no cpe found for SUSE Package Hub 15 SP2 in CVE-2021-32801
no cpe found for SUSE Package Hub 15 SP3 in CVE-2021-32801
no cpe found for SUSE Package Hub 15 SP1 in CVE-2021-32800
no cpe found for SUSE Package Hub 15 SP2 in CVE-2021-32800
no cpe found for SUSE Package Hub 15 SP3 in CVE-2021-32800
no cpe found for SUSE Package Hub 15 SP5 in CVE-2021-32798
no cpe found for SUSE Package Hub 15 SP6 in CVE-2021-32798
no cpe found for SUSE Package Hub 15 SP4 in CVE-2021-32797
no cpe found for SUSE Package Hub 15 SP1 in CVE-2021-32766
no cpe found for SUSE Package Hub 15 SP2 in CVE-2021-32766
no cpe found for SUSE Package Hub 15 SP3 in CVE-2021-32766
no cpe found for SUSE Package Hub 15 SP2 in CVE-2021-32765
no cpe found for SUSE Package Hub 15 SP3 in CVE-2021-32765
no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2021-32751
no cpe found for SUSE Package Hub 15 SP1 in CVE-2021-32749
no cpe found for SUSE Package Hub 15 SP2 in CVE-2021-32749
no cpe found for SUSE Package Hub 15 SP3 in CVE-2021-32749
no cpe found for SUSE Package Hub 15 SP1 in CVE-2021-32743
no cpe found for SUSE Package Hub 15 SP2 in CVE-2021-32743
no cpe found for SUSE Package Hub 15 SP3 in CVE-2021-32743
no cpe found for SUSE Package Hub 15 SP1 in CVE-2021-32741
no cpe found for SUSE Package Hub 15 SP2 in CVE-2021-32741
no cpe found for SUSE Package Hub 15 SP3 in CVE-2021-32741
no cpe found for SUSE Package Hub 15 SP1 in CVE-2021-32739
no cpe found for SUSE Package Hub 15 SP2 in CVE-2021-32739
no cpe found for SUSE Package Hub 15 SP3 in CVE-2021-32739
no cpe found for SUSE Package Hub 15 SP1 in CVE-2021-32734
no cpe found for SUSE Package Hub 15 SP2 in CVE-2021-32734
no cpe found for SUSE Package Hub 15 SP3 in CVE-2021-32734
no cpe found for SUSE Package Hub 15 SP1 in CVE-2021-32726
no cpe found for SUSE Package Hub 15 SP2 in CVE-2021-32726
no cpe found for SUSE Package Hub 15 SP3 in CVE-2021-32726
no cpe found for SUSE Package Hub 15 SP1 in CVE-2021-32725
no cpe found for SUSE Package Hub 15 SP2 in CVE-2021-32725
no cpe found for SUSE Package Hub 15 SP3 in CVE-2021-32725
no cpe found for SUSE Package Hub 15 SP1 in CVE-2021-32705
no cpe found for SUSE Package Hub 15 SP2 in CVE-2021-32705
no cpe found for SUSE Package Hub 15 SP3 in CVE-2021-32705
no cpe found for SUSE Package Hub 15 SP1 in CVE-2021-32703
no cpe found for SUSE Package Hub 15 SP2 in CVE-2021-32703
no cpe found for SUSE Package Hub 15 SP3 in CVE-2021-32703
no cpe found for SUSE Package Hub 15 SP1 in CVE-2021-32688
no cpe found for SUSE Package Hub 15 SP2 in CVE-2021-32688
no cpe found for SUSE Package Hub 15 SP3 in CVE-2021-32688
no cpe found for SUSE Package Hub 15 SP1 in CVE-2021-32680
no cpe found for SUSE Package Hub 15 SP2 in CVE-2021-32680
no cpe found for SUSE Package Hub 15 SP3 in CVE-2021-32680
no cpe found for SUSE Package Hub 15 SP1 in CVE-2021-32679
no cpe found for SUSE Package Hub 15 SP2 in CVE-2021-32679
no cpe found for SUSE Package Hub 15 SP3 in CVE-2021-32679
no cpe found for SUSE Package Hub 15 SP1 in CVE-2021-32678
no cpe found for SUSE Package Hub 15 SP2 in CVE-2021-32678
no cpe found for SUSE Package Hub 15 SP3 in CVE-2021-32678
no cpe found for SUSE Package Hub 15 SP2 in CVE-2021-32635
no cpe found for SUSE Package Hub 15 SP3 in CVE-2021-32635
skipping CVE-2021-32617 as CVE page is older than CVRF-CVE file.
no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2021-32610
skipping CVE-2021-32606 as CVE page is older than CVRF-CVE file.
no cpe found for SUSE Package Hub 15 SP3 in CVE-2021-32436
skipping CVE-2021-32490 as CVE page is older than CVRF-CVE file.
no cpe found for SUSE Package Hub 15 SP3 in CVE-2021-32435
no cpe found for SUSE Package Hub 15 SP3 in CVE-2021-32434
no cpe found for SUSE Package Hub 15 SP2 in CVE-2021-32280
no cpe found for SUSE Package Hub 15 SP3 in CVE-2021-32280
skipping CVE-2021-32292 as CVE page is older than CVRF-CVE file.
no cpe found for SUSE Liberty Linux 7 LTSS in CVE-2021-32142
no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2021-32142
skipping CVE-2021-32256 as CVE page is older than CVRF-CVE file.
skipping CVE-2021-32078 as CVE page is older than CVRF-CVE file.
no cpe found for SUSE Package Hub 15 SP4 in CVE-2021-32055
no cpe found for SUSE Package Hub 15 SP3 in CVE-2021-32052
skipping CVE-2021-32029 as CVE page is older than CVRF-CVE file.
skipping CVE-2021-32028 as CVE page is older than CVRF-CVE file.
skipping CVE-2021-32027 as CVE page is older than CVRF-CVE file.
no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2021-32000
no cpe found for SUSE Package Hub 15 SP2 in CVE-2021-31998
no cpe found for SUSE Package Hub 15 SP3 in CVE-2021-31998
skipping CVE-2021-31829 as CVE page is older than CVRF-CVE file.
skipping CVE-2021-31826 as CVE page is older than CVRF-CVE file.
notsure where WebYaST for SLE-11 is contained?
notsure where SUSE Linux Enterprise Module for Transactional Server 15 SP3 is contained?
notsure where SUSE Linux Enterprise Module for Transactional Server 15 SP2 is contained?
skipping CVE-2021-31795 as CVE page is older than CVRF-CVE file.
skipping CVE-2021-31618 as CVE page is older than CVRF-CVE file.
skipping CVE-2021-31615 as CVE page is older than CVRF-CVE file.
no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2021-31566
skipping CVE-2021-31523 as CVE page is older than CVRF-CVE file.
skipping CVE-2021-31440 as CVE page is older than CVRF-CVE file.
skipping CVE-2021-31292 as CVE page is older than CVRF-CVE file.
skipping CVE-2021-31291 as CVE page is older than CVRF-CVE file.
skipping CVE-2021-31239 as CVE page is older than CVRF-CVE file.
skipping CVE-2021-31215 as CVE page is older than CVRF-CVE file.
skipping CVE-2021-30897 as CVE page is older than CVRF-CVE file.
skipping CVE-2021-30890 as CVE page is older than CVRF-CVE file.
skipping CVE-2021-30889 as CVE page is older than CVRF-CVE file.
skipping CVE-2021-30888 as CVE page is older than CVRF-CVE file.
skipping CVE-2021-30887 as CVE page is older than CVRF-CVE file.
skipping CVE-2021-30884 as CVE page is older than CVRF-CVE file.
skipping CVE-2021-30860 as CVE page is older than CVRF-CVE file.
skipping CVE-2021-30858 as CVE page is older than CVRF-CVE file.
skipping CVE-2021-30851 as CVE page is older than CVRF-CVE file.
skipping CVE-2021-30849 as CVE page is older than CVRF-CVE file.
skipping CVE-2021-30848 as CVE page is older than CVRF-CVE file.
skipping CVE-2021-30846 as CVE page is older than CVRF-CVE file.
skipping CVE-2021-30836 as CVE page is older than CVRF-CVE file.
skipping CVE-2021-30823 as CVE page is older than CVRF-CVE file.
skipping CVE-2021-30818 as CVE page is older than CVRF-CVE file.
skipping CVE-2021-30809 as CVE page is older than CVRF-CVE file.
skipping CVE-2021-30799 as CVE page is older than CVRF-CVE file.
skipping CVE-2021-30797 as CVE page is older than CVRF-CVE file.
skipping CVE-2021-30795 as CVE page is older than CVRF-CVE file.
skipping CVE-2021-30762 as CVE page is older than CVRF-CVE file.
skipping CVE-2021-30761 as CVE page is older than CVRF-CVE file.
skipping CVE-2021-30758 as CVE page is older than CVRF-CVE file.
skipping CVE-2021-30749 as CVE page is older than CVRF-CVE file.
skipping CVE-2021-30744 as CVE page is older than CVRF-CVE file.
skipping CVE-2021-30734 as CVE page is older than CVRF-CVE file.
skipping CVE-2021-30720 as CVE page is older than CVRF-CVE file.
skipping CVE-2021-30689 as CVE page is older than CVRF-CVE file.
skipping CVE-2021-30682 as CVE page is older than CVRF-CVE file.
skipping CVE-2021-30666 as CVE page is older than CVRF-CVE file.
skipping CVE-2021-30665 as CVE page is older than CVRF-CVE file.
skipping CVE-2021-30663 as CVE page is older than CVRF-CVE file.
skipping CVE-2021-30661 as CVE page is older than CVRF-CVE file.
skipping CVE-2021-30641 as CVE page is older than CVRF-CVE file.
no cpe found for SUSE Package Hub 15 SP3 in CVE-2021-30633
skipping CVE-2021-30639 as CVE page is older than CVRF-CVE file.
no cpe found for SUSE Package Hub 15 SP3 in CVE-2021-30632
no cpe found for SUSE Package Hub 15 SP3 in CVE-2021-30631
no cpe found for SUSE Package Hub 15 SP3 in CVE-2021-30630
no cpe found for SUSE Package Hub 15 SP3 in CVE-2021-30629
no cpe found for SUSE Package Hub 15 SP3 in CVE-2021-30628
no cpe found for SUSE Package Hub 15 SP3 in CVE-2021-30627
no cpe found for SUSE Package Hub 15 SP3 in CVE-2021-30626
no cpe found for SUSE Package Hub 15 SP3 in CVE-2021-30625
no cpe found for SUSE Package Hub 15 SP3 in CVE-2021-30624
no cpe found for SUSE Package Hub 15 SP3 in CVE-2021-30623
no cpe found for SUSE Package Hub 15 SP3 in CVE-2021-30622
no cpe found for SUSE Package Hub 15 SP3 in CVE-2021-30621
no cpe found for SUSE Package Hub 15 SP3 in CVE-2021-30620
no cpe found for SUSE Package Hub 15 SP3 in CVE-2021-30619
no cpe found for SUSE Package Hub 15 SP3 in CVE-2021-30618
no cpe found for SUSE Package Hub 15 SP3 in CVE-2021-30617
no cpe found for SUSE Package Hub 15 SP3 in CVE-2021-30616
no cpe found for SUSE Package Hub 15 SP3 in CVE-2021-30615
no cpe found for SUSE Package Hub 15 SP3 in CVE-2021-30614
no cpe found for SUSE Package Hub 15 SP3 in CVE-2021-30613
no cpe found for SUSE Package Hub 15 SP3 in CVE-2021-30612
no cpe found for SUSE Package Hub 15 SP3 in CVE-2021-30611
no cpe found for SUSE Package Hub 15 SP3 in CVE-2021-30610
no cpe found for SUSE Package Hub 15 SP3 in CVE-2021-30609
no cpe found for SUSE Package Hub 15 SP3 in CVE-2021-30608
no cpe found for SUSE Package Hub 15 SP3 in CVE-2021-30607
no cpe found for SUSE Package Hub 15 SP3 in CVE-2021-30606
no cpe found for SUSE Package Hub 15 SP3 in CVE-2021-30604
no cpe found for SUSE Package Hub 15 SP3 in CVE-2021-30603
no cpe found for SUSE Package Hub 15 SP3 in CVE-2021-30602
no cpe found for SUSE Package Hub 15 SP3 in CVE-2021-30601
no cpe found for SUSE Package Hub 15 SP3 in CVE-2021-30600
no cpe found for SUSE Package Hub 15 SP3 in CVE-2021-30599
no cpe found for SUSE Package Hub 15 SP3 in CVE-2021-30598
no cpe found for SUSE Package Hub 15 SP3 in CVE-2021-30597
no cpe found for SUSE Package Hub 15 SP3 in CVE-2021-30596
no cpe found for SUSE Package Hub 15 SP3 in CVE-2021-30594
no cpe found for SUSE Package Hub 15 SP3 in CVE-2021-30593
no cpe found for SUSE Package Hub 15 SP3 in CVE-2021-30592
no cpe found for SUSE Package Hub 15 SP3 in CVE-2021-30591
no cpe found for SUSE Package Hub 15 SP3 in CVE-2021-30590
no cpe found for SUSE Package Hub 15 SP3 in CVE-2021-30589
no cpe found for SUSE Package Hub 15 SP3 in CVE-2021-30588
no cpe found for SUSE Package Hub 15 SP3 in CVE-2021-30585
no cpe found for SUSE Package Hub 15 SP3 in CVE-2021-30584
no cpe found for SUSE Package Hub 15 SP3 in CVE-2021-30582
no cpe found for SUSE Package Hub 15 SP3 in CVE-2021-30581
no cpe found for SUSE Package Hub 15 SP3 in CVE-2021-30579
no cpe found for SUSE Package Hub 15 SP3 in CVE-2021-30578
no cpe found for SUSE Package Hub 15 SP3 in CVE-2021-30577
no cpe found for SUSE Package Hub 15 SP3 in CVE-2021-30576
no cpe found for SUSE Package Hub 15 SP3 in CVE-2021-30575
no cpe found for SUSE Package Hub 15 SP3 in CVE-2021-30574
no cpe found for SUSE Package Hub 15 SP3 in CVE-2021-30573
no cpe found for SUSE Package Hub 15 SP3 in CVE-2021-30572
no cpe found for SUSE Package Hub 15 SP3 in CVE-2021-30571
no cpe found for SUSE Package Hub 15 SP3 in CVE-2021-30569
no cpe found for SUSE Package Hub 15 SP3 in CVE-2021-30568
no cpe found for SUSE Package Hub 15 SP3 in CVE-2021-30567
no cpe found for SUSE Package Hub 15 SP3 in CVE-2021-30566
no cpe found for SUSE Package Hub 15 SP3 in CVE-2021-30565
no cpe found for SUSE Package Hub 15 SP3 in CVE-2021-30564
no cpe found for SUSE Package Hub 15 SP3 in CVE-2021-30563
no cpe found for SUSE Package Hub 15 SP3 in CVE-2021-30562
no cpe found for SUSE Package Hub 15 SP3 in CVE-2021-30561
no cpe found for SUSE Package Hub 15 SP3 in CVE-2021-30559
skipping CVE-2021-30560 as CVE page is older than CVRF-CVE file.
no cpe found for SUSE Package Hub 15 SP3 in CVE-2021-30557
no cpe found for SUSE Package Hub 15 SP3 in CVE-2021-30556
no cpe found for SUSE Package Hub 15 SP3 in CVE-2021-30555
no cpe found for SUSE Package Hub 15 SP3 in CVE-2021-30554
no cpe found for SUSE Package Hub 15 SP3 in CVE-2021-30553
no cpe found for SUSE Package Hub 15 SP3 in CVE-2021-30552
no cpe found for SUSE Package Hub 15 SP3 in CVE-2021-30551
no cpe found for SUSE Package Hub 15 SP3 in CVE-2021-30550
no cpe found for SUSE Package Hub 15 SP3 in CVE-2021-30549
no cpe found for SUSE Package Hub 15 SP3 in CVE-2021-30548
no cpe found for SUSE Package Hub 15 SP3 in CVE-2021-30547
no cpe found for SUSE Package Hub 15 SP3 in CVE-2021-30546
no cpe found for SUSE Package Hub 15 SP3 in CVE-2021-30545
no cpe found for SUSE Package Hub 15 SP3 in CVE-2021-30544
no cpe found for SUSE Package Hub 15 SP3 in CVE-2021-30541
no cpe found for SUSE Package Hub 15 SP3 in CVE-2021-30540
no cpe found for SUSE Package Hub 15 SP3 in CVE-2021-30539
no cpe found for SUSE Package Hub 15 SP3 in CVE-2021-30538
no cpe found for SUSE Package Hub 15 SP3 in CVE-2021-30537
no cpe found for SUSE Package Hub 15 SP3 in CVE-2021-30536
no cpe found for SUSE Package Hub 15 SP3 in CVE-2021-30535
no cpe found for SUSE Package Hub 15 SP3 in CVE-2021-30534
no cpe found for SUSE Package Hub 15 SP3 in CVE-2021-30533
no cpe found for SUSE Package Hub 15 SP3 in CVE-2021-30532
no cpe found for SUSE Package Hub 15 SP3 in CVE-2021-30531
no cpe found for SUSE Package Hub 15 SP3 in CVE-2021-30530
no cpe found for SUSE Package Hub 15 SP3 in CVE-2021-30529
no cpe found for SUSE Package Hub 15 SP3 in CVE-2021-30528
no cpe found for SUSE Package Hub 15 SP3 in CVE-2021-30527
no cpe found for SUSE Package Hub 15 SP3 in CVE-2021-30526
no cpe found for SUSE Package Hub 15 SP3 in CVE-2021-30525
no cpe found for SUSE Package Hub 15 SP3 in CVE-2021-30524
no cpe found for SUSE Package Hub 15 SP3 in CVE-2021-30523
no cpe found for SUSE Package Hub 15 SP3 in CVE-2021-30522
no cpe found for SUSE Package Hub 15 SP3 in CVE-2021-30521
no cpe found for SUSE Package Hub 15 SP4 in CVE-2021-30501
no cpe found for SUSE Package Hub 15 SP4 in CVE-2021-30500
skipping CVE-2021-30499 as CVE page is older than CVRF-CVE file.
skipping CVE-2021-30498 as CVE page is older than CVRF-CVE file.
skipping CVE-2021-30178 as CVE page is older than CVRF-CVE file.
no cpe found for SUSE Package Hub 15 SP2 in CVE-2021-30145
no cpe found for SUSE Package Hub 15 SP2 in CVE-2021-30004
skipping CVE-2021-29989 as CVE page is older than CVRF-CVE file.
skipping CVE-2021-29988 as CVE page is older than CVRF-CVE file.
skipping CVE-2021-29986 as CVE page is older than CVRF-CVE file.
skipping CVE-2021-29985 as CVE page is older than CVRF-CVE file.
skipping CVE-2021-29984 as CVE page is older than CVRF-CVE file.
skipping CVE-2021-29980 as CVE page is older than CVRF-CVE file.
skipping CVE-2021-29977 as CVE page is older than CVRF-CVE file.
skipping CVE-2021-29976 as CVE page is older than CVRF-CVE file.
skipping CVE-2021-29975 as CVE page is older than CVRF-CVE file.
skipping CVE-2021-29974 as CVE page is older than CVRF-CVE file.
skipping CVE-2021-29973 as CVE page is older than CVRF-CVE file.
skipping CVE-2021-29972 as CVE page is older than CVRF-CVE file.
skipping CVE-2021-29971 as CVE page is older than CVRF-CVE file.
skipping CVE-2021-29970 as CVE page is older than CVRF-CVE file.
skipping CVE-2021-29969 as CVE page is older than CVRF-CVE file.
skipping CVE-2021-29967 as CVE page is older than CVRF-CVE file.
skipping CVE-2021-29966 as CVE page is older than CVRF-CVE file.
skipping CVE-2021-29965 as CVE page is older than CVRF-CVE file.
skipping CVE-2021-29964 as CVE page is older than CVRF-CVE file.
skipping CVE-2021-29963 as CVE page is older than CVRF-CVE file.
skipping CVE-2021-29962 as CVE page is older than CVRF-CVE file.
skipping CVE-2021-29961 as CVE page is older than CVRF-CVE file.
skipping CVE-2021-29960 as CVE page is older than CVRF-CVE file.
skipping CVE-2021-29959 as CVE page is older than CVRF-CVE file.
skipping CVE-2021-29952 as CVE page is older than CVRF-CVE file.
skipping CVE-2021-29951 as CVE page is older than CVRF-CVE file.
skipping CVE-2021-29921 as CVE page is older than CVRF-CVE file.
skipping CVE-2021-29657 as CVE page is older than CVRF-CVE file.
skipping CVE-2021-29649 as CVE page is older than CVRF-CVE file.
skipping CVE-2021-29648 as CVE page is older than CVRF-CVE file.
skipping CVE-2021-29646 as CVE page is older than CVRF-CVE file.
skipping CVE-2021-29623 as CVE page is older than CVRF-CVE file.
skipping CVE-2021-29509 as CVE page is older than CVRF-CVE file.
skipping CVE-2021-29505 as CVE page is older than CVRF-CVE file.
no cpe found for SUSE Package Hub 15 SP3 in CVE-2021-29495
no cpe found for SUSE Package Hub 15 SP4 in CVE-2021-29495
no cpe found for SUSE Package Hub 15 SP1 in CVE-2021-29472
no cpe found for SUSE Package Hub 15 SP2 in CVE-2021-29472
no cpe found for SUSE Package Hub 15 SP3 in CVE-2021-29472
skipping CVE-2021-29473 as CVE page is older than CVRF-CVE file.
skipping CVE-2021-29470 as CVE page is older than CVRF-CVE file.
skipping CVE-2021-29464 as CVE page is older than CVRF-CVE file.
skipping CVE-2021-29463 as CVE page is older than CVRF-CVE file.
no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2021-29457
skipping CVE-2021-29458 as CVE page is older than CVRF-CVE file.
no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2021-29429
no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2021-29428
CVE-2021-29425: no packages for Image SLES15-SP4-SAP-GCE, but entry?
CVE-2021-29425: no packages for SUSE Linux Enterprise Server 15 SP4-TERADATA, but entry?
CVE-2021-29425: no packages for Image SLES15-SP6-SAP-Azure-LI-BYOS, but entry?
CVE-2021-29425: no packages for Image SLES15-SP4-SAP-Azure-VLI-BYOS, but entry?
CVE-2021-29425: no packages for SUSE Linux Enterprise Workstation Extension 15 SP6, but entry?
CVE-2021-29425: no packages for Image SLES15-SP6-SAP-Azure-VLI-BYOS-Production, but entry?
CVE-2021-29425: no packages for SUSE Manager Server Module 4.3, but entry?
CVE-2021-29425: no packages for Image SLES15-SP2-SAP-GCE, but entry?
CVE-2021-29425: no packages for Container bci/kiwi:9.24.43-8.6, but entry?
CVE-2021-29425: no packages for SUSE CaaS Platform 4.0, but entry?
CVE-2021-29425: no packages for Container suse/manager/5.0/x86_64/server-attestation:5.0.0-beta2.2.16, but entry?
CVE-2021-29425: no packages for Image SLES15-SP2-SAP-BYOS-EC2-HVM, but entry?
CVE-2021-29425: no packages for Image SLES15-SP2-SAP-Azure-VLI-BYOS-Production, but entry?
CVE-2021-29425: no packages for Image SLES15-SP5-SAPCAL-Azure, but entry?
CVE-2021-29425: no packages for SUSE Linux Enterprise Workstation Extension 15 SP5, but entry?
CVE-2021-29425: no packages for Image SLES15-SP5-SAP-GCE, but entry?
CVE-2021-29425: no packages for Image SLES15-SP6-SAPCAL-GCE, but entry?
CVE-2021-29425: no packages for Image SLES15-SP6-SAP-GCE, but entry?
CVE-2021-29425: no packages for Image SLES15-SP5-SAP-Azure-LI-BYOS, but entry?
CVE-2021-29425: no packages for SUSE Manager Server Module 4.2, but entry?
CVE-2021-29425: no packages for Image SLES15-SP4-SAP-Azure-VLI-BYOS-Production, but entry?
CVE-2021-29425: no packages for Image SLES15-SP4-SAPCAL, but entry?
CVE-2021-29425: no packages for Image SLES15-SP6-SAPCAL-EC2, but entry?
CVE-2021-29425: no packages for SUSE Linux Enterprise Module for Development Tools 15 SP4, but entry?
CVE-2021-29425: no packages for Container bci/openjdk:latest, but entry?
CVE-2021-29425: no packages for SUSE Linux Enterprise Module for Web and Scripting 15 SP6, but entry?
CVE-2021-29425: no packages for Image SLES15-SP5-SAP-EC2, but entry?
CVE-2021-29425: no packages for Image SLES15-SP2-SAP-BYOS-Azure, but entry?
CVE-2021-29425: no packages for SUSE Linux Enterprise Module for Development Tools 15 SP5, but entry?
CVE-2021-29425: no packages for Image SLES15-SP3-SAP-Azure-VLI-BYOS-Production, but entry?
CVE-2021-29425: no packages for Container bci/openjdk:17-7.1, but entry?
CVE-2021-29425: no packages for SUSE Linux Enterprise Module for Package Hub 15 SP6, but entry?
CVE-2021-29425: no packages for SUSE Linux Enterprise Module for Development Tools 15 SP6, but entry?
CVE-2021-29425: no packages for Image SLES15-SP3-SAPCAL-EC2-HVM, but entry?
CVE-2021-29425: no packages for Image SLES15-SP4-SAP-Azure-LI-BYOS, but entry?
CVE-2021-29425: no packages for Image SLES15-SP3-SAPCAL-GCE, but entry?
CVE-2021-29425: no packages for Image SLES15-SP6-SAP, but entry?
CVE-2021-29425: no packages for Image SLES15-SP4-SAPCAL-GCE, but entry?
CVE-2021-29425: no packages for Image SLES15-SP6-SAP-Azure-LI-BYOS-Production, but entry?
CVE-2021-29425: no packages for SUSE Linux Enterprise Module for Package Hub 15 SP4, but entry?
CVE-2021-29425: no packages for Image SLES15-SP4-SAP, but entry?
CVE-2021-29425: no packages for Image SLES15-SP6-SAP-EC2, but entry?
CVE-2021-29425: no packages for Image SLES15-SP3-SAP-Azure-LI-BYOS-Production, but entry?
CVE-2021-29425: no packages for Image SLES15-SP2-SAP-EC2-HVM, but entry?
CVE-2021-29425: no packages for Image SLES15-SP4-SAPCAL-Azure, but entry?
CVE-2021-29425: no packages for Image SLES15-SP5-SAPCAL-EC2, but entry?
CVE-2021-29425: no packages for Image SLES15-SP4-SAPCAL-EC2, but entry?
CVE-2021-29425: no packages for SUSE Linux Enterprise Module for Web and Scripting 15 SP4, but entry?
CVE-2021-29425: no packages for SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS, but entry?
CVE-2021-29425: no packages for Container bci/openjdk:11-7.1, but entry?
CVE-2021-29425: no packages for SUSE Linux Enterprise Server for SAP Applications 15 SP1, but entry?
CVE-2021-29425: no packages for Image SLES15-SP4-SAP-EC2, but entry?
CVE-2021-29425: no packages for Image SLES15-SP5-SAP-Azure-VLI-BYOS-Production, but entry?
CVE-2021-29425: no packages for Image SLES15-SP5-SAP-Azure, but entry?
CVE-2021-29425: no packages for Image SLES15-SP6-SAP-Azure-VLI-BYOS, but entry?
CVE-2021-29425: no packages for Image SLES15-SP6-SAPCAL-Azure, but entry?
CVE-2021-29425: no packages for SUSE Linux Enterprise Server 15 SP1-LTSS, but entry?
CVE-2021-29425: no packages for Image SLES15-SP5-SAPCAL-GCE, but entry?
CVE-2021-29425: no packages for Image SLES15-SP6-SAP-Azure, but entry?
CVE-2021-29425: no packages for SUSE Linux Enterprise Module for Web and Scripting 15 SP5, but entry?
CVE-2021-29425: no packages for Image SLES15-SP3-SAPCAL-Azure, but entry?
CVE-2021-29425: no packages for Image SLES15-SP5-SAP-Azure-VLI-BYOS, but entry?
CVE-2021-29425: no packages for Image SLES15-SP6-SAPCAL, but entry?
CVE-2021-29425: no packages for Image SLES15-SP5-SAP-Azure-LI-BYOS-Production, but entry?
CVE-2021-29425: no packages for Image SLES15-SP2-SAP-BYOS-GCE, but entry?
CVE-2021-29425: no packages for Image SLES15-SP2-SAP-Azure-LI-BYOS-Production, but entry?
CVE-2021-29425: no packages for Image SLES15-SP4-SAP-Azure-LI-BYOS-Production, but entry?
CVE-2021-29425: no packages for Image SLES15-SP2-SAP-Azure, but entry?
CVE-2021-29425: no packages for Image SLES15-SP4-SAP-Azure, but entry?
CVE-2021-29425: no packages for SUSE Linux Enterprise Module for Package Hub 15 SP5, but entry?
CVE-2021-29425: no packages for SUSE Linux Enterprise Workstation Extension 15 SP4, but entry?
CVE-2021-29425: no packages for Container bci/kiwi:9.24.43-8.6, but entry?
CVE-2021-29425: no packages for Container bci/openjdk:11-7.1, but entry?
CVE-2021-29425: no packages for Container bci/openjdk:17-7.1, but entry?
CVE-2021-29425: no packages for Container bci/openjdk:latest, but entry?
CVE-2021-29425: no packages for Container suse/manager/5.0/x86_64/server-attestation:5.0.0-beta2.2.16, but entry?
CVE-2021-29425: no packages for Image SLES15-SP2-SAP-Azure, but entry?
CVE-2021-29425: no packages for Image SLES15-SP2-SAP-Azure-LI-BYOS-Production, but entry?
CVE-2021-29425: no packages for Image SLES15-SP2-SAP-Azure-VLI-BYOS-Production, but entry?
CVE-2021-29425: no packages for Image SLES15-SP2-SAP-BYOS-Azure, but entry?
CVE-2021-29425: no packages for Image SLES15-SP2-SAP-BYOS-EC2-HVM, but entry?
CVE-2021-29425: no packages for Image SLES15-SP2-SAP-BYOS-GCE, but entry?
CVE-2021-29425: no packages for Image SLES15-SP2-SAP-EC2-HVM, but entry?
CVE-2021-29425: no packages for Image SLES15-SP2-SAP-GCE, but entry?
CVE-2021-29425: no packages for Image SLES15-SP3-SAP-Azure-LI-BYOS-Production, but entry?
CVE-2021-29425: no packages for Image SLES15-SP3-SAP-Azure-VLI-BYOS-Production, but entry?
CVE-2021-29425: no packages for Image SLES15-SP3-SAPCAL-Azure, but entry?
CVE-2021-29425: no packages for Image SLES15-SP3-SAPCAL-EC2-HVM, but entry?
CVE-2021-29425: no packages for Image SLES15-SP3-SAPCAL-GCE, but entry?
CVE-2021-29425: no packages for Image SLES15-SP4-SAP, but entry?
CVE-2021-29425: no packages for Image SLES15-SP4-SAP-Azure, but entry?
CVE-2021-29425: no packages for Image SLES15-SP4-SAP-Azure-LI-BYOS, but entry?
CVE-2021-29425: no packages for Image SLES15-SP4-SAP-Azure-LI-BYOS-Production, but entry?
CVE-2021-29425: no packages for Image SLES15-SP4-SAP-Azure-VLI-BYOS, but entry?
CVE-2021-29425: no packages for Image SLES15-SP4-SAP-Azure-VLI-BYOS-Production, but entry?
CVE-2021-29425: no packages for Image SLES15-SP4-SAP-EC2, but entry?
CVE-2021-29425: no packages for Image SLES15-SP4-SAP-GCE, but entry?
CVE-2021-29425: no packages for Image SLES15-SP4-SAPCAL, but entry?
CVE-2021-29425: no packages for Image SLES15-SP4-SAPCAL-Azure, but entry?
CVE-2021-29425: no packages for Image SLES15-SP4-SAPCAL-EC2, but entry?
CVE-2021-29425: no packages for Image SLES15-SP4-SAPCAL-GCE, but entry?
CVE-2021-29425: no packages for Image SLES15-SP5-SAP-Azure, but entry?
CVE-2021-29425: no packages for Image SLES15-SP5-SAP-Azure-LI-BYOS, but entry?
CVE-2021-29425: no packages for Image SLES15-SP5-SAP-Azure-LI-BYOS-Production, but entry?
CVE-2021-29425: no packages for Image SLES15-SP5-SAP-Azure-VLI-BYOS, but entry?
CVE-2021-29425: no packages for Image SLES15-SP5-SAP-Azure-VLI-BYOS-Production, but entry?
CVE-2021-29425: no packages for Image SLES15-SP5-SAP-EC2, but entry?
CVE-2021-29425: no packages for Image SLES15-SP5-SAP-GCE, but entry?
CVE-2021-29425: no packages for Image SLES15-SP5-SAPCAL-Azure, but entry?
CVE-2021-29425: no packages for Image SLES15-SP5-SAPCAL-EC2, but entry?
CVE-2021-29425: no packages for Image SLES15-SP5-SAPCAL-GCE, but entry?
CVE-2021-29425: no packages for Image SLES15-SP6-SAP, but entry?
CVE-2021-29425: no packages for Image SLES15-SP6-SAP-Azure, but entry?
CVE-2021-29425: no packages for Image SLES15-SP6-SAP-Azure-LI-BYOS, but entry?
CVE-2021-29425: no packages for Image SLES15-SP6-SAP-Azure-LI-BYOS-Production, but entry?
CVE-2021-29425: no packages for Image SLES15-SP6-SAP-Azure-VLI-BYOS, but entry?
CVE-2021-29425: no packages for Image SLES15-SP6-SAP-Azure-VLI-BYOS-Production, but entry?
CVE-2021-29425: no packages for Image SLES15-SP6-SAP-EC2, but entry?
CVE-2021-29425: no packages for Image SLES15-SP6-SAP-GCE, but entry?
CVE-2021-29425: no packages for Image SLES15-SP6-SAPCAL, but entry?
CVE-2021-29425: no packages for Image SLES15-SP6-SAPCAL-Azure, but entry?
CVE-2021-29425: no packages for Image SLES15-SP6-SAPCAL-EC2, but entry?
CVE-2021-29425: no packages for Image SLES15-SP6-SAPCAL-GCE, but entry?
CVE-2021-29425: no packages for SUSE CaaS Platform 4.0, but entry?
CVE-2021-29425: no packages for SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS, but entry?
CVE-2021-29425: no packages for SUSE Linux Enterprise Module for Development Tools 15 SP4, but entry?
CVE-2021-29425: no packages for SUSE Linux Enterprise Module for Development Tools 15 SP5, but entry?
CVE-2021-29425: no packages for SUSE Linux Enterprise Module for Development Tools 15 SP6, but entry?
CVE-2021-29425: no packages for SUSE Linux Enterprise Module for Package Hub 15 SP4, but entry?
CVE-2021-29425: no packages for SUSE Linux Enterprise Module for Package Hub 15 SP5, but entry?
CVE-2021-29425: no packages for SUSE Linux Enterprise Module for Package Hub 15 SP6, but entry?
CVE-2021-29425: no packages for SUSE Linux Enterprise Module for Web and Scripting 15 SP4, but entry?
CVE-2021-29425: no packages for SUSE Linux Enterprise Module for Web and Scripting 15 SP5, but entry?
CVE-2021-29425: no packages for SUSE Linux Enterprise Module for Web and Scripting 15 SP6, but entry?
CVE-2021-29425: no packages for SUSE Linux Enterprise Server 15 SP1-LTSS, but entry?
CVE-2021-29425: no packages for SUSE Linux Enterprise Server 15 SP4-TERADATA, but entry?
CVE-2021-29425: no packages for SUSE Linux Enterprise Server for SAP Applications 15 SP1, but entry?
CVE-2021-29425: no packages for SUSE Linux Enterprise Workstation Extension 15 SP4, but entry?
CVE-2021-29425: no packages for SUSE Linux Enterprise Workstation Extension 15 SP5, but entry?
CVE-2021-29425: no packages for SUSE Linux Enterprise Workstation Extension 15 SP6, but entry?
CVE-2021-29425: no packages for SUSE Manager Server Module 4.2, but entry?
CVE-2021-29425: no packages for SUSE Manager Server Module 4.3, but entry?
CVE-2021-29425: no packages for Container bci/kiwi:9.24.43-8.6, but entry?
CVE-2021-29425: no packages for Container bci/openjdk:11-7.1, but entry?
CVE-2021-29425: no packages for Container bci/openjdk:17-7.1, but entry?
CVE-2021-29425: no packages for Container bci/openjdk:latest, but entry?
CVE-2021-29425: no packages for Container suse/manager/5.0/x86_64/server-attestation:5.0.0-beta2.2.16, but entry?
CVE-2021-29425: no packages for Image SLES15-SP2-SAP-Azure, but entry?
CVE-2021-29425: no packages for Image SLES15-SP2-SAP-Azure-LI-BYOS-Production, but entry?
CVE-2021-29425: no packages for Image SLES15-SP2-SAP-Azure-VLI-BYOS-Production, but entry?
CVE-2021-29425: no packages for Image SLES15-SP2-SAP-BYOS-Azure, but entry?
CVE-2021-29425: no packages for Image SLES15-SP2-SAP-BYOS-EC2-HVM, but entry?
CVE-2021-29425: no packages for Image SLES15-SP2-SAP-BYOS-GCE, but entry?
CVE-2021-29425: no packages for Image SLES15-SP2-SAP-EC2-HVM, but entry?
CVE-2021-29425: no packages for Image SLES15-SP2-SAP-GCE, but entry?
CVE-2021-29425: no packages for Image SLES15-SP3-SAP-Azure-LI-BYOS-Production, but entry?
CVE-2021-29425: no packages for Image SLES15-SP3-SAP-Azure-VLI-BYOS-Production, but entry?
CVE-2021-29425: no packages for Image SLES15-SP3-SAPCAL-Azure, but entry?
CVE-2021-29425: no packages for Image SLES15-SP3-SAPCAL-EC2-HVM, but entry?
CVE-2021-29425: no packages for Image SLES15-SP3-SAPCAL-GCE, but entry?
CVE-2021-29425: no packages for Image SLES15-SP4-SAP, but entry?
CVE-2021-29425: no packages for Image SLES15-SP4-SAP-Azure, but entry?
CVE-2021-29425: no packages for Image SLES15-SP4-SAP-Azure-LI-BYOS, but entry?
CVE-2021-29425: no packages for Image SLES15-SP4-SAP-Azure-LI-BYOS-Production, but entry?
CVE-2021-29425: no packages for Image SLES15-SP4-SAP-Azure-VLI-BYOS, but entry?
CVE-2021-29425: no packages for Image SLES15-SP4-SAP-Azure-VLI-BYOS-Production, but entry?
CVE-2021-29425: no packages for Image SLES15-SP4-SAP-EC2, but entry?
CVE-2021-29425: no packages for Image SLES15-SP4-SAP-GCE, but entry?
CVE-2021-29425: no packages for Image SLES15-SP4-SAPCAL, but entry?
CVE-2021-29425: no packages for Image SLES15-SP4-SAPCAL-Azure, but entry?
CVE-2021-29425: no packages for Image SLES15-SP4-SAPCAL-EC2, but entry?
CVE-2021-29425: no packages for Image SLES15-SP4-SAPCAL-GCE, but entry?
CVE-2021-29425: no packages for Image SLES15-SP5-SAP-Azure, but entry?
CVE-2021-29425: no packages for Image SLES15-SP5-SAP-Azure-LI-BYOS, but entry?
CVE-2021-29425: no packages for Image SLES15-SP5-SAP-Azure-LI-BYOS-Production, but entry?
CVE-2021-29425: no packages for Image SLES15-SP5-SAP-Azure-VLI-BYOS, but entry?
CVE-2021-29425: no packages for Image SLES15-SP5-SAP-Azure-VLI-BYOS-Production, but entry?
CVE-2021-29425: no packages for Image SLES15-SP5-SAP-EC2, but entry?
CVE-2021-29425: no packages for Image SLES15-SP5-SAP-GCE, but entry?
CVE-2021-29425: no packages for Image SLES15-SP5-SAPCAL-Azure, but entry?
CVE-2021-29425: no packages for Image SLES15-SP5-SAPCAL-EC2, but entry?
CVE-2021-29425: no packages for Image SLES15-SP5-SAPCAL-GCE, but entry?
CVE-2021-29425: no packages for Image SLES15-SP6-SAP, but entry?
CVE-2021-29425: no packages for Image SLES15-SP6-SAP-Azure, but entry?
CVE-2021-29425: no packages for Image SLES15-SP6-SAP-Azure-LI-BYOS, but entry?
CVE-2021-29425: no packages for Image SLES15-SP6-SAP-Azure-LI-BYOS-Production, but entry?
CVE-2021-29425: no packages for Image SLES15-SP6-SAP-Azure-VLI-BYOS, but entry?
CVE-2021-29425: no packages for Image SLES15-SP6-SAP-Azure-VLI-BYOS-Production, but entry?
CVE-2021-29425: no packages for Image SLES15-SP6-SAP-EC2, but entry?
CVE-2021-29425: no packages for Image SLES15-SP6-SAP-GCE, but entry?
CVE-2021-29425: no packages for Image SLES15-SP6-SAPCAL, but entry?
CVE-2021-29425: no packages for Image SLES15-SP6-SAPCAL-Azure, but entry?
CVE-2021-29425: no packages for Image SLES15-SP6-SAPCAL-EC2, but entry?
CVE-2021-29425: no packages for Image SLES15-SP6-SAPCAL-GCE, but entry?
CVE-2021-29425: no packages for SUSE CaaS Platform 4.0, but entry?
CVE-2021-29425: no packages for SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS, but entry?
CVE-2021-29425: no packages for SUSE Linux Enterprise Module for Development Tools 15 SP4, but entry?
CVE-2021-29425: no packages for SUSE Linux Enterprise Module for Development Tools 15 SP5, but entry?
CVE-2021-29425: no packages for SUSE Linux Enterprise Module for Development Tools 15 SP6, but entry?
CVE-2021-29425: no packages for SUSE Linux Enterprise Module for Package Hub 15 SP4, but entry?
CVE-2021-29425: no packages for SUSE Linux Enterprise Module for Package Hub 15 SP5, but entry?
CVE-2021-29425: no packages for SUSE Linux Enterprise Module for Package Hub 15 SP6, but entry?
CVE-2021-29425: no packages for SUSE Linux Enterprise Module for Web and Scripting 15 SP4, but entry?
CVE-2021-29425: no packages for SUSE Linux Enterprise Module for Web and Scripting 15 SP5, but entry?
CVE-2021-29425: no packages for SUSE Linux Enterprise Module for Web and Scripting 15 SP6, but entry?
CVE-2021-29425: no packages for SUSE Linux Enterprise Server 15 SP1-LTSS, but entry?
CVE-2021-29425: no packages for SUSE Linux Enterprise Server 15 SP4-TERADATA, but entry?
CVE-2021-29425: no packages for SUSE Linux Enterprise Server for SAP Applications 15 SP1, but entry?
CVE-2021-29425: no packages for SUSE Linux Enterprise Workstation Extension 15 SP4, but entry?
CVE-2021-29425: no packages for SUSE Linux Enterprise Workstation Extension 15 SP5, but entry?
CVE-2021-29425: no packages for SUSE Linux Enterprise Workstation Extension 15 SP6, but entry?
CVE-2021-29425: no packages for SUSE Manager Server Module 4.2, but entry?
CVE-2021-29425: no packages for SUSE Manager Server Module 4.3, but entry?
no cpe found for SUSE Package Hub 15 SP4 in CVE-2021-29424
no cpe found for SUSE Package Hub 15 SP5 in CVE-2021-29424
skipping CVE-2021-29390 as CVE page is older than CVRF-CVE file.
skipping CVE-2021-29266 as CVE page is older than CVRF-CVE file.
skipping CVE-2021-29157 as CVE page is older than CVRF-CVE file.
no cpe found for SUSE Package Hub 15 SP2 in CVE-2021-29136
no cpe found for SUSE Package Hub 15 SP3 in CVE-2021-29136
no cpe found for SUSE Package Hub 15 SP1 in CVE-2021-29133
no cpe found for SUSE Package Hub 15 SP2 in CVE-2021-29133
no cpe found for SUSE Package Hub 15 SP3 in CVE-2021-29133
skipping CVE-2021-28965 as CVE page is older than CVRF-CVE file.
skipping CVE-2021-28952 as CVE page is older than CVRF-CVE file.
skipping CVE-2021-28951 as CVE page is older than CVRF-CVE file.
no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2021-28906
no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2021-28905
no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2021-28904
no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2021-28903
no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2021-28902
no cpe found for SUSE Package Hub 15 SP2 in CVE-2021-28899
no cpe found for SUSE Package Hub 15 SP3 in CVE-2021-28899
no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2021-28861
no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2021-28831
skipping CVE-2021-28713 as CVE page is older than CVRF-CVE file.
skipping CVE-2021-28712 as CVE page is older than CVRF-CVE file.
skipping CVE-2021-28711 as CVE page is older than CVRF-CVE file.
skipping CVE-2021-28710 as CVE page is older than CVRF-CVE file.
skipping CVE-2021-28703 as CVE page is older than CVRF-CVE file.
skipping CVE-2021-28691 as CVE page is older than CVRF-CVE file.
skipping CVE-2021-28657 as CVE page is older than CVRF-CVE file.
no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2021-28429
no cpe found for SUSE Package Hub 15 SP2 in CVE-2021-28421
skipping CVE-2021-28375 as CVE page is older than CVRF-CVE file.
skipping CVE-2021-28363 as CVE page is older than CVRF-CVE file.
no cpe found for SUSE Package Hub 15 SP3 in CVE-2021-28237
no cpe found for SUSE Package Hub 15 SP4 in CVE-2021-28237
skipping CVE-2021-28153 as CVE page is older than CVRF-CVE file.
no cpe found for SUSE Liberty Linux 7 LTSS in CVE-2021-28091
no cpe found for SUSE Package Hub 15 SP2 in CVE-2021-28090
no cpe found for SUSE Package Hub 15 SP2 in CVE-2021-28089
skipping CVE-2021-28041 as CVE page is older than CVRF-CVE file.
skipping CVE-2021-28039 as CVE page is older than CVRF-CVE file.
skipping CVE-2021-28025 as CVE page is older than CVRF-CVE file.
no cpe found for SUSE Package Hub 15 SP3 in CVE-2021-27927
CVE-2021-27906: no packages for Image SLES15-SP4-Manager-Server-4-3-BYOS, but entry?
CVE-2021-27906: no packages for Image SLES15-SP4-SAP-Azure-LI-BYOS-Production, but entry?
CVE-2021-27906: no packages for Image SLES15-SP2-SAP-Azure-LI-BYOS-Production, but entry?
CVE-2021-27906: no packages for SUSE Linux Enterprise Module for Basesystem 15 SP5, but entry?
CVE-2021-27906: no packages for Image SLES15-SP2-SAP-Azure, but entry?
CVE-2021-27906: no packages for SUSE Linux Enterprise Workstation Extension 15 SP4, but entry?
CVE-2021-27906: no packages for Image SLES15-SP4-SAP-Azure, but entry?
CVE-2021-27906: no packages for SUSE Linux Enterprise Module for Package Hub 15 SP5, but entry?
CVE-2021-27906: no packages for SUSE Manager Proxy 4.2, but entry?
CVE-2021-27906: no packages for Image SLES15-SP4-Manager-Server-4-3, but entry?
CVE-2021-27906: no packages for Image SLES15-SP3-Manager-4-2-Server-BYOS-GCE, but entry?
CVE-2021-27906: no packages for Image SLES15-SP4-Manager-Server-4-3-Azure-ltd, but entry?
CVE-2021-27906: no packages for SUSE Linux Enterprise Module for Web and Scripting 15 SP5, but entry?
CVE-2021-27906: no packages for Image SLES15-SP6-SAPCAL, but entry?
CVE-2021-27906: no packages for Image SLES15-SP5-SAP-Azure-VLI-BYOS, but entry?
CVE-2021-27906: no packages for Image SLES15-SP5-SAP-Azure-LI-BYOS-Production, but entry?
CVE-2021-27906: no packages for SUSE Linux Enterprise Module for Basesystem 15 SP6, but entry?
CVE-2021-27906: no packages for Image SLES15-SP3-SAPCAL-Azure, but entry?
CVE-2021-27906: no packages for Image SLES15-SP2-SAP-BYOS-GCE, but entry?
CVE-2021-27906: no packages for Image SLES15-SP4-Manager-Server-4-3-Azure-llc, but entry?
CVE-2021-27906: no packages for Image SLES15-SP5-SAP-Azure-VLI-BYOS-Production, but entry?
CVE-2021-27906: no packages for Image SLES15-SP6-SAPCAL-Azure, but entry?
CVE-2021-27906: no packages for Image SLES15-SP5-SAP-Azure, but entry?
CVE-2021-27906: no packages for Image SLES15-SP6-SAP-Azure-VLI-BYOS, but entry?
CVE-2021-27906: no packages for SUSE Linux Enterprise Server 15 SP1-LTSS, but entry?
CVE-2021-27906: no packages for Image SLES15-SP4-Manager-Server-4-3-BYOS-EC2, but entry?
CVE-2021-27906: no packages for Image SLES15-SP6-SAP-Azure, but entry?
CVE-2021-27906: no packages for Image SLES15-SP5-SAPCAL-GCE, but entry?
CVE-2021-27906: no packages for Image SLES15-SP4-Manager-Server-4-3-BYOS-GCE, but entry?
CVE-2021-27906: no packages for Image SLES15-SP3-Manager-4-2-Server-BYOS-EC2-HVM, but entry?
CVE-2021-27906: no packages for Image SLES15-SP6-SAP-EC2, but entry?
CVE-2021-27906: no packages for Image SLES15-SP3-SAP-Azure-LI-BYOS-Production, but entry?
CVE-2021-27906: no packages for Image SLES15-SP2-SAP-EC2-HVM, but entry?
CVE-2021-27906: no packages for Image SLES15-SP3-Manager-4-2-Server-BYOS-Azure, but entry?
CVE-2021-27906: no packages for Container bci/openjdk-devel:17-14.11, but entry?
CVE-2021-27906: no packages for SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS, but entry?
CVE-2021-27906: no packages for Image SLES15-SP4-SAP-EC2, but entry?
CVE-2021-27906: no packages for SUSE Linux Enterprise Server for SAP Applications 15 SP1, but entry?
CVE-2021-27906: no packages for Container bci/openjdk:11-7.1, but entry?
CVE-2021-27906: no packages for Image SLES15-SP5-SAPCAL-EC2, but entry?
CVE-2021-27906: no packages for Image SLES15-SP4-SAPCAL-Azure, but entry?
CVE-2021-27906: no packages for SUSE Linux Enterprise Module for Web and Scripting 15 SP4, but entry?
CVE-2021-27906: no packages for Image SLES15-SP4-SAPCAL-EC2, but entry?
CVE-2021-27906: no packages for SUSE Manager Server 4.2, but entry?
CVE-2021-27906: no packages for Image SLES15-SP3-SAPCAL-EC2-HVM, but entry?
CVE-2021-27906: no packages for Image SLES15-SP4-SAP-Azure-LI-BYOS, but entry?
CVE-2021-27906: no packages for Container suse/manager/5.0/x86_64/server:5.0.0-beta1.2.122, but entry?
CVE-2021-27906: no packages for Image SLES15-SP4-SAPCAL-GCE, but entry?
CVE-2021-27906: no packages for Image SLES15-SP3-SAPCAL-GCE, but entry?
CVE-2021-27906: no packages for Image SLES15-SP6-SAP, but entry?
CVE-2021-27906: no packages for Image SLES15-SP6-SAP-Azure-LI-BYOS-Production, but entry?
CVE-2021-27906: no packages for SUSE Linux Enterprise Module for Package Hub 15 SP4, but entry?
CVE-2021-27906: no packages for Image SLES15-SP4-Manager-Server-4-3-EC2-llc, but entry?
CVE-2021-27906: no packages for SUSE Manager Retail Branch Server 4.2, but entry?
CVE-2021-27906: no packages for Image SLES15-SP4-SAP, but entry?
CVE-2021-27906: no packages for Container bci/openjdk:latest, but entry?
CVE-2021-27906: no packages for SUSE Linux Enterprise Module for Web and Scripting 15 SP6, but entry?
CVE-2021-27906: no packages for Image SLES15-SP4-SAPCAL, but entry?
CVE-2021-27906: no packages for Image SLES15-SP6-SAPCAL-EC2, but entry?
CVE-2021-27906: no packages for Image SLES15-SP2-SAP-BYOS-Azure, but entry?
CVE-2021-27906: no packages for Image SLES15-SP5-SAP-EC2, but entry?
CVE-2021-27906: no packages for Image SLES15-SP3-SAP-Azure-VLI-BYOS-Production, but entry?
CVE-2021-27906: no packages for Image SLES15-SP4-Manager-Server-4-3-EC2-ltd, but entry?
CVE-2021-27906: no packages for SUSE Linux Enterprise Module for Basesystem 15 SP4, but entry?
CVE-2021-27906: no packages for SUSE Linux Enterprise Module for Package Hub 15 SP6, but entry?
CVE-2021-27906: no packages for Container bci/openjdk:17-7.1, but entry?
CVE-2021-27906: no packages for SUSE CaaS Platform 4.0, but entry?
CVE-2021-27906: no packages for Image SLES15-SP2-SAP-BYOS-EC2-HVM, but entry?
CVE-2021-27906: no packages for Image SLES15-SP2-SAP-Azure-VLI-BYOS-Production, but entry?
CVE-2021-27906: no packages for Container suse/manager/5.0/x86_64/server-attestation:5.0.0-beta2.2.16, but entry?
CVE-2021-27906: no packages for Image SLES15-SP5-SAP-GCE, but entry?
CVE-2021-27906: no packages for SUSE Linux Enterprise Workstation Extension 15 SP5, but entry?
CVE-2021-27906: no packages for Image SLES15-SP5-SAPCAL-Azure, but entry?
CVE-2021-27906: no packages for Container bci/openjdk-devel:17-7.2, but entry?
CVE-2021-27906: no packages for Image SLES15-SP5-SAP-Azure-LI-BYOS, but entry?
CVE-2021-27906: no packages for SUSE Manager Server Module 4.2, but entry?
CVE-2021-27906: no packages for Image SLES15-SP4-SAP-Azure-VLI-BYOS-Production, but entry?
CVE-2021-27906: no packages for Image SLES15-SP6-SAPCAL-GCE, but entry?
CVE-2021-27906: no packages for Container bci/openjdk-devel:11-6.2, but entry?
CVE-2021-27906: no packages for Image SLES15-SP6-SAP-GCE, but entry?
CVE-2021-27906: no packages for Image SLES15-SP4-Manager-Server-4-3-BYOS-Azure, but entry?
CVE-2021-27906: no packages for SUSE Linux Enterprise Server 15 SP4-TERADATA, but entry?
CVE-2021-27906: no packages for Image SLES15-SP4-SAP-Azure-VLI-BYOS, but entry?
CVE-2021-27906: no packages for Image SLES15-SP6-SAP-Azure-LI-BYOS, but entry?
CVE-2021-27906: no packages for Image SLES15-SP4-SAP-GCE, but entry?
CVE-2021-27906: no packages for SUSE Linux Enterprise Workstation Extension 15 SP6, but entry?
CVE-2021-27906: no packages for SUSE Manager Server Module 4.3, but entry?
CVE-2021-27906: no packages for Image SLES15-SP6-SAP-Azure-VLI-BYOS-Production, but entry?
CVE-2021-27906: no packages for Image SLES15-SP2-SAP-GCE, but entry?
CVE-2021-27906: no packages for Container bci/kiwi:9.24.43-8.6, but entry?
CVE-2021-27906: no packages for Container bci/kiwi:9.24.43-8.6, but entry?
CVE-2021-27906: no packages for Container bci/openjdk-devel:11-6.2, but entry?
CVE-2021-27906: no packages for Container bci/openjdk-devel:17-14.11, but entry?
CVE-2021-27906: no packages for Container bci/openjdk-devel:17-7.2, but entry?
CVE-2021-27906: no packages for Container bci/openjdk:11-7.1, but entry?
CVE-2021-27906: no packages for Container bci/openjdk:17-7.1, but entry?
CVE-2021-27906: no packages for Container bci/openjdk:latest, but entry?
CVE-2021-27906: no packages for Container suse/manager/5.0/x86_64/server-attestation:5.0.0-beta2.2.16, but entry?
CVE-2021-27906: no packages for Container suse/manager/5.0/x86_64/server:5.0.0-beta1.2.122, but entry?
CVE-2021-27906: no packages for Image SLES15-SP2-SAP-Azure, but entry?
CVE-2021-27906: no packages for Image SLES15-SP2-SAP-Azure-LI-BYOS-Production, but entry?
CVE-2021-27906: no packages for Image SLES15-SP2-SAP-Azure-VLI-BYOS-Production, but entry?
CVE-2021-27906: no packages for Image SLES15-SP2-SAP-BYOS-Azure, but entry?
CVE-2021-27906: no packages for Image SLES15-SP2-SAP-BYOS-EC2-HVM, but entry?
CVE-2021-27906: no packages for Image SLES15-SP2-SAP-BYOS-GCE, but entry?
CVE-2021-27906: no packages for Image SLES15-SP2-SAP-EC2-HVM, but entry?
CVE-2021-27906: no packages for Image SLES15-SP2-SAP-GCE, but entry?
CVE-2021-27906: no packages for Image SLES15-SP3-Manager-4-2-Server-BYOS-Azure, but entry?
CVE-2021-27906: no packages for Image SLES15-SP3-Manager-4-2-Server-BYOS-EC2-HVM, but entry?
CVE-2021-27906: no packages for Image SLES15-SP3-Manager-4-2-Server-BYOS-GCE, but entry?
CVE-2021-27906: no packages for Image SLES15-SP3-SAP-Azure-LI-BYOS-Production, but entry?
CVE-2021-27906: no packages for Image SLES15-SP3-SAP-Azure-VLI-BYOS-Production, but entry?
CVE-2021-27906: no packages for Image SLES15-SP3-SAPCAL-Azure, but entry?
CVE-2021-27906: no packages for Image SLES15-SP3-SAPCAL-EC2-HVM, but entry?
CVE-2021-27906: no packages for Image SLES15-SP3-SAPCAL-GCE, but entry?
CVE-2021-27906: no packages for Image SLES15-SP4-Manager-Server-4-3, but entry?
CVE-2021-27906: no packages for Image SLES15-SP4-Manager-Server-4-3-Azure-llc, but entry?
CVE-2021-27906: no packages for Image SLES15-SP4-Manager-Server-4-3-Azure-ltd, but entry?
CVE-2021-27906: no packages for Image SLES15-SP4-Manager-Server-4-3-BYOS, but entry?
CVE-2021-27906: no packages for Image SLES15-SP4-Manager-Server-4-3-BYOS-Azure, but entry?
CVE-2021-27906: no packages for Image SLES15-SP4-Manager-Server-4-3-BYOS-EC2, but entry?
CVE-2021-27906: no packages for Image SLES15-SP4-Manager-Server-4-3-BYOS-GCE, but entry?
CVE-2021-27906: no packages for Image SLES15-SP4-Manager-Server-4-3-EC2-llc, but entry?
CVE-2021-27906: no packages for Image SLES15-SP4-Manager-Server-4-3-EC2-ltd, but entry?
CVE-2021-27906: no packages for Image SLES15-SP4-SAP, but entry?
CVE-2021-27906: no packages for Image SLES15-SP4-SAP-Azure, but entry?
CVE-2021-27906: no packages for Image SLES15-SP4-SAP-Azure-LI-BYOS, but entry?
CVE-2021-27906: no packages for Image SLES15-SP4-SAP-Azure-LI-BYOS-Production, but entry?
CVE-2021-27906: no packages for Image SLES15-SP4-SAP-Azure-VLI-BYOS, but entry?
CVE-2021-27906: no packages for Image SLES15-SP4-SAP-Azure-VLI-BYOS-Production, but entry?
CVE-2021-27906: no packages for Image SLES15-SP4-SAP-EC2, but entry?
CVE-2021-27906: no packages for Image SLES15-SP4-SAP-GCE, but entry?
CVE-2021-27906: no packages for Image SLES15-SP4-SAPCAL, but entry?
CVE-2021-27906: no packages for Image SLES15-SP4-SAPCAL-Azure, but entry?
CVE-2021-27906: no packages for Image SLES15-SP4-SAPCAL-EC2, but entry?
CVE-2021-27906: no packages for Image SLES15-SP4-SAPCAL-GCE, but entry?
CVE-2021-27906: no packages for Image SLES15-SP5-SAP-Azure, but entry?
CVE-2021-27906: no packages for Image SLES15-SP5-SAP-Azure-LI-BYOS, but entry?
CVE-2021-27906: no packages for Image SLES15-SP5-SAP-Azure-LI-BYOS-Production, but entry?
CVE-2021-27906: no packages for Image SLES15-SP5-SAP-Azure-VLI-BYOS, but entry?
CVE-2021-27906: no packages for Image SLES15-SP5-SAP-Azure-VLI-BYOS-Production, but entry?
CVE-2021-27906: no packages for Image SLES15-SP5-SAP-EC2, but entry?
CVE-2021-27906: no packages for Image SLES15-SP5-SAP-GCE, but entry?
CVE-2021-27906: no packages for Image SLES15-SP5-SAPCAL-Azure, but entry?
CVE-2021-27906: no packages for Image SLES15-SP5-SAPCAL-EC2, but entry?
CVE-2021-27906: no packages for Image SLES15-SP5-SAPCAL-GCE, but entry?
CVE-2021-27906: no packages for Image SLES15-SP6-SAP, but entry?
CVE-2021-27906: no packages for Image SLES15-SP6-SAP-Azure, but entry?
CVE-2021-27906: no packages for Image SLES15-SP6-SAP-Azure-LI-BYOS, but entry?
CVE-2021-27906: no packages for Image SLES15-SP6-SAP-Azure-LI-BYOS-Production, but entry?
CVE-2021-27906: no packages for Image SLES15-SP6-SAP-Azure-VLI-BYOS, but entry?
CVE-2021-27906: no packages for Image SLES15-SP6-SAP-Azure-VLI-BYOS-Production, but entry?
CVE-2021-27906: no packages for Image SLES15-SP6-SAP-EC2, but entry?
CVE-2021-27906: no packages for Image SLES15-SP6-SAP-GCE, but entry?
CVE-2021-27906: no packages for Image SLES15-SP6-SAPCAL, but entry?
CVE-2021-27906: no packages for Image SLES15-SP6-SAPCAL-Azure, but entry?
CVE-2021-27906: no packages for Image SLES15-SP6-SAPCAL-EC2, but entry?
CVE-2021-27906: no packages for Image SLES15-SP6-SAPCAL-GCE, but entry?
CVE-2021-27906: no packages for SUSE CaaS Platform 4.0, but entry?
CVE-2021-27906: no packages for SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS, but entry?
CVE-2021-27906: no packages for SUSE Linux Enterprise Module for Basesystem 15 SP4, but entry?
CVE-2021-27906: no packages for SUSE Linux Enterprise Module for Basesystem 15 SP5, but entry?
CVE-2021-27906: no packages for SUSE Linux Enterprise Module for Basesystem 15 SP6, but entry?
CVE-2021-27906: no packages for SUSE Linux Enterprise Module for Package Hub 15 SP4, but entry?
CVE-2021-27906: no packages for SUSE Linux Enterprise Module for Package Hub 15 SP5, but entry?
CVE-2021-27906: no packages for SUSE Linux Enterprise Module for Package Hub 15 SP6, but entry?
CVE-2021-27906: no packages for SUSE Linux Enterprise Module for Web and Scripting 15 SP4, but entry?
CVE-2021-27906: no packages for SUSE Linux Enterprise Module for Web and Scripting 15 SP5, but entry?
CVE-2021-27906: no packages for SUSE Linux Enterprise Module for Web and Scripting 15 SP6, but entry?
CVE-2021-27906: no packages for SUSE Linux Enterprise Server 15 SP1-LTSS, but entry?
CVE-2021-27906: no packages for SUSE Linux Enterprise Server 15 SP4-TERADATA, but entry?
CVE-2021-27906: no packages for SUSE Linux Enterprise Server for SAP Applications 15 SP1, but entry?
CVE-2021-27906: no packages for SUSE Linux Enterprise Workstation Extension 15 SP4, but entry?
CVE-2021-27906: no packages for SUSE Linux Enterprise Workstation Extension 15 SP5, but entry?
CVE-2021-27906: no packages for SUSE Linux Enterprise Workstation Extension 15 SP6, but entry?
CVE-2021-27906: no packages for SUSE Manager Proxy 4.2, but entry?
CVE-2021-27906: no packages for SUSE Manager Retail Branch Server 4.2, but entry?
CVE-2021-27906: no packages for SUSE Manager Server 4.2, but entry?
CVE-2021-27906: no packages for SUSE Manager Server Module 4.2, but entry?
CVE-2021-27906: no packages for SUSE Manager Server Module 4.3, but entry?
CVE-2021-27906: no packages for Container bci/kiwi:9.24.43-8.6, but entry?
CVE-2021-27906: no packages for Container bci/openjdk-devel:11-6.2, but entry?
CVE-2021-27906: no packages for Container bci/openjdk-devel:17-14.11, but entry?
CVE-2021-27906: no packages for Container bci/openjdk-devel:17-7.2, but entry?
CVE-2021-27906: no packages for Container bci/openjdk:11-7.1, but entry?
CVE-2021-27906: no packages for Container bci/openjdk:17-7.1, but entry?
CVE-2021-27906: no packages for Container bci/openjdk:latest, but entry?
CVE-2021-27906: no packages for Container suse/manager/5.0/x86_64/server-attestation:5.0.0-beta2.2.16, but entry?
CVE-2021-27906: no packages for Container suse/manager/5.0/x86_64/server:5.0.0-beta1.2.122, but entry?
CVE-2021-27906: no packages for Image SLES15-SP2-SAP-Azure, but entry?
CVE-2021-27906: no packages for Image SLES15-SP2-SAP-Azure-LI-BYOS-Production, but entry?
CVE-2021-27906: no packages for Image SLES15-SP2-SAP-Azure-VLI-BYOS-Production, but entry?
CVE-2021-27906: no packages for Image SLES15-SP2-SAP-BYOS-Azure, but entry?
CVE-2021-27906: no packages for Image SLES15-SP2-SAP-BYOS-EC2-HVM, but entry?
CVE-2021-27906: no packages for Image SLES15-SP2-SAP-BYOS-GCE, but entry?
CVE-2021-27906: no packages for Image SLES15-SP2-SAP-EC2-HVM, but entry?
CVE-2021-27906: no packages for Image SLES15-SP2-SAP-GCE, but entry?
CVE-2021-27906: no packages for Image SLES15-SP3-Manager-4-2-Server-BYOS-Azure, but entry?
CVE-2021-27906: no packages for Image SLES15-SP3-Manager-4-2-Server-BYOS-EC2-HVM, but entry?
CVE-2021-27906: no packages for Image SLES15-SP3-Manager-4-2-Server-BYOS-GCE, but entry?
CVE-2021-27906: no packages for Image SLES15-SP3-SAP-Azure-LI-BYOS-Production, but entry?
CVE-2021-27906: no packages for Image SLES15-SP3-SAP-Azure-VLI-BYOS-Production, but entry?
CVE-2021-27906: no packages for Image SLES15-SP3-SAPCAL-Azure, but entry?
CVE-2021-27906: no packages for Image SLES15-SP3-SAPCAL-EC2-HVM, but entry?
CVE-2021-27906: no packages for Image SLES15-SP3-SAPCAL-GCE, but entry?
CVE-2021-27906: no packages for Image SLES15-SP4-Manager-Server-4-3, but entry?
CVE-2021-27906: no packages for Image SLES15-SP4-Manager-Server-4-3-Azure-llc, but entry?
CVE-2021-27906: no packages for Image SLES15-SP4-Manager-Server-4-3-Azure-ltd, but entry?
CVE-2021-27906: no packages for Image SLES15-SP4-Manager-Server-4-3-BYOS, but entry?
CVE-2021-27906: no packages for Image SLES15-SP4-Manager-Server-4-3-BYOS-Azure, but entry?
CVE-2021-27906: no packages for Image SLES15-SP4-Manager-Server-4-3-BYOS-EC2, but entry?
CVE-2021-27906: no packages for Image SLES15-SP4-Manager-Server-4-3-BYOS-GCE, but entry?
CVE-2021-27906: no packages for Image SLES15-SP4-Manager-Server-4-3-EC2-llc, but entry?
CVE-2021-27906: no packages for Image SLES15-SP4-Manager-Server-4-3-EC2-ltd, but entry?
CVE-2021-27906: no packages for Image SLES15-SP4-SAP, but entry?
CVE-2021-27906: no packages for Image SLES15-SP4-SAP-Azure, but entry?
CVE-2021-27906: no packages for Image SLES15-SP4-SAP-Azure-LI-BYOS, but entry?
CVE-2021-27906: no packages for Image SLES15-SP4-SAP-Azure-LI-BYOS-Production, but entry?
CVE-2021-27906: no packages for Image SLES15-SP4-SAP-Azure-VLI-BYOS, but entry?
CVE-2021-27906: no packages for Image SLES15-SP4-SAP-Azure-VLI-BYOS-Production, but entry?
CVE-2021-27906: no packages for Image SLES15-SP4-SAP-EC2, but entry?
CVE-2021-27906: no packages for Image SLES15-SP4-SAP-GCE, but entry?
CVE-2021-27906: no packages for Image SLES15-SP4-SAPCAL, but entry?
CVE-2021-27906: no packages for Image SLES15-SP4-SAPCAL-Azure, but entry?
CVE-2021-27906: no packages for Image SLES15-SP4-SAPCAL-EC2, but entry?
CVE-2021-27906: no packages for Image SLES15-SP4-SAPCAL-GCE, but entry?
CVE-2021-27906: no packages for Image SLES15-SP5-SAP-Azure, but entry?
CVE-2021-27906: no packages for Image SLES15-SP5-SAP-Azure-LI-BYOS, but entry?
CVE-2021-27906: no packages for Image SLES15-SP5-SAP-Azure-LI-BYOS-Production, but entry?
CVE-2021-27906: no packages for Image SLES15-SP5-SAP-Azure-VLI-BYOS, but entry?
CVE-2021-27906: no packages for Image SLES15-SP5-SAP-Azure-VLI-BYOS-Production, but entry?
CVE-2021-27906: no packages for Image SLES15-SP5-SAP-EC2, but entry?
CVE-2021-27906: no packages for Image SLES15-SP5-SAP-GCE, but entry?
CVE-2021-27906: no packages for Image SLES15-SP5-SAPCAL-Azure, but entry?
CVE-2021-27906: no packages for Image SLES15-SP5-SAPCAL-EC2, but entry?
CVE-2021-27906: no packages for Image SLES15-SP5-SAPCAL-GCE, but entry?
CVE-2021-27906: no packages for Image SLES15-SP6-SAP, but entry?
CVE-2021-27906: no packages for Image SLES15-SP6-SAP-Azure, but entry?
CVE-2021-27906: no packages for Image SLES15-SP6-SAP-Azure-LI-BYOS, but entry?
CVE-2021-27906: no packages for Image SLES15-SP6-SAP-Azure-LI-BYOS-Production, but entry?
CVE-2021-27906: no packages for Image SLES15-SP6-SAP-Azure-VLI-BYOS, but entry?
CVE-2021-27906: no packages for Image SLES15-SP6-SAP-Azure-VLI-BYOS-Production, but entry?
CVE-2021-27906: no packages for Image SLES15-SP6-SAP-EC2, but entry?
CVE-2021-27906: no packages for Image SLES15-SP6-SAP-GCE, but entry?
CVE-2021-27906: no packages for Image SLES15-SP6-SAPCAL, but entry?
CVE-2021-27906: no packages for Image SLES15-SP6-SAPCAL-Azure, but entry?
CVE-2021-27906: no packages for Image SLES15-SP6-SAPCAL-EC2, but entry?
CVE-2021-27906: no packages for Image SLES15-SP6-SAPCAL-GCE, but entry?
CVE-2021-27906: no packages for SUSE CaaS Platform 4.0, but entry?
CVE-2021-27906: no packages for SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS, but entry?
CVE-2021-27906: no packages for SUSE Linux Enterprise Module for Basesystem 15 SP4, but entry?
CVE-2021-27906: no packages for SUSE Linux Enterprise Module for Basesystem 15 SP5, but entry?
CVE-2021-27906: no packages for SUSE Linux Enterprise Module for Basesystem 15 SP6, but entry?
CVE-2021-27906: no packages for SUSE Linux Enterprise Module for Package Hub 15 SP4, but entry?
CVE-2021-27906: no packages for SUSE Linux Enterprise Module for Package Hub 15 SP5, but entry?
CVE-2021-27906: no packages for SUSE Linux Enterprise Module for Package Hub 15 SP6, but entry?
CVE-2021-27906: no packages for SUSE Linux Enterprise Module for Web and Scripting 15 SP4, but entry?
CVE-2021-27906: no packages for SUSE Linux Enterprise Module for Web and Scripting 15 SP5, but entry?
CVE-2021-27906: no packages for SUSE Linux Enterprise Module for Web and Scripting 15 SP6, but entry?
CVE-2021-27906: no packages for SUSE Linux Enterprise Server 15 SP1-LTSS, but entry?
CVE-2021-27906: no packages for SUSE Linux Enterprise Server 15 SP4-TERADATA, but entry?
CVE-2021-27906: no packages for SUSE Linux Enterprise Server for SAP Applications 15 SP1, but entry?
CVE-2021-27906: no packages for SUSE Linux Enterprise Workstation Extension 15 SP4, but entry?
CVE-2021-27906: no packages for SUSE Linux Enterprise Workstation Extension 15 SP5, but entry?
CVE-2021-27906: no packages for SUSE Linux Enterprise Workstation Extension 15 SP6, but entry?
CVE-2021-27906: no packages for SUSE Manager Proxy 4.2, but entry?
CVE-2021-27906: no packages for SUSE Manager Retail Branch Server 4.2, but entry?
CVE-2021-27906: no packages for SUSE Manager Server 4.2, but entry?
CVE-2021-27906: no packages for SUSE Manager Server Module 4.2, but entry?
CVE-2021-27906: no packages for SUSE Manager Server Module 4.3, but entry?
skipping CVE-2021-27862 as CVE page is older than CVRF-CVE file.
skipping CVE-2021-27861 as CVE page is older than CVRF-CVE file.
skipping CVE-2021-27854 as CVE page is older than CVRF-CVE file.
skipping CVE-2021-27853 as CVE page is older than CVRF-CVE file.
no cpe found for SUSE Package Hub 15 SP3 in CVE-2021-27836
no cpe found for SUSE Package Hub 15 SP4 in CVE-2021-27836
skipping CVE-2021-27845 as CVE page is older than CVRF-CVE file.
CVE-2021-27807: no packages for Image SLES15-SP2-SAP-Azure-VLI-BYOS-Production, but entry?
CVE-2021-27807: no packages for Image SLES15-SP2-SAP-BYOS-EC2-HVM, but entry?
CVE-2021-27807: no packages for Container suse/manager/5.0/x86_64/server-attestation:5.0.0-beta2.2.16, but entry?
CVE-2021-27807: no packages for SUSE CaaS Platform 4.0, but entry?
CVE-2021-27807: no packages for Image SLES15-SP4-SAP-Azure-VLI-BYOS-Production, but entry?
CVE-2021-27807: no packages for Image SLES15-SP5-SAP-Azure-LI-BYOS, but entry?
CVE-2021-27807: no packages for SUSE Manager Server Module 4.2, but entry?
CVE-2021-27807: no packages for Image SLES15-SP4-Manager-Server-4-3-BYOS-Azure, but entry?
CVE-2021-27807: no packages for Image SLES15-SP6-SAP-GCE, but entry?
CVE-2021-27807: no packages for Image SLES15-SP6-SAPCAL-GCE, but entry?
CVE-2021-27807: no packages for Container bci/openjdk-devel:11-6.2, but entry?
CVE-2021-27807: no packages for SUSE Linux Enterprise Workstation Extension 15 SP5, but entry?
CVE-2021-27807: no packages for Image SLES15-SP5-SAP-GCE, but entry?
CVE-2021-27807: no packages for Container bci/openjdk-devel:17-7.2, but entry?
CVE-2021-27807: no packages for Image SLES15-SP5-SAPCAL-Azure, but entry?
CVE-2021-27807: no packages for Image SLES15-SP6-SAP-Azure-VLI-BYOS-Production, but entry?
CVE-2021-27807: no packages for SUSE Manager Server Module 4.3, but entry?
CVE-2021-27807: no packages for SUSE Linux Enterprise Workstation Extension 15 SP6, but entry?
CVE-2021-27807: no packages for SUSE Linux Enterprise Server 15 SP4-TERADATA, but entry?
CVE-2021-27807: no packages for Image SLES15-SP6-SAP-Azure-LI-BYOS, but entry?
CVE-2021-27807: no packages for Image SLES15-SP4-SAP-Azure-VLI-BYOS, but entry?
CVE-2021-27807: no packages for Image SLES15-SP4-SAP-GCE, but entry?
CVE-2021-27807: no packages for Container bci/kiwi:9.24.43-8.6, but entry?
CVE-2021-27807: no packages for Image SLES15-SP2-SAP-GCE, but entry?
CVE-2021-27807: no packages for Image SLES15-SP4-SAPCAL-GCE, but entry?
CVE-2021-27807: no packages for Image SLES15-SP6-SAP, but entry?
CVE-2021-27807: no packages for Image SLES15-SP3-SAPCAL-GCE, but entry?
CVE-2021-27807: no packages for SUSE Manager Server 4.2, but entry?
CVE-2021-27807: no packages for Image SLES15-SP3-SAPCAL-EC2-HVM, but entry?
CVE-2021-27807: no packages for Image SLES15-SP4-SAP-Azure-LI-BYOS, but entry?
CVE-2021-27807: no packages for Container suse/manager/5.0/x86_64/server:5.0.0-beta1.2.122, but entry?
CVE-2021-27807: no packages for Image SLES15-SP4-Manager-Server-4-3-EC2-llc, but entry?
CVE-2021-27807: no packages for SUSE Manager Retail Branch Server 4.2, but entry?
CVE-2021-27807: no packages for Image SLES15-SP4-SAP, but entry?
CVE-2021-27807: no packages for Image SLES15-SP6-SAP-Azure-LI-BYOS-Production, but entry?
CVE-2021-27807: no packages for SUSE Linux Enterprise Module for Package Hub 15 SP4, but entry?
CVE-2021-27807: no packages for Image SLES15-SP2-SAP-BYOS-Azure, but entry?
CVE-2021-27807: no packages for Image SLES15-SP5-SAP-EC2, but entry?
CVE-2021-27807: no packages for Container bci/openjdk:latest, but entry?
CVE-2021-27807: no packages for SUSE Linux Enterprise Module for Web and Scripting 15 SP6, but entry?
CVE-2021-27807: no packages for Image SLES15-SP4-SAPCAL, but entry?
CVE-2021-27807: no packages for Image SLES15-SP6-SAPCAL-EC2, but entry?
CVE-2021-27807: no packages for SUSE Linux Enterprise Module for Package Hub 15 SP6, but entry?
CVE-2021-27807: no packages for SUSE Linux Enterprise Module for Basesystem 15 SP4, but entry?
CVE-2021-27807: no packages for Container bci/openjdk:17-7.1, but entry?
CVE-2021-27807: no packages for Image SLES15-SP4-Manager-Server-4-3-EC2-ltd, but entry?
CVE-2021-27807: no packages for Image SLES15-SP3-SAP-Azure-VLI-BYOS-Production, but entry?
CVE-2021-27807: no packages for Image SLES15-SP6-SAPCAL-Azure, but entry?
CVE-2021-27807: no packages for Image SLES15-SP6-SAP-Azure-VLI-BYOS, but entry?
CVE-2021-27807: no packages for Image SLES15-SP5-SAP-Azure, but entry?
CVE-2021-27807: no packages for Image SLES15-SP5-SAP-Azure-VLI-BYOS-Production, but entry?
CVE-2021-27807: no packages for Image SLES15-SP5-SAPCAL-GCE, but entry?
CVE-2021-27807: no packages for Image SLES15-SP6-SAP-Azure, but entry?
CVE-2021-27807: no packages for Image SLES15-SP4-Manager-Server-4-3-BYOS-EC2, but entry?
CVE-2021-27807: no packages for Image SLES15-SP3-Manager-4-2-Server-BYOS-EC2-HVM, but entry?
CVE-2021-27807: no packages for Image SLES15-SP4-Manager-Server-4-3-BYOS-GCE, but entry?
CVE-2021-27807: no packages for SUSE Linux Enterprise Server 15 SP1-LTSS, but entry?
CVE-2021-27807: no packages for Image SLES15-SP2-SAP-EC2-HVM, but entry?
CVE-2021-27807: no packages for Image SLES15-SP3-SAP-Azure-LI-BYOS-Production, but entry?
CVE-2021-27807: no packages for Image SLES15-SP6-SAP-EC2, but entry?
CVE-2021-27807: no packages for SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS, but entry?
CVE-2021-27807: no packages for Container bci/openjdk:11-7.1, but entry?
CVE-2021-27807: no packages for SUSE Linux Enterprise Server for SAP Applications 15 SP1, but entry?
CVE-2021-27807: no packages for Image SLES15-SP4-SAP-EC2, but entry?
CVE-2021-27807: no packages for Container bci/openjdk-devel:17-14.11, but entry?
CVE-2021-27807: no packages for Image SLES15-SP4-SAPCAL-EC2, but entry?
CVE-2021-27807: no packages for SUSE Linux Enterprise Module for Web and Scripting 15 SP4, but entry?
CVE-2021-27807: no packages for Image SLES15-SP4-SAPCAL-Azure, but entry?
CVE-2021-27807: no packages for Image SLES15-SP5-SAPCAL-EC2, but entry?
CVE-2021-27807: no packages for Image SLES15-SP3-Manager-4-2-Server-BYOS-Azure, but entry?
CVE-2021-27807: no packages for Image SLES15-SP2-SAP-Azure, but entry?
CVE-2021-27807: no packages for SUSE Linux Enterprise Module for Basesystem 15 SP5, but entry?
CVE-2021-27807: no packages for Image SLES15-SP2-SAP-Azure-LI-BYOS-Production, but entry?
CVE-2021-27807: no packages for Image SLES15-SP4-SAP-Azure-LI-BYOS-Production, but entry?
CVE-2021-27807: no packages for Image SLES15-SP4-Manager-Server-4-3-BYOS, but entry?
CVE-2021-27807: no packages for SUSE Manager Proxy 4.2, but entry?
CVE-2021-27807: no packages for Image SLES15-SP4-Manager-Server-4-3, but entry?
CVE-2021-27807: no packages for SUSE Linux Enterprise Workstation Extension 15 SP4, but entry?
CVE-2021-27807: no packages for SUSE Linux Enterprise Module for Package Hub 15 SP5, but entry?
CVE-2021-27807: no packages for Image SLES15-SP4-SAP-Azure, but entry?
CVE-2021-27807: no packages for Image SLES15-SP4-Manager-Server-4-3-Azure-ltd, but entry?
CVE-2021-27807: no packages for SUSE Linux Enterprise Module for Web and Scripting 15 SP5, but entry?
CVE-2021-27807: no packages for Image SLES15-SP3-Manager-4-2-Server-BYOS-GCE, but entry?
CVE-2021-27807: no packages for Image SLES15-SP4-Manager-Server-4-3-Azure-llc, but entry?
CVE-2021-27807: no packages for Image SLES15-SP2-SAP-BYOS-GCE, but entry?
CVE-2021-27807: no packages for SUSE Linux Enterprise Module for Basesystem 15 SP6, but entry?
CVE-2021-27807: no packages for Image SLES15-SP5-SAP-Azure-LI-BYOS-Production, but entry?
CVE-2021-27807: no packages for Image SLES15-SP5-SAP-Azure-VLI-BYOS, but entry?
CVE-2021-27807: no packages for Image SLES15-SP6-SAPCAL, but entry?
CVE-2021-27807: no packages for Image SLES15-SP3-SAPCAL-Azure, but entry?
CVE-2021-27807: no packages for Container bci/kiwi:9.24.43-8.6, but entry?
CVE-2021-27807: no packages for Container bci/openjdk-devel:11-6.2, but entry?
CVE-2021-27807: no packages for Container bci/openjdk-devel:17-14.11, but entry?
CVE-2021-27807: no packages for Container bci/openjdk-devel:17-7.2, but entry?
CVE-2021-27807: no packages for Container bci/openjdk:11-7.1, but entry?
CVE-2021-27807: no packages for Container bci/openjdk:17-7.1, but entry?
CVE-2021-27807: no packages for Container bci/openjdk:latest, but entry?
CVE-2021-27807: no packages for Container suse/manager/5.0/x86_64/server-attestation:5.0.0-beta2.2.16, but entry?
CVE-2021-27807: no packages for Container suse/manager/5.0/x86_64/server:5.0.0-beta1.2.122, but entry?
CVE-2021-27807: no packages for Image SLES15-SP2-SAP-Azure, but entry?
CVE-2021-27807: no packages for Image SLES15-SP2-SAP-Azure-LI-BYOS-Production, but entry?
CVE-2021-27807: no packages for Image SLES15-SP2-SAP-Azure-VLI-BYOS-Production, but entry?
CVE-2021-27807: no packages for Image SLES15-SP2-SAP-BYOS-Azure, but entry?
CVE-2021-27807: no packages for Image SLES15-SP2-SAP-BYOS-EC2-HVM, but entry?
CVE-2021-27807: no packages for Image SLES15-SP2-SAP-BYOS-GCE, but entry?
CVE-2021-27807: no packages for Image SLES15-SP2-SAP-EC2-HVM, but entry?
CVE-2021-27807: no packages for Image SLES15-SP2-SAP-GCE, but entry?
CVE-2021-27807: no packages for Image SLES15-SP3-Manager-4-2-Server-BYOS-Azure, but entry?
CVE-2021-27807: no packages for Image SLES15-SP3-Manager-4-2-Server-BYOS-EC2-HVM, but entry?
CVE-2021-27807: no packages for Image SLES15-SP3-Manager-4-2-Server-BYOS-GCE, but entry?
CVE-2021-27807: no packages for Image SLES15-SP3-SAP-Azure-LI-BYOS-Production, but entry?
CVE-2021-27807: no packages for Image SLES15-SP3-SAP-Azure-VLI-BYOS-Production, but entry?
CVE-2021-27807: no packages for Image SLES15-SP3-SAPCAL-Azure, but entry?
CVE-2021-27807: no packages for Image SLES15-SP3-SAPCAL-EC2-HVM, but entry?
CVE-2021-27807: no packages for Image SLES15-SP3-SAPCAL-GCE, but entry?
CVE-2021-27807: no packages for Image SLES15-SP4-Manager-Server-4-3, but entry?
CVE-2021-27807: no packages for Image SLES15-SP4-Manager-Server-4-3-Azure-llc, but entry?
CVE-2021-27807: no packages for Image SLES15-SP4-Manager-Server-4-3-Azure-ltd, but entry?
CVE-2021-27807: no packages for Image SLES15-SP4-Manager-Server-4-3-BYOS, but entry?
CVE-2021-27807: no packages for Image SLES15-SP4-Manager-Server-4-3-BYOS-Azure, but entry?
CVE-2021-27807: no packages for Image SLES15-SP4-Manager-Server-4-3-BYOS-EC2, but entry?
CVE-2021-27807: no packages for Image SLES15-SP4-Manager-Server-4-3-BYOS-GCE, but entry?
CVE-2021-27807: no packages for Image SLES15-SP4-Manager-Server-4-3-EC2-llc, but entry?
CVE-2021-27807: no packages for Image SLES15-SP4-Manager-Server-4-3-EC2-ltd, but entry?
CVE-2021-27807: no packages for Image SLES15-SP4-SAP, but entry?
CVE-2021-27807: no packages for Image SLES15-SP4-SAP-Azure, but entry?
CVE-2021-27807: no packages for Image SLES15-SP4-SAP-Azure-LI-BYOS, but entry?
CVE-2021-27807: no packages for Image SLES15-SP4-SAP-Azure-LI-BYOS-Production, but entry?
CVE-2021-27807: no packages for Image SLES15-SP4-SAP-Azure-VLI-BYOS, but entry?
CVE-2021-27807: no packages for Image SLES15-SP4-SAP-Azure-VLI-BYOS-Production, but entry?
CVE-2021-27807: no packages for Image SLES15-SP4-SAP-EC2, but entry?
CVE-2021-27807: no packages for Image SLES15-SP4-SAP-GCE, but entry?
CVE-2021-27807: no packages for Image SLES15-SP4-SAPCAL, but entry?
CVE-2021-27807: no packages for Image SLES15-SP4-SAPCAL-Azure, but entry?
CVE-2021-27807: no packages for Image SLES15-SP4-SAPCAL-EC2, but entry?
CVE-2021-27807: no packages for Image SLES15-SP4-SAPCAL-GCE, but entry?
CVE-2021-27807: no packages for Image SLES15-SP5-SAP-Azure, but entry?
CVE-2021-27807: no packages for Image SLES15-SP5-SAP-Azure-LI-BYOS, but entry?
CVE-2021-27807: no packages for Image SLES15-SP5-SAP-Azure-LI-BYOS-Production, but entry?
CVE-2021-27807: no packages for Image SLES15-SP5-SAP-Azure-VLI-BYOS, but entry?
CVE-2021-27807: no packages for Image SLES15-SP5-SAP-Azure-VLI-BYOS-Production, but entry?
CVE-2021-27807: no packages for Image SLES15-SP5-SAP-EC2, but entry?
CVE-2021-27807: no packages for Image SLES15-SP5-SAP-GCE, but entry?
CVE-2021-27807: no packages for Image SLES15-SP5-SAPCAL-Azure, but entry?
CVE-2021-27807: no packages for Image SLES15-SP5-SAPCAL-EC2, but entry?
CVE-2021-27807: no packages for Image SLES15-SP5-SAPCAL-GCE, but entry?
CVE-2021-27807: no packages for Image SLES15-SP6-SAP, but entry?
CVE-2021-27807: no packages for Image SLES15-SP6-SAP-Azure, but entry?
CVE-2021-27807: no packages for Image SLES15-SP6-SAP-Azure-LI-BYOS, but entry?
CVE-2021-27807: no packages for Image SLES15-SP6-SAP-Azure-LI-BYOS-Production, but entry?
CVE-2021-27807: no packages for Image SLES15-SP6-SAP-Azure-VLI-BYOS, but entry?
CVE-2021-27807: no packages for Image SLES15-SP6-SAP-Azure-VLI-BYOS-Production, but entry?
CVE-2021-27807: no packages for Image SLES15-SP6-SAP-EC2, but entry?
CVE-2021-27807: no packages for Image SLES15-SP6-SAP-GCE, but entry?
CVE-2021-27807: no packages for Image SLES15-SP6-SAPCAL, but entry?
CVE-2021-27807: no packages for Image SLES15-SP6-SAPCAL-Azure, but entry?
CVE-2021-27807: no packages for Image SLES15-SP6-SAPCAL-EC2, but entry?
CVE-2021-27807: no packages for Image SLES15-SP6-SAPCAL-GCE, but entry?
CVE-2021-27807: no packages for SUSE CaaS Platform 4.0, but entry?
CVE-2021-27807: no packages for SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS, but entry?
CVE-2021-27807: no packages for SUSE Linux Enterprise Module for Basesystem 15 SP4, but entry?
CVE-2021-27807: no packages for SUSE Linux Enterprise Module for Basesystem 15 SP5, but entry?
CVE-2021-27807: no packages for SUSE Linux Enterprise Module for Basesystem 15 SP6, but entry?
CVE-2021-27807: no packages for SUSE Linux Enterprise Module for Package Hub 15 SP4, but entry?
CVE-2021-27807: no packages for SUSE Linux Enterprise Module for Package Hub 15 SP5, but entry?
CVE-2021-27807: no packages for SUSE Linux Enterprise Module for Package Hub 15 SP6, but entry?
CVE-2021-27807: no packages for SUSE Linux Enterprise Module for Web and Scripting 15 SP4, but entry?
CVE-2021-27807: no packages for SUSE Linux Enterprise Module for Web and Scripting 15 SP5, but entry?
CVE-2021-27807: no packages for SUSE Linux Enterprise Module for Web and Scripting 15 SP6, but entry?
CVE-2021-27807: no packages for SUSE Linux Enterprise Server 15 SP1-LTSS, but entry?
CVE-2021-27807: no packages for SUSE Linux Enterprise Server 15 SP4-TERADATA, but entry?
CVE-2021-27807: no packages for SUSE Linux Enterprise Server for SAP Applications 15 SP1, but entry?
CVE-2021-27807: no packages for SUSE Linux Enterprise Workstation Extension 15 SP4, but entry?
CVE-2021-27807: no packages for SUSE Linux Enterprise Workstation Extension 15 SP5, but entry?
CVE-2021-27807: no packages for SUSE Linux Enterprise Workstation Extension 15 SP6, but entry?
CVE-2021-27807: no packages for SUSE Manager Proxy 4.2, but entry?
CVE-2021-27807: no packages for SUSE Manager Retail Branch Server 4.2, but entry?
CVE-2021-27807: no packages for SUSE Manager Server 4.2, but entry?
CVE-2021-27807: no packages for SUSE Manager Server Module 4.2, but entry?
CVE-2021-27807: no packages for SUSE Manager Server Module 4.3, but entry?
CVE-2021-27807: no packages for Container bci/kiwi:9.24.43-8.6, but entry?
CVE-2021-27807: no packages for Container bci/openjdk-devel:11-6.2, but entry?
CVE-2021-27807: no packages for Container bci/openjdk-devel:17-14.11, but entry?
CVE-2021-27807: no packages for Container bci/openjdk-devel:17-7.2, but entry?
CVE-2021-27807: no packages for Container bci/openjdk:11-7.1, but entry?
CVE-2021-27807: no packages for Container bci/openjdk:17-7.1, but entry?
CVE-2021-27807: no packages for Container bci/openjdk:latest, but entry?
CVE-2021-27807: no packages for Container suse/manager/5.0/x86_64/server-attestation:5.0.0-beta2.2.16, but entry?
CVE-2021-27807: no packages for Container suse/manager/5.0/x86_64/server:5.0.0-beta1.2.122, but entry?
CVE-2021-27807: no packages for Image SLES15-SP2-SAP-Azure, but entry?
CVE-2021-27807: no packages for Image SLES15-SP2-SAP-Azure-LI-BYOS-Production, but entry?
CVE-2021-27807: no packages for Image SLES15-SP2-SAP-Azure-VLI-BYOS-Production, but entry?
CVE-2021-27807: no packages for Image SLES15-SP2-SAP-BYOS-Azure, but entry?
CVE-2021-27807: no packages for Image SLES15-SP2-SAP-BYOS-EC2-HVM, but entry?
CVE-2021-27807: no packages for Image SLES15-SP2-SAP-BYOS-GCE, but entry?
CVE-2021-27807: no packages for Image SLES15-SP2-SAP-EC2-HVM, but entry?
CVE-2021-27807: no packages for Image SLES15-SP2-SAP-GCE, but entry?
CVE-2021-27807: no packages for Image SLES15-SP3-Manager-4-2-Server-BYOS-Azure, but entry?
CVE-2021-27807: no packages for Image SLES15-SP3-Manager-4-2-Server-BYOS-EC2-HVM, but entry?
CVE-2021-27807: no packages for Image SLES15-SP3-Manager-4-2-Server-BYOS-GCE, but entry?
CVE-2021-27807: no packages for Image SLES15-SP3-SAP-Azure-LI-BYOS-Production, but entry?
CVE-2021-27807: no packages for Image SLES15-SP3-SAP-Azure-VLI-BYOS-Production, but entry?
CVE-2021-27807: no packages for Image SLES15-SP3-SAPCAL-Azure, but entry?
CVE-2021-27807: no packages for Image SLES15-SP3-SAPCAL-EC2-HVM, but entry?
CVE-2021-27807: no packages for Image SLES15-SP3-SAPCAL-GCE, but entry?
CVE-2021-27807: no packages for Image SLES15-SP4-Manager-Server-4-3, but entry?
CVE-2021-27807: no packages for Image SLES15-SP4-Manager-Server-4-3-Azure-llc, but entry?
CVE-2021-27807: no packages for Image SLES15-SP4-Manager-Server-4-3-Azure-ltd, but entry?
CVE-2021-27807: no packages for Image SLES15-SP4-Manager-Server-4-3-BYOS, but entry?
CVE-2021-27807: no packages for Image SLES15-SP4-Manager-Server-4-3-BYOS-Azure, but entry?
CVE-2021-27807: no packages for Image SLES15-SP4-Manager-Server-4-3-BYOS-EC2, but entry?
CVE-2021-27807: no packages for Image SLES15-SP4-Manager-Server-4-3-BYOS-GCE, but entry?
CVE-2021-27807: no packages for Image SLES15-SP4-Manager-Server-4-3-EC2-llc, but entry?
CVE-2021-27807: no packages for Image SLES15-SP4-Manager-Server-4-3-EC2-ltd, but entry?
CVE-2021-27807: no packages for Image SLES15-SP4-SAP, but entry?
CVE-2021-27807: no packages for Image SLES15-SP4-SAP-Azure, but entry?
CVE-2021-27807: no packages for Image SLES15-SP4-SAP-Azure-LI-BYOS, but entry?
CVE-2021-27807: no packages for Image SLES15-SP4-SAP-Azure-LI-BYOS-Production, but entry?
CVE-2021-27807: no packages for Image SLES15-SP4-SAP-Azure-VLI-BYOS, but entry?
CVE-2021-27807: no packages for Image SLES15-SP4-SAP-Azure-VLI-BYOS-Production, but entry?
CVE-2021-27807: no packages for Image SLES15-SP4-SAP-EC2, but entry?
CVE-2021-27807: no packages for Image SLES15-SP4-SAP-GCE, but entry?
CVE-2021-27807: no packages for Image SLES15-SP4-SAPCAL, but entry?
CVE-2021-27807: no packages for Image SLES15-SP4-SAPCAL-Azure, but entry?
CVE-2021-27807: no packages for Image SLES15-SP4-SAPCAL-EC2, but entry?
CVE-2021-27807: no packages for Image SLES15-SP4-SAPCAL-GCE, but entry?
CVE-2021-27807: no packages for Image SLES15-SP5-SAP-Azure, but entry?
CVE-2021-27807: no packages for Image SLES15-SP5-SAP-Azure-LI-BYOS, but entry?
CVE-2021-27807: no packages for Image SLES15-SP5-SAP-Azure-LI-BYOS-Production, but entry?
CVE-2021-27807: no packages for Image SLES15-SP5-SAP-Azure-VLI-BYOS, but entry?
CVE-2021-27807: no packages for Image SLES15-SP5-SAP-Azure-VLI-BYOS-Production, but entry?
CVE-2021-27807: no packages for Image SLES15-SP5-SAP-EC2, but entry?
CVE-2021-27807: no packages for Image SLES15-SP5-SAP-GCE, but entry?
CVE-2021-27807: no packages for Image SLES15-SP5-SAPCAL-Azure, but entry?
CVE-2021-27807: no packages for Image SLES15-SP5-SAPCAL-EC2, but entry?
CVE-2021-27807: no packages for Image SLES15-SP5-SAPCAL-GCE, but entry?
CVE-2021-27807: no packages for Image SLES15-SP6-SAP, but entry?
CVE-2021-27807: no packages for Image SLES15-SP6-SAP-Azure, but entry?
CVE-2021-27807: no packages for Image SLES15-SP6-SAP-Azure-LI-BYOS, but entry?
CVE-2021-27807: no packages for Image SLES15-SP6-SAP-Azure-LI-BYOS-Production, but entry?
CVE-2021-27807: no packages for Image SLES15-SP6-SAP-Azure-VLI-BYOS, but entry?
CVE-2021-27807: no packages for Image SLES15-SP6-SAP-Azure-VLI-BYOS-Production, but entry?
CVE-2021-27807: no packages for Image SLES15-SP6-SAP-EC2, but entry?
CVE-2021-27807: no packages for Image SLES15-SP6-SAP-GCE, but entry?
CVE-2021-27807: no packages for Image SLES15-SP6-SAPCAL, but entry?
CVE-2021-27807: no packages for Image SLES15-SP6-SAPCAL-Azure, but entry?
CVE-2021-27807: no packages for Image SLES15-SP6-SAPCAL-EC2, but entry?
CVE-2021-27807: no packages for Image SLES15-SP6-SAPCAL-GCE, but entry?
CVE-2021-27807: no packages for SUSE CaaS Platform 4.0, but entry?
CVE-2021-27807: no packages for SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS, but entry?
CVE-2021-27807: no packages for SUSE Linux Enterprise Module for Basesystem 15 SP4, but entry?
CVE-2021-27807: no packages for SUSE Linux Enterprise Module for Basesystem 15 SP5, but entry?
CVE-2021-27807: no packages for SUSE Linux Enterprise Module for Basesystem 15 SP6, but entry?
CVE-2021-27807: no packages for SUSE Linux Enterprise Module for Package Hub 15 SP4, but entry?
CVE-2021-27807: no packages for SUSE Linux Enterprise Module for Package Hub 15 SP5, but entry?
CVE-2021-27807: no packages for SUSE Linux Enterprise Module for Package Hub 15 SP6, but entry?
CVE-2021-27807: no packages for SUSE Linux Enterprise Module for Web and Scripting 15 SP4, but entry?
CVE-2021-27807: no packages for SUSE Linux Enterprise Module for Web and Scripting 15 SP5, but entry?
CVE-2021-27807: no packages for SUSE Linux Enterprise Module for Web and Scripting 15 SP6, but entry?
CVE-2021-27807: no packages for SUSE Linux Enterprise Server 15 SP1-LTSS, but entry?
CVE-2021-27807: no packages for SUSE Linux Enterprise Server 15 SP4-TERADATA, but entry?
CVE-2021-27807: no packages for SUSE Linux Enterprise Server for SAP Applications 15 SP1, but entry?
CVE-2021-27807: no packages for SUSE Linux Enterprise Workstation Extension 15 SP4, but entry?
CVE-2021-27807: no packages for SUSE Linux Enterprise Workstation Extension 15 SP5, but entry?
CVE-2021-27807: no packages for SUSE Linux Enterprise Workstation Extension 15 SP6, but entry?
CVE-2021-27807: no packages for SUSE Manager Proxy 4.2, but entry?
CVE-2021-27807: no packages for SUSE Manager Retail Branch Server 4.2, but entry?
CVE-2021-27807: no packages for SUSE Manager Server 4.2, but entry?
CVE-2021-27807: no packages for SUSE Manager Server Module 4.2, but entry?
CVE-2021-27807: no packages for SUSE Manager Server Module 4.3, but entry?
no cpe found for SUSE Liberty Linux 7 LTSS in CVE-2021-27803
skipping CVE-2021-27645 as CVE page is older than CVRF-CVE file.
skipping CVE-2021-27379 as CVE page is older than CVRF-CVE file.
no cpe found for SUSE Liberty Linux 7 LTSS in CVE-2021-27219
skipping CVE-2021-27212 as CVE page is older than CVRF-CVE file.
no cpe found for SUSE Liberty Linux 7 LTSS in CVE-2021-27135
No V5 entry found for CVE-2021-27017 / /home/securitybot/prod/cve-database/cvelistV5/cves/2021/27xxxx/CVE-2021-27017.json:No such file or directory
skipping CVE-2021-26945 as CVE page is older than CVRF-CVE file.
no cpe found for SUSE Liberty Linux 7 LTSS in CVE-2021-26937
skipping CVE-2021-26934 as CVE page is older than CVRF-CVE file.
skipping CVE-2021-26933 as CVE page is older than CVRF-CVE file.
skipping CVE-2021-26927 as CVE page is older than CVRF-CVE file.
skipping CVE-2021-26926 as CVE page is older than CVRF-CVE file.
no cpe found for SUSE Package Hub 15 SP2 in CVE-2021-26813
skipping CVE-2021-26720 as CVE page is older than CVRF-CVE file.
skipping CVE-2021-26708 as CVE page is older than CVRF-CVE file.
no cpe found for SUSE Package Hub 15 SP2 in CVE-2021-26676
skipping CVE-2021-26691 as CVE page is older than CVRF-CVE file.
skipping CVE-2021-26690 as CVE page is older than CVRF-CVE file.
no cpe found for SUSE Package Hub 15 SP2 in CVE-2021-26675
no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2021-26341
skipping CVE-2021-26388 as CVE page is older than CVRF-CVE file.
skipping CVE-2021-26378 as CVE page is older than CVRF-CVE file.
skipping CVE-2021-26376 as CVE page is older than CVRF-CVE file.
skipping CVE-2021-26375 as CVE page is older than CVRF-CVE file.
skipping CVE-2021-26373 as CVE page is older than CVRF-CVE file.
skipping CVE-2021-26372 as CVE page is older than CVRF-CVE file.
skipping CVE-2021-26364 as CVE page is older than CVRF-CVE file.
skipping CVE-2021-26350 as CVE page is older than CVRF-CVE file.
skipping CVE-2021-26349 as CVE page is older than CVRF-CVE file.
skipping CVE-2021-26348 as CVE page is older than CVRF-CVE file.
skipping CVE-2021-26347 as CVE page is older than CVRF-CVE file.
skipping CVE-2021-26345 as CVE page is older than CVRF-CVE file.
skipping CVE-2021-26342 as CVE page is older than CVRF-CVE file.
skipping CVE-2021-26339 as CVE page is older than CVRF-CVE file.
skipping CVE-2021-26318 as CVE page is older than CVRF-CVE file.
skipping CVE-2021-26312 as CVE page is older than CVRF-CVE file.
CVE-2021-26291: no packages for Image SLES15-SP2-SAP-GCE, but entry?
CVE-2021-26291: no packages for Container bci/kiwi:9.24.43-8.6, but entry?
CVE-2021-26291: no packages for Image SLES15-SP4-SAP-Azure-VLI-BYOS, but entry?
CVE-2021-26291: no packages for Image SLES15-SP6-SAP-Azure-LI-BYOS, but entry?
CVE-2021-26291: no packages for SUSE Linux Enterprise Server 15 SP4-TERADATA, but entry?
CVE-2021-26291: no packages for Image SLES15-SP4-SAP-GCE, but entry?
CVE-2021-26291: no packages for SUSE Linux Enterprise Workstation Extension 15 SP6, but entry?
CVE-2021-26291: no packages for SUSE Manager Server Module 4.3, but entry?
CVE-2021-26291: no packages for Image SLES15-SP6-SAP-Azure-VLI-BYOS-Production, but entry?
CVE-2021-26291: no packages for Image SLES15-SP5-SAP-GCE, but entry?
CVE-2021-26291: no packages for SUSE Linux Enterprise Workstation Extension 15 SP5, but entry?
CVE-2021-26291: no packages for Image SLES15-SP5-SAPCAL-Azure, but entry?
CVE-2021-26291: no packages for SUSE Manager Server Module 4.2, but entry?
CVE-2021-26291: no packages for Image SLES15-SP5-SAP-Azure-LI-BYOS, but entry?
CVE-2021-26291: no packages for Image SLES15-SP4-SAP-Azure-VLI-BYOS-Production, but entry?
CVE-2021-26291: no packages for Image SLES15-SP6-SAPCAL-GCE, but entry?
CVE-2021-26291: no packages for Image SLES15-SP6-SAP-GCE, but entry?
CVE-2021-26291: no packages for Image SLES15-SP4-Manager-Server-4-3-BYOS-Azure, but entry?
CVE-2021-26291: no packages for SUSE CaaS Platform 4.0, but entry?
CVE-2021-26291: no packages for Image SLES15-SP2-SAP-BYOS-EC2-HVM, but entry?
CVE-2021-26291: no packages for Image SLES15-SP2-SAP-Azure-VLI-BYOS-Production, but entry?
CVE-2021-26291: no packages for Container suse/manager/5.0/x86_64/server-attestation:5.0.0-beta2.2.16, but entry?
CVE-2021-26291: no packages for Image SLES15-SP3-SAP-Azure-VLI-BYOS-Production, but entry?
CVE-2021-26291: no packages for Image SLES15-SP4-Manager-Server-4-3-EC2-ltd, but entry?
CVE-2021-26291: no packages for SUSE Linux Enterprise Module for Package Hub 15 SP6, but entry?
CVE-2021-26291: no packages for SUSE Linux Enterprise Module for Basesystem 15 SP4, but entry?
CVE-2021-26291: no packages for Container bci/openjdk:17-7.1, but entry?
CVE-2021-26291: no packages for SUSE Linux Enterprise Module for Web and Scripting 15 SP6, but entry?
CVE-2021-26291: no packages for Container bci/openjdk:latest, but entry?
CVE-2021-26291: no packages for Image SLES15-SP6-SAPCAL-EC2, but entry?
CVE-2021-26291: no packages for Image SLES15-SP4-SAPCAL, but entry?
CVE-2021-26291: no packages for Image SLES15-SP2-SAP-BYOS-Azure, but entry?
CVE-2021-26291: no packages for Image SLES15-SP5-SAP-EC2, but entry?
CVE-2021-26291: no packages for SUSE Linux Enterprise Module for Package Hub 15 SP4, but entry?
CVE-2021-26291: no packages for Image SLES15-SP6-SAP-Azure-LI-BYOS-Production, but entry?
CVE-2021-26291: no packages for Image SLES15-SP4-Manager-Server-4-3-EC2-llc, but entry?
CVE-2021-26291: no packages for Image SLES15-SP4-SAP, but entry?
CVE-2021-26291: no packages for SUSE Manager Retail Branch Server 4.2, but entry?
CVE-2021-26291: no packages for Image SLES15-SP4-SAP-Azure-LI-BYOS, but entry?
CVE-2021-26291: no packages for Image SLES15-SP3-SAPCAL-EC2-HVM, but entry?
CVE-2021-26291: no packages for SUSE Manager Server 4.2, but entry?
CVE-2021-26291: no packages for Container suse/manager/5.0/x86_64/server:5.0.0-beta1.2.122, but entry?
CVE-2021-26291: no packages for Image SLES15-SP4-SAPCAL-GCE, but entry?
CVE-2021-26291: no packages for Image SLES15-SP3-SAPCAL-GCE, but entry?
CVE-2021-26291: no packages for Image SLES15-SP6-SAP, but entry?
CVE-2021-26291: no packages for Image SLES15-SP3-Manager-4-2-Server-BYOS-Azure, but entry?
CVE-2021-26291: no packages for SUSE Linux Enterprise Server for SAP Applications 15 SP1, but entry?
CVE-2021-26291: no packages for Image SLES15-SP4-SAP-EC2, but entry?
CVE-2021-26291: no packages for Container bci/openjdk:11-7.1, but entry?
CVE-2021-26291: no packages for SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS, but entry?
CVE-2021-26291: no packages for Image SLES15-SP4-SAPCAL-Azure, but entry?
CVE-2021-26291: no packages for Image SLES15-SP5-SAPCAL-EC2, but entry?
CVE-2021-26291: no packages for SUSE Linux Enterprise Module for Web and Scripting 15 SP4, but entry?
CVE-2021-26291: no packages for Image SLES15-SP4-SAPCAL-EC2, but entry?
CVE-2021-26291: no packages for Image SLES15-SP6-SAP-EC2, but entry?
CVE-2021-26291: no packages for Image SLES15-SP3-SAP-Azure-LI-BYOS-Production, but entry?
CVE-2021-26291: no packages for Image SLES15-SP2-SAP-EC2-HVM, but entry?
CVE-2021-26291: no packages for SUSE Linux Enterprise Server 15 SP1-LTSS, but entry?
CVE-2021-26291: no packages for Image SLES15-SP4-Manager-Server-4-3-BYOS-EC2, but entry?
CVE-2021-26291: no packages for Image SLES15-SP6-SAP-Azure, but entry?
CVE-2021-26291: no packages for Image SLES15-SP5-SAPCAL-GCE, but entry?
CVE-2021-26291: no packages for Image SLES15-SP4-Manager-Server-4-3-BYOS-GCE, but entry?
CVE-2021-26291: no packages for Image SLES15-SP3-Manager-4-2-Server-BYOS-EC2-HVM, but entry?
CVE-2021-26291: no packages for Image SLES15-SP5-SAP-Azure-VLI-BYOS-Production, but entry?
CVE-2021-26291: no packages for Image SLES15-SP6-SAPCAL-Azure, but entry?
CVE-2021-26291: no packages for Image SLES15-SP5-SAP-Azure, but entry?
CVE-2021-26291: no packages for Image SLES15-SP6-SAP-Azure-VLI-BYOS, but entry?
CVE-2021-26291: no packages for Image SLES15-SP6-SAPCAL, but entry?
CVE-2021-26291: no packages for Image SLES15-SP5-SAP-Azure-VLI-BYOS, but entry?
CVE-2021-26291: no packages for Image SLES15-SP5-SAP-Azure-LI-BYOS-Production, but entry?
CVE-2021-26291: no packages for SUSE Linux Enterprise Module for Basesystem 15 SP6, but entry?
CVE-2021-26291: no packages for Image SLES15-SP3-SAPCAL-Azure, but entry?
CVE-2021-26291: no packages for Image SLES15-SP2-SAP-BYOS-GCE, but entry?
CVE-2021-26291: no packages for Image SLES15-SP4-Manager-Server-4-3-Azure-llc, but entry?
CVE-2021-26291: no packages for Image SLES15-SP3-Manager-4-2-Server-BYOS-GCE, but entry?
CVE-2021-26291: no packages for Image SLES15-SP4-Manager-Server-4-3-Azure-ltd, but entry?
CVE-2021-26291: no packages for SUSE Linux Enterprise Module for Web and Scripting 15 SP5, but entry?
CVE-2021-26291: no packages for SUSE Linux Enterprise Workstation Extension 15 SP4, but entry?
CVE-2021-26291: no packages for Image SLES15-SP4-SAP-Azure, but entry?
CVE-2021-26291: no packages for SUSE Linux Enterprise Module for Package Hub 15 SP5, but entry?
CVE-2021-26291: no packages for SUSE Manager Proxy 4.2, but entry?
CVE-2021-26291: no packages for Image SLES15-SP4-Manager-Server-4-3, but entry?
CVE-2021-26291: no packages for Image SLES15-SP4-Manager-Server-4-3-BYOS, but entry?
CVE-2021-26291: no packages for Image SLES15-SP4-SAP-Azure-LI-BYOS-Production, but entry?
CVE-2021-26291: no packages for Image SLES15-SP2-SAP-Azure-LI-BYOS-Production, but entry?
CVE-2021-26291: no packages for SUSE Linux Enterprise Module for Basesystem 15 SP5, but entry?
CVE-2021-26291: no packages for Image SLES15-SP2-SAP-Azure, but entry?
CVE-2021-26291: no packages for Container bci/kiwi:9.24.43-8.6, but entry?
CVE-2021-26291: no packages for Container bci/openjdk:11-7.1, but entry?
CVE-2021-26291: no packages for Container bci/openjdk:17-7.1, but entry?
CVE-2021-26291: no packages for Container bci/openjdk:latest, but entry?
CVE-2021-26291: no packages for Container suse/manager/5.0/x86_64/server-attestation:5.0.0-beta2.2.16, but entry?
CVE-2021-26291: no packages for Container suse/manager/5.0/x86_64/server:5.0.0-beta1.2.122, but entry?
CVE-2021-26291: no packages for Image SLES15-SP2-SAP-Azure, but entry?
CVE-2021-26291: no packages for Image SLES15-SP2-SAP-Azure-LI-BYOS-Production, but entry?
CVE-2021-26291: no packages for Image SLES15-SP2-SAP-Azure-VLI-BYOS-Production, but entry?
CVE-2021-26291: no packages for Image SLES15-SP2-SAP-BYOS-Azure, but entry?
CVE-2021-26291: no packages for Image SLES15-SP2-SAP-BYOS-EC2-HVM, but entry?
CVE-2021-26291: no packages for Image SLES15-SP2-SAP-BYOS-GCE, but entry?
CVE-2021-26291: no packages for Image SLES15-SP2-SAP-EC2-HVM, but entry?
CVE-2021-26291: no packages for Image SLES15-SP2-SAP-GCE, but entry?
CVE-2021-26291: no packages for Image SLES15-SP3-Manager-4-2-Server-BYOS-Azure, but entry?
CVE-2021-26291: no packages for Image SLES15-SP3-Manager-4-2-Server-BYOS-EC2-HVM, but entry?
CVE-2021-26291: no packages for Image SLES15-SP3-Manager-4-2-Server-BYOS-GCE, but entry?
CVE-2021-26291: no packages for Image SLES15-SP3-SAP-Azure-LI-BYOS-Production, but entry?
CVE-2021-26291: no packages for Image SLES15-SP3-SAP-Azure-VLI-BYOS-Production, but entry?
CVE-2021-26291: no packages for Image SLES15-SP3-SAPCAL-Azure, but entry?
CVE-2021-26291: no packages for Image SLES15-SP3-SAPCAL-EC2-HVM, but entry?
CVE-2021-26291: no packages for Image SLES15-SP3-SAPCAL-GCE, but entry?
CVE-2021-26291: no packages for Image SLES15-SP4-Manager-Server-4-3, but entry?
CVE-2021-26291: no packages for Image SLES15-SP4-Manager-Server-4-3-Azure-llc, but entry?
CVE-2021-26291: no packages for Image SLES15-SP4-Manager-Server-4-3-Azure-ltd, but entry?
CVE-2021-26291: no packages for Image SLES15-SP4-Manager-Server-4-3-BYOS, but entry?
CVE-2021-26291: no packages for Image SLES15-SP4-Manager-Server-4-3-BYOS-Azure, but entry?
CVE-2021-26291: no packages for Image SLES15-SP4-Manager-Server-4-3-BYOS-EC2, but entry?
CVE-2021-26291: no packages for Image SLES15-SP4-Manager-Server-4-3-BYOS-GCE, but entry?
CVE-2021-26291: no packages for Image SLES15-SP4-Manager-Server-4-3-EC2-llc, but entry?
CVE-2021-26291: no packages for Image SLES15-SP4-Manager-Server-4-3-EC2-ltd, but entry?
CVE-2021-26291: no packages for Image SLES15-SP4-SAP, but entry?
CVE-2021-26291: no packages for Image SLES15-SP4-SAP-Azure, but entry?
CVE-2021-26291: no packages for Image SLES15-SP4-SAP-Azure-LI-BYOS, but entry?
CVE-2021-26291: no packages for Image SLES15-SP4-SAP-Azure-LI-BYOS-Production, but entry?
CVE-2021-26291: no packages for Image SLES15-SP4-SAP-Azure-VLI-BYOS, but entry?
CVE-2021-26291: no packages for Image SLES15-SP4-SAP-Azure-VLI-BYOS-Production, but entry?
CVE-2021-26291: no packages for Image SLES15-SP4-SAP-EC2, but entry?
CVE-2021-26291: no packages for Image SLES15-SP4-SAP-GCE, but entry?
CVE-2021-26291: no packages for Image SLES15-SP4-SAPCAL, but entry?
CVE-2021-26291: no packages for Image SLES15-SP4-SAPCAL-Azure, but entry?
CVE-2021-26291: no packages for Image SLES15-SP4-SAPCAL-EC2, but entry?
CVE-2021-26291: no packages for Image SLES15-SP4-SAPCAL-GCE, but entry?
CVE-2021-26291: no packages for Image SLES15-SP5-SAP-Azure, but entry?
CVE-2021-26291: no packages for Image SLES15-SP5-SAP-Azure-LI-BYOS, but entry?
CVE-2021-26291: no packages for Image SLES15-SP5-SAP-Azure-LI-BYOS-Production, but entry?
CVE-2021-26291: no packages for Image SLES15-SP5-SAP-Azure-VLI-BYOS, but entry?
CVE-2021-26291: no packages for Image SLES15-SP5-SAP-Azure-VLI-BYOS-Production, but entry?
CVE-2021-26291: no packages for Image SLES15-SP5-SAP-EC2, but entry?
CVE-2021-26291: no packages for Image SLES15-SP5-SAP-GCE, but entry?
CVE-2021-26291: no packages for Image SLES15-SP5-SAPCAL-Azure, but entry?
CVE-2021-26291: no packages for Image SLES15-SP5-SAPCAL-EC2, but entry?
CVE-2021-26291: no packages for Image SLES15-SP5-SAPCAL-GCE, but entry?
CVE-2021-26291: no packages for Image SLES15-SP6-SAP, but entry?
CVE-2021-26291: no packages for Image SLES15-SP6-SAP-Azure, but entry?
CVE-2021-26291: no packages for Image SLES15-SP6-SAP-Azure-LI-BYOS, but entry?
CVE-2021-26291: no packages for Image SLES15-SP6-SAP-Azure-LI-BYOS-Production, but entry?
CVE-2021-26291: no packages for Image SLES15-SP6-SAP-Azure-VLI-BYOS, but entry?
CVE-2021-26291: no packages for Image SLES15-SP6-SAP-Azure-VLI-BYOS-Production, but entry?
CVE-2021-26291: no packages for Image SLES15-SP6-SAP-EC2, but entry?
CVE-2021-26291: no packages for Image SLES15-SP6-SAP-GCE, but entry?
CVE-2021-26291: no packages for Image SLES15-SP6-SAPCAL, but entry?
CVE-2021-26291: no packages for Image SLES15-SP6-SAPCAL-Azure, but entry?
CVE-2021-26291: no packages for Image SLES15-SP6-SAPCAL-EC2, but entry?
CVE-2021-26291: no packages for Image SLES15-SP6-SAPCAL-GCE, but entry?
CVE-2021-26291: no packages for SUSE CaaS Platform 4.0, but entry?
CVE-2021-26291: no packages for SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS, but entry?
CVE-2021-26291: no packages for SUSE Linux Enterprise Module for Basesystem 15 SP4, but entry?
CVE-2021-26291: no packages for SUSE Linux Enterprise Module for Basesystem 15 SP5, but entry?
CVE-2021-26291: no packages for SUSE Linux Enterprise Module for Basesystem 15 SP6, but entry?
CVE-2021-26291: no packages for SUSE Linux Enterprise Module for Package Hub 15 SP4, but entry?
CVE-2021-26291: no packages for SUSE Linux Enterprise Module for Package Hub 15 SP5, but entry?
CVE-2021-26291: no packages for SUSE Linux Enterprise Module for Package Hub 15 SP6, but entry?
CVE-2021-26291: no packages for SUSE Linux Enterprise Module for Web and Scripting 15 SP4, but entry?
CVE-2021-26291: no packages for SUSE Linux Enterprise Module for Web and Scripting 15 SP5, but entry?
CVE-2021-26291: no packages for SUSE Linux Enterprise Module for Web and Scripting 15 SP6, but entry?
CVE-2021-26291: no packages for SUSE Linux Enterprise Server 15 SP1-LTSS, but entry?
CVE-2021-26291: no packages for SUSE Linux Enterprise Server 15 SP4-TERADATA, but entry?
CVE-2021-26291: no packages for SUSE Linux Enterprise Server for SAP Applications 15 SP1, but entry?
CVE-2021-26291: no packages for SUSE Linux Enterprise Workstation Extension 15 SP4, but entry?
CVE-2021-26291: no packages for SUSE Linux Enterprise Workstation Extension 15 SP5, but entry?
CVE-2021-26291: no packages for SUSE Linux Enterprise Workstation Extension 15 SP6, but entry?
CVE-2021-26291: no packages for SUSE Manager Proxy 4.2, but entry?
CVE-2021-26291: no packages for SUSE Manager Retail Branch Server 4.2, but entry?
CVE-2021-26291: no packages for SUSE Manager Server 4.2, but entry?
CVE-2021-26291: no packages for SUSE Manager Server Module 4.2, but entry?
CVE-2021-26291: no packages for SUSE Manager Server Module 4.3, but entry?
CVE-2021-26291: no packages for Container bci/kiwi:9.24.43-8.6, but entry?
CVE-2021-26291: no packages for Container bci/openjdk:11-7.1, but entry?
CVE-2021-26291: no packages for Container bci/openjdk:17-7.1, but entry?
CVE-2021-26291: no packages for Container bci/openjdk:latest, but entry?
CVE-2021-26291: no packages for Container suse/manager/5.0/x86_64/server-attestation:5.0.0-beta2.2.16, but entry?
CVE-2021-26291: no packages for Container suse/manager/5.0/x86_64/server:5.0.0-beta1.2.122, but entry?
CVE-2021-26291: no packages for Image SLES15-SP2-SAP-Azure, but entry?
CVE-2021-26291: no packages for Image SLES15-SP2-SAP-Azure-LI-BYOS-Production, but entry?
CVE-2021-26291: no packages for Image SLES15-SP2-SAP-Azure-VLI-BYOS-Production, but entry?
CVE-2021-26291: no packages for Image SLES15-SP2-SAP-BYOS-Azure, but entry?
CVE-2021-26291: no packages for Image SLES15-SP2-SAP-BYOS-EC2-HVM, but entry?
CVE-2021-26291: no packages for Image SLES15-SP2-SAP-BYOS-GCE, but entry?
CVE-2021-26291: no packages for Image SLES15-SP2-SAP-EC2-HVM, but entry?
CVE-2021-26291: no packages for Image SLES15-SP2-SAP-GCE, but entry?
CVE-2021-26291: no packages for Image SLES15-SP3-Manager-4-2-Server-BYOS-Azure, but entry?
CVE-2021-26291: no packages for Image SLES15-SP3-Manager-4-2-Server-BYOS-EC2-HVM, but entry?
CVE-2021-26291: no packages for Image SLES15-SP3-Manager-4-2-Server-BYOS-GCE, but entry?
CVE-2021-26291: no packages for Image SLES15-SP3-SAP-Azure-LI-BYOS-Production, but entry?
CVE-2021-26291: no packages for Image SLES15-SP3-SAP-Azure-VLI-BYOS-Production, but entry?
CVE-2021-26291: no packages for Image SLES15-SP3-SAPCAL-Azure, but entry?
CVE-2021-26291: no packages for Image SLES15-SP3-SAPCAL-EC2-HVM, but entry?
CVE-2021-26291: no packages for Image SLES15-SP3-SAPCAL-GCE, but entry?
CVE-2021-26291: no packages for Image SLES15-SP4-Manager-Server-4-3, but entry?
CVE-2021-26291: no packages for Image SLES15-SP4-Manager-Server-4-3-Azure-llc, but entry?
CVE-2021-26291: no packages for Image SLES15-SP4-Manager-Server-4-3-Azure-ltd, but entry?
CVE-2021-26291: no packages for Image SLES15-SP4-Manager-Server-4-3-BYOS, but entry?
CVE-2021-26291: no packages for Image SLES15-SP4-Manager-Server-4-3-BYOS-Azure, but entry?
CVE-2021-26291: no packages for Image SLES15-SP4-Manager-Server-4-3-BYOS-EC2, but entry?
CVE-2021-26291: no packages for Image SLES15-SP4-Manager-Server-4-3-BYOS-GCE, but entry?
CVE-2021-26291: no packages for Image SLES15-SP4-Manager-Server-4-3-EC2-llc, but entry?
CVE-2021-26291: no packages for Image SLES15-SP4-Manager-Server-4-3-EC2-ltd, but entry?
CVE-2021-26291: no packages for Image SLES15-SP4-SAP, but entry?
CVE-2021-26291: no packages for Image SLES15-SP4-SAP-Azure, but entry?
CVE-2021-26291: no packages for Image SLES15-SP4-SAP-Azure-LI-BYOS, but entry?
CVE-2021-26291: no packages for Image SLES15-SP4-SAP-Azure-LI-BYOS-Production, but entry?
CVE-2021-26291: no packages for Image SLES15-SP4-SAP-Azure-VLI-BYOS, but entry?
CVE-2021-26291: no packages for Image SLES15-SP4-SAP-Azure-VLI-BYOS-Production, but entry?
CVE-2021-26291: no packages for Image SLES15-SP4-SAP-EC2, but entry?
CVE-2021-26291: no packages for Image SLES15-SP4-SAP-GCE, but entry?
CVE-2021-26291: no packages for Image SLES15-SP4-SAPCAL, but entry?
CVE-2021-26291: no packages for Image SLES15-SP4-SAPCAL-Azure, but entry?
CVE-2021-26291: no packages for Image SLES15-SP4-SAPCAL-EC2, but entry?
CVE-2021-26291: no packages for Image SLES15-SP4-SAPCAL-GCE, but entry?
CVE-2021-26291: no packages for Image SLES15-SP5-SAP-Azure, but entry?
CVE-2021-26291: no packages for Image SLES15-SP5-SAP-Azure-LI-BYOS, but entry?
CVE-2021-26291: no packages for Image SLES15-SP5-SAP-Azure-LI-BYOS-Production, but entry?
CVE-2021-26291: no packages for Image SLES15-SP5-SAP-Azure-VLI-BYOS, but entry?
CVE-2021-26291: no packages for Image SLES15-SP5-SAP-Azure-VLI-BYOS-Production, but entry?
CVE-2021-26291: no packages for Image SLES15-SP5-SAP-EC2, but entry?
CVE-2021-26291: no packages for Image SLES15-SP5-SAP-GCE, but entry?
CVE-2021-26291: no packages for Image SLES15-SP5-SAPCAL-Azure, but entry?
CVE-2021-26291: no packages for Image SLES15-SP5-SAPCAL-EC2, but entry?
CVE-2021-26291: no packages for Image SLES15-SP5-SAPCAL-GCE, but entry?
CVE-2021-26291: no packages for Image SLES15-SP6-SAP, but entry?
CVE-2021-26291: no packages for Image SLES15-SP6-SAP-Azure, but entry?
CVE-2021-26291: no packages for Image SLES15-SP6-SAP-Azure-LI-BYOS, but entry?
CVE-2021-26291: no packages for Image SLES15-SP6-SAP-Azure-LI-BYOS-Production, but entry?
CVE-2021-26291: no packages for Image SLES15-SP6-SAP-Azure-VLI-BYOS, but entry?
CVE-2021-26291: no packages for Image SLES15-SP6-SAP-Azure-VLI-BYOS-Production, but entry?
CVE-2021-26291: no packages for Image SLES15-SP6-SAP-EC2, but entry?
CVE-2021-26291: no packages for Image SLES15-SP6-SAP-GCE, but entry?
CVE-2021-26291: no packages for Image SLES15-SP6-SAPCAL, but entry?
CVE-2021-26291: no packages for Image SLES15-SP6-SAPCAL-Azure, but entry?
CVE-2021-26291: no packages for Image SLES15-SP6-SAPCAL-EC2, but entry?
CVE-2021-26291: no packages for Image SLES15-SP6-SAPCAL-GCE, but entry?
CVE-2021-26291: no packages for SUSE CaaS Platform 4.0, but entry?
CVE-2021-26291: no packages for SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS, but entry?
CVE-2021-26291: no packages for SUSE Linux Enterprise Module for Basesystem 15 SP4, but entry?
CVE-2021-26291: no packages for SUSE Linux Enterprise Module for Basesystem 15 SP5, but entry?
CVE-2021-26291: no packages for SUSE Linux Enterprise Module for Basesystem 15 SP6, but entry?
CVE-2021-26291: no packages for SUSE Linux Enterprise Module for Package Hub 15 SP4, but entry?
CVE-2021-26291: no packages for SUSE Linux Enterprise Module for Package Hub 15 SP5, but entry?
CVE-2021-26291: no packages for SUSE Linux Enterprise Module for Package Hub 15 SP6, but entry?
CVE-2021-26291: no packages for SUSE Linux Enterprise Module for Web and Scripting 15 SP4, but entry?
CVE-2021-26291: no packages for SUSE Linux Enterprise Module for Web and Scripting 15 SP5, but entry?
CVE-2021-26291: no packages for SUSE Linux Enterprise Module for Web and Scripting 15 SP6, but entry?
CVE-2021-26291: no packages for SUSE Linux Enterprise Server 15 SP1-LTSS, but entry?
CVE-2021-26291: no packages for SUSE Linux Enterprise Server 15 SP4-TERADATA, but entry?
CVE-2021-26291: no packages for SUSE Linux Enterprise Server for SAP Applications 15 SP1, but entry?
CVE-2021-26291: no packages for SUSE Linux Enterprise Workstation Extension 15 SP4, but entry?
CVE-2021-26291: no packages for SUSE Linux Enterprise Workstation Extension 15 SP5, but entry?
CVE-2021-26291: no packages for SUSE Linux Enterprise Workstation Extension 15 SP6, but entry?
CVE-2021-26291: no packages for SUSE Manager Proxy 4.2, but entry?
CVE-2021-26291: no packages for SUSE Manager Retail Branch Server 4.2, but entry?
CVE-2021-26291: no packages for SUSE Manager Server 4.2, but entry?
CVE-2021-26291: no packages for SUSE Manager Server Module 4.2, but entry?
CVE-2021-26291: no packages for SUSE Manager Server Module 4.3, but entry?
skipping CVE-2021-26260 as CVE page is older than CVRF-CVE file.
no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2021-25749
skipping CVE-2021-25786 as CVE page is older than CVRF-CVE file.
no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2021-25743
No V5 entry found for CVE-2021-25635 / /home/securitybot/prod/cve-database/cvelistV5/cves/2021/25xxxx/CVE-2021-25635.json:No such file or directory
skipping CVE-2021-25314 as CVE page is older than CVRF-CVE file.
skipping CVE-2021-25313 as CVE page is older than CVRF-CVE file.
skipping CVE-2021-25281 as CVE page is older than CVRF-CVE file.
skipping CVE-2021-25220 as CVE page is older than CVRF-CVE file.
skipping CVE-2021-25219 as CVE page is older than CVRF-CVE file.
skipping CVE-2021-25218 as CVE page is older than CVRF-CVE file.
skipping CVE-2021-25217 as CVE page is older than CVRF-CVE file.
no cpe found for SUSE Package Hub 15 SP2 in CVE-2021-24119
no cpe found for SUSE Package Hub 15 SP3 in CVE-2021-24119
no cpe found for SUSE Package Hub 15 SP1 in CVE-2021-24115
no cpe found for SUSE Package Hub 15 SP2 in CVE-2021-24115
no cpe found for SUSE Package Hub 15 SP2 in CVE-2021-23980
no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2021-23926
skipping CVE-2021-23901 as CVE page is older than CVRF-CVE file.
skipping CVE-2021-23841 as CVE page is older than CVRF-CVE file.
skipping CVE-2021-23840 as CVE page is older than CVRF-CVE file.
skipping CVE-2021-23839 as CVE page is older than CVRF-CVE file.
no cpe found for SUSE Package Hub 15 SP4 in CVE-2021-23556
no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2021-23385
--- /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2021-23336.xml 2024-10-05 03:18:16.421636000 +0200
+++ /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2021-23336.xml.new 2024-10-29 02:00:03.018683000 +0100
@@ -14,13 +14,13 @@
1
- 161
- 2024-10-05T01:18:15Z
+ 162
+ 2024-10-29T01:00:02Z
current
2021-05-30T14:48:27Z
- 2024-10-05T01:18:15Z
+ 2024-10-29T01:00:02Z
cve-database/bin/generate-cvrf-cve.pl
2020-12-27T01:00:00Z
@@ -2636,6 +2636,24 @@
python313-x86-64-v3-3.13.0~b3-1.1
+
+ python314-3.14.0~a1-1.1
+
+
+ python314-curses-3.14.0~a1-1.1
+
+
+ python314-dbm-3.14.0~a1-1.1
+
+
+ python314-idle-3.14.0~a1-1.1
+
+
+ python314-tk-3.14.0~a1-1.1
+
+
+ python314-x86-64-v3-3.14.0~a1-1.1
+
python36-3.6.13-4.36.1
@@ -7655,6 +7673,24 @@
python313-x86-64-v3-3.13.0~b3-1.1 as a component of openSUSE Tumbleweed
+
+ python314-3.14.0~a1-1.1 as a component of openSUSE Tumbleweed
+
+
+ python314-curses-3.14.0~a1-1.1 as a component of openSUSE Tumbleweed
+
+
+ python314-dbm-3.14.0~a1-1.1 as a component of openSUSE Tumbleweed
+
+
+ python314-idle-3.14.0~a1-1.1 as a component of openSUSE Tumbleweed
+
+
+ python314-tk-3.14.0~a1-1.1 as a component of openSUSE Tumbleweed
+
+
+ python314-x86-64-v3-3.14.0~a1-1.1 as a component of openSUSE Tumbleweed
+
python36-3.6.15-1.1 as a component of openSUSE Tumbleweed
@@ -9449,6 +9485,12 @@
openSUSE Tumbleweed:python313-idle-3.13.0~b3-1.1
openSUSE Tumbleweed:python313-tk-3.13.0~b3-1.1
openSUSE Tumbleweed:python313-x86-64-v3-3.13.0~b3-1.1
+ openSUSE Tumbleweed:python314-3.14.0~a1-1.1
+ openSUSE Tumbleweed:python314-curses-3.14.0~a1-1.1
+ openSUSE Tumbleweed:python314-dbm-3.14.0~a1-1.1
+ openSUSE Tumbleweed:python314-idle-3.14.0~a1-1.1
+ openSUSE Tumbleweed:python314-tk-3.14.0~a1-1.1
+ openSUSE Tumbleweed:python314-x86-64-v3-3.14.0~a1-1.1
openSUSE Tumbleweed:python36-3.6.15-1.1
openSUSE Tumbleweed:python36-32bit-3.6.15-1.1
openSUSE Tumbleweed:python36-curses-3.6.15-1.1
skipping CVE-2021-23222 as CVE page is older than CVRF-CVE file.
skipping CVE-2021-23215 as CVE page is older than CVRF-CVE file.
skipping CVE-2021-23214 as CVE page is older than CVRF-CVE file.
no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2021-23177
skipping CVE-2021-23169 as CVE page is older than CVRF-CVE file.
no cpe found for SUSE Package Hub 15 SP4 in CVE-2021-23159
no cpe found for SUSE Package Hub 15 SP5 in CVE-2021-23159
skipping CVE-2021-22947 as CVE page is older than CVRF-CVE file.
skipping CVE-2021-22946 as CVE page is older than CVRF-CVE file.
skipping CVE-2021-22945 as CVE page is older than CVRF-CVE file.
no cpe found for SUSE Package Hub 15 SP2 in CVE-2021-22929
no cpe found for SUSE Package Hub 15 SP3 in CVE-2021-22929
skipping CVE-2021-22926 as CVE page is older than CVRF-CVE file.
skipping CVE-2021-22925 as CVE page is older than CVRF-CVE file.
skipping CVE-2021-22924 as CVE page is older than CVRF-CVE file.
skipping CVE-2021-22923 as CVE page is older than CVRF-CVE file.
skipping CVE-2021-22922 as CVE page is older than CVRF-CVE file.
skipping CVE-2021-22904 as CVE page is older than CVRF-CVE file.
skipping CVE-2021-22901 as CVE page is older than CVRF-CVE file.
skipping CVE-2021-22898 as CVE page is older than CVRF-CVE file.
skipping CVE-2021-22897 as CVE page is older than CVRF-CVE file.
skipping CVE-2021-22890 as CVE page is older than CVRF-CVE file.
skipping CVE-2021-22885 as CVE page is older than CVRF-CVE file.
skipping CVE-2021-22880 as CVE page is older than CVRF-CVE file.
skipping CVE-2021-22600 as CVE page is older than CVRF-CVE file.
CVE-2021-22570: no packages for Image SLES15-SP4-SAP-Azure-LI-BYOS-Production, but entry?
CVE-2021-22570: no packages for SUSE Manager Proxy 4.2, but entry?
CVE-2021-22570: no packages for SUSE Linux Enterprise Real Time 15 SP3, but entry?
CVE-2021-22570: no packages for Image SLES15-SP5-SAP-Azure-VLI-BYOS, but entry?
CVE-2021-22570: no packages for Image SLES15-SP5-SAP-Azure-LI-BYOS-Production, but entry?
CVE-2021-22570: no packages for Image SLES15-SP6-SAP-Azure-VLI-BYOS, but entry?
CVE-2021-22570: no packages for Image SLES15-SP5-SAP-Azure-VLI-BYOS-Production, but entry?
CVE-2021-22570: no packages for SUSE Linux Enterprise Server for SAP Applications 15 SP3, but entry?
CVE-2021-22570: no packages for SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS, but entry?
CVE-2021-22570: no packages for Image SLES15-SP3-SAP-Azure-LI-BYOS-Production, but entry?
CVE-2021-22570: no packages for SUSE Linux Enterprise Module for Server Applications 15 SP6, but entry?
CVE-2021-22570: no packages for Image SLES15-SP4-SAP-Azure-LI-BYOS, but entry?
CVE-2021-22570: no packages for SUSE Enterprise Storage 7.1, but entry?
CVE-2021-22570: no packages for SUSE Manager Server 4.2, but entry?
CVE-2021-22570: no packages for SUSE Manager Retail Branch Server 4.2, but entry?
CVE-2021-22570: no packages for Image SLES15-SP6-SAP-Azure-LI-BYOS-Production, but entry?
CVE-2021-22570: no packages for SUSE Linux Enterprise Server 15 SP3-LTSS, but entry?
CVE-2021-22570: no packages for Image SLES15-SP3-SAP-Azure-VLI-BYOS-Production, but entry?
CVE-2021-22570: no packages for SUSE Linux Enterprise Module for Server Applications 15 SP4, but entry?
CVE-2021-22570: no packages for SUSE Linux Enterprise Module for Server Applications 15 SP5, but entry?
CVE-2021-22570: no packages for Image SLES15-SP5-SAP-Azure-LI-BYOS, but entry?
CVE-2021-22570: no packages for Image SLES15-SP4-SAP-Azure-VLI-BYOS-Production, but entry?
CVE-2021-22570: no packages for SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS, but entry?
CVE-2021-22570: no packages for Image SLES15-SP6-SAP-Azure-VLI-BYOS-Production, but entry?
CVE-2021-22570: no packages for Image SLES15-SP4-SAP-Azure-VLI-BYOS, but entry?
CVE-2021-22570: no packages for Image SLES15-SP6-SAP-Azure-LI-BYOS, but entry?
CVE-2021-22570: no packages for SUSE Linux Enterprise Server 15 SP4-TERADATA, but entry?
no cpe found for SUSE Linux Enterprise Installer Updates 15 SP1 in CVE-2021-22570
no cpe found for SUSE Linux Enterprise Installer Updates 15 SP2 in CVE-2021-22570
no cpe found for SUSE Linux Enterprise Installer Updates 15 SP1 in CVE-2021-22570
no cpe found for SUSE Linux Enterprise Installer Updates 15 SP2 in CVE-2021-22570
no cpe found for SUSE Linux Enterprise Installer Updates 15 SP1 in CVE-2021-22570
no cpe found for SUSE Linux Enterprise Installer Updates 15 SP2 in CVE-2021-22570
no cpe found for SUSE Linux Enterprise Installer Updates 15 SP1 in CVE-2021-22570
no cpe found for SUSE Linux Enterprise Installer Updates 15 SP2 in CVE-2021-22570
no cpe found for SUSE Linux Enterprise Installer Updates 15 SP1 in CVE-2021-22570
no cpe found for SUSE Linux Enterprise Installer Updates 15 SP2 in CVE-2021-22570
no cpe found for SUSE Linux Enterprise Installer Updates 15 SP1 in CVE-2021-22570
no cpe found for SUSE Linux Enterprise Installer Updates 15 SP2 in CVE-2021-22570
no cpe found for SUSE Linux Enterprise Installer Updates 15 SP1 in CVE-2021-22570
no cpe found for SUSE Linux Enterprise Installer Updates 15 SP2 in CVE-2021-22570
no cpe found for SUSE Linux Enterprise Installer Updates 15 SP1 in CVE-2021-22570
no cpe found for SUSE Linux Enterprise Installer Updates 15 SP2 in CVE-2021-22570
CVE-2021-22570: no packages for Image SLES15-SP3-SAP-Azure-LI-BYOS-Production, but entry?
CVE-2021-22570: no packages for Image SLES15-SP3-SAP-Azure-VLI-BYOS-Production, but entry?
CVE-2021-22570: no packages for Image SLES15-SP4-SAP-Azure-LI-BYOS, but entry?
CVE-2021-22570: no packages for Image SLES15-SP4-SAP-Azure-LI-BYOS-Production, but entry?
CVE-2021-22570: no packages for Image SLES15-SP4-SAP-Azure-VLI-BYOS, but entry?
CVE-2021-22570: no packages for Image SLES15-SP4-SAP-Azure-VLI-BYOS-Production, but entry?
CVE-2021-22570: no packages for Image SLES15-SP5-SAP-Azure-LI-BYOS, but entry?
CVE-2021-22570: no packages for Image SLES15-SP5-SAP-Azure-LI-BYOS-Production, but entry?
CVE-2021-22570: no packages for Image SLES15-SP5-SAP-Azure-VLI-BYOS, but entry?
CVE-2021-22570: no packages for Image SLES15-SP5-SAP-Azure-VLI-BYOS-Production, but entry?
CVE-2021-22570: no packages for Image SLES15-SP6-SAP-Azure-LI-BYOS, but entry?
CVE-2021-22570: no packages for Image SLES15-SP6-SAP-Azure-LI-BYOS-Production, but entry?
CVE-2021-22570: no packages for Image SLES15-SP6-SAP-Azure-VLI-BYOS, but entry?
CVE-2021-22570: no packages for Image SLES15-SP6-SAP-Azure-VLI-BYOS-Production, but entry?
CVE-2021-22570: no packages for SUSE Enterprise Storage 7.1, but entry?
CVE-2021-22570: no packages for SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS, but entry?
CVE-2021-22570: no packages for SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS, but entry?
CVE-2021-22570: no packages for SUSE Linux Enterprise Module for Server Applications 15 SP4, but entry?
CVE-2021-22570: no packages for SUSE Linux Enterprise Module for Server Applications 15 SP5, but entry?
CVE-2021-22570: no packages for SUSE Linux Enterprise Module for Server Applications 15 SP6, but entry?
CVE-2021-22570: no packages for SUSE Linux Enterprise Real Time 15 SP3, but entry?
CVE-2021-22570: no packages for SUSE Linux Enterprise Server 15 SP3-LTSS, but entry?
CVE-2021-22570: no packages for SUSE Linux Enterprise Server 15 SP4-TERADATA, but entry?
CVE-2021-22570: no packages for SUSE Linux Enterprise Server for SAP Applications 15 SP3, but entry?
CVE-2021-22570: no packages for SUSE Manager Proxy 4.2, but entry?
CVE-2021-22570: no packages for SUSE Manager Retail Branch Server 4.2, but entry?
CVE-2021-22570: no packages for SUSE Manager Server 4.2, but entry?
CVE-2021-22570: no packages for Image SLES15-SP3-SAP-Azure-LI-BYOS-Production, but entry?
CVE-2021-22570: no packages for Image SLES15-SP3-SAP-Azure-VLI-BYOS-Production, but entry?
CVE-2021-22570: no packages for Image SLES15-SP4-SAP-Azure-LI-BYOS, but entry?
CVE-2021-22570: no packages for Image SLES15-SP4-SAP-Azure-LI-BYOS-Production, but entry?
CVE-2021-22570: no packages for Image SLES15-SP4-SAP-Azure-VLI-BYOS, but entry?
CVE-2021-22570: no packages for Image SLES15-SP4-SAP-Azure-VLI-BYOS-Production, but entry?
CVE-2021-22570: no packages for Image SLES15-SP5-SAP-Azure-LI-BYOS, but entry?
CVE-2021-22570: no packages for Image SLES15-SP5-SAP-Azure-LI-BYOS-Production, but entry?
CVE-2021-22570: no packages for Image SLES15-SP5-SAP-Azure-VLI-BYOS, but entry?
CVE-2021-22570: no packages for Image SLES15-SP5-SAP-Azure-VLI-BYOS-Production, but entry?
CVE-2021-22570: no packages for Image SLES15-SP6-SAP-Azure-LI-BYOS, but entry?
CVE-2021-22570: no packages for Image SLES15-SP6-SAP-Azure-LI-BYOS-Production, but entry?
CVE-2021-22570: no packages for Image SLES15-SP6-SAP-Azure-VLI-BYOS, but entry?
CVE-2021-22570: no packages for Image SLES15-SP6-SAP-Azure-VLI-BYOS-Production, but entry?
CVE-2021-22570: no packages for SUSE Enterprise Storage 7.1, but entry?
CVE-2021-22570: no packages for SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS, but entry?
CVE-2021-22570: no packages for SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS, but entry?
CVE-2021-22570: no packages for SUSE Linux Enterprise Module for Server Applications 15 SP4, but entry?
CVE-2021-22570: no packages for SUSE Linux Enterprise Module for Server Applications 15 SP5, but entry?
CVE-2021-22570: no packages for SUSE Linux Enterprise Module for Server Applications 15 SP6, but entry?
CVE-2021-22570: no packages for SUSE Linux Enterprise Real Time 15 SP3, but entry?
CVE-2021-22570: no packages for SUSE Linux Enterprise Server 15 SP3-LTSS, but entry?
CVE-2021-22570: no packages for SUSE Linux Enterprise Server 15 SP4-TERADATA, but entry?
CVE-2021-22570: no packages for SUSE Linux Enterprise Server for SAP Applications 15 SP3, but entry?
CVE-2021-22570: no packages for SUSE Manager Proxy 4.2, but entry?
CVE-2021-22570: no packages for SUSE Manager Retail Branch Server 4.2, but entry?
CVE-2021-22570: no packages for SUSE Manager Server 4.2, but entry?
no cpe found for SUSE Linux Enterprise Installer Updates 15 SP1 in CVE-2021-22569
no cpe found for SUSE Linux Enterprise Installer Updates 15 SP2 in CVE-2021-22569
no cpe found for SUSE Linux Enterprise Installer Updates 15 SP1 in CVE-2021-22569
no cpe found for SUSE Linux Enterprise Installer Updates 15 SP2 in CVE-2021-22569
no cpe found for SUSE Linux Enterprise Installer Updates 15 SP1 in CVE-2021-22569
no cpe found for SUSE Linux Enterprise Installer Updates 15 SP2 in CVE-2021-22569
no cpe found for SUSE Linux Enterprise Installer Updates 15 SP1 in CVE-2021-22569
no cpe found for SUSE Linux Enterprise Installer Updates 15 SP2 in CVE-2021-22569
no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2021-22569
no cpe found for SUSE Linux Enterprise Installer Updates 15 SP1 in CVE-2021-22569
no cpe found for SUSE Linux Enterprise Installer Updates 15 SP2 in CVE-2021-22569
no cpe found for SUSE Linux Enterprise Installer Updates 15 SP1 in CVE-2021-22569
no cpe found for SUSE Linux Enterprise Installer Updates 15 SP2 in CVE-2021-22569
no cpe found for SUSE Linux Enterprise Installer Updates 15 SP1 in CVE-2021-22569
no cpe found for SUSE Linux Enterprise Installer Updates 15 SP2 in CVE-2021-22569
no cpe found for SUSE Linux Enterprise Installer Updates 15 SP1 in CVE-2021-22569
no cpe found for SUSE Linux Enterprise Installer Updates 15 SP2 in CVE-2021-22569
skipping CVE-2021-22297 as CVE page is older than CVRF-CVE file.
skipping CVE-2021-22222 as CVE page is older than CVRF-CVE file.
skipping CVE-2021-22207 as CVE page is older than CVRF-CVE file.
no cpe found for SUSE Package Hub 15 SP1 in CVE-2021-22204
no cpe found for SUSE Package Hub 15 SP2 in CVE-2021-22204
skipping CVE-2021-22191 as CVE page is older than CVRF-CVE file.
skipping CVE-2021-22174 as CVE page is older than CVRF-CVE file.
skipping CVE-2021-22173 as CVE page is older than CVRF-CVE file.
no cpe found for SUSE Package Hub 15 SP3 in CVE-2021-21900
skipping CVE-2021-21996 as CVE page is older than CVRF-CVE file.
no cpe found for SUSE Package Hub 15 SP3 in CVE-2021-21899
no cpe found for SUSE Package Hub 15 SP3 in CVE-2021-21898
no cpe found for SUSE Package Hub 15 SP3 in CVE-2021-21897
no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2021-21708
skipping CVE-2021-21806 as CVE page is older than CVRF-CVE file.
skipping CVE-2021-21781 as CVE page is older than CVRF-CVE file.
skipping CVE-2021-21779 as CVE page is older than CVRF-CVE file.
skipping CVE-2021-21775 as CVE page is older than CVRF-CVE file.
no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2021-21707
no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2021-21703
no cpe found for SUSE Package Hub 15 SP2 in CVE-2021-21416
no cpe found for SUSE Package Hub 15 SP2 in CVE-2021-21404
no cpe found for SUSE Package Hub 15 SP2 in CVE-2021-21374
no cpe found for SUSE Package Hub 15 SP3 in CVE-2021-21374
no cpe found for SUSE Package Hub 15 SP4 in CVE-2021-21374
no cpe found for SUSE Package Hub 15 SP2 in CVE-2021-21373
no cpe found for SUSE Package Hub 15 SP3 in CVE-2021-21373
no cpe found for SUSE Package Hub 15 SP4 in CVE-2021-21373
no cpe found for SUSE Package Hub 15 SP2 in CVE-2021-21372
no cpe found for SUSE Package Hub 15 SP3 in CVE-2021-21372
no cpe found for SUSE Package Hub 15 SP4 in CVE-2021-21372
skipping CVE-2021-21351 as CVE page is older than CVRF-CVE file.
skipping CVE-2021-21350 as CVE page is older than CVRF-CVE file.
skipping CVE-2021-21349 as CVE page is older than CVRF-CVE file.
skipping CVE-2021-21348 as CVE page is older than CVRF-CVE file.
skipping CVE-2021-21347 as CVE page is older than CVRF-CVE file.
skipping CVE-2021-21346 as CVE page is older than CVRF-CVE file.
skipping CVE-2021-21345 as CVE page is older than CVRF-CVE file.
skipping CVE-2021-21344 as CVE page is older than CVRF-CVE file.
skipping CVE-2021-21343 as CVE page is older than CVRF-CVE file.
skipping CVE-2021-21342 as CVE page is older than CVRF-CVE file.
skipping CVE-2021-21341 as CVE page is older than CVRF-CVE file.
no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2021-21330
skipping CVE-2021-21290 as CVE page is older than CVRF-CVE file.
skipping CVE-2021-21272 as CVE page is older than CVRF-CVE file.
no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2021-21241
no cpe found for SUSE Package Hub 15 SP2 in CVE-2021-21240
no cpe found for SUSE Package Hub 15 SP4 in CVE-2021-21236
no cpe found for SUSE Package Hub 15 SP5 in CVE-2021-21236
no cpe found for SUSE Package Hub 15 SP2 in CVE-2021-21220
no cpe found for SUSE Package Hub 15 SP3 in CVE-2021-21212
no cpe found for SUSE Package Hub 15 SP2 in CVE-2021-21206
no cpe found for SUSE Package Hub 15 SP2 in CVE-2021-21199
no cpe found for SUSE Package Hub 15 SP2 in CVE-2021-21198
no cpe found for SUSE Package Hub 15 SP2 in CVE-2021-21197
no cpe found for SUSE Package Hub 15 SP2 in CVE-2021-21196
no cpe found for SUSE Package Hub 15 SP2 in CVE-2021-21195
no cpe found for SUSE Package Hub 15 SP2 in CVE-2021-21194
no cpe found for SUSE Package Hub 15 SP2 in CVE-2021-21193
no cpe found for SUSE Package Hub 15 SP2 in CVE-2021-21192
no cpe found for SUSE Package Hub 15 SP2 in CVE-2021-21191
no cpe found for SUSE Package Hub 15 SP2 in CVE-2021-21190
no cpe found for SUSE Package Hub 15 SP2 in CVE-2021-21189
no cpe found for SUSE Package Hub 15 SP2 in CVE-2021-21188
no cpe found for SUSE Package Hub 15 SP2 in CVE-2021-21187
no cpe found for SUSE Package Hub 15 SP2 in CVE-2021-21186
no cpe found for SUSE Package Hub 15 SP2 in CVE-2021-21185
no cpe found for SUSE Package Hub 15 SP2 in CVE-2021-21184
no cpe found for SUSE Package Hub 15 SP2 in CVE-2021-21183
no cpe found for SUSE Package Hub 15 SP2 in CVE-2021-21182
no cpe found for SUSE Package Hub 15 SP2 in CVE-2021-21181
no cpe found for SUSE Package Hub 15 SP2 in CVE-2021-21180
no cpe found for SUSE Package Hub 15 SP2 in CVE-2021-21179
no cpe found for SUSE Package Hub 15 SP2 in CVE-2021-21178
no cpe found for SUSE Package Hub 15 SP2 in CVE-2021-21177
no cpe found for SUSE Package Hub 15 SP2 in CVE-2021-21176
no cpe found for SUSE Package Hub 15 SP2 in CVE-2021-21175
no cpe found for SUSE Package Hub 15 SP2 in CVE-2021-21174
no cpe found for SUSE Package Hub 15 SP2 in CVE-2021-21173
no cpe found for SUSE Package Hub 15 SP2 in CVE-2021-21172
no cpe found for SUSE Package Hub 15 SP2 in CVE-2021-21171
no cpe found for SUSE Package Hub 15 SP2 in CVE-2021-21170
no cpe found for SUSE Package Hub 15 SP2 in CVE-2021-21169
no cpe found for SUSE Package Hub 15 SP2 in CVE-2021-21168
no cpe found for SUSE Package Hub 15 SP2 in CVE-2021-21167
no cpe found for SUSE Package Hub 15 SP2 in CVE-2021-21166
no cpe found for SUSE Package Hub 15 SP2 in CVE-2021-21165
no cpe found for SUSE Package Hub 15 SP2 in CVE-2021-21164
no cpe found for SUSE Package Hub 15 SP2 in CVE-2021-21163
no cpe found for SUSE Package Hub 15 SP2 in CVE-2021-21162
no cpe found for SUSE Package Hub 15 SP2 in CVE-2021-21161
no cpe found for SUSE Package Hub 15 SP2 in CVE-2021-21160
no cpe found for SUSE Package Hub 15 SP2 in CVE-2021-21159
no cpe found for SUSE Package Hub 15 SP2 in CVE-2021-21157
no cpe found for SUSE Package Hub 15 SP2 in CVE-2021-21156
no cpe found for SUSE Package Hub 15 SP2 in CVE-2021-21155
no cpe found for SUSE Package Hub 15 SP2 in CVE-2021-21154
no cpe found for SUSE Package Hub 15 SP2 in CVE-2021-21153
no cpe found for SUSE Package Hub 15 SP2 in CVE-2021-21152
no cpe found for SUSE Package Hub 15 SP2 in CVE-2021-21151
no cpe found for SUSE Package Hub 15 SP2 in CVE-2021-21150
no cpe found for SUSE Package Hub 15 SP2 in CVE-2021-21149
no cpe found for SUSE Package Hub 15 SP2 in CVE-2021-21148
no cpe found for SUSE Package Hub 15 SP2 in CVE-2021-21147
no cpe found for SUSE Package Hub 15 SP2 in CVE-2021-21146
no cpe found for SUSE Package Hub 15 SP2 in CVE-2021-21145
no cpe found for SUSE Package Hub 15 SP2 in CVE-2021-21144
no cpe found for SUSE Package Hub 15 SP2 in CVE-2021-21143
no cpe found for SUSE Package Hub 15 SP2 in CVE-2021-21142
no cpe found for SUSE Package Hub 15 SP1 in CVE-2021-21141
no cpe found for SUSE Package Hub 15 SP2 in CVE-2021-21141
no cpe found for SUSE Package Hub 15 SP1 in CVE-2021-21140
no cpe found for SUSE Package Hub 15 SP2 in CVE-2021-21140
no cpe found for SUSE Package Hub 15 SP1 in CVE-2021-21139
no cpe found for SUSE Package Hub 15 SP2 in CVE-2021-21139
no cpe found for SUSE Package Hub 15 SP1 in CVE-2021-21138
no cpe found for SUSE Package Hub 15 SP2 in CVE-2021-21138
no cpe found for SUSE Package Hub 15 SP1 in CVE-2021-21137
no cpe found for SUSE Package Hub 15 SP2 in CVE-2021-21137
no cpe found for SUSE Package Hub 15 SP1 in CVE-2021-21136
no cpe found for SUSE Package Hub 15 SP2 in CVE-2021-21136
no cpe found for SUSE Package Hub 15 SP1 in CVE-2021-21135
no cpe found for SUSE Package Hub 15 SP2 in CVE-2021-21135
no cpe found for SUSE Package Hub 15 SP1 in CVE-2021-21134
no cpe found for SUSE Package Hub 15 SP2 in CVE-2021-21134
no cpe found for SUSE Package Hub 15 SP1 in CVE-2021-21133
no cpe found for SUSE Package Hub 15 SP2 in CVE-2021-21133
no cpe found for SUSE Package Hub 15 SP1 in CVE-2021-21132
no cpe found for SUSE Package Hub 15 SP2 in CVE-2021-21132
no cpe found for SUSE Package Hub 15 SP1 in CVE-2021-21131
no cpe found for SUSE Package Hub 15 SP2 in CVE-2021-21131
no cpe found for SUSE Package Hub 15 SP1 in CVE-2021-21130
no cpe found for SUSE Package Hub 15 SP2 in CVE-2021-21130
no cpe found for SUSE Package Hub 15 SP1 in CVE-2021-21129
no cpe found for SUSE Package Hub 15 SP2 in CVE-2021-21129
no cpe found for SUSE Package Hub 15 SP1 in CVE-2021-21128
no cpe found for SUSE Package Hub 15 SP2 in CVE-2021-21128
no cpe found for SUSE Package Hub 15 SP1 in CVE-2021-21127
no cpe found for SUSE Package Hub 15 SP2 in CVE-2021-21127
no cpe found for SUSE Package Hub 15 SP1 in CVE-2021-21126
no cpe found for SUSE Package Hub 15 SP2 in CVE-2021-21126
no cpe found for SUSE Package Hub 15 SP1 in CVE-2021-21125
no cpe found for SUSE Package Hub 15 SP2 in CVE-2021-21125
no cpe found for SUSE Package Hub 15 SP1 in CVE-2021-21124
no cpe found for SUSE Package Hub 15 SP2 in CVE-2021-21124
no cpe found for SUSE Package Hub 15 SP1 in CVE-2021-21123
no cpe found for SUSE Package Hub 15 SP2 in CVE-2021-21123
no cpe found for SUSE Package Hub 15 SP1 in CVE-2021-21122
no cpe found for SUSE Package Hub 15 SP2 in CVE-2021-21122
no cpe found for SUSE Package Hub 15 SP1 in CVE-2021-21121
no cpe found for SUSE Package Hub 15 SP2 in CVE-2021-21121
no cpe found for SUSE Package Hub 15 SP1 in CVE-2021-21120
no cpe found for SUSE Package Hub 15 SP2 in CVE-2021-21120
no cpe found for SUSE Package Hub 15 SP1 in CVE-2021-21119
no cpe found for SUSE Package Hub 15 SP2 in CVE-2021-21119
no cpe found for SUSE Package Hub 15 SP1 in CVE-2021-21118
no cpe found for SUSE Package Hub 15 SP2 in CVE-2021-21118
no cpe found for SUSE Package Hub 15 SP1 in CVE-2021-21117
no cpe found for SUSE Package Hub 15 SP2 in CVE-2021-21117
no cpe found for SUSE Package Hub 15 SP1 in CVE-2021-21116
no cpe found for SUSE Package Hub 15 SP2 in CVE-2021-21116
no cpe found for SUSE Package Hub 15 SP1 in CVE-2021-21115
no cpe found for SUSE Package Hub 15 SP2 in CVE-2021-21115
no cpe found for SUSE Package Hub 15 SP1 in CVE-2021-21114
no cpe found for SUSE Package Hub 15 SP2 in CVE-2021-21114
no cpe found for SUSE Package Hub 15 SP1 in CVE-2021-21113
no cpe found for SUSE Package Hub 15 SP2 in CVE-2021-21113
no cpe found for SUSE Package Hub 15 SP1 in CVE-2021-21112
no cpe found for SUSE Package Hub 15 SP2 in CVE-2021-21112
no cpe found for SUSE Package Hub 15 SP1 in CVE-2021-21111
no cpe found for SUSE Package Hub 15 SP2 in CVE-2021-21111
no cpe found for SUSE Package Hub 15 SP1 in CVE-2021-21110
no cpe found for SUSE Package Hub 15 SP2 in CVE-2021-21110
no cpe found for SUSE Package Hub 15 SP1 in CVE-2021-21109
no cpe found for SUSE Package Hub 15 SP2 in CVE-2021-21109
no cpe found for SUSE Package Hub 15 SP1 in CVE-2021-21108
no cpe found for SUSE Package Hub 15 SP2 in CVE-2021-21108
no cpe found for SUSE Package Hub 15 SP1 in CVE-2021-21107
no cpe found for SUSE Package Hub 15 SP2 in CVE-2021-21107
no cpe found for SUSE Package Hub 15 SP1 in CVE-2021-21106
no cpe found for SUSE Package Hub 15 SP2 in CVE-2021-21106
skipping CVE-2021-20320 as CVE page is older than CVRF-CVE file.
skipping CVE-2021-20317 as CVE page is older than CVRF-CVE file.
no cpe found for SUSE Package Hub 15 SP1 in CVE-2021-20314
no cpe found for SUSE Package Hub 15 SP2 in CVE-2021-20314
no cpe found for SUSE Package Hub 15 SP3 in CVE-2021-20314
skipping CVE-2021-20315 as CVE page is older than CVRF-CVE file.
skipping CVE-2021-20310 as CVE page is older than CVRF-CVE file.
no cpe found for SUSE Package Hub 15 SP1 in CVE-2021-20308
no cpe found for SUSE Package Hub 15 SP2 in CVE-2021-20308
no cpe found for SUSE Package Hub 15 SP3 in CVE-2021-20308
skipping CVE-2021-20305 as CVE page is older than CVRF-CVE file.
skipping CVE-2021-20297 as CVE page is older than CVRF-CVE file.
skipping CVE-2021-20296 as CVE page is older than CVRF-CVE file.
skipping CVE-2021-20295 as CVE page is older than CVRF-CVE file.
skipping CVE-2021-20294 as CVE page is older than CVRF-CVE file.
skipping CVE-2021-20288 as CVE page is older than CVRF-CVE file.
no cpe found for SUSE Package Hub 15 SP4 in CVE-2021-20285
no cpe found for SUSE Package Hub 15 SP2 in CVE-2021-20276
skipping CVE-2021-20284 as CVE page is older than CVRF-CVE file.
skipping CVE-2021-20277 as CVE page is older than CVRF-CVE file.
no cpe found for SUSE Package Hub 15 SP2 in CVE-2021-20275
no cpe found for SUSE Package Hub 15 SP2 in CVE-2021-20274
no cpe found for SUSE Package Hub 15 SP2 in CVE-2021-20273
no cpe found for SUSE Package Hub 15 SP2 in CVE-2021-20272
skipping CVE-2021-20271 as CVE page is older than CVRF-CVE file.
skipping CVE-2021-20269 as CVE page is older than CVRF-CVE file.
skipping CVE-2021-20268 as CVE page is older than CVRF-CVE file.
skipping CVE-2021-20266 as CVE page is older than CVRF-CVE file.
skipping CVE-2021-20265 as CVE page is older than CVRF-CVE file.
skipping CVE-2021-20263 as CVE page is older than CVRF-CVE file.
skipping CVE-2021-20261 as CVE page is older than CVRF-CVE file.
skipping CVE-2021-20255 as CVE page is older than CVRF-CVE file.
no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2021-20251
no cpe found for SUSE Package Hub 15 SP2 in CVE-2021-20247
skipping CVE-2021-20248 as CVE page is older than CVRF-CVE file.
skipping CVE-2021-20245 as CVE page is older than CVRF-CVE file.
skipping CVE-2021-20241 as CVE page is older than CVRF-CVE file.
skipping CVE-2021-20240 as CVE page is older than CVRF-CVE file.
skipping CVE-2021-20239 as CVE page is older than CVRF-CVE file.
skipping CVE-2021-20232 as CVE page is older than CVRF-CVE file.
skipping CVE-2021-20231 as CVE page is older than CVRF-CVE file.
no cpe found for SUSE Manager Tools Beta for SLE Micro 5 in CVE-2021-20228
no cpe found for SUSE Package Hub 15 SP3 in CVE-2021-20228
skipping CVE-2021-20229 as CVE page is older than CVRF-CVE file.
skipping CVE-2021-20227 as CVE page is older than CVRF-CVE file.
skipping CVE-2021-20226 as CVE page is older than CVRF-CVE file.
skipping CVE-2021-20224 as CVE page is older than CVRF-CVE file.
skipping CVE-2021-20221 as CVE page is older than CVRF-CVE file.
no cpe found for SUSE Package Hub 15 SP2 in CVE-2021-20217
no cpe found for SUSE Package Hub 15 SP2 in CVE-2021-20216
CVE-2021-20206: no packages for Container ses/7.1/ceph/grafana:8.3.10.2.2.285, but entry?
CVE-2021-20206: no packages for Image SLES15-SP3-CHOST-BYOS-SAP-CCloud, but entry?
CVE-2021-20206: no packages for Container rancher/elemental-teal-iso/5.4:latest, but entry?
CVE-2021-20206: no packages for Image SLES15-SP3-Micro-5-1-BYOS-Azure, but entry?
CVE-2021-20206: no packages for SUSE Linux Enterprise Micro 5.2, but entry?
CVE-2021-20206: no packages for SUSE Linux Enterprise Server for SAP Applications 15 SP3, but entry?
CVE-2021-20206: no packages for SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS, but entry?
CVE-2021-20206: no packages for Image SLES15-SP3-SAP-Azure-LI-BYOS-Production, but entry?
CVE-2021-20206: no packages for Container trento/trento-wanda:1.0.0-build1.5.2, but entry?
CVE-2021-20206: no packages for Container trento/trento-db:14.5-rev1.0.0-build2.2.178, but entry?
CVE-2021-20206: no packages for openSUSE Leap Micro 5.2, but entry?
CVE-2021-20206: no packages for Image SLES15-SP3-Manager-4-2-Server-BYOS-Azure, but entry?
CVE-2021-20206: no packages for Image SLES15-SP3-BYOS-GCE, but entry?
CVE-2021-20206: no packages for Container ses/7.1/cephcsi/csi-provisioner:v3.4.0, but entry?
CVE-2021-20206: no packages for Container ses/7.1/cephcsi/csi-attacher:v4.1.0, but entry?
CVE-2021-20206: no packages for Image SLES15-SP3-Micro-5-1-BYOS-GCE, but entry?
CVE-2021-20206: no packages for Container ses/7.1/ceph/prometheus-snmp_notifier:1.2.1.2.2.341, but entry?
CVE-2021-20206: no packages for Container bci/nodejs:12-17.28, but entry?
CVE-2021-20206: no packages for Image SLES15-SP3-Manager-4-2-Server-BYOS-EC2-HVM, but entry?
CVE-2021-20206: no packages for Image SLES15-SP3-CHOST-BYOS-Azure, but entry?
CVE-2021-20206: no packages for Image SLES15-SP3-Manager-4-2-Server-BYOS-GCE, but entry?
CVE-2021-20206: no packages for Image SLES15-SP3-SAP-BYOS-EC2-HVM, but entry?
CVE-2021-20206: no packages for Image SLES15-SP3-Manager-4-2-Proxy-BYOS-EC2-HVM, but entry?
CVE-2021-20206: no packages for Image SLES15-SP3-HPC-BYOS-GCE, but entry?
CVE-2021-20206: no packages for Image SLES15-SP3-Micro-5-2-BYOS-Azure, but entry?
CVE-2021-20206: no packages for Container ses/7.1/cephcsi/csi-snapshotter:v6.2.1, but entry?
CVE-2021-20206: no packages for Container trento/trento-web:1.2.0-build4.18.11, but entry?
CVE-2021-20206: no packages for Image SLES15-SP3-HPC-BYOS-Azure, but entry?
CVE-2021-20206: no packages for Image SLES15-SP3-Micro-5-2-BYOS-EC2-HVM, but entry?
CVE-2021-20206: no packages for Image SLES15-SP3-SAPCAL-Azure, but entry?
CVE-2021-20206: no packages for Container ses/7.1/ceph/keepalived:2.0.19.3.5.316, but entry?
CVE-2021-20206: no packages for Image SLES15-SP3-HPC-BYOS-EC2-HVM, but entry?
CVE-2021-20206: no packages for Container ses/7.1/ceph/prometheus-alertmanager:0.23.0.3.2.368, but entry?
CVE-2021-20206: no packages for Container ses/7.1/ceph/haproxy:2.0.14.3.5.330, but entry?
CVE-2021-20206: no packages for Container rancher/elemental-teal-rt/5.4:latest, but entry?
CVE-2021-20206: no packages for Container suse/sle-micro/5.2/toolbox:12.1-6.2.199, but entry?
CVE-2021-20206: no packages for Container ses/7.1/cephcsi/csi-node-driver-registrar:v2.7.0, but entry?
CVE-2021-20206: no packages for Container rancher/elemental-teal/5.4:latest, but entry?
CVE-2021-20206: no packages for Image SLES15-SP3-BYOS-EC2-HVM, but entry?
CVE-2021-20206: no packages for Image SLES15-SP3-CHOST-BYOS-GCE, but entry?
CVE-2021-20206: no packages for Container ses/7.1/rook/ceph:1.10.1.16.4.5.328, but entry?
CVE-2021-20206: no packages for SUSE Linux Enterprise Micro 5.3, but entry?
CVE-2021-20206: no packages for Image SLES15-SP3-CHOST-BYOS-Aliyun, but entry?
CVE-2021-20206: no packages for Container ses/7.1/cephcsi/cephcsi:v3.7.0.0, but entry?
CVE-2021-20206: no packages for Image SLES15-SP3-Micro-5-1-BYOS-EC2-HVM, but entry?
CVE-2021-20206: no packages for SUSE Linux Enterprise Module for Public Cloud 15 SP2, but entry?
CVE-2021-20206: no packages for SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS, but entry?
CVE-2021-20206: no packages for openSUSE Leap Micro 5.3, but entry?
CVE-2021-20206: no packages for Container caasp/v4/cilium:1.6.6, but entry?
CVE-2021-20206: no packages for Image SLES15-SP3-Manager-4-2-Proxy-BYOS-GCE, but entry?
CVE-2021-20206: no packages for Container bci/python:3.9-20.4, but entry?
CVE-2021-20206: no packages for SUSE Linux Enterprise Micro 5.1, but entry?
CVE-2021-20206: no packages for Container suse/sle-micro-rancher/5.2:latest, but entry?
CVE-2021-20206: no packages for Container ses/7.1/ceph/prometheus-server:2.32.1.3.2.352, but entry?
CVE-2021-20206: no packages for Container suse/ltss/sle15.3/bci-base:latest, but entry?
CVE-2021-20206: no packages for Container bci/bci-minimal:15.3.32.15, but entry?
CVE-2021-20206: no packages for Container suse/sle15:15.3.17.20.57, but entry?
CVE-2021-20206: no packages for SUSE Linux Enterprise Module for Public Cloud 15, but entry?
CVE-2021-20206: no packages for Image SLES15-SP3-SAP-BYOS-GCE, but entry?
CVE-2021-20206: no packages for Container ses/7.1/ceph/prometheus-node-exporter:1.3.0.3.2.359, but entry?
CVE-2021-20206: no packages for Image SLES15-SP3-Manager-4-2-Proxy-BYOS-Azure, but entry?
CVE-2021-20206: no packages for Image SLES15-SP3-SAP-Azure-VLI-BYOS-Production, but entry?
CVE-2021-20206: no packages for Container trento/trento-runner:1.1.0-build4.19.12, but entry?
CVE-2021-20206: no packages for SUSE Linux Enterprise Module for Basesystem 15 SP3, but entry?
CVE-2021-20206: no packages for SUSE Linux Enterprise Server 15 SP3-LTSS, but entry?
CVE-2021-20206: no packages for Image SLES15-SP3-BYOS-Azure, but entry?
CVE-2021-20206: no packages for Container suse/sle-micro/5.1/toolbox:12.1-2.2.377, but entry?
CVE-2021-20206: no packages for Container bci/bci-init:15.3.21.22, but entry?
CVE-2021-20206: no packages for Image SLES15-SP3-CHOST-BYOS-EC2, but entry?
CVE-2021-20206: no packages for Image SLES15-SP3-SAP-BYOS-Azure, but entry?
CVE-2021-20206: no packages for SUSE Enterprise Storage 7.1, but entry?
CVE-2021-20206: no packages for Image SLES15-SP3-SAPCAL-EC2-HVM, but entry?
CVE-2021-20206: no packages for Image SLES15-SP3-SAPCAL-GCE, but entry?
CVE-2021-20206: no packages for Container ses/7.1/cephcsi/csi-resizer:v1.7.0, but entry?
CVE-2021-20206: no packages for SUSE Linux Enterprise Module for Public Cloud 15 SP1, but entry?
CVE-2021-20206: no packages for Image SLES15-SP3-Micro-5-2-BYOS-GCE, but entry?
no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2021-20206
CVE-2021-20206: no packages for Container bci/bci-init:15.3.21.22, but entry?
CVE-2021-20206: no packages for Container bci/bci-minimal:15.3.32.15, but entry?
CVE-2021-20206: no packages for Container bci/nodejs:12-17.28, but entry?
CVE-2021-20206: no packages for Container bci/python:3.9-20.4, but entry?
CVE-2021-20206: no packages for Container caasp/v4/cilium:1.6.6, but entry?
CVE-2021-20206: no packages for Container rancher/elemental-teal-iso/5.4:latest, but entry?
CVE-2021-20206: no packages for Container rancher/elemental-teal-rt/5.4:latest, but entry?
CVE-2021-20206: no packages for Container rancher/elemental-teal/5.4:latest, but entry?
CVE-2021-20206: no packages for Container ses/7.1/ceph/grafana:8.3.10.2.2.285, but entry?
CVE-2021-20206: no packages for Container ses/7.1/ceph/haproxy:2.0.14.3.5.330, but entry?
CVE-2021-20206: no packages for Container ses/7.1/ceph/keepalived:2.0.19.3.5.316, but entry?
CVE-2021-20206: no packages for Container ses/7.1/ceph/prometheus-alertmanager:0.23.0.3.2.368, but entry?
CVE-2021-20206: no packages for Container ses/7.1/ceph/prometheus-node-exporter:1.3.0.3.2.359, but entry?
CVE-2021-20206: no packages for Container ses/7.1/ceph/prometheus-server:2.32.1.3.2.352, but entry?
CVE-2021-20206: no packages for Container ses/7.1/ceph/prometheus-snmp_notifier:1.2.1.2.2.341, but entry?
CVE-2021-20206: no packages for Container ses/7.1/cephcsi/cephcsi:v3.7.0.0, but entry?
CVE-2021-20206: no packages for Container ses/7.1/cephcsi/csi-attacher:v4.1.0, but entry?
CVE-2021-20206: no packages for Container ses/7.1/cephcsi/csi-node-driver-registrar:v2.7.0, but entry?
CVE-2021-20206: no packages for Container ses/7.1/cephcsi/csi-provisioner:v3.4.0, but entry?
CVE-2021-20206: no packages for Container ses/7.1/cephcsi/csi-resizer:v1.7.0, but entry?
CVE-2021-20206: no packages for Container ses/7.1/cephcsi/csi-snapshotter:v6.2.1, but entry?
CVE-2021-20206: no packages for Container ses/7.1/rook/ceph:1.10.1.16.4.5.328, but entry?
CVE-2021-20206: no packages for Container suse/ltss/sle15.3/bci-base:latest, but entry?
CVE-2021-20206: no packages for Container suse/sle-micro-rancher/5.2:latest, but entry?
CVE-2021-20206: no packages for Container suse/sle-micro/5.1/toolbox:12.1-2.2.377, but entry?
CVE-2021-20206: no packages for Container suse/sle-micro/5.2/toolbox:12.1-6.2.199, but entry?
CVE-2021-20206: no packages for Container suse/sle15:15.3.17.20.57, but entry?
CVE-2021-20206: no packages for Container trento/trento-db:14.5-rev1.0.0-build2.2.178, but entry?
CVE-2021-20206: no packages for Container trento/trento-runner:1.1.0-build4.19.12, but entry?
CVE-2021-20206: no packages for Container trento/trento-wanda:1.0.0-build1.5.2, but entry?
CVE-2021-20206: no packages for Container trento/trento-web:1.2.0-build4.18.11, but entry?
CVE-2021-20206: no packages for Image SLES15-SP3-BYOS-Azure, but entry?
CVE-2021-20206: no packages for Image SLES15-SP3-BYOS-EC2-HVM, but entry?
CVE-2021-20206: no packages for Image SLES15-SP3-BYOS-GCE, but entry?
CVE-2021-20206: no packages for Image SLES15-SP3-CHOST-BYOS-Aliyun, but entry?
CVE-2021-20206: no packages for Image SLES15-SP3-CHOST-BYOS-Azure, but entry?
CVE-2021-20206: no packages for Image SLES15-SP3-CHOST-BYOS-EC2, but entry?
CVE-2021-20206: no packages for Image SLES15-SP3-CHOST-BYOS-GCE, but entry?
CVE-2021-20206: no packages for Image SLES15-SP3-CHOST-BYOS-SAP-CCloud, but entry?
CVE-2021-20206: no packages for Image SLES15-SP3-HPC-BYOS-Azure, but entry?
CVE-2021-20206: no packages for Image SLES15-SP3-HPC-BYOS-EC2-HVM, but entry?
CVE-2021-20206: no packages for Image SLES15-SP3-HPC-BYOS-GCE, but entry?
CVE-2021-20206: no packages for Image SLES15-SP3-Manager-4-2-Proxy-BYOS-Azure, but entry?
CVE-2021-20206: no packages for Image SLES15-SP3-Manager-4-2-Proxy-BYOS-EC2-HVM, but entry?
CVE-2021-20206: no packages for Image SLES15-SP3-Manager-4-2-Proxy-BYOS-GCE, but entry?
CVE-2021-20206: no packages for Image SLES15-SP3-Manager-4-2-Server-BYOS-Azure, but entry?
CVE-2021-20206: no packages for Image SLES15-SP3-Manager-4-2-Server-BYOS-EC2-HVM, but entry?
CVE-2021-20206: no packages for Image SLES15-SP3-Manager-4-2-Server-BYOS-GCE, but entry?
CVE-2021-20206: no packages for Image SLES15-SP3-Micro-5-1-BYOS-Azure, but entry?
CVE-2021-20206: no packages for Image SLES15-SP3-Micro-5-1-BYOS-EC2-HVM, but entry?
CVE-2021-20206: no packages for Image SLES15-SP3-Micro-5-1-BYOS-GCE, but entry?
CVE-2021-20206: no packages for Image SLES15-SP3-Micro-5-2-BYOS-Azure, but entry?
CVE-2021-20206: no packages for Image SLES15-SP3-Micro-5-2-BYOS-EC2-HVM, but entry?
CVE-2021-20206: no packages for Image SLES15-SP3-Micro-5-2-BYOS-GCE, but entry?
CVE-2021-20206: no packages for Image SLES15-SP3-SAP-Azure-LI-BYOS-Production, but entry?
CVE-2021-20206: no packages for Image SLES15-SP3-SAP-Azure-VLI-BYOS-Production, but entry?
CVE-2021-20206: no packages for Image SLES15-SP3-SAP-BYOS-Azure, but entry?
CVE-2021-20206: no packages for Image SLES15-SP3-SAP-BYOS-EC2-HVM, but entry?
CVE-2021-20206: no packages for Image SLES15-SP3-SAP-BYOS-GCE, but entry?
CVE-2021-20206: no packages for Image SLES15-SP3-SAPCAL-Azure, but entry?
CVE-2021-20206: no packages for Image SLES15-SP3-SAPCAL-EC2-HVM, but entry?
CVE-2021-20206: no packages for Image SLES15-SP3-SAPCAL-GCE, but entry?
CVE-2021-20206: no packages for SUSE Enterprise Storage 7.1, but entry?
CVE-2021-20206: no packages for SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS, but entry?
CVE-2021-20206: no packages for SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS, but entry?
CVE-2021-20206: no packages for SUSE Linux Enterprise Micro 5.1, but entry?
CVE-2021-20206: no packages for SUSE Linux Enterprise Micro 5.2, but entry?
CVE-2021-20206: no packages for SUSE Linux Enterprise Micro 5.3, but entry?
CVE-2021-20206: no packages for SUSE Linux Enterprise Module for Basesystem 15 SP3, but entry?
CVE-2021-20206: no packages for SUSE Linux Enterprise Module for Public Cloud 15, but entry?
CVE-2021-20206: no packages for SUSE Linux Enterprise Module for Public Cloud 15 SP1, but entry?
CVE-2021-20206: no packages for SUSE Linux Enterprise Module for Public Cloud 15 SP2, but entry?
CVE-2021-20206: no packages for SUSE Linux Enterprise Server 15 SP3-LTSS, but entry?
CVE-2021-20206: no packages for SUSE Linux Enterprise Server for SAP Applications 15 SP3, but entry?
CVE-2021-20206: no packages for openSUSE Leap Micro 5.2, but entry?
CVE-2021-20206: no packages for openSUSE Leap Micro 5.3, but entry?
CVE-2021-20206: no packages for Container bci/bci-init:15.3.21.22, but entry?
CVE-2021-20206: no packages for Container bci/bci-minimal:15.3.32.15, but entry?
CVE-2021-20206: no packages for Container bci/nodejs:12-17.28, but entry?
CVE-2021-20206: no packages for Container bci/python:3.9-20.4, but entry?
CVE-2021-20206: no packages for Container caasp/v4/cilium:1.6.6, but entry?
CVE-2021-20206: no packages for Container rancher/elemental-teal-iso/5.4:latest, but entry?
CVE-2021-20206: no packages for Container rancher/elemental-teal-rt/5.4:latest, but entry?
CVE-2021-20206: no packages for Container rancher/elemental-teal/5.4:latest, but entry?
CVE-2021-20206: no packages for Container ses/7.1/ceph/grafana:8.3.10.2.2.285, but entry?
CVE-2021-20206: no packages for Container ses/7.1/ceph/haproxy:2.0.14.3.5.330, but entry?
CVE-2021-20206: no packages for Container ses/7.1/ceph/keepalived:2.0.19.3.5.316, but entry?
CVE-2021-20206: no packages for Container ses/7.1/ceph/prometheus-alertmanager:0.23.0.3.2.368, but entry?
CVE-2021-20206: no packages for Container ses/7.1/ceph/prometheus-node-exporter:1.3.0.3.2.359, but entry?
CVE-2021-20206: no packages for Container ses/7.1/ceph/prometheus-server:2.32.1.3.2.352, but entry?
CVE-2021-20206: no packages for Container ses/7.1/ceph/prometheus-snmp_notifier:1.2.1.2.2.341, but entry?
CVE-2021-20206: no packages for Container ses/7.1/cephcsi/cephcsi:v3.7.0.0, but entry?
CVE-2021-20206: no packages for Container ses/7.1/cephcsi/csi-attacher:v4.1.0, but entry?
CVE-2021-20206: no packages for Container ses/7.1/cephcsi/csi-node-driver-registrar:v2.7.0, but entry?
CVE-2021-20206: no packages for Container ses/7.1/cephcsi/csi-provisioner:v3.4.0, but entry?
CVE-2021-20206: no packages for Container ses/7.1/cephcsi/csi-resizer:v1.7.0, but entry?
CVE-2021-20206: no packages for Container ses/7.1/cephcsi/csi-snapshotter:v6.2.1, but entry?
CVE-2021-20206: no packages for Container ses/7.1/rook/ceph:1.10.1.16.4.5.328, but entry?
CVE-2021-20206: no packages for Container suse/ltss/sle15.3/bci-base:latest, but entry?
CVE-2021-20206: no packages for Container suse/sle-micro-rancher/5.2:latest, but entry?
CVE-2021-20206: no packages for Container suse/sle-micro/5.1/toolbox:12.1-2.2.377, but entry?
CVE-2021-20206: no packages for Container suse/sle-micro/5.2/toolbox:12.1-6.2.199, but entry?
CVE-2021-20206: no packages for Container suse/sle15:15.3.17.20.57, but entry?
CVE-2021-20206: no packages for Container trento/trento-db:14.5-rev1.0.0-build2.2.178, but entry?
CVE-2021-20206: no packages for Container trento/trento-runner:1.1.0-build4.19.12, but entry?
CVE-2021-20206: no packages for Container trento/trento-wanda:1.0.0-build1.5.2, but entry?
CVE-2021-20206: no packages for Container trento/trento-web:1.2.0-build4.18.11, but entry?
CVE-2021-20206: no packages for Image SLES15-SP3-BYOS-Azure, but entry?
CVE-2021-20206: no packages for Image SLES15-SP3-BYOS-EC2-HVM, but entry?
CVE-2021-20206: no packages for Image SLES15-SP3-BYOS-GCE, but entry?
CVE-2021-20206: no packages for Image SLES15-SP3-CHOST-BYOS-Aliyun, but entry?
CVE-2021-20206: no packages for Image SLES15-SP3-CHOST-BYOS-Azure, but entry?
CVE-2021-20206: no packages for Image SLES15-SP3-CHOST-BYOS-EC2, but entry?
CVE-2021-20206: no packages for Image SLES15-SP3-CHOST-BYOS-GCE, but entry?
CVE-2021-20206: no packages for Image SLES15-SP3-CHOST-BYOS-SAP-CCloud, but entry?
CVE-2021-20206: no packages for Image SLES15-SP3-HPC-BYOS-Azure, but entry?
CVE-2021-20206: no packages for Image SLES15-SP3-HPC-BYOS-EC2-HVM, but entry?
CVE-2021-20206: no packages for Image SLES15-SP3-HPC-BYOS-GCE, but entry?
CVE-2021-20206: no packages for Image SLES15-SP3-Manager-4-2-Proxy-BYOS-Azure, but entry?
CVE-2021-20206: no packages for Image SLES15-SP3-Manager-4-2-Proxy-BYOS-EC2-HVM, but entry?
CVE-2021-20206: no packages for Image SLES15-SP3-Manager-4-2-Proxy-BYOS-GCE, but entry?
CVE-2021-20206: no packages for Image SLES15-SP3-Manager-4-2-Server-BYOS-Azure, but entry?
CVE-2021-20206: no packages for Image SLES15-SP3-Manager-4-2-Server-BYOS-EC2-HVM, but entry?
CVE-2021-20206: no packages for Image SLES15-SP3-Manager-4-2-Server-BYOS-GCE, but entry?
CVE-2021-20206: no packages for Image SLES15-SP3-Micro-5-1-BYOS-Azure, but entry?
CVE-2021-20206: no packages for Image SLES15-SP3-Micro-5-1-BYOS-EC2-HVM, but entry?
CVE-2021-20206: no packages for Image SLES15-SP3-Micro-5-1-BYOS-GCE, but entry?
CVE-2021-20206: no packages for Image SLES15-SP3-Micro-5-2-BYOS-Azure, but entry?
CVE-2021-20206: no packages for Image SLES15-SP3-Micro-5-2-BYOS-EC2-HVM, but entry?
CVE-2021-20206: no packages for Image SLES15-SP3-Micro-5-2-BYOS-GCE, but entry?
CVE-2021-20206: no packages for Image SLES15-SP3-SAP-Azure-LI-BYOS-Production, but entry?
CVE-2021-20206: no packages for Image SLES15-SP3-SAP-Azure-VLI-BYOS-Production, but entry?
CVE-2021-20206: no packages for Image SLES15-SP3-SAP-BYOS-Azure, but entry?
CVE-2021-20206: no packages for Image SLES15-SP3-SAP-BYOS-EC2-HVM, but entry?
CVE-2021-20206: no packages for Image SLES15-SP3-SAP-BYOS-GCE, but entry?
CVE-2021-20206: no packages for Image SLES15-SP3-SAPCAL-Azure, but entry?
CVE-2021-20206: no packages for Image SLES15-SP3-SAPCAL-EC2-HVM, but entry?
CVE-2021-20206: no packages for Image SLES15-SP3-SAPCAL-GCE, but entry?
CVE-2021-20206: no packages for SUSE Enterprise Storage 7.1, but entry?
CVE-2021-20206: no packages for SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS, but entry?
CVE-2021-20206: no packages for SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS, but entry?
CVE-2021-20206: no packages for SUSE Linux Enterprise Micro 5.1, but entry?
CVE-2021-20206: no packages for SUSE Linux Enterprise Micro 5.2, but entry?
CVE-2021-20206: no packages for SUSE Linux Enterprise Micro 5.3, but entry?
CVE-2021-20206: no packages for SUSE Linux Enterprise Module for Basesystem 15 SP3, but entry?
CVE-2021-20206: no packages for SUSE Linux Enterprise Module for Public Cloud 15, but entry?
CVE-2021-20206: no packages for SUSE Linux Enterprise Module for Public Cloud 15 SP1, but entry?
CVE-2021-20206: no packages for SUSE Linux Enterprise Module for Public Cloud 15 SP2, but entry?
CVE-2021-20206: no packages for SUSE Linux Enterprise Server 15 SP3-LTSS, but entry?
CVE-2021-20206: no packages for SUSE Linux Enterprise Server for SAP Applications 15 SP3, but entry?
CVE-2021-20206: no packages for openSUSE Leap Micro 5.2, but entry?
CVE-2021-20206: no packages for openSUSE Leap Micro 5.3, but entry?
skipping CVE-2021-20205 as CVE page is older than CVRF-CVE file.
skipping CVE-2021-20203 as CVE page is older than CVRF-CVE file.
skipping CVE-2021-20201 as CVE page is older than CVRF-CVE file.
no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2021-20199
skipping CVE-2021-20197 as CVE page is older than CVRF-CVE file.
skipping CVE-2021-20196 as CVE page is older than CVRF-CVE file.
skipping CVE-2021-20194 as CVE page is older than CVRF-CVE file.
no cpe found for SUSE Manager Tools Beta for SLE Micro 5 in CVE-2021-20191
no cpe found for SUSE Package Hub 15 SP3 in CVE-2021-20191
no cpe found for SUSE Manager Tools Beta for SLE Micro 5 in CVE-2021-20180
no cpe found for SUSE Package Hub 15 SP3 in CVE-2021-20180
skipping CVE-2021-20181 as CVE page is older than CVRF-CVE file.
CVE-2021-20178: no packages for Image SLES15-SP4-Manager-Server-4-3-EC2-llc, but entry?
CVE-2021-20178: no packages for Container suse/manager/5.0/x86_64/server:5.0.0-beta1.2.122, but entry?
CVE-2021-20178: no packages for Container suse/manager/5.0/x86_64/proxy-httpd:5.0.0-beta1.2.94, but entry?
CVE-2021-20178: no packages for Image SLES15-SP4-Manager-Server-4-3-EC2-ltd, but entry?
CVE-2021-20178: no packages for SUSE Manager Tools Beta for SLE Micro 5, but entry?
CVE-2021-20178: no packages for Image SLES15-SP3-Manager-4-2-Proxy-BYOS-Azure, but entry?
CVE-2021-20178: no packages for SUSE Linux Enterprise High Performance Computing 15-LTSS, but entry?
CVE-2021-20178: no packages for SUSE Manager Server Module 4.2, but entry?
CVE-2021-20178: no packages for Image SLES15-SP4-Manager-Server-4-3-BYOS-Azure, but entry?
CVE-2021-20178: no packages for Container suse/manager/4.3/proxy-httpd:4.3.1.9.7.1, but entry?
CVE-2021-20178: no packages for Image SLES15-SP4-Manager-Proxy-4-3-BYOS, but entry?
CVE-2021-20178: no packages for Image SLES15-SP3-Manager-4-2-Proxy-BYOS-GCE, but entry?
CVE-2021-20178: no packages for Image SLES15-SP4-Manager-Proxy-4-3-BYOS-GCE, but entry?
CVE-2021-20178: no packages for SUSE Manager Server Module 4.3, but entry?
CVE-2021-20178: no packages for Image SLES15-SP4-Manager-Proxy-4-3-BYOS-Azure, but entry?
CVE-2021-20178: no packages for Image SLES15-SP4-Manager-Proxy-4-3-BYOS-EC2, but entry?
CVE-2021-20178: no packages for SUSE Manager Proxy Module 4.1, but entry?
CVE-2021-20178: no packages for Image SLES15-SP4-Manager-Server-4-3, but entry?
CVE-2021-20178: no packages for Image SLES15-SP4-Manager-Server-4-3-BYOS, but entry?
CVE-2021-20178: no packages for Image SLES15-SP4-Manager-Server-4-3-Azure-llc, but entry?
CVE-2021-20178: no packages for Image SLES15-SP3-Manager-4-2-Server-BYOS-GCE, but entry?
CVE-2021-20178: no packages for Image SLES15-SP4-Manager-Server-4-3-Azure-ltd, but entry?
CVE-2021-20178: no packages for Image SLES15-SP3-Manager-4-2-Proxy-BYOS-EC2-HVM, but entry?
CVE-2021-20178: no packages for SUSE Manager Server Module 4.1, but entry?
CVE-2021-20178: no packages for Image SLES15-SP4-Manager-Server-4-3-BYOS-EC2, but entry?
CVE-2021-20178: no packages for Image SLES15-SP3-Manager-4-2-Server-BYOS-EC2-HVM, but entry?
CVE-2021-20178: no packages for Image SLES15-SP4-Manager-Server-4-3-BYOS-GCE, but entry?
CVE-2021-20178: no packages for SUSE Linux Enterprise High Performance Computing 15-ESPOS, but entry?
CVE-2021-20178: no packages for SUSE Linux Enterprise Server 15-LTSS, but entry?
CVE-2021-20178: no packages for Image SLES15-SP3-Manager-4-2-Server-BYOS-Azure, but entry?
CVE-2021-20178: no packages for SUSE Linux Enterprise Server for SAP Applications 15, but entry?
no cpe found for SUSE Package Hub 15 SP3 in CVE-2021-20178
CVE-2021-20178: no packages for Container suse/manager/4.3/proxy-httpd:4.3.1.9.7.1, but entry?
CVE-2021-20178: no packages for Container suse/manager/5.0/x86_64/proxy-httpd:5.0.0-beta1.2.94, but entry?
CVE-2021-20178: no packages for Container suse/manager/5.0/x86_64/server:5.0.0-beta1.2.122, but entry?
CVE-2021-20178: no packages for Image SLES15-SP3-Manager-4-2-Proxy-BYOS-Azure, but entry?
CVE-2021-20178: no packages for Image SLES15-SP3-Manager-4-2-Proxy-BYOS-EC2-HVM, but entry?
CVE-2021-20178: no packages for Image SLES15-SP3-Manager-4-2-Proxy-BYOS-GCE, but entry?
CVE-2021-20178: no packages for Image SLES15-SP3-Manager-4-2-Server-BYOS-Azure, but entry?
CVE-2021-20178: no packages for Image SLES15-SP3-Manager-4-2-Server-BYOS-EC2-HVM, but entry?
CVE-2021-20178: no packages for Image SLES15-SP3-Manager-4-2-Server-BYOS-GCE, but entry?
CVE-2021-20178: no packages for Image SLES15-SP4-Manager-Proxy-4-3-BYOS, but entry?
CVE-2021-20178: no packages for Image SLES15-SP4-Manager-Proxy-4-3-BYOS-Azure, but entry?
CVE-2021-20178: no packages for Image SLES15-SP4-Manager-Proxy-4-3-BYOS-EC2, but entry?
CVE-2021-20178: no packages for Image SLES15-SP4-Manager-Proxy-4-3-BYOS-GCE, but entry?
CVE-2021-20178: no packages for Image SLES15-SP4-Manager-Server-4-3, but entry?
CVE-2021-20178: no packages for Image SLES15-SP4-Manager-Server-4-3-Azure-llc, but entry?
CVE-2021-20178: no packages for Image SLES15-SP4-Manager-Server-4-3-Azure-ltd, but entry?
CVE-2021-20178: no packages for Image SLES15-SP4-Manager-Server-4-3-BYOS, but entry?
CVE-2021-20178: no packages for Image SLES15-SP4-Manager-Server-4-3-BYOS-Azure, but entry?
CVE-2021-20178: no packages for Image SLES15-SP4-Manager-Server-4-3-BYOS-EC2, but entry?
CVE-2021-20178: no packages for Image SLES15-SP4-Manager-Server-4-3-BYOS-GCE, but entry?
CVE-2021-20178: no packages for Image SLES15-SP4-Manager-Server-4-3-EC2-llc, but entry?
CVE-2021-20178: no packages for Image SLES15-SP4-Manager-Server-4-3-EC2-ltd, but entry?
CVE-2021-20178: no packages for SUSE Linux Enterprise High Performance Computing 15-ESPOS, but entry?
CVE-2021-20178: no packages for SUSE Linux Enterprise High Performance Computing 15-LTSS, but entry?
CVE-2021-20178: no packages for SUSE Linux Enterprise Server 15-LTSS, but entry?
CVE-2021-20178: no packages for SUSE Linux Enterprise Server for SAP Applications 15, but entry?
CVE-2021-20178: no packages for SUSE Manager Proxy Module 4.1, but entry?
CVE-2021-20178: no packages for SUSE Manager Server Module 4.1, but entry?
CVE-2021-20178: no packages for SUSE Manager Server Module 4.2, but entry?
CVE-2021-20178: no packages for SUSE Manager Server Module 4.3, but entry?
CVE-2021-20178: no packages for SUSE Manager Tools Beta for SLE Micro 5, but entry?
CVE-2021-20178: no packages for Container suse/manager/4.3/proxy-httpd:4.3.1.9.7.1, but entry?
CVE-2021-20178: no packages for Container suse/manager/5.0/x86_64/proxy-httpd:5.0.0-beta1.2.94, but entry?
CVE-2021-20178: no packages for Container suse/manager/5.0/x86_64/server:5.0.0-beta1.2.122, but entry?
CVE-2021-20178: no packages for Image SLES15-SP3-Manager-4-2-Proxy-BYOS-Azure, but entry?
CVE-2021-20178: no packages for Image SLES15-SP3-Manager-4-2-Proxy-BYOS-EC2-HVM, but entry?
CVE-2021-20178: no packages for Image SLES15-SP3-Manager-4-2-Proxy-BYOS-GCE, but entry?
CVE-2021-20178: no packages for Image SLES15-SP3-Manager-4-2-Server-BYOS-Azure, but entry?
CVE-2021-20178: no packages for Image SLES15-SP3-Manager-4-2-Server-BYOS-EC2-HVM, but entry?
CVE-2021-20178: no packages for Image SLES15-SP3-Manager-4-2-Server-BYOS-GCE, but entry?
CVE-2021-20178: no packages for Image SLES15-SP4-Manager-Proxy-4-3-BYOS, but entry?
CVE-2021-20178: no packages for Image SLES15-SP4-Manager-Proxy-4-3-BYOS-Azure, but entry?
CVE-2021-20178: no packages for Image SLES15-SP4-Manager-Proxy-4-3-BYOS-EC2, but entry?
CVE-2021-20178: no packages for Image SLES15-SP4-Manager-Proxy-4-3-BYOS-GCE, but entry?
CVE-2021-20178: no packages for Image SLES15-SP4-Manager-Server-4-3, but entry?
CVE-2021-20178: no packages for Image SLES15-SP4-Manager-Server-4-3-Azure-llc, but entry?
CVE-2021-20178: no packages for Image SLES15-SP4-Manager-Server-4-3-Azure-ltd, but entry?
CVE-2021-20178: no packages for Image SLES15-SP4-Manager-Server-4-3-BYOS, but entry?
CVE-2021-20178: no packages for Image SLES15-SP4-Manager-Server-4-3-BYOS-Azure, but entry?
CVE-2021-20178: no packages for Image SLES15-SP4-Manager-Server-4-3-BYOS-EC2, but entry?
CVE-2021-20178: no packages for Image SLES15-SP4-Manager-Server-4-3-BYOS-GCE, but entry?
CVE-2021-20178: no packages for Image SLES15-SP4-Manager-Server-4-3-EC2-llc, but entry?
CVE-2021-20178: no packages for Image SLES15-SP4-Manager-Server-4-3-EC2-ltd, but entry?
CVE-2021-20178: no packages for SUSE Linux Enterprise High Performance Computing 15-ESPOS, but entry?
CVE-2021-20178: no packages for SUSE Linux Enterprise High Performance Computing 15-LTSS, but entry?
CVE-2021-20178: no packages for SUSE Linux Enterprise Server 15-LTSS, but entry?
CVE-2021-20178: no packages for SUSE Linux Enterprise Server for SAP Applications 15, but entry?
CVE-2021-20178: no packages for SUSE Manager Proxy Module 4.1, but entry?
CVE-2021-20178: no packages for SUSE Manager Server Module 4.1, but entry?
CVE-2021-20178: no packages for SUSE Manager Server Module 4.2, but entry?
CVE-2021-20178: no packages for SUSE Manager Server Module 4.3, but entry?
CVE-2021-20178: no packages for SUSE Manager Tools Beta for SLE Micro 5, but entry?
--- /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2021-4442.xml 2024-10-22 03:48:40.440143000 +0200
+++ /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2021-4442.xml.new 2024-10-29 02:02:37.776636000 +0100
@@ -14,13 +14,13 @@
1
- 7
- 2024-10-22T01:48:40Z
+ 8
+ 2024-10-29T01:02:37Z
current
2024-08-30T07:55:10Z
- 2024-10-22T01:48:40Z
+ 2024-10-29T01:02:37Z
cve-database/bin/generate-cvrf-cve.pl
2020-12-27T01:00:00Z
@@ -378,6 +378,253 @@
openSUSE Leap 15.6
+
+
+ SLES 15 SP1 CHOST Images for Amazon EC2 suse-sles-15-sp1-chost-byos-v20210304-hvm-ssd-x86_64
+ SLES 15 SP1 CHOST Images for Amazon EC2 suse-sles-15-sp1-chost-byos-v20220127-hvm-ssd-x86_64
+ SLES 15 SP1 CHOST Images for Amazon EC2 suse-sles-15-sp1-chost-byos-v20220715-hvm-ssd-x86_64
+
+
+ SLES 15 SP2 CHOST Images for Amazon EC2 suse-sles-15-sp2-chost-byos-v20210610-hvm-ssd-x86_64
+ SLES 15 SP2 CHOST Images for Amazon EC2 suse-sles-15-sp2-chost-byos-v20210722-hvm-ssd-x86_64
+ SLES 15 SP2 CHOST Images for Amazon EC2 suse-sles-15-sp2-chost-byos-v20210913-hvm-ssd-x86_64
+ SLES 15 SP2 CHOST Images for Amazon EC2 suse-sles-15-sp2-chost-byos-v20211025-hvm-ssd-x86_64
+ SLES 15 SP2 CHOST Images for Amazon EC2 suse-sles-15-sp2-chost-byos-v20220126-hvm-ssd-x86_64
+ SLES 15 SP2 CHOST Images for Amazon EC2 suse-sles-15-sp2-chost-byos-v20220718-hvm-ssd-x86_64
+
+
+ SLES 15 SP3 CHOST Images for Amazon EC2 suse-sles-15-sp3-chost-byos-v20210729-hvm-ssd-x86_64
+ SLES 15 SP3 CHOST Images for Amazon EC2 suse-sles-15-sp3-chost-byos-v20210827-hvm-ssd-x86_64
+ SLES 15 SP3 CHOST Images for Amazon EC2 suse-sles-15-sp3-chost-byos-v20210927-hvm-ssd-x86_64
+ SLES 15 SP3 CHOST Images for Amazon EC2 suse-sles-15-sp3-chost-byos-v20211004-hvm-ssd-x86_64
+ SLES 15 SP3 CHOST Images for Amazon EC2 suse-sles-15-sp3-chost-byos-v20211101-hvm-ssd-x86_64
+ SLES 15 SP3 CHOST Images for Amazon EC2 suse-sles-15-sp3-chost-byos-v20211202-hvm-ssd-x86_64
+ SLES 15 SP3 CHOST Images for Amazon EC2 suse-sles-15-sp3-chost-byos-v20220103-hvm-ssd-x86_64
+ SLES 15 SP3 CHOST Images for Amazon EC2 suse-sles-15-sp3-chost-byos-v20220126-hvm-ssd-x86_64
+ SLES 15 SP3 CHOST Images for Amazon EC2 suse-sles-15-sp3-chost-byos-v20220222-hvm-ssd-x86_64
+ SLES 15 SP3 CHOST Images for Amazon EC2 suse-sles-15-sp3-chost-byos-v20220310-hvm-ssd-x86_64
+ SLES 15 SP3 CHOST Images for Amazon EC2 suse-sles-15-sp3-chost-byos-v20220411-hvm-ssd-x86_64
+ SLES 15 SP3 CHOST Images for Amazon EC2 suse-sles-15-sp3-chost-byos-v20220510-hvm-ssd-x86_64
+ SLES 15 SP3 CHOST Images for Amazon EC2 suse-sles-15-sp3-chost-byos-v20220608-hvm-ssd-x86_64
+ SLES 15 SP3 CHOST Images for Amazon EC2 suse-sles-15-sp3-chost-byos-v20220708-hvm-ssd-x86_64
+ SLES 15 SP3 CHOST Images for Amazon EC2 suse-sles-15-sp3-chost-byos-v20220718-hvm-ssd-x86_64
+ SLES 15 SP3 CHOST Images for Amazon EC2 suse-sles-15-sp3-chost-byos-v20220818-hvm-ssd-x86_64
+ SLES 15 SP3 CHOST Images for Amazon EC2 suse-sles-15-sp3-chost-byos-v20220916-hvm-ssd-x86_64
+ SLES 15 SP3 CHOST Images for Amazon EC2 suse-sles-15-sp3-chost-byos-v20220921-hvm-ssd-x86_64
+ SLES 15 SP3 CHOST Images for Amazon EC2 suse-sles-15-sp3-chost-byos-v20221019-hvm-ssd-x86_64
+ SLES 15 SP3 CHOST Images for Amazon EC2 suse-sles-15-sp3-chost-byos-v20221119-hvm-ssd-x86_64
+ SLES 15 SP3 CHOST Images for Amazon EC2 suse-sles-15-sp3-chost-byos-v20221215-hvm-ssd-x86_64
+ SLES 15 SP3 CHOST Images for Amazon EC2 suse-sles-15-sp3-chost-byos-v20230313-hvm-ssd-x86_64
+ SLES 15 SP3 CHOST Images for Amazon EC2 suse-sles-15-sp3-chost-byos-v20230613-hvm-ssd-x86_64
+ SLES 15 SP3 CHOST Images for Amazon EC2 suse-sles-15-sp3-chost-byos-v20240807-hvm-ssd-x86_64
+ SLES 15 SP3 CHOST Images for Amazon EC2 suse-sles-15-sp3-chost-byos-v20240912-hvm-ssd-x86_64
+
+
+ SLES 15 SP4 CHOST Images for Amazon EC2 suse-sles-15-sp4-chost-byos-v20220718-hvm-ssd-x86_64
+ SLES 15 SP4 CHOST Images for Amazon EC2 suse-sles-15-sp4-chost-byos-v20220721-hvm-ssd-x86_64
+ SLES 15 SP4 CHOST Images for Amazon EC2 suse-sles-15-sp4-chost-byos-v20220819-hvm-ssd-x86_64
+ SLES 15 SP4 CHOST Images for Amazon EC2 suse-sles-15-sp4-chost-byos-v20220916-hvm-ssd-x86_64
+ SLES 15 SP4 CHOST Images for Amazon EC2 suse-sles-15-sp4-chost-byos-v20220923-hvm-ssd-x86_64
+ SLES 15 SP4 CHOST Images for Amazon EC2 suse-sles-15-sp4-chost-byos-v20221018-hvm-ssd-x86_64
+ SLES 15 SP4 CHOST Images for Amazon EC2 suse-sles-15-sp4-chost-byos-v20221118-hvm-ssd-x86_64
+ SLES 15 SP4 CHOST Images for Amazon EC2 suse-sles-15-sp4-chost-byos-v20221215-hvm-ssd-x86_64
+ SLES 15 SP4 CHOST Images for Amazon EC2 suse-sles-15-sp4-chost-byos-v20230111-hvm-ssd-x86_64
+ SLES 15 SP4 CHOST Images for Amazon EC2 suse-sles-15-sp4-chost-byos-v20230210-hvm-ssd-x86_64
+ SLES 15 SP4 CHOST Images for Amazon EC2 suse-sles-15-sp4-chost-byos-v20230310-hvm-ssd-x86_64
+ SLES 15 SP4 CHOST Images for Amazon EC2 suse-sles-15-sp4-chost-byos-v20230410-hvm-ssd-x86_64
+ SLES 15 SP4 CHOST Images for Amazon EC2 suse-sles-15-sp4-chost-byos-v20230510-hvm-ssd-x86_64
+ SLES 15 SP4 CHOST Images for Amazon EC2 suse-sles-15-sp4-chost-byos-v20230606-hvm-ssd-x86_64
+ SLES 15 SP4 CHOST Images for Amazon EC2 suse-sles-15-sp4-chost-byos-v20230704-hvm-ssd-x86_64
+ SLES 15 SP4 CHOST Images for Amazon EC2 suse-sles-15-sp4-chost-byos-v20230803-hvm-ssd-x86_64
+ SLES 15 SP4 CHOST Images for Amazon EC2 suse-sles-15-sp4-chost-byos-v20230901-hvm-ssd-x86_64
+ SLES 15 SP4 CHOST Images for Amazon EC2 suse-sles-15-sp4-chost-byos-v20230928-hvm-ssd-x86_64
+ SLES 15 SP4 CHOST Images for Amazon EC2 suse-sles-15-sp4-chost-byos-v20231027-hvm-ssd-x86_64
+ SLES 15 SP4 CHOST Images for Amazon EC2 suse-sles-15-sp4-chost-byos-v20231127-hvm-ssd-x86_64
+ SLES 15 SP4 CHOST Images for Amazon EC2 suse-sles-15-sp4-chost-byos-v20231212-hvm-ssd-x86_64
+ SLES 15 SP4 CHOST Images for Amazon EC2 suse-sles-15-sp4-chost-byos-v20240312-hvm-ssd-x86_64
+ SLES 15 SP4 CHOST Images for Amazon EC2 suse-sles-15-sp4-chost-byos-v20240612-hvm-ssd-x86_64
+ SLES 15 SP4 CHOST Images for Amazon EC2 suse-sles-15-sp4-chost-byos-v20240809-hvm-ssd-x86_64
+ SLES 15 SP4 CHOST Images for Amazon EC2 suse-sles-15-sp4-chost-byos-v20240912-hvm-ssd-x86_64
+
+
+ SLES 15 SP1 CHOST Images for Google sles-15-sp1-chost-byos-v20210202
+ SLES 15 SP1 CHOST Images for Google sles-15-sp1-chost-byos-v20210304
+ SLES 15 SP1 CHOST Images for Google sles-15-sp1-chost-byos-v20220127
+ SLES 15 SP1 CHOST Images for Google sles-15-sp1-chost-byos-v20220715-x86-64
+
+
+ SLES 15 SP2 CHOST Images for Google sles-15-sp2-chost-byos-v20210202
+ SLES 15 SP2 CHOST Images for Google sles-15-sp2-chost-byos-v20210304
+ SLES 15 SP2 CHOST Images for Google sles-15-sp2-chost-byos-v20210405
+ SLES 15 SP2 CHOST Images for Google sles-15-sp2-chost-byos-v20210506
+ SLES 15 SP2 CHOST Images for Google sles-15-sp2-chost-byos-v20210610
+ SLES 15 SP2 CHOST Images for Google sles-15-sp2-chost-byos-v20210722
+ SLES 15 SP2 CHOST Images for Google sles-15-sp2-chost-byos-v20210913
+ SLES 15 SP2 CHOST Images for Google sles-15-sp2-chost-byos-v20211025
+ SLES 15 SP2 CHOST Images for Google sles-15-sp2-chost-byos-v20220126
+ SLES 15 SP2 CHOST Images for Google sles-15-sp2-chost-byos-v20220718-x86-64
+
+
+ SLES 15 SP3 CHOST Images for Google sles-15-sp3-chost-byos-v20210729
+ SLES 15 SP3 CHOST Images for Google sles-15-sp3-chost-byos-v20210827
+ SLES 15 SP3 CHOST Images for Google sles-15-sp3-chost-byos-v20210927
+ SLES 15 SP3 CHOST Images for Google sles-15-sp3-chost-byos-v20211004
+ SLES 15 SP3 CHOST Images for Google sles-15-sp3-chost-byos-v20211101
+ SLES 15 SP3 CHOST Images for Google sles-15-sp3-chost-byos-v20211202
+ SLES 15 SP3 CHOST Images for Google sles-15-sp3-chost-byos-v20220103
+ SLES 15 SP3 CHOST Images for Google sles-15-sp3-chost-byos-v20220126
+ SLES 15 SP3 CHOST Images for Google sles-15-sp3-chost-byos-v20220222
+ SLES 15 SP3 CHOST Images for Google sles-15-sp3-chost-byos-v20220310
+ SLES 15 SP3 CHOST Images for Google sles-15-sp3-chost-byos-v20220411-x86-64
+ SLES 15 SP3 CHOST Images for Google sles-15-sp3-chost-byos-v20220510-x86-64
+ SLES 15 SP3 CHOST Images for Google sles-15-sp3-chost-byos-v20220608-x86-64
+ SLES 15 SP3 CHOST Images for Google sles-15-sp3-chost-byos-v20220708-x86-64
+ SLES 15 SP3 CHOST Images for Google sles-15-sp3-chost-byos-v20220718-x86-64
+ SLES 15 SP3 CHOST Images for Google sles-15-sp3-chost-byos-v20220818-x86-64
+ SLES 15 SP3 CHOST Images for Google sles-15-sp3-chost-byos-v20220916-x86-64
+ SLES 15 SP3 CHOST Images for Google sles-15-sp3-chost-byos-v20221019-x86-64
+ SLES 15 SP3 CHOST Images for Google sles-15-sp3-chost-byos-v20221118-x86-64
+ SLES 15 SP3 CHOST Images for Google sles-15-sp3-chost-byos-v20221215-x86-64
+ SLES 15 SP3 CHOST Images for Google sles-15-sp3-chost-byos-v20230313-x86-64
+ SLES 15 SP3 CHOST Images for Google sles-15-sp3-chost-byos-v20230613-x86-64
+ SLES 15 SP3 CHOST Images for Google sles-15-sp3-chost-byos-v20240807-x86-64
+ SLES 15 SP3 CHOST Images for Google sles-15-sp3-chost-byos-v20240912-x86-64
+
+
+ SLES 15 SP4 CHOST Images for Google sles-15-sp4-chost-byos-v20220718-x86-64
+ SLES 15 SP4 CHOST Images for Google sles-15-sp4-chost-byos-v20220721-x86-64
+ SLES 15 SP4 CHOST Images for Google sles-15-sp4-chost-byos-v20220818-x86-64
+ SLES 15 SP4 CHOST Images for Google sles-15-sp4-chost-byos-v20220916-x86-64
+ SLES 15 SP4 CHOST Images for Google sles-15-sp4-chost-byos-v20221018-x86-64
+ SLES 15 SP4 CHOST Images for Google sles-15-sp4-chost-byos-v20221118-x86-64
+ SLES 15 SP4 CHOST Images for Google sles-15-sp4-chost-byos-v20221215-arm64
+ SLES 15 SP4 CHOST Images for Google sles-15-sp4-chost-byos-v20221215-x86-64
+ SLES 15 SP4 CHOST Images for Google sles-15-sp4-chost-byos-v20230111-arm64
+ SLES 15 SP4 CHOST Images for Google sles-15-sp4-chost-byos-v20230111-x86-64
+ SLES 15 SP4 CHOST Images for Google sles-15-sp4-chost-byos-v20230210-arm64
+ SLES 15 SP4 CHOST Images for Google sles-15-sp4-chost-byos-v20230210-x86-64
+ SLES 15 SP4 CHOST Images for Google sles-15-sp4-chost-byos-v20230310-arm64
+ SLES 15 SP4 CHOST Images for Google sles-15-sp4-chost-byos-v20230310-x86-64
+ SLES 15 SP4 CHOST Images for Google sles-15-sp4-chost-byos-v20230410-arm64
+ SLES 15 SP4 CHOST Images for Google sles-15-sp4-chost-byos-v20230410-x86-64
+ SLES 15 SP4 CHOST Images for Google sles-15-sp4-chost-byos-v20230510-arm64
+ SLES 15 SP4 CHOST Images for Google sles-15-sp4-chost-byos-v20230510-x86-64
+ SLES 15 SP4 CHOST Images for Google sles-15-sp4-chost-byos-v20230606-arm64
+ SLES 15 SP4 CHOST Images for Google sles-15-sp4-chost-byos-v20230606-x86-64
+ SLES 15 SP4 CHOST Images for Google sles-15-sp4-chost-byos-v20230704-arm64
+ SLES 15 SP4 CHOST Images for Google sles-15-sp4-chost-byos-v20230704-x86-64
+ SLES 15 SP4 CHOST Images for Google sles-15-sp4-chost-byos-v20230804-arm64
+ SLES 15 SP4 CHOST Images for Google sles-15-sp4-chost-byos-v20230804-x86-64
+ SLES 15 SP4 CHOST Images for Google sles-15-sp4-chost-byos-v20230901-arm64
+ SLES 15 SP4 CHOST Images for Google sles-15-sp4-chost-byos-v20230901-x86-64
+ SLES 15 SP4 CHOST Images for Google sles-15-sp4-chost-byos-v20230928-arm64
+ SLES 15 SP4 CHOST Images for Google sles-15-sp4-chost-byos-v20230928-x86-64
+ SLES 15 SP4 CHOST Images for Google sles-15-sp4-chost-byos-v20231027-arm64
+ SLES 15 SP4 CHOST Images for Google sles-15-sp4-chost-byos-v20231027-x86-64
+ SLES 15 SP4 CHOST Images for Google sles-15-sp4-chost-byos-v20231127-arm64
+ SLES 15 SP4 CHOST Images for Google sles-15-sp4-chost-byos-v20231127-x86-64
+ SLES 15 SP4 CHOST Images for Google sles-15-sp4-chost-byos-v20231212-arm64
+ SLES 15 SP4 CHOST Images for Google sles-15-sp4-chost-byos-v20231212-x86-64
+ SLES 15 SP4 CHOST Images for Google sles-15-sp4-chost-byos-v20240312-arm64
+ SLES 15 SP4 CHOST Images for Google sles-15-sp4-chost-byos-v20240312-x86-64
+ SLES 15 SP4 CHOST Images for Google sles-15-sp4-chost-byos-v20240612-arm64
+ SLES 15 SP4 CHOST Images for Google sles-15-sp4-chost-byos-v20240612-x86-64
+ SLES 15 SP4 CHOST Images for Google sles-15-sp4-chost-byos-v20240809-arm64
+ SLES 15 SP4 CHOST Images for Google sles-15-sp4-chost-byos-v20240809-x86-64
+ SLES 15 SP4 CHOST Images for Google sles-15-sp4-chost-byos-v20240912-arm64
+ SLES 15 SP4 CHOST Images for Google sles-15-sp4-chost-byos-v20240912-x86-64
+
+
+ SLES 15 SP1 CHOST Images for Microsoft Azure suse-sles-15-sp1-chost-byos-v20210202
+ SLES 15 SP1 CHOST Images for Microsoft Azure suse-sles-15-sp1-chost-byos-v20210304
+ SLES 15 SP1 CHOST Images for Microsoft Azure suse-sles-15-sp1-chost-byos-v20220127
+ SLES 15 SP1 CHOST Images for Microsoft Azure suse-sles-15-sp1-chost-byos-v20220715-x86_64
+
+
+ SLES 15 SP2 CHOST Images for Microsoft Azure suse-sles-15-sp2-chost-byos-v20210202
+ SLES 15 SP2 CHOST Images for Microsoft Azure suse-sles-15-sp2-chost-byos-v20210304
+ SLES 15 SP2 CHOST Images for Microsoft Azure suse-sles-15-sp2-chost-byos-v20210405
+ SLES 15 SP2 CHOST Images for Microsoft Azure suse-sles-15-sp2-chost-byos-v20210506
+ SLES 15 SP2 CHOST Images for Microsoft Azure suse-sles-15-sp2-chost-byos-v20210610
+ SLES 15 SP2 CHOST Images for Microsoft Azure suse-sles-15-sp2-chost-byos-v20210722
+ SLES 15 SP2 CHOST Images for Microsoft Azure suse-sles-15-sp2-chost-byos-v20210913
+ SLES 15 SP2 CHOST Images for Microsoft Azure suse-sles-15-sp2-chost-byos-v20211025
+ SLES 15 SP2 CHOST Images for Microsoft Azure suse-sles-15-sp2-chost-byos-v20220126
+ SLES 15 SP2 CHOST Images for Microsoft Azure suse-sles-15-sp2-chost-byos-v20220718-x86_64
+
+
+ SLES 15 SP3 CHOST Images for Microsoft Azure suse-sles-15-sp3-chost-byos-v20210729
+ SLES 15 SP3 CHOST Images for Microsoft Azure suse-sles-15-sp3-chost-byos-v20210827
+ SLES 15 SP3 CHOST Images for Microsoft Azure suse-sles-15-sp3-chost-byos-v20210927
+ SLES 15 SP3 CHOST Images for Microsoft Azure suse-sles-15-sp3-chost-byos-v20211004
+ SLES 15 SP3 CHOST Images for Microsoft Azure suse-sles-15-sp3-chost-byos-v20211101
+ SLES 15 SP3 CHOST Images for Microsoft Azure suse-sles-15-sp3-chost-byos-v20211202
+ SLES 15 SP3 CHOST Images for Microsoft Azure suse-sles-15-sp3-chost-byos-v20220103
+ SLES 15 SP3 CHOST Images for Microsoft Azure suse-sles-15-sp3-chost-byos-v20220126
+ SLES 15 SP3 CHOST Images for Microsoft Azure suse-sles-15-sp3-chost-byos-v20220222
+ SLES 15 SP3 CHOST Images for Microsoft Azure suse-sles-15-sp3-chost-byos-v20220310
+ SLES 15 SP3 CHOST Images for Microsoft Azure suse-sles-15-sp3-chost-byos-v20220411-x86_64
+ SLES 15 SP3 CHOST Images for Microsoft Azure suse-sles-15-sp3-chost-byos-v20220510-x86_64
+ SLES 15 SP3 CHOST Images for Microsoft Azure suse-sles-15-sp3-chost-byos-v20220609-x86_64
+ SLES 15 SP3 CHOST Images for Microsoft Azure suse-sles-15-sp3-chost-byos-v20220708-x86_64
+ SLES 15 SP3 CHOST Images for Microsoft Azure suse-sles-15-sp3-chost-byos-v20220718-x86_64
+ SLES 15 SP3 CHOST Images for Microsoft Azure suse-sles-15-sp3-chost-byos-v20220818-x86_64
+ SLES 15 SP3 CHOST Images for Microsoft Azure suse-sles-15-sp3-chost-byos-v20220916-x86_64
+ SLES 15 SP3 CHOST Images for Microsoft Azure suse-sles-15-sp3-chost-byos-v20220921-x86_64
+ SLES 15 SP3 CHOST Images for Microsoft Azure suse-sles-15-sp3-chost-byos-v20221019-x86_64
+ SLES 15 SP3 CHOST Images for Microsoft Azure suse-sles-15-sp3-chost-byos-v20221119-x86_64
+ SLES 15 SP3 CHOST Images for Microsoft Azure suse-sles-15-sp3-chost-byos-v20221215-x86_64
+ SLES 15 SP3 CHOST Images for Microsoft Azure suse-sles-15-sp3-chost-byos-v20230313-x86_64
+ SLES 15 SP3 CHOST Images for Microsoft Azure suse-sles-15-sp3-chost-byos-v20230613-x86_64
+ SLES 15 SP3 CHOST Images for Microsoft Azure suse-sles-15-sp3-chost-byos-v20240807-x86_64
+ SLES 15 SP3 CHOST Images for Microsoft Azure suse-sles-15-sp3-chost-byos-v20240912-x86_64
+
+
+ SLES 15 SP4 CHOST Images for Microsoft Azure suse-sles-15-sp4-chost-byos-v20220718-x86_64
+ SLES 15 SP4 CHOST Images for Microsoft Azure suse-sles-15-sp4-chost-byos-v20220721-x86_64
+ SLES 15 SP4 CHOST Images for Microsoft Azure suse-sles-15-sp4-chost-byos-v20220819-x86_64
+ SLES 15 SP4 CHOST Images for Microsoft Azure suse-sles-15-sp4-chost-byos-v20220916-x86_64
+ SLES 15 SP4 CHOST Images for Microsoft Azure suse-sles-15-sp4-chost-byos-v20220923-x86_64
+ SLES 15 SP4 CHOST Images for Microsoft Azure suse-sles-15-sp4-chost-byos-v20221018-x86_64
+ SLES 15 SP4 CHOST Images for Microsoft Azure suse-sles-15-sp4-chost-byos-v20221118-x86_64
+ SLES 15 SP4 CHOST Images for Microsoft Azure suse-sles-15-sp4-chost-byos-v20221215-arm64
+ SLES 15 SP4 CHOST Images for Microsoft Azure suse-sles-15-sp4-chost-byos-v20221215-x86_64
+ SLES 15 SP4 CHOST Images for Microsoft Azure suse-sles-15-sp4-chost-byos-v20230111-arm64
+ SLES 15 SP4 CHOST Images for Microsoft Azure suse-sles-15-sp4-chost-byos-v20230111-x86_64
+ SLES 15 SP4 CHOST Images for Microsoft Azure suse-sles-15-sp4-chost-byos-v20230210-arm64
+ SLES 15 SP4 CHOST Images for Microsoft Azure suse-sles-15-sp4-chost-byos-v20230210-x86_64
+ SLES 15 SP4 CHOST Images for Microsoft Azure suse-sles-15-sp4-chost-byos-v20230310-arm64
+ SLES 15 SP4 CHOST Images for Microsoft Azure suse-sles-15-sp4-chost-byos-v20230310-x86_64
+ SLES 15 SP4 CHOST Images for Microsoft Azure suse-sles-15-sp4-chost-byos-v20230410-arm64
+ SLES 15 SP4 CHOST Images for Microsoft Azure suse-sles-15-sp4-chost-byos-v20230410-x86_64
+ SLES 15 SP4 CHOST Images for Microsoft Azure suse-sles-15-sp4-chost-byos-v20230510-arm64
+ SLES 15 SP4 CHOST Images for Microsoft Azure suse-sles-15-sp4-chost-byos-v20230510-x86_64
+ SLES 15 SP4 CHOST Images for Microsoft Azure suse-sles-15-sp4-chost-byos-v20230606-arm64
+ SLES 15 SP4 CHOST Images for Microsoft Azure suse-sles-15-sp4-chost-byos-v20230606-x86_64
+ SLES 15 SP4 CHOST Images for Microsoft Azure suse-sles-15-sp4-chost-byos-v20230704-arm64
+ SLES 15 SP4 CHOST Images for Microsoft Azure suse-sles-15-sp4-chost-byos-v20230704-x86_64
+ SLES 15 SP4 CHOST Images for Microsoft Azure suse-sles-15-sp4-chost-byos-v20230803-arm64
+ SLES 15 SP4 CHOST Images for Microsoft Azure suse-sles-15-sp4-chost-byos-v20230803-x86_64
+ SLES 15 SP4 CHOST Images for Microsoft Azure suse-sles-15-sp4-chost-byos-v20230901-arm64
+ SLES 15 SP4 CHOST Images for Microsoft Azure suse-sles-15-sp4-chost-byos-v20230901-x86_64
+ SLES 15 SP4 CHOST Images for Microsoft Azure suse-sles-15-sp4-chost-byos-v20230928-arm64
+ SLES 15 SP4 CHOST Images for Microsoft Azure suse-sles-15-sp4-chost-byos-v20230928-x86_64
+ SLES 15 SP4 CHOST Images for Microsoft Azure suse-sles-15-sp4-chost-byos-v20231027-arm64
+ SLES 15 SP4 CHOST Images for Microsoft Azure suse-sles-15-sp4-chost-byos-v20231027-x86_64
+ SLES 15 SP4 CHOST Images for Microsoft Azure suse-sles-15-sp4-chost-byos-v20231127-arm64
+ SLES 15 SP4 CHOST Images for Microsoft Azure suse-sles-15-sp4-chost-byos-v20231127-x86_64
+ SLES 15 SP4 CHOST Images for Microsoft Azure suse-sles-15-sp4-chost-byos-v20231212-arm64
+ SLES 15 SP4 CHOST Images for Microsoft Azure suse-sles-15-sp4-chost-byos-v20231212-x86_64
+ SLES 15 SP4 CHOST Images for Microsoft Azure suse-sles-15-sp4-chost-byos-v20240312-arm64
+ SLES 15 SP4 CHOST Images for Microsoft Azure suse-sles-15-sp4-chost-byos-v20240312-x86_64
+ SLES 15 SP4 CHOST Images for Microsoft Azure suse-sles-15-sp4-chost-byos-v20240612-arm64
+ SLES 15 SP4 CHOST Images for Microsoft Azure suse-sles-15-sp4-chost-byos-v20240612-x86_64
+ SLES 15 SP4 CHOST Images for Microsoft Azure suse-sles-15-sp4-chost-byos-v20240809-arm64
+ SLES 15 SP4 CHOST Images for Microsoft Azure suse-sles-15-sp4-chost-byos-v20240809-x86_64
+ SLES 15 SP4 CHOST Images for Microsoft Azure suse-sles-15-sp4-chost-byos-v20240912-arm64
+ SLES 15 SP4 CHOST Images for Microsoft Azure suse-sles-15-sp4-chost-byos-v20240912-x86_64
+
+
cluster-md-kmp-default
@@ -1555,6 +1802,229 @@
openSUSE Leap 15.6:ocfs2-kmp-default
openSUSE Leap 15.6:reiserfs-kmp-default
+
+ chost:amazon/suse-sles-15-sp1-chost-byos-v20210304-hvm-ssd-x86_64
+ chost:amazon/suse-sles-15-sp1-chost-byos-v20220127-hvm-ssd-x86_64
+ chost:amazon/suse-sles-15-sp1-chost-byos-v20220715-hvm-ssd-x86_64
+ chost:amazon/suse-sles-15-sp2-chost-byos-v20210610-hvm-ssd-x86_64
+ chost:amazon/suse-sles-15-sp2-chost-byos-v20210722-hvm-ssd-x86_64
+ chost:amazon/suse-sles-15-sp2-chost-byos-v20210913-hvm-ssd-x86_64
+ chost:amazon/suse-sles-15-sp2-chost-byos-v20211025-hvm-ssd-x86_64
+ chost:amazon/suse-sles-15-sp2-chost-byos-v20220126-hvm-ssd-x86_64
+ chost:amazon/suse-sles-15-sp2-chost-byos-v20220718-hvm-ssd-x86_64
+ chost:amazon/suse-sles-15-sp3-chost-byos-v20210729-hvm-ssd-x86_64
+ chost:amazon/suse-sles-15-sp3-chost-byos-v20210827-hvm-ssd-x86_64
+ chost:amazon/suse-sles-15-sp3-chost-byos-v20210927-hvm-ssd-x86_64
+ chost:amazon/suse-sles-15-sp3-chost-byos-v20211004-hvm-ssd-x86_64
+ chost:amazon/suse-sles-15-sp3-chost-byos-v20211101-hvm-ssd-x86_64
+ chost:amazon/suse-sles-15-sp3-chost-byos-v20211202-hvm-ssd-x86_64
+ chost:amazon/suse-sles-15-sp3-chost-byos-v20220103-hvm-ssd-x86_64
+ chost:amazon/suse-sles-15-sp3-chost-byos-v20220126-hvm-ssd-x86_64
+ chost:amazon/suse-sles-15-sp3-chost-byos-v20220222-hvm-ssd-x86_64
+ chost:amazon/suse-sles-15-sp3-chost-byos-v20220310-hvm-ssd-x86_64
+ chost:amazon/suse-sles-15-sp3-chost-byos-v20220411-hvm-ssd-x86_64
+ chost:amazon/suse-sles-15-sp3-chost-byos-v20220510-hvm-ssd-x86_64
+ chost:amazon/suse-sles-15-sp3-chost-byos-v20220608-hvm-ssd-x86_64
+ chost:amazon/suse-sles-15-sp3-chost-byos-v20220708-hvm-ssd-x86_64
+ chost:amazon/suse-sles-15-sp3-chost-byos-v20220718-hvm-ssd-x86_64
+ chost:amazon/suse-sles-15-sp3-chost-byos-v20220818-hvm-ssd-x86_64
+ chost:amazon/suse-sles-15-sp3-chost-byos-v20220916-hvm-ssd-x86_64
+ chost:amazon/suse-sles-15-sp3-chost-byos-v20220921-hvm-ssd-x86_64
+ chost:amazon/suse-sles-15-sp3-chost-byos-v20221019-hvm-ssd-x86_64
+ chost:amazon/suse-sles-15-sp3-chost-byos-v20221119-hvm-ssd-x86_64
+ chost:amazon/suse-sles-15-sp3-chost-byos-v20221215-hvm-ssd-x86_64
+ chost:amazon/suse-sles-15-sp3-chost-byos-v20230313-hvm-ssd-x86_64
+ chost:amazon/suse-sles-15-sp3-chost-byos-v20230613-hvm-ssd-x86_64
+ chost:amazon/suse-sles-15-sp3-chost-byos-v20240807-hvm-ssd-x86_64
+ chost:amazon/suse-sles-15-sp3-chost-byos-v20240912-hvm-ssd-x86_64
+ chost:amazon/suse-sles-15-sp4-chost-byos-v20220718-hvm-ssd-x86_64
+ chost:amazon/suse-sles-15-sp4-chost-byos-v20220721-hvm-ssd-x86_64
+ chost:amazon/suse-sles-15-sp4-chost-byos-v20220819-hvm-ssd-x86_64
+ chost:amazon/suse-sles-15-sp4-chost-byos-v20220916-hvm-ssd-x86_64
+ chost:amazon/suse-sles-15-sp4-chost-byos-v20220923-hvm-ssd-x86_64
+ chost:amazon/suse-sles-15-sp4-chost-byos-v20221018-hvm-ssd-x86_64
+ chost:amazon/suse-sles-15-sp4-chost-byos-v20221118-hvm-ssd-x86_64
+ chost:amazon/suse-sles-15-sp4-chost-byos-v20221215-hvm-ssd-x86_64
+ chost:amazon/suse-sles-15-sp4-chost-byos-v20230111-hvm-ssd-x86_64
+ chost:amazon/suse-sles-15-sp4-chost-byos-v20230210-hvm-ssd-x86_64
+ chost:amazon/suse-sles-15-sp4-chost-byos-v20230310-hvm-ssd-x86_64
+ chost:amazon/suse-sles-15-sp4-chost-byos-v20230410-hvm-ssd-x86_64
+ chost:amazon/suse-sles-15-sp4-chost-byos-v20230510-hvm-ssd-x86_64
+ chost:amazon/suse-sles-15-sp4-chost-byos-v20230606-hvm-ssd-x86_64
+ chost:amazon/suse-sles-15-sp4-chost-byos-v20230704-hvm-ssd-x86_64
+ chost:amazon/suse-sles-15-sp4-chost-byos-v20230803-hvm-ssd-x86_64
+ chost:amazon/suse-sles-15-sp4-chost-byos-v20230901-hvm-ssd-x86_64
+ chost:amazon/suse-sles-15-sp4-chost-byos-v20230928-hvm-ssd-x86_64
+ chost:amazon/suse-sles-15-sp4-chost-byos-v20231027-hvm-ssd-x86_64
+ chost:amazon/suse-sles-15-sp4-chost-byos-v20231127-hvm-ssd-x86_64
+ chost:amazon/suse-sles-15-sp4-chost-byos-v20231212-hvm-ssd-x86_64
+ chost:amazon/suse-sles-15-sp4-chost-byos-v20240312-hvm-ssd-x86_64
+ chost:amazon/suse-sles-15-sp4-chost-byos-v20240612-hvm-ssd-x86_64
+ chost:amazon/suse-sles-15-sp4-chost-byos-v20240809-hvm-ssd-x86_64
+ chost:amazon/suse-sles-15-sp4-chost-byos-v20240912-hvm-ssd-x86_64
+ chost:google/sles-15-sp1-chost-byos-v20210202
+ chost:google/sles-15-sp1-chost-byos-v20210304
+ chost:google/sles-15-sp1-chost-byos-v20220127
+ chost:google/sles-15-sp1-chost-byos-v20220715-x86-64
+ chost:google/sles-15-sp2-chost-byos-v20210202
+ chost:google/sles-15-sp2-chost-byos-v20210304
+ chost:google/sles-15-sp2-chost-byos-v20210405
+ chost:google/sles-15-sp2-chost-byos-v20210506
+ chost:google/sles-15-sp2-chost-byos-v20210610
+ chost:google/sles-15-sp2-chost-byos-v20210722
+ chost:google/sles-15-sp2-chost-byos-v20210913
+ chost:google/sles-15-sp2-chost-byos-v20211025
+ chost:google/sles-15-sp2-chost-byos-v20220126
+ chost:google/sles-15-sp2-chost-byos-v20220718-x86-64
+ chost:google/sles-15-sp3-chost-byos-v20210729
+ chost:google/sles-15-sp3-chost-byos-v20210827
+ chost:google/sles-15-sp3-chost-byos-v20210927
+ chost:google/sles-15-sp3-chost-byos-v20211004
+ chost:google/sles-15-sp3-chost-byos-v20211101
+ chost:google/sles-15-sp3-chost-byos-v20211202
+ chost:google/sles-15-sp3-chost-byos-v20220103
+ chost:google/sles-15-sp3-chost-byos-v20220126
+ chost:google/sles-15-sp3-chost-byos-v20220222
+ chost:google/sles-15-sp3-chost-byos-v20220310
+ chost:google/sles-15-sp3-chost-byos-v20220411-x86-64
+ chost:google/sles-15-sp3-chost-byos-v20220510-x86-64
+ chost:google/sles-15-sp3-chost-byos-v20220608-x86-64
+ chost:google/sles-15-sp3-chost-byos-v20220708-x86-64
+ chost:google/sles-15-sp3-chost-byos-v20220718-x86-64
+ chost:google/sles-15-sp3-chost-byos-v20220818-x86-64
+ chost:google/sles-15-sp3-chost-byos-v20220916-x86-64
+ chost:google/sles-15-sp3-chost-byos-v20221019-x86-64
+ chost:google/sles-15-sp3-chost-byos-v20221118-x86-64
+ chost:google/sles-15-sp3-chost-byos-v20221215-x86-64
+ chost:google/sles-15-sp3-chost-byos-v20230313-x86-64
+ chost:google/sles-15-sp3-chost-byos-v20230613-x86-64
+ chost:google/sles-15-sp3-chost-byos-v20240807-x86-64
+ chost:google/sles-15-sp3-chost-byos-v20240912-x86-64
+ chost:google/sles-15-sp4-chost-byos-v20220718-x86-64
+ chost:google/sles-15-sp4-chost-byos-v20220721-x86-64
+ chost:google/sles-15-sp4-chost-byos-v20220818-x86-64
+ chost:google/sles-15-sp4-chost-byos-v20220916-x86-64
+ chost:google/sles-15-sp4-chost-byos-v20221018-x86-64
+ chost:google/sles-15-sp4-chost-byos-v20221118-x86-64
+ chost:google/sles-15-sp4-chost-byos-v20221215-arm64
+ chost:google/sles-15-sp4-chost-byos-v20221215-x86-64
+ chost:google/sles-15-sp4-chost-byos-v20230111-arm64
+ chost:google/sles-15-sp4-chost-byos-v20230111-x86-64
+ chost:google/sles-15-sp4-chost-byos-v20230210-arm64
+ chost:google/sles-15-sp4-chost-byos-v20230210-x86-64
+ chost:google/sles-15-sp4-chost-byos-v20230310-arm64
+ chost:google/sles-15-sp4-chost-byos-v20230310-x86-64
+ chost:google/sles-15-sp4-chost-byos-v20230410-arm64
+ chost:google/sles-15-sp4-chost-byos-v20230410-x86-64
+ chost:google/sles-15-sp4-chost-byos-v20230510-arm64
+ chost:google/sles-15-sp4-chost-byos-v20230510-x86-64
+ chost:google/sles-15-sp4-chost-byos-v20230606-arm64
+ chost:google/sles-15-sp4-chost-byos-v20230606-x86-64
+ chost:google/sles-15-sp4-chost-byos-v20230704-arm64
+ chost:google/sles-15-sp4-chost-byos-v20230704-x86-64
+ chost:google/sles-15-sp4-chost-byos-v20230804-arm64
+ chost:google/sles-15-sp4-chost-byos-v20230804-x86-64
+ chost:google/sles-15-sp4-chost-byos-v20230901-arm64
+ chost:google/sles-15-sp4-chost-byos-v20230901-x86-64
+ chost:google/sles-15-sp4-chost-byos-v20230928-arm64
+ chost:google/sles-15-sp4-chost-byos-v20230928-x86-64
+ chost:google/sles-15-sp4-chost-byos-v20231027-arm64
+ chost:google/sles-15-sp4-chost-byos-v20231027-x86-64
+ chost:google/sles-15-sp4-chost-byos-v20231127-arm64
+ chost:google/sles-15-sp4-chost-byos-v20231127-x86-64
+ chost:google/sles-15-sp4-chost-byos-v20231212-arm64
+ chost:google/sles-15-sp4-chost-byos-v20231212-x86-64
+ chost:google/sles-15-sp4-chost-byos-v20240312-arm64
+ chost:google/sles-15-sp4-chost-byos-v20240312-x86-64
+ chost:google/sles-15-sp4-chost-byos-v20240612-arm64
+ chost:google/sles-15-sp4-chost-byos-v20240612-x86-64
+ chost:google/sles-15-sp4-chost-byos-v20240809-arm64
+ chost:google/sles-15-sp4-chost-byos-v20240809-x86-64
+ chost:google/sles-15-sp4-chost-byos-v20240912-arm64
+ chost:google/sles-15-sp4-chost-byos-v20240912-x86-64
+ chost:microsoft/suse-sles-15-sp1-chost-byos-v20210202
+ chost:microsoft/suse-sles-15-sp1-chost-byos-v20210304
+ chost:microsoft/suse-sles-15-sp1-chost-byos-v20220127
+ chost:microsoft/suse-sles-15-sp1-chost-byos-v20220715-x86_64
+ chost:microsoft/suse-sles-15-sp2-chost-byos-v20210202
+ chost:microsoft/suse-sles-15-sp2-chost-byos-v20210304
+ chost:microsoft/suse-sles-15-sp2-chost-byos-v20210405
+ chost:microsoft/suse-sles-15-sp2-chost-byos-v20210506
+ chost:microsoft/suse-sles-15-sp2-chost-byos-v20210610
+ chost:microsoft/suse-sles-15-sp2-chost-byos-v20210722
+ chost:microsoft/suse-sles-15-sp2-chost-byos-v20210913
+ chost:microsoft/suse-sles-15-sp2-chost-byos-v20211025
+ chost:microsoft/suse-sles-15-sp2-chost-byos-v20220126
+ chost:microsoft/suse-sles-15-sp2-chost-byos-v20220718-x86_64
+ chost:microsoft/suse-sles-15-sp3-chost-byos-v20210729
+ chost:microsoft/suse-sles-15-sp3-chost-byos-v20210827
+ chost:microsoft/suse-sles-15-sp3-chost-byos-v20210927
+ chost:microsoft/suse-sles-15-sp3-chost-byos-v20211004
+ chost:microsoft/suse-sles-15-sp3-chost-byos-v20211101
+ chost:microsoft/suse-sles-15-sp3-chost-byos-v20211202
+ chost:microsoft/suse-sles-15-sp3-chost-byos-v20220103
+ chost:microsoft/suse-sles-15-sp3-chost-byos-v20220126
+ chost:microsoft/suse-sles-15-sp3-chost-byos-v20220222
+ chost:microsoft/suse-sles-15-sp3-chost-byos-v20220310
+ chost:microsoft/suse-sles-15-sp3-chost-byos-v20220411-x86_64
+ chost:microsoft/suse-sles-15-sp3-chost-byos-v20220510-x86_64
+ chost:microsoft/suse-sles-15-sp3-chost-byos-v20220609-x86_64
+ chost:microsoft/suse-sles-15-sp3-chost-byos-v20220708-x86_64
+ chost:microsoft/suse-sles-15-sp3-chost-byos-v20220718-x86_64
+ chost:microsoft/suse-sles-15-sp3-chost-byos-v20220818-x86_64
+ chost:microsoft/suse-sles-15-sp3-chost-byos-v20220916-x86_64
+ chost:microsoft/suse-sles-15-sp3-chost-byos-v20220921-x86_64
+ chost:microsoft/suse-sles-15-sp3-chost-byos-v20221019-x86_64
+ chost:microsoft/suse-sles-15-sp3-chost-byos-v20221119-x86_64
+ chost:microsoft/suse-sles-15-sp3-chost-byos-v20221215-x86_64
+ chost:microsoft/suse-sles-15-sp3-chost-byos-v20230313-x86_64
+ chost:microsoft/suse-sles-15-sp3-chost-byos-v20230613-x86_64
+ chost:microsoft/suse-sles-15-sp3-chost-byos-v20240807-x86_64
+ chost:microsoft/suse-sles-15-sp3-chost-byos-v20240912-x86_64
+ chost:microsoft/suse-sles-15-sp4-chost-byos-v20220718-x86_64
+ chost:microsoft/suse-sles-15-sp4-chost-byos-v20220721-x86_64
+ chost:microsoft/suse-sles-15-sp4-chost-byos-v20220819-x86_64
+ chost:microsoft/suse-sles-15-sp4-chost-byos-v20220916-x86_64
+ chost:microsoft/suse-sles-15-sp4-chost-byos-v20220923-x86_64
+ chost:microsoft/suse-sles-15-sp4-chost-byos-v20221018-x86_64
+ chost:microsoft/suse-sles-15-sp4-chost-byos-v20221118-x86_64
+ chost:microsoft/suse-sles-15-sp4-chost-byos-v20221215-arm64
+ chost:microsoft/suse-sles-15-sp4-chost-byos-v20221215-x86_64
+ chost:microsoft/suse-sles-15-sp4-chost-byos-v20230111-arm64
+ chost:microsoft/suse-sles-15-sp4-chost-byos-v20230111-x86_64
+ chost:microsoft/suse-sles-15-sp4-chost-byos-v20230210-arm64
+ chost:microsoft/suse-sles-15-sp4-chost-byos-v20230210-x86_64
+ chost:microsoft/suse-sles-15-sp4-chost-byos-v20230310-arm64
+ chost:microsoft/suse-sles-15-sp4-chost-byos-v20230310-x86_64
+ chost:microsoft/suse-sles-15-sp4-chost-byos-v20230410-arm64
+ chost:microsoft/suse-sles-15-sp4-chost-byos-v20230410-x86_64
+ chost:microsoft/suse-sles-15-sp4-chost-byos-v20230510-arm64
+ chost:microsoft/suse-sles-15-sp4-chost-byos-v20230510-x86_64
+ chost:microsoft/suse-sles-15-sp4-chost-byos-v20230606-arm64
+ chost:microsoft/suse-sles-15-sp4-chost-byos-v20230606-x86_64
+ chost:microsoft/suse-sles-15-sp4-chost-byos-v20230704-arm64
+ chost:microsoft/suse-sles-15-sp4-chost-byos-v20230704-x86_64
+ chost:microsoft/suse-sles-15-sp4-chost-byos-v20230803-arm64
+ chost:microsoft/suse-sles-15-sp4-chost-byos-v20230803-x86_64
+ chost:microsoft/suse-sles-15-sp4-chost-byos-v20230901-arm64
+ chost:microsoft/suse-sles-15-sp4-chost-byos-v20230901-x86_64
+ chost:microsoft/suse-sles-15-sp4-chost-byos-v20230928-arm64
+ chost:microsoft/suse-sles-15-sp4-chost-byos-v20230928-x86_64
+ chost:microsoft/suse-sles-15-sp4-chost-byos-v20231027-arm64
+ chost:microsoft/suse-sles-15-sp4-chost-byos-v20231027-x86_64
+ chost:microsoft/suse-sles-15-sp4-chost-byos-v20231127-arm64
+ chost:microsoft/suse-sles-15-sp4-chost-byos-v20231127-x86_64
+ chost:microsoft/suse-sles-15-sp4-chost-byos-v20231212-arm64
+ chost:microsoft/suse-sles-15-sp4-chost-byos-v20231212-x86_64
+ chost:microsoft/suse-sles-15-sp4-chost-byos-v20240312-arm64
+ chost:microsoft/suse-sles-15-sp4-chost-byos-v20240312-x86_64
+ chost:microsoft/suse-sles-15-sp4-chost-byos-v20240612-arm64
+ chost:microsoft/suse-sles-15-sp4-chost-byos-v20240612-x86_64
+ chost:microsoft/suse-sles-15-sp4-chost-byos-v20240809-arm64
+ chost:microsoft/suse-sles-15-sp4-chost-byos-v20240809-x86_64
+ chost:microsoft/suse-sles-15-sp4-chost-byos-v20240912-arm64
+ chost:microsoft/suse-sles-15-sp4-chost-byos-v20240912-x86_64
+
skipping CVE-2021-4441 as CVE page is older than CVRF-CVE file.
--- /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2021-4440.xml 2024-10-22 03:48:41.224092000 +0200
+++ /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2021-4440.xml.new 2024-10-29 02:02:38.648015000 +0100
@@ -14,13 +14,13 @@
1
- 8
- 2024-10-22T01:48:40Z
+ 9
+ 2024-10-29T01:02:38Z
current
2024-06-29T18:02:54Z
- 2024-10-22T01:48:40Z
+ 2024-10-29T01:02:38Z
cve-database/bin/generate-cvrf-cve.pl
2020-12-27T01:00:00Z
@@ -102,6 +102,21 @@
Image SLES12-SP5-Azure-SAP-BYOS
+
+
+ Image SLES12-SP5-GCE-BYOS
+
+
+
+
+ Image SLES12-SP5-GCE-SAP-BYOS
+
+
+
+
+ Image SLES12-SP5-GCE-SAP-On-Demand
+
+
SUSE Enterprise Storage 7.1
@@ -381,6 +396,253 @@
openSUSE Leap 15.6
+
+
+ SLES 15 SP1 CHOST Images for Amazon EC2 suse-sles-15-sp1-chost-byos-v20210304-hvm-ssd-x86_64
+ SLES 15 SP1 CHOST Images for Amazon EC2 suse-sles-15-sp1-chost-byos-v20220127-hvm-ssd-x86_64
+ SLES 15 SP1 CHOST Images for Amazon EC2 suse-sles-15-sp1-chost-byos-v20220715-hvm-ssd-x86_64
+
+
+ SLES 15 SP2 CHOST Images for Amazon EC2 suse-sles-15-sp2-chost-byos-v20210610-hvm-ssd-x86_64
+ SLES 15 SP2 CHOST Images for Amazon EC2 suse-sles-15-sp2-chost-byos-v20210722-hvm-ssd-x86_64
+ SLES 15 SP2 CHOST Images for Amazon EC2 suse-sles-15-sp2-chost-byos-v20210913-hvm-ssd-x86_64
+ SLES 15 SP2 CHOST Images for Amazon EC2 suse-sles-15-sp2-chost-byos-v20211025-hvm-ssd-x86_64
+ SLES 15 SP2 CHOST Images for Amazon EC2 suse-sles-15-sp2-chost-byos-v20220126-hvm-ssd-x86_64
+ SLES 15 SP2 CHOST Images for Amazon EC2 suse-sles-15-sp2-chost-byos-v20220718-hvm-ssd-x86_64
+
+
+ SLES 15 SP3 CHOST Images for Amazon EC2 suse-sles-15-sp3-chost-byos-v20210729-hvm-ssd-x86_64
+ SLES 15 SP3 CHOST Images for Amazon EC2 suse-sles-15-sp3-chost-byos-v20210827-hvm-ssd-x86_64
+ SLES 15 SP3 CHOST Images for Amazon EC2 suse-sles-15-sp3-chost-byos-v20210927-hvm-ssd-x86_64
+ SLES 15 SP3 CHOST Images for Amazon EC2 suse-sles-15-sp3-chost-byos-v20211004-hvm-ssd-x86_64
+ SLES 15 SP3 CHOST Images for Amazon EC2 suse-sles-15-sp3-chost-byos-v20211101-hvm-ssd-x86_64
+ SLES 15 SP3 CHOST Images for Amazon EC2 suse-sles-15-sp3-chost-byos-v20211202-hvm-ssd-x86_64
+ SLES 15 SP3 CHOST Images for Amazon EC2 suse-sles-15-sp3-chost-byos-v20220103-hvm-ssd-x86_64
+ SLES 15 SP3 CHOST Images for Amazon EC2 suse-sles-15-sp3-chost-byos-v20220126-hvm-ssd-x86_64
+ SLES 15 SP3 CHOST Images for Amazon EC2 suse-sles-15-sp3-chost-byos-v20220222-hvm-ssd-x86_64
+ SLES 15 SP3 CHOST Images for Amazon EC2 suse-sles-15-sp3-chost-byos-v20220310-hvm-ssd-x86_64
+ SLES 15 SP3 CHOST Images for Amazon EC2 suse-sles-15-sp3-chost-byos-v20220411-hvm-ssd-x86_64
+ SLES 15 SP3 CHOST Images for Amazon EC2 suse-sles-15-sp3-chost-byos-v20220510-hvm-ssd-x86_64
+ SLES 15 SP3 CHOST Images for Amazon EC2 suse-sles-15-sp3-chost-byos-v20220608-hvm-ssd-x86_64
+ SLES 15 SP3 CHOST Images for Amazon EC2 suse-sles-15-sp3-chost-byos-v20220708-hvm-ssd-x86_64
+ SLES 15 SP3 CHOST Images for Amazon EC2 suse-sles-15-sp3-chost-byos-v20220718-hvm-ssd-x86_64
+ SLES 15 SP3 CHOST Images for Amazon EC2 suse-sles-15-sp3-chost-byos-v20220818-hvm-ssd-x86_64
+ SLES 15 SP3 CHOST Images for Amazon EC2 suse-sles-15-sp3-chost-byos-v20220916-hvm-ssd-x86_64
+ SLES 15 SP3 CHOST Images for Amazon EC2 suse-sles-15-sp3-chost-byos-v20220921-hvm-ssd-x86_64
+ SLES 15 SP3 CHOST Images for Amazon EC2 suse-sles-15-sp3-chost-byos-v20221019-hvm-ssd-x86_64
+ SLES 15 SP3 CHOST Images for Amazon EC2 suse-sles-15-sp3-chost-byos-v20221119-hvm-ssd-x86_64
+ SLES 15 SP3 CHOST Images for Amazon EC2 suse-sles-15-sp3-chost-byos-v20221215-hvm-ssd-x86_64
+ SLES 15 SP3 CHOST Images for Amazon EC2 suse-sles-15-sp3-chost-byos-v20230313-hvm-ssd-x86_64
+ SLES 15 SP3 CHOST Images for Amazon EC2 suse-sles-15-sp3-chost-byos-v20230613-hvm-ssd-x86_64
+ SLES 15 SP3 CHOST Images for Amazon EC2 suse-sles-15-sp3-chost-byos-v20240807-hvm-ssd-x86_64
+ SLES 15 SP3 CHOST Images for Amazon EC2 suse-sles-15-sp3-chost-byos-v20240912-hvm-ssd-x86_64
+
+
+ SLES 15 SP4 CHOST Images for Amazon EC2 suse-sles-15-sp4-chost-byos-v20220718-hvm-ssd-x86_64
+ SLES 15 SP4 CHOST Images for Amazon EC2 suse-sles-15-sp4-chost-byos-v20220721-hvm-ssd-x86_64
+ SLES 15 SP4 CHOST Images for Amazon EC2 suse-sles-15-sp4-chost-byos-v20220819-hvm-ssd-x86_64
+ SLES 15 SP4 CHOST Images for Amazon EC2 suse-sles-15-sp4-chost-byos-v20220916-hvm-ssd-x86_64
+ SLES 15 SP4 CHOST Images for Amazon EC2 suse-sles-15-sp4-chost-byos-v20220923-hvm-ssd-x86_64
+ SLES 15 SP4 CHOST Images for Amazon EC2 suse-sles-15-sp4-chost-byos-v20221018-hvm-ssd-x86_64
+ SLES 15 SP4 CHOST Images for Amazon EC2 suse-sles-15-sp4-chost-byos-v20221118-hvm-ssd-x86_64
+ SLES 15 SP4 CHOST Images for Amazon EC2 suse-sles-15-sp4-chost-byos-v20221215-hvm-ssd-x86_64
+ SLES 15 SP4 CHOST Images for Amazon EC2 suse-sles-15-sp4-chost-byos-v20230111-hvm-ssd-x86_64
+ SLES 15 SP4 CHOST Images for Amazon EC2 suse-sles-15-sp4-chost-byos-v20230210-hvm-ssd-x86_64
+ SLES 15 SP4 CHOST Images for Amazon EC2 suse-sles-15-sp4-chost-byos-v20230310-hvm-ssd-x86_64
+ SLES 15 SP4 CHOST Images for Amazon EC2 suse-sles-15-sp4-chost-byos-v20230410-hvm-ssd-x86_64
+ SLES 15 SP4 CHOST Images for Amazon EC2 suse-sles-15-sp4-chost-byos-v20230510-hvm-ssd-x86_64
+ SLES 15 SP4 CHOST Images for Amazon EC2 suse-sles-15-sp4-chost-byos-v20230606-hvm-ssd-x86_64
+ SLES 15 SP4 CHOST Images for Amazon EC2 suse-sles-15-sp4-chost-byos-v20230704-hvm-ssd-x86_64
+ SLES 15 SP4 CHOST Images for Amazon EC2 suse-sles-15-sp4-chost-byos-v20230803-hvm-ssd-x86_64
+ SLES 15 SP4 CHOST Images for Amazon EC2 suse-sles-15-sp4-chost-byos-v20230901-hvm-ssd-x86_64
+ SLES 15 SP4 CHOST Images for Amazon EC2 suse-sles-15-sp4-chost-byos-v20230928-hvm-ssd-x86_64
+ SLES 15 SP4 CHOST Images for Amazon EC2 suse-sles-15-sp4-chost-byos-v20231027-hvm-ssd-x86_64
+ SLES 15 SP4 CHOST Images for Amazon EC2 suse-sles-15-sp4-chost-byos-v20231127-hvm-ssd-x86_64
+ SLES 15 SP4 CHOST Images for Amazon EC2 suse-sles-15-sp4-chost-byos-v20231212-hvm-ssd-x86_64
+ SLES 15 SP4 CHOST Images for Amazon EC2 suse-sles-15-sp4-chost-byos-v20240312-hvm-ssd-x86_64
+ SLES 15 SP4 CHOST Images for Amazon EC2 suse-sles-15-sp4-chost-byos-v20240612-hvm-ssd-x86_64
+ SLES 15 SP4 CHOST Images for Amazon EC2 suse-sles-15-sp4-chost-byos-v20240809-hvm-ssd-x86_64
+ SLES 15 SP4 CHOST Images for Amazon EC2 suse-sles-15-sp4-chost-byos-v20240912-hvm-ssd-x86_64
+
+
+ SLES 15 SP1 CHOST Images for Google sles-15-sp1-chost-byos-v20210202
+ SLES 15 SP1 CHOST Images for Google sles-15-sp1-chost-byos-v20210304
+ SLES 15 SP1 CHOST Images for Google sles-15-sp1-chost-byos-v20220127
+ SLES 15 SP1 CHOST Images for Google sles-15-sp1-chost-byos-v20220715-x86-64
+
+
+ SLES 15 SP2 CHOST Images for Google sles-15-sp2-chost-byos-v20210202
+ SLES 15 SP2 CHOST Images for Google sles-15-sp2-chost-byos-v20210304
+ SLES 15 SP2 CHOST Images for Google sles-15-sp2-chost-byos-v20210405
+ SLES 15 SP2 CHOST Images for Google sles-15-sp2-chost-byos-v20210506
+ SLES 15 SP2 CHOST Images for Google sles-15-sp2-chost-byos-v20210610
+ SLES 15 SP2 CHOST Images for Google sles-15-sp2-chost-byos-v20210722
+ SLES 15 SP2 CHOST Images for Google sles-15-sp2-chost-byos-v20210913
+ SLES 15 SP2 CHOST Images for Google sles-15-sp2-chost-byos-v20211025
+ SLES 15 SP2 CHOST Images for Google sles-15-sp2-chost-byos-v20220126
+ SLES 15 SP2 CHOST Images for Google sles-15-sp2-chost-byos-v20220718-x86-64
+
+
+ SLES 15 SP3 CHOST Images for Google sles-15-sp3-chost-byos-v20210729
+ SLES 15 SP3 CHOST Images for Google sles-15-sp3-chost-byos-v20210827
+ SLES 15 SP3 CHOST Images for Google sles-15-sp3-chost-byos-v20210927
+ SLES 15 SP3 CHOST Images for Google sles-15-sp3-chost-byos-v20211004
+ SLES 15 SP3 CHOST Images for Google sles-15-sp3-chost-byos-v20211101
+ SLES 15 SP3 CHOST Images for Google sles-15-sp3-chost-byos-v20211202
+ SLES 15 SP3 CHOST Images for Google sles-15-sp3-chost-byos-v20220103
+ SLES 15 SP3 CHOST Images for Google sles-15-sp3-chost-byos-v20220126
+ SLES 15 SP3 CHOST Images for Google sles-15-sp3-chost-byos-v20220222
+ SLES 15 SP3 CHOST Images for Google sles-15-sp3-chost-byos-v20220310
+ SLES 15 SP3 CHOST Images for Google sles-15-sp3-chost-byos-v20220411-x86-64
+ SLES 15 SP3 CHOST Images for Google sles-15-sp3-chost-byos-v20220510-x86-64
+ SLES 15 SP3 CHOST Images for Google sles-15-sp3-chost-byos-v20220608-x86-64
+ SLES 15 SP3 CHOST Images for Google sles-15-sp3-chost-byos-v20220708-x86-64
+ SLES 15 SP3 CHOST Images for Google sles-15-sp3-chost-byos-v20220718-x86-64
+ SLES 15 SP3 CHOST Images for Google sles-15-sp3-chost-byos-v20220818-x86-64
+ SLES 15 SP3 CHOST Images for Google sles-15-sp3-chost-byos-v20220916-x86-64
+ SLES 15 SP3 CHOST Images for Google sles-15-sp3-chost-byos-v20221019-x86-64
+ SLES 15 SP3 CHOST Images for Google sles-15-sp3-chost-byos-v20221118-x86-64
+ SLES 15 SP3 CHOST Images for Google sles-15-sp3-chost-byos-v20221215-x86-64
+ SLES 15 SP3 CHOST Images for Google sles-15-sp3-chost-byos-v20230313-x86-64
+ SLES 15 SP3 CHOST Images for Google sles-15-sp3-chost-byos-v20230613-x86-64
+ SLES 15 SP3 CHOST Images for Google sles-15-sp3-chost-byos-v20240807-x86-64
+ SLES 15 SP3 CHOST Images for Google sles-15-sp3-chost-byos-v20240912-x86-64
+
+
+ SLES 15 SP4 CHOST Images for Google sles-15-sp4-chost-byos-v20220718-x86-64
+ SLES 15 SP4 CHOST Images for Google sles-15-sp4-chost-byos-v20220721-x86-64
+ SLES 15 SP4 CHOST Images for Google sles-15-sp4-chost-byos-v20220818-x86-64
+ SLES 15 SP4 CHOST Images for Google sles-15-sp4-chost-byos-v20220916-x86-64
+ SLES 15 SP4 CHOST Images for Google sles-15-sp4-chost-byos-v20221018-x86-64
+ SLES 15 SP4 CHOST Images for Google sles-15-sp4-chost-byos-v20221118-x86-64
+ SLES 15 SP4 CHOST Images for Google sles-15-sp4-chost-byos-v20221215-arm64
+ SLES 15 SP4 CHOST Images for Google sles-15-sp4-chost-byos-v20221215-x86-64
+ SLES 15 SP4 CHOST Images for Google sles-15-sp4-chost-byos-v20230111-arm64
+ SLES 15 SP4 CHOST Images for Google sles-15-sp4-chost-byos-v20230111-x86-64
+ SLES 15 SP4 CHOST Images for Google sles-15-sp4-chost-byos-v20230210-arm64
+ SLES 15 SP4 CHOST Images for Google sles-15-sp4-chost-byos-v20230210-x86-64
+ SLES 15 SP4 CHOST Images for Google sles-15-sp4-chost-byos-v20230310-arm64
+ SLES 15 SP4 CHOST Images for Google sles-15-sp4-chost-byos-v20230310-x86-64
+ SLES 15 SP4 CHOST Images for Google sles-15-sp4-chost-byos-v20230410-arm64
+ SLES 15 SP4 CHOST Images for Google sles-15-sp4-chost-byos-v20230410-x86-64
+ SLES 15 SP4 CHOST Images for Google sles-15-sp4-chost-byos-v20230510-arm64
+ SLES 15 SP4 CHOST Images for Google sles-15-sp4-chost-byos-v20230510-x86-64
+ SLES 15 SP4 CHOST Images for Google sles-15-sp4-chost-byos-v20230606-arm64
+ SLES 15 SP4 CHOST Images for Google sles-15-sp4-chost-byos-v20230606-x86-64
+ SLES 15 SP4 CHOST Images for Google sles-15-sp4-chost-byos-v20230704-arm64
+ SLES 15 SP4 CHOST Images for Google sles-15-sp4-chost-byos-v20230704-x86-64
+ SLES 15 SP4 CHOST Images for Google sles-15-sp4-chost-byos-v20230804-arm64
+ SLES 15 SP4 CHOST Images for Google sles-15-sp4-chost-byos-v20230804-x86-64
+ SLES 15 SP4 CHOST Images for Google sles-15-sp4-chost-byos-v20230901-arm64
+ SLES 15 SP4 CHOST Images for Google sles-15-sp4-chost-byos-v20230901-x86-64
+ SLES 15 SP4 CHOST Images for Google sles-15-sp4-chost-byos-v20230928-arm64
+ SLES 15 SP4 CHOST Images for Google sles-15-sp4-chost-byos-v20230928-x86-64
+ SLES 15 SP4 CHOST Images for Google sles-15-sp4-chost-byos-v20231027-arm64
+ SLES 15 SP4 CHOST Images for Google sles-15-sp4-chost-byos-v20231027-x86-64
+ SLES 15 SP4 CHOST Images for Google sles-15-sp4-chost-byos-v20231127-arm64
+ SLES 15 SP4 CHOST Images for Google sles-15-sp4-chost-byos-v20231127-x86-64
+ SLES 15 SP4 CHOST Images for Google sles-15-sp4-chost-byos-v20231212-arm64
+ SLES 15 SP4 CHOST Images for Google sles-15-sp4-chost-byos-v20231212-x86-64
+ SLES 15 SP4 CHOST Images for Google sles-15-sp4-chost-byos-v20240312-arm64
+ SLES 15 SP4 CHOST Images for Google sles-15-sp4-chost-byos-v20240312-x86-64
+ SLES 15 SP4 CHOST Images for Google sles-15-sp4-chost-byos-v20240612-arm64
+ SLES 15 SP4 CHOST Images for Google sles-15-sp4-chost-byos-v20240612-x86-64
+ SLES 15 SP4 CHOST Images for Google sles-15-sp4-chost-byos-v20240809-arm64
+ SLES 15 SP4 CHOST Images for Google sles-15-sp4-chost-byos-v20240809-x86-64
+ SLES 15 SP4 CHOST Images for Google sles-15-sp4-chost-byos-v20240912-arm64
+ SLES 15 SP4 CHOST Images for Google sles-15-sp4-chost-byos-v20240912-x86-64
+
+
+ SLES 15 SP1 CHOST Images for Microsoft Azure suse-sles-15-sp1-chost-byos-v20210202
+ SLES 15 SP1 CHOST Images for Microsoft Azure suse-sles-15-sp1-chost-byos-v20210304
+ SLES 15 SP1 CHOST Images for Microsoft Azure suse-sles-15-sp1-chost-byos-v20220127
+ SLES 15 SP1 CHOST Images for Microsoft Azure suse-sles-15-sp1-chost-byos-v20220715-x86_64
+
+
+ SLES 15 SP2 CHOST Images for Microsoft Azure suse-sles-15-sp2-chost-byos-v20210202
+ SLES 15 SP2 CHOST Images for Microsoft Azure suse-sles-15-sp2-chost-byos-v20210304
+ SLES 15 SP2 CHOST Images for Microsoft Azure suse-sles-15-sp2-chost-byos-v20210405
+ SLES 15 SP2 CHOST Images for Microsoft Azure suse-sles-15-sp2-chost-byos-v20210506
+ SLES 15 SP2 CHOST Images for Microsoft Azure suse-sles-15-sp2-chost-byos-v20210610
+ SLES 15 SP2 CHOST Images for Microsoft Azure suse-sles-15-sp2-chost-byos-v20210722
+ SLES 15 SP2 CHOST Images for Microsoft Azure suse-sles-15-sp2-chost-byos-v20210913
+ SLES 15 SP2 CHOST Images for Microsoft Azure suse-sles-15-sp2-chost-byos-v20211025
+ SLES 15 SP2 CHOST Images for Microsoft Azure suse-sles-15-sp2-chost-byos-v20220126
+ SLES 15 SP2 CHOST Images for Microsoft Azure suse-sles-15-sp2-chost-byos-v20220718-x86_64
+
+
+ SLES 15 SP3 CHOST Images for Microsoft Azure suse-sles-15-sp3-chost-byos-v20210729
+ SLES 15 SP3 CHOST Images for Microsoft Azure suse-sles-15-sp3-chost-byos-v20210827
+ SLES 15 SP3 CHOST Images for Microsoft Azure suse-sles-15-sp3-chost-byos-v20210927
+ SLES 15 SP3 CHOST Images for Microsoft Azure suse-sles-15-sp3-chost-byos-v20211004
+ SLES 15 SP3 CHOST Images for Microsoft Azure suse-sles-15-sp3-chost-byos-v20211101
+ SLES 15 SP3 CHOST Images for Microsoft Azure suse-sles-15-sp3-chost-byos-v20211202
+ SLES 15 SP3 CHOST Images for Microsoft Azure suse-sles-15-sp3-chost-byos-v20220103
+ SLES 15 SP3 CHOST Images for Microsoft Azure suse-sles-15-sp3-chost-byos-v20220126
+ SLES 15 SP3 CHOST Images for Microsoft Azure suse-sles-15-sp3-chost-byos-v20220222
+ SLES 15 SP3 CHOST Images for Microsoft Azure suse-sles-15-sp3-chost-byos-v20220310
+ SLES 15 SP3 CHOST Images for Microsoft Azure suse-sles-15-sp3-chost-byos-v20220411-x86_64
+ SLES 15 SP3 CHOST Images for Microsoft Azure suse-sles-15-sp3-chost-byos-v20220510-x86_64
+ SLES 15 SP3 CHOST Images for Microsoft Azure suse-sles-15-sp3-chost-byos-v20220609-x86_64
+ SLES 15 SP3 CHOST Images for Microsoft Azure suse-sles-15-sp3-chost-byos-v20220708-x86_64
+ SLES 15 SP3 CHOST Images for Microsoft Azure suse-sles-15-sp3-chost-byos-v20220718-x86_64
+ SLES 15 SP3 CHOST Images for Microsoft Azure suse-sles-15-sp3-chost-byos-v20220818-x86_64
+ SLES 15 SP3 CHOST Images for Microsoft Azure suse-sles-15-sp3-chost-byos-v20220916-x86_64
+ SLES 15 SP3 CHOST Images for Microsoft Azure suse-sles-15-sp3-chost-byos-v20220921-x86_64
+ SLES 15 SP3 CHOST Images for Microsoft Azure suse-sles-15-sp3-chost-byos-v20221019-x86_64
+ SLES 15 SP3 CHOST Images for Microsoft Azure suse-sles-15-sp3-chost-byos-v20221119-x86_64
+ SLES 15 SP3 CHOST Images for Microsoft Azure suse-sles-15-sp3-chost-byos-v20221215-x86_64
+ SLES 15 SP3 CHOST Images for Microsoft Azure suse-sles-15-sp3-chost-byos-v20230313-x86_64
+ SLES 15 SP3 CHOST Images for Microsoft Azure suse-sles-15-sp3-chost-byos-v20230613-x86_64
+ SLES 15 SP3 CHOST Images for Microsoft Azure suse-sles-15-sp3-chost-byos-v20240807-x86_64
+ SLES 15 SP3 CHOST Images for Microsoft Azure suse-sles-15-sp3-chost-byos-v20240912-x86_64
+
+
+ SLES 15 SP4 CHOST Images for Microsoft Azure suse-sles-15-sp4-chost-byos-v20220718-x86_64
+ SLES 15 SP4 CHOST Images for Microsoft Azure suse-sles-15-sp4-chost-byos-v20220721-x86_64
+ SLES 15 SP4 CHOST Images for Microsoft Azure suse-sles-15-sp4-chost-byos-v20220819-x86_64
+ SLES 15 SP4 CHOST Images for Microsoft Azure suse-sles-15-sp4-chost-byos-v20220916-x86_64
+ SLES 15 SP4 CHOST Images for Microsoft Azure suse-sles-15-sp4-chost-byos-v20220923-x86_64
+ SLES 15 SP4 CHOST Images for Microsoft Azure suse-sles-15-sp4-chost-byos-v20221018-x86_64
+ SLES 15 SP4 CHOST Images for Microsoft Azure suse-sles-15-sp4-chost-byos-v20221118-x86_64
+ SLES 15 SP4 CHOST Images for Microsoft Azure suse-sles-15-sp4-chost-byos-v20221215-arm64
+ SLES 15 SP4 CHOST Images for Microsoft Azure suse-sles-15-sp4-chost-byos-v20221215-x86_64
+ SLES 15 SP4 CHOST Images for Microsoft Azure suse-sles-15-sp4-chost-byos-v20230111-arm64
+ SLES 15 SP4 CHOST Images for Microsoft Azure suse-sles-15-sp4-chost-byos-v20230111-x86_64
+ SLES 15 SP4 CHOST Images for Microsoft Azure suse-sles-15-sp4-chost-byos-v20230210-arm64
+ SLES 15 SP4 CHOST Images for Microsoft Azure suse-sles-15-sp4-chost-byos-v20230210-x86_64
+ SLES 15 SP4 CHOST Images for Microsoft Azure suse-sles-15-sp4-chost-byos-v20230310-arm64
+ SLES 15 SP4 CHOST Images for Microsoft Azure suse-sles-15-sp4-chost-byos-v20230310-x86_64
+ SLES 15 SP4 CHOST Images for Microsoft Azure suse-sles-15-sp4-chost-byos-v20230410-arm64
+ SLES 15 SP4 CHOST Images for Microsoft Azure suse-sles-15-sp4-chost-byos-v20230410-x86_64
+ SLES 15 SP4 CHOST Images for Microsoft Azure suse-sles-15-sp4-chost-byos-v20230510-arm64
+ SLES 15 SP4 CHOST Images for Microsoft Azure suse-sles-15-sp4-chost-byos-v20230510-x86_64
+ SLES 15 SP4 CHOST Images for Microsoft Azure suse-sles-15-sp4-chost-byos-v20230606-arm64
+ SLES 15 SP4 CHOST Images for Microsoft Azure suse-sles-15-sp4-chost-byos-v20230606-x86_64
+ SLES 15 SP4 CHOST Images for Microsoft Azure suse-sles-15-sp4-chost-byos-v20230704-arm64
+ SLES 15 SP4 CHOST Images for Microsoft Azure suse-sles-15-sp4-chost-byos-v20230704-x86_64
+ SLES 15 SP4 CHOST Images for Microsoft Azure suse-sles-15-sp4-chost-byos-v20230803-arm64
+ SLES 15 SP4 CHOST Images for Microsoft Azure suse-sles-15-sp4-chost-byos-v20230803-x86_64
+ SLES 15 SP4 CHOST Images for Microsoft Azure suse-sles-15-sp4-chost-byos-v20230901-arm64
+ SLES 15 SP4 CHOST Images for Microsoft Azure suse-sles-15-sp4-chost-byos-v20230901-x86_64
+ SLES 15 SP4 CHOST Images for Microsoft Azure suse-sles-15-sp4-chost-byos-v20230928-arm64
+ SLES 15 SP4 CHOST Images for Microsoft Azure suse-sles-15-sp4-chost-byos-v20230928-x86_64
+ SLES 15 SP4 CHOST Images for Microsoft Azure suse-sles-15-sp4-chost-byos-v20231027-arm64
+ SLES 15 SP4 CHOST Images for Microsoft Azure suse-sles-15-sp4-chost-byos-v20231027-x86_64
+ SLES 15 SP4 CHOST Images for Microsoft Azure suse-sles-15-sp4-chost-byos-v20231127-arm64
+ SLES 15 SP4 CHOST Images for Microsoft Azure suse-sles-15-sp4-chost-byos-v20231127-x86_64
+ SLES 15 SP4 CHOST Images for Microsoft Azure suse-sles-15-sp4-chost-byos-v20231212-arm64
+ SLES 15 SP4 CHOST Images for Microsoft Azure suse-sles-15-sp4-chost-byos-v20231212-x86_64
+ SLES 15 SP4 CHOST Images for Microsoft Azure suse-sles-15-sp4-chost-byos-v20240312-arm64
+ SLES 15 SP4 CHOST Images for Microsoft Azure suse-sles-15-sp4-chost-byos-v20240312-x86_64
+ SLES 15 SP4 CHOST Images for Microsoft Azure suse-sles-15-sp4-chost-byos-v20240612-arm64
+ SLES 15 SP4 CHOST Images for Microsoft Azure suse-sles-15-sp4-chost-byos-v20240612-x86_64
+ SLES 15 SP4 CHOST Images for Microsoft Azure suse-sles-15-sp4-chost-byos-v20240809-arm64
+ SLES 15 SP4 CHOST Images for Microsoft Azure suse-sles-15-sp4-chost-byos-v20240809-x86_64
+ SLES 15 SP4 CHOST Images for Microsoft Azure suse-sles-15-sp4-chost-byos-v20240912-arm64
+ SLES 15 SP4 CHOST Images for Microsoft Azure suse-sles-15-sp4-chost-byos-v20240912-x86_64
+
+
cluster-md-kmp-default
@@ -576,6 +838,39 @@
ocfs2-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-Azure-SAP-BYOS
+
+ kernel-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-BYOS
+
+
+ cluster-md-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ dlm-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ gfs2-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ kernel-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ ocfs2-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ cluster-md-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
+
+ dlm-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
+
+ gfs2-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
+
+ kernel-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
+
+ ocfs2-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
cluster-md-kmp-default-4.12.14-122.228.1 as a component of SUSE Linux Enterprise High Availability Extension 12 SP5
@@ -1383,6 +1678,17 @@
Image SLES12-SP5-Azure-SAP-BYOS:gfs2-kmp-default-4.12.14-122.228.1
Image SLES12-SP5-Azure-SAP-BYOS:kernel-default-4.12.14-122.228.1
Image SLES12-SP5-Azure-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.228.1
+ Image SLES12-SP5-GCE-BYOS:kernel-default-4.12.14-122.228.1
+ Image SLES12-SP5-GCE-SAP-BYOS:cluster-md-kmp-default-4.12.14-122.228.1
+ Image SLES12-SP5-GCE-SAP-BYOS:dlm-kmp-default-4.12.14-122.228.1
+ Image SLES12-SP5-GCE-SAP-BYOS:gfs2-kmp-default-4.12.14-122.228.1
+ Image SLES12-SP5-GCE-SAP-BYOS:kernel-default-4.12.14-122.228.1
+ Image SLES12-SP5-GCE-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.228.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:cluster-md-kmp-default-4.12.14-122.228.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:dlm-kmp-default-4.12.14-122.228.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:gfs2-kmp-default-4.12.14-122.228.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:kernel-default-4.12.14-122.228.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:ocfs2-kmp-default-4.12.14-122.228.1
SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.228.1
SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.228.1
SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.228.1
@@ -1635,6 +1941,229 @@
openSUSE Leap 15.6:ocfs2-kmp-default
openSUSE Leap 15.6:reiserfs-kmp-default
+
+ chost:amazon/suse-sles-15-sp1-chost-byos-v20210304-hvm-ssd-x86_64
+ chost:amazon/suse-sles-15-sp1-chost-byos-v20220127-hvm-ssd-x86_64
+ chost:amazon/suse-sles-15-sp1-chost-byos-v20220715-hvm-ssd-x86_64
+ chost:amazon/suse-sles-15-sp2-chost-byos-v20210610-hvm-ssd-x86_64
+ chost:amazon/suse-sles-15-sp2-chost-byos-v20210722-hvm-ssd-x86_64
+ chost:amazon/suse-sles-15-sp2-chost-byos-v20210913-hvm-ssd-x86_64
+ chost:amazon/suse-sles-15-sp2-chost-byos-v20211025-hvm-ssd-x86_64
+ chost:amazon/suse-sles-15-sp2-chost-byos-v20220126-hvm-ssd-x86_64
+ chost:amazon/suse-sles-15-sp2-chost-byos-v20220718-hvm-ssd-x86_64
+ chost:amazon/suse-sles-15-sp3-chost-byos-v20210729-hvm-ssd-x86_64
+ chost:amazon/suse-sles-15-sp3-chost-byos-v20210827-hvm-ssd-x86_64
+ chost:amazon/suse-sles-15-sp3-chost-byos-v20210927-hvm-ssd-x86_64
+ chost:amazon/suse-sles-15-sp3-chost-byos-v20211004-hvm-ssd-x86_64
+ chost:amazon/suse-sles-15-sp3-chost-byos-v20211101-hvm-ssd-x86_64
+ chost:amazon/suse-sles-15-sp3-chost-byos-v20211202-hvm-ssd-x86_64
+ chost:amazon/suse-sles-15-sp3-chost-byos-v20220103-hvm-ssd-x86_64
+ chost:amazon/suse-sles-15-sp3-chost-byos-v20220126-hvm-ssd-x86_64
+ chost:amazon/suse-sles-15-sp3-chost-byos-v20220222-hvm-ssd-x86_64
+ chost:amazon/suse-sles-15-sp3-chost-byos-v20220310-hvm-ssd-x86_64
+ chost:amazon/suse-sles-15-sp3-chost-byos-v20220411-hvm-ssd-x86_64
+ chost:amazon/suse-sles-15-sp3-chost-byos-v20220510-hvm-ssd-x86_64
+ chost:amazon/suse-sles-15-sp3-chost-byos-v20220608-hvm-ssd-x86_64
+ chost:amazon/suse-sles-15-sp3-chost-byos-v20220708-hvm-ssd-x86_64
+ chost:amazon/suse-sles-15-sp3-chost-byos-v20220718-hvm-ssd-x86_64
+ chost:amazon/suse-sles-15-sp3-chost-byos-v20220818-hvm-ssd-x86_64
+ chost:amazon/suse-sles-15-sp3-chost-byos-v20220916-hvm-ssd-x86_64
+ chost:amazon/suse-sles-15-sp3-chost-byos-v20220921-hvm-ssd-x86_64
+ chost:amazon/suse-sles-15-sp3-chost-byos-v20221019-hvm-ssd-x86_64
+ chost:amazon/suse-sles-15-sp3-chost-byos-v20221119-hvm-ssd-x86_64
+ chost:amazon/suse-sles-15-sp3-chost-byos-v20221215-hvm-ssd-x86_64
+ chost:amazon/suse-sles-15-sp3-chost-byos-v20230313-hvm-ssd-x86_64
+ chost:amazon/suse-sles-15-sp3-chost-byos-v20230613-hvm-ssd-x86_64
+ chost:amazon/suse-sles-15-sp3-chost-byos-v20240807-hvm-ssd-x86_64
+ chost:amazon/suse-sles-15-sp3-chost-byos-v20240912-hvm-ssd-x86_64
+ chost:amazon/suse-sles-15-sp4-chost-byos-v20220718-hvm-ssd-x86_64
+ chost:amazon/suse-sles-15-sp4-chost-byos-v20220721-hvm-ssd-x86_64
+ chost:amazon/suse-sles-15-sp4-chost-byos-v20220819-hvm-ssd-x86_64
+ chost:amazon/suse-sles-15-sp4-chost-byos-v20220916-hvm-ssd-x86_64
+ chost:amazon/suse-sles-15-sp4-chost-byos-v20220923-hvm-ssd-x86_64
+ chost:amazon/suse-sles-15-sp4-chost-byos-v20221018-hvm-ssd-x86_64
+ chost:amazon/suse-sles-15-sp4-chost-byos-v20221118-hvm-ssd-x86_64
+ chost:amazon/suse-sles-15-sp4-chost-byos-v20221215-hvm-ssd-x86_64
+ chost:amazon/suse-sles-15-sp4-chost-byos-v20230111-hvm-ssd-x86_64
+ chost:amazon/suse-sles-15-sp4-chost-byos-v20230210-hvm-ssd-x86_64
+ chost:amazon/suse-sles-15-sp4-chost-byos-v20230310-hvm-ssd-x86_64
+ chost:amazon/suse-sles-15-sp4-chost-byos-v20230410-hvm-ssd-x86_64
+ chost:amazon/suse-sles-15-sp4-chost-byos-v20230510-hvm-ssd-x86_64
+ chost:amazon/suse-sles-15-sp4-chost-byos-v20230606-hvm-ssd-x86_64
+ chost:amazon/suse-sles-15-sp4-chost-byos-v20230704-hvm-ssd-x86_64
+ chost:amazon/suse-sles-15-sp4-chost-byos-v20230803-hvm-ssd-x86_64
+ chost:amazon/suse-sles-15-sp4-chost-byos-v20230901-hvm-ssd-x86_64
+ chost:amazon/suse-sles-15-sp4-chost-byos-v20230928-hvm-ssd-x86_64
+ chost:amazon/suse-sles-15-sp4-chost-byos-v20231027-hvm-ssd-x86_64
+ chost:amazon/suse-sles-15-sp4-chost-byos-v20231127-hvm-ssd-x86_64
+ chost:amazon/suse-sles-15-sp4-chost-byos-v20231212-hvm-ssd-x86_64
+ chost:amazon/suse-sles-15-sp4-chost-byos-v20240312-hvm-ssd-x86_64
+ chost:amazon/suse-sles-15-sp4-chost-byos-v20240612-hvm-ssd-x86_64
+ chost:amazon/suse-sles-15-sp4-chost-byos-v20240809-hvm-ssd-x86_64
+ chost:amazon/suse-sles-15-sp4-chost-byos-v20240912-hvm-ssd-x86_64
+ chost:google/sles-15-sp1-chost-byos-v20210202
+ chost:google/sles-15-sp1-chost-byos-v20210304
+ chost:google/sles-15-sp1-chost-byos-v20220127
+ chost:google/sles-15-sp1-chost-byos-v20220715-x86-64
+ chost:google/sles-15-sp2-chost-byos-v20210202
+ chost:google/sles-15-sp2-chost-byos-v20210304
+ chost:google/sles-15-sp2-chost-byos-v20210405
+ chost:google/sles-15-sp2-chost-byos-v20210506
+ chost:google/sles-15-sp2-chost-byos-v20210610
+ chost:google/sles-15-sp2-chost-byos-v20210722
+ chost:google/sles-15-sp2-chost-byos-v20210913
+ chost:google/sles-15-sp2-chost-byos-v20211025
+ chost:google/sles-15-sp2-chost-byos-v20220126
+ chost:google/sles-15-sp2-chost-byos-v20220718-x86-64
+ chost:google/sles-15-sp3-chost-byos-v20210729
+ chost:google/sles-15-sp3-chost-byos-v20210827
+ chost:google/sles-15-sp3-chost-byos-v20210927
+ chost:google/sles-15-sp3-chost-byos-v20211004
+ chost:google/sles-15-sp3-chost-byos-v20211101
+ chost:google/sles-15-sp3-chost-byos-v20211202
+ chost:google/sles-15-sp3-chost-byos-v20220103
+ chost:google/sles-15-sp3-chost-byos-v20220126
+ chost:google/sles-15-sp3-chost-byos-v20220222
+ chost:google/sles-15-sp3-chost-byos-v20220310
+ chost:google/sles-15-sp3-chost-byos-v20220411-x86-64
+ chost:google/sles-15-sp3-chost-byos-v20220510-x86-64
+ chost:google/sles-15-sp3-chost-byos-v20220608-x86-64
+ chost:google/sles-15-sp3-chost-byos-v20220708-x86-64
+ chost:google/sles-15-sp3-chost-byos-v20220718-x86-64
+ chost:google/sles-15-sp3-chost-byos-v20220818-x86-64
+ chost:google/sles-15-sp3-chost-byos-v20220916-x86-64
+ chost:google/sles-15-sp3-chost-byos-v20221019-x86-64
+ chost:google/sles-15-sp3-chost-byos-v20221118-x86-64
+ chost:google/sles-15-sp3-chost-byos-v20221215-x86-64
+ chost:google/sles-15-sp3-chost-byos-v20230313-x86-64
+ chost:google/sles-15-sp3-chost-byos-v20230613-x86-64
+ chost:google/sles-15-sp3-chost-byos-v20240807-x86-64
+ chost:google/sles-15-sp3-chost-byos-v20240912-x86-64
+ chost:google/sles-15-sp4-chost-byos-v20220718-x86-64
+ chost:google/sles-15-sp4-chost-byos-v20220721-x86-64
+ chost:google/sles-15-sp4-chost-byos-v20220818-x86-64
+ chost:google/sles-15-sp4-chost-byos-v20220916-x86-64
+ chost:google/sles-15-sp4-chost-byos-v20221018-x86-64
+ chost:google/sles-15-sp4-chost-byos-v20221118-x86-64
+ chost:google/sles-15-sp4-chost-byos-v20221215-arm64
+ chost:google/sles-15-sp4-chost-byos-v20221215-x86-64
+ chost:google/sles-15-sp4-chost-byos-v20230111-arm64
+ chost:google/sles-15-sp4-chost-byos-v20230111-x86-64
+ chost:google/sles-15-sp4-chost-byos-v20230210-arm64
+ chost:google/sles-15-sp4-chost-byos-v20230210-x86-64
+ chost:google/sles-15-sp4-chost-byos-v20230310-arm64
+ chost:google/sles-15-sp4-chost-byos-v20230310-x86-64
+ chost:google/sles-15-sp4-chost-byos-v20230410-arm64
+ chost:google/sles-15-sp4-chost-byos-v20230410-x86-64
+ chost:google/sles-15-sp4-chost-byos-v20230510-arm64
+ chost:google/sles-15-sp4-chost-byos-v20230510-x86-64
+ chost:google/sles-15-sp4-chost-byos-v20230606-arm64
+ chost:google/sles-15-sp4-chost-byos-v20230606-x86-64
+ chost:google/sles-15-sp4-chost-byos-v20230704-arm64
+ chost:google/sles-15-sp4-chost-byos-v20230704-x86-64
+ chost:google/sles-15-sp4-chost-byos-v20230804-arm64
+ chost:google/sles-15-sp4-chost-byos-v20230804-x86-64
+ chost:google/sles-15-sp4-chost-byos-v20230901-arm64
+ chost:google/sles-15-sp4-chost-byos-v20230901-x86-64
+ chost:google/sles-15-sp4-chost-byos-v20230928-arm64
+ chost:google/sles-15-sp4-chost-byos-v20230928-x86-64
+ chost:google/sles-15-sp4-chost-byos-v20231027-arm64
+ chost:google/sles-15-sp4-chost-byos-v20231027-x86-64
+ chost:google/sles-15-sp4-chost-byos-v20231127-arm64
+ chost:google/sles-15-sp4-chost-byos-v20231127-x86-64
+ chost:google/sles-15-sp4-chost-byos-v20231212-arm64
+ chost:google/sles-15-sp4-chost-byos-v20231212-x86-64
+ chost:google/sles-15-sp4-chost-byos-v20240312-arm64
+ chost:google/sles-15-sp4-chost-byos-v20240312-x86-64
+ chost:google/sles-15-sp4-chost-byos-v20240612-arm64
+ chost:google/sles-15-sp4-chost-byos-v20240612-x86-64
+ chost:google/sles-15-sp4-chost-byos-v20240809-arm64
+ chost:google/sles-15-sp4-chost-byos-v20240809-x86-64
+ chost:google/sles-15-sp4-chost-byos-v20240912-arm64
+ chost:google/sles-15-sp4-chost-byos-v20240912-x86-64
+ chost:microsoft/suse-sles-15-sp1-chost-byos-v20210202
+ chost:microsoft/suse-sles-15-sp1-chost-byos-v20210304
+ chost:microsoft/suse-sles-15-sp1-chost-byos-v20220127
+ chost:microsoft/suse-sles-15-sp1-chost-byos-v20220715-x86_64
+ chost:microsoft/suse-sles-15-sp2-chost-byos-v20210202
+ chost:microsoft/suse-sles-15-sp2-chost-byos-v20210304
+ chost:microsoft/suse-sles-15-sp2-chost-byos-v20210405
+ chost:microsoft/suse-sles-15-sp2-chost-byos-v20210506
+ chost:microsoft/suse-sles-15-sp2-chost-byos-v20210610
+ chost:microsoft/suse-sles-15-sp2-chost-byos-v20210722
+ chost:microsoft/suse-sles-15-sp2-chost-byos-v20210913
+ chost:microsoft/suse-sles-15-sp2-chost-byos-v20211025
+ chost:microsoft/suse-sles-15-sp2-chost-byos-v20220126
+ chost:microsoft/suse-sles-15-sp2-chost-byos-v20220718-x86_64
+ chost:microsoft/suse-sles-15-sp3-chost-byos-v20210729
+ chost:microsoft/suse-sles-15-sp3-chost-byos-v20210827
+ chost:microsoft/suse-sles-15-sp3-chost-byos-v20210927
+ chost:microsoft/suse-sles-15-sp3-chost-byos-v20211004
+ chost:microsoft/suse-sles-15-sp3-chost-byos-v20211101
+ chost:microsoft/suse-sles-15-sp3-chost-byos-v20211202
+ chost:microsoft/suse-sles-15-sp3-chost-byos-v20220103
+ chost:microsoft/suse-sles-15-sp3-chost-byos-v20220126
+ chost:microsoft/suse-sles-15-sp3-chost-byos-v20220222
+ chost:microsoft/suse-sles-15-sp3-chost-byos-v20220310
+ chost:microsoft/suse-sles-15-sp3-chost-byos-v20220411-x86_64
+ chost:microsoft/suse-sles-15-sp3-chost-byos-v20220510-x86_64
+ chost:microsoft/suse-sles-15-sp3-chost-byos-v20220609-x86_64
+ chost:microsoft/suse-sles-15-sp3-chost-byos-v20220708-x86_64
+ chost:microsoft/suse-sles-15-sp3-chost-byos-v20220718-x86_64
+ chost:microsoft/suse-sles-15-sp3-chost-byos-v20220818-x86_64
+ chost:microsoft/suse-sles-15-sp3-chost-byos-v20220916-x86_64
+ chost:microsoft/suse-sles-15-sp3-chost-byos-v20220921-x86_64
+ chost:microsoft/suse-sles-15-sp3-chost-byos-v20221019-x86_64
+ chost:microsoft/suse-sles-15-sp3-chost-byos-v20221119-x86_64
+ chost:microsoft/suse-sles-15-sp3-chost-byos-v20221215-x86_64
+ chost:microsoft/suse-sles-15-sp3-chost-byos-v20230313-x86_64
+ chost:microsoft/suse-sles-15-sp3-chost-byos-v20230613-x86_64
+ chost:microsoft/suse-sles-15-sp3-chost-byos-v20240807-x86_64
+ chost:microsoft/suse-sles-15-sp3-chost-byos-v20240912-x86_64
+ chost:microsoft/suse-sles-15-sp4-chost-byos-v20220718-x86_64
+ chost:microsoft/suse-sles-15-sp4-chost-byos-v20220721-x86_64
+ chost:microsoft/suse-sles-15-sp4-chost-byos-v20220819-x86_64
+ chost:microsoft/suse-sles-15-sp4-chost-byos-v20220916-x86_64
+ chost:microsoft/suse-sles-15-sp4-chost-byos-v20220923-x86_64
+ chost:microsoft/suse-sles-15-sp4-chost-byos-v20221018-x86_64
+ chost:microsoft/suse-sles-15-sp4-chost-byos-v20221118-x86_64
+ chost:microsoft/suse-sles-15-sp4-chost-byos-v20221215-arm64
+ chost:microsoft/suse-sles-15-sp4-chost-byos-v20221215-x86_64
+ chost:microsoft/suse-sles-15-sp4-chost-byos-v20230111-arm64
+ chost:microsoft/suse-sles-15-sp4-chost-byos-v20230111-x86_64
+ chost:microsoft/suse-sles-15-sp4-chost-byos-v20230210-arm64
+ chost:microsoft/suse-sles-15-sp4-chost-byos-v20230210-x86_64
+ chost:microsoft/suse-sles-15-sp4-chost-byos-v20230310-arm64
+ chost:microsoft/suse-sles-15-sp4-chost-byos-v20230310-x86_64
+ chost:microsoft/suse-sles-15-sp4-chost-byos-v20230410-arm64
+ chost:microsoft/suse-sles-15-sp4-chost-byos-v20230410-x86_64
+ chost:microsoft/suse-sles-15-sp4-chost-byos-v20230510-arm64
+ chost:microsoft/suse-sles-15-sp4-chost-byos-v20230510-x86_64
+ chost:microsoft/suse-sles-15-sp4-chost-byos-v20230606-arm64
+ chost:microsoft/suse-sles-15-sp4-chost-byos-v20230606-x86_64
+ chost:microsoft/suse-sles-15-sp4-chost-byos-v20230704-arm64
+ chost:microsoft/suse-sles-15-sp4-chost-byos-v20230704-x86_64
+ chost:microsoft/suse-sles-15-sp4-chost-byos-v20230803-arm64
+ chost:microsoft/suse-sles-15-sp4-chost-byos-v20230803-x86_64
+ chost:microsoft/suse-sles-15-sp4-chost-byos-v20230901-arm64
+ chost:microsoft/suse-sles-15-sp4-chost-byos-v20230901-x86_64
+ chost:microsoft/suse-sles-15-sp4-chost-byos-v20230928-arm64
+ chost:microsoft/suse-sles-15-sp4-chost-byos-v20230928-x86_64
+ chost:microsoft/suse-sles-15-sp4-chost-byos-v20231027-arm64
+ chost:microsoft/suse-sles-15-sp4-chost-byos-v20231027-x86_64
+ chost:microsoft/suse-sles-15-sp4-chost-byos-v20231127-arm64
+ chost:microsoft/suse-sles-15-sp4-chost-byos-v20231127-x86_64
+ chost:microsoft/suse-sles-15-sp4-chost-byos-v20231212-arm64
+ chost:microsoft/suse-sles-15-sp4-chost-byos-v20231212-x86_64
+ chost:microsoft/suse-sles-15-sp4-chost-byos-v20240312-arm64
+ chost:microsoft/suse-sles-15-sp4-chost-byos-v20240312-x86_64
+ chost:microsoft/suse-sles-15-sp4-chost-byos-v20240612-arm64
+ chost:microsoft/suse-sles-15-sp4-chost-byos-v20240612-x86_64
+ chost:microsoft/suse-sles-15-sp4-chost-byos-v20240809-arm64
+ chost:microsoft/suse-sles-15-sp4-chost-byos-v20240809-x86_64
+ chost:microsoft/suse-sles-15-sp4-chost-byos-v20240912-arm64
+ chost:microsoft/suse-sles-15-sp4-chost-byos-v20240912-x86_64
+
skipping CVE-2021-4439 as CVE page is older than CVRF-CVE file.
skipping CVE-2021-4219 as CVE page is older than CVRF-CVE file.
skipping CVE-2021-4218 as CVE page is older than CVRF-CVE file.
no cpe found for SUSE Package Hub 15 SP3 in CVE-2021-4216
no cpe found for SUSE Package Hub 15 SP4 in CVE-2021-4216
skipping CVE-2021-4214 as CVE page is older than CVRF-CVE file.
skipping CVE-2021-4209 as CVE page is older than CVRF-CVE file.
skipping CVE-2021-4207 as CVE page is older than CVRF-CVE file.
skipping CVE-2021-4206 as CVE page is older than CVRF-CVE file.
skipping CVE-2021-4204 as CVE page is older than CVRF-CVE file.
skipping CVE-2021-4193 as CVE page is older than CVRF-CVE file.
skipping CVE-2021-4192 as CVE page is older than CVRF-CVE file.
skipping CVE-2021-4190 as CVE page is older than CVRF-CVE file.
skipping CVE-2021-4187 as CVE page is older than CVRF-CVE file.
skipping CVE-2021-4186 as CVE page is older than CVRF-CVE file.
skipping CVE-2021-4185 as CVE page is older than CVRF-CVE file.
skipping CVE-2021-4184 as CVE page is older than CVRF-CVE file.
skipping CVE-2021-4183 as CVE page is older than CVRF-CVE file.
skipping CVE-2021-4182 as CVE page is older than CVRF-CVE file.
skipping CVE-2021-4181 as CVE page is older than CVRF-CVE file.
skipping CVE-2021-4173 as CVE page is older than CVRF-CVE file.
skipping CVE-2021-4166 as CVE page is older than CVRF-CVE file.
skipping CVE-2021-4160 as CVE page is older than CVRF-CVE file.
skipping CVE-2021-4159 as CVE page is older than CVRF-CVE file.
skipping CVE-2021-4158 as CVE page is older than CVRF-CVE file.
skipping CVE-2021-4157 as CVE page is older than CVRF-CVE file.
skipping CVE-2021-4156 as CVE page is older than CVRF-CVE file.
skipping CVE-2021-4155 as CVE page is older than CVRF-CVE file.
skipping CVE-2021-4154 as CVE page is older than CVRF-CVE file.
skipping CVE-2021-4150 as CVE page is older than CVRF-CVE file.
skipping CVE-2021-4149 as CVE page is older than CVRF-CVE file.
skipping CVE-2021-4148 as CVE page is older than CVRF-CVE file.
skipping CVE-2021-4147 as CVE page is older than CVRF-CVE file.
skipping CVE-2021-4145 as CVE page is older than CVRF-CVE file.
skipping CVE-2021-4136 as CVE page is older than CVRF-CVE file.
skipping CVE-2021-4135 as CVE page is older than CVRF-CVE file.
skipping CVE-2021-4129 as CVE page is older than CVRF-CVE file.
skipping CVE-2021-4128 as CVE page is older than CVRF-CVE file.
skipping CVE-2021-4122 as CVE page is older than CVRF-CVE file.
no cpe found for SUSE Package Hub 15 SP2 in CVE-2021-4104
no cpe found for SUSE Package Hub 15 SP3 in CVE-2021-4104
no cpe found for SUSE Package Hub 15 SP3 in CVE-2021-4102
no cpe found for SUSE Package Hub 15 SP3 in CVE-2021-4101
no cpe found for SUSE Package Hub 15 SP3 in CVE-2021-4100
no cpe found for SUSE Package Hub 15 SP3 in CVE-2021-4099
no cpe found for SUSE Package Hub 15 SP3 in CVE-2021-4098
no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2021-4091
skipping CVE-2021-4095 as CVE page is older than CVRF-CVE file.
skipping CVE-2021-4093 as CVE page is older than CVRF-CVE file.
skipping CVE-2021-4090 as CVE page is older than CVRF-CVE file.
no cpe found for SUSE Package Hub 15 SP3 in CVE-2021-4079
no cpe found for SUSE Package Hub 15 SP3 in CVE-2021-4078
no cpe found for SUSE Package Hub 15 SP3 in CVE-2021-4068
skipping CVE-2021-4069 as CVE page is older than CVRF-CVE file.
no cpe found for SUSE Package Hub 15 SP3 in CVE-2021-4067
no cpe found for SUSE Package Hub 15 SP3 in CVE-2021-4066
no cpe found for SUSE Package Hub 15 SP3 in CVE-2021-4065
no cpe found for SUSE Package Hub 15 SP3 in CVE-2021-4064
no cpe found for SUSE Package Hub 15 SP3 in CVE-2021-4063
no cpe found for SUSE Package Hub 15 SP3 in CVE-2021-4062
no cpe found for SUSE Package Hub 15 SP3 in CVE-2021-4061
no cpe found for SUSE Package Hub 15 SP3 in CVE-2021-4059
no cpe found for SUSE Package Hub 15 SP3 in CVE-2021-4058
no cpe found for SUSE Package Hub 15 SP3 in CVE-2021-4057
no cpe found for SUSE Package Hub 15 SP3 in CVE-2021-4056
no cpe found for SUSE Package Hub 15 SP3 in CVE-2021-4055
no cpe found for SUSE Package Hub 15 SP3 in CVE-2021-4054
no cpe found for SUSE Package Hub 15 SP3 in CVE-2021-4053
no cpe found for SUSE Package Hub 15 SP3 in CVE-2021-4052
skipping CVE-2021-4048 as CVE page is older than CVRF-CVE file.
skipping CVE-2021-4044 as CVE page is older than CVRF-CVE file.
no cpe found for SUSE Liberty Linux 7 LTSS in CVE-2021-4034
skipping CVE-2021-4037 as CVE page is older than CVRF-CVE file.
no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2021-4024
skipping CVE-2021-4032 as CVE page is older than CVRF-CVE file.
skipping CVE-2021-4028 as CVE page is older than CVRF-CVE file.
skipping CVE-2021-4023 as CVE page is older than CVRF-CVE file.
skipping CVE-2021-4019 as CVE page is older than CVRF-CVE file.
skipping CVE-2021-4011 as CVE page is older than CVRF-CVE file.
skipping CVE-2021-4010 as CVE page is older than CVRF-CVE file.
skipping CVE-2021-4009 as CVE page is older than CVRF-CVE file.
skipping CVE-2021-4008 as CVE page is older than CVRF-CVE file.
skipping CVE-2021-4001 as CVE page is older than CVRF-CVE file.
skipping CVE-2021-3999 as CVE page is older than CVRF-CVE file.
skipping CVE-2021-3998 as CVE page is older than CVRF-CVE file.
skipping CVE-2021-3997 as CVE page is older than CVRF-CVE file.
skipping CVE-2021-3996 as CVE page is older than CVRF-CVE file.
skipping CVE-2021-3995 as CVE page is older than CVRF-CVE file.
skipping CVE-2021-3984 as CVE page is older than CVRF-CVE file.
skipping CVE-2021-3982 as CVE page is older than CVRF-CVE file.
skipping CVE-2021-3981 as CVE page is older than CVRF-CVE file.
skipping CVE-2021-3979 as CVE page is older than CVRF-CVE file.
skipping CVE-2021-3975 as CVE page is older than CVRF-CVE file.
skipping CVE-2021-3974 as CVE page is older than CVRF-CVE file.
skipping CVE-2021-3973 as CVE page is older than CVRF-CVE file.
skipping CVE-2021-3968 as CVE page is older than CVRF-CVE file.
skipping CVE-2021-3962 as CVE page is older than CVRF-CVE file.
skipping CVE-2021-3947 as CVE page is older than CVRF-CVE file.
skipping CVE-2021-3941 as CVE page is older than CVRF-CVE file.
skipping CVE-2021-3939 as CVE page is older than CVRF-CVE file.
skipping CVE-2021-3933 as CVE page is older than CVRF-CVE file.
skipping CVE-2021-3930 as CVE page is older than CVRF-CVE file.
skipping CVE-2021-3928 as CVE page is older than CVRF-CVE file.
skipping CVE-2021-3927 as CVE page is older than CVRF-CVE file.
no cpe found for SUSE Manager Tools Beta for SLE Micro 5 in CVE-2021-3918
no cpe found for SUSE Manager Tools for SLE Micro 5 in CVE-2021-3918
no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2021-3903
skipping CVE-2021-3905 as CVE page is older than CVRF-CVE file.
skipping CVE-2021-3896 as CVE page is older than CVRF-CVE file.
skipping CVE-2021-3892 as CVE page is older than CVRF-CVE file.
skipping CVE-2021-3875 as CVE page is older than CVRF-CVE file.
skipping CVE-2021-3872 as CVE page is older than CVRF-CVE file.
skipping CVE-2021-3864 as CVE page is older than CVRF-CVE file.
skipping CVE-2021-3847 as CVE page is older than CVRF-CVE file.
skipping CVE-2021-3839 as CVE page is older than CVRF-CVE file.
skipping CVE-2021-3828 as CVE page is older than CVRF-CVE file.
skipping CVE-2021-3826 as CVE page is older than CVRF-CVE file.
no cpe found for SUSE Manager Tools Beta for SLE Micro 5 in CVE-2021-3807
no cpe found for SUSE Manager Tools for SLE Micro 5 in CVE-2021-3807
skipping CVE-2021-3802 as CVE page is older than CVRF-CVE file.
skipping CVE-2021-3800 as CVE page is older than CVRF-CVE file.
skipping CVE-2021-3798 as CVE page is older than CVRF-CVE file.
skipping CVE-2021-3796 as CVE page is older than CVRF-CVE file.
skipping CVE-2021-3782 as CVE page is older than CVRF-CVE file.
skipping CVE-2021-3778 as CVE page is older than CVRF-CVE file.
skipping CVE-2021-3770 as CVE page is older than CVRF-CVE file.
no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2021-3750
skipping CVE-2021-3748 as CVE page is older than CVRF-CVE file.
skipping CVE-2021-3744 as CVE page is older than CVRF-CVE file.
skipping CVE-2021-3743 as CVE page is older than CVRF-CVE file.
skipping CVE-2021-3739 as CVE page is older than CVRF-CVE file.
skipping CVE-2021-3738 as CVE page is older than CVRF-CVE file.
skipping CVE-2021-3737 as CVE page is older than CVRF-CVE file.
skipping CVE-2021-3736 as CVE page is older than CVRF-CVE file.
skipping CVE-2021-3735 as CVE page is older than CVRF-CVE file.
skipping CVE-2021-3733 as CVE page is older than CVRF-CVE file.
skipping CVE-2021-3714 as CVE page is older than CVRF-CVE file.
skipping CVE-2021-3713 as CVE page is older than CVRF-CVE file.
skipping CVE-2021-3712 as CVE page is older than CVRF-CVE file.
skipping CVE-2021-3711 as CVE page is older than CVRF-CVE file.
no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2021-3697
no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2021-3696
no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2021-3695
skipping CVE-2021-3682 as CVE page is older than CVRF-CVE file.
skipping CVE-2021-3677 as CVE page is older than CVRF-CVE file.
no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2021-3670
skipping CVE-2021-3671 as CVE page is older than CVRF-CVE file.
skipping CVE-2021-3669 as CVE page is older than CVRF-CVE file.
skipping CVE-2021-3658 as CVE page is older than CVRF-CVE file.
no cpe found for SUSE Package Hub 15 SP4 in CVE-2021-3643
no cpe found for SUSE Package Hub 15 SP5 in CVE-2021-3643
skipping CVE-2021-3648 as CVE page is older than CVRF-CVE file.
skipping CVE-2021-3638 as CVE page is older than CVRF-CVE file.
skipping CVE-2021-3635 as CVE page is older than CVRF-CVE file.
skipping CVE-2021-3634 as CVE page is older than CVRF-CVE file.
skipping CVE-2021-3631 as CVE page is older than CVRF-CVE file.
skipping CVE-2021-3630 as CVE page is older than CVRF-CVE file.
no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2021-3623
no cpe found for SUSE Liberty Linux 7 LTSS in CVE-2021-3622
no cpe found for SUSE Manager Tools Beta for SLE Micro 5 in CVE-2021-3620
skipping CVE-2021-3621 as CVE page is older than CVRF-CVE file.
no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2021-3618
skipping CVE-2021-3611 as CVE page is older than CVRF-CVE file.
skipping CVE-2021-3610 as CVE page is older than CVRF-CVE file.
skipping CVE-2021-3608 as CVE page is older than CVRF-CVE file.
skipping CVE-2021-3607 as CVE page is older than CVRF-CVE file.
skipping CVE-2021-3601 as CVE page is older than CVRF-CVE file.
skipping CVE-2021-3600 as CVE page is older than CVRF-CVE file.
skipping CVE-2021-3596 as CVE page is older than CVRF-CVE file.
skipping CVE-2021-3595 as CVE page is older than CVRF-CVE file.
skipping CVE-2021-3594 as CVE page is older than CVRF-CVE file.
skipping CVE-2021-3593 as CVE page is older than CVRF-CVE file.
skipping CVE-2021-3592 as CVE page is older than CVRF-CVE file.
skipping CVE-2021-3588 as CVE page is older than CVRF-CVE file.
no cpe found for SUSE Manager Tools Beta for SLE Micro 5 in CVE-2021-3583
no cpe found for SUSE Package Hub 15 SP2 in CVE-2021-3578
skipping CVE-2021-3582 as CVE page is older than CVRF-CVE file.
skipping CVE-2021-3580 as CVE page is older than CVRF-CVE file.
skipping CVE-2021-3575 as CVE page is older than CVRF-CVE file.
skipping CVE-2021-3574 as CVE page is older than CVRF-CVE file.
skipping CVE-2021-3573 as CVE page is older than CVRF-CVE file.
no cpe found for SUSE Liberty Linux 7 LTSS in CVE-2021-3570
skipping CVE-2021-3567 as CVE page is older than CVRF-CVE file.
skipping CVE-2021-3564 as CVE page is older than CVRF-CVE file.
no cpe found for SUSE Package Hub 15 SP2 in CVE-2021-3561
no cpe found for SUSE Package Hub 15 SP3 in CVE-2021-3561
skipping CVE-2021-3559 as CVE page is older than CVRF-CVE file.
skipping CVE-2021-3556 as CVE page is older than CVRF-CVE file.
skipping CVE-2021-3549 as CVE page is older than CVRF-CVE file.
skipping CVE-2021-3547 as CVE page is older than CVRF-CVE file.
skipping CVE-2021-3546 as CVE page is older than CVRF-CVE file.
skipping CVE-2021-3545 as CVE page is older than CVRF-CVE file.
skipping CVE-2021-3544 as CVE page is older than CVRF-CVE file.
skipping CVE-2021-3543 as CVE page is older than CVRF-CVE file.
skipping CVE-2021-3541 as CVE page is older than CVRF-CVE file.
skipping CVE-2021-3531 as CVE page is older than CVRF-CVE file.
skipping CVE-2021-3530 as CVE page is older than CVRF-CVE file.
skipping CVE-2021-3527 as CVE page is older than CVRF-CVE file.
no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2021-3521
skipping CVE-2021-3518 as CVE page is older than CVRF-CVE file.
skipping CVE-2021-3517 as CVE page is older than CVRF-CVE file.
skipping CVE-2021-3516 as CVE page is older than CVRF-CVE file.
CVE-2021-3507: no packages for openSUSE Leap 15.3, but entry?
CVE-2021-3507: no packages for openSUSE Leap 15.3, but entry?
CVE-2021-3507: no packages for openSUSE Leap 15.3, but entry?
skipping CVE-2021-3509 as CVE page is older than CVRF-CVE file.
skipping CVE-2021-3506 as CVE page is older than CVRF-CVE file.
skipping CVE-2021-3502 as CVE page is older than CVRF-CVE file.
skipping CVE-2021-3501 as CVE page is older than CVRF-CVE file.
no cpe found for SUSE Package Hub 15 SP2 in CVE-2021-3496
skipping CVE-2021-3498 as CVE page is older than CVRF-CVE file.
skipping CVE-2021-3497 as CVE page is older than CVRF-CVE file.
skipping CVE-2021-3493 as CVE page is older than CVRF-CVE file.
skipping CVE-2021-3492 as CVE page is older than CVRF-CVE file.
skipping CVE-2021-3490 as CVE page is older than CVRF-CVE file.
skipping CVE-2021-3489 as CVE page is older than CVRF-CVE file.
skipping CVE-2021-3487 as CVE page is older than CVRF-CVE file.
skipping CVE-2021-3482 as CVE page is older than CVRF-CVE file.
skipping CVE-2021-3481 as CVE page is older than CVRF-CVE file.
skipping CVE-2021-3478 as CVE page is older than CVRF-CVE file.
skipping CVE-2021-3477 as CVE page is older than CVRF-CVE file.
skipping CVE-2021-3474 as CVE page is older than CVRF-CVE file.
skipping CVE-2021-3467 as CVE page is older than CVRF-CVE file.
skipping CVE-2021-3466 as CVE page is older than CVRF-CVE file.
skipping CVE-2021-3450 as CVE page is older than CVRF-CVE file.
skipping CVE-2021-3449 as CVE page is older than CVRF-CVE file.
no cpe found for SUSE Manager Tools Beta for SLE Micro 5 in CVE-2021-3447
no cpe found for SUSE Package Hub 15 SP4 in CVE-2021-3445
no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2021-3429
skipping CVE-2021-3443 as CVE page is older than CVRF-CVE file.
no cpe found for SUSE Package Hub 15 SP3 in CVE-2021-3427
no cpe found for SUSE Package Hub 15 SP4 in CVE-2021-3427
--- /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2021-3426.xml 2024-10-22 03:53:26.669158000 +0200
+++ /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2021-3426.xml.new 2024-10-29 02:03:42.376801000 +0100
@@ -14,13 +14,13 @@
1
- 252
- 2024-10-22T01:53:25Z
+ 253
+ 2024-10-29T01:03:41Z
current
2021-05-30T14:46:42Z
- 2024-10-22T01:53:25Z
+ 2024-10-29T01:03:41Z
cve-database/bin/generate-cvrf-cve.pl
2020-12-27T01:00:00Z
@@ -3289,6 +3289,24 @@
python313-x86-64-v3-3.13.0~b3-1.1
+
+ python314-3.14.0~a1-1.1
+
+
+ python314-curses-3.14.0~a1-1.1
+
+
+ python314-dbm-3.14.0~a1-1.1
+
+
+ python314-idle-3.14.0~a1-1.1
+
+
+ python314-tk-3.14.0~a1-1.1
+
+
+ python314-x86-64-v3-3.14.0~a1-1.1
+
python36
@@ -7972,6 +7990,24 @@
python313-x86-64-v3-3.13.0~b3-1.1 as a component of openSUSE Tumbleweed
+
+ python314-3.14.0~a1-1.1 as a component of openSUSE Tumbleweed
+
+
+ python314-curses-3.14.0~a1-1.1 as a component of openSUSE Tumbleweed
+
+
+ python314-dbm-3.14.0~a1-1.1 as a component of openSUSE Tumbleweed
+
+
+ python314-idle-3.14.0~a1-1.1 as a component of openSUSE Tumbleweed
+
+
+ python314-tk-3.14.0~a1-1.1 as a component of openSUSE Tumbleweed
+
+
+ python314-x86-64-v3-3.14.0~a1-1.1 as a component of openSUSE Tumbleweed
+
python36-3.6.15-1.1 as a component of openSUSE Tumbleweed
@@ -10458,6 +10494,12 @@
openSUSE Tumbleweed:python313-idle-3.13.0~b3-1.1
openSUSE Tumbleweed:python313-tk-3.13.0~b3-1.1
openSUSE Tumbleweed:python313-x86-64-v3-3.13.0~b3-1.1
+ openSUSE Tumbleweed:python314-3.14.0~a1-1.1
+ openSUSE Tumbleweed:python314-curses-3.14.0~a1-1.1
+ openSUSE Tumbleweed:python314-dbm-3.14.0~a1-1.1
+ openSUSE Tumbleweed:python314-idle-3.14.0~a1-1.1
+ openSUSE Tumbleweed:python314-tk-3.14.0~a1-1.1
+ openSUSE Tumbleweed:python314-x86-64-v3-3.14.0~a1-1.1
openSUSE Tumbleweed:python36-3.6.15-1.1
openSUSE Tumbleweed:python36-32bit-3.6.15-1.1
openSUSE Tumbleweed:python36-curses-3.6.15-1.1
skipping CVE-2021-3421 as CVE page is older than CVRF-CVE file.
skipping CVE-2021-3418 as CVE page is older than CVRF-CVE file.
skipping CVE-2021-3411 as CVE page is older than CVRF-CVE file.
skipping CVE-2021-3410 as CVE page is older than CVRF-CVE file.
skipping CVE-2021-3409 as CVE page is older than CVRF-CVE file.
skipping CVE-2021-3408 as CVE page is older than CVRF-CVE file.
skipping CVE-2021-3393 as CVE page is older than CVRF-CVE file.
skipping CVE-2021-3392 as CVE page is older than CVRF-CVE file.
skipping CVE-2021-3345 as CVE page is older than CVRF-CVE file.
skipping CVE-2021-3246 as CVE page is older than CVRF-CVE file.
skipping CVE-2021-3236 as CVE page is older than CVRF-CVE file.
skipping CVE-2021-3200 as CVE page is older than CVRF-CVE file.
no cpe found for SUSE Package Hub 15 SP3 in CVE-2021-3195
skipping CVE-2021-3185 as CVE page is older than CVRF-CVE file.
--- /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2021-3177.xml 2024-10-05 03:24:21.705422000 +0200
+++ /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2021-3177.xml.new 2024-10-29 02:03:52.771635000 +0100
@@ -14,13 +14,13 @@
1
- 161
- 2024-10-05T01:24:21Z
+ 162
+ 2024-10-29T01:03:52Z
current
2021-05-30T14:46:34Z
- 2024-10-05T01:24:21Z
+ 2024-10-29T01:03:52Z
cve-database/bin/generate-cvrf-cve.pl
2020-12-27T01:00:00Z
@@ -2425,6 +2425,24 @@
python313-x86-64-v3-3.13.0~b3-1.1
+
+ python314-3.14.0~a1-1.1
+
+
+ python314-curses-3.14.0~a1-1.1
+
+
+ python314-dbm-3.14.0~a1-1.1
+
+
+ python314-idle-3.14.0~a1-1.1
+
+
+ python314-tk-3.14.0~a1-1.1
+
+
+ python314-x86-64-v3-3.14.0~a1-1.1
+
python36-3.6.12-4.33.3
@@ -6724,6 +6742,24 @@
python313-x86-64-v3-3.13.0~b3-1.1 as a component of openSUSE Tumbleweed
+
+ python314-3.14.0~a1-1.1 as a component of openSUSE Tumbleweed
+
+
+ python314-curses-3.14.0~a1-1.1 as a component of openSUSE Tumbleweed
+
+
+ python314-dbm-3.14.0~a1-1.1 as a component of openSUSE Tumbleweed
+
+
+ python314-idle-3.14.0~a1-1.1 as a component of openSUSE Tumbleweed
+
+
+ python314-tk-3.14.0~a1-1.1 as a component of openSUSE Tumbleweed
+
+
+ python314-x86-64-v3-3.14.0~a1-1.1 as a component of openSUSE Tumbleweed
+
python36-3.6.15-1.1 as a component of openSUSE Tumbleweed
@@ -8278,6 +8314,12 @@
openSUSE Tumbleweed:python313-idle-3.13.0~b3-1.1
openSUSE Tumbleweed:python313-tk-3.13.0~b3-1.1
openSUSE Tumbleweed:python313-x86-64-v3-3.13.0~b3-1.1
+ openSUSE Tumbleweed:python314-3.14.0~a1-1.1
+ openSUSE Tumbleweed:python314-curses-3.14.0~a1-1.1
+ openSUSE Tumbleweed:python314-dbm-3.14.0~a1-1.1
+ openSUSE Tumbleweed:python314-idle-3.14.0~a1-1.1
+ openSUSE Tumbleweed:python314-tk-3.14.0~a1-1.1
+ openSUSE Tumbleweed:python314-x86-64-v3-3.14.0~a1-1.1
openSUSE Tumbleweed:python36-3.6.15-1.1
openSUSE Tumbleweed:python36-32bit-3.6.15-1.1
openSUSE Tumbleweed:python36-curses-3.6.15-1.1
CVE-2021-2471: no packages for Image SLES15-SP4-SAPCAL-GCE, but entry?
CVE-2021-2471: no packages for Image SLES15-SP6-SAP, but entry?
CVE-2021-2471: no packages for Image SLES15-SP3-SAPCAL-GCE, but entry?
CVE-2021-2471: no packages for Image SLES15-SP3-SAPCAL-EC2-HVM, but entry?
CVE-2021-2471: no packages for SUSE Manager Server 4.2, but entry?
CVE-2021-2471: no packages for Image SLES15-SP4-SAP-Azure-LI-BYOS, but entry?
CVE-2021-2471: no packages for SUSE Enterprise Storage 7.1, but entry?
CVE-2021-2471: no packages for SUSE Linux Enterprise Module for Development Tools 15 SP6, but entry?
CVE-2021-2471: no packages for Container suse/manager/5.0/x86_64/server:5.0.0-beta1.2.122, but entry?
CVE-2021-2471: no packages for Image SLES15-SP4-Manager-Server-4-3-EC2-llc, but entry?
CVE-2021-2471: no packages for SUSE Manager Retail Branch Server 4.2, but entry?
CVE-2021-2471: no packages for Image SLES15-SP4-SAP, but entry?
CVE-2021-2471: no packages for SUSE Linux Enterprise Server 15 SP2-LTSS, but entry?
CVE-2021-2471: no packages for Image SLES15-SP6-SAP-Azure-LI-BYOS-Production, but entry?
CVE-2021-2471: no packages for SUSE Linux Enterprise Module for Package Hub 15 SP4, but entry?
CVE-2021-2471: no packages for Image SLES15-SP2-SAP-BYOS-Azure, but entry?
CVE-2021-2471: no packages for SUSE Linux Enterprise Module for Development Tools 15 SP5, but entry?
CVE-2021-2471: no packages for Image SLES15-SP5-SAP-EC2, but entry?
CVE-2021-2471: no packages for Container bci/openjdk:latest, but entry?
CVE-2021-2471: no packages for SUSE Linux Enterprise Module for Development Tools 15 SP4, but entry?
CVE-2021-2471: no packages for SUSE Linux Enterprise Module for Web and Scripting 15 SP6, but entry?
CVE-2021-2471: no packages for Image SLES15-SP4-SAPCAL, but entry?
CVE-2021-2471: no packages for Image SLES15-SP6-SAPCAL-EC2, but entry?
CVE-2021-2471: no packages for SUSE Linux Enterprise Module for Basesystem 15 SP4, but entry?
CVE-2021-2471: no packages for SUSE Linux Enterprise Module for Package Hub 15 SP6, but entry?
CVE-2021-2471: no packages for SUSE Linux Enterprise Server 15 SP3-LTSS, but entry?
CVE-2021-2471: no packages for Container bci/openjdk:17-7.1, but entry?
CVE-2021-2471: no packages for Image SLES15-SP4-Manager-Server-4-3-EC2-ltd, but entry?
CVE-2021-2471: no packages for Image SLES15-SP3-SAP-Azure-VLI-BYOS-Production, but entry?
CVE-2021-2471: no packages for Image SLES15-SP2-SAP-Azure-VLI-BYOS-Production, but entry?
CVE-2021-2471: no packages for Image SLES15-SP2-SAP-BYOS-EC2-HVM, but entry?
CVE-2021-2471: no packages for Container suse/manager/5.0/x86_64/server-attestation:5.0.0-beta2.2.16, but entry?
CVE-2021-2471: no packages for SUSE CaaS Platform 4.0, but entry?
CVE-2021-2471: no packages for Image SLES15-SP4-SAP-Azure-VLI-BYOS-Production, but entry?
CVE-2021-2471: no packages for Image SLES15-SP5-SAP-Azure-LI-BYOS, but entry?
CVE-2021-2471: no packages for SUSE Manager Server Module 4.2, but entry?
CVE-2021-2471: no packages for Image SLES15-SP6-SAP-GCE, but entry?
CVE-2021-2471: no packages for Image SLES15-SP4-Manager-Server-4-3-BYOS-Azure, but entry?
CVE-2021-2471: no packages for Image SLES15-SP6-SAPCAL-GCE, but entry?
CVE-2021-2471: no packages for Container bci/openjdk-devel:11-6.2, but entry?
CVE-2021-2471: no packages for Image SLES15-SP5-SAP-GCE, but entry?
CVE-2021-2471: no packages for SUSE Linux Enterprise Workstation Extension 15 SP5, but entry?
CVE-2021-2471: no packages for Container bci/openjdk-devel:17-7.2, but entry?
CVE-2021-2471: no packages for Image SLES15-SP5-SAPCAL-Azure, but entry?
CVE-2021-2471: no packages for SUSE Linux Enterprise Server for SAP Applications 15 SP2, but entry?
CVE-2021-2471: no packages for SUSE Manager Server Module 4.3, but entry?
CVE-2021-2471: no packages for Image SLES15-SP6-SAP-Azure-VLI-BYOS-Production, but entry?
CVE-2021-2471: no packages for SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS, but entry?
CVE-2021-2471: no packages for SUSE Linux Enterprise Workstation Extension 15 SP6, but entry?
CVE-2021-2471: no packages for SUSE Enterprise Storage 7, but entry?
CVE-2021-2471: no packages for SUSE Linux Enterprise Server 15 SP4-TERADATA, but entry?
CVE-2021-2471: no packages for Image SLES15-SP4-SAP-Azure-VLI-BYOS, but entry?
CVE-2021-2471: no packages for Image SLES15-SP6-SAP-Azure-LI-BYOS, but entry?
CVE-2021-2471: no packages for Image SLES15-SP4-SAP-GCE, but entry?
CVE-2021-2471: no packages for Container bci/kiwi:9.24.43-8.6, but entry?
CVE-2021-2471: no packages for Image SLES15-SP2-SAP-GCE, but entry?
CVE-2021-2471: no packages for Image SLES15-SP2-SAP-Azure, but entry?
CVE-2021-2471: no packages for SUSE Linux Enterprise Module for Basesystem 15 SP5, but entry?
CVE-2021-2471: no packages for Image SLES15-SP4-SAP-Azure-LI-BYOS-Production, but entry?
CVE-2021-2471: no packages for Image SLES15-SP2-SAP-Azure-LI-BYOS-Production, but entry?
CVE-2021-2471: no packages for Image SLES15-SP4-Manager-Server-4-3-BYOS, but entry?
CVE-2021-2471: no packages for SUSE Manager Proxy 4.2, but entry?
CVE-2021-2471: no packages for SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS, but entry?
CVE-2021-2471: no packages for Image SLES15-SP4-Manager-Server-4-3, but entry?
CVE-2021-2471: no packages for SUSE Linux Enterprise Workstation Extension 15 SP4, but entry?
CVE-2021-2471: no packages for SUSE Linux Enterprise Module for Package Hub 15 SP5, but entry?
CVE-2021-2471: no packages for Image SLES15-SP4-SAP-Azure, but entry?
CVE-2021-2471: no packages for Image SLES15-SP4-Manager-Server-4-3-Azure-ltd, but entry?
CVE-2021-2471: no packages for SUSE Linux Enterprise Module for Web and Scripting 15 SP5, but entry?
CVE-2021-2471: no packages for SUSE Linux Enterprise Real Time 15 SP3, but entry?
CVE-2021-2471: no packages for Image SLES15-SP3-Manager-4-2-Server-BYOS-GCE, but entry?
CVE-2021-2471: no packages for Image SLES15-SP4-Manager-Server-4-3-Azure-llc, but entry?
CVE-2021-2471: no packages for Image SLES15-SP2-SAP-BYOS-GCE, but entry?
CVE-2021-2471: no packages for Image SLES15-SP5-SAP-Azure-LI-BYOS-Production, but entry?
CVE-2021-2471: no packages for SUSE Linux Enterprise Module for Basesystem 15 SP6, but entry?
CVE-2021-2471: no packages for Image SLES15-SP6-SAPCAL, but entry?
CVE-2021-2471: no packages for Image SLES15-SP5-SAP-Azure-VLI-BYOS, but entry?
CVE-2021-2471: no packages for Image SLES15-SP3-SAPCAL-Azure, but entry?
CVE-2021-2471: no packages for Image SLES15-SP6-SAPCAL-Azure, but entry?
CVE-2021-2471: no packages for Image SLES15-SP6-SAP-Azure-VLI-BYOS, but entry?
CVE-2021-2471: no packages for Image SLES15-SP5-SAP-Azure, but entry?
CVE-2021-2471: no packages for Image SLES15-SP5-SAP-Azure-VLI-BYOS-Production, but entry?
CVE-2021-2471: no packages for Image SLES15-SP6-SAP-Azure, but entry?
CVE-2021-2471: no packages for Image SLES15-SP5-SAPCAL-GCE, but entry?
CVE-2021-2471: no packages for Image SLES15-SP4-Manager-Server-4-3-BYOS-EC2, but entry?
CVE-2021-2471: no packages for Image SLES15-SP3-Manager-4-2-Server-BYOS-EC2-HVM, but entry?
CVE-2021-2471: no packages for Image SLES15-SP4-Manager-Server-4-3-BYOS-GCE, but entry?
CVE-2021-2471: no packages for SUSE Linux Enterprise Server 15 SP1-LTSS, but entry?
CVE-2021-2471: no packages for Image SLES15-SP2-SAP-EC2-HVM, but entry?
CVE-2021-2471: no packages for Image SLES15-SP3-SAP-Azure-LI-BYOS-Production, but entry?
CVE-2021-2471: no packages for SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS, but entry?
CVE-2021-2471: no packages for SUSE Linux Enterprise Server for SAP Applications 15 SP3, but entry?
CVE-2021-2471: no packages for Image SLES15-SP6-SAP-EC2, but entry?
CVE-2021-2471: no packages for SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS, but entry?
CVE-2021-2471: no packages for Image SLES15-SP4-SAP-EC2, but entry?
CVE-2021-2471: no packages for SUSE Linux Enterprise Server for SAP Applications 15 SP1, but entry?
CVE-2021-2471: no packages for Container bci/openjdk:11-7.1, but entry?
CVE-2021-2471: no packages for Container bci/openjdk-devel:17-14.11, but entry?
CVE-2021-2471: no packages for SUSE Linux Enterprise Module for Web and Scripting 15 SP4, but entry?
CVE-2021-2471: no packages for Image SLES15-SP4-SAPCAL-EC2, but entry?
CVE-2021-2471: no packages for Image SLES15-SP5-SAPCAL-EC2, but entry?
CVE-2021-2471: no packages for Image SLES15-SP4-SAPCAL-Azure, but entry?
CVE-2021-2471: no packages for Image SLES15-SP3-Manager-4-2-Server-BYOS-Azure, but entry?
CVE-2021-2471: no packages for Container bci/kiwi:9.24.43-8.6, but entry?
CVE-2021-2471: no packages for Container bci/openjdk-devel:11-6.2, but entry?
CVE-2021-2471: no packages for Container bci/openjdk-devel:17-14.11, but entry?
CVE-2021-2471: no packages for Container bci/openjdk-devel:17-7.2, but entry?
CVE-2021-2471: no packages for Container bci/openjdk:11-7.1, but entry?
CVE-2021-2471: no packages for Container bci/openjdk:17-7.1, but entry?
CVE-2021-2471: no packages for Container bci/openjdk:latest, but entry?
CVE-2021-2471: no packages for Container suse/manager/5.0/x86_64/server-attestation:5.0.0-beta2.2.16, but entry?
CVE-2021-2471: no packages for Container suse/manager/5.0/x86_64/server:5.0.0-beta1.2.122, but entry?
CVE-2021-2471: no packages for Image SLES15-SP2-SAP-Azure, but entry?
CVE-2021-2471: no packages for Image SLES15-SP2-SAP-Azure-LI-BYOS-Production, but entry?
CVE-2021-2471: no packages for Image SLES15-SP2-SAP-Azure-VLI-BYOS-Production, but entry?
CVE-2021-2471: no packages for Image SLES15-SP2-SAP-BYOS-Azure, but entry?
CVE-2021-2471: no packages for Image SLES15-SP2-SAP-BYOS-EC2-HVM, but entry?
CVE-2021-2471: no packages for Image SLES15-SP2-SAP-BYOS-GCE, but entry?
CVE-2021-2471: no packages for Image SLES15-SP2-SAP-EC2-HVM, but entry?
CVE-2021-2471: no packages for Image SLES15-SP2-SAP-GCE, but entry?
CVE-2021-2471: no packages for Image SLES15-SP3-Manager-4-2-Server-BYOS-Azure, but entry?
CVE-2021-2471: no packages for Image SLES15-SP3-Manager-4-2-Server-BYOS-EC2-HVM, but entry?
CVE-2021-2471: no packages for Image SLES15-SP3-Manager-4-2-Server-BYOS-GCE, but entry?
CVE-2021-2471: no packages for Image SLES15-SP3-SAP-Azure-LI-BYOS-Production, but entry?
CVE-2021-2471: no packages for Image SLES15-SP3-SAP-Azure-VLI-BYOS-Production, but entry?
CVE-2021-2471: no packages for Image SLES15-SP3-SAPCAL-Azure, but entry?
CVE-2021-2471: no packages for Image SLES15-SP3-SAPCAL-EC2-HVM, but entry?
CVE-2021-2471: no packages for Image SLES15-SP3-SAPCAL-GCE, but entry?
CVE-2021-2471: no packages for Image SLES15-SP4-Manager-Server-4-3, but entry?
CVE-2021-2471: no packages for Image SLES15-SP4-Manager-Server-4-3-Azure-llc, but entry?
CVE-2021-2471: no packages for Image SLES15-SP4-Manager-Server-4-3-Azure-ltd, but entry?
CVE-2021-2471: no packages for Image SLES15-SP4-Manager-Server-4-3-BYOS, but entry?
CVE-2021-2471: no packages for Image SLES15-SP4-Manager-Server-4-3-BYOS-Azure, but entry?
CVE-2021-2471: no packages for Image SLES15-SP4-Manager-Server-4-3-BYOS-EC2, but entry?
CVE-2021-2471: no packages for Image SLES15-SP4-Manager-Server-4-3-BYOS-GCE, but entry?
CVE-2021-2471: no packages for Image SLES15-SP4-Manager-Server-4-3-EC2-llc, but entry?
CVE-2021-2471: no packages for Image SLES15-SP4-Manager-Server-4-3-EC2-ltd, but entry?
CVE-2021-2471: no packages for Image SLES15-SP4-SAP, but entry?
CVE-2021-2471: no packages for Image SLES15-SP4-SAP-Azure, but entry?
CVE-2021-2471: no packages for Image SLES15-SP4-SAP-Azure-LI-BYOS, but entry?
CVE-2021-2471: no packages for Image SLES15-SP4-SAP-Azure-LI-BYOS-Production, but entry?
CVE-2021-2471: no packages for Image SLES15-SP4-SAP-Azure-VLI-BYOS, but entry?
CVE-2021-2471: no packages for Image SLES15-SP4-SAP-Azure-VLI-BYOS-Production, but entry?
CVE-2021-2471: no packages for Image SLES15-SP4-SAP-EC2, but entry?
CVE-2021-2471: no packages for Image SLES15-SP4-SAP-GCE, but entry?
CVE-2021-2471: no packages for Image SLES15-SP4-SAPCAL, but entry?
CVE-2021-2471: no packages for Image SLES15-SP4-SAPCAL-Azure, but entry?
CVE-2021-2471: no packages for Image SLES15-SP4-SAPCAL-EC2, but entry?
CVE-2021-2471: no packages for Image SLES15-SP4-SAPCAL-GCE, but entry?
CVE-2021-2471: no packages for Image SLES15-SP5-SAP-Azure, but entry?
CVE-2021-2471: no packages for Image SLES15-SP5-SAP-Azure-LI-BYOS, but entry?
CVE-2021-2471: no packages for Image SLES15-SP5-SAP-Azure-LI-BYOS-Production, but entry?
CVE-2021-2471: no packages for Image SLES15-SP5-SAP-Azure-VLI-BYOS, but entry?
CVE-2021-2471: no packages for Image SLES15-SP5-SAP-Azure-VLI-BYOS-Production, but entry?
CVE-2021-2471: no packages for Image SLES15-SP5-SAP-EC2, but entry?
CVE-2021-2471: no packages for Image SLES15-SP5-SAP-GCE, but entry?
CVE-2021-2471: no packages for Image SLES15-SP5-SAPCAL-Azure, but entry?
CVE-2021-2471: no packages for Image SLES15-SP5-SAPCAL-EC2, but entry?
CVE-2021-2471: no packages for Image SLES15-SP5-SAPCAL-GCE, but entry?
CVE-2021-2471: no packages for Image SLES15-SP6-SAP, but entry?
CVE-2021-2471: no packages for Image SLES15-SP6-SAP-Azure, but entry?
CVE-2021-2471: no packages for Image SLES15-SP6-SAP-Azure-LI-BYOS, but entry?
CVE-2021-2471: no packages for Image SLES15-SP6-SAP-Azure-LI-BYOS-Production, but entry?
CVE-2021-2471: no packages for Image SLES15-SP6-SAP-Azure-VLI-BYOS, but entry?
CVE-2021-2471: no packages for Image SLES15-SP6-SAP-Azure-VLI-BYOS-Production, but entry?
CVE-2021-2471: no packages for Image SLES15-SP6-SAP-EC2, but entry?
CVE-2021-2471: no packages for Image SLES15-SP6-SAP-GCE, but entry?
CVE-2021-2471: no packages for Image SLES15-SP6-SAPCAL, but entry?
CVE-2021-2471: no packages for Image SLES15-SP6-SAPCAL-Azure, but entry?
CVE-2021-2471: no packages for Image SLES15-SP6-SAPCAL-EC2, but entry?
CVE-2021-2471: no packages for Image SLES15-SP6-SAPCAL-GCE, but entry?
CVE-2021-2471: no packages for SUSE CaaS Platform 4.0, but entry?
CVE-2021-2471: no packages for SUSE Enterprise Storage 7, but entry?
CVE-2021-2471: no packages for SUSE Enterprise Storage 7.1, but entry?
CVE-2021-2471: no packages for SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS, but entry?
CVE-2021-2471: no packages for SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS, but entry?
CVE-2021-2471: no packages for SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS, but entry?
CVE-2021-2471: no packages for SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS, but entry?
CVE-2021-2471: no packages for SUSE Linux Enterprise Module for Basesystem 15 SP4, but entry?
CVE-2021-2471: no packages for SUSE Linux Enterprise Module for Basesystem 15 SP5, but entry?
CVE-2021-2471: no packages for SUSE Linux Enterprise Module for Basesystem 15 SP6, but entry?
CVE-2021-2471: no packages for SUSE Linux Enterprise Module for Development Tools 15 SP4, but entry?
CVE-2021-2471: no packages for SUSE Linux Enterprise Module for Development Tools 15 SP5, but entry?
CVE-2021-2471: no packages for SUSE Linux Enterprise Module for Development Tools 15 SP6, but entry?
CVE-2021-2471: no packages for SUSE Linux Enterprise Module for Package Hub 15 SP4, but entry?
CVE-2021-2471: no packages for SUSE Linux Enterprise Module for Package Hub 15 SP5, but entry?
CVE-2021-2471: no packages for SUSE Linux Enterprise Module for Package Hub 15 SP6, but entry?
CVE-2021-2471: no packages for SUSE Linux Enterprise Module for Web and Scripting 15 SP4, but entry?
CVE-2021-2471: no packages for SUSE Linux Enterprise Module for Web and Scripting 15 SP5, but entry?
CVE-2021-2471: no packages for SUSE Linux Enterprise Module for Web and Scripting 15 SP6, but entry?
CVE-2021-2471: no packages for SUSE Linux Enterprise Real Time 15 SP3, but entry?
CVE-2021-2471: no packages for SUSE Linux Enterprise Server 15 SP1-LTSS, but entry?
CVE-2021-2471: no packages for SUSE Linux Enterprise Server 15 SP2-LTSS, but entry?
CVE-2021-2471: no packages for SUSE Linux Enterprise Server 15 SP3-LTSS, but entry?
CVE-2021-2471: no packages for SUSE Linux Enterprise Server 15 SP4-TERADATA, but entry?
CVE-2021-2471: no packages for SUSE Linux Enterprise Server for SAP Applications 15 SP1, but entry?
CVE-2021-2471: no packages for SUSE Linux Enterprise Server for SAP Applications 15 SP2, but entry?
CVE-2021-2471: no packages for SUSE Linux Enterprise Server for SAP Applications 15 SP3, but entry?
CVE-2021-2471: no packages for SUSE Linux Enterprise Workstation Extension 15 SP4, but entry?
CVE-2021-2471: no packages for SUSE Linux Enterprise Workstation Extension 15 SP5, but entry?
CVE-2021-2471: no packages for SUSE Linux Enterprise Workstation Extension 15 SP6, but entry?
CVE-2021-2471: no packages for SUSE Manager Proxy 4.2, but entry?
CVE-2021-2471: no packages for SUSE Manager Retail Branch Server 4.2, but entry?
CVE-2021-2471: no packages for SUSE Manager Server 4.2, but entry?
CVE-2021-2471: no packages for SUSE Manager Server Module 4.2, but entry?
CVE-2021-2471: no packages for SUSE Manager Server Module 4.3, but entry?
CVE-2021-2471: no packages for Container bci/kiwi:9.24.43-8.6, but entry?
CVE-2021-2471: no packages for Container bci/openjdk-devel:11-6.2, but entry?
CVE-2021-2471: no packages for Container bci/openjdk-devel:17-14.11, but entry?
CVE-2021-2471: no packages for Container bci/openjdk-devel:17-7.2, but entry?
CVE-2021-2471: no packages for Container bci/openjdk:11-7.1, but entry?
CVE-2021-2471: no packages for Container bci/openjdk:17-7.1, but entry?
CVE-2021-2471: no packages for Container bci/openjdk:latest, but entry?
CVE-2021-2471: no packages for Container suse/manager/5.0/x86_64/server-attestation:5.0.0-beta2.2.16, but entry?
CVE-2021-2471: no packages for Container suse/manager/5.0/x86_64/server:5.0.0-beta1.2.122, but entry?
CVE-2021-2471: no packages for Image SLES15-SP2-SAP-Azure, but entry?
CVE-2021-2471: no packages for Image SLES15-SP2-SAP-Azure-LI-BYOS-Production, but entry?
CVE-2021-2471: no packages for Image SLES15-SP2-SAP-Azure-VLI-BYOS-Production, but entry?
CVE-2021-2471: no packages for Image SLES15-SP2-SAP-BYOS-Azure, but entry?
CVE-2021-2471: no packages for Image SLES15-SP2-SAP-BYOS-EC2-HVM, but entry?
CVE-2021-2471: no packages for Image SLES15-SP2-SAP-BYOS-GCE, but entry?
CVE-2021-2471: no packages for Image SLES15-SP2-SAP-EC2-HVM, but entry?
CVE-2021-2471: no packages for Image SLES15-SP2-SAP-GCE, but entry?
CVE-2021-2471: no packages for Image SLES15-SP3-Manager-4-2-Server-BYOS-Azure, but entry?
CVE-2021-2471: no packages for Image SLES15-SP3-Manager-4-2-Server-BYOS-EC2-HVM, but entry?
CVE-2021-2471: no packages for Image SLES15-SP3-Manager-4-2-Server-BYOS-GCE, but entry?
CVE-2021-2471: no packages for Image SLES15-SP3-SAP-Azure-LI-BYOS-Production, but entry?
CVE-2021-2471: no packages for Image SLES15-SP3-SAP-Azure-VLI-BYOS-Production, but entry?
CVE-2021-2471: no packages for Image SLES15-SP3-SAPCAL-Azure, but entry?
CVE-2021-2471: no packages for Image SLES15-SP3-SAPCAL-EC2-HVM, but entry?
CVE-2021-2471: no packages for Image SLES15-SP3-SAPCAL-GCE, but entry?
CVE-2021-2471: no packages for Image SLES15-SP4-Manager-Server-4-3, but entry?
CVE-2021-2471: no packages for Image SLES15-SP4-Manager-Server-4-3-Azure-llc, but entry?
CVE-2021-2471: no packages for Image SLES15-SP4-Manager-Server-4-3-Azure-ltd, but entry?
CVE-2021-2471: no packages for Image SLES15-SP4-Manager-Server-4-3-BYOS, but entry?
CVE-2021-2471: no packages for Image SLES15-SP4-Manager-Server-4-3-BYOS-Azure, but entry?
CVE-2021-2471: no packages for Image SLES15-SP4-Manager-Server-4-3-BYOS-EC2, but entry?
CVE-2021-2471: no packages for Image SLES15-SP4-Manager-Server-4-3-BYOS-GCE, but entry?
CVE-2021-2471: no packages for Image SLES15-SP4-Manager-Server-4-3-EC2-llc, but entry?
CVE-2021-2471: no packages for Image SLES15-SP4-Manager-Server-4-3-EC2-ltd, but entry?
CVE-2021-2471: no packages for Image SLES15-SP4-SAP, but entry?
CVE-2021-2471: no packages for Image SLES15-SP4-SAP-Azure, but entry?
CVE-2021-2471: no packages for Image SLES15-SP4-SAP-Azure-LI-BYOS, but entry?
CVE-2021-2471: no packages for Image SLES15-SP4-SAP-Azure-LI-BYOS-Production, but entry?
CVE-2021-2471: no packages for Image SLES15-SP4-SAP-Azure-VLI-BYOS, but entry?
CVE-2021-2471: no packages for Image SLES15-SP4-SAP-Azure-VLI-BYOS-Production, but entry?
CVE-2021-2471: no packages for Image SLES15-SP4-SAP-EC2, but entry?
CVE-2021-2471: no packages for Image SLES15-SP4-SAP-GCE, but entry?
CVE-2021-2471: no packages for Image SLES15-SP4-SAPCAL, but entry?
CVE-2021-2471: no packages for Image SLES15-SP4-SAPCAL-Azure, but entry?
CVE-2021-2471: no packages for Image SLES15-SP4-SAPCAL-EC2, but entry?
CVE-2021-2471: no packages for Image SLES15-SP4-SAPCAL-GCE, but entry?
CVE-2021-2471: no packages for Image SLES15-SP5-SAP-Azure, but entry?
CVE-2021-2471: no packages for Image SLES15-SP5-SAP-Azure-LI-BYOS, but entry?
CVE-2021-2471: no packages for Image SLES15-SP5-SAP-Azure-LI-BYOS-Production, but entry?
CVE-2021-2471: no packages for Image SLES15-SP5-SAP-Azure-VLI-BYOS, but entry?
CVE-2021-2471: no packages for Image SLES15-SP5-SAP-Azure-VLI-BYOS-Production, but entry?
CVE-2021-2471: no packages for Image SLES15-SP5-SAP-EC2, but entry?
CVE-2021-2471: no packages for Image SLES15-SP5-SAP-GCE, but entry?
CVE-2021-2471: no packages for Image SLES15-SP5-SAPCAL-Azure, but entry?
CVE-2021-2471: no packages for Image SLES15-SP5-SAPCAL-EC2, but entry?
CVE-2021-2471: no packages for Image SLES15-SP5-SAPCAL-GCE, but entry?
CVE-2021-2471: no packages for Image SLES15-SP6-SAP, but entry?
CVE-2021-2471: no packages for Image SLES15-SP6-SAP-Azure, but entry?
CVE-2021-2471: no packages for Image SLES15-SP6-SAP-Azure-LI-BYOS, but entry?
CVE-2021-2471: no packages for Image SLES15-SP6-SAP-Azure-LI-BYOS-Production, but entry?
CVE-2021-2471: no packages for Image SLES15-SP6-SAP-Azure-VLI-BYOS, but entry?
CVE-2021-2471: no packages for Image SLES15-SP6-SAP-Azure-VLI-BYOS-Production, but entry?
CVE-2021-2471: no packages for Image SLES15-SP6-SAP-EC2, but entry?
CVE-2021-2471: no packages for Image SLES15-SP6-SAP-GCE, but entry?
CVE-2021-2471: no packages for Image SLES15-SP6-SAPCAL, but entry?
CVE-2021-2471: no packages for Image SLES15-SP6-SAPCAL-Azure, but entry?
CVE-2021-2471: no packages for Image SLES15-SP6-SAPCAL-EC2, but entry?
CVE-2021-2471: no packages for Image SLES15-SP6-SAPCAL-GCE, but entry?
CVE-2021-2471: no packages for SUSE CaaS Platform 4.0, but entry?
CVE-2021-2471: no packages for SUSE Enterprise Storage 7, but entry?
CVE-2021-2471: no packages for SUSE Enterprise Storage 7.1, but entry?
CVE-2021-2471: no packages for SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS, but entry?
CVE-2021-2471: no packages for SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS, but entry?
CVE-2021-2471: no packages for SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS, but entry?
CVE-2021-2471: no packages for SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS, but entry?
CVE-2021-2471: no packages for SUSE Linux Enterprise Module for Basesystem 15 SP4, but entry?
CVE-2021-2471: no packages for SUSE Linux Enterprise Module for Basesystem 15 SP5, but entry?
CVE-2021-2471: no packages for SUSE Linux Enterprise Module for Basesystem 15 SP6, but entry?
CVE-2021-2471: no packages for SUSE Linux Enterprise Module for Development Tools 15 SP4, but entry?
CVE-2021-2471: no packages for SUSE Linux Enterprise Module for Development Tools 15 SP5, but entry?
CVE-2021-2471: no packages for SUSE Linux Enterprise Module for Development Tools 15 SP6, but entry?
CVE-2021-2471: no packages for SUSE Linux Enterprise Module for Package Hub 15 SP4, but entry?
CVE-2021-2471: no packages for SUSE Linux Enterprise Module for Package Hub 15 SP5, but entry?
CVE-2021-2471: no packages for SUSE Linux Enterprise Module for Package Hub 15 SP6, but entry?
CVE-2021-2471: no packages for SUSE Linux Enterprise Module for Web and Scripting 15 SP4, but entry?
CVE-2021-2471: no packages for SUSE Linux Enterprise Module for Web and Scripting 15 SP5, but entry?
CVE-2021-2471: no packages for SUSE Linux Enterprise Module for Web and Scripting 15 SP6, but entry?
CVE-2021-2471: no packages for SUSE Linux Enterprise Real Time 15 SP3, but entry?
CVE-2021-2471: no packages for SUSE Linux Enterprise Server 15 SP1-LTSS, but entry?
CVE-2021-2471: no packages for SUSE Linux Enterprise Server 15 SP2-LTSS, but entry?
CVE-2021-2471: no packages for SUSE Linux Enterprise Server 15 SP3-LTSS, but entry?
CVE-2021-2471: no packages for SUSE Linux Enterprise Server 15 SP4-TERADATA, but entry?
CVE-2021-2471: no packages for SUSE Linux Enterprise Server for SAP Applications 15 SP1, but entry?
CVE-2021-2471: no packages for SUSE Linux Enterprise Server for SAP Applications 15 SP2, but entry?
CVE-2021-2471: no packages for SUSE Linux Enterprise Server for SAP Applications 15 SP3, but entry?
CVE-2021-2471: no packages for SUSE Linux Enterprise Workstation Extension 15 SP4, but entry?
CVE-2021-2471: no packages for SUSE Linux Enterprise Workstation Extension 15 SP5, but entry?
CVE-2021-2471: no packages for SUSE Linux Enterprise Workstation Extension 15 SP6, but entry?
CVE-2021-2471: no packages for SUSE Manager Proxy 4.2, but entry?
CVE-2021-2471: no packages for SUSE Manager Retail Branch Server 4.2, but entry?
CVE-2021-2471: no packages for SUSE Manager Server 4.2, but entry?
CVE-2021-2471: no packages for SUSE Manager Server Module 4.2, but entry?
CVE-2021-2471: no packages for SUSE Manager Server Module 4.3, but entry?
skipping CVE-2021-2432 as CVE page is older than CVRF-CVE file.
skipping CVE-2021-2389 as CVE page is older than CVRF-CVE file.
skipping CVE-2021-2388 as CVE page is older than CVRF-CVE file.
skipping CVE-2021-2372 as CVE page is older than CVRF-CVE file.
skipping CVE-2021-2341 as CVE page is older than CVRF-CVE file.
skipping CVE-2021-2161 as CVE page is older than CVRF-CVE file.
skipping CVE-2021-1826 as CVE page is older than CVRF-CVE file.
skipping CVE-2021-1825 as CVE page is older than CVRF-CVE file.
skipping CVE-2021-1820 as CVE page is older than CVRF-CVE file.
skipping CVE-2021-1817 as CVE page is older than CVRF-CVE file.
skipping CVE-2021-1048 as CVE page is older than CVRF-CVE file.
skipping CVE-2021-1043 as CVE page is older than CVRF-CVE file.
skipping CVE-2021-0961 as CVE page is older than CVRF-CVE file.
skipping CVE-2021-0939 as CVE page is older than CVRF-CVE file.
skipping CVE-2021-0938 as CVE page is older than CVRF-CVE file.
skipping CVE-2021-0929 as CVE page is older than CVRF-CVE file.
skipping CVE-2021-0924 as CVE page is older than CVRF-CVE file.
skipping CVE-2021-0707 as CVE page is older than CVRF-CVE file.
skipping CVE-2021-0606 as CVE page is older than CVRF-CVE file.
skipping CVE-2021-0561 as CVE page is older than CVRF-CVE file.
skipping CVE-2021-0183 as CVE page is older than CVRF-CVE file.
skipping CVE-2021-0176 as CVE page is older than CVRF-CVE file.
skipping CVE-2021-0175 as CVE page is older than CVRF-CVE file.
skipping CVE-2021-0174 as CVE page is older than CVRF-CVE file.
skipping CVE-2021-0173 as CVE page is older than CVRF-CVE file.
skipping CVE-2021-0172 as CVE page is older than CVRF-CVE file.
skipping CVE-2021-0170 as CVE page is older than CVRF-CVE file.
skipping CVE-2021-0168 as CVE page is older than CVRF-CVE file.
skipping CVE-2021-0166 as CVE page is older than CVRF-CVE file.
skipping CVE-2021-0165 as CVE page is older than CVRF-CVE file.
skipping CVE-2021-0164 as CVE page is older than CVRF-CVE file.
skipping CVE-2021-0161 as CVE page is older than CVRF-CVE file.
skipping CVE-2021-0076 as CVE page is older than CVRF-CVE file.
skipping CVE-2021-0072 as CVE page is older than CVRF-CVE file.
skipping CVE-2021-0071 as CVE page is older than CVRF-CVE file.
skipping CVE-2021-0066 as CVE page is older than CVRF-CVE file.
skipping CVE-2020-36788 as CVE page is older than CVRF-CVE file.
skipping CVE-2020-36787 as CVE page is older than CVRF-CVE file.
skipping CVE-2020-36786 as CVE page is older than CVRF-CVE file.
skipping CVE-2020-36785 as CVE page is older than CVRF-CVE file.
skipping CVE-2020-36784 as CVE page is older than CVRF-CVE file.
skipping CVE-2020-36783 as CVE page is older than CVRF-CVE file.
skipping CVE-2020-36782 as CVE page is older than CVRF-CVE file.
skipping CVE-2020-36781 as CVE page is older than CVRF-CVE file.
skipping CVE-2020-36780 as CVE page is older than CVRF-CVE file.
skipping CVE-2020-36779 as CVE page is older than CVRF-CVE file.
skipping CVE-2020-36778 as CVE page is older than CVRF-CVE file.
skipping CVE-2020-36777 as CVE page is older than CVRF-CVE file.
skipping CVE-2020-36776 as CVE page is older than CVRF-CVE file.
skipping CVE-2020-36775 as CVE page is older than CVRF-CVE file.
skipping CVE-2020-36773 as CVE page is older than CVRF-CVE file.
skipping CVE-2020-36694 as CVE page is older than CVRF-CVE file.
no cpe found for SUSE Package Hub 15 SP3 in CVE-2020-36619
no cpe found for SUSE Package Hub 15 SP4 in CVE-2020-36619
no cpe found for SUSE Liberty Linux 7 LTSS in CVE-2020-36558
no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2020-36516
skipping CVE-2020-36518 as CVE page is older than CVRF-CVE file.
no cpe found for SUSE Package Hub 15 SP4 in CVE-2020-36428
skipping CVE-2020-36430 as CVE page is older than CVRF-CVE file.
no cpe found for SUSE Package Hub 15 SP2 in CVE-2020-36403
no cpe found for SUSE Package Hub 15 SP3 in CVE-2020-36403
skipping CVE-2020-36394 as CVE page is older than CVRF-CVE file.
skipping CVE-2020-36387 as CVE page is older than CVRF-CVE file.
skipping CVE-2020-36332 as CVE page is older than CVRF-CVE file.
skipping CVE-2020-36331 as CVE page is older than CVRF-CVE file.
skipping CVE-2020-36330 as CVE page is older than CVRF-CVE file.
skipping CVE-2020-36329 as CVE page is older than CVRF-CVE file.
skipping CVE-2020-36328 as CVE page is older than CVRF-CVE file.
skipping CVE-2020-36314 as CVE page is older than CVRF-CVE file.
skipping CVE-2020-36313 as CVE page is older than CVRF-CVE file.
CVE-2020-36242: no packages for Image SLES15-SP5-SAP-Azure-LI-BYOS, but entry?
CVE-2020-36242: no packages for Image SLES15-SP4-SAP-Azure-VLI-BYOS-Production, but entry?
CVE-2020-36242: no packages for SUSE Linux Enterprise Module for Server Applications 15 SP4, but entry?
CVE-2020-36242: no packages for SUSE Linux Enterprise Module for Server Applications 15 SP5, but entry?
CVE-2020-36242: no packages for SUSE Linux Enterprise Module for Public Cloud 15 SP6, but entry?
CVE-2020-36242: no packages for SUSE Linux Enterprise Module for Public Cloud 15 SP3, but entry?
CVE-2020-36242: no packages for Image SLES15-SP4-SAP-Azure-VLI-BYOS, but entry?
CVE-2020-36242: no packages for Image SLES15-SP6-SAP-Azure-LI-BYOS, but entry?
CVE-2020-36242: no packages for SUSE Linux Enterprise Module for Public Cloud 15 SP2, but entry?
CVE-2020-36242: no packages for Image SLES15-SP6-SAP-Azure-VLI-BYOS-Production, but entry?
CVE-2020-36242: no packages for SUSE Linux Enterprise Installer Updates 15 SP1, but entry?
CVE-2020-36242: no packages for Image SLES15-SP6-SAP-Azure-LI-BYOS-Production, but entry?
CVE-2020-36242: no packages for Image SLES15-SP4-SAP-Azure-LI-BYOS, but entry?
CVE-2020-36242: no packages for SUSE Linux Enterprise Module for Package Hub 15 SP6, but entry?
CVE-2020-36242: no packages for SUSE Linux Enterprise Module for Public Cloud 15 SP5, but entry?
CVE-2020-36242: no packages for Image SLES15-SP5-SAP-Azure-VLI-BYOS-Production, but entry?
CVE-2020-36242: no packages for Image SLES15-SP6-SAP-Azure-VLI-BYOS, but entry?
CVE-2020-36242: no packages for SUSE Linux Enterprise Module for Server Applications 15 SP6, but entry?
CVE-2020-36242: no packages for SUSE Linux Enterprise Module for Package Hub 15 SP5, but entry?
CVE-2020-36242: no packages for Container suse/sle15:15.1.6.2.811, but entry?
CVE-2020-36242: no packages for Image SLES15-SP4-SAP-Azure-LI-BYOS-Production, but entry?
CVE-2020-36242: no packages for Image SLES15-SP5-SAP-Azure-VLI-BYOS, but entry?
CVE-2020-36242: no packages for Image SLES15-SP5-SAP-Azure-LI-BYOS-Production, but entry?
CVE-2020-36242: no packages for SUSE Linux Enterprise Module for Basesystem 15 SP6, but entry?
no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2020-36242
CVE-2020-36242: no packages for Container suse/sle15:15.1.6.2.811, but entry?
CVE-2020-36242: no packages for Image SLES15-SP4-SAP-Azure-LI-BYOS, but entry?
CVE-2020-36242: no packages for Image SLES15-SP4-SAP-Azure-LI-BYOS-Production, but entry?
CVE-2020-36242: no packages for Image SLES15-SP4-SAP-Azure-VLI-BYOS, but entry?
CVE-2020-36242: no packages for Image SLES15-SP4-SAP-Azure-VLI-BYOS-Production, but entry?
CVE-2020-36242: no packages for Image SLES15-SP5-SAP-Azure-LI-BYOS, but entry?
CVE-2020-36242: no packages for Image SLES15-SP5-SAP-Azure-LI-BYOS-Production, but entry?
CVE-2020-36242: no packages for Image SLES15-SP5-SAP-Azure-VLI-BYOS, but entry?
CVE-2020-36242: no packages for Image SLES15-SP5-SAP-Azure-VLI-BYOS-Production, but entry?
CVE-2020-36242: no packages for Image SLES15-SP6-SAP-Azure-LI-BYOS, but entry?
CVE-2020-36242: no packages for Image SLES15-SP6-SAP-Azure-LI-BYOS-Production, but entry?
CVE-2020-36242: no packages for Image SLES15-SP6-SAP-Azure-VLI-BYOS, but entry?
CVE-2020-36242: no packages for Image SLES15-SP6-SAP-Azure-VLI-BYOS-Production, but entry?
CVE-2020-36242: no packages for SUSE Linux Enterprise Installer Updates 15 SP1, but entry?
CVE-2020-36242: no packages for SUSE Linux Enterprise Module for Basesystem 15 SP6, but entry?
CVE-2020-36242: no packages for SUSE Linux Enterprise Module for Package Hub 15 SP5, but entry?
CVE-2020-36242: no packages for SUSE Linux Enterprise Module for Package Hub 15 SP6, but entry?
CVE-2020-36242: no packages for SUSE Linux Enterprise Module for Public Cloud 15 SP2, but entry?
CVE-2020-36242: no packages for SUSE Linux Enterprise Module for Public Cloud 15 SP3, but entry?
CVE-2020-36242: no packages for SUSE Linux Enterprise Module for Public Cloud 15 SP5, but entry?
CVE-2020-36242: no packages for SUSE Linux Enterprise Module for Public Cloud 15 SP6, but entry?
CVE-2020-36242: no packages for SUSE Linux Enterprise Module for Server Applications 15 SP4, but entry?
CVE-2020-36242: no packages for SUSE Linux Enterprise Module for Server Applications 15 SP5, but entry?
CVE-2020-36242: no packages for SUSE Linux Enterprise Module for Server Applications 15 SP6, but entry?
CVE-2020-36242: no packages for Container suse/sle15:15.1.6.2.811, but entry?
CVE-2020-36242: no packages for Image SLES15-SP4-SAP-Azure-LI-BYOS, but entry?
CVE-2020-36242: no packages for Image SLES15-SP4-SAP-Azure-LI-BYOS-Production, but entry?
CVE-2020-36242: no packages for Image SLES15-SP4-SAP-Azure-VLI-BYOS, but entry?
CVE-2020-36242: no packages for Image SLES15-SP4-SAP-Azure-VLI-BYOS-Production, but entry?
CVE-2020-36242: no packages for Image SLES15-SP5-SAP-Azure-LI-BYOS, but entry?
CVE-2020-36242: no packages for Image SLES15-SP5-SAP-Azure-LI-BYOS-Production, but entry?
CVE-2020-36242: no packages for Image SLES15-SP5-SAP-Azure-VLI-BYOS, but entry?
CVE-2020-36242: no packages for Image SLES15-SP5-SAP-Azure-VLI-BYOS-Production, but entry?
CVE-2020-36242: no packages for Image SLES15-SP6-SAP-Azure-LI-BYOS, but entry?
CVE-2020-36242: no packages for Image SLES15-SP6-SAP-Azure-LI-BYOS-Production, but entry?
CVE-2020-36242: no packages for Image SLES15-SP6-SAP-Azure-VLI-BYOS, but entry?
CVE-2020-36242: no packages for Image SLES15-SP6-SAP-Azure-VLI-BYOS-Production, but entry?
CVE-2020-36242: no packages for SUSE Linux Enterprise Installer Updates 15 SP1, but entry?
CVE-2020-36242: no packages for SUSE Linux Enterprise Module for Basesystem 15 SP6, but entry?
CVE-2020-36242: no packages for SUSE Linux Enterprise Module for Package Hub 15 SP5, but entry?
CVE-2020-36242: no packages for SUSE Linux Enterprise Module for Package Hub 15 SP6, but entry?
CVE-2020-36242: no packages for SUSE Linux Enterprise Module for Public Cloud 15 SP2, but entry?
CVE-2020-36242: no packages for SUSE Linux Enterprise Module for Public Cloud 15 SP3, but entry?
CVE-2020-36242: no packages for SUSE Linux Enterprise Module for Public Cloud 15 SP5, but entry?
CVE-2020-36242: no packages for SUSE Linux Enterprise Module for Public Cloud 15 SP6, but entry?
CVE-2020-36242: no packages for SUSE Linux Enterprise Module for Server Applications 15 SP4, but entry?
CVE-2020-36242: no packages for SUSE Linux Enterprise Module for Server Applications 15 SP5, but entry?
CVE-2020-36242: no packages for SUSE Linux Enterprise Module for Server Applications 15 SP6, but entry?
skipping CVE-2020-36230 as CVE page is older than CVRF-CVE file.
skipping CVE-2020-36229 as CVE page is older than CVRF-CVE file.
skipping CVE-2020-36228 as CVE page is older than CVRF-CVE file.
skipping CVE-2020-36227 as CVE page is older than CVRF-CVE file.
skipping CVE-2020-36226 as CVE page is older than CVRF-CVE file.
skipping CVE-2020-36225 as CVE page is older than CVRF-CVE file.
skipping CVE-2020-36224 as CVE page is older than CVRF-CVE file.
skipping CVE-2020-36223 as CVE page is older than CVRF-CVE file.
skipping CVE-2020-36222 as CVE page is older than CVRF-CVE file.
skipping CVE-2020-36221 as CVE page is older than CVRF-CVE file.
no cpe found for SUSE Liberty Linux 7 LTSS in CVE-2020-36193
no cpe found for SUSE Package Hub 15 SP2 in CVE-2020-36152
no cpe found for SUSE Package Hub 15 SP2 in CVE-2020-36151
no cpe found for SUSE Package Hub 15 SP2 in CVE-2020-36150
no cpe found for SUSE Package Hub 15 SP2 in CVE-2020-36149
no cpe found for SUSE Package Hub 15 SP2 in CVE-2020-36148
no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2020-36024
no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2020-36023
no cpe found for SUSE Package Hub 15 SP1 in CVE-2020-35730
no cpe found for SUSE Package Hub 15 SP2 in CVE-2020-35730
no cpe found for SUSE Package Hub 15 SP3 in CVE-2020-35730
no cpe found for SUSE Package Hub 15 SP4 in CVE-2020-35730
no cpe found for SUSE Package Hub 15 SP2 in CVE-2020-35701
skipping CVE-2020-35702 as CVE page is older than CVRF-CVE file.
no cpe found for SUSE Package Hub 15 SP1 in CVE-2020-35678
no cpe found for SUSE Package Hub 15 SP2 in CVE-2020-35678
no cpe found for SUSE Package Hub 15 SP2 in CVE-2020-35573
no cpe found for SUSE Package Hub 15 SP3 in CVE-2020-35573
skipping CVE-2020-35538 as CVE page is older than CVRF-CVE file.
skipping CVE-2020-35537 as CVE page is older than CVRF-CVE file.
skipping CVE-2020-35536 as CVE page is older than CVRF-CVE file.
skipping CVE-2020-35527 as CVE page is older than CVRF-CVE file.
skipping CVE-2020-35525 as CVE page is older than CVRF-CVE file.
skipping CVE-2020-35524 as CVE page is older than CVRF-CVE file.
skipping CVE-2020-35523 as CVE page is older than CVRF-CVE file.
skipping CVE-2020-35522 as CVE page is older than CVRF-CVE file.
skipping CVE-2020-35521 as CVE page is older than CVRF-CVE file.
skipping CVE-2020-35517 as CVE page is older than CVRF-CVE file.
skipping CVE-2020-35513 as CVE page is older than CVRF-CVE file.
no cpe found for SUSE Package Hub 15 SP3 in CVE-2020-35511
skipping CVE-2020-35508 as CVE page is older than CVRF-CVE file.
skipping CVE-2020-35507 as CVE page is older than CVRF-CVE file.
skipping CVE-2020-35506 as CVE page is older than CVRF-CVE file.
skipping CVE-2020-35505 as CVE page is older than CVRF-CVE file.
skipping CVE-2020-35504 as CVE page is older than CVRF-CVE file.
skipping CVE-2020-35503 as CVE page is older than CVRF-CVE file.
skipping CVE-2020-35501 as CVE page is older than CVRF-CVE file.
no cpe found for SUSE Package Hub 15 SP3 in CVE-2020-35471
skipping CVE-2020-35499 as CVE page is older than CVRF-CVE file.
skipping CVE-2020-35498 as CVE page is older than CVRF-CVE file.
skipping CVE-2020-35496 as CVE page is older than CVRF-CVE file.
skipping CVE-2020-35495 as CVE page is older than CVRF-CVE file.
skipping CVE-2020-35494 as CVE page is older than CVRF-CVE file.
skipping CVE-2020-35493 as CVE page is older than CVRF-CVE file.
skipping CVE-2020-35492 as CVE page is older than CVRF-CVE file.
skipping CVE-2020-35459 as CVE page is older than CVRF-CVE file.
skipping CVE-2020-35458 as CVE page is older than CVRF-CVE file.
skipping CVE-2020-35452 as CVE page is older than CVRF-CVE file.
skipping CVE-2020-35448 as CVE page is older than CVRF-CVE file.
no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2020-35357
skipping CVE-2020-35342 as CVE page is older than CVRF-CVE file.
no cpe found for SUSE Package Hub 15 SP1 in CVE-2020-29663
no cpe found for SUSE Package Hub 15 SP2 in CVE-2020-29663
no cpe found for SUSE Package Hub 15 SP3 in CVE-2020-29663
CVE-2020-29651: no packages for SUSE Linux Enterprise Module for Development Tools 15 SP6, but entry?
CVE-2020-29651: no packages for SUSE Linux Enterprise Module for Public Cloud 15 SP4, but entry?
CVE-2020-29651: no packages for SUSE Linux Enterprise Module for Package Hub 15 SP4, but entry?
CVE-2020-29651: no packages for SUSE Linux Enterprise Module for Package Hub 15 SP3, but entry?
CVE-2020-29651: no packages for SUSE Linux Enterprise Module for Public Cloud 15 SP1, but entry?
CVE-2020-29651: no packages for SUSE Linux Enterprise Module for Development Tools 15 SP4, but entry?
CVE-2020-29651: no packages for SUSE Linux Enterprise Module for Public Cloud 15 SP5, but entry?
CVE-2020-29651: no packages for SUSE Linux Enterprise Module for Development Tools 15 SP5, but entry?
CVE-2020-29651: no packages for SUSE Linux Enterprise Module for Public Cloud 15 SP3, but entry?
CVE-2020-29651: no packages for SUSE Linux Enterprise Module for Public Cloud 15 SP2, but entry?
CVE-2020-29651: no packages for SUSE Linux Enterprise Module for Development Tools 15 SP3, but entry?
no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2020-29651
CVE-2020-29651: no packages for SUSE Linux Enterprise Module for Development Tools 15 SP3, but entry?
CVE-2020-29651: no packages for SUSE Linux Enterprise Module for Development Tools 15 SP4, but entry?
CVE-2020-29651: no packages for SUSE Linux Enterprise Module for Development Tools 15 SP5, but entry?
CVE-2020-29651: no packages for SUSE Linux Enterprise Module for Development Tools 15 SP6, but entry?
CVE-2020-29651: no packages for SUSE Linux Enterprise Module for Package Hub 15 SP3, but entry?
CVE-2020-29651: no packages for SUSE Linux Enterprise Module for Package Hub 15 SP4, but entry?
CVE-2020-29651: no packages for SUSE Linux Enterprise Module for Public Cloud 15 SP1, but entry?
CVE-2020-29651: no packages for SUSE Linux Enterprise Module for Public Cloud 15 SP2, but entry?
CVE-2020-29651: no packages for SUSE Linux Enterprise Module for Public Cloud 15 SP3, but entry?
CVE-2020-29651: no packages for SUSE Linux Enterprise Module for Public Cloud 15 SP4, but entry?
CVE-2020-29651: no packages for SUSE Linux Enterprise Module for Public Cloud 15 SP5, but entry?
CVE-2020-29651: no packages for SUSE Linux Enterprise Module for Development Tools 15 SP3, but entry?
CVE-2020-29651: no packages for SUSE Linux Enterprise Module for Development Tools 15 SP4, but entry?
CVE-2020-29651: no packages for SUSE Linux Enterprise Module for Development Tools 15 SP5, but entry?
CVE-2020-29651: no packages for SUSE Linux Enterprise Module for Development Tools 15 SP6, but entry?
CVE-2020-29651: no packages for SUSE Linux Enterprise Module for Package Hub 15 SP3, but entry?
CVE-2020-29651: no packages for SUSE Linux Enterprise Module for Package Hub 15 SP4, but entry?
CVE-2020-29651: no packages for SUSE Linux Enterprise Module for Public Cloud 15 SP1, but entry?
CVE-2020-29651: no packages for SUSE Linux Enterprise Module for Public Cloud 15 SP2, but entry?
CVE-2020-29651: no packages for SUSE Linux Enterprise Module for Public Cloud 15 SP3, but entry?
CVE-2020-29651: no packages for SUSE Linux Enterprise Module for Public Cloud 15 SP4, but entry?
CVE-2020-29651: no packages for SUSE Linux Enterprise Module for Public Cloud 15 SP5, but entry?
skipping CVE-2020-29567 as CVE page is older than CVRF-CVE file.
skipping CVE-2020-29534 as CVE page is older than CVRF-CVE file.
No V5 entry found for CVE-2020-29488 / /home/securitybot/prod/cve-database/cvelistV5/cves/2020/29xxxx/CVE-2020-29488.json:No such file or directory
no cpe found for SUSE Package Hub 15 SP4 in CVE-2020-29488
skipping CVE-2020-29487 as CVE page is older than CVRF-CVE file.
skipping CVE-2020-29486 as CVE page is older than CVRF-CVE file.
skipping CVE-2020-29485 as CVE page is older than CVRF-CVE file.
skipping CVE-2020-29482 as CVE page is older than CVRF-CVE file.
skipping CVE-2020-29479 as CVE page is older than CVRF-CVE file.
skipping CVE-2020-29443 as CVE page is older than CVRF-CVE file.
skipping CVE-2020-29385 as CVE page is older than CVRF-CVE file.
skipping CVE-2020-29373 as CVE page is older than CVRF-CVE file.
skipping CVE-2020-29372 as CVE page is older than CVRF-CVE file.
skipping CVE-2020-29370 as CVE page is older than CVRF-CVE file.
skipping CVE-2020-29369 as CVE page is older than CVRF-CVE file.
no cpe found for SUSE Package Hub 15 SP1 in CVE-2020-29367
no cpe found for SUSE Package Hub 15 SP2 in CVE-2020-29367
skipping CVE-2020-29363 as CVE page is older than CVRF-CVE file.
skipping CVE-2020-29362 as CVE page is older than CVRF-CVE file.
skipping CVE-2020-29361 as CVE page is older than CVRF-CVE file.
skipping CVE-2020-29260 as CVE page is older than CVRF-CVE file.
skipping CVE-2020-29129 as CVE page is older than CVRF-CVE file.
no cpe found for SUSE Liberty Linux 7 LTSS in CVE-2020-28949
no cpe found for SUSE Liberty Linux 7 LTSS in CVE-2020-28948
no cpe found for SUSE Package Hub 15 SP1 in CVE-2020-28935
no cpe found for SUSE Package Hub 15 SP2 in CVE-2020-28935
skipping CVE-2020-28941 as CVE page is older than CVRF-CVE file.
no cpe found for SUSE Package Hub 15 SP1 in CVE-2020-28926
no cpe found for SUSE Package Hub 15 SP2 in CVE-2020-28926
no cpe found for SUSE Package Hub 15 SP1 in CVE-2020-28924
no cpe found for SUSE Package Hub 15 SP2 in CVE-2020-28924
skipping CVE-2020-28916 as CVE page is older than CVRF-CVE file.
no cpe found for SUSE Package Hub 15 SP1 in CVE-2020-28896
no cpe found for SUSE Package Hub 15 SP2 in CVE-2020-28896
no cpe found for SUSE Package Hub 15 SP2 in CVE-2020-28600
no cpe found for SUSE Linux Enterprise Server 11-PUBCLOUD in CVE-2020-28493
skipping CVE-2020-28588 as CVE page is older than CVRF-CVE file.
no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2020-28491
skipping CVE-2020-28477 as CVE page is older than CVRF-CVE file.
skipping CVE-2020-28243 as CVE page is older than CVRF-CVE file.
skipping CVE-2020-28200 as CVE page is older than CVRF-CVE file.
CVE-2020-28052: no packages for Image SLES15-SP4-Manager-Server-4-3-EC2-ltd, but entry?
CVE-2020-28052: no packages for Image SLES15-SP3-SAP-Azure-VLI-BYOS-Production, but entry?
CVE-2020-28052: no packages for Container bci/openjdk:17-7.1, but entry?
CVE-2020-28052: no packages for SUSE Linux Enterprise Module for Package Hub 15 SP6, but entry?
CVE-2020-28052: no packages for SUSE Linux Enterprise Module for Basesystem 15 SP4, but entry?
CVE-2020-28052: no packages for Image SLES15-SP4-SAPCAL, but entry?
CVE-2020-28052: no packages for Image SLES15-SP6-SAPCAL-EC2, but entry?
CVE-2020-28052: no packages for Container bci/openjdk:latest, but entry?
CVE-2020-28052: no packages for SUSE Linux Enterprise Module for Web and Scripting 15 SP6, but entry?
CVE-2020-28052: no packages for Image SLES15-SP5-SAP-EC2, but entry?
CVE-2020-28052: no packages for Image SLES15-SP2-SAP-BYOS-Azure, but entry?
CVE-2020-28052: no packages for Image SLES15-SP6-SAP-Azure-LI-BYOS-Production, but entry?
CVE-2020-28052: no packages for SUSE Linux Enterprise Module for Package Hub 15 SP4, but entry?
CVE-2020-28052: no packages for SUSE Manager Retail Branch Server 4.2, but entry?
CVE-2020-28052: no packages for Image SLES15-SP4-SAP, but entry?
CVE-2020-28052: no packages for Image SLES15-SP4-Manager-Server-4-3-EC2-llc, but entry?
CVE-2020-28052: no packages for Container suse/manager/5.0/x86_64/server:5.0.0-beta1.2.122, but entry?
CVE-2020-28052: no packages for SUSE Manager Server 4.2, but entry?
CVE-2020-28052: no packages for Image SLES15-SP3-SAPCAL-EC2-HVM, but entry?
CVE-2020-28052: no packages for Image SLES15-SP4-SAP-Azure-LI-BYOS, but entry?
CVE-2020-28052: no packages for Image SLES15-SP6-SAP, but entry?
CVE-2020-28052: no packages for Image SLES15-SP3-SAPCAL-GCE, but entry?
CVE-2020-28052: no packages for Image SLES15-SP4-SAPCAL-GCE, but entry?
CVE-2020-28052: no packages for Image SLES15-SP2-SAP-GCE, but entry?
CVE-2020-28052: no packages for Container bci/kiwi:9.24.43-8.6, but entry?
CVE-2020-28052: no packages for Image SLES15-SP4-SAP-GCE, but entry?
CVE-2020-28052: no packages for SUSE Linux Enterprise Server 15 SP4-TERADATA, but entry?
CVE-2020-28052: no packages for Image SLES15-SP6-SAP-Azure-LI-BYOS, but entry?
CVE-2020-28052: no packages for Image SLES15-SP4-SAP-Azure-VLI-BYOS, but entry?
CVE-2020-28052: no packages for Image SLES15-SP6-SAP-Azure-VLI-BYOS-Production, but entry?
CVE-2020-28052: no packages for SUSE Manager Server Module 4.3, but entry?
CVE-2020-28052: no packages for SUSE Linux Enterprise Workstation Extension 15 SP6, but entry?
CVE-2020-28052: no packages for Container bci/openjdk-devel:17-7.2, but entry?
CVE-2020-28052: no packages for Image SLES15-SP5-SAPCAL-Azure, but entry?
CVE-2020-28052: no packages for SUSE Linux Enterprise Workstation Extension 15 SP5, but entry?
CVE-2020-28052: no packages for Image SLES15-SP5-SAP-GCE, but entry?
CVE-2020-28052: no packages for Image SLES15-SP4-Manager-Server-4-3-BYOS-Azure, but entry?
CVE-2020-28052: no packages for Image SLES15-SP6-SAP-GCE, but entry?
CVE-2020-28052: no packages for Image SLES15-SP6-SAPCAL-GCE, but entry?
CVE-2020-28052: no packages for Container bci/openjdk-devel:11-6.2, but entry?
CVE-2020-28052: no packages for Image SLES15-SP4-SAP-Azure-VLI-BYOS-Production, but entry?
CVE-2020-28052: no packages for Image SLES15-SP5-SAP-Azure-LI-BYOS, but entry?
CVE-2020-28052: no packages for SUSE Manager Server Module 4.2, but entry?
CVE-2020-28052: no packages for SUSE CaaS Platform 4.0, but entry?
CVE-2020-28052: no packages for Container suse/manager/5.0/x86_64/server-attestation:5.0.0-beta2.2.16, but entry?
CVE-2020-28052: no packages for Image SLES15-SP2-SAP-Azure-VLI-BYOS-Production, but entry?
CVE-2020-28052: no packages for Image SLES15-SP2-SAP-BYOS-EC2-HVM, but entry?
CVE-2020-28052: no packages for Image SLES15-SP3-SAPCAL-Azure, but entry?
CVE-2020-28052: no packages for SUSE Linux Enterprise Module for Basesystem 15 SP6, but entry?
CVE-2020-28052: no packages for Image SLES15-SP5-SAP-Azure-LI-BYOS-Production, but entry?
CVE-2020-28052: no packages for Image SLES15-SP5-SAP-Azure-VLI-BYOS, but entry?
CVE-2020-28052: no packages for Image SLES15-SP6-SAPCAL, but entry?
CVE-2020-28052: no packages for Image SLES15-SP4-Manager-Server-4-3-Azure-llc, but entry?
CVE-2020-28052: no packages for Image SLES15-SP2-SAP-BYOS-GCE, but entry?
CVE-2020-28052: no packages for Image SLES15-SP3-Manager-4-2-Server-BYOS-GCE, but entry?
CVE-2020-28052: no packages for SUSE Linux Enterprise Module for Web and Scripting 15 SP5, but entry?
CVE-2020-28052: no packages for Image SLES15-SP4-Manager-Server-4-3-Azure-ltd, but entry?
CVE-2020-28052: no packages for SUSE Linux Enterprise Module for Package Hub 15 SP5, but entry?
CVE-2020-28052: no packages for Image SLES15-SP4-SAP-Azure, but entry?
CVE-2020-28052: no packages for SUSE Linux Enterprise Workstation Extension 15 SP4, but entry?
CVE-2020-28052: no packages for Image SLES15-SP4-Manager-Server-4-3, but entry?
CVE-2020-28052: no packages for SUSE Manager Proxy 4.2, but entry?
CVE-2020-28052: no packages for Image SLES15-SP2-SAP-Azure-LI-BYOS-Production, but entry?
CVE-2020-28052: no packages for Image SLES15-SP4-SAP-Azure-LI-BYOS-Production, but entry?
CVE-2020-28052: no packages for Image SLES15-SP4-Manager-Server-4-3-BYOS, but entry?
CVE-2020-28052: no packages for Image SLES15-SP2-SAP-Azure, but entry?
CVE-2020-28052: no packages for SUSE Linux Enterprise Module for Basesystem 15 SP5, but entry?
CVE-2020-28052: no packages for Image SLES15-SP3-Manager-4-2-Server-BYOS-Azure, but entry?
CVE-2020-28052: no packages for Image SLES15-SP4-SAPCAL-EC2, but entry?
CVE-2020-28052: no packages for SUSE Linux Enterprise Module for Web and Scripting 15 SP4, but entry?
CVE-2020-28052: no packages for Image SLES15-SP4-SAPCAL-Azure, but entry?
CVE-2020-28052: no packages for Image SLES15-SP5-SAPCAL-EC2, but entry?
CVE-2020-28052: no packages for SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS, but entry?
CVE-2020-28052: no packages for Container bci/openjdk:11-7.1, but entry?
CVE-2020-28052: no packages for SUSE Linux Enterprise Server for SAP Applications 15 SP1, but entry?
CVE-2020-28052: no packages for Image SLES15-SP4-SAP-EC2, but entry?
CVE-2020-28052: no packages for Container bci/openjdk-devel:17-14.11, but entry?
CVE-2020-28052: no packages for Image SLES15-SP6-SAP-EC2, but entry?
CVE-2020-28052: no packages for Image SLES15-SP2-SAP-EC2-HVM, but entry?
CVE-2020-28052: no packages for Image SLES15-SP3-SAP-Azure-LI-BYOS-Production, but entry?
CVE-2020-28052: no packages for SUSE Linux Enterprise Server 15 SP1-LTSS, but entry?
CVE-2020-28052: no packages for Image SLES15-SP3-Manager-4-2-Server-BYOS-EC2-HVM, but entry?
CVE-2020-28052: no packages for Image SLES15-SP4-Manager-Server-4-3-BYOS-GCE, but entry?
CVE-2020-28052: no packages for Image SLES15-SP5-SAPCAL-GCE, but entry?
CVE-2020-28052: no packages for Image SLES15-SP6-SAP-Azure, but entry?
CVE-2020-28052: no packages for Image SLES15-SP4-Manager-Server-4-3-BYOS-EC2, but entry?
CVE-2020-28052: no packages for Image SLES15-SP5-SAP-Azure-VLI-BYOS-Production, but entry?
CVE-2020-28052: no packages for Image SLES15-SP6-SAP-Azure-VLI-BYOS, but entry?
CVE-2020-28052: no packages for Image SLES15-SP5-SAP-Azure, but entry?
CVE-2020-28052: no packages for Image SLES15-SP6-SAPCAL-Azure, but entry?
CVE-2020-28052: no packages for Container bci/kiwi:9.24.43-8.6, but entry?
CVE-2020-28052: no packages for Container bci/openjdk-devel:11-6.2, but entry?
CVE-2020-28052: no packages for Container bci/openjdk-devel:17-14.11, but entry?
CVE-2020-28052: no packages for Container bci/openjdk-devel:17-7.2, but entry?
CVE-2020-28052: no packages for Container bci/openjdk:11-7.1, but entry?
CVE-2020-28052: no packages for Container bci/openjdk:17-7.1, but entry?
CVE-2020-28052: no packages for Container bci/openjdk:latest, but entry?
CVE-2020-28052: no packages for Container suse/manager/5.0/x86_64/server-attestation:5.0.0-beta2.2.16, but entry?
CVE-2020-28052: no packages for Container suse/manager/5.0/x86_64/server:5.0.0-beta1.2.122, but entry?
CVE-2020-28052: no packages for Image SLES15-SP2-SAP-Azure, but entry?
CVE-2020-28052: no packages for Image SLES15-SP2-SAP-Azure-LI-BYOS-Production, but entry?
CVE-2020-28052: no packages for Image SLES15-SP2-SAP-Azure-VLI-BYOS-Production, but entry?
CVE-2020-28052: no packages for Image SLES15-SP2-SAP-BYOS-Azure, but entry?
CVE-2020-28052: no packages for Image SLES15-SP2-SAP-BYOS-EC2-HVM, but entry?
CVE-2020-28052: no packages for Image SLES15-SP2-SAP-BYOS-GCE, but entry?
CVE-2020-28052: no packages for Image SLES15-SP2-SAP-EC2-HVM, but entry?
CVE-2020-28052: no packages for Image SLES15-SP2-SAP-GCE, but entry?
CVE-2020-28052: no packages for Image SLES15-SP3-Manager-4-2-Server-BYOS-Azure, but entry?
CVE-2020-28052: no packages for Image SLES15-SP3-Manager-4-2-Server-BYOS-EC2-HVM, but entry?
CVE-2020-28052: no packages for Image SLES15-SP3-Manager-4-2-Server-BYOS-GCE, but entry?
CVE-2020-28052: no packages for Image SLES15-SP3-SAP-Azure-LI-BYOS-Production, but entry?
CVE-2020-28052: no packages for Image SLES15-SP3-SAP-Azure-VLI-BYOS-Production, but entry?
CVE-2020-28052: no packages for Image SLES15-SP3-SAPCAL-Azure, but entry?
CVE-2020-28052: no packages for Image SLES15-SP3-SAPCAL-EC2-HVM, but entry?
CVE-2020-28052: no packages for Image SLES15-SP3-SAPCAL-GCE, but entry?
CVE-2020-28052: no packages for Image SLES15-SP4-Manager-Server-4-3, but entry?
CVE-2020-28052: no packages for Image SLES15-SP4-Manager-Server-4-3-Azure-llc, but entry?
CVE-2020-28052: no packages for Image SLES15-SP4-Manager-Server-4-3-Azure-ltd, but entry?
CVE-2020-28052: no packages for Image SLES15-SP4-Manager-Server-4-3-BYOS, but entry?
CVE-2020-28052: no packages for Image SLES15-SP4-Manager-Server-4-3-BYOS-Azure, but entry?
CVE-2020-28052: no packages for Image SLES15-SP4-Manager-Server-4-3-BYOS-EC2, but entry?
CVE-2020-28052: no packages for Image SLES15-SP4-Manager-Server-4-3-BYOS-GCE, but entry?
CVE-2020-28052: no packages for Image SLES15-SP4-Manager-Server-4-3-EC2-llc, but entry?
CVE-2020-28052: no packages for Image SLES15-SP4-Manager-Server-4-3-EC2-ltd, but entry?
CVE-2020-28052: no packages for Image SLES15-SP4-SAP, but entry?
CVE-2020-28052: no packages for Image SLES15-SP4-SAP-Azure, but entry?
CVE-2020-28052: no packages for Image SLES15-SP4-SAP-Azure-LI-BYOS, but entry?
CVE-2020-28052: no packages for Image SLES15-SP4-SAP-Azure-LI-BYOS-Production, but entry?
CVE-2020-28052: no packages for Image SLES15-SP4-SAP-Azure-VLI-BYOS, but entry?
CVE-2020-28052: no packages for Image SLES15-SP4-SAP-Azure-VLI-BYOS-Production, but entry?
CVE-2020-28052: no packages for Image SLES15-SP4-SAP-EC2, but entry?
CVE-2020-28052: no packages for Image SLES15-SP4-SAP-GCE, but entry?
CVE-2020-28052: no packages for Image SLES15-SP4-SAPCAL, but entry?
CVE-2020-28052: no packages for Image SLES15-SP4-SAPCAL-Azure, but entry?
CVE-2020-28052: no packages for Image SLES15-SP4-SAPCAL-EC2, but entry?
CVE-2020-28052: no packages for Image SLES15-SP4-SAPCAL-GCE, but entry?
CVE-2020-28052: no packages for Image SLES15-SP5-SAP-Azure, but entry?
CVE-2020-28052: no packages for Image SLES15-SP5-SAP-Azure-LI-BYOS, but entry?
CVE-2020-28052: no packages for Image SLES15-SP5-SAP-Azure-LI-BYOS-Production, but entry?
CVE-2020-28052: no packages for Image SLES15-SP5-SAP-Azure-VLI-BYOS, but entry?
CVE-2020-28052: no packages for Image SLES15-SP5-SAP-Azure-VLI-BYOS-Production, but entry?
CVE-2020-28052: no packages for Image SLES15-SP5-SAP-EC2, but entry?
CVE-2020-28052: no packages for Image SLES15-SP5-SAP-GCE, but entry?
CVE-2020-28052: no packages for Image SLES15-SP5-SAPCAL-Azure, but entry?
CVE-2020-28052: no packages for Image SLES15-SP5-SAPCAL-EC2, but entry?
CVE-2020-28052: no packages for Image SLES15-SP5-SAPCAL-GCE, but entry?
CVE-2020-28052: no packages for Image SLES15-SP6-SAP, but entry?
CVE-2020-28052: no packages for Image SLES15-SP6-SAP-Azure, but entry?
CVE-2020-28052: no packages for Image SLES15-SP6-SAP-Azure-LI-BYOS, but entry?
CVE-2020-28052: no packages for Image SLES15-SP6-SAP-Azure-LI-BYOS-Production, but entry?
CVE-2020-28052: no packages for Image SLES15-SP6-SAP-Azure-VLI-BYOS, but entry?
CVE-2020-28052: no packages for Image SLES15-SP6-SAP-Azure-VLI-BYOS-Production, but entry?
CVE-2020-28052: no packages for Image SLES15-SP6-SAP-EC2, but entry?
CVE-2020-28052: no packages for Image SLES15-SP6-SAP-GCE, but entry?
CVE-2020-28052: no packages for Image SLES15-SP6-SAPCAL, but entry?
CVE-2020-28052: no packages for Image SLES15-SP6-SAPCAL-Azure, but entry?
CVE-2020-28052: no packages for Image SLES15-SP6-SAPCAL-EC2, but entry?
CVE-2020-28052: no packages for Image SLES15-SP6-SAPCAL-GCE, but entry?
CVE-2020-28052: no packages for SUSE CaaS Platform 4.0, but entry?
CVE-2020-28052: no packages for SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS, but entry?
CVE-2020-28052: no packages for SUSE Linux Enterprise Module for Basesystem 15 SP4, but entry?
CVE-2020-28052: no packages for SUSE Linux Enterprise Module for Basesystem 15 SP5, but entry?
CVE-2020-28052: no packages for SUSE Linux Enterprise Module for Basesystem 15 SP6, but entry?
CVE-2020-28052: no packages for SUSE Linux Enterprise Module for Package Hub 15 SP4, but entry?
CVE-2020-28052: no packages for SUSE Linux Enterprise Module for Package Hub 15 SP5, but entry?
CVE-2020-28052: no packages for SUSE Linux Enterprise Module for Package Hub 15 SP6, but entry?
CVE-2020-28052: no packages for SUSE Linux Enterprise Module for Web and Scripting 15 SP4, but entry?
CVE-2020-28052: no packages for SUSE Linux Enterprise Module for Web and Scripting 15 SP5, but entry?
CVE-2020-28052: no packages for SUSE Linux Enterprise Module for Web and Scripting 15 SP6, but entry?
CVE-2020-28052: no packages for SUSE Linux Enterprise Server 15 SP1-LTSS, but entry?
CVE-2020-28052: no packages for SUSE Linux Enterprise Server 15 SP4-TERADATA, but entry?
CVE-2020-28052: no packages for SUSE Linux Enterprise Server for SAP Applications 15 SP1, but entry?
CVE-2020-28052: no packages for SUSE Linux Enterprise Workstation Extension 15 SP4, but entry?
CVE-2020-28052: no packages for SUSE Linux Enterprise Workstation Extension 15 SP5, but entry?
CVE-2020-28052: no packages for SUSE Linux Enterprise Workstation Extension 15 SP6, but entry?
CVE-2020-28052: no packages for SUSE Manager Proxy 4.2, but entry?
CVE-2020-28052: no packages for SUSE Manager Retail Branch Server 4.2, but entry?
CVE-2020-28052: no packages for SUSE Manager Server 4.2, but entry?
CVE-2020-28052: no packages for SUSE Manager Server Module 4.2, but entry?
CVE-2020-28052: no packages for SUSE Manager Server Module 4.3, but entry?
CVE-2020-28052: no packages for Container bci/kiwi:9.24.43-8.6, but entry?
CVE-2020-28052: no packages for Container bci/openjdk-devel:11-6.2, but entry?
CVE-2020-28052: no packages for Container bci/openjdk-devel:17-14.11, but entry?
CVE-2020-28052: no packages for Container bci/openjdk-devel:17-7.2, but entry?
CVE-2020-28052: no packages for Container bci/openjdk:11-7.1, but entry?
CVE-2020-28052: no packages for Container bci/openjdk:17-7.1, but entry?
CVE-2020-28052: no packages for Container bci/openjdk:latest, but entry?
CVE-2020-28052: no packages for Container suse/manager/5.0/x86_64/server-attestation:5.0.0-beta2.2.16, but entry?
CVE-2020-28052: no packages for Container suse/manager/5.0/x86_64/server:5.0.0-beta1.2.122, but entry?
CVE-2020-28052: no packages for Image SLES15-SP2-SAP-Azure, but entry?
CVE-2020-28052: no packages for Image SLES15-SP2-SAP-Azure-LI-BYOS-Production, but entry?
CVE-2020-28052: no packages for Image SLES15-SP2-SAP-Azure-VLI-BYOS-Production, but entry?
CVE-2020-28052: no packages for Image SLES15-SP2-SAP-BYOS-Azure, but entry?
CVE-2020-28052: no packages for Image SLES15-SP2-SAP-BYOS-EC2-HVM, but entry?
CVE-2020-28052: no packages for Image SLES15-SP2-SAP-BYOS-GCE, but entry?
CVE-2020-28052: no packages for Image SLES15-SP2-SAP-EC2-HVM, but entry?
CVE-2020-28052: no packages for Image SLES15-SP2-SAP-GCE, but entry?
CVE-2020-28052: no packages for Image SLES15-SP3-Manager-4-2-Server-BYOS-Azure, but entry?
CVE-2020-28052: no packages for Image SLES15-SP3-Manager-4-2-Server-BYOS-EC2-HVM, but entry?
CVE-2020-28052: no packages for Image SLES15-SP3-Manager-4-2-Server-BYOS-GCE, but entry?
CVE-2020-28052: no packages for Image SLES15-SP3-SAP-Azure-LI-BYOS-Production, but entry?
CVE-2020-28052: no packages for Image SLES15-SP3-SAP-Azure-VLI-BYOS-Production, but entry?
CVE-2020-28052: no packages for Image SLES15-SP3-SAPCAL-Azure, but entry?
CVE-2020-28052: no packages for Image SLES15-SP3-SAPCAL-EC2-HVM, but entry?
CVE-2020-28052: no packages for Image SLES15-SP3-SAPCAL-GCE, but entry?
CVE-2020-28052: no packages for Image SLES15-SP4-Manager-Server-4-3, but entry?
CVE-2020-28052: no packages for Image SLES15-SP4-Manager-Server-4-3-Azure-llc, but entry?
CVE-2020-28052: no packages for Image SLES15-SP4-Manager-Server-4-3-Azure-ltd, but entry?
CVE-2020-28052: no packages for Image SLES15-SP4-Manager-Server-4-3-BYOS, but entry?
CVE-2020-28052: no packages for Image SLES15-SP4-Manager-Server-4-3-BYOS-Azure, but entry?
CVE-2020-28052: no packages for Image SLES15-SP4-Manager-Server-4-3-BYOS-EC2, but entry?
CVE-2020-28052: no packages for Image SLES15-SP4-Manager-Server-4-3-BYOS-GCE, but entry?
CVE-2020-28052: no packages for Image SLES15-SP4-Manager-Server-4-3-EC2-llc, but entry?
CVE-2020-28052: no packages for Image SLES15-SP4-Manager-Server-4-3-EC2-ltd, but entry?
CVE-2020-28052: no packages for Image SLES15-SP4-SAP, but entry?
CVE-2020-28052: no packages for Image SLES15-SP4-SAP-Azure, but entry?
CVE-2020-28052: no packages for Image SLES15-SP4-SAP-Azure-LI-BYOS, but entry?
CVE-2020-28052: no packages for Image SLES15-SP4-SAP-Azure-LI-BYOS-Production, but entry?
CVE-2020-28052: no packages for Image SLES15-SP4-SAP-Azure-VLI-BYOS, but entry?
CVE-2020-28052: no packages for Image SLES15-SP4-SAP-Azure-VLI-BYOS-Production, but entry?
CVE-2020-28052: no packages for Image SLES15-SP4-SAP-EC2, but entry?
CVE-2020-28052: no packages for Image SLES15-SP4-SAP-GCE, but entry?
CVE-2020-28052: no packages for Image SLES15-SP4-SAPCAL, but entry?
CVE-2020-28052: no packages for Image SLES15-SP4-SAPCAL-Azure, but entry?
CVE-2020-28052: no packages for Image SLES15-SP4-SAPCAL-EC2, but entry?
CVE-2020-28052: no packages for Image SLES15-SP4-SAPCAL-GCE, but entry?
CVE-2020-28052: no packages for Image SLES15-SP5-SAP-Azure, but entry?
CVE-2020-28052: no packages for Image SLES15-SP5-SAP-Azure-LI-BYOS, but entry?
CVE-2020-28052: no packages for Image SLES15-SP5-SAP-Azure-LI-BYOS-Production, but entry?
CVE-2020-28052: no packages for Image SLES15-SP5-SAP-Azure-VLI-BYOS, but entry?
CVE-2020-28052: no packages for Image SLES15-SP5-SAP-Azure-VLI-BYOS-Production, but entry?
CVE-2020-28052: no packages for Image SLES15-SP5-SAP-EC2, but entry?
CVE-2020-28052: no packages for Image SLES15-SP5-SAP-GCE, but entry?
CVE-2020-28052: no packages for Image SLES15-SP5-SAPCAL-Azure, but entry?
CVE-2020-28052: no packages for Image SLES15-SP5-SAPCAL-EC2, but entry?
CVE-2020-28052: no packages for Image SLES15-SP5-SAPCAL-GCE, but entry?
CVE-2020-28052: no packages for Image SLES15-SP6-SAP, but entry?
CVE-2020-28052: no packages for Image SLES15-SP6-SAP-Azure, but entry?
CVE-2020-28052: no packages for Image SLES15-SP6-SAP-Azure-LI-BYOS, but entry?
CVE-2020-28052: no packages for Image SLES15-SP6-SAP-Azure-LI-BYOS-Production, but entry?
CVE-2020-28052: no packages for Image SLES15-SP6-SAP-Azure-VLI-BYOS, but entry?
CVE-2020-28052: no packages for Image SLES15-SP6-SAP-Azure-VLI-BYOS-Production, but entry?
CVE-2020-28052: no packages for Image SLES15-SP6-SAP-EC2, but entry?
CVE-2020-28052: no packages for Image SLES15-SP6-SAP-GCE, but entry?
CVE-2020-28052: no packages for Image SLES15-SP6-SAPCAL, but entry?
CVE-2020-28052: no packages for Image SLES15-SP6-SAPCAL-Azure, but entry?
CVE-2020-28052: no packages for Image SLES15-SP6-SAPCAL-EC2, but entry?
CVE-2020-28052: no packages for Image SLES15-SP6-SAPCAL-GCE, but entry?
CVE-2020-28052: no packages for SUSE CaaS Platform 4.0, but entry?
CVE-2020-28052: no packages for SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS, but entry?
CVE-2020-28052: no packages for SUSE Linux Enterprise Module for Basesystem 15 SP4, but entry?
CVE-2020-28052: no packages for SUSE Linux Enterprise Module for Basesystem 15 SP5, but entry?
CVE-2020-28052: no packages for SUSE Linux Enterprise Module for Basesystem 15 SP6, but entry?
CVE-2020-28052: no packages for SUSE Linux Enterprise Module for Package Hub 15 SP4, but entry?
CVE-2020-28052: no packages for SUSE Linux Enterprise Module for Package Hub 15 SP5, but entry?
CVE-2020-28052: no packages for SUSE Linux Enterprise Module for Package Hub 15 SP6, but entry?
CVE-2020-28052: no packages for SUSE Linux Enterprise Module for Web and Scripting 15 SP4, but entry?
CVE-2020-28052: no packages for SUSE Linux Enterprise Module for Web and Scripting 15 SP5, but entry?
CVE-2020-28052: no packages for SUSE Linux Enterprise Module for Web and Scripting 15 SP6, but entry?
CVE-2020-28052: no packages for SUSE Linux Enterprise Server 15 SP1-LTSS, but entry?
CVE-2020-28052: no packages for SUSE Linux Enterprise Server 15 SP4-TERADATA, but entry?
CVE-2020-28052: no packages for SUSE Linux Enterprise Server for SAP Applications 15 SP1, but entry?
CVE-2020-28052: no packages for SUSE Linux Enterprise Workstation Extension 15 SP4, but entry?
CVE-2020-28052: no packages for SUSE Linux Enterprise Workstation Extension 15 SP5, but entry?
CVE-2020-28052: no packages for SUSE Linux Enterprise Workstation Extension 15 SP6, but entry?
CVE-2020-28052: no packages for SUSE Manager Proxy 4.2, but entry?
CVE-2020-28052: no packages for SUSE Manager Retail Branch Server 4.2, but entry?
CVE-2020-28052: no packages for SUSE Manager Server 4.2, but entry?
CVE-2020-28052: no packages for SUSE Manager Server Module 4.2, but entry?
CVE-2020-28052: no packages for SUSE Manager Server Module 4.3, but entry?
no cpe found for SUSE Package Hub 15 SP1 in CVE-2020-28049
no cpe found for SUSE Package Hub 15 SP2 in CVE-2020-28049
no cpe found for SUSE Package Hub 15 SP1 in CVE-2020-28026
no cpe found for SUSE Package Hub 15 SP2 in CVE-2020-28026
skipping CVE-2020-28030 as CVE page is older than CVRF-CVE file.
no cpe found for SUSE Package Hub 15 SP1 in CVE-2020-28025
no cpe found for SUSE Package Hub 15 SP2 in CVE-2020-28025
no cpe found for SUSE Package Hub 15 SP1 in CVE-2020-28024
no cpe found for SUSE Package Hub 15 SP2 in CVE-2020-28024
no cpe found for SUSE Package Hub 15 SP1 in CVE-2020-28023
no cpe found for SUSE Package Hub 15 SP2 in CVE-2020-28023
no cpe found for SUSE Package Hub 15 SP1 in CVE-2020-28022
no cpe found for SUSE Package Hub 15 SP2 in CVE-2020-28022
no cpe found for SUSE Package Hub 15 SP1 in CVE-2020-28021
no cpe found for SUSE Package Hub 15 SP2 in CVE-2020-28021
no cpe found for SUSE Package Hub 15 SP1 in CVE-2020-28020
no cpe found for SUSE Package Hub 15 SP2 in CVE-2020-28020
no cpe found for SUSE Package Hub 15 SP1 in CVE-2020-28019
no cpe found for SUSE Package Hub 15 SP2 in CVE-2020-28019
no cpe found for SUSE Package Hub 15 SP1 in CVE-2020-28018
no cpe found for SUSE Package Hub 15 SP2 in CVE-2020-28018
no cpe found for SUSE Package Hub 15 SP1 in CVE-2020-28017
no cpe found for SUSE Package Hub 15 SP2 in CVE-2020-28017
no cpe found for SUSE Package Hub 15 SP1 in CVE-2020-28016
no cpe found for SUSE Package Hub 15 SP2 in CVE-2020-28016
no cpe found for SUSE Package Hub 15 SP1 in CVE-2020-28015
no cpe found for SUSE Package Hub 15 SP2 in CVE-2020-28015
no cpe found for SUSE Package Hub 15 SP1 in CVE-2020-28014
no cpe found for SUSE Package Hub 15 SP2 in CVE-2020-28014
no cpe found for SUSE Package Hub 15 SP1 in CVE-2020-28013
no cpe found for SUSE Package Hub 15 SP2 in CVE-2020-28013
no cpe found for SUSE Package Hub 15 SP1 in CVE-2020-28012
no cpe found for SUSE Package Hub 15 SP2 in CVE-2020-28012
no cpe found for SUSE Package Hub 15 SP1 in CVE-2020-28011
no cpe found for SUSE Package Hub 15 SP2 in CVE-2020-28011
no cpe found for SUSE Package Hub 15 SP1 in CVE-2020-28010
no cpe found for SUSE Package Hub 15 SP2 in CVE-2020-28010
no cpe found for SUSE Package Hub 15 SP1 in CVE-2020-28009
no cpe found for SUSE Package Hub 15 SP2 in CVE-2020-28009
no cpe found for SUSE Package Hub 15 SP1 in CVE-2020-28008
no cpe found for SUSE Package Hub 15 SP2 in CVE-2020-28008
no cpe found for SUSE Package Hub 15 SP1 in CVE-2020-28007
no cpe found for SUSE Package Hub 15 SP2 in CVE-2020-28007
skipping CVE-2020-27845 as CVE page is older than CVRF-CVE file.
skipping CVE-2020-27844 as CVE page is older than CVRF-CVE file.
skipping CVE-2020-27843 as CVE page is older than CVRF-CVE file.
skipping CVE-2020-27842 as CVE page is older than CVRF-CVE file.
skipping CVE-2020-27841 as CVE page is older than CVRF-CVE file.
skipping CVE-2020-27840 as CVE page is older than CVRF-CVE file.
skipping CVE-2020-27839 as CVE page is older than CVRF-CVE file.
skipping CVE-2020-27837 as CVE page is older than CVRF-CVE file.
skipping CVE-2020-27834 as CVE page is older than CVRF-CVE file.
skipping CVE-2020-27830 as CVE page is older than CVRF-CVE file.
skipping CVE-2020-27829 as CVE page is older than CVRF-CVE file.
skipping CVE-2020-27824 as CVE page is older than CVRF-CVE file.
skipping CVE-2020-27823 as CVE page is older than CVRF-CVE file.
no cpe found for SUSE Package Hub 15 SP3 in CVE-2020-27819
no cpe found for SUSE Package Hub 15 SP1 in CVE-2020-27818
no cpe found for SUSE Package Hub 15 SP2 in CVE-2020-27818
skipping CVE-2020-27814 as CVE page is older than CVRF-CVE file.
skipping CVE-2020-27792 as CVE page is older than CVRF-CVE file.
skipping CVE-2020-27784 as CVE page is older than CVRF-CVE file.
skipping CVE-2020-27781 as CVE page is older than CVRF-CVE file.
skipping CVE-2020-27780 as CVE page is older than CVRF-CVE file.
skipping CVE-2020-27778 as CVE page is older than CVRF-CVE file.
skipping CVE-2020-27758 as CVE page is older than CVRF-CVE file.
skipping CVE-2020-27756 as CVE page is older than CVRF-CVE file.
skipping CVE-2020-27661 as CVE page is older than CVRF-CVE file.
skipping CVE-2020-27619 as CVE page is older than CVRF-CVE file.
skipping CVE-2020-27616 as CVE page is older than CVRF-CVE file.
no cpe found for SUSE Package Hub 15 SP1 in CVE-2020-27347
no cpe found for SUSE Package Hub 15 SP2 in CVE-2020-27347
skipping CVE-2020-27418 as CVE page is older than CVRF-CVE file.
no cpe found for SUSE Package Hub 15 SP2 in CVE-2020-27208
no cpe found for SUSE Package Hub 15 SP3 in CVE-2020-27208
skipping CVE-2020-27194 as CVE page is older than CVRF-CVE file.
skipping CVE-2020-27153 as CVE page is older than CVRF-CVE file.
skipping CVE-2020-27152 as CVE page is older than CVRF-CVE file.
skipping CVE-2020-27067 as CVE page is older than CVRF-CVE file.
CVE-2020-26945: no packages for SUSE Linux Enterprise Server 15 SP1-LTSS, but entry?
CVE-2020-26945: no packages for Image SLES15-SP3-Manager-4-2-Server-BYOS-EC2-HVM, but entry?
CVE-2020-26945: no packages for Image SLES15-SP4-Manager-Server-4-3-BYOS-GCE, but entry?
CVE-2020-26945: no packages for Image SLES15-SP6-SAP-Azure, but entry?
CVE-2020-26945: no packages for Image SLES15-SP5-SAPCAL-GCE, but entry?
CVE-2020-26945: no packages for Image SLES15-SP4-Manager-Server-4-3-BYOS-EC2, but entry?
CVE-2020-26945: no packages for Image SLES15-SP5-SAP-Azure-VLI-BYOS-Production, but entry?
CVE-2020-26945: no packages for Image SLES15-SP6-SAP-Azure-VLI-BYOS, but entry?
CVE-2020-26945: no packages for Image SLES15-SP5-SAP-Azure, but entry?
CVE-2020-26945: no packages for Image SLES15-SP6-SAPCAL-Azure, but entry?
CVE-2020-26945: no packages for Image SLES15-SP3-Manager-4-2-Server-BYOS-Azure, but entry?
CVE-2020-26945: no packages for SUSE Linux Enterprise Module for Web and Scripting 15 SP4, but entry?
CVE-2020-26945: no packages for Image SLES15-SP4-SAPCAL-EC2, but entry?
CVE-2020-26945: no packages for Image SLES15-SP4-SAPCAL-Azure, but entry?
CVE-2020-26945: no packages for Image SLES15-SP5-SAPCAL-EC2, but entry?
CVE-2020-26945: no packages for SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS, but entry?
CVE-2020-26945: no packages for SUSE Linux Enterprise Server for SAP Applications 15 SP1, but entry?
CVE-2020-26945: no packages for Image SLES15-SP4-SAP-EC2, but entry?
CVE-2020-26945: no packages for Container bci/openjdk:11-7.1, but entry?
CVE-2020-26945: no packages for Container bci/openjdk-devel:17-14.11, but entry?
CVE-2020-26945: no packages for Image SLES15-SP6-SAP-EC2, but entry?
CVE-2020-26945: no packages for Image SLES15-SP2-SAP-EC2-HVM, but entry?
CVE-2020-26945: no packages for Image SLES15-SP3-SAP-Azure-LI-BYOS-Production, but entry?
CVE-2020-26945: no packages for SUSE Linux Enterprise Server for SAP Applications 15 SP3, but entry?
CVE-2020-26945: no packages for SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS, but entry?
CVE-2020-26945: no packages for SUSE Linux Enterprise Module for Package Hub 15 SP5, but entry?
CVE-2020-26945: no packages for Image SLES15-SP4-SAP-Azure, but entry?
CVE-2020-26945: no packages for SUSE Linux Enterprise Workstation Extension 15 SP4, but entry?
CVE-2020-26945: no packages for Image SLES15-SP4-Manager-Server-4-3, but entry?
CVE-2020-26945: no packages for SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS, but entry?
CVE-2020-26945: no packages for SUSE Manager Proxy 4.2, but entry?
CVE-2020-26945: no packages for Image SLES15-SP4-SAP-Azure-LI-BYOS-Production, but entry?
CVE-2020-26945: no packages for Image SLES15-SP2-SAP-Azure-LI-BYOS-Production, but entry?
CVE-2020-26945: no packages for Image SLES15-SP4-Manager-Server-4-3-BYOS, but entry?
CVE-2020-26945: no packages for Image SLES15-SP2-SAP-Azure, but entry?
CVE-2020-26945: no packages for SUSE Linux Enterprise Module for Basesystem 15 SP5, but entry?
CVE-2020-26945: no packages for Image SLES15-SP3-SAPCAL-Azure, but entry?
CVE-2020-26945: no packages for Image SLES15-SP5-SAP-Azure-LI-BYOS-Production, but entry?
CVE-2020-26945: no packages for SUSE Linux Enterprise Module for Basesystem 15 SP6, but entry?
CVE-2020-26945: no packages for Image SLES15-SP6-SAPCAL, but entry?
CVE-2020-26945: no packages for Image SLES15-SP5-SAP-Azure-VLI-BYOS, but entry?
CVE-2020-26945: no packages for Image SLES15-SP4-Manager-Server-4-3-Azure-llc, but entry?
CVE-2020-26945: no packages for Image SLES15-SP2-SAP-BYOS-GCE, but entry?
CVE-2020-26945: no packages for Image SLES15-SP3-Manager-4-2-Server-BYOS-GCE, but entry?
CVE-2020-26945: no packages for openSUSE Leap 15.4, but entry?
CVE-2020-26945: no packages for SUSE Linux Enterprise Module for Web and Scripting 15 SP5, but entry?
CVE-2020-26945: no packages for SUSE Linux Enterprise Real Time 15 SP3, but entry?
CVE-2020-26945: no packages for Image SLES15-SP4-Manager-Server-4-3-Azure-ltd, but entry?
CVE-2020-26945: no packages for Container bci/openjdk-devel:17-7.2, but entry?
CVE-2020-26945: no packages for Image SLES15-SP5-SAPCAL-Azure, but entry?
CVE-2020-26945: no packages for SUSE Linux Enterprise Server for SAP Applications 15 SP2, but entry?
CVE-2020-26945: no packages for Image SLES15-SP5-SAP-GCE, but entry?
CVE-2020-26945: no packages for SUSE Linux Enterprise Workstation Extension 15 SP5, but entry?
CVE-2020-26945: no packages for Image SLES15-SP6-SAP-GCE, but entry?
CVE-2020-26945: no packages for Image SLES15-SP4-Manager-Server-4-3-BYOS-Azure, but entry?
CVE-2020-26945: no packages for Image SLES15-SP6-SAPCAL-GCE, but entry?
CVE-2020-26945: no packages for Container bci/openjdk-devel:11-6.2, but entry?
CVE-2020-26945: no packages for Image SLES15-SP4-SAP-Azure-VLI-BYOS-Production, but entry?
CVE-2020-26945: no packages for Image SLES15-SP5-SAP-Azure-LI-BYOS, but entry?
CVE-2020-26945: no packages for SUSE Manager Server Module 4.2, but entry?
CVE-2020-26945: no packages for SUSE CaaS Platform 4.0, but entry?
CVE-2020-26945: no packages for Image SLES15-SP2-SAP-Azure-VLI-BYOS-Production, but entry?
CVE-2020-26945: no packages for Image SLES15-SP2-SAP-BYOS-EC2-HVM, but entry?
CVE-2020-26945: no packages for Image SLES15-SP2-SAP-GCE, but entry?
CVE-2020-26945: no packages for Container bci/kiwi:9.24.43-8.6, but entry?
CVE-2020-26945: no packages for Image SLES15-SP4-SAP-GCE, but entry?
CVE-2020-26945: no packages for SUSE Linux Enterprise Server 15 SP4-TERADATA, but entry?
CVE-2020-26945: no packages for Image SLES15-SP4-SAP-Azure-VLI-BYOS, but entry?
CVE-2020-26945: no packages for Image SLES15-SP6-SAP-Azure-LI-BYOS, but entry?
CVE-2020-26945: no packages for SUSE Enterprise Storage 7, but entry?
CVE-2020-26945: no packages for SUSE Manager Server Module 4.3, but entry?
CVE-2020-26945: no packages for Image SLES15-SP6-SAP-Azure-VLI-BYOS-Production, but entry?
CVE-2020-26945: no packages for SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS, but entry?
CVE-2020-26945: no packages for SUSE Linux Enterprise Workstation Extension 15 SP6, but entry?
CVE-2020-26945: no packages for SUSE Linux Enterprise Server 15 SP2-LTSS, but entry?
CVE-2020-26945: no packages for Image SLES15-SP6-SAP-Azure-LI-BYOS-Production, but entry?
CVE-2020-26945: no packages for SUSE Linux Enterprise Module for Package Hub 15 SP4, but entry?
CVE-2020-26945: no packages for SUSE Manager Retail Branch Server 4.2, but entry?
CVE-2020-26945: no packages for Image SLES15-SP4-SAP, but entry?
CVE-2020-26945: no packages for Image SLES15-SP4-Manager-Server-4-3-EC2-llc, but entry?
CVE-2020-26945: no packages for Image SLES15-SP3-SAPCAL-EC2-HVM, but entry?
CVE-2020-26945: no packages for SUSE Manager Server 4.2, but entry?
CVE-2020-26945: no packages for Image SLES15-SP4-SAP-Azure-LI-BYOS, but entry?
CVE-2020-26945: no packages for SUSE Enterprise Storage 7.1, but entry?
CVE-2020-26945: no packages for SUSE Linux Enterprise Module for Development Tools 15 SP6, but entry?
CVE-2020-26945: no packages for Image SLES15-SP6-SAP, but entry?
CVE-2020-26945: no packages for Image SLES15-SP3-SAPCAL-GCE, but entry?
CVE-2020-26945: no packages for Image SLES15-SP4-SAPCAL-GCE, but entry?
CVE-2020-26945: no packages for Image SLES15-SP4-Manager-Server-4-3-EC2-ltd, but entry?
CVE-2020-26945: no packages for Image SLES15-SP3-SAP-Azure-VLI-BYOS-Production, but entry?
CVE-2020-26945: no packages for Container bci/openjdk:17-7.1, but entry?
CVE-2020-26945: no packages for SUSE Linux Enterprise Module for Package Hub 15 SP6, but entry?
CVE-2020-26945: no packages for SUSE Linux Enterprise Module for Basesystem 15 SP4, but entry?
CVE-2020-26945: no packages for SUSE Linux Enterprise Server 15 SP3-LTSS, but entry?
CVE-2020-26945: no packages for Image SLES15-SP4-SAPCAL, but entry?
CVE-2020-26945: no packages for Image SLES15-SP6-SAPCAL-EC2, but entry?
CVE-2020-26945: no packages for SUSE Linux Enterprise Module for Development Tools 15 SP4, but entry?
CVE-2020-26945: no packages for Container bci/openjdk:latest, but entry?
CVE-2020-26945: no packages for SUSE Linux Enterprise Module for Web and Scripting 15 SP6, but entry?
CVE-2020-26945: no packages for Image SLES15-SP5-SAP-EC2, but entry?
CVE-2020-26945: no packages for Image SLES15-SP2-SAP-BYOS-Azure, but entry?
CVE-2020-26945: no packages for SUSE Linux Enterprise Module for Development Tools 15 SP5, but entry?
CVE-2020-26945: no packages for Container bci/kiwi:9.24.43-8.6, but entry?
CVE-2020-26945: no packages for Container bci/openjdk-devel:11-6.2, but entry?
CVE-2020-26945: no packages for Container bci/openjdk-devel:17-14.11, but entry?
CVE-2020-26945: no packages for Container bci/openjdk-devel:17-7.2, but entry?
CVE-2020-26945: no packages for Container bci/openjdk:11-7.1, but entry?
CVE-2020-26945: no packages for Container bci/openjdk:17-7.1, but entry?
CVE-2020-26945: no packages for Container bci/openjdk:latest, but entry?
CVE-2020-26945: no packages for Image SLES15-SP2-SAP-Azure, but entry?
CVE-2020-26945: no packages for Image SLES15-SP2-SAP-Azure-LI-BYOS-Production, but entry?
CVE-2020-26945: no packages for Image SLES15-SP2-SAP-Azure-VLI-BYOS-Production, but entry?
CVE-2020-26945: no packages for Image SLES15-SP2-SAP-BYOS-Azure, but entry?
CVE-2020-26945: no packages for Image SLES15-SP2-SAP-BYOS-EC2-HVM, but entry?
CVE-2020-26945: no packages for Image SLES15-SP2-SAP-BYOS-GCE, but entry?
CVE-2020-26945: no packages for Image SLES15-SP2-SAP-EC2-HVM, but entry?
CVE-2020-26945: no packages for Image SLES15-SP2-SAP-GCE, but entry?
CVE-2020-26945: no packages for Image SLES15-SP3-Manager-4-2-Server-BYOS-Azure, but entry?
CVE-2020-26945: no packages for Image SLES15-SP3-Manager-4-2-Server-BYOS-EC2-HVM, but entry?
CVE-2020-26945: no packages for Image SLES15-SP3-Manager-4-2-Server-BYOS-GCE, but entry?
CVE-2020-26945: no packages for Image SLES15-SP3-SAP-Azure-LI-BYOS-Production, but entry?
CVE-2020-26945: no packages for Image SLES15-SP3-SAP-Azure-VLI-BYOS-Production, but entry?
CVE-2020-26945: no packages for Image SLES15-SP3-SAPCAL-Azure, but entry?
CVE-2020-26945: no packages for Image SLES15-SP3-SAPCAL-EC2-HVM, but entry?
CVE-2020-26945: no packages for Image SLES15-SP3-SAPCAL-GCE, but entry?
CVE-2020-26945: no packages for Image SLES15-SP4-Manager-Server-4-3, but entry?
CVE-2020-26945: no packages for Image SLES15-SP4-Manager-Server-4-3-Azure-llc, but entry?
CVE-2020-26945: no packages for Image SLES15-SP4-Manager-Server-4-3-Azure-ltd, but entry?
CVE-2020-26945: no packages for Image SLES15-SP4-Manager-Server-4-3-BYOS, but entry?
CVE-2020-26945: no packages for Image SLES15-SP4-Manager-Server-4-3-BYOS-Azure, but entry?
CVE-2020-26945: no packages for Image SLES15-SP4-Manager-Server-4-3-BYOS-EC2, but entry?
CVE-2020-26945: no packages for Image SLES15-SP4-Manager-Server-4-3-BYOS-GCE, but entry?
CVE-2020-26945: no packages for Image SLES15-SP4-Manager-Server-4-3-EC2-llc, but entry?
CVE-2020-26945: no packages for Image SLES15-SP4-Manager-Server-4-3-EC2-ltd, but entry?
CVE-2020-26945: no packages for Image SLES15-SP4-SAP, but entry?
CVE-2020-26945: no packages for Image SLES15-SP4-SAP-Azure, but entry?
CVE-2020-26945: no packages for Image SLES15-SP4-SAP-Azure-LI-BYOS, but entry?
CVE-2020-26945: no packages for Image SLES15-SP4-SAP-Azure-LI-BYOS-Production, but entry?
CVE-2020-26945: no packages for Image SLES15-SP4-SAP-Azure-VLI-BYOS, but entry?
CVE-2020-26945: no packages for Image SLES15-SP4-SAP-Azure-VLI-BYOS-Production, but entry?
CVE-2020-26945: no packages for Image SLES15-SP4-SAP-EC2, but entry?
CVE-2020-26945: no packages for Image SLES15-SP4-SAP-GCE, but entry?
CVE-2020-26945: no packages for Image SLES15-SP4-SAPCAL, but entry?
CVE-2020-26945: no packages for Image SLES15-SP4-SAPCAL-Azure, but entry?
CVE-2020-26945: no packages for Image SLES15-SP4-SAPCAL-EC2, but entry?
CVE-2020-26945: no packages for Image SLES15-SP4-SAPCAL-GCE, but entry?
CVE-2020-26945: no packages for Image SLES15-SP5-SAP-Azure, but entry?
CVE-2020-26945: no packages for Image SLES15-SP5-SAP-Azure-LI-BYOS, but entry?
CVE-2020-26945: no packages for Image SLES15-SP5-SAP-Azure-LI-BYOS-Production, but entry?
CVE-2020-26945: no packages for Image SLES15-SP5-SAP-Azure-VLI-BYOS, but entry?
CVE-2020-26945: no packages for Image SLES15-SP5-SAP-Azure-VLI-BYOS-Production, but entry?
CVE-2020-26945: no packages for Image SLES15-SP5-SAP-EC2, but entry?
CVE-2020-26945: no packages for Image SLES15-SP5-SAP-GCE, but entry?
CVE-2020-26945: no packages for Image SLES15-SP5-SAPCAL-Azure, but entry?
CVE-2020-26945: no packages for Image SLES15-SP5-SAPCAL-EC2, but entry?
CVE-2020-26945: no packages for Image SLES15-SP5-SAPCAL-GCE, but entry?
CVE-2020-26945: no packages for Image SLES15-SP6-SAP, but entry?
CVE-2020-26945: no packages for Image SLES15-SP6-SAP-Azure, but entry?
CVE-2020-26945: no packages for Image SLES15-SP6-SAP-Azure-LI-BYOS, but entry?
CVE-2020-26945: no packages for Image SLES15-SP6-SAP-Azure-LI-BYOS-Production, but entry?
CVE-2020-26945: no packages for Image SLES15-SP6-SAP-Azure-VLI-BYOS, but entry?
CVE-2020-26945: no packages for Image SLES15-SP6-SAP-Azure-VLI-BYOS-Production, but entry?
CVE-2020-26945: no packages for Image SLES15-SP6-SAP-EC2, but entry?
CVE-2020-26945: no packages for Image SLES15-SP6-SAP-GCE, but entry?
CVE-2020-26945: no packages for Image SLES15-SP6-SAPCAL, but entry?
CVE-2020-26945: no packages for Image SLES15-SP6-SAPCAL-Azure, but entry?
CVE-2020-26945: no packages for Image SLES15-SP6-SAPCAL-EC2, but entry?
CVE-2020-26945: no packages for Image SLES15-SP6-SAPCAL-GCE, but entry?
CVE-2020-26945: no packages for SUSE CaaS Platform 4.0, but entry?
CVE-2020-26945: no packages for SUSE Enterprise Storage 7, but entry?
CVE-2020-26945: no packages for SUSE Enterprise Storage 7.1, but entry?
CVE-2020-26945: no packages for SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS, but entry?
CVE-2020-26945: no packages for SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS, but entry?
CVE-2020-26945: no packages for SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS, but entry?
CVE-2020-26945: no packages for SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS, but entry?
CVE-2020-26945: no packages for SUSE Linux Enterprise Module for Basesystem 15 SP4, but entry?
CVE-2020-26945: no packages for SUSE Linux Enterprise Module for Basesystem 15 SP5, but entry?
CVE-2020-26945: no packages for SUSE Linux Enterprise Module for Basesystem 15 SP6, but entry?
CVE-2020-26945: no packages for SUSE Linux Enterprise Module for Development Tools 15 SP4, but entry?
CVE-2020-26945: no packages for SUSE Linux Enterprise Module for Development Tools 15 SP5, but entry?
CVE-2020-26945: no packages for SUSE Linux Enterprise Module for Development Tools 15 SP6, but entry?
CVE-2020-26945: no packages for SUSE Linux Enterprise Module for Package Hub 15 SP4, but entry?
CVE-2020-26945: no packages for SUSE Linux Enterprise Module for Package Hub 15 SP5, but entry?
CVE-2020-26945: no packages for SUSE Linux Enterprise Module for Package Hub 15 SP6, but entry?
CVE-2020-26945: no packages for SUSE Linux Enterprise Module for Web and Scripting 15 SP4, but entry?
CVE-2020-26945: no packages for SUSE Linux Enterprise Module for Web and Scripting 15 SP5, but entry?
CVE-2020-26945: no packages for SUSE Linux Enterprise Module for Web and Scripting 15 SP6, but entry?
CVE-2020-26945: no packages for SUSE Linux Enterprise Real Time 15 SP3, but entry?
CVE-2020-26945: no packages for SUSE Linux Enterprise Server 15 SP1-LTSS, but entry?
CVE-2020-26945: no packages for SUSE Linux Enterprise Server 15 SP2-LTSS, but entry?
CVE-2020-26945: no packages for SUSE Linux Enterprise Server 15 SP3-LTSS, but entry?
CVE-2020-26945: no packages for SUSE Linux Enterprise Server 15 SP4-TERADATA, but entry?
CVE-2020-26945: no packages for SUSE Linux Enterprise Server for SAP Applications 15 SP1, but entry?
CVE-2020-26945: no packages for SUSE Linux Enterprise Server for SAP Applications 15 SP2, but entry?
CVE-2020-26945: no packages for SUSE Linux Enterprise Server for SAP Applications 15 SP3, but entry?
CVE-2020-26945: no packages for SUSE Linux Enterprise Workstation Extension 15 SP4, but entry?
CVE-2020-26945: no packages for SUSE Linux Enterprise Workstation Extension 15 SP5, but entry?
CVE-2020-26945: no packages for SUSE Linux Enterprise Workstation Extension 15 SP6, but entry?
CVE-2020-26945: no packages for SUSE Manager Proxy 4.2, but entry?
CVE-2020-26945: no packages for SUSE Manager Retail Branch Server 4.2, but entry?
CVE-2020-26945: no packages for SUSE Manager Server 4.2, but entry?
CVE-2020-26945: no packages for SUSE Manager Server Module 4.2, but entry?
CVE-2020-26945: no packages for SUSE Manager Server Module 4.3, but entry?
CVE-2020-26945: no packages for openSUSE Leap 15.4, but entry?
CVE-2020-26945: no packages for Container bci/kiwi:9.24.43-8.6, but entry?
CVE-2020-26945: no packages for Container bci/openjdk-devel:11-6.2, but entry?
CVE-2020-26945: no packages for Container bci/openjdk-devel:17-14.11, but entry?
CVE-2020-26945: no packages for Container bci/openjdk-devel:17-7.2, but entry?
CVE-2020-26945: no packages for Container bci/openjdk:11-7.1, but entry?
CVE-2020-26945: no packages for Container bci/openjdk:17-7.1, but entry?
CVE-2020-26945: no packages for Container bci/openjdk:latest, but entry?
CVE-2020-26945: no packages for Image SLES15-SP2-SAP-Azure, but entry?
CVE-2020-26945: no packages for Image SLES15-SP2-SAP-Azure-LI-BYOS-Production, but entry?
CVE-2020-26945: no packages for Image SLES15-SP2-SAP-Azure-VLI-BYOS-Production, but entry?
CVE-2020-26945: no packages for Image SLES15-SP2-SAP-BYOS-Azure, but entry?
CVE-2020-26945: no packages for Image SLES15-SP2-SAP-BYOS-EC2-HVM, but entry?
CVE-2020-26945: no packages for Image SLES15-SP2-SAP-BYOS-GCE, but entry?
CVE-2020-26945: no packages for Image SLES15-SP2-SAP-EC2-HVM, but entry?
CVE-2020-26945: no packages for Image SLES15-SP2-SAP-GCE, but entry?
CVE-2020-26945: no packages for Image SLES15-SP3-Manager-4-2-Server-BYOS-Azure, but entry?
CVE-2020-26945: no packages for Image SLES15-SP3-Manager-4-2-Server-BYOS-EC2-HVM, but entry?
CVE-2020-26945: no packages for Image SLES15-SP3-Manager-4-2-Server-BYOS-GCE, but entry?
CVE-2020-26945: no packages for Image SLES15-SP3-SAP-Azure-LI-BYOS-Production, but entry?
CVE-2020-26945: no packages for Image SLES15-SP3-SAP-Azure-VLI-BYOS-Production, but entry?
CVE-2020-26945: no packages for Image SLES15-SP3-SAPCAL-Azure, but entry?
CVE-2020-26945: no packages for Image SLES15-SP3-SAPCAL-EC2-HVM, but entry?
CVE-2020-26945: no packages for Image SLES15-SP3-SAPCAL-GCE, but entry?
CVE-2020-26945: no packages for Image SLES15-SP4-Manager-Server-4-3, but entry?
CVE-2020-26945: no packages for Image SLES15-SP4-Manager-Server-4-3-Azure-llc, but entry?
CVE-2020-26945: no packages for Image SLES15-SP4-Manager-Server-4-3-Azure-ltd, but entry?
CVE-2020-26945: no packages for Image SLES15-SP4-Manager-Server-4-3-BYOS, but entry?
CVE-2020-26945: no packages for Image SLES15-SP4-Manager-Server-4-3-BYOS-Azure, but entry?
CVE-2020-26945: no packages for Image SLES15-SP4-Manager-Server-4-3-BYOS-EC2, but entry?
CVE-2020-26945: no packages for Image SLES15-SP4-Manager-Server-4-3-BYOS-GCE, but entry?
CVE-2020-26945: no packages for Image SLES15-SP4-Manager-Server-4-3-EC2-llc, but entry?
CVE-2020-26945: no packages for Image SLES15-SP4-Manager-Server-4-3-EC2-ltd, but entry?
CVE-2020-26945: no packages for Image SLES15-SP4-SAP, but entry?
CVE-2020-26945: no packages for Image SLES15-SP4-SAP-Azure, but entry?
CVE-2020-26945: no packages for Image SLES15-SP4-SAP-Azure-LI-BYOS, but entry?
CVE-2020-26945: no packages for Image SLES15-SP4-SAP-Azure-LI-BYOS-Production, but entry?
CVE-2020-26945: no packages for Image SLES15-SP4-SAP-Azure-VLI-BYOS, but entry?
CVE-2020-26945: no packages for Image SLES15-SP4-SAP-Azure-VLI-BYOS-Production, but entry?
CVE-2020-26945: no packages for Image SLES15-SP4-SAP-EC2, but entry?
CVE-2020-26945: no packages for Image SLES15-SP4-SAP-GCE, but entry?
CVE-2020-26945: no packages for Image SLES15-SP4-SAPCAL, but entry?
CVE-2020-26945: no packages for Image SLES15-SP4-SAPCAL-Azure, but entry?
CVE-2020-26945: no packages for Image SLES15-SP4-SAPCAL-EC2, but entry?
CVE-2020-26945: no packages for Image SLES15-SP4-SAPCAL-GCE, but entry?
CVE-2020-26945: no packages for Image SLES15-SP5-SAP-Azure, but entry?
CVE-2020-26945: no packages for Image SLES15-SP5-SAP-Azure-LI-BYOS, but entry?
CVE-2020-26945: no packages for Image SLES15-SP5-SAP-Azure-LI-BYOS-Production, but entry?
CVE-2020-26945: no packages for Image SLES15-SP5-SAP-Azure-VLI-BYOS, but entry?
CVE-2020-26945: no packages for Image SLES15-SP5-SAP-Azure-VLI-BYOS-Production, but entry?
CVE-2020-26945: no packages for Image SLES15-SP5-SAP-EC2, but entry?
CVE-2020-26945: no packages for Image SLES15-SP5-SAP-GCE, but entry?
CVE-2020-26945: no packages for Image SLES15-SP5-SAPCAL-Azure, but entry?
CVE-2020-26945: no packages for Image SLES15-SP5-SAPCAL-EC2, but entry?
CVE-2020-26945: no packages for Image SLES15-SP5-SAPCAL-GCE, but entry?
CVE-2020-26945: no packages for Image SLES15-SP6-SAP, but entry?
CVE-2020-26945: no packages for Image SLES15-SP6-SAP-Azure, but entry?
CVE-2020-26945: no packages for Image SLES15-SP6-SAP-Azure-LI-BYOS, but entry?
CVE-2020-26945: no packages for Image SLES15-SP6-SAP-Azure-LI-BYOS-Production, but entry?
CVE-2020-26945: no packages for Image SLES15-SP6-SAP-Azure-VLI-BYOS, but entry?
CVE-2020-26945: no packages for Image SLES15-SP6-SAP-Azure-VLI-BYOS-Production, but entry?
CVE-2020-26945: no packages for Image SLES15-SP6-SAP-EC2, but entry?
CVE-2020-26945: no packages for Image SLES15-SP6-SAP-GCE, but entry?
CVE-2020-26945: no packages for Image SLES15-SP6-SAPCAL, but entry?
CVE-2020-26945: no packages for Image SLES15-SP6-SAPCAL-Azure, but entry?
CVE-2020-26945: no packages for Image SLES15-SP6-SAPCAL-EC2, but entry?
CVE-2020-26945: no packages for Image SLES15-SP6-SAPCAL-GCE, but entry?
CVE-2020-26945: no packages for SUSE CaaS Platform 4.0, but entry?
CVE-2020-26945: no packages for SUSE Enterprise Storage 7, but entry?
CVE-2020-26945: no packages for SUSE Enterprise Storage 7.1, but entry?
CVE-2020-26945: no packages for SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS, but entry?
CVE-2020-26945: no packages for SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS, but entry?
CVE-2020-26945: no packages for SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS, but entry?
CVE-2020-26945: no packages for SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS, but entry?
CVE-2020-26945: no packages for SUSE Linux Enterprise Module for Basesystem 15 SP4, but entry?
CVE-2020-26945: no packages for SUSE Linux Enterprise Module for Basesystem 15 SP5, but entry?
CVE-2020-26945: no packages for SUSE Linux Enterprise Module for Basesystem 15 SP6, but entry?
CVE-2020-26945: no packages for SUSE Linux Enterprise Module for Development Tools 15 SP4, but entry?
CVE-2020-26945: no packages for SUSE Linux Enterprise Module for Development Tools 15 SP5, but entry?
CVE-2020-26945: no packages for SUSE Linux Enterprise Module for Development Tools 15 SP6, but entry?
CVE-2020-26945: no packages for SUSE Linux Enterprise Module for Package Hub 15 SP4, but entry?
CVE-2020-26945: no packages for SUSE Linux Enterprise Module for Package Hub 15 SP5, but entry?
CVE-2020-26945: no packages for SUSE Linux Enterprise Module for Package Hub 15 SP6, but entry?
CVE-2020-26945: no packages for SUSE Linux Enterprise Module for Web and Scripting 15 SP4, but entry?
CVE-2020-26945: no packages for SUSE Linux Enterprise Module for Web and Scripting 15 SP5, but entry?
CVE-2020-26945: no packages for SUSE Linux Enterprise Module for Web and Scripting 15 SP6, but entry?
CVE-2020-26945: no packages for SUSE Linux Enterprise Real Time 15 SP3, but entry?
CVE-2020-26945: no packages for SUSE Linux Enterprise Server 15 SP1-LTSS, but entry?
CVE-2020-26945: no packages for SUSE Linux Enterprise Server 15 SP2-LTSS, but entry?
CVE-2020-26945: no packages for SUSE Linux Enterprise Server 15 SP3-LTSS, but entry?
CVE-2020-26945: no packages for SUSE Linux Enterprise Server 15 SP4-TERADATA, but entry?
CVE-2020-26945: no packages for SUSE Linux Enterprise Server for SAP Applications 15 SP1, but entry?
CVE-2020-26945: no packages for SUSE Linux Enterprise Server for SAP Applications 15 SP2, but entry?
CVE-2020-26945: no packages for SUSE Linux Enterprise Server for SAP Applications 15 SP3, but entry?
CVE-2020-26945: no packages for SUSE Linux Enterprise Workstation Extension 15 SP4, but entry?
CVE-2020-26945: no packages for SUSE Linux Enterprise Workstation Extension 15 SP5, but entry?
CVE-2020-26945: no packages for SUSE Linux Enterprise Workstation Extension 15 SP6, but entry?
CVE-2020-26945: no packages for SUSE Manager Proxy 4.2, but entry?
CVE-2020-26945: no packages for SUSE Manager Retail Branch Server 4.2, but entry?
CVE-2020-26945: no packages for SUSE Manager Server 4.2, but entry?
CVE-2020-26945: no packages for SUSE Manager Server Module 4.2, but entry?
CVE-2020-26945: no packages for SUSE Manager Server Module 4.3, but entry?
CVE-2020-26945: no packages for openSUSE Leap 15.4, but entry?
no cpe found for SUSE Package Hub 15 in CVE-2020-26935
no cpe found for SUSE Package Hub 15 SP1 in CVE-2020-26935
no cpe found for SUSE Package Hub 15 SP2 in CVE-2020-26935
no cpe found for SUSE Package Hub 15 in CVE-2020-26934
no cpe found for SUSE Package Hub 15 SP1 in CVE-2020-26934
no cpe found for SUSE Package Hub 15 SP2 in CVE-2020-26934
no cpe found for SUSE Package Hub 15 SP1 in CVE-2020-26664
no cpe found for SUSE Package Hub 15 SP2 in CVE-2020-26664
skipping CVE-2020-26682 as CVE page is older than CVRF-CVE file.
skipping CVE-2020-26575 as CVE page is older than CVRF-CVE file.
skipping CVE-2020-26560 as CVE page is older than CVRF-CVE file.
skipping CVE-2020-26559 as CVE page is older than CVRF-CVE file.
skipping CVE-2020-26557 as CVE page is older than CVRF-CVE file.
skipping CVE-2020-26556 as CVE page is older than CVRF-CVE file.
skipping CVE-2020-26555 as CVE page is older than CVRF-CVE file.
skipping CVE-2020-26422 as CVE page is older than CVRF-CVE file.
skipping CVE-2020-26421 as CVE page is older than CVRF-CVE file.
skipping CVE-2020-26420 as CVE page is older than CVRF-CVE file.
skipping CVE-2020-26419 as CVE page is older than CVRF-CVE file.
skipping CVE-2020-26418 as CVE page is older than CVRF-CVE file.
no cpe found for SUSE Package Hub 15 SP3 in CVE-2020-26271
no cpe found for SUSE Package Hub 15 SP3 in CVE-2020-26270
no cpe found for SUSE Package Hub 15 SP3 in CVE-2020-26268
no cpe found for SUSE Package Hub 15 SP3 in CVE-2020-26267
no cpe found for SUSE Package Hub 15 SP3 in CVE-2020-26266
skipping CVE-2020-26259 as CVE page is older than CVRF-CVE file.
skipping CVE-2020-26258 as CVE page is older than CVRF-CVE file.
skipping CVE-2020-26247 as CVE page is older than CVRF-CVE file.
no cpe found for SUSE Package Hub 15 SP1 in CVE-2020-26215
skipping CVE-2020-26217 as CVE page is older than CVRF-CVE file.
no cpe found for SUSE Package Hub 15 SP1 in CVE-2020-26164
no cpe found for SUSE Package Hub 15 SP2 in CVE-2020-26164
no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2020-26159
skipping CVE-2020-26147 as CVE page is older than CVRF-CVE file.
skipping CVE-2020-26141 as CVE page is older than CVRF-CVE file.
no cpe found for SUSE Package Hub 15 SP1 in CVE-2020-25829
no cpe found for SUSE Package Hub 15 SP2 in CVE-2020-25829
skipping CVE-2020-25866 as CVE page is older than CVRF-CVE file.
skipping CVE-2020-25863 as CVE page is older than CVRF-CVE file.
skipping CVE-2020-25862 as CVE page is older than CVRF-CVE file.
skipping CVE-2020-25743 as CVE page is older than CVRF-CVE file.
skipping CVE-2020-25741 as CVE page is older than CVRF-CVE file.
skipping CVE-2020-25725 as CVE page is older than CVRF-CVE file.
skipping CVE-2020-25723 as CVE page is older than CVRF-CVE file.
skipping CVE-2020-25722 as CVE page is older than CVRF-CVE file.
skipping CVE-2020-25720 as CVE page is older than CVRF-CVE file.
skipping CVE-2020-25719 as CVE page is older than CVRF-CVE file.
skipping CVE-2020-25718 as CVE page is older than CVRF-CVE file.
skipping CVE-2020-25713 as CVE page is older than CVRF-CVE file.
no cpe found for SUSE Liberty Linux 7 LTSS in CVE-2020-25710
skipping CVE-2020-25709 as CVE page is older than CVRF-CVE file.
skipping CVE-2020-25707 as CVE page is older than CVRF-CVE file.
skipping CVE-2020-25705 as CVE page is older than CVRF-CVE file.
skipping CVE-2020-25697 as CVE page is older than CVRF-CVE file.
skipping CVE-2020-25696 as CVE page is older than CVRF-CVE file.
skipping CVE-2020-25692 as CVE page is older than CVRF-CVE file.
skipping CVE-2020-25678 as CVE page is older than CVRF-CVE file.
skipping CVE-2020-25677 as CVE page is older than CVRF-CVE file.
skipping CVE-2020-25667 as CVE page is older than CVRF-CVE file.
CVE-2020-25659: no packages for SUSE Linux Enterprise Module for Server Applications 15 SP5, but entry?
CVE-2020-25659: no packages for SUSE Linux Enterprise Module for Server Applications 15 SP4, but entry?
CVE-2020-25659: no packages for SUSE Linux Enterprise Module for Public Cloud 15 SP3, but entry?
CVE-2020-25659: no packages for SUSE Linux Enterprise Module for Public Cloud 15 SP6, but entry?
CVE-2020-25659: no packages for Image SLES15-SAP-Azure-BYOS, but entry?
CVE-2020-25659: no packages for SUSE Package Hub 15 SP2, but entry?
CVE-2020-25659: no packages for SUSE Linux Enterprise Module for Package Hub 15 SP2, but entry?
CVE-2020-25659: no packages for Container ses/7/prometheus-webhook-snmp:1.4.1.282, but entry?
CVE-2020-25659: no packages for SUSE Linux Enterprise Installer Updates 15 SP1, but entry?
CVE-2020-25659: no packages for SUSE Linux Enterprise Module for Development Tools 15 SP3, but entry?
CVE-2020-25659: no packages for SUSE Linux Enterprise Module for Development Tools 15 SP6, but entry?
CVE-2020-25659: no packages for Image SLES15-SP1-CHOST-BYOS-GCE, but entry?
CVE-2020-25659: no packages for Container caasp/v4/389-ds:1.4.2, but entry?
CVE-2020-25659: no packages for SUSE Linux Enterprise Module for Package Hub 15 SP4, but entry?
CVE-2020-25659: no packages for SUSE Linux Enterprise Module for Package Hub 15 SP3, but entry?
CVE-2020-25659: no packages for SUSE Linux Enterprise Module for Public Cloud 15 SP5, but entry?
CVE-2020-25659: no packages for SUSE Linux Enterprise Module for Development Tools 15 SP2, but entry?
CVE-2020-25659: no packages for SUSE Linux Enterprise Module for Development Tools 15 SP4, but entry?
CVE-2020-25659: no packages for SUSE Linux Enterprise Module for Public Cloud 15, but entry?
CVE-2020-25659: no packages for SUSE Linux Enterprise Module for Development Tools 15 SP5, but entry?
CVE-2020-25659: no packages for SUSE Linux Enterprise Module for Package Hub 15 SP6, but entry?
CVE-2020-25659: no packages for Image SLES15-EC2-HVM-BYOS, but entry?
CVE-2020-25659: no packages for Image SLES15-SAP-EC2-HVM, but entry?
CVE-2020-25659: no packages for SUSE Linux Enterprise Micro 5.0, but entry?
CVE-2020-25659: no packages for SUSE Linux Enterprise Module for Server Applications 15 SP6, but entry?
CVE-2020-25659: no packages for Image SLES15-SAP-EC2-HVM-BYOS, but entry?
CVE-2020-25659: no packages for SUSE Linux Enterprise Module for Package Hub 15 SP5, but entry?
CVE-2020-25659: no packages for Image SLES15-SAP-Azure, but entry?
CVE-2020-25659: no packages for Container suse/sle15:15.1.6.2.811, but entry?
CVE-2020-25659: no packages for Image SLES15-EC2-CHOST-HVM-BYOS, but entry?
CVE-2020-25659: no packages for Image SLES15-SP2-GCE, but entry?
CVE-2020-25659: no packages for Image SLES15-Azure-BYOS, but entry?
no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2020-25659
CVE-2020-25659: no packages for Container caasp/v4/389-ds:1.4.2, but entry?
CVE-2020-25659: no packages for Container ses/7/prometheus-webhook-snmp:1.4.1.282, but entry?
CVE-2020-25659: no packages for Container suse/sle15:15.1.6.2.811, but entry?
CVE-2020-25659: no packages for Image SLES15-Azure-BYOS, but entry?
CVE-2020-25659: no packages for Image SLES15-EC2-CHOST-HVM-BYOS, but entry?
CVE-2020-25659: no packages for Image SLES15-EC2-HVM-BYOS, but entry?
CVE-2020-25659: no packages for Image SLES15-SAP-Azure, but entry?
CVE-2020-25659: no packages for Image SLES15-SAP-Azure-BYOS, but entry?
CVE-2020-25659: no packages for Image SLES15-SAP-EC2-HVM, but entry?
CVE-2020-25659: no packages for Image SLES15-SAP-EC2-HVM-BYOS, but entry?
CVE-2020-25659: no packages for Image SLES15-SP1-CHOST-BYOS-GCE, but entry?
CVE-2020-25659: no packages for Image SLES15-SP2-GCE, but entry?
CVE-2020-25659: no packages for SUSE Linux Enterprise Installer Updates 15 SP1, but entry?
CVE-2020-25659: no packages for SUSE Linux Enterprise Micro 5.0, but entry?
CVE-2020-25659: no packages for SUSE Linux Enterprise Module for Development Tools 15 SP2, but entry?
CVE-2020-25659: no packages for SUSE Linux Enterprise Module for Development Tools 15 SP3, but entry?
CVE-2020-25659: no packages for SUSE Linux Enterprise Module for Development Tools 15 SP4, but entry?
CVE-2020-25659: no packages for SUSE Linux Enterprise Module for Development Tools 15 SP5, but entry?
CVE-2020-25659: no packages for SUSE Linux Enterprise Module for Development Tools 15 SP6, but entry?
CVE-2020-25659: no packages for SUSE Linux Enterprise Module for Package Hub 15 SP2, but entry?
CVE-2020-25659: no packages for SUSE Linux Enterprise Module for Package Hub 15 SP3, but entry?
CVE-2020-25659: no packages for SUSE Linux Enterprise Module for Package Hub 15 SP4, but entry?
CVE-2020-25659: no packages for SUSE Linux Enterprise Module for Package Hub 15 SP5, but entry?
CVE-2020-25659: no packages for SUSE Linux Enterprise Module for Package Hub 15 SP6, but entry?
CVE-2020-25659: no packages for SUSE Linux Enterprise Module for Public Cloud 15, but entry?
CVE-2020-25659: no packages for SUSE Linux Enterprise Module for Public Cloud 15 SP3, but entry?
CVE-2020-25659: no packages for SUSE Linux Enterprise Module for Public Cloud 15 SP5, but entry?
CVE-2020-25659: no packages for SUSE Linux Enterprise Module for Public Cloud 15 SP6, but entry?
CVE-2020-25659: no packages for SUSE Linux Enterprise Module for Server Applications 15 SP4, but entry?
CVE-2020-25659: no packages for SUSE Linux Enterprise Module for Server Applications 15 SP5, but entry?
CVE-2020-25659: no packages for SUSE Linux Enterprise Module for Server Applications 15 SP6, but entry?
CVE-2020-25659: no packages for SUSE Package Hub 15 SP2, but entry?
CVE-2020-25659: no packages for Container caasp/v4/389-ds:1.4.2, but entry?
CVE-2020-25659: no packages for Container ses/7/prometheus-webhook-snmp:1.4.1.282, but entry?
CVE-2020-25659: no packages for Container suse/sle15:15.1.6.2.811, but entry?
CVE-2020-25659: no packages for Image SLES15-Azure-BYOS, but entry?
CVE-2020-25659: no packages for Image SLES15-EC2-CHOST-HVM-BYOS, but entry?
CVE-2020-25659: no packages for Image SLES15-EC2-HVM-BYOS, but entry?
CVE-2020-25659: no packages for Image SLES15-SAP-Azure, but entry?
CVE-2020-25659: no packages for Image SLES15-SAP-Azure-BYOS, but entry?
CVE-2020-25659: no packages for Image SLES15-SAP-EC2-HVM, but entry?
CVE-2020-25659: no packages for Image SLES15-SAP-EC2-HVM-BYOS, but entry?
CVE-2020-25659: no packages for Image SLES15-SP1-CHOST-BYOS-GCE, but entry?
CVE-2020-25659: no packages for Image SLES15-SP2-GCE, but entry?
CVE-2020-25659: no packages for SUSE Linux Enterprise Installer Updates 15 SP1, but entry?
CVE-2020-25659: no packages for SUSE Linux Enterprise Micro 5.0, but entry?
CVE-2020-25659: no packages for SUSE Linux Enterprise Module for Development Tools 15 SP2, but entry?
CVE-2020-25659: no packages for SUSE Linux Enterprise Module for Development Tools 15 SP3, but entry?
CVE-2020-25659: no packages for SUSE Linux Enterprise Module for Development Tools 15 SP4, but entry?
CVE-2020-25659: no packages for SUSE Linux Enterprise Module for Development Tools 15 SP5, but entry?
CVE-2020-25659: no packages for SUSE Linux Enterprise Module for Development Tools 15 SP6, but entry?
CVE-2020-25659: no packages for SUSE Linux Enterprise Module for Open Buildservice Development Tools 15 SP3, but entry?
CVE-2020-25659: no packages for SUSE Linux Enterprise Module for Package Hub 15 SP2, but entry?
CVE-2020-25659: no packages for SUSE Linux Enterprise Module for Package Hub 15 SP3, but entry?
CVE-2020-25659: no packages for SUSE Linux Enterprise Module for Package Hub 15 SP4, but entry?
CVE-2020-25659: no packages for SUSE Linux Enterprise Module for Package Hub 15 SP5, but entry?
CVE-2020-25659: no packages for SUSE Linux Enterprise Module for Package Hub 15 SP6, but entry?
CVE-2020-25659: no packages for SUSE Linux Enterprise Module for Public Cloud 15, but entry?
CVE-2020-25659: no packages for SUSE Linux Enterprise Module for Public Cloud 15 SP3, but entry?
CVE-2020-25659: no packages for SUSE Linux Enterprise Module for Public Cloud 15 SP5, but entry?
CVE-2020-25659: no packages for SUSE Linux Enterprise Module for Public Cloud 15 SP6, but entry?
CVE-2020-25659: no packages for SUSE Linux Enterprise Module for Server Applications 15 SP4, but entry?
CVE-2020-25659: no packages for SUSE Linux Enterprise Module for Server Applications 15 SP5, but entry?
CVE-2020-25659: no packages for SUSE Linux Enterprise Module for Server Applications 15 SP6, but entry?
CVE-2020-25659: no packages for SUSE Package Hub 15 SP2, but entry?
skipping CVE-2020-25663 as CVE page is older than CVRF-CVE file.
skipping CVE-2020-25662 as CVE page is older than CVRF-CVE file.
skipping CVE-2020-25661 as CVE page is older than CVRF-CVE file.
skipping CVE-2020-25660 as CVE page is older than CVRF-CVE file.
no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2020-25658
skipping CVE-2020-25657 as CVE page is older than CVRF-CVE file.
skipping CVE-2020-25654 as CVE page is older than CVRF-CVE file.
skipping CVE-2020-25649 as CVE page is older than CVRF-CVE file.
skipping CVE-2020-25638 as CVE page is older than CVRF-CVE file.
no cpe found for SUSE Package Hub 15 SP2 in CVE-2020-25626
skipping CVE-2020-25275 as CVE page is older than CVRF-CVE file.
skipping CVE-2020-25221 as CVE page is older than CVRF-CVE file.
skipping CVE-2020-25220 as CVE page is older than CVRF-CVE file.
skipping CVE-2020-25125 as CVE page is older than CVRF-CVE file.
no cpe found for SUSE Package Hub 15 SP2 in CVE-2020-25074
no cpe found for SUSE Package Hub 15 SP2 in CVE-2020-25040
no cpe found for SUSE Package Hub 15 SP2 in CVE-2020-25039
no cpe found for HPE Helion OpenStack Cloud 8 in CVE-2020-25032
no cpe found for SUSE Package Hub 15 SP1 in CVE-2020-25032
no cpe found for SUSE Package Hub 15 SP2 in CVE-2020-25032
skipping CVE-2020-24994 as CVE page is older than CVRF-CVE file.
skipping CVE-2020-24980 as CVE page is older than CVRF-CVE file.
skipping CVE-2020-24979 as CVE page is older than CVRF-CVE file.
no cpe found for SUSE Package Hub 15 SP1 in CVE-2020-24972
no cpe found for HPE Helion OpenStack Cloud 8 in CVE-2020-24698
skipping CVE-2020-24742 as CVE page is older than CVRF-CVE file.
skipping CVE-2020-24741 as CVE page is older than CVRF-CVE file.
skipping CVE-2020-24736 as CVE page is older than CVRF-CVE file.
no cpe found for HPE Helion OpenStack Cloud 8 in CVE-2020-24697
no cpe found for HPE Helion OpenStack Cloud 8 in CVE-2020-24696
no cpe found for SUSE Package Hub 15 SP1 in CVE-2020-24654
no cpe found for SUSE Package Hub 15 SP2 in CVE-2020-24654
skipping CVE-2020-24659 as CVE page is older than CVRF-CVE file.
no cpe found for SUSE Package Hub 15 SP1 in CVE-2020-24614
no cpe found for SUSE Package Hub 15 SP2 in CVE-2020-24614
no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2020-24588
no cpe found for HPE Helion OpenStack Cloud 8 in CVE-2020-24584
no cpe found for HPE Helion OpenStack Cloud 8 in CVE-2020-24583
skipping CVE-2020-24504 as CVE page is older than CVRF-CVE file.
skipping CVE-2020-24503 as CVE page is older than CVRF-CVE file.
skipping CVE-2020-24502 as CVE page is older than CVRF-CVE file.
skipping CVE-2020-24490 as CVE page is older than CVRF-CVE file.
skipping CVE-2020-24455 as CVE page is older than CVRF-CVE file.
no cpe found for SUSE Package Hub 15 SP1 in CVE-2020-24368
no cpe found for SUSE Package Hub 15 SP2 in CVE-2020-24368
skipping CVE-2020-24371 as CVE page is older than CVRF-CVE file.
skipping CVE-2020-24370 as CVE page is older than CVRF-CVE file.
skipping CVE-2020-24369 as CVE page is older than CVRF-CVE file.
skipping CVE-2020-24352 as CVE page is older than CVRF-CVE file.
skipping CVE-2020-24342 as CVE page is older than CVRF-CVE file.
no cpe found for SUSE Package Hub 15 SP2 in CVE-2020-24119
no cpe found for SUSE Package Hub 15 SP3 in CVE-2020-24119
skipping CVE-2020-24240 as CVE page is older than CVRF-CVE file.
skipping CVE-2020-24165 as CVE page is older than CVRF-CVE file.
skipping CVE-2020-23922 as CVE page is older than CVRF-CVE file.
skipping CVE-2020-23904 as CVE page is older than CVRF-CVE file.
skipping CVE-2020-23903 as CVE page is older than CVRF-CVE file.
skipping CVE-2020-23804 as CVE page is older than CVRF-CVE file.
skipping CVE-2020-23793 as CVE page is older than CVRF-CVE file.
skipping CVE-2020-22935 as CVE page is older than CVRF-CVE file.
skipping CVE-2020-22916 as CVE page is older than CVRF-CVE file.
no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2020-22628
skipping CVE-2020-22219 as CVE page is older than CVRF-CVE file.
skipping CVE-2020-22218 as CVE page is older than CVRF-CVE file.
no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2020-22027
no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2020-22021
skipping CVE-2020-21913 as CVE page is older than CVRF-CVE file.
skipping CVE-2020-21710 as CVE page is older than CVRF-CVE file.
no cpe found for SUSE Package Hub 15 SP2 in CVE-2020-21683
no cpe found for SUSE Package Hub 15 SP3 in CVE-2020-21683
no cpe found for SUSE Package Hub 15 SP2 in CVE-2020-21682
no cpe found for SUSE Package Hub 15 SP3 in CVE-2020-21682
no cpe found for SUSE Package Hub 15 SP2 in CVE-2020-21681
no cpe found for SUSE Package Hub 15 SP3 in CVE-2020-21681
no cpe found for SUSE Package Hub 15 SP2 in CVE-2020-21680
no cpe found for SUSE Package Hub 15 SP3 in CVE-2020-21680
no cpe found for SUSE Package Hub 15 SP2 in CVE-2020-21534
no cpe found for SUSE Package Hub 15 SP3 in CVE-2020-21534
skipping CVE-2020-21674 as CVE page is older than CVRF-CVE file.
skipping CVE-2020-21583 as CVE page is older than CVRF-CVE file.
skipping CVE-2020-21535 as CVE page is older than CVRF-CVE file.
no cpe found for SUSE Package Hub 15 SP2 in CVE-2020-21533
no cpe found for SUSE Package Hub 15 SP3 in CVE-2020-21533
no cpe found for SUSE Package Hub 15 SP2 in CVE-2020-21532
no cpe found for SUSE Package Hub 15 SP3 in CVE-2020-21532
no cpe found for SUSE Package Hub 15 SP2 in CVE-2020-21531
no cpe found for SUSE Package Hub 15 SP3 in CVE-2020-21531
no cpe found for SUSE Package Hub 15 SP2 in CVE-2020-21530
no cpe found for SUSE Package Hub 15 SP3 in CVE-2020-21530
no cpe found for SUSE Package Hub 15 SP2 in CVE-2020-21529
no cpe found for SUSE Package Hub 15 SP3 in CVE-2020-21529
skipping CVE-2020-21490 as CVE page is older than CVRF-CVE file.
skipping CVE-2020-21047 as CVE page is older than CVRF-CVE file.
no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2020-20901
no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2020-20900
no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2020-20898
no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2020-20894
skipping CVE-2020-20412 as CVE page is older than CVRF-CVE file.
skipping CVE-2020-19909 as CVE page is older than CVRF-CVE file.
skipping CVE-2020-19726 as CVE page is older than CVRF-CVE file.
skipping CVE-2020-19724 as CVE page is older than CVRF-CVE file.
skipping CVE-2020-19716 as CVE page is older than CVRF-CVE file.
skipping CVE-2020-19715 as CVE page is older than CVRF-CVE file.
no cpe found for SUSE Package Hub 15 SP1 in CVE-2020-19609
no cpe found for SUSE Package Hub 15 SP2 in CVE-2020-19609
no cpe found for SUSE Package Hub 15 SP3 in CVE-2020-19609
skipping CVE-2020-19190 as CVE page is older than CVRF-CVE file.
skipping CVE-2020-19189 as CVE page is older than CVRF-CVE file.
skipping CVE-2020-19188 as CVE page is older than CVRF-CVE file.
skipping CVE-2020-19187 as CVE page is older than CVRF-CVE file.
skipping CVE-2020-19186 as CVE page is older than CVRF-CVE file.
skipping CVE-2020-19185 as CVE page is older than CVRF-CVE file.
skipping CVE-2020-19144 as CVE page is older than CVRF-CVE file.
skipping CVE-2020-19143 as CVE page is older than CVRF-CVE file.
skipping CVE-2020-19131 as CVE page is older than CVRF-CVE file.
skipping CVE-2020-18899 as CVE page is older than CVRF-CVE file.
skipping CVE-2020-18898 as CVE page is older than CVRF-CVE file.
skipping CVE-2020-18831 as CVE page is older than CVRF-CVE file.
skipping CVE-2020-18781 as CVE page is older than CVRF-CVE file.
no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2020-18770
skipping CVE-2020-18774 as CVE page is older than CVRF-CVE file.
skipping CVE-2020-18773 as CVE page is older than CVRF-CVE file.
skipping CVE-2020-18771 as CVE page is older than CVRF-CVE file.
no cpe found for SUSE Package Hub 15 SP1 in CVE-2020-18671
no cpe found for SUSE Package Hub 15 SP2 in CVE-2020-18671
skipping CVE-2020-18768 as CVE page is older than CVRF-CVE file.
no cpe found for SUSE Package Hub 15 SP1 in CVE-2020-18670
no cpe found for SUSE Package Hub 15 SP2 in CVE-2020-18670
no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2020-18442
skipping CVE-2020-18652 as CVE page is older than CVRF-CVE file.
skipping CVE-2020-18651 as CVE page is older than CVRF-CVE file.
skipping CVE-2020-17541 as CVE page is older than CVRF-CVE file.
skipping CVE-2020-17538 as CVE page is older than CVRF-CVE file.
skipping CVE-2020-17507 as CVE page is older than CVRF-CVE file.
skipping CVE-2020-17498 as CVE page is older than CVRF-CVE file.
no cpe found for HPE Helion OpenStack Cloud 8 in CVE-2020-17482
no cpe found for SUSE Package Hub 15 SP1 in CVE-2020-17482
no cpe found for SUSE Package Hub 15 SP2 in CVE-2020-17482
skipping CVE-2020-17489 as CVE page is older than CVRF-CVE file.
CVE-2020-17438: no packages for SUSE Linux Enterprise Module for Legacy 15 SP2, but entry?
CVE-2020-17438: no packages for SUSE Linux Enterprise Module for Legacy 15 SP3, but entry?
CVE-2020-17438: no packages for SUSE Linux Enterprise Module for Legacy 15 SP2, but entry?
CVE-2020-17438: no packages for SUSE Linux Enterprise Module for Legacy 15 SP3, but entry?
CVE-2020-17438: no packages for SUSE Linux Enterprise Module for Legacy 15 SP2, but entry?
CVE-2020-17438: no packages for SUSE Linux Enterprise Module for Legacy 15 SP3, but entry?
CVE-2020-17437: no packages for SUSE Linux Enterprise Module for Legacy 15 SP3, but entry?
CVE-2020-17437: no packages for SUSE Linux Enterprise Module for Legacy 15 SP2, but entry?
CVE-2020-17437: no packages for SUSE Linux Enterprise Module for Legacy 15 SP2, but entry?
CVE-2020-17437: no packages for SUSE Linux Enterprise Module for Legacy 15 SP3, but entry?
CVE-2020-17437: no packages for SUSE Linux Enterprise Module for Legacy 15 SP2, but entry?
CVE-2020-17437: no packages for SUSE Linux Enterprise Module for Legacy 15 SP3, but entry?
notsure where SUSE Linux Enterprise Enterprise Server 11 SP1 for SAP Enterprise Search is contained?
notsure where SLES for SAP Applications 11 SP2 is contained?
notsure where SUSE Studio Extension for System z 1.2 is contained?
notsure where SLES for SAP Applications 11 SP3 is contained?
no cpe found for SUSE Package Hub 15 SP4 in CVE-2020-17354
no cpe found for SUSE Package Hub 15 SP2 in CVE-2020-17353
skipping CVE-2020-17049 as CVE page is older than CVRF-CVE file.
no cpe found for SUSE Package Hub 15 SP1 in CVE-2020-16600
no cpe found for SUSE Package Hub 15 SP2 in CVE-2020-16600
no cpe found for SUSE Package Hub 15 SP3 in CVE-2020-16600
skipping CVE-2020-16599 as CVE page is older than CVRF-CVE file.
skipping CVE-2020-16598 as CVE page is older than CVRF-CVE file.
skipping CVE-2020-16593 as CVE page is older than CVRF-CVE file.
skipping CVE-2020-16592 as CVE page is older than CVRF-CVE file.
skipping CVE-2020-16591 as CVE page is older than CVRF-CVE file.
skipping CVE-2020-16590 as CVE page is older than CVRF-CVE file.
skipping CVE-2020-16310 as CVE page is older than CVRF-CVE file.
skipping CVE-2020-16309 as CVE page is older than CVRF-CVE file.
skipping CVE-2020-16308 as CVE page is older than CVRF-CVE file.
skipping CVE-2020-16307 as CVE page is older than CVRF-CVE file.
skipping CVE-2020-16306 as CVE page is older than CVRF-CVE file.
skipping CVE-2020-16305 as CVE page is older than CVRF-CVE file.
skipping CVE-2020-16304 as CVE page is older than CVRF-CVE file.
skipping CVE-2020-16303 as CVE page is older than CVRF-CVE file.
skipping CVE-2020-16302 as CVE page is older than CVRF-CVE file.
skipping CVE-2020-16301 as CVE page is older than CVRF-CVE file.
skipping CVE-2020-16300 as CVE page is older than CVRF-CVE file.
skipping CVE-2020-16299 as CVE page is older than CVRF-CVE file.
skipping CVE-2020-16298 as CVE page is older than CVRF-CVE file.
skipping CVE-2020-16297 as CVE page is older than CVRF-CVE file.
skipping CVE-2020-16296 as CVE page is older than CVRF-CVE file.
skipping CVE-2020-16295 as CVE page is older than CVRF-CVE file.
skipping CVE-2020-16294 as CVE page is older than CVRF-CVE file.
skipping CVE-2020-16293 as CVE page is older than CVRF-CVE file.
skipping CVE-2020-16292 as CVE page is older than CVRF-CVE file.
skipping CVE-2020-16291 as CVE page is older than CVRF-CVE file.
skipping CVE-2020-16290 as CVE page is older than CVRF-CVE file.
skipping CVE-2020-16289 as CVE page is older than CVRF-CVE file.
skipping CVE-2020-16288 as CVE page is older than CVRF-CVE file.
skipping CVE-2020-16287 as CVE page is older than CVRF-CVE file.
no cpe found for SUSE Package Hub 15 SP3 in CVE-2020-16154
skipping CVE-2020-16156 as CVE page is older than CVRF-CVE file.
skipping CVE-2020-16155 as CVE page is older than CVRF-CVE file.
no cpe found for SUSE Package Hub 15 SP1 in CVE-2020-16145
no cpe found for SUSE Package Hub 15 SP2 in CVE-2020-16145
no cpe found for SUSE Package Hub 15 SP3 in CVE-2020-16145
no cpe found for SUSE Package Hub 15 SP4 in CVE-2020-16145
skipping CVE-2020-16135 as CVE page is older than CVRF-CVE file.
skipping CVE-2020-16127 as CVE page is older than CVRF-CVE file.
skipping CVE-2020-16126 as CVE page is older than CVRF-CVE file.
no cpe found for SUSE Package Hub 15 SP1 in CVE-2020-16118
skipping CVE-2020-16119 as CVE page is older than CVRF-CVE file.
no cpe found for SUSE Package Hub 15 SP1 in CVE-2020-16116
no cpe found for SUSE Package Hub 15 SP2 in CVE-2020-16116
no cpe found for SUSE Package Hub 15 SP1 in CVE-2020-16044
no cpe found for SUSE Package Hub 15 SP2 in CVE-2020-16044
no cpe found for SUSE Package Hub 15 SP1 in CVE-2020-16043
no cpe found for SUSE Package Hub 15 SP2 in CVE-2020-16043
no cpe found for SUSE Package Hub 15 SP1 in CVE-2020-16042
no cpe found for SUSE Package Hub 15 SP2 in CVE-2020-16042
no cpe found for SUSE Package Hub 15 SP1 in CVE-2020-16041
no cpe found for SUSE Package Hub 15 SP2 in CVE-2020-16041
no cpe found for SUSE Package Hub 15 SP1 in CVE-2020-16040
no cpe found for SUSE Package Hub 15 SP2 in CVE-2020-16040
no cpe found for SUSE Package Hub 15 SP1 in CVE-2020-16039
no cpe found for SUSE Package Hub 15 SP2 in CVE-2020-16039
no cpe found for SUSE Package Hub 15 SP1 in CVE-2020-16038
no cpe found for SUSE Package Hub 15 SP2 in CVE-2020-16038
no cpe found for SUSE Package Hub 15 SP1 in CVE-2020-16037
no cpe found for SUSE Package Hub 15 SP2 in CVE-2020-16037
no cpe found for SUSE Package Hub 15 SP1 in CVE-2020-16036
no cpe found for SUSE Package Hub 15 SP2 in CVE-2020-16036
no cpe found for SUSE Package Hub 15 SP1 in CVE-2020-16035
no cpe found for SUSE Package Hub 15 SP2 in CVE-2020-16035
no cpe found for SUSE Package Hub 15 SP1 in CVE-2020-16034
no cpe found for SUSE Package Hub 15 SP2 in CVE-2020-16034
no cpe found for SUSE Package Hub 15 SP1 in CVE-2020-16033
no cpe found for SUSE Package Hub 15 SP2 in CVE-2020-16033
no cpe found for SUSE Package Hub 15 SP1 in CVE-2020-16032
no cpe found for SUSE Package Hub 15 SP2 in CVE-2020-16032
no cpe found for SUSE Package Hub 15 SP1 in CVE-2020-16031
no cpe found for SUSE Package Hub 15 SP2 in CVE-2020-16031
no cpe found for SUSE Package Hub 15 SP1 in CVE-2020-16030
no cpe found for SUSE Package Hub 15 SP2 in CVE-2020-16030
no cpe found for SUSE Package Hub 15 SP1 in CVE-2020-16029
no cpe found for SUSE Package Hub 15 SP2 in CVE-2020-16029
no cpe found for SUSE Package Hub 15 SP1 in CVE-2020-16028
no cpe found for SUSE Package Hub 15 SP2 in CVE-2020-16028
no cpe found for SUSE Package Hub 15 SP1 in CVE-2020-16027
no cpe found for SUSE Package Hub 15 SP2 in CVE-2020-16027
no cpe found for SUSE Package Hub 15 SP1 in CVE-2020-16026
no cpe found for SUSE Package Hub 15 SP2 in CVE-2020-16026
no cpe found for SUSE Package Hub 15 SP1 in CVE-2020-16025
no cpe found for SUSE Package Hub 15 SP2 in CVE-2020-16025
no cpe found for SUSE Package Hub 15 SP1 in CVE-2020-16024
no cpe found for SUSE Package Hub 15 SP2 in CVE-2020-16024
no cpe found for SUSE Package Hub 15 SP1 in CVE-2020-16023
no cpe found for SUSE Package Hub 15 SP2 in CVE-2020-16023
no cpe found for SUSE Package Hub 15 SP1 in CVE-2020-16022
no cpe found for SUSE Package Hub 15 SP2 in CVE-2020-16022
no cpe found for SUSE Package Hub 15 SP1 in CVE-2020-16021
no cpe found for SUSE Package Hub 15 SP2 in CVE-2020-16021
no cpe found for SUSE Package Hub 15 SP1 in CVE-2020-16020
no cpe found for SUSE Package Hub 15 SP2 in CVE-2020-16020
no cpe found for SUSE Package Hub 15 SP1 in CVE-2020-16019
no cpe found for SUSE Package Hub 15 SP2 in CVE-2020-16019
no cpe found for SUSE Package Hub 15 SP1 in CVE-2020-16018
no cpe found for SUSE Package Hub 15 SP2 in CVE-2020-16018
no cpe found for SUSE Package Hub 15 SP1 in CVE-2020-16017
no cpe found for SUSE Package Hub 15 SP2 in CVE-2020-16017
no cpe found for SUSE Package Hub 15 SP1 in CVE-2020-16016
no cpe found for SUSE Package Hub 15 SP2 in CVE-2020-16016
no cpe found for SUSE Package Hub 15 SP1 in CVE-2020-16015
no cpe found for SUSE Package Hub 15 SP2 in CVE-2020-16015
no cpe found for SUSE Package Hub 15 SP1 in CVE-2020-16014
no cpe found for SUSE Package Hub 15 SP2 in CVE-2020-16014
no cpe found for SUSE Package Hub 15 SP1 in CVE-2020-16013
no cpe found for SUSE Package Hub 15 SP2 in CVE-2020-16013
no cpe found for SUSE Package Hub 15 SP1 in CVE-2020-16012
no cpe found for SUSE Package Hub 15 SP2 in CVE-2020-16012
no cpe found for SUSE Package Hub 15 SP1 in CVE-2020-16011
no cpe found for SUSE Package Hub 15 SP2 in CVE-2020-16011
no cpe found for SUSE Package Hub 15 SP1 in CVE-2020-16009
no cpe found for SUSE Package Hub 15 SP2 in CVE-2020-16009
no cpe found for SUSE Package Hub 15 SP1 in CVE-2020-16008
no cpe found for SUSE Package Hub 15 SP2 in CVE-2020-16008
no cpe found for SUSE Package Hub 15 SP1 in CVE-2020-16007
no cpe found for SUSE Package Hub 15 SP2 in CVE-2020-16007
no cpe found for SUSE Package Hub 15 SP1 in CVE-2020-16006
no cpe found for SUSE Package Hub 15 SP2 in CVE-2020-16006
no cpe found for SUSE Package Hub 15 SP1 in CVE-2020-16005
no cpe found for SUSE Package Hub 15 SP2 in CVE-2020-16005
no cpe found for SUSE Package Hub 15 SP1 in CVE-2020-16004
no cpe found for SUSE Package Hub 15 SP2 in CVE-2020-16004
no cpe found for SUSE Package Hub 15 SP1 in CVE-2020-16003
no cpe found for SUSE Package Hub 15 SP2 in CVE-2020-16003
no cpe found for SUSE Package Hub 15 SP1 in CVE-2020-16002
no cpe found for SUSE Package Hub 15 SP2 in CVE-2020-16002
no cpe found for SUSE Package Hub 15 SP1 in CVE-2020-16001
no cpe found for SUSE Package Hub 15 SP2 in CVE-2020-16001
no cpe found for SUSE Package Hub 15 SP1 in CVE-2020-16000
no cpe found for SUSE Package Hub 15 SP2 in CVE-2020-16000
no cpe found for SUSE Package Hub 15 SP1 in CVE-2020-15995
no cpe found for SUSE Package Hub 15 SP2 in CVE-2020-15995
skipping CVE-2020-15999 as CVE page is older than CVRF-CVE file.
no cpe found for SUSE Package Hub 15 SP1 in CVE-2020-15992
no cpe found for SUSE Package Hub 15 SP2 in CVE-2020-15992
no cpe found for SUSE Package Hub 15 SP1 in CVE-2020-15991
no cpe found for SUSE Package Hub 15 SP2 in CVE-2020-15991
no cpe found for SUSE Package Hub 15 SP1 in CVE-2020-15990
no cpe found for SUSE Package Hub 15 SP2 in CVE-2020-15990
no cpe found for SUSE Package Hub 15 SP1 in CVE-2020-15989
no cpe found for SUSE Package Hub 15 SP2 in CVE-2020-15989
no cpe found for SUSE Package Hub 15 SP1 in CVE-2020-15988
no cpe found for SUSE Package Hub 15 SP2 in CVE-2020-15988
no cpe found for SUSE Package Hub 15 SP1 in CVE-2020-15987
no cpe found for SUSE Package Hub 15 SP2 in CVE-2020-15987
no cpe found for SUSE Package Hub 15 SP1 in CVE-2020-15986
no cpe found for SUSE Package Hub 15 SP2 in CVE-2020-15986
no cpe found for SUSE Package Hub 15 SP1 in CVE-2020-15985
no cpe found for SUSE Package Hub 15 SP2 in CVE-2020-15985
no cpe found for SUSE Package Hub 15 SP1 in CVE-2020-15984
no cpe found for SUSE Package Hub 15 SP2 in CVE-2020-15984
no cpe found for SUSE Package Hub 15 SP1 in CVE-2020-15983
no cpe found for SUSE Package Hub 15 SP2 in CVE-2020-15983
no cpe found for SUSE Package Hub 15 SP1 in CVE-2020-15982
no cpe found for SUSE Package Hub 15 SP2 in CVE-2020-15982
no cpe found for SUSE Package Hub 15 SP1 in CVE-2020-15981
no cpe found for SUSE Package Hub 15 SP2 in CVE-2020-15981
no cpe found for SUSE Package Hub 15 SP1 in CVE-2020-15980
no cpe found for SUSE Package Hub 15 SP2 in CVE-2020-15980
no cpe found for SUSE Package Hub 15 SP1 in CVE-2020-15979
no cpe found for SUSE Package Hub 15 SP2 in CVE-2020-15979
no cpe found for SUSE Package Hub 15 SP1 in CVE-2020-15978
no cpe found for SUSE Package Hub 15 SP2 in CVE-2020-15978
no cpe found for SUSE Package Hub 15 SP1 in CVE-2020-15977
no cpe found for SUSE Package Hub 15 SP2 in CVE-2020-15977
no cpe found for SUSE Package Hub 15 SP1 in CVE-2020-15976
no cpe found for SUSE Package Hub 15 SP2 in CVE-2020-15976
no cpe found for SUSE Package Hub 15 SP1 in CVE-2020-15975
no cpe found for SUSE Package Hub 15 SP2 in CVE-2020-15975
no cpe found for SUSE Package Hub 15 SP1 in CVE-2020-15974
no cpe found for SUSE Package Hub 15 SP2 in CVE-2020-15974
no cpe found for SUSE Package Hub 15 SP1 in CVE-2020-15973
no cpe found for SUSE Package Hub 15 SP2 in CVE-2020-15973
no cpe found for SUSE Package Hub 15 SP1 in CVE-2020-15972
no cpe found for SUSE Package Hub 15 SP2 in CVE-2020-15972
no cpe found for SUSE Package Hub 15 SP1 in CVE-2020-15971
no cpe found for SUSE Package Hub 15 SP2 in CVE-2020-15971
no cpe found for SUSE Package Hub 15 SP1 in CVE-2020-15970
no cpe found for SUSE Package Hub 15 SP2 in CVE-2020-15970
no cpe found for SUSE Package Hub 15 SP1 in CVE-2020-15969
no cpe found for SUSE Package Hub 15 SP2 in CVE-2020-15969
no cpe found for SUSE Package Hub 15 SP1 in CVE-2020-15968
no cpe found for SUSE Package Hub 15 SP2 in CVE-2020-15968
no cpe found for SUSE Package Hub 15 SP1 in CVE-2020-15967
no cpe found for SUSE Package Hub 15 SP2 in CVE-2020-15967
no cpe found for SUSE Package Hub 15 SP1 in CVE-2020-15966
no cpe found for SUSE Package Hub 15 SP2 in CVE-2020-15966
no cpe found for SUSE Package Hub 15 SP1 in CVE-2020-15965
no cpe found for SUSE Package Hub 15 SP2 in CVE-2020-15965
no cpe found for SUSE Package Hub 15 SP1 in CVE-2020-15964
no cpe found for SUSE Package Hub 15 SP2 in CVE-2020-15964
no cpe found for SUSE Package Hub 15 SP1 in CVE-2020-15963
no cpe found for SUSE Package Hub 15 SP2 in CVE-2020-15963
no cpe found for SUSE Package Hub 15 SP1 in CVE-2020-15962
no cpe found for SUSE Package Hub 15 SP2 in CVE-2020-15962
no cpe found for SUSE Package Hub 15 SP1 in CVE-2020-15961
no cpe found for SUSE Package Hub 15 SP2 in CVE-2020-15961
no cpe found for SUSE Package Hub 15 SP1 in CVE-2020-15960
no cpe found for SUSE Package Hub 15 SP2 in CVE-2020-15960
no cpe found for SUSE Package Hub 15 SP1 in CVE-2020-15959
no cpe found for SUSE Package Hub 15 SP2 in CVE-2020-15959
no cpe found for SUSE Package Hub 15 SP2 in CVE-2020-15953
no cpe found for SUSE Package Hub 15 SP1 in CVE-2020-15917
no cpe found for SUSE Package Hub 15 SP2 in CVE-2020-15917
no cpe found for SUSE Package Hub 15 SP3 in CVE-2020-15917
skipping CVE-2020-15945 as CVE page is older than CVRF-CVE file.
skipping CVE-2020-15889 as CVE page is older than CVRF-CVE file.
skipping CVE-2020-15888 as CVE page is older than CVRF-CVE file.
skipping CVE-2020-15862 as CVE page is older than CVRF-CVE file.
skipping CVE-2020-15861 as CVE page is older than CVRF-CVE file.
skipping CVE-2020-15859 as CVE page is older than CVRF-CVE file.
skipping CVE-2020-15852 as CVE page is older than CVRF-CVE file.
no cpe found for SUSE Package Hub 15 SP1 in CVE-2020-15803
no cpe found for SUSE Package Hub 15 SP2 in CVE-2020-15803
no cpe found for SUSE Package Hub 15 SP3 in CVE-2020-15803
notsure where Magnum Orchestration 7 is contained?
skipping CVE-2020-15802 as CVE page is older than CVRF-CVE file.
--- /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2020-15801.xml 2024-10-22 04:08:13.272245000 +0200
+++ /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2020-15801.xml.new 2024-10-29 02:10:29.108895000 +0100
@@ -14,13 +14,13 @@
1
- 97
- 2024-10-22T02:08:12Z
+ 98
+ 2024-10-29T01:10:28Z
current
2021-05-30T14:42:22Z
- 2024-10-22T02:08:12Z
+ 2024-10-29T01:10:28Z
cve-database/bin/generate-cvrf-cve.pl
2020-12-27T01:00:00Z
@@ -968,6 +968,24 @@
python313-x86-64-v3-3.13.0~b3-1.1
+
+ python314-3.14.0~a1-1.1
+
+
+ python314-curses-3.14.0~a1-1.1
+
+
+ python314-dbm-3.14.0~a1-1.1
+
+
+ python314-idle-3.14.0~a1-1.1
+
+
+ python314-tk-3.14.0~a1-1.1
+
+
+ python314-x86-64-v3-3.14.0~a1-1.1
+
python36
@@ -1217,6 +1235,24 @@
python313-x86-64-v3-3.13.0~b3-1.1 as a component of openSUSE Tumbleweed
+
+ python314-3.14.0~a1-1.1 as a component of openSUSE Tumbleweed
+
+
+ python314-curses-3.14.0~a1-1.1 as a component of openSUSE Tumbleweed
+
+
+ python314-dbm-3.14.0~a1-1.1 as a component of openSUSE Tumbleweed
+
+
+ python314-idle-3.14.0~a1-1.1 as a component of openSUSE Tumbleweed
+
+
+ python314-tk-3.14.0~a1-1.1 as a component of openSUSE Tumbleweed
+
+
+ python314-x86-64-v3-3.14.0~a1-1.1 as a component of openSUSE Tumbleweed
+
python39-3.9.7-2.1 as a component of openSUSE Tumbleweed
@@ -2323,6 +2359,12 @@
openSUSE Tumbleweed:python313-idle-3.13.0~b3-1.1
openSUSE Tumbleweed:python313-tk-3.13.0~b3-1.1
openSUSE Tumbleweed:python313-x86-64-v3-3.13.0~b3-1.1
+ openSUSE Tumbleweed:python314-3.14.0~a1-1.1
+ openSUSE Tumbleweed:python314-curses-3.14.0~a1-1.1
+ openSUSE Tumbleweed:python314-dbm-3.14.0~a1-1.1
+ openSUSE Tumbleweed:python314-idle-3.14.0~a1-1.1
+ openSUSE Tumbleweed:python314-tk-3.14.0~a1-1.1
+ openSUSE Tumbleweed:python314-x86-64-v3-3.14.0~a1-1.1
openSUSE Tumbleweed:python39-3.9.7-2.1
openSUSE Tumbleweed:python39-32bit-3.9.7-2.1
openSUSE Tumbleweed:python39-curses-3.9.7-2.1
skipping CVE-2020-15780 as CVE page is older than CVRF-CVE file.
skipping CVE-2020-15719 as CVE page is older than CVRF-CVE file.
no cpe found for SUSE Package Hub 15 SP3 in CVE-2020-15694
no cpe found for SUSE Package Hub 15 SP4 in CVE-2020-15694
no cpe found for SUSE Package Hub 15 SP3 in CVE-2020-15693
no cpe found for SUSE Package Hub 15 SP4 in CVE-2020-15693
no cpe found for SUSE Package Hub 15 SP3 in CVE-2020-15692
no cpe found for SUSE Package Hub 15 SP4 in CVE-2020-15692
no cpe found for SUSE Package Hub 15 SP3 in CVE-2020-15690
no cpe found for SUSE Package Hub 15 SP4 in CVE-2020-15690
no cpe found for SUSE Package Hub 15 SP4 in CVE-2020-15598
no cpe found for SUSE Package Hub 15 SP5 in CVE-2020-15598
no cpe found for SUSE Package Hub 15 SP1 in CVE-2020-15572
no cpe found for SUSE Package Hub 15 SP2 in CVE-2020-15572
skipping CVE-2020-15564 as CVE page is older than CVRF-CVE file.
no cpe found for SUSE Package Hub 15 SP1 in CVE-2020-15562
no cpe found for SUSE Package Hub 15 SP2 in CVE-2020-15562
--- /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2020-15523.xml 2024-10-22 04:08:42.579237000 +0200
+++ /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2020-15523.xml.new 2024-10-29 02:10:49.323839000 +0100
@@ -14,13 +14,13 @@
1
- 97
- 2024-10-22T02:08:42Z
+ 98
+ 2024-10-29T01:10:48Z
current
2021-05-30T14:42:05Z
- 2024-10-22T02:08:42Z
+ 2024-10-29T01:10:48Z
cve-database/bin/generate-cvrf-cve.pl
2020-12-27T01:00:00Z
@@ -968,6 +968,24 @@
python313-x86-64-v3-3.13.0~b3-1.1
+
+ python314-3.14.0~a1-1.1
+
+
+ python314-curses-3.14.0~a1-1.1
+
+
+ python314-dbm-3.14.0~a1-1.1
+
+
+ python314-idle-3.14.0~a1-1.1
+
+
+ python314-tk-3.14.0~a1-1.1
+
+
+ python314-x86-64-v3-3.14.0~a1-1.1
+
python36
@@ -1217,6 +1235,24 @@
python313-x86-64-v3-3.13.0~b3-1.1 as a component of openSUSE Tumbleweed
+
+ python314-3.14.0~a1-1.1 as a component of openSUSE Tumbleweed
+
+
+ python314-curses-3.14.0~a1-1.1 as a component of openSUSE Tumbleweed
+
+
+ python314-dbm-3.14.0~a1-1.1 as a component of openSUSE Tumbleweed
+
+
+ python314-idle-3.14.0~a1-1.1 as a component of openSUSE Tumbleweed
+
+
+ python314-tk-3.14.0~a1-1.1 as a component of openSUSE Tumbleweed
+
+
+ python314-x86-64-v3-3.14.0~a1-1.1 as a component of openSUSE Tumbleweed
+
python39-3.9.7-2.1 as a component of openSUSE Tumbleweed
@@ -2323,6 +2359,12 @@
openSUSE Tumbleweed:python313-idle-3.13.0~b3-1.1
openSUSE Tumbleweed:python313-tk-3.13.0~b3-1.1
openSUSE Tumbleweed:python313-x86-64-v3-3.13.0~b3-1.1
+ openSUSE Tumbleweed:python314-3.14.0~a1-1.1
+ openSUSE Tumbleweed:python314-curses-3.14.0~a1-1.1
+ openSUSE Tumbleweed:python314-dbm-3.14.0~a1-1.1
+ openSUSE Tumbleweed:python314-idle-3.14.0~a1-1.1
+ openSUSE Tumbleweed:python314-tk-3.14.0~a1-1.1
+ openSUSE Tumbleweed:python314-x86-64-v3-3.14.0~a1-1.1
openSUSE Tumbleweed:python39-3.9.7-2.1
openSUSE Tumbleweed:python39-32bit-3.9.7-2.1
openSUSE Tumbleweed:python39-curses-3.9.7-2.1
CVE-2020-15522: no packages for Image SLES15-SP3-Manager-4-2-Server-BYOS-GCE, but entry?
CVE-2020-15522: no packages for Image SLES15-SP4-Manager-Server-4-3-Azure-ltd, but entry?
CVE-2020-15522: no packages for SUSE Linux Enterprise Module for Web and Scripting 15 SP5, but entry?
CVE-2020-15522: no packages for Image SLES15-SP6-SAPCAL, but entry?
CVE-2020-15522: no packages for Image SLES15-SP5-SAP-Azure-VLI-BYOS, but entry?
CVE-2020-15522: no packages for Image SLES15-SP5-SAP-Azure-LI-BYOS-Production, but entry?
CVE-2020-15522: no packages for SUSE Linux Enterprise Module for Basesystem 15 SP6, but entry?
CVE-2020-15522: no packages for Image SLES15-SP3-SAPCAL-Azure, but entry?
CVE-2020-15522: no packages for Image SLES15-SP2-SAP-BYOS-GCE, but entry?
CVE-2020-15522: no packages for Image SLES15-SP4-Manager-Server-4-3-Azure-llc, but entry?
CVE-2020-15522: no packages for Image SLES15-SP4-Manager-Server-4-3-BYOS, but entry?
CVE-2020-15522: no packages for Image SLES15-SP4-SAP-Azure-LI-BYOS-Production, but entry?
CVE-2020-15522: no packages for Image SLES15-SP2-SAP-Azure-LI-BYOS-Production, but entry?
CVE-2020-15522: no packages for SUSE Linux Enterprise Module for Basesystem 15 SP5, but entry?
CVE-2020-15522: no packages for Image SLES15-SP2-SAP-Azure, but entry?
CVE-2020-15522: no packages for SUSE Linux Enterprise Workstation Extension 15 SP4, but entry?
CVE-2020-15522: no packages for Image SLES15-SP4-SAP-Azure, but entry?
CVE-2020-15522: no packages for SUSE Linux Enterprise Module for Package Hub 15 SP5, but entry?
CVE-2020-15522: no packages for SUSE Manager Proxy 4.2, but entry?
CVE-2020-15522: no packages for Image SLES15-SP4-Manager-Server-4-3, but entry?
CVE-2020-15522: no packages for Image SLES15-SP6-SAP-EC2, but entry?
CVE-2020-15522: no packages for Image SLES15-SP3-SAP-Azure-LI-BYOS-Production, but entry?
CVE-2020-15522: no packages for Image SLES15-SP2-SAP-EC2-HVM, but entry?
CVE-2020-15522: no packages for Image SLES15-SP3-Manager-4-2-Server-BYOS-Azure, but entry?
CVE-2020-15522: no packages for Container bci/openjdk-devel:17-14.11, but entry?
CVE-2020-15522: no packages for SUSE Linux Enterprise Server for SAP Applications 15 SP1, but entry?
CVE-2020-15522: no packages for Image SLES15-SP4-SAP-EC2, but entry?
CVE-2020-15522: no packages for Container bci/openjdk:11-7.1, but entry?
CVE-2020-15522: no packages for SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS, but entry?
CVE-2020-15522: no packages for Image SLES15-SP4-SAPCAL-Azure, but entry?
CVE-2020-15522: no packages for Image SLES15-SP5-SAPCAL-EC2, but entry?
CVE-2020-15522: no packages for SUSE Linux Enterprise Module for Web and Scripting 15 SP4, but entry?
CVE-2020-15522: no packages for Image SLES15-SP4-SAPCAL-EC2, but entry?
CVE-2020-15522: no packages for Image SLES15-SP5-SAP-Azure-VLI-BYOS-Production, but entry?
CVE-2020-15522: no packages for Image SLES15-SP6-SAPCAL-Azure, but entry?
CVE-2020-15522: no packages for Image SLES15-SP5-SAP-Azure, but entry?
CVE-2020-15522: no packages for Image SLES15-SP6-SAP-Azure-VLI-BYOS, but entry?
CVE-2020-15522: no packages for SUSE Linux Enterprise Server 15 SP1-LTSS, but entry?
CVE-2020-15522: no packages for Image SLES15-SP4-Manager-Server-4-3-BYOS-EC2, but entry?
CVE-2020-15522: no packages for Image SLES15-SP6-SAP-Azure, but entry?
CVE-2020-15522: no packages for Image SLES15-SP5-SAPCAL-GCE, but entry?
CVE-2020-15522: no packages for Image SLES15-SP4-Manager-Server-4-3-BYOS-GCE, but entry?
CVE-2020-15522: no packages for Image SLES15-SP3-Manager-4-2-Server-BYOS-EC2-HVM, but entry?
CVE-2020-15522: no packages for SUSE Linux Enterprise Module for Web and Scripting 15 SP6, but entry?
CVE-2020-15522: no packages for Container bci/openjdk:latest, but entry?
CVE-2020-15522: no packages for Image SLES15-SP6-SAPCAL-EC2, but entry?
CVE-2020-15522: no packages for Image SLES15-SP4-SAPCAL, but entry?
CVE-2020-15522: no packages for Image SLES15-SP2-SAP-BYOS-Azure, but entry?
CVE-2020-15522: no packages for Image SLES15-SP5-SAP-EC2, but entry?
CVE-2020-15522: no packages for Image SLES15-SP3-SAP-Azure-VLI-BYOS-Production, but entry?
CVE-2020-15522: no packages for Image SLES15-SP4-Manager-Server-4-3-EC2-ltd, but entry?
CVE-2020-15522: no packages for SUSE Linux Enterprise Module for Package Hub 15 SP6, but entry?
CVE-2020-15522: no packages for SUSE Linux Enterprise Module for Basesystem 15 SP4, but entry?
CVE-2020-15522: no packages for Container bci/openjdk:17-7.1, but entry?
CVE-2020-15522: no packages for Image SLES15-SP4-SAP-Azure-LI-BYOS, but entry?
CVE-2020-15522: no packages for SUSE Manager Server 4.2, but entry?
CVE-2020-15522: no packages for Image SLES15-SP3-SAPCAL-EC2-HVM, but entry?
CVE-2020-15522: no packages for Container suse/manager/5.0/x86_64/server:5.0.0-beta1.2.122, but entry?
CVE-2020-15522: no packages for Image SLES15-SP4-SAPCAL-GCE, but entry?
CVE-2020-15522: no packages for Image SLES15-SP3-SAPCAL-GCE, but entry?
CVE-2020-15522: no packages for Image SLES15-SP6-SAP, but entry?
CVE-2020-15522: no packages for SUSE Linux Enterprise Module for Package Hub 15 SP4, but entry?
CVE-2020-15522: no packages for Image SLES15-SP6-SAP-Azure-LI-BYOS-Production, but entry?
CVE-2020-15522: no packages for Image SLES15-SP4-Manager-Server-4-3-EC2-llc, but entry?
CVE-2020-15522: no packages for Image SLES15-SP4-SAP, but entry?
CVE-2020-15522: no packages for SUSE Manager Retail Branch Server 4.2, but entry?
CVE-2020-15522: no packages for Image SLES15-SP4-SAP-Azure-VLI-BYOS, but entry?
CVE-2020-15522: no packages for Image SLES15-SP6-SAP-Azure-LI-BYOS, but entry?
CVE-2020-15522: no packages for SUSE Linux Enterprise Server 15 SP4-TERADATA, but entry?
CVE-2020-15522: no packages for Image SLES15-SP4-SAP-GCE, but entry?
CVE-2020-15522: no packages for SUSE Linux Enterprise Workstation Extension 15 SP6, but entry?
CVE-2020-15522: no packages for SUSE Manager Server Module 4.3, but entry?
CVE-2020-15522: no packages for Image SLES15-SP6-SAP-Azure-VLI-BYOS-Production, but entry?
CVE-2020-15522: no packages for Image SLES15-SP2-SAP-GCE, but entry?
CVE-2020-15522: no packages for Container bci/kiwi:9.24.43-8.6, but entry?
CVE-2020-15522: no packages for SUSE CaaS Platform 4.0, but entry?
CVE-2020-15522: no packages for Image SLES15-SP2-SAP-BYOS-EC2-HVM, but entry?
CVE-2020-15522: no packages for Image SLES15-SP2-SAP-Azure-VLI-BYOS-Production, but entry?
CVE-2020-15522: no packages for Container suse/manager/5.0/x86_64/server-attestation:5.0.0-beta2.2.16, but entry?
CVE-2020-15522: no packages for Image SLES15-SP5-SAP-GCE, but entry?
CVE-2020-15522: no packages for SUSE Linux Enterprise Workstation Extension 15 SP5, but entry?
CVE-2020-15522: no packages for Image SLES15-SP5-SAPCAL-Azure, but entry?
CVE-2020-15522: no packages for Container bci/openjdk-devel:17-7.2, but entry?
CVE-2020-15522: no packages for SUSE Manager Server Module 4.2, but entry?
CVE-2020-15522: no packages for Image SLES15-SP5-SAP-Azure-LI-BYOS, but entry?
CVE-2020-15522: no packages for Image SLES15-SP4-SAP-Azure-VLI-BYOS-Production, but entry?
CVE-2020-15522: no packages for Container bci/openjdk-devel:11-6.2, but entry?
CVE-2020-15522: no packages for Image SLES15-SP6-SAPCAL-GCE, but entry?
CVE-2020-15522: no packages for Image SLES15-SP6-SAP-GCE, but entry?
CVE-2020-15522: no packages for Image SLES15-SP4-Manager-Server-4-3-BYOS-Azure, but entry?
CVE-2020-15522: no packages for Container bci/kiwi:9.24.43-8.6, but entry?
CVE-2020-15522: no packages for Container bci/openjdk-devel:11-6.2, but entry?
CVE-2020-15522: no packages for Container bci/openjdk-devel:17-14.11, but entry?
CVE-2020-15522: no packages for Container bci/openjdk-devel:17-7.2, but entry?
CVE-2020-15522: no packages for Container bci/openjdk:11-7.1, but entry?
CVE-2020-15522: no packages for Container bci/openjdk:17-7.1, but entry?
CVE-2020-15522: no packages for Container bci/openjdk:latest, but entry?
CVE-2020-15522: no packages for Container suse/manager/5.0/x86_64/server-attestation:5.0.0-beta2.2.16, but entry?
CVE-2020-15522: no packages for Container suse/manager/5.0/x86_64/server:5.0.0-beta1.2.122, but entry?
CVE-2020-15522: no packages for Image SLES15-SP2-SAP-Azure, but entry?
CVE-2020-15522: no packages for Image SLES15-SP2-SAP-Azure-LI-BYOS-Production, but entry?
CVE-2020-15522: no packages for Image SLES15-SP2-SAP-Azure-VLI-BYOS-Production, but entry?
CVE-2020-15522: no packages for Image SLES15-SP2-SAP-BYOS-Azure, but entry?
CVE-2020-15522: no packages for Image SLES15-SP2-SAP-BYOS-EC2-HVM, but entry?
CVE-2020-15522: no packages for Image SLES15-SP2-SAP-BYOS-GCE, but entry?
CVE-2020-15522: no packages for Image SLES15-SP2-SAP-EC2-HVM, but entry?
CVE-2020-15522: no packages for Image SLES15-SP2-SAP-GCE, but entry?
CVE-2020-15522: no packages for Image SLES15-SP3-Manager-4-2-Server-BYOS-Azure, but entry?
CVE-2020-15522: no packages for Image SLES15-SP3-Manager-4-2-Server-BYOS-EC2-HVM, but entry?
CVE-2020-15522: no packages for Image SLES15-SP3-Manager-4-2-Server-BYOS-GCE, but entry?
CVE-2020-15522: no packages for Image SLES15-SP3-SAP-Azure-LI-BYOS-Production, but entry?
CVE-2020-15522: no packages for Image SLES15-SP3-SAP-Azure-VLI-BYOS-Production, but entry?
CVE-2020-15522: no packages for Image SLES15-SP3-SAPCAL-Azure, but entry?
CVE-2020-15522: no packages for Image SLES15-SP3-SAPCAL-EC2-HVM, but entry?
CVE-2020-15522: no packages for Image SLES15-SP3-SAPCAL-GCE, but entry?
CVE-2020-15522: no packages for Image SLES15-SP4-Manager-Server-4-3, but entry?
CVE-2020-15522: no packages for Image SLES15-SP4-Manager-Server-4-3-Azure-llc, but entry?
CVE-2020-15522: no packages for Image SLES15-SP4-Manager-Server-4-3-Azure-ltd, but entry?
CVE-2020-15522: no packages for Image SLES15-SP4-Manager-Server-4-3-BYOS, but entry?
CVE-2020-15522: no packages for Image SLES15-SP4-Manager-Server-4-3-BYOS-Azure, but entry?
CVE-2020-15522: no packages for Image SLES15-SP4-Manager-Server-4-3-BYOS-EC2, but entry?
CVE-2020-15522: no packages for Image SLES15-SP4-Manager-Server-4-3-BYOS-GCE, but entry?
CVE-2020-15522: no packages for Image SLES15-SP4-Manager-Server-4-3-EC2-llc, but entry?
CVE-2020-15522: no packages for Image SLES15-SP4-Manager-Server-4-3-EC2-ltd, but entry?
CVE-2020-15522: no packages for Image SLES15-SP4-SAP, but entry?
CVE-2020-15522: no packages for Image SLES15-SP4-SAP-Azure, but entry?
CVE-2020-15522: no packages for Image SLES15-SP4-SAP-Azure-LI-BYOS, but entry?
CVE-2020-15522: no packages for Image SLES15-SP4-SAP-Azure-LI-BYOS-Production, but entry?
CVE-2020-15522: no packages for Image SLES15-SP4-SAP-Azure-VLI-BYOS, but entry?
CVE-2020-15522: no packages for Image SLES15-SP4-SAP-Azure-VLI-BYOS-Production, but entry?
CVE-2020-15522: no packages for Image SLES15-SP4-SAP-EC2, but entry?
CVE-2020-15522: no packages for Image SLES15-SP4-SAP-GCE, but entry?
CVE-2020-15522: no packages for Image SLES15-SP4-SAPCAL, but entry?
CVE-2020-15522: no packages for Image SLES15-SP4-SAPCAL-Azure, but entry?
CVE-2020-15522: no packages for Image SLES15-SP4-SAPCAL-EC2, but entry?
CVE-2020-15522: no packages for Image SLES15-SP4-SAPCAL-GCE, but entry?
CVE-2020-15522: no packages for Image SLES15-SP5-SAP-Azure, but entry?
CVE-2020-15522: no packages for Image SLES15-SP5-SAP-Azure-LI-BYOS, but entry?
CVE-2020-15522: no packages for Image SLES15-SP5-SAP-Azure-LI-BYOS-Production, but entry?
CVE-2020-15522: no packages for Image SLES15-SP5-SAP-Azure-VLI-BYOS, but entry?
CVE-2020-15522: no packages for Image SLES15-SP5-SAP-Azure-VLI-BYOS-Production, but entry?
CVE-2020-15522: no packages for Image SLES15-SP5-SAP-EC2, but entry?
CVE-2020-15522: no packages for Image SLES15-SP5-SAP-GCE, but entry?
CVE-2020-15522: no packages for Image SLES15-SP5-SAPCAL-Azure, but entry?
CVE-2020-15522: no packages for Image SLES15-SP5-SAPCAL-EC2, but entry?
CVE-2020-15522: no packages for Image SLES15-SP5-SAPCAL-GCE, but entry?
CVE-2020-15522: no packages for Image SLES15-SP6-SAP, but entry?
CVE-2020-15522: no packages for Image SLES15-SP6-SAP-Azure, but entry?
CVE-2020-15522: no packages for Image SLES15-SP6-SAP-Azure-LI-BYOS, but entry?
CVE-2020-15522: no packages for Image SLES15-SP6-SAP-Azure-LI-BYOS-Production, but entry?
CVE-2020-15522: no packages for Image SLES15-SP6-SAP-Azure-VLI-BYOS, but entry?
CVE-2020-15522: no packages for Image SLES15-SP6-SAP-Azure-VLI-BYOS-Production, but entry?
CVE-2020-15522: no packages for Image SLES15-SP6-SAP-EC2, but entry?
CVE-2020-15522: no packages for Image SLES15-SP6-SAP-GCE, but entry?
CVE-2020-15522: no packages for Image SLES15-SP6-SAPCAL, but entry?
CVE-2020-15522: no packages for Image SLES15-SP6-SAPCAL-Azure, but entry?
CVE-2020-15522: no packages for Image SLES15-SP6-SAPCAL-EC2, but entry?
CVE-2020-15522: no packages for Image SLES15-SP6-SAPCAL-GCE, but entry?
CVE-2020-15522: no packages for SUSE CaaS Platform 4.0, but entry?
CVE-2020-15522: no packages for SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS, but entry?
CVE-2020-15522: no packages for SUSE Linux Enterprise Module for Basesystem 15 SP4, but entry?
CVE-2020-15522: no packages for SUSE Linux Enterprise Module for Basesystem 15 SP5, but entry?
CVE-2020-15522: no packages for SUSE Linux Enterprise Module for Basesystem 15 SP6, but entry?
CVE-2020-15522: no packages for SUSE Linux Enterprise Module for Package Hub 15 SP4, but entry?
CVE-2020-15522: no packages for SUSE Linux Enterprise Module for Package Hub 15 SP5, but entry?
CVE-2020-15522: no packages for SUSE Linux Enterprise Module for Package Hub 15 SP6, but entry?
CVE-2020-15522: no packages for SUSE Linux Enterprise Module for Web and Scripting 15 SP4, but entry?
CVE-2020-15522: no packages for SUSE Linux Enterprise Module for Web and Scripting 15 SP5, but entry?
CVE-2020-15522: no packages for SUSE Linux Enterprise Module for Web and Scripting 15 SP6, but entry?
CVE-2020-15522: no packages for SUSE Linux Enterprise Server 15 SP1-LTSS, but entry?
CVE-2020-15522: no packages for SUSE Linux Enterprise Server 15 SP4-TERADATA, but entry?
CVE-2020-15522: no packages for SUSE Linux Enterprise Server for SAP Applications 15 SP1, but entry?
CVE-2020-15522: no packages for SUSE Linux Enterprise Workstation Extension 15 SP4, but entry?
CVE-2020-15522: no packages for SUSE Linux Enterprise Workstation Extension 15 SP5, but entry?
CVE-2020-15522: no packages for SUSE Linux Enterprise Workstation Extension 15 SP6, but entry?
CVE-2020-15522: no packages for SUSE Manager Proxy 4.2, but entry?
CVE-2020-15522: no packages for SUSE Manager Retail Branch Server 4.2, but entry?
CVE-2020-15522: no packages for SUSE Manager Server 4.2, but entry?
CVE-2020-15522: no packages for SUSE Manager Server Module 4.2, but entry?
CVE-2020-15522: no packages for SUSE Manager Server Module 4.3, but entry?
CVE-2020-15522: no packages for Container bci/kiwi:9.24.43-8.6, but entry?
CVE-2020-15522: no packages for Container bci/openjdk-devel:11-6.2, but entry?
CVE-2020-15522: no packages for Container bci/openjdk-devel:17-14.11, but entry?
CVE-2020-15522: no packages for Container bci/openjdk-devel:17-7.2, but entry?
CVE-2020-15522: no packages for Container bci/openjdk:11-7.1, but entry?
CVE-2020-15522: no packages for Container bci/openjdk:17-7.1, but entry?
CVE-2020-15522: no packages for Container bci/openjdk:latest, but entry?
CVE-2020-15522: no packages for Container suse/manager/5.0/x86_64/server-attestation:5.0.0-beta2.2.16, but entry?
CVE-2020-15522: no packages for Container suse/manager/5.0/x86_64/server:5.0.0-beta1.2.122, but entry?
CVE-2020-15522: no packages for Image SLES15-SP2-SAP-Azure, but entry?
CVE-2020-15522: no packages for Image SLES15-SP2-SAP-Azure-LI-BYOS-Production, but entry?
CVE-2020-15522: no packages for Image SLES15-SP2-SAP-Azure-VLI-BYOS-Production, but entry?
CVE-2020-15522: no packages for Image SLES15-SP2-SAP-BYOS-Azure, but entry?
CVE-2020-15522: no packages for Image SLES15-SP2-SAP-BYOS-EC2-HVM, but entry?
CVE-2020-15522: no packages for Image SLES15-SP2-SAP-BYOS-GCE, but entry?
CVE-2020-15522: no packages for Image SLES15-SP2-SAP-EC2-HVM, but entry?
CVE-2020-15522: no packages for Image SLES15-SP2-SAP-GCE, but entry?
CVE-2020-15522: no packages for Image SLES15-SP3-Manager-4-2-Server-BYOS-Azure, but entry?
CVE-2020-15522: no packages for Image SLES15-SP3-Manager-4-2-Server-BYOS-EC2-HVM, but entry?
CVE-2020-15522: no packages for Image SLES15-SP3-Manager-4-2-Server-BYOS-GCE, but entry?
CVE-2020-15522: no packages for Image SLES15-SP3-SAP-Azure-LI-BYOS-Production, but entry?
CVE-2020-15522: no packages for Image SLES15-SP3-SAP-Azure-VLI-BYOS-Production, but entry?
CVE-2020-15522: no packages for Image SLES15-SP3-SAPCAL-Azure, but entry?
CVE-2020-15522: no packages for Image SLES15-SP3-SAPCAL-EC2-HVM, but entry?
CVE-2020-15522: no packages for Image SLES15-SP3-SAPCAL-GCE, but entry?
CVE-2020-15522: no packages for Image SLES15-SP4-Manager-Server-4-3, but entry?
CVE-2020-15522: no packages for Image SLES15-SP4-Manager-Server-4-3-Azure-llc, but entry?
CVE-2020-15522: no packages for Image SLES15-SP4-Manager-Server-4-3-Azure-ltd, but entry?
CVE-2020-15522: no packages for Image SLES15-SP4-Manager-Server-4-3-BYOS, but entry?
CVE-2020-15522: no packages for Image SLES15-SP4-Manager-Server-4-3-BYOS-Azure, but entry?
CVE-2020-15522: no packages for Image SLES15-SP4-Manager-Server-4-3-BYOS-EC2, but entry?
CVE-2020-15522: no packages for Image SLES15-SP4-Manager-Server-4-3-BYOS-GCE, but entry?
CVE-2020-15522: no packages for Image SLES15-SP4-Manager-Server-4-3-EC2-llc, but entry?
CVE-2020-15522: no packages for Image SLES15-SP4-Manager-Server-4-3-EC2-ltd, but entry?
CVE-2020-15522: no packages for Image SLES15-SP4-SAP, but entry?
CVE-2020-15522: no packages for Image SLES15-SP4-SAP-Azure, but entry?
CVE-2020-15522: no packages for Image SLES15-SP4-SAP-Azure-LI-BYOS, but entry?
CVE-2020-15522: no packages for Image SLES15-SP4-SAP-Azure-LI-BYOS-Production, but entry?
CVE-2020-15522: no packages for Image SLES15-SP4-SAP-Azure-VLI-BYOS, but entry?
CVE-2020-15522: no packages for Image SLES15-SP4-SAP-Azure-VLI-BYOS-Production, but entry?
CVE-2020-15522: no packages for Image SLES15-SP4-SAP-EC2, but entry?
CVE-2020-15522: no packages for Image SLES15-SP4-SAP-GCE, but entry?
CVE-2020-15522: no packages for Image SLES15-SP4-SAPCAL, but entry?
CVE-2020-15522: no packages for Image SLES15-SP4-SAPCAL-Azure, but entry?
CVE-2020-15522: no packages for Image SLES15-SP4-SAPCAL-EC2, but entry?
CVE-2020-15522: no packages for Image SLES15-SP4-SAPCAL-GCE, but entry?
CVE-2020-15522: no packages for Image SLES15-SP5-SAP-Azure, but entry?
CVE-2020-15522: no packages for Image SLES15-SP5-SAP-Azure-LI-BYOS, but entry?
CVE-2020-15522: no packages for Image SLES15-SP5-SAP-Azure-LI-BYOS-Production, but entry?
CVE-2020-15522: no packages for Image SLES15-SP5-SAP-Azure-VLI-BYOS, but entry?
CVE-2020-15522: no packages for Image SLES15-SP5-SAP-Azure-VLI-BYOS-Production, but entry?
CVE-2020-15522: no packages for Image SLES15-SP5-SAP-EC2, but entry?
CVE-2020-15522: no packages for Image SLES15-SP5-SAP-GCE, but entry?
CVE-2020-15522: no packages for Image SLES15-SP5-SAPCAL-Azure, but entry?
CVE-2020-15522: no packages for Image SLES15-SP5-SAPCAL-EC2, but entry?
CVE-2020-15522: no packages for Image SLES15-SP5-SAPCAL-GCE, but entry?
CVE-2020-15522: no packages for Image SLES15-SP6-SAP, but entry?
CVE-2020-15522: no packages for Image SLES15-SP6-SAP-Azure, but entry?
CVE-2020-15522: no packages for Image SLES15-SP6-SAP-Azure-LI-BYOS, but entry?
CVE-2020-15522: no packages for Image SLES15-SP6-SAP-Azure-LI-BYOS-Production, but entry?
CVE-2020-15522: no packages for Image SLES15-SP6-SAP-Azure-VLI-BYOS, but entry?
CVE-2020-15522: no packages for Image SLES15-SP6-SAP-Azure-VLI-BYOS-Production, but entry?
CVE-2020-15522: no packages for Image SLES15-SP6-SAP-EC2, but entry?
CVE-2020-15522: no packages for Image SLES15-SP6-SAP-GCE, but entry?
CVE-2020-15522: no packages for Image SLES15-SP6-SAPCAL, but entry?
CVE-2020-15522: no packages for Image SLES15-SP6-SAPCAL-Azure, but entry?
CVE-2020-15522: no packages for Image SLES15-SP6-SAPCAL-EC2, but entry?
CVE-2020-15522: no packages for Image SLES15-SP6-SAPCAL-GCE, but entry?
CVE-2020-15522: no packages for SUSE CaaS Platform 4.0, but entry?
CVE-2020-15522: no packages for SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS, but entry?
CVE-2020-15522: no packages for SUSE Linux Enterprise Module for Basesystem 15 SP4, but entry?
CVE-2020-15522: no packages for SUSE Linux Enterprise Module for Basesystem 15 SP5, but entry?
CVE-2020-15522: no packages for SUSE Linux Enterprise Module for Basesystem 15 SP6, but entry?
CVE-2020-15522: no packages for SUSE Linux Enterprise Module for Package Hub 15 SP4, but entry?
CVE-2020-15522: no packages for SUSE Linux Enterprise Module for Package Hub 15 SP5, but entry?
CVE-2020-15522: no packages for SUSE Linux Enterprise Module for Package Hub 15 SP6, but entry?
CVE-2020-15522: no packages for SUSE Linux Enterprise Module for Web and Scripting 15 SP4, but entry?
CVE-2020-15522: no packages for SUSE Linux Enterprise Module for Web and Scripting 15 SP5, but entry?
CVE-2020-15522: no packages for SUSE Linux Enterprise Module for Web and Scripting 15 SP6, but entry?
CVE-2020-15522: no packages for SUSE Linux Enterprise Server 15 SP1-LTSS, but entry?
CVE-2020-15522: no packages for SUSE Linux Enterprise Server 15 SP4-TERADATA, but entry?
CVE-2020-15522: no packages for SUSE Linux Enterprise Server for SAP Applications 15 SP1, but entry?
CVE-2020-15522: no packages for SUSE Linux Enterprise Workstation Extension 15 SP4, but entry?
CVE-2020-15522: no packages for SUSE Linux Enterprise Workstation Extension 15 SP5, but entry?
CVE-2020-15522: no packages for SUSE Linux Enterprise Workstation Extension 15 SP6, but entry?
CVE-2020-15522: no packages for SUSE Manager Proxy 4.2, but entry?
CVE-2020-15522: no packages for SUSE Manager Retail Branch Server 4.2, but entry?
CVE-2020-15522: no packages for SUSE Manager Server 4.2, but entry?
CVE-2020-15522: no packages for SUSE Manager Server Module 4.2, but entry?
CVE-2020-15522: no packages for SUSE Manager Server Module 4.3, but entry?
skipping CVE-2020-15466 as CVE page is older than CVRF-CVE file.
no cpe found for SUSE Package Hub 15 SP1 in CVE-2020-15397
no cpe found for SUSE Package Hub 15 SP2 in CVE-2020-15397
no cpe found for SUSE Package Hub 15 SP1 in CVE-2020-15396
no cpe found for SUSE Package Hub 15 SP2 in CVE-2020-15396
skipping CVE-2020-15393 as CVE page is older than CVRF-CVE file.
skipping CVE-2020-15389 as CVE page is older than CVRF-CVE file.
skipping CVE-2020-15365 as CVE page is older than CVRF-CVE file.
no cpe found for SUSE Package Hub 15 SP2 in CVE-2020-15275
no cpe found for SUSE Package Hub 15 SP2 in CVE-2020-15238
no cpe found for SUSE Package Hub 15 SP2 in CVE-2020-15229
skipping CVE-2020-15180 as CVE page is older than CVRF-CVE file.
skipping CVE-2020-15169 as CVE page is older than CVRF-CVE file.
skipping CVE-2020-15168 as CVE page is older than CVRF-CVE file.
skipping CVE-2020-15078 as CVE page is older than CVRF-CVE file.
skipping CVE-2020-15075 as CVE page is older than CVRF-CVE file.
no cpe found for SUSE Package Hub 15 SP2 in CVE-2020-15011
no cpe found for SUSE Package Hub 15 SP1 in CVE-2020-14983
no cpe found for SUSE Package Hub 15 SP1 in CVE-2020-14954
no cpe found for SUSE Package Hub 15 SP2 in CVE-2020-14954
no cpe found for SUSE Package Hub 15 SP1 in CVE-2020-14929
no cpe found for SUSE Package Hub 15 SP2 in CVE-2020-14929
skipping CVE-2020-14871 as CVE page is older than CVRF-CVE file.
skipping CVE-2020-14664 as CVE page is older than CVRF-CVE file.
skipping CVE-2020-14621 as CVE page is older than CVRF-CVE file.
skipping CVE-2020-14593 as CVE page is older than CVRF-CVE file.
skipping CVE-2020-14583 as CVE page is older than CVRF-CVE file.
skipping CVE-2020-14581 as CVE page is older than CVRF-CVE file.
skipping CVE-2020-14579 as CVE page is older than CVRF-CVE file.
skipping CVE-2020-14578 as CVE page is older than CVRF-CVE file.
skipping CVE-2020-14577 as CVE page is older than CVRF-CVE file.
skipping CVE-2020-14573 as CVE page is older than CVRF-CVE file.
skipping CVE-2020-14562 as CVE page is older than CVRF-CVE file.
skipping CVE-2020-14556 as CVE page is older than CVRF-CVE file.
no cpe found for SUSE Package Hub 15 SP2 in CVE-2020-14424
no cpe found for SUSE Package Hub 15 SP3 in CVE-2020-14424
skipping CVE-2020-14422 as CVE page is older than CVRF-CVE file.
skipping CVE-2020-14416 as CVE page is older than CVRF-CVE file.
skipping CVE-2020-14415 as CVE page is older than CVRF-CVE file.
skipping CVE-2020-14405 as CVE page is older than CVRF-CVE file.
skipping CVE-2020-14396 as CVE page is older than CVRF-CVE file.
skipping CVE-2020-14386 as CVE page is older than CVRF-CVE file.
skipping CVE-2020-14385 as CVE page is older than CVRF-CVE file.
skipping CVE-2020-14382 as CVE page is older than CVRF-CVE file.
skipping CVE-2020-14373 as CVE page is older than CVRF-CVE file.
CVE-2020-14367: no packages for Container ses/7.1/cephcsi/csi-resizer:v1.7.0, but entry?
CVE-2020-14367: no packages for Container bci/nodejs:12-13.21, but entry?
CVE-2020-14367: no packages for Container ses/7/ceph/grafana:7.5.12.3.734, but entry?
CVE-2020-14367: no packages for SUSE Linux Enterprise Installer Updates 15 SP3, but entry?
CVE-2020-14367: no packages for Image SLES15-SP2-CHOST-BYOS-Aliyun, but entry?
CVE-2020-14367: no packages for Container suse/sle15:15.3.17.11.6, but entry?
CVE-2020-14367: no packages for Container suse/sle15:15.1.6.2.587, but entry?
CVE-2020-14367: no packages for Image SLES15-SP1-SAPCAL-Azure, but entry?
CVE-2020-14367: no packages for Image SLES15-SP1-CHOST-BYOS-GCE, but entry?
CVE-2020-14367: no packages for Container ses/7/cephcsi/csi-node-driver-registrar:v2.3.0-rev1-build3.508, but entry?
CVE-2020-14367: no packages for Image SLES15-SP2-BYOS-EC2-HVM, but entry?
CVE-2020-14367: no packages for Image SLES15-SAP-Azure-LI-BYOS-Production, but entry?
CVE-2020-14367: no packages for Image SLES15-SP2-Manager-4-1-Proxy-BYOS-Azure, but entry?
CVE-2020-14367: no packages for Image SLES15-SP1-Azure-HPC-BYOS, but entry?
CVE-2020-14367: no packages for Image SLES15-SP1-SAPCAL-EC2-HVM, but entry?
CVE-2020-14367: no packages for Container ses/7/cephcsi/csi-provisioner:v3.0.0-rev1-build3.497, but entry?
CVE-2020-14367: no packages for Container ses/7/cephcsi/csi-livenessprobe:v1.1.0-rev1-build3.517, but entry?
CVE-2020-14367: no packages for Image SLES15-SP2-SAP-BYOS-Azure, but entry?
CVE-2020-14367: no packages for Container ses/7/rook/ceph:1.7.7.0.1.2016, but entry?
CVE-2020-14367: no packages for Image SLES15-SP2-CHOST-BYOS-GCE, but entry?
CVE-2020-14367: no packages for Container ses/7/cephcsi/csi-attacher:v3.3.0-rev1-build3.527, but entry?
CVE-2020-14367: no packages for Image SLES15-SAP-Azure-BYOS, but entry?
CVE-2020-14367: no packages for Image SLES15-SP2-BYOS-Azure, but entry?
CVE-2020-14367: no packages for Container bci/golang:latest, but entry?
CVE-2020-14367: no packages for Container suse/sle-micro-rancher/5.2:latest, but entry?
CVE-2020-14367: no packages for Container suse/ltss/sle15.3/bci-base:latest, but entry?
CVE-2020-14367: no packages for Image SLES15-SP2-SAP-Azure-VLI-BYOS-Production, but entry?
CVE-2020-14367: no packages for Image SLES15-SP2-SAP-BYOS-EC2-HVM, but entry?
CVE-2020-14367: no packages for Container ses/7/ceph/prometheus-node-exporter:1.1.2.1.6.6, but entry?
CVE-2020-14367: no packages for Container ses/7/cephcsi/csi-snapshotter:v4.2.0-rev1-build3.490, but entry?
CVE-2020-14367: no packages for Image SLES15-SP2-SAP-GCE, but entry?
CVE-2020-14367: no packages for Container suse/sle-micro/5.2/toolbox:11.1-6.2.74, but entry?
CVE-2020-14367: no packages for Container ses/7/prometheus-webhook-snmp:1.4.1.455, but entry?
CVE-2020-14367: no packages for Image SLES15-SP2-Manager-4-1-Proxy-BYOS-GCE, but entry?
CVE-2020-14367: no packages for Image SLES15-SP1-SAP-Azure-BYOS, but entry?
CVE-2020-14367: no packages for Container caasp/v4/cilium:1.6.6, but entry?
CVE-2020-14367: no packages for Container ses/7.1/ceph/grafana:7.5.12.2.2.13, but entry?
CVE-2020-14367: no packages for Container caasp/v4/cilium-operator:1.6.6, but entry?
CVE-2020-14367: no packages for Image SLES15-SP2-Manager-4-1-Proxy-BYOS-EC2-HVM, but entry?
CVE-2020-14367: no packages for Container ses/7.1/ceph/haproxy:2.0.14.2.2.10, but entry?
CVE-2020-14367: no packages for Container suse/sle15:15.2.9.5.105, but entry?
CVE-2020-14367: no packages for Container ses/6/rook/ceph:1.1.1.0.1.5.568, but entry?
CVE-2020-14367: no packages for Image SLES15-SP2-Manager-4-1-Server-BYOS-EC2-HVM, but entry?
CVE-2020-14367: no packages for Container ses/7.1/ceph/keepalived:2.0.19.2.2.10, but entry?
CVE-2020-14367: no packages for Container ses/7.1/ceph/prometheus-alertmanager:0.21.0.3.2.10, but entry?
CVE-2020-14367: no packages for Image SLES15-SP2-Manager-4-1-Server-BYOS-GCE, but entry?
CVE-2020-14367: no packages for Image SLES15-SP2-SAP-Azure-LI-BYOS-Production, but entry?
CVE-2020-14367: no packages for Container ses/7.1/cephcsi/csi-node-driver-registrar:v2.7.0, but entry?
CVE-2020-14367: no packages for Container bci/nodejs:14-16.21, but entry?
CVE-2020-14367: no packages for Image SLES15-SP1-SAP-Azure-VLI-BYOS-Production, but entry?
CVE-2020-14367: no packages for Image SLES15-SP2-SAP-Azure, but entry?
CVE-2020-14367: no packages for Container bci/ruby:2.5-14.18, but entry?
CVE-2020-14367: no packages for Container ses/7/cephcsi/cephcsi:3.4.0.0.3.838, but entry?
CVE-2020-14367: no packages for Image SLES15-SP2-CHOST-BYOS-Azure, but entry?
CVE-2020-14367: no packages for Image SLES15-SP1-CHOST-BYOS-Azure, but entry?
CVE-2020-14367: no packages for Container bci/python:3, but entry?
CVE-2020-14367: no packages for Image SLES15-Azure-BYOS, but entry?
CVE-2020-14367: no packages for Image SLES15-SP2-SAP-BYOS-GCE, but entry?
CVE-2020-14367: no packages for Image SLES15-SP1-CHOST-BYOS-EC2, but entry?
CVE-2020-14367: no packages for Container suse/sle-micro/5.1/toolbox:11.1-2.2.254, but entry?
CVE-2020-14367: no packages for Container caasp/v4/helm-tiller:2.16.12, but entry?
CVE-2020-14367: no packages for Container bci/openjdk:11-14.24, but entry?
CVE-2020-14367: no packages for Image SLES15-SP2-HPC-BYOS-EC2-HVM, but entry?
CVE-2020-14367: no packages for Container ses/7.1/cephcsi/csi-snapshotter:v6.2.1, but entry?
CVE-2020-14367: no packages for Image SLES15-SP1-Azure-BYOS, but entry?
CVE-2020-14367: no packages for Image SLES15-SP2-Manager-4-1-Server-BYOS-Azure, but entry?
CVE-2020-14367: no packages for Container ses/6/cephcsi/cephcsi:1.2.0.0.1.5.583, but entry?
CVE-2020-14367: no packages for SUSE Linux Enterprise Micro 5.0, but entry?
CVE-2020-14367: no packages for Container ses/7.1/ceph/prometheus-server:2.32.1.3.2.10, but entry?
CVE-2020-14367: no packages for Container bci/nodejs:16-4.21, but entry?
CVE-2020-14367: no packages for Container ses/7.1/ceph/prometheus-snmp_notifier:1.2.1.2.2.3, but entry?
CVE-2020-14367: no packages for SUSE Linux Enterprise Real Time 15 SP2, but entry?
CVE-2020-14367: no packages for Container ses/7.1/rook/ceph:1.8.6.0.3.2.5, but entry?
CVE-2020-14367: no packages for Container ses/7/cephcsi/csi-resizer:v1.3.0-rev1-build3.493, but entry?
CVE-2020-14367: no packages for Image SLES15-SP2-CHOST-BYOS-EC2, but entry?
CVE-2020-14367: no packages for Image SLES15-SP1-SAP-Azure-LI-BYOS-Production, but entry?
CVE-2020-14367: no packages for Image SLES15-SP2-HPC-BYOS-Azure, but entry?
CVE-2020-14367: no packages for Container ses/7/ceph/prometheus-server:2.32.1.1.6.6, but entry?
CVE-2020-14367: no packages for Container ses/7/ceph/prometheus-alertmanager:0.21.0.1.8.1, but entry?
CVE-2020-14367: no packages for Container ses/7.1/cephcsi/csi-provisioner:v3.4.0, but entry?
CVE-2020-14367: no packages for Image SLES15-SP1-SAPCAL-GCE, but entry?
CVE-2020-14367: no packages for Container ses/7.1/cephcsi/csi-attacher:v4.1.0, but entry?
CVE-2020-14367: no packages for Container ses/7.1/cephcsi/cephcsi:3.5.1.0.3.2.10, but entry?
CVE-2020-14367: no packages for Image SLES15-SP2-BYOS-GCE, but entry?
CVE-2020-14367: no packages for Container bci/openjdk-devel:11, but entry?
CVE-2020-14367: no packages for Container ses/7.1/ceph/prometheus-node-exporter:1.1.2.3.2.10, but entry?
CVE-2020-14367: no packages for Container bci/bci-init:15.3, but entry?
CVE-2020-14367: no packages for Image SLES15-SAP-Azure-VLI-BYOS-Production, but entry?
CVE-2020-14367: no packages for Container bci/golang:1.17, but entry?
CVE-2020-14367: no packages for SUSE Linux Enterprise Micro 5.2, but entry?
CVE-2020-14367: no packages for Container suse/sle15:15.0.4.22.529, but entry?
CVE-2020-14367: no packages for Image SLES15-SP2-SAP-EC2-HVM, but entry?
CVE-2020-14367: no packages for Container bci/golang:1.16-12.20, but entry?
CVE-2020-14367: no packages for Container bci/bci-init:15.3, but entry?
CVE-2020-14367: no packages for Container bci/golang:1.16-12.20, but entry?
CVE-2020-14367: no packages for Container bci/golang:1.17, but entry?
CVE-2020-14367: no packages for Container bci/golang:latest, but entry?
CVE-2020-14367: no packages for Container bci/nodejs:12-13.21, but entry?
CVE-2020-14367: no packages for Container bci/nodejs:14-16.21, but entry?
CVE-2020-14367: no packages for Container bci/nodejs:16-4.21, but entry?
CVE-2020-14367: no packages for Container bci/openjdk-devel:11, but entry?
CVE-2020-14367: no packages for Container bci/openjdk:11-14.24, but entry?
CVE-2020-14367: no packages for Container bci/python:3, but entry?
CVE-2020-14367: no packages for Container bci/ruby:2.5-14.18, but entry?
CVE-2020-14367: no packages for Container caasp/v4/cilium-operator:1.6.6, but entry?
CVE-2020-14367: no packages for Container caasp/v4/cilium:1.6.6, but entry?
CVE-2020-14367: no packages for Container caasp/v4/helm-tiller:2.16.12, but entry?
CVE-2020-14367: no packages for Container ses/6/cephcsi/cephcsi:1.2.0.0.1.5.583, but entry?
CVE-2020-14367: no packages for Container ses/6/rook/ceph:1.1.1.0.1.5.568, but entry?
CVE-2020-14367: no packages for Container ses/7.1/ceph/grafana:7.5.12.2.2.13, but entry?
CVE-2020-14367: no packages for Container ses/7.1/ceph/haproxy:2.0.14.2.2.10, but entry?
CVE-2020-14367: no packages for Container ses/7.1/ceph/keepalived:2.0.19.2.2.10, but entry?
CVE-2020-14367: no packages for Container ses/7.1/ceph/prometheus-alertmanager:0.21.0.3.2.10, but entry?
CVE-2020-14367: no packages for Container ses/7.1/ceph/prometheus-node-exporter:1.1.2.3.2.10, but entry?
CVE-2020-14367: no packages for Container ses/7.1/ceph/prometheus-server:2.32.1.3.2.10, but entry?
CVE-2020-14367: no packages for Container ses/7.1/ceph/prometheus-snmp_notifier:1.2.1.2.2.3, but entry?
CVE-2020-14367: no packages for Container ses/7.1/cephcsi/cephcsi:3.5.1.0.3.2.10, but entry?
CVE-2020-14367: no packages for Container ses/7.1/cephcsi/csi-attacher:v4.1.0, but entry?
CVE-2020-14367: no packages for Container ses/7.1/cephcsi/csi-node-driver-registrar:v2.7.0, but entry?
CVE-2020-14367: no packages for Container ses/7.1/cephcsi/csi-provisioner:v3.4.0, but entry?
CVE-2020-14367: no packages for Container ses/7.1/cephcsi/csi-resizer:v1.7.0, but entry?
CVE-2020-14367: no packages for Container ses/7.1/cephcsi/csi-snapshotter:v6.2.1, but entry?
CVE-2020-14367: no packages for Container ses/7.1/rook/ceph:1.8.6.0.3.2.5, but entry?
CVE-2020-14367: no packages for Container ses/7/ceph/grafana:7.5.12.3.734, but entry?
CVE-2020-14367: no packages for Container ses/7/ceph/prometheus-alertmanager:0.21.0.1.8.1, but entry?
CVE-2020-14367: no packages for Container ses/7/ceph/prometheus-node-exporter:1.1.2.1.6.6, but entry?
CVE-2020-14367: no packages for Container ses/7/ceph/prometheus-server:2.32.1.1.6.6, but entry?
CVE-2020-14367: no packages for Container ses/7/cephcsi/cephcsi:3.4.0.0.3.838, but entry?
CVE-2020-14367: no packages for Container ses/7/cephcsi/csi-attacher:v3.3.0-rev1-build3.527, but entry?
CVE-2020-14367: no packages for Container ses/7/cephcsi/csi-livenessprobe:v1.1.0-rev1-build3.517, but entry?
CVE-2020-14367: no packages for Container ses/7/cephcsi/csi-node-driver-registrar:v2.3.0-rev1-build3.508, but entry?
CVE-2020-14367: no packages for Container ses/7/cephcsi/csi-provisioner:v3.0.0-rev1-build3.497, but entry?
CVE-2020-14367: no packages for Container ses/7/cephcsi/csi-resizer:v1.3.0-rev1-build3.493, but entry?
CVE-2020-14367: no packages for Container ses/7/cephcsi/csi-snapshotter:v4.2.0-rev1-build3.490, but entry?
CVE-2020-14367: no packages for Container ses/7/prometheus-webhook-snmp:1.4.1.455, but entry?
CVE-2020-14367: no packages for Container ses/7/rook/ceph:1.7.7.0.1.2016, but entry?
CVE-2020-14367: no packages for Container suse/ltss/sle15.3/bci-base:latest, but entry?
CVE-2020-14367: no packages for Container suse/sle-micro-rancher/5.2:latest, but entry?
CVE-2020-14367: no packages for Container suse/sle-micro/5.1/toolbox:11.1-2.2.254, but entry?
CVE-2020-14367: no packages for Container suse/sle-micro/5.2/toolbox:11.1-6.2.74, but entry?
CVE-2020-14367: no packages for Container suse/sle15:15.0.4.22.529, but entry?
CVE-2020-14367: no packages for Container suse/sle15:15.1.6.2.587, but entry?
CVE-2020-14367: no packages for Container suse/sle15:15.2.9.5.105, but entry?
CVE-2020-14367: no packages for Container suse/sle15:15.3.17.11.6, but entry?
CVE-2020-14367: no packages for Image SLES15-Azure-BYOS, but entry?
CVE-2020-14367: no packages for Image SLES15-SAP-Azure-BYOS, but entry?
CVE-2020-14367: no packages for Image SLES15-SAP-Azure-LI-BYOS-Production, but entry?
CVE-2020-14367: no packages for Image SLES15-SAP-Azure-VLI-BYOS-Production, but entry?
CVE-2020-14367: no packages for Image SLES15-SP1-Azure-BYOS, but entry?
CVE-2020-14367: no packages for Image SLES15-SP1-Azure-HPC-BYOS, but entry?
CVE-2020-14367: no packages for Image SLES15-SP1-CHOST-BYOS-Azure, but entry?
CVE-2020-14367: no packages for Image SLES15-SP1-CHOST-BYOS-EC2, but entry?
CVE-2020-14367: no packages for Image SLES15-SP1-CHOST-BYOS-GCE, but entry?
CVE-2020-14367: no packages for Image SLES15-SP1-SAP-Azure-BYOS, but entry?
CVE-2020-14367: no packages for Image SLES15-SP1-SAP-Azure-LI-BYOS-Production, but entry?
CVE-2020-14367: no packages for Image SLES15-SP1-SAP-Azure-VLI-BYOS-Production, but entry?
CVE-2020-14367: no packages for Image SLES15-SP1-SAPCAL-Azure, but entry?
CVE-2020-14367: no packages for Image SLES15-SP1-SAPCAL-EC2-HVM, but entry?
CVE-2020-14367: no packages for Image SLES15-SP1-SAPCAL-GCE, but entry?
CVE-2020-14367: no packages for Image SLES15-SP2-BYOS-Azure, but entry?
CVE-2020-14367: no packages for Image SLES15-SP2-BYOS-EC2-HVM, but entry?
CVE-2020-14367: no packages for Image SLES15-SP2-BYOS-GCE, but entry?
CVE-2020-14367: no packages for Image SLES15-SP2-CHOST-BYOS-Aliyun, but entry?
CVE-2020-14367: no packages for Image SLES15-SP2-CHOST-BYOS-Azure, but entry?
CVE-2020-14367: no packages for Image SLES15-SP2-CHOST-BYOS-EC2, but entry?
CVE-2020-14367: no packages for Image SLES15-SP2-CHOST-BYOS-GCE, but entry?
CVE-2020-14367: no packages for Image SLES15-SP2-HPC-BYOS-Azure, but entry?
CVE-2020-14367: no packages for Image SLES15-SP2-HPC-BYOS-EC2-HVM, but entry?
CVE-2020-14367: no packages for Image SLES15-SP2-Manager-4-1-Proxy-BYOS-Azure, but entry?
CVE-2020-14367: no packages for Image SLES15-SP2-Manager-4-1-Proxy-BYOS-EC2-HVM, but entry?
CVE-2020-14367: no packages for Image SLES15-SP2-Manager-4-1-Proxy-BYOS-GCE, but entry?
CVE-2020-14367: no packages for Image SLES15-SP2-Manager-4-1-Server-BYOS-Azure, but entry?
CVE-2020-14367: no packages for Image SLES15-SP2-Manager-4-1-Server-BYOS-EC2-HVM, but entry?
CVE-2020-14367: no packages for Image SLES15-SP2-Manager-4-1-Server-BYOS-GCE, but entry?
CVE-2020-14367: no packages for Image SLES15-SP2-SAP-Azure, but entry?
CVE-2020-14367: no packages for Image SLES15-SP2-SAP-Azure-LI-BYOS-Production, but entry?
CVE-2020-14367: no packages for Image SLES15-SP2-SAP-Azure-VLI-BYOS-Production, but entry?
CVE-2020-14367: no packages for Image SLES15-SP2-SAP-BYOS-Azure, but entry?
CVE-2020-14367: no packages for Image SLES15-SP2-SAP-BYOS-EC2-HVM, but entry?
CVE-2020-14367: no packages for Image SLES15-SP2-SAP-BYOS-GCE, but entry?
CVE-2020-14367: no packages for Image SLES15-SP2-SAP-EC2-HVM, but entry?
CVE-2020-14367: no packages for Image SLES15-SP2-SAP-GCE, but entry?
CVE-2020-14367: no packages for SUSE Linux Enterprise Installer Updates 15 SP3, but entry?
CVE-2020-14367: no packages for SUSE Linux Enterprise Micro 5.0, but entry?
CVE-2020-14367: no packages for SUSE Linux Enterprise Micro 5.2, but entry?
CVE-2020-14367: no packages for SUSE Linux Enterprise Real Time 15 SP2, but entry?
CVE-2020-14367: no packages for Container bci/bci-init:15.3, but entry?
CVE-2020-14367: no packages for Container bci/golang:1.16-12.20, but entry?
CVE-2020-14367: no packages for Container bci/golang:1.17, but entry?
CVE-2020-14367: no packages for Container bci/golang:latest, but entry?
CVE-2020-14367: no packages for Container bci/nodejs:12-13.21, but entry?
CVE-2020-14367: no packages for Container bci/nodejs:14-16.21, but entry?
CVE-2020-14367: no packages for Container bci/nodejs:16-4.21, but entry?
CVE-2020-14367: no packages for Container bci/openjdk-devel:11, but entry?
CVE-2020-14367: no packages for Container bci/openjdk:11-14.24, but entry?
CVE-2020-14367: no packages for Container bci/python:3, but entry?
CVE-2020-14367: no packages for Container bci/ruby:2.5-14.18, but entry?
CVE-2020-14367: no packages for Container caasp/v4/cilium-operator:1.6.6, but entry?
CVE-2020-14367: no packages for Container caasp/v4/cilium:1.6.6, but entry?
CVE-2020-14367: no packages for Container caasp/v4/helm-tiller:2.16.12, but entry?
CVE-2020-14367: no packages for Container ses/6/cephcsi/cephcsi:1.2.0.0.1.5.583, but entry?
CVE-2020-14367: no packages for Container ses/6/rook/ceph:1.1.1.0.1.5.568, but entry?
CVE-2020-14367: no packages for Container ses/7.1/ceph/grafana:7.5.12.2.2.13, but entry?
CVE-2020-14367: no packages for Container ses/7.1/ceph/haproxy:2.0.14.2.2.10, but entry?
CVE-2020-14367: no packages for Container ses/7.1/ceph/keepalived:2.0.19.2.2.10, but entry?
CVE-2020-14367: no packages for Container ses/7.1/ceph/prometheus-alertmanager:0.21.0.3.2.10, but entry?
CVE-2020-14367: no packages for Container ses/7.1/ceph/prometheus-node-exporter:1.1.2.3.2.10, but entry?
CVE-2020-14367: no packages for Container ses/7.1/ceph/prometheus-server:2.32.1.3.2.10, but entry?
CVE-2020-14367: no packages for Container ses/7.1/ceph/prometheus-snmp_notifier:1.2.1.2.2.3, but entry?
CVE-2020-14367: no packages for Container ses/7.1/cephcsi/cephcsi:3.5.1.0.3.2.10, but entry?
CVE-2020-14367: no packages for Container ses/7.1/cephcsi/csi-attacher:v4.1.0, but entry?
CVE-2020-14367: no packages for Container ses/7.1/cephcsi/csi-node-driver-registrar:v2.7.0, but entry?
CVE-2020-14367: no packages for Container ses/7.1/cephcsi/csi-provisioner:v3.4.0, but entry?
CVE-2020-14367: no packages for Container ses/7.1/cephcsi/csi-resizer:v1.7.0, but entry?
CVE-2020-14367: no packages for Container ses/7.1/cephcsi/csi-snapshotter:v6.2.1, but entry?
CVE-2020-14367: no packages for Container ses/7.1/rook/ceph:1.8.6.0.3.2.5, but entry?
CVE-2020-14367: no packages for Container ses/7/ceph/grafana:7.5.12.3.734, but entry?
CVE-2020-14367: no packages for Container ses/7/ceph/prometheus-alertmanager:0.21.0.1.8.1, but entry?
CVE-2020-14367: no packages for Container ses/7/ceph/prometheus-node-exporter:1.1.2.1.6.6, but entry?
CVE-2020-14367: no packages for Container ses/7/ceph/prometheus-server:2.32.1.1.6.6, but entry?
CVE-2020-14367: no packages for Container ses/7/cephcsi/cephcsi:3.4.0.0.3.838, but entry?
CVE-2020-14367: no packages for Container ses/7/cephcsi/csi-attacher:v3.3.0-rev1-build3.527, but entry?
CVE-2020-14367: no packages for Container ses/7/cephcsi/csi-livenessprobe:v1.1.0-rev1-build3.517, but entry?
CVE-2020-14367: no packages for Container ses/7/cephcsi/csi-node-driver-registrar:v2.3.0-rev1-build3.508, but entry?
CVE-2020-14367: no packages for Container ses/7/cephcsi/csi-provisioner:v3.0.0-rev1-build3.497, but entry?
CVE-2020-14367: no packages for Container ses/7/cephcsi/csi-resizer:v1.3.0-rev1-build3.493, but entry?
CVE-2020-14367: no packages for Container ses/7/cephcsi/csi-snapshotter:v4.2.0-rev1-build3.490, but entry?
CVE-2020-14367: no packages for Container ses/7/prometheus-webhook-snmp:1.4.1.455, but entry?
CVE-2020-14367: no packages for Container ses/7/rook/ceph:1.7.7.0.1.2016, but entry?
CVE-2020-14367: no packages for Container suse/ltss/sle15.3/bci-base:latest, but entry?
CVE-2020-14367: no packages for Container suse/sle-micro-rancher/5.2:latest, but entry?
CVE-2020-14367: no packages for Container suse/sle-micro/5.1/toolbox:11.1-2.2.254, but entry?
CVE-2020-14367: no packages for Container suse/sle-micro/5.2/toolbox:11.1-6.2.74, but entry?
CVE-2020-14367: no packages for Container suse/sle15:15.0.4.22.529, but entry?
CVE-2020-14367: no packages for Container suse/sle15:15.1.6.2.587, but entry?
CVE-2020-14367: no packages for Container suse/sle15:15.2.9.5.105, but entry?
CVE-2020-14367: no packages for Container suse/sle15:15.3.17.11.6, but entry?
CVE-2020-14367: no packages for Image SLES15-Azure-BYOS, but entry?
CVE-2020-14367: no packages for Image SLES15-SAP-Azure-BYOS, but entry?
CVE-2020-14367: no packages for Image SLES15-SAP-Azure-LI-BYOS-Production, but entry?
CVE-2020-14367: no packages for Image SLES15-SAP-Azure-VLI-BYOS-Production, but entry?
CVE-2020-14367: no packages for Image SLES15-SP1-Azure-BYOS, but entry?
CVE-2020-14367: no packages for Image SLES15-SP1-Azure-HPC-BYOS, but entry?
CVE-2020-14367: no packages for Image SLES15-SP1-CHOST-BYOS-Azure, but entry?
CVE-2020-14367: no packages for Image SLES15-SP1-CHOST-BYOS-EC2, but entry?
CVE-2020-14367: no packages for Image SLES15-SP1-CHOST-BYOS-GCE, but entry?
CVE-2020-14367: no packages for Image SLES15-SP1-SAP-Azure-BYOS, but entry?
CVE-2020-14367: no packages for Image SLES15-SP1-SAP-Azure-LI-BYOS-Production, but entry?
CVE-2020-14367: no packages for Image SLES15-SP1-SAP-Azure-VLI-BYOS-Production, but entry?
CVE-2020-14367: no packages for Image SLES15-SP1-SAPCAL-Azure, but entry?
CVE-2020-14367: no packages for Image SLES15-SP1-SAPCAL-EC2-HVM, but entry?
CVE-2020-14367: no packages for Image SLES15-SP1-SAPCAL-GCE, but entry?
CVE-2020-14367: no packages for Image SLES15-SP2-BYOS-Azure, but entry?
CVE-2020-14367: no packages for Image SLES15-SP2-BYOS-EC2-HVM, but entry?
CVE-2020-14367: no packages for Image SLES15-SP2-BYOS-GCE, but entry?
CVE-2020-14367: no packages for Image SLES15-SP2-CHOST-BYOS-Aliyun, but entry?
CVE-2020-14367: no packages for Image SLES15-SP2-CHOST-BYOS-Azure, but entry?
CVE-2020-14367: no packages for Image SLES15-SP2-CHOST-BYOS-EC2, but entry?
CVE-2020-14367: no packages for Image SLES15-SP2-CHOST-BYOS-GCE, but entry?
CVE-2020-14367: no packages for Image SLES15-SP2-HPC-BYOS-Azure, but entry?
CVE-2020-14367: no packages for Image SLES15-SP2-HPC-BYOS-EC2-HVM, but entry?
CVE-2020-14367: no packages for Image SLES15-SP2-Manager-4-1-Proxy-BYOS-Azure, but entry?
CVE-2020-14367: no packages for Image SLES15-SP2-Manager-4-1-Proxy-BYOS-EC2-HVM, but entry?
CVE-2020-14367: no packages for Image SLES15-SP2-Manager-4-1-Proxy-BYOS-GCE, but entry?
CVE-2020-14367: no packages for Image SLES15-SP2-Manager-4-1-Server-BYOS-Azure, but entry?
CVE-2020-14367: no packages for Image SLES15-SP2-Manager-4-1-Server-BYOS-EC2-HVM, but entry?
CVE-2020-14367: no packages for Image SLES15-SP2-Manager-4-1-Server-BYOS-GCE, but entry?
CVE-2020-14367: no packages for Image SLES15-SP2-SAP-Azure, but entry?
CVE-2020-14367: no packages for Image SLES15-SP2-SAP-Azure-LI-BYOS-Production, but entry?
CVE-2020-14367: no packages for Image SLES15-SP2-SAP-Azure-VLI-BYOS-Production, but entry?
CVE-2020-14367: no packages for Image SLES15-SP2-SAP-BYOS-Azure, but entry?
CVE-2020-14367: no packages for Image SLES15-SP2-SAP-BYOS-EC2-HVM, but entry?
CVE-2020-14367: no packages for Image SLES15-SP2-SAP-BYOS-GCE, but entry?
CVE-2020-14367: no packages for Image SLES15-SP2-SAP-EC2-HVM, but entry?
CVE-2020-14367: no packages for Image SLES15-SP2-SAP-GCE, but entry?
CVE-2020-14367: no packages for SUSE Linux Enterprise Installer Updates 15 SP3, but entry?
CVE-2020-14367: no packages for SUSE Linux Enterprise Micro 5.0, but entry?
CVE-2020-14367: no packages for SUSE Linux Enterprise Micro 5.2, but entry?
CVE-2020-14367: no packages for SUSE Linux Enterprise Real Time 15 SP2, but entry?
CVE-2020-14367: no packages for SUSE Linux Enterprise Installer Updates 15 SP3, but entry?
CVE-2020-14365: no packages for SUSE Manager Tools for SLE Micro 5, but entry?
CVE-2020-14365: no packages for SUSE Linux Enterprise Module for Package Hub 15 SP5, but entry?
CVE-2020-14365: no packages for SUSE Manager Tools Beta for SLE Micro 5, but entry?
no cpe found for HPE Helion OpenStack Cloud 8 in CVE-2020-14365
CVE-2020-14365: no packages for SUSE Linux Enterprise Module for Package Hub 15 SP5, but entry?
CVE-2020-14365: no packages for SUSE Manager Tools Beta for SLE Micro 5, but entry?
CVE-2020-14365: no packages for SUSE Manager Tools for SLE Micro 5, but entry?
CVE-2020-14365: no packages for SUSE Linux Enterprise Module for Package Hub 15 SP5, but entry?
CVE-2020-14365: no packages for SUSE Manager Tools Beta for SLE Micro 5, but entry?
CVE-2020-14365: no packages for SUSE Manager Tools for SLE Micro 5, but entry?
no cpe found for SUSE Liberty Linux 7 LTSS in CVE-2020-14355
no cpe found for SUSE Package Hub 15 SP2 in CVE-2020-14352
no cpe found for SUSE Package Hub 15 SP4 in CVE-2020-14352
skipping CVE-2020-14353 as CVE page is older than CVRF-CVE file.
skipping CVE-2020-14350 as CVE page is older than CVRF-CVE file.
skipping CVE-2020-14349 as CVE page is older than CVRF-CVE file.
CVE-2020-14343: no packages for Image SLES15-SP5-CHOST-BYOS-SAP-CCloud, but entry?
CVE-2020-14343: no packages for Image SLES15-SP3-SAP-EC2-HVM, but entry?
CVE-2020-14343: no packages for Image SLES15-SP5-SAP-BYOS-Azure, but entry?
CVE-2020-14343: no packages for Image SLES15-SP5-BYOS-EC2, but entry?
CVE-2020-14343: no packages for Image SLES15-SP4-BYOS-Azure, but entry?
CVE-2020-14343: no packages for Image SLES15-SP6-SAP-Azure, but entry?
CVE-2020-14343: no packages for Image SLES15-SP4-Manager-Server-4-3-BYOS-EC2, but entry?
CVE-2020-14343: no packages for Image SLES15-SP5-Manager-Proxy-5-0-BYOS-Azure, but entry?
CVE-2020-14343: no packages for Image SLES15-SP3-Manager-4-2-Server-BYOS-EC2-HVM, but entry?
CVE-2020-14343: no packages for Image SLES15-SP4-Hardened-BYOS, but entry?
CVE-2020-14343: no packages for Image SLES15-SP4-SAP-Hardened-BYOS-EC2, but entry?
CVE-2020-14343: no packages for Container ses/7.1/rook/ceph:1.8.6.0.3.2.5, but entry?
CVE-2020-14343: no packages for Image SLES15-SP4-HPC-Azure, but entry?
CVE-2020-14343: no packages for Image SLES15-SP6-HPC-BYOS-EC2, but entry?
CVE-2020-14343: no packages for Image SLES15-SP4-Azure-Standard, but entry?
CVE-2020-14343: no packages for Image SLES15-SP4-SUSE-Rancher-Setup-BYOS, but entry?
CVE-2020-14343: no packages for Image SLES15-SP6-HPC-BYOS, but entry?
CVE-2020-14343: no packages for Image SLES15-SP6-SAPCAL-Azure, but entry?
CVE-2020-14343: no packages for Image SLES15-SP5-Hardened-BYOS-Azure, but entry?
CVE-2020-14343: no packages for Image SLES15-SAP-EC2-HVM, but entry?
CVE-2020-14343: no packages for Image SLES15-SP5-SAP-Azure, but entry?
CVE-2020-14343: no packages for Image SLES15-SP4-SAP-Hardened-EC2, but entry?
CVE-2020-14343: no packages for Image SLES15-SP3-Manager-4-2-Server-BYOS-Azure, but entry?
CVE-2020-14343: no packages for Image SLES15-SP5-SAP-Hardened-Azure, but entry?
CVE-2020-14343: no packages for Image SLES15-SP4-CHOST-BYOS-Azure, but entry?
CVE-2020-14343: no packages for Image SLES15-SP6-CHOST-BYOS-EC2, but entry?
CVE-2020-14343: no packages for Image SLES15-SP5-SAP-Hardened-BYOS-EC2, but entry?
CVE-2020-14343: no packages for Image SLES15-SP6-SAP-Hardened-EC2, but entry?
CVE-2020-14343: no packages for Image SLES15-SP1-SAPCAL-GCE, but entry?
CVE-2020-14343: no packages for Image SLES15-SP4-SAP-EC2, but entry?
CVE-2020-14343: no packages for Image SLES15-SP4-SAPCAL-EC2, but entry?
CVE-2020-14343: no packages for Image SLES15-SP5-SAPCAL-EC2, but entry?
CVE-2020-14343: no packages for Image SLES15-SP4-SAPCAL-Azure, but entry?
CVE-2020-14343: no packages for Image SLES15-SP6-HPC-EC2, but entry?
CVE-2020-14343: no packages for Image SLES15-SP4-SUSE-Rancher-Setup-BYOS-EC2, but entry?
CVE-2020-14343: no packages for Image SLES15-SP6-SAP-Hardened-BYOS-EC2, but entry?
CVE-2020-14343: no packages for Image SLES15-SP3-CHOST-BYOS-SAP-CCloud, but entry?
CVE-2020-14343: no packages for Container ses/7.1/cephcsi/cephcsi:3.5.1.0.3.2.10, but entry?
CVE-2020-14343: no packages for Image SLES15-SP5-HPC-EC2, but entry?
CVE-2020-14343: no packages for Image SLES15-SP6-SAP-EC2, but entry?
CVE-2020-14343: no packages for Image SLES15-SP6-BYOS-EC2, but entry?
CVE-2020-14343: no packages for Image SLES15-SP6-SAP-Hardened, but entry?
CVE-2020-14343: no packages for Image SLES15-SP5-SAP-Hardened-BYOS-Azure, but entry?
CVE-2020-14343: no packages for Image SLES15-SP3-EC2-ECS-HVM, but entry?
CVE-2020-14343: no packages for Image SLES15-SP5-CHOST-BYOS-Aliyun, but entry?
CVE-2020-14343: no packages for Image SLES15-SP3-EC2-HVM, but entry?
CVE-2020-14343: no packages for Image SLES15-SP4-CHOST-BYOS-SAP-CCloud, but entry?
CVE-2020-14343: no packages for Image SLES15-SP4-Manager-Proxy-4-3-BYOS-EC2, but entry?
CVE-2020-14343: no packages for Image SLES15-SP4-SAP-Hardened-BYOS, but entry?
CVE-2020-14343: no packages for SUSE Linux Enterprise Module for Package Hub 15 SP5, but entry?
CVE-2020-14343: no packages for Image SLES15-SP6-SAP-BYOS-EC2, but entry?
CVE-2020-14343: no packages for Image SLES15-SP4-SAP-Azure, but entry?
CVE-2020-14343: no packages for Image SLES15-SP4-HPC-BYOS-Azure, but entry?
CVE-2020-14343: no packages for Image SLES15-SP6-CHOST-BYOS-GDC, but entry?
CVE-2020-14343: no packages for Image SLES15-SAP-Azure, but entry?
CVE-2020-14343: no packages for Image SLES15-SP3-CHOST-BYOS-Aliyun, but entry?
CVE-2020-14343: no packages for Image SLES15-SP4-Azure-Basic, but entry?
CVE-2020-14343: no packages for Image SLES15-SP4-Manager-Server-4-3, but entry?
CVE-2020-14343: no packages for Image SLES15-SAP-EC2-HVM-BYOS, but entry?
CVE-2020-14343: no packages for Image SLES15-SP4-Manager-Server-4-3-BYOS, but entry?
CVE-2020-14343: no packages for Image SLES15-SP6-SAP-BYOS, but entry?
CVE-2020-14343: no packages for Image SLES15-SP5-CHOST-BYOS-Azure, but entry?
CVE-2020-14343: no packages for Image SLES15-SP5-Azure-Standard, but entry?
CVE-2020-14343: no packages for Image SLES15-SP6-Azure-Standard, but entry?
CVE-2020-14343: no packages for Image SLES15-SP3-BYOS-EC2-HVM, but entry?
CVE-2020-14343: no packages for SUSE Linux Enterprise Module for Basesystem 15 SP6, but entry?
CVE-2020-14343: no packages for Image SLES15-SP4-HPC-BYOS, but entry?
CVE-2020-14343: no packages for Image SLES15-SP6-SAPCAL, but entry?
CVE-2020-14343: no packages for Image SLES15-SP4-SAP-Hardened, but entry?
CVE-2020-14343: no packages for Image SLES15-SP6-CHOST-BYOS-Azure, but entry?
CVE-2020-14343: no packages for Image SLES15-SP4-EC2-ECS-HVM, but entry?
CVE-2020-14343: no packages for Image SLES15-SP6-SAP-Hardened-BYOS-Azure, but entry?
CVE-2020-14343: no packages for Image SLES15-SP4-CHOST-BYOS-EC2, but entry?
CVE-2020-14343: no packages for Image SLES15-SP3-SAPCAL-Azure, but entry?
CVE-2020-14343: no packages for Image SLES15-SP6-Hardened-BYOS-EC2, but entry?
CVE-2020-14343: no packages for Image SLES15-SP3-HPC-BYOS-Azure, but entry?
CVE-2020-14343: no packages for Image SLES15-SP6-CHOST-BYOS-Aliyun, but entry?
CVE-2020-14343: no packages for Image SLES15-SP5-Azure-Basic, but entry?
CVE-2020-14343: no packages for Image SLES15-SP3-HPC-BYOS-EC2-HVM, but entry?
CVE-2020-14343: no packages for Image SLES15-SP3-SAP-Azure, but entry?
CVE-2020-14343: no packages for Image SLES15-SP4-Manager-Server-4-3-Azure-llc, but entry?
CVE-2020-14343: no packages for Image SLES15-Azure-BYOS, but entry?
CVE-2020-14343: no packages for Image SLES15-SP6-EC2-ECS-HVM, but entry?
CVE-2020-14343: no packages for Image SLES15-EC2-CHOST-HVM-BYOS, but entry?
CVE-2020-14343: no packages for Image SLES15-SP5-HPC-BYOS-Azure, but entry?
CVE-2020-14343: no packages for Image SLES15-SP4-HPC-EC2, but entry?
CVE-2020-14343: no packages for Image SLES15-SP3-CHOST-BYOS-Azure, but entry?
CVE-2020-14343: no packages for Image SLES15-SP4-Manager-Server-4-3-Azure-ltd, but entry?
CVE-2020-14343: no packages for Image SLES15-SP6-SAP-BYOS-Azure, but entry?
CVE-2020-14343: no packages for Image SLES15-SP2-GCE, but entry?
CVE-2020-14343: no packages for Image SLES15-SP3-Manager-4-2-Proxy-BYOS-EC2-HVM, but entry?
CVE-2020-14343: no packages for Image SLES15-SP3-SAP-BYOS-EC2-HVM, but entry?
CVE-2020-14343: no packages for Image SLES15-SP4-SAP-Hardened-BYOS-Azure, but entry?
CVE-2020-14343: no packages for Image SLES15-SP6, but entry?
CVE-2020-14343: no packages for Image SLES15-SP5-SAPCAL-Azure, but entry?
CVE-2020-14343: no packages for Image SLES15-SP6-HPC-Azure, but entry?
CVE-2020-14343: no packages for Image SLES15-SP4-SAP-BYOS-Azure, but entry?
CVE-2020-14343: no packages for SUSE Package Hub 15 SP2, but entry?
CVE-2020-14343: no packages for Image SLES15-SP4-SAP-Hardened-Azure, but entry?
CVE-2020-14343: no packages for Image SLES15-SP4-HPC-BYOS-EC2, but entry?
CVE-2020-14343: no packages for Image SLES15-SP4-HPC, but entry?
CVE-2020-14343: no packages for Image SLES15-SP4-Manager-Server-4-3-BYOS-Azure, but entry?
CVE-2020-14343: no packages for Image SLES15-SAP-Azure-BYOS, but entry?
CVE-2020-14343: no packages for Image SLES15-SP5-BYOS-Azure, but entry?
CVE-2020-14343: no packages for Image SLES15-SP5-HPC-Azure, but entry?
CVE-2020-14343: no packages for Image SLES15-SP5-SAP-Hardened-EC2, but entry?
CVE-2020-14343: no packages for SUSE Linux Enterprise Module for Public Cloud 15 SP3, but entry?
CVE-2020-14343: no packages for Image SLES15-SP6-Azure-Basic, but entry?
CVE-2020-14343: no packages for Image SLES15-SP4-CHOST-BYOS-Aliyun, but entry?
CVE-2020-14343: no packages for SUSE Linux Enterprise Module for Public Cloud 15 SP6, but entry?
CVE-2020-14343: no packages for Image SLES15-SP4-BYOS-EC2, but entry?
CVE-2020-14343: no packages for SUSE Linux Enterprise Module for Development Tools 15 SP3, but entry?
CVE-2020-14343: no packages for Image SLES15-SP6-CHOST-BYOS, but entry?
CVE-2020-14343: no packages for Image SLES15-SP5-Manager-Proxy-5-0-BYOS-EC2, but entry?
CVE-2020-14343: no packages for Image SLES15-SP5-Hardened-BYOS-EC2, but entry?
CVE-2020-14343: no packages for Image SLES15-SP4-Manager-Proxy-4-3-BYOS, but entry?
CVE-2020-14343: no packages for Image SLES15-SP5-SAP-BYOS-EC2, but entry?
CVE-2020-14343: no packages for Image SLES15-SP5-EC2-ECS-HVM, but entry?
CVE-2020-14343: no packages for SUSE Linux Enterprise Module for Public Cloud 15 SP2, but entry?
CVE-2020-14343: no packages for Image SLES15-SP6-SAP-Hardened-Azure, but entry?
CVE-2020-14343: no packages for SUSE Linux Enterprise Module for Package Hub 15 SP2, but entry?
CVE-2020-14343: no packages for Image SLES15-SP5-Manager-Server-5-0-BYOS, but entry?
CVE-2020-14343: no packages for Image SLES15-SP4-Manager-Proxy-4-3-BYOS-Azure, but entry?
CVE-2020-14343: no packages for Image SLES15-SP4-SAP-BYOS-EC2, but entry?
CVE-2020-14343: no packages for SUSE Linux Enterprise Module for Public Cloud 15 SP4, but entry?
CVE-2020-14343: no packages for SUSE Linux Enterprise Module for Package Hub 15 SP4, but entry?
CVE-2020-14343: no packages for Image SLES15-SP5-CHOST-BYOS-GDC, but entry?
CVE-2020-14343: no packages for Image SLES15-SP6-BYOS-Azure, but entry?
CVE-2020-14343: no packages for Container caasp/v4/389-ds:1.4.2, but entry?
CVE-2020-14343: no packages for Image SLES15-SP4-Manager-Server-4-3-EC2-llc, but entry?
CVE-2020-14343: no packages for Image SLES15-SP5-Manager-Server-5-0-BYOS-EC2, but entry?
CVE-2020-14343: no packages for Image SLES15-SP4-Hardened-BYOS-EC2, but entry?
CVE-2020-14343: no packages for SUSE Linux Enterprise Module for Package Hub 15 SP3, but entry?
CVE-2020-14343: no packages for Image SLES15-SP4-SUSE-Rancher-Setup-BYOS-EC2-HVM, but entry?
CVE-2020-14343: no packages for Image SLES15-SP4-SAP, but entry?
CVE-2020-14343: no packages for SUSE Linux Enterprise Module for Public Cloud 15 SP1, but entry?
CVE-2020-14343: no packages for Image SLES15-SP6-SAP-Hardened-BYOS, but entry?
CVE-2020-14343: no packages for Image SLES15-SP3-SAPCAL-EC2-HVM, but entry?
CVE-2020-14343: no packages for Image SLES15-SP3-SAP-BYOS-Azure, but entry?
CVE-2020-14343: no packages for SUSE Linux Enterprise Module for Development Tools 15 SP6, but entry?
CVE-2020-14343: no packages for Image SLES15-SP1-CHOST-BYOS-GCE, but entry?
CVE-2020-14343: no packages for Image SLES15-SP3-CHOST-BYOS-EC2, but entry?
CVE-2020-14343: no packages for Image SLES15-SP6-BYOS, but entry?
CVE-2020-14343: no packages for Image SLES15-SP4-CHOST-BYOS, but entry?
CVE-2020-14343: no packages for Image SLES15-SP6-EC2, but entry?
CVE-2020-14343: no packages for Image SLES15-SP6-Hardened-BYOS-Azure, but entry?
CVE-2020-14343: no packages for Image SLES15-SP6-SAP, but entry?
CVE-2020-14343: no packages for Image SLES15-SP5-EC2, but entry?
CVE-2020-14343: no packages for Image SLES15-SP4-EC2, but entry?
CVE-2020-14343: no packages for Image SLES15-SP4-BYOS, but entry?
CVE-2020-14343: no packages for Image SLES15-SP6-Hardened-BYOS, but entry?
CVE-2020-14343: no packages for Image SLES15-SP4-Manager-Server-4-3-EC2-ltd, but entry?
CVE-2020-14343: no packages for Image SLES15-SP3-Manager-4-2-Proxy-BYOS-Azure, but entry?
CVE-2020-14343: no packages for Image SLES15-EC2-HVM-BYOS, but entry?
CVE-2020-14343: no packages for Image SLES15-SP3-BYOS-Azure, but entry?
CVE-2020-14343: no packages for SUSE Linux Enterprise Module for Package Hub 15 SP6, but entry?
CVE-2020-14343: no packages for Image SLES15-SP5-Manager-Server-5-0-BYOS-Azure, but entry?
CVE-2020-14343: no packages for Image SLES15-SP4-SAP-BYOS, but entry?
CVE-2020-14343: no packages for Image SLES15-SP3-HPC-Azure, but entry?
CVE-2020-14343: no packages for Image SLES15-SP6-HPC-BYOS-Azure, but entry?
CVE-2020-14343: no packages for Image SLES15-SP4-Hardened-BYOS-Azure, but entry?
CVE-2020-14343: no packages for Image SLES15-SP5-Manager-Proxy-5-0-BYOS, but entry?
CVE-2020-14343: no packages for SUSE Linux Enterprise Module for Development Tools 15 SP4, but entry?
CVE-2020-14343: no packages for Image SLES15-SP4-SAPCAL, but entry?
CVE-2020-14343: no packages for SUSE Linux Enterprise Module for Development Tools 15 SP2, but entry?
CVE-2020-14343: no packages for Image SLES15-SP6-SAPCAL-EC2, but entry?
CVE-2020-14343: no packages for Image SLES15-SP5-HPC-BYOS-EC2, but entry?
CVE-2020-14343: no packages for SUSE Linux Enterprise Module for Public Cloud 15 SP5, but entry?
CVE-2020-14343: no packages for Image SLES15-SP6-HPC, but entry?
CVE-2020-14343: no packages for Image SLES15-SP5-CHOST-BYOS-EC2, but entry?
CVE-2020-14343: no packages for Image SLES15-SP6-CHOST-BYOS-SAP-CCloud, but entry?
CVE-2020-14343: no packages for SUSE Linux Enterprise Module for Development Tools 15 SP5, but entry?
CVE-2020-14343: no packages for Image SLES15-SP5-SAP-EC2, but entry?
notsure where Public Cloud Module for SUSE Linux Enterprise 11 is contained?
no cpe found for HPE Helion OpenStack Cloud 8 in CVE-2020-14343
CVE-2020-14343: no packages for Container caasp/v4/389-ds:1.4.2, but entry?
CVE-2020-14343: no packages for Container ses/7.1/cephcsi/cephcsi:3.5.1.0.3.2.10, but entry?
CVE-2020-14343: no packages for Container ses/7.1/rook/ceph:1.8.6.0.3.2.5, but entry?
CVE-2020-14343: no packages for Image SLES15-Azure-BYOS, but entry?
CVE-2020-14343: no packages for Image SLES15-EC2-CHOST-HVM-BYOS, but entry?
CVE-2020-14343: no packages for Image SLES15-EC2-HVM-BYOS, but entry?
CVE-2020-14343: no packages for Image SLES15-SAP-Azure, but entry?
CVE-2020-14343: no packages for Image SLES15-SAP-Azure-BYOS, but entry?
CVE-2020-14343: no packages for Image SLES15-SAP-EC2-HVM, but entry?
CVE-2020-14343: no packages for Image SLES15-SAP-EC2-HVM-BYOS, but entry?
CVE-2020-14343: no packages for Image SLES15-SP1-CHOST-BYOS-GCE, but entry?
CVE-2020-14343: no packages for Image SLES15-SP1-SAPCAL-GCE, but entry?
CVE-2020-14343: no packages for Image SLES15-SP2-GCE, but entry?
CVE-2020-14343: no packages for Image SLES15-SP3-BYOS-Azure, but entry?
CVE-2020-14343: no packages for Image SLES15-SP3-BYOS-EC2-HVM, but entry?
CVE-2020-14343: no packages for Image SLES15-SP3-CHOST-BYOS-Aliyun, but entry?
CVE-2020-14343: no packages for Image SLES15-SP3-CHOST-BYOS-Azure, but entry?
CVE-2020-14343: no packages for Image SLES15-SP3-CHOST-BYOS-EC2, but entry?
CVE-2020-14343: no packages for Image SLES15-SP3-CHOST-BYOS-SAP-CCloud, but entry?
CVE-2020-14343: no packages for Image SLES15-SP3-EC2-ECS-HVM, but entry?
CVE-2020-14343: no packages for Image SLES15-SP3-EC2-HVM, but entry?
CVE-2020-14343: no packages for Image SLES15-SP3-HPC-Azure, but entry?
CVE-2020-14343: no packages for Image SLES15-SP3-HPC-BYOS-Azure, but entry?
CVE-2020-14343: no packages for Image SLES15-SP3-HPC-BYOS-EC2-HVM, but entry?
CVE-2020-14343: no packages for Image SLES15-SP3-Manager-4-2-Proxy-BYOS-Azure, but entry?
CVE-2020-14343: no packages for Image SLES15-SP3-Manager-4-2-Proxy-BYOS-EC2-HVM, but entry?
CVE-2020-14343: no packages for Image SLES15-SP3-Manager-4-2-Server-BYOS-Azure, but entry?
CVE-2020-14343: no packages for Image SLES15-SP3-Manager-4-2-Server-BYOS-EC2-HVM, but entry?
CVE-2020-14343: no packages for Image SLES15-SP3-SAP-Azure, but entry?
CVE-2020-14343: no packages for Image SLES15-SP3-SAP-BYOS-Azure, but entry?
CVE-2020-14343: no packages for Image SLES15-SP3-SAP-BYOS-EC2-HVM, but entry?
CVE-2020-14343: no packages for Image SLES15-SP3-SAP-EC2-HVM, but entry?
CVE-2020-14343: no packages for Image SLES15-SP3-SAPCAL-Azure, but entry?
CVE-2020-14343: no packages for Image SLES15-SP3-SAPCAL-EC2-HVM, but entry?
CVE-2020-14343: no packages for Image SLES15-SP4-Azure-Basic, but entry?
CVE-2020-14343: no packages for Image SLES15-SP4-Azure-Standard, but entry?
CVE-2020-14343: no packages for Image SLES15-SP4-BYOS, but entry?
CVE-2020-14343: no packages for Image SLES15-SP4-BYOS-Azure, but entry?
CVE-2020-14343: no packages for Image SLES15-SP4-BYOS-EC2, but entry?
CVE-2020-14343: no packages for Image SLES15-SP4-CHOST-BYOS, but entry?
CVE-2020-14343: no packages for Image SLES15-SP4-CHOST-BYOS-Aliyun, but entry?
CVE-2020-14343: no packages for Image SLES15-SP4-CHOST-BYOS-Azure, but entry?
CVE-2020-14343: no packages for Image SLES15-SP4-CHOST-BYOS-EC2, but entry?
CVE-2020-14343: no packages for Image SLES15-SP4-CHOST-BYOS-SAP-CCloud, but entry?
CVE-2020-14343: no packages for Image SLES15-SP4-EC2, but entry?
CVE-2020-14343: no packages for Image SLES15-SP4-EC2-ECS-HVM, but entry?
CVE-2020-14343: no packages for Image SLES15-SP4-HPC, but entry?
CVE-2020-14343: no packages for Image SLES15-SP4-HPC-Azure, but entry?
CVE-2020-14343: no packages for Image SLES15-SP4-HPC-BYOS, but entry?
CVE-2020-14343: no packages for Image SLES15-SP4-HPC-BYOS-Azure, but entry?
CVE-2020-14343: no packages for Image SLES15-SP4-HPC-BYOS-EC2, but entry?
CVE-2020-14343: no packages for Image SLES15-SP4-HPC-EC2, but entry?
CVE-2020-14343: no packages for Image SLES15-SP4-Hardened-BYOS, but entry?
CVE-2020-14343: no packages for Image SLES15-SP4-Hardened-BYOS-Azure, but entry?
CVE-2020-14343: no packages for Image SLES15-SP4-Hardened-BYOS-EC2, but entry?
CVE-2020-14343: no packages for Image SLES15-SP4-Manager-Proxy-4-3-BYOS, but entry?
CVE-2020-14343: no packages for Image SLES15-SP4-Manager-Proxy-4-3-BYOS-Azure, but entry?
CVE-2020-14343: no packages for Image SLES15-SP4-Manager-Proxy-4-3-BYOS-EC2, but entry?
CVE-2020-14343: no packages for Image SLES15-SP4-Manager-Server-4-3, but entry?
CVE-2020-14343: no packages for Image SLES15-SP4-Manager-Server-4-3-Azure-llc, but entry?
CVE-2020-14343: no packages for Image SLES15-SP4-Manager-Server-4-3-Azure-ltd, but entry?
CVE-2020-14343: no packages for Image SLES15-SP4-Manager-Server-4-3-BYOS, but entry?
CVE-2020-14343: no packages for Image SLES15-SP4-Manager-Server-4-3-BYOS-Azure, but entry?
CVE-2020-14343: no packages for Image SLES15-SP4-Manager-Server-4-3-BYOS-EC2, but entry?
CVE-2020-14343: no packages for Image SLES15-SP4-Manager-Server-4-3-EC2-llc, but entry?
CVE-2020-14343: no packages for Image SLES15-SP4-Manager-Server-4-3-EC2-ltd, but entry?
CVE-2020-14343: no packages for Image SLES15-SP4-SAP, but entry?
CVE-2020-14343: no packages for Image SLES15-SP4-SAP-Azure, but entry?
CVE-2020-14343: no packages for Image SLES15-SP4-SAP-BYOS, but entry?
CVE-2020-14343: no packages for Image SLES15-SP4-SAP-BYOS-Azure, but entry?
CVE-2020-14343: no packages for Image SLES15-SP4-SAP-BYOS-EC2, but entry?
CVE-2020-14343: no packages for Image SLES15-SP4-SAP-EC2, but entry?
CVE-2020-14343: no packages for Image SLES15-SP4-SAP-Hardened, but entry?
CVE-2020-14343: no packages for Image SLES15-SP4-SAP-Hardened-Azure, but entry?
CVE-2020-14343: no packages for Image SLES15-SP4-SAP-Hardened-BYOS, but entry?
CVE-2020-14343: no packages for Image SLES15-SP4-SAP-Hardened-BYOS-Azure, but entry?
CVE-2020-14343: no packages for Image SLES15-SP4-SAP-Hardened-BYOS-EC2, but entry?
CVE-2020-14343: no packages for Image SLES15-SP4-SAP-Hardened-EC2, but entry?
CVE-2020-14343: no packages for Image SLES15-SP4-SAPCAL, but entry?
CVE-2020-14343: no packages for Image SLES15-SP4-SAPCAL-Azure, but entry?
CVE-2020-14343: no packages for Image SLES15-SP4-SAPCAL-EC2, but entry?
CVE-2020-14343: no packages for Image SLES15-SP4-SUSE-Rancher-Setup-BYOS, but entry?
CVE-2020-14343: no packages for Image SLES15-SP4-SUSE-Rancher-Setup-BYOS-EC2, but entry?
CVE-2020-14343: no packages for Image SLES15-SP4-SUSE-Rancher-Setup-BYOS-EC2-HVM, but entry?
CVE-2020-14343: no packages for Image SLES15-SP5-Azure-Basic, but entry?
CVE-2020-14343: no packages for Image SLES15-SP5-Azure-Standard, but entry?
CVE-2020-14343: no packages for Image SLES15-SP5-BYOS-Azure, but entry?
CVE-2020-14343: no packages for Image SLES15-SP5-BYOS-EC2, but entry?
CVE-2020-14343: no packages for Image SLES15-SP5-CHOST-BYOS-Aliyun, but entry?
CVE-2020-14343: no packages for Image SLES15-SP5-CHOST-BYOS-Azure, but entry?
CVE-2020-14343: no packages for Image SLES15-SP5-CHOST-BYOS-EC2, but entry?
CVE-2020-14343: no packages for Image SLES15-SP5-CHOST-BYOS-GDC, but entry?
CVE-2020-14343: no packages for Image SLES15-SP5-CHOST-BYOS-SAP-CCloud, but entry?
CVE-2020-14343: no packages for Image SLES15-SP5-EC2, but entry?
CVE-2020-14343: no packages for Image SLES15-SP5-EC2-ECS-HVM, but entry?
CVE-2020-14343: no packages for Image SLES15-SP5-HPC-Azure, but entry?
CVE-2020-14343: no packages for Image SLES15-SP5-HPC-BYOS-Azure, but entry?
CVE-2020-14343: no packages for Image SLES15-SP5-HPC-BYOS-EC2, but entry?
CVE-2020-14343: no packages for Image SLES15-SP5-HPC-EC2, but entry?
CVE-2020-14343: no packages for Image SLES15-SP5-Hardened-BYOS-Azure, but entry?
CVE-2020-14343: no packages for Image SLES15-SP5-Hardened-BYOS-EC2, but entry?
CVE-2020-14343: no packages for Image SLES15-SP5-Manager-Proxy-5-0-BYOS, but entry?
CVE-2020-14343: no packages for Image SLES15-SP5-Manager-Proxy-5-0-BYOS-Azure, but entry?
CVE-2020-14343: no packages for Image SLES15-SP5-Manager-Proxy-5-0-BYOS-EC2, but entry?
CVE-2020-14343: no packages for Image SLES15-SP5-Manager-Server-5-0-BYOS, but entry?
CVE-2020-14343: no packages for Image SLES15-SP5-Manager-Server-5-0-BYOS-Azure, but entry?
CVE-2020-14343: no packages for Image SLES15-SP5-Manager-Server-5-0-BYOS-EC2, but entry?
CVE-2020-14343: no packages for Image SLES15-SP5-SAP-Azure, but entry?
CVE-2020-14343: no packages for Image SLES15-SP5-SAP-BYOS-Azure, but entry?
CVE-2020-14343: no packages for Image SLES15-SP5-SAP-BYOS-EC2, but entry?
CVE-2020-14343: no packages for Image SLES15-SP5-SAP-EC2, but entry?
CVE-2020-14343: no packages for Image SLES15-SP5-SAP-Hardened-Azure, but entry?
CVE-2020-14343: no packages for Image SLES15-SP5-SAP-Hardened-BYOS-Azure, but entry?
CVE-2020-14343: no packages for Image SLES15-SP5-SAP-Hardened-BYOS-EC2, but entry?
CVE-2020-14343: no packages for Image SLES15-SP5-SAP-Hardened-EC2, but entry?
CVE-2020-14343: no packages for Image SLES15-SP5-SAPCAL-Azure, but entry?
CVE-2020-14343: no packages for Image SLES15-SP5-SAPCAL-EC2, but entry?
CVE-2020-14343: no packages for Image SLES15-SP6, but entry?
CVE-2020-14343: no packages for Image SLES15-SP6-Azure-Basic, but entry?
CVE-2020-14343: no packages for Image SLES15-SP6-Azure-Standard, but entry?
CVE-2020-14343: no packages for Image SLES15-SP6-BYOS, but entry?
CVE-2020-14343: no packages for Image SLES15-SP6-BYOS-Azure, but entry?
CVE-2020-14343: no packages for Image SLES15-SP6-BYOS-EC2, but entry?
CVE-2020-14343: no packages for Image SLES15-SP6-CHOST-BYOS, but entry?
CVE-2020-14343: no packages for Image SLES15-SP6-CHOST-BYOS-Aliyun, but entry?
CVE-2020-14343: no packages for Image SLES15-SP6-CHOST-BYOS-Azure, but entry?
CVE-2020-14343: no packages for Image SLES15-SP6-CHOST-BYOS-EC2, but entry?
CVE-2020-14343: no packages for Image SLES15-SP6-CHOST-BYOS-GDC, but entry?
CVE-2020-14343: no packages for Image SLES15-SP6-CHOST-BYOS-SAP-CCloud, but entry?
CVE-2020-14343: no packages for Image SLES15-SP6-EC2, but entry?
CVE-2020-14343: no packages for Image SLES15-SP6-EC2-ECS-HVM, but entry?
CVE-2020-14343: no packages for Image SLES15-SP6-HPC, but entry?
CVE-2020-14343: no packages for Image SLES15-SP6-HPC-Azure, but entry?
CVE-2020-14343: no packages for Image SLES15-SP6-HPC-BYOS, but entry?
CVE-2020-14343: no packages for Image SLES15-SP6-HPC-BYOS-Azure, but entry?
CVE-2020-14343: no packages for Image SLES15-SP6-HPC-BYOS-EC2, but entry?
CVE-2020-14343: no packages for Image SLES15-SP6-HPC-EC2, but entry?
CVE-2020-14343: no packages for Image SLES15-SP6-Hardened-BYOS, but entry?
CVE-2020-14343: no packages for Image SLES15-SP6-Hardened-BYOS-Azure, but entry?
CVE-2020-14343: no packages for Image SLES15-SP6-Hardened-BYOS-EC2, but entry?
CVE-2020-14343: no packages for Image SLES15-SP6-SAP, but entry?
CVE-2020-14343: no packages for Image SLES15-SP6-SAP-Azure, but entry?
CVE-2020-14343: no packages for Image SLES15-SP6-SAP-BYOS, but entry?
CVE-2020-14343: no packages for Image SLES15-SP6-SAP-BYOS-Azure, but entry?
CVE-2020-14343: no packages for Image SLES15-SP6-SAP-BYOS-EC2, but entry?
CVE-2020-14343: no packages for Image SLES15-SP6-SAP-EC2, but entry?
CVE-2020-14343: no packages for Image SLES15-SP6-SAP-Hardened, but entry?
CVE-2020-14343: no packages for Image SLES15-SP6-SAP-Hardened-Azure, but entry?
CVE-2020-14343: no packages for Image SLES15-SP6-SAP-Hardened-BYOS, but entry?
CVE-2020-14343: no packages for Image SLES15-SP6-SAP-Hardened-BYOS-Azure, but entry?
CVE-2020-14343: no packages for Image SLES15-SP6-SAP-Hardened-BYOS-EC2, but entry?
CVE-2020-14343: no packages for Image SLES15-SP6-SAP-Hardened-EC2, but entry?
CVE-2020-14343: no packages for Image SLES15-SP6-SAPCAL, but entry?
CVE-2020-14343: no packages for Image SLES15-SP6-SAPCAL-Azure, but entry?
CVE-2020-14343: no packages for Image SLES15-SP6-SAPCAL-EC2, but entry?
CVE-2020-14343: no packages for SUSE Linux Enterprise Module for Basesystem 15 SP6, but entry?
CVE-2020-14343: no packages for SUSE Linux Enterprise Module for Development Tools 15 SP2, but entry?
CVE-2020-14343: no packages for SUSE Linux Enterprise Module for Development Tools 15 SP3, but entry?
CVE-2020-14343: no packages for SUSE Linux Enterprise Module for Development Tools 15 SP4, but entry?
CVE-2020-14343: no packages for SUSE Linux Enterprise Module for Development Tools 15 SP5, but entry?
CVE-2020-14343: no packages for SUSE Linux Enterprise Module for Development Tools 15 SP6, but entry?
CVE-2020-14343: no packages for SUSE Linux Enterprise Module for Package Hub 15 SP2, but entry?
CVE-2020-14343: no packages for SUSE Linux Enterprise Module for Package Hub 15 SP3, but entry?
CVE-2020-14343: no packages for SUSE Linux Enterprise Module for Package Hub 15 SP4, but entry?
CVE-2020-14343: no packages for SUSE Linux Enterprise Module for Package Hub 15 SP5, but entry?
CVE-2020-14343: no packages for SUSE Linux Enterprise Module for Package Hub 15 SP6, but entry?
CVE-2020-14343: no packages for SUSE Linux Enterprise Module for Public Cloud 15 SP1, but entry?
CVE-2020-14343: no packages for SUSE Linux Enterprise Module for Public Cloud 15 SP2, but entry?
CVE-2020-14343: no packages for SUSE Linux Enterprise Module for Public Cloud 15 SP3, but entry?
CVE-2020-14343: no packages for SUSE Linux Enterprise Module for Public Cloud 15 SP4, but entry?
CVE-2020-14343: no packages for SUSE Linux Enterprise Module for Public Cloud 15 SP5, but entry?
CVE-2020-14343: no packages for SUSE Linux Enterprise Module for Public Cloud 15 SP6, but entry?
CVE-2020-14343: no packages for SUSE Package Hub 15 SP2, but entry?
CVE-2020-14343: no packages for Container caasp/v4/389-ds:1.4.2, but entry?
CVE-2020-14343: no packages for Container ses/7.1/cephcsi/cephcsi:3.5.1.0.3.2.10, but entry?
CVE-2020-14343: no packages for Container ses/7.1/rook/ceph:1.8.6.0.3.2.5, but entry?
CVE-2020-14343: no packages for Image SLES15-Azure-BYOS, but entry?
CVE-2020-14343: no packages for Image SLES15-EC2-CHOST-HVM-BYOS, but entry?
CVE-2020-14343: no packages for Image SLES15-EC2-HVM-BYOS, but entry?
CVE-2020-14343: no packages for Image SLES15-SAP-Azure, but entry?
CVE-2020-14343: no packages for Image SLES15-SAP-Azure-BYOS, but entry?
CVE-2020-14343: no packages for Image SLES15-SAP-EC2-HVM, but entry?
CVE-2020-14343: no packages for Image SLES15-SAP-EC2-HVM-BYOS, but entry?
CVE-2020-14343: no packages for Image SLES15-SP1-CHOST-BYOS-GCE, but entry?
CVE-2020-14343: no packages for Image SLES15-SP1-SAPCAL-GCE, but entry?
CVE-2020-14343: no packages for Image SLES15-SP2-GCE, but entry?
CVE-2020-14343: no packages for Image SLES15-SP3-BYOS-Azure, but entry?
CVE-2020-14343: no packages for Image SLES15-SP3-BYOS-EC2-HVM, but entry?
CVE-2020-14343: no packages for Image SLES15-SP3-CHOST-BYOS-Aliyun, but entry?
CVE-2020-14343: no packages for Image SLES15-SP3-CHOST-BYOS-Azure, but entry?
CVE-2020-14343: no packages for Image SLES15-SP3-CHOST-BYOS-EC2, but entry?
CVE-2020-14343: no packages for Image SLES15-SP3-CHOST-BYOS-SAP-CCloud, but entry?
CVE-2020-14343: no packages for Image SLES15-SP3-EC2-ECS-HVM, but entry?
CVE-2020-14343: no packages for Image SLES15-SP3-EC2-HVM, but entry?
CVE-2020-14343: no packages for Image SLES15-SP3-HPC-Azure, but entry?
CVE-2020-14343: no packages for Image SLES15-SP3-HPC-BYOS-Azure, but entry?
CVE-2020-14343: no packages for Image SLES15-SP3-HPC-BYOS-EC2-HVM, but entry?
CVE-2020-14343: no packages for Image SLES15-SP3-Manager-4-2-Proxy-BYOS-Azure, but entry?
CVE-2020-14343: no packages for Image SLES15-SP3-Manager-4-2-Proxy-BYOS-EC2-HVM, but entry?
CVE-2020-14343: no packages for Image SLES15-SP3-Manager-4-2-Server-BYOS-Azure, but entry?
CVE-2020-14343: no packages for Image SLES15-SP3-Manager-4-2-Server-BYOS-EC2-HVM, but entry?
CVE-2020-14343: no packages for Image SLES15-SP3-SAP-Azure, but entry?
CVE-2020-14343: no packages for Image SLES15-SP3-SAP-BYOS-Azure, but entry?
CVE-2020-14343: no packages for Image SLES15-SP3-SAP-BYOS-EC2-HVM, but entry?
CVE-2020-14343: no packages for Image SLES15-SP3-SAP-EC2-HVM, but entry?
CVE-2020-14343: no packages for Image SLES15-SP3-SAPCAL-Azure, but entry?
CVE-2020-14343: no packages for Image SLES15-SP3-SAPCAL-EC2-HVM, but entry?
CVE-2020-14343: no packages for Image SLES15-SP4-Azure-Basic, but entry?
CVE-2020-14343: no packages for Image SLES15-SP4-Azure-Standard, but entry?
CVE-2020-14343: no packages for Image SLES15-SP4-BYOS, but entry?
CVE-2020-14343: no packages for Image SLES15-SP4-BYOS-Azure, but entry?
CVE-2020-14343: no packages for Image SLES15-SP4-BYOS-EC2, but entry?
CVE-2020-14343: no packages for Image SLES15-SP4-CHOST-BYOS, but entry?
CVE-2020-14343: no packages for Image SLES15-SP4-CHOST-BYOS-Aliyun, but entry?
CVE-2020-14343: no packages for Image SLES15-SP4-CHOST-BYOS-Azure, but entry?
CVE-2020-14343: no packages for Image SLES15-SP4-CHOST-BYOS-EC2, but entry?
CVE-2020-14343: no packages for Image SLES15-SP4-CHOST-BYOS-SAP-CCloud, but entry?
CVE-2020-14343: no packages for Image SLES15-SP4-EC2, but entry?
CVE-2020-14343: no packages for Image SLES15-SP4-EC2-ECS-HVM, but entry?
CVE-2020-14343: no packages for Image SLES15-SP4-HPC, but entry?
CVE-2020-14343: no packages for Image SLES15-SP4-HPC-Azure, but entry?
CVE-2020-14343: no packages for Image SLES15-SP4-HPC-BYOS, but entry?
CVE-2020-14343: no packages for Image SLES15-SP4-HPC-BYOS-Azure, but entry?
CVE-2020-14343: no packages for Image SLES15-SP4-HPC-BYOS-EC2, but entry?
CVE-2020-14343: no packages for Image SLES15-SP4-HPC-EC2, but entry?
CVE-2020-14343: no packages for Image SLES15-SP4-Hardened-BYOS, but entry?
CVE-2020-14343: no packages for Image SLES15-SP4-Hardened-BYOS-Azure, but entry?
CVE-2020-14343: no packages for Image SLES15-SP4-Hardened-BYOS-EC2, but entry?
CVE-2020-14343: no packages for Image SLES15-SP4-Manager-Proxy-4-3-BYOS, but entry?
CVE-2020-14343: no packages for Image SLES15-SP4-Manager-Proxy-4-3-BYOS-Azure, but entry?
CVE-2020-14343: no packages for Image SLES15-SP4-Manager-Proxy-4-3-BYOS-EC2, but entry?
CVE-2020-14343: no packages for Image SLES15-SP4-Manager-Server-4-3, but entry?
CVE-2020-14343: no packages for Image SLES15-SP4-Manager-Server-4-3-Azure-llc, but entry?
CVE-2020-14343: no packages for Image SLES15-SP4-Manager-Server-4-3-Azure-ltd, but entry?
CVE-2020-14343: no packages for Image SLES15-SP4-Manager-Server-4-3-BYOS, but entry?
CVE-2020-14343: no packages for Image SLES15-SP4-Manager-Server-4-3-BYOS-Azure, but entry?
CVE-2020-14343: no packages for Image SLES15-SP4-Manager-Server-4-3-BYOS-EC2, but entry?
CVE-2020-14343: no packages for Image SLES15-SP4-Manager-Server-4-3-EC2-llc, but entry?
CVE-2020-14343: no packages for Image SLES15-SP4-Manager-Server-4-3-EC2-ltd, but entry?
CVE-2020-14343: no packages for Image SLES15-SP4-SAP, but entry?
CVE-2020-14343: no packages for Image SLES15-SP4-SAP-Azure, but entry?
CVE-2020-14343: no packages for Image SLES15-SP4-SAP-BYOS, but entry?
CVE-2020-14343: no packages for Image SLES15-SP4-SAP-BYOS-Azure, but entry?
CVE-2020-14343: no packages for Image SLES15-SP4-SAP-BYOS-EC2, but entry?
CVE-2020-14343: no packages for Image SLES15-SP4-SAP-EC2, but entry?
CVE-2020-14343: no packages for Image SLES15-SP4-SAP-Hardened, but entry?
CVE-2020-14343: no packages for Image SLES15-SP4-SAP-Hardened-Azure, but entry?
CVE-2020-14343: no packages for Image SLES15-SP4-SAP-Hardened-BYOS, but entry?
CVE-2020-14343: no packages for Image SLES15-SP4-SAP-Hardened-BYOS-Azure, but entry?
CVE-2020-14343: no packages for Image SLES15-SP4-SAP-Hardened-BYOS-EC2, but entry?
CVE-2020-14343: no packages for Image SLES15-SP4-SAP-Hardened-EC2, but entry?
CVE-2020-14343: no packages for Image SLES15-SP4-SAPCAL, but entry?
CVE-2020-14343: no packages for Image SLES15-SP4-SAPCAL-Azure, but entry?
CVE-2020-14343: no packages for Image SLES15-SP4-SAPCAL-EC2, but entry?
CVE-2020-14343: no packages for Image SLES15-SP4-SUSE-Rancher-Setup-BYOS, but entry?
CVE-2020-14343: no packages for Image SLES15-SP4-SUSE-Rancher-Setup-BYOS-EC2, but entry?
CVE-2020-14343: no packages for Image SLES15-SP4-SUSE-Rancher-Setup-BYOS-EC2-HVM, but entry?
CVE-2020-14343: no packages for Image SLES15-SP5-Azure-Basic, but entry?
CVE-2020-14343: no packages for Image SLES15-SP5-Azure-Standard, but entry?
CVE-2020-14343: no packages for Image SLES15-SP5-BYOS-Azure, but entry?
CVE-2020-14343: no packages for Image SLES15-SP5-BYOS-EC2, but entry?
CVE-2020-14343: no packages for Image SLES15-SP5-CHOST-BYOS-Aliyun, but entry?
CVE-2020-14343: no packages for Image SLES15-SP5-CHOST-BYOS-Azure, but entry?
CVE-2020-14343: no packages for Image SLES15-SP5-CHOST-BYOS-EC2, but entry?
CVE-2020-14343: no packages for Image SLES15-SP5-CHOST-BYOS-GDC, but entry?
CVE-2020-14343: no packages for Image SLES15-SP5-CHOST-BYOS-SAP-CCloud, but entry?
CVE-2020-14343: no packages for Image SLES15-SP5-EC2, but entry?
CVE-2020-14343: no packages for Image SLES15-SP5-EC2-ECS-HVM, but entry?
CVE-2020-14343: no packages for Image SLES15-SP5-HPC-Azure, but entry?
CVE-2020-14343: no packages for Image SLES15-SP5-HPC-BYOS-Azure, but entry?
CVE-2020-14343: no packages for Image SLES15-SP5-HPC-BYOS-EC2, but entry?
CVE-2020-14343: no packages for Image SLES15-SP5-HPC-EC2, but entry?
CVE-2020-14343: no packages for Image SLES15-SP5-Hardened-BYOS-Azure, but entry?
CVE-2020-14343: no packages for Image SLES15-SP5-Hardened-BYOS-EC2, but entry?
CVE-2020-14343: no packages for Image SLES15-SP5-Manager-Proxy-5-0-BYOS, but entry?
CVE-2020-14343: no packages for Image SLES15-SP5-Manager-Proxy-5-0-BYOS-Azure, but entry?
CVE-2020-14343: no packages for Image SLES15-SP5-Manager-Proxy-5-0-BYOS-EC2, but entry?
CVE-2020-14343: no packages for Image SLES15-SP5-Manager-Server-5-0-BYOS, but entry?
CVE-2020-14343: no packages for Image SLES15-SP5-Manager-Server-5-0-BYOS-Azure, but entry?
CVE-2020-14343: no packages for Image SLES15-SP5-Manager-Server-5-0-BYOS-EC2, but entry?
CVE-2020-14343: no packages for Image SLES15-SP5-SAP-Azure, but entry?
CVE-2020-14343: no packages for Image SLES15-SP5-SAP-BYOS-Azure, but entry?
CVE-2020-14343: no packages for Image SLES15-SP5-SAP-BYOS-EC2, but entry?
CVE-2020-14343: no packages for Image SLES15-SP5-SAP-EC2, but entry?
CVE-2020-14343: no packages for Image SLES15-SP5-SAP-Hardened-Azure, but entry?
CVE-2020-14343: no packages for Image SLES15-SP5-SAP-Hardened-BYOS-Azure, but entry?
CVE-2020-14343: no packages for Image SLES15-SP5-SAP-Hardened-BYOS-EC2, but entry?
CVE-2020-14343: no packages for Image SLES15-SP5-SAP-Hardened-EC2, but entry?
CVE-2020-14343: no packages for Image SLES15-SP5-SAPCAL-Azure, but entry?
CVE-2020-14343: no packages for Image SLES15-SP5-SAPCAL-EC2, but entry?
CVE-2020-14343: no packages for Image SLES15-SP6, but entry?
CVE-2020-14343: no packages for Image SLES15-SP6-Azure-Basic, but entry?
CVE-2020-14343: no packages for Image SLES15-SP6-Azure-Standard, but entry?
CVE-2020-14343: no packages for Image SLES15-SP6-BYOS, but entry?
CVE-2020-14343: no packages for Image SLES15-SP6-BYOS-Azure, but entry?
CVE-2020-14343: no packages for Image SLES15-SP6-BYOS-EC2, but entry?
CVE-2020-14343: no packages for Image SLES15-SP6-CHOST-BYOS, but entry?
CVE-2020-14343: no packages for Image SLES15-SP6-CHOST-BYOS-Aliyun, but entry?
CVE-2020-14343: no packages for Image SLES15-SP6-CHOST-BYOS-Azure, but entry?
CVE-2020-14343: no packages for Image SLES15-SP6-CHOST-BYOS-EC2, but entry?
CVE-2020-14343: no packages for Image SLES15-SP6-CHOST-BYOS-GDC, but entry?
CVE-2020-14343: no packages for Image SLES15-SP6-CHOST-BYOS-SAP-CCloud, but entry?
CVE-2020-14343: no packages for Image SLES15-SP6-EC2, but entry?
CVE-2020-14343: no packages for Image SLES15-SP6-EC2-ECS-HVM, but entry?
CVE-2020-14343: no packages for Image SLES15-SP6-HPC, but entry?
CVE-2020-14343: no packages for Image SLES15-SP6-HPC-Azure, but entry?
CVE-2020-14343: no packages for Image SLES15-SP6-HPC-BYOS, but entry?
CVE-2020-14343: no packages for Image SLES15-SP6-HPC-BYOS-Azure, but entry?
CVE-2020-14343: no packages for Image SLES15-SP6-HPC-BYOS-EC2, but entry?
CVE-2020-14343: no packages for Image SLES15-SP6-HPC-EC2, but entry?
CVE-2020-14343: no packages for Image SLES15-SP6-Hardened-BYOS, but entry?
CVE-2020-14343: no packages for Image SLES15-SP6-Hardened-BYOS-Azure, but entry?
CVE-2020-14343: no packages for Image SLES15-SP6-Hardened-BYOS-EC2, but entry?
CVE-2020-14343: no packages for Image SLES15-SP6-SAP, but entry?
CVE-2020-14343: no packages for Image SLES15-SP6-SAP-Azure, but entry?
CVE-2020-14343: no packages for Image SLES15-SP6-SAP-BYOS, but entry?
CVE-2020-14343: no packages for Image SLES15-SP6-SAP-BYOS-Azure, but entry?
CVE-2020-14343: no packages for Image SLES15-SP6-SAP-BYOS-EC2, but entry?
CVE-2020-14343: no packages for Image SLES15-SP6-SAP-EC2, but entry?
CVE-2020-14343: no packages for Image SLES15-SP6-SAP-Hardened, but entry?
CVE-2020-14343: no packages for Image SLES15-SP6-SAP-Hardened-Azure, but entry?
CVE-2020-14343: no packages for Image SLES15-SP6-SAP-Hardened-BYOS, but entry?
CVE-2020-14343: no packages for Image SLES15-SP6-SAP-Hardened-BYOS-Azure, but entry?
CVE-2020-14343: no packages for Image SLES15-SP6-SAP-Hardened-BYOS-EC2, but entry?
CVE-2020-14343: no packages for Image SLES15-SP6-SAP-Hardened-EC2, but entry?
CVE-2020-14343: no packages for Image SLES15-SP6-SAPCAL, but entry?
CVE-2020-14343: no packages for Image SLES15-SP6-SAPCAL-Azure, but entry?
CVE-2020-14343: no packages for Image SLES15-SP6-SAPCAL-EC2, but entry?
CVE-2020-14343: no packages for SUSE Linux Enterprise Module for Basesystem 15 SP6, but entry?
CVE-2020-14343: no packages for SUSE Linux Enterprise Module for Development Tools 15 SP2, but entry?
CVE-2020-14343: no packages for SUSE Linux Enterprise Module for Development Tools 15 SP3, but entry?
CVE-2020-14343: no packages for SUSE Linux Enterprise Module for Development Tools 15 SP4, but entry?
CVE-2020-14343: no packages for SUSE Linux Enterprise Module for Development Tools 15 SP5, but entry?
CVE-2020-14343: no packages for SUSE Linux Enterprise Module for Development Tools 15 SP6, but entry?
CVE-2020-14343: no packages for SUSE Linux Enterprise Module for Open Buildservice Development Tools 15 SP3, but entry?
CVE-2020-14343: no packages for SUSE Linux Enterprise Module for Open Buildservice Development Tools 15 SP4, but entry?
CVE-2020-14343: no packages for SUSE Linux Enterprise Module for Open Buildservice Development Tools 15 SP5, but entry?
CVE-2020-14343: no packages for SUSE Linux Enterprise Module for Open Buildservice Development Tools 15 SP6, but entry?
CVE-2020-14343: no packages for SUSE Linux Enterprise Module for Package Hub 15 SP2, but entry?
CVE-2020-14343: no packages for SUSE Linux Enterprise Module for Package Hub 15 SP3, but entry?
CVE-2020-14343: no packages for SUSE Linux Enterprise Module for Package Hub 15 SP4, but entry?
CVE-2020-14343: no packages for SUSE Linux Enterprise Module for Package Hub 15 SP5, but entry?
CVE-2020-14343: no packages for SUSE Linux Enterprise Module for Package Hub 15 SP6, but entry?
CVE-2020-14343: no packages for SUSE Linux Enterprise Module for Public Cloud 15 SP1, but entry?
CVE-2020-14343: no packages for SUSE Linux Enterprise Module for Public Cloud 15 SP2, but entry?
CVE-2020-14343: no packages for SUSE Linux Enterprise Module for Public Cloud 15 SP3, but entry?
CVE-2020-14343: no packages for SUSE Linux Enterprise Module for Public Cloud 15 SP4, but entry?
CVE-2020-14343: no packages for SUSE Linux Enterprise Module for Public Cloud 15 SP5, but entry?
CVE-2020-14343: no packages for SUSE Linux Enterprise Module for Public Cloud 15 SP6, but entry?
CVE-2020-14343: no packages for SUSE Package Hub 15 SP2, but entry?
no cpe found for SUSE Manager Tools for SLE Micro 5 in CVE-2020-14332
no cpe found for SUSE Package Hub 15 SP3 in CVE-2020-14332
no cpe found for HPE Helion OpenStack Cloud 8 in CVE-2020-14330
no cpe found for SUSE Manager Tools for SLE Micro 5 in CVE-2020-14330
no cpe found for SUSE Package Hub 15 SP3 in CVE-2020-14330
no cpe found for HPE Helion OpenStack Cloud 8 in CVE-2020-14312
skipping CVE-2020-14305 as CVE page is older than CVRF-CVE file.
skipping CVE-2020-14301 as CVE page is older than CVRF-CVE file.
no cpe found for SUSE Package Hub 15 SP1 in CVE-2020-14295
no cpe found for SUSE Package Hub 15 SP1 in CVE-2020-14196
no cpe found for SUSE Package Hub 15 SP2 in CVE-2020-14196
no cpe found for SUSE Package Hub 15 SP1 in CVE-2020-14154
no cpe found for SUSE Package Hub 15 SP2 in CVE-2020-14154
skipping CVE-2020-14152 as CVE page is older than CVRF-CVE file.
skipping CVE-2020-14150 as CVE page is older than CVRF-CVE file.
no cpe found for SUSE Package Hub 15 SP1 in CVE-2020-14147
no cpe found for SUSE Package Hub 15 SP1 in CVE-2020-14093
no cpe found for SUSE Package Hub 15 SP2 in CVE-2020-14093
no cpe found for HPE Helion OpenStack Cloud 8 in CVE-2020-14019
no cpe found for SUSE Liberty Linux 7 LTSS in CVE-2020-14019
no cpe found for SUSE Linux Enterprise Module for HPC 12 SP2 in CVE-2020-14004
no cpe found for SUSE Linux Enterprise Module for HPC 12 SP2 in CVE-2020-14004
no cpe found for SUSE Linux Enterprise Module for HPC 12 SP2 in CVE-2020-14004
no cpe found for SUSE Linux Enterprise Module for HPC 12 SP2 in CVE-2020-14004
no cpe found for SUSE Linux Enterprise Module for HPC 12 SP2 in CVE-2020-14004
no cpe found for SUSE Linux Enterprise Module for HPC 12 SP2 in CVE-2020-14004
no cpe found for SUSE Linux Enterprise Module for HPC 12 SP2 in CVE-2020-14004
no cpe found for SUSE Linux Enterprise Module for HPC 12 SP2 in CVE-2020-14004
no cpe found for SUSE Linux Enterprise Module for HPC 12 SP2 in CVE-2020-14004
no cpe found for SUSE Linux Enterprise Module for HPC 12 SP2 in CVE-2020-14004
no cpe found for SUSE Linux Enterprise Module for HPC 12 SP2 in CVE-2020-14004
no cpe found for SUSE Linux Enterprise Module for HPC 12 SP2 in CVE-2020-14004
no cpe found for SUSE Package Hub 15 SP1 in CVE-2020-14004
no cpe found for SUSE Package Hub 15 SP2 in CVE-2020-14004
skipping CVE-2020-14001 as CVE page is older than CVRF-CVE file.
CVE-2020-13988: no packages for SUSE Linux Enterprise Module for Legacy 15 SP3, but entry?
CVE-2020-13988: no packages for SUSE Linux Enterprise Module for Legacy 15 SP2, but entry?
CVE-2020-13988: no packages for SUSE Linux Enterprise Module for Legacy 15 SP2, but entry?
CVE-2020-13988: no packages for SUSE Linux Enterprise Module for Legacy 15 SP3, but entry?
CVE-2020-13988: no packages for SUSE Linux Enterprise Module for Legacy 15 SP2, but entry?
CVE-2020-13988: no packages for SUSE Linux Enterprise Module for Legacy 15 SP3, but entry?
CVE-2020-13987: no packages for SUSE Linux Enterprise Module for Legacy 15 SP2, but entry?
CVE-2020-13987: no packages for SUSE Linux Enterprise Module for Legacy 15 SP3, but entry?
CVE-2020-13987: no packages for SUSE Linux Enterprise Module for Legacy 15 SP2, but entry?
CVE-2020-13987: no packages for SUSE Linux Enterprise Module for Legacy 15 SP3, but entry?
CVE-2020-13987: no packages for SUSE Linux Enterprise Module for Legacy 15 SP2, but entry?
CVE-2020-13987: no packages for SUSE Linux Enterprise Module for Legacy 15 SP3, but entry?
No V5 entry found for CVE-2020-13982 / /home/securitybot/prod/cve-database/cvelistV5/cves/2020/13xxxx/CVE-2020-13982.json:No such file or directory
No V5 entry found for CVE-2020-13981 / /home/securitybot/prod/cve-database/cvelistV5/cves/2020/13xxxx/CVE-2020-13981.json:No such file or directory
no cpe found for SUSE Package Hub 15 SP1 in CVE-2020-13977
no cpe found for SUSE Package Hub 15 SP2 in CVE-2020-13977
CVE-2020-13956: no packages for Image SLES15-SP3-Manager-4-2-Server-BYOS-Azure, but entry?
CVE-2020-13956: no packages for Image SLES15-SP4-SAPCAL-Azure, but entry?
CVE-2020-13956: no packages for Image SLES15-SP5-SAPCAL-EC2, but entry?
CVE-2020-13956: no packages for Image SLES15-SP4-SAPCAL-EC2, but entry?
CVE-2020-13956: no packages for SUSE Linux Enterprise Module for Web and Scripting 15 SP4, but entry?
CVE-2020-13956: no packages for Container bci/openjdk-devel:17-14.11, but entry?
CVE-2020-13956: no packages for Container bci/openjdk:11-7.1, but entry?
CVE-2020-13956: no packages for SUSE Linux Enterprise Server for SAP Applications 15 SP1, but entry?
CVE-2020-13956: no packages for Image SLES15-SP4-SAP-EC2, but entry?
CVE-2020-13956: no packages for SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS, but entry?
CVE-2020-13956: no packages for Image SLES15-SP6-SAP-EC2, but entry?
CVE-2020-13956: no packages for SUSE Linux Enterprise Server for SAP Applications 15 SP3, but entry?
CVE-2020-13956: no packages for SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS, but entry?
CVE-2020-13956: no packages for Image SLES15-SP3-SAP-Azure-LI-BYOS-Production, but entry?
CVE-2020-13956: no packages for Image SLES15-SP2-SAP-EC2-HVM, but entry?
CVE-2020-13956: no packages for SUSE Linux Enterprise Server 15 SP1-LTSS, but entry?
CVE-2020-13956: no packages for Image SLES15-SP4-Manager-Server-4-3-BYOS-GCE, but entry?
CVE-2020-13956: no packages for Image SLES15-SP3-Manager-4-2-Server-BYOS-EC2-HVM, but entry?
CVE-2020-13956: no packages for Image SLES15-SP4-Manager-Server-4-3-BYOS-EC2, but entry?
CVE-2020-13956: no packages for Image SLES15-SP5-SAPCAL-GCE, but entry?
CVE-2020-13956: no packages for Image SLES15-SP6-SAP-Azure, but entry?
CVE-2020-13956: no packages for Image SLES15-SP5-SAP-Azure-VLI-BYOS-Production, but entry?
CVE-2020-13956: no packages for Image SLES15-SP5-SAP-Azure, but entry?
CVE-2020-13956: no packages for Image SLES15-SP6-SAP-Azure-VLI-BYOS, but entry?
CVE-2020-13956: no packages for Image SLES15-SP6-SAPCAL-Azure, but entry?
CVE-2020-13956: no packages for Image SLES15-SP3-SAPCAL-Azure, but entry?
CVE-2020-13956: no packages for Image SLES15-SP5-SAP-Azure-VLI-BYOS, but entry?
CVE-2020-13956: no packages for Image SLES15-SP6-SAPCAL, but entry?
CVE-2020-13956: no packages for SUSE Linux Enterprise Module for Basesystem 15 SP6, but entry?
CVE-2020-13956: no packages for Image SLES15-SP5-SAP-Azure-LI-BYOS-Production, but entry?
CVE-2020-13956: no packages for Image SLES15-SP2-SAP-BYOS-GCE, but entry?
CVE-2020-13956: no packages for Image SLES15-SP4-Manager-Server-4-3-Azure-llc, but entry?
CVE-2020-13956: no packages for Image SLES15-SP3-Manager-4-2-Server-BYOS-GCE, but entry?
CVE-2020-13956: no packages for SUSE Linux Enterprise Real Time 15 SP3, but entry?
CVE-2020-13956: no packages for openSUSE Leap 15.4, but entry?
CVE-2020-13956: no packages for SUSE Linux Enterprise Module for Web and Scripting 15 SP5, but entry?
CVE-2020-13956: no packages for Image SLES15-SP4-Manager-Server-4-3-Azure-ltd, but entry?
CVE-2020-13956: no packages for Image SLES15-SP4-SAP-Azure, but entry?
CVE-2020-13956: no packages for SUSE Linux Enterprise Module for Package Hub 15 SP5, but entry?
CVE-2020-13956: no packages for SUSE Linux Enterprise Workstation Extension 15 SP4, but entry?
CVE-2020-13956: no packages for Image SLES15-SP4-Manager-Server-4-3, but entry?
CVE-2020-13956: no packages for SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS, but entry?
CVE-2020-13956: no packages for SUSE Manager Proxy 4.2, but entry?
CVE-2020-13956: no packages for Image SLES15-SP4-Manager-Server-4-3-BYOS, but entry?
CVE-2020-13956: no packages for Image SLES15-SP2-SAP-Azure-LI-BYOS-Production, but entry?
CVE-2020-13956: no packages for Image SLES15-SP4-SAP-Azure-LI-BYOS-Production, but entry?
CVE-2020-13956: no packages for SUSE Linux Enterprise Module for Basesystem 15 SP5, but entry?
CVE-2020-13956: no packages for Image SLES15-SP2-SAP-Azure, but entry?
CVE-2020-13956: no packages for Image SLES15-SP2-SAP-GCE, but entry?
CVE-2020-13956: no packages for Container bci/kiwi:9.24.43-8.6, but entry?
CVE-2020-13956: no packages for Image SLES15-SP4-SAP-GCE, but entry?
CVE-2020-13956: no packages for Image SLES15-SP6-SAP-Azure-LI-BYOS, but entry?
CVE-2020-13956: no packages for Image SLES15-SP4-SAP-Azure-VLI-BYOS, but entry?
CVE-2020-13956: no packages for SUSE Linux Enterprise Server 15 SP4-TERADATA, but entry?
CVE-2020-13956: no packages for SUSE Enterprise Storage 7, but entry?
CVE-2020-13956: no packages for SUSE Linux Enterprise Workstation Extension 15 SP6, but entry?
CVE-2020-13956: no packages for SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS, but entry?
CVE-2020-13956: no packages for Image SLES15-SP6-SAP-Azure-VLI-BYOS-Production, but entry?
CVE-2020-13956: no packages for SUSE Manager Server Module 4.3, but entry?
CVE-2020-13956: no packages for Image SLES15-SP5-SAPCAL-Azure, but entry?
CVE-2020-13956: no packages for SUSE Linux Enterprise Server for SAP Applications 15 SP2, but entry?
CVE-2020-13956: no packages for Container bci/openjdk-devel:17-7.2, but entry?
CVE-2020-13956: no packages for SUSE Linux Enterprise Workstation Extension 15 SP5, but entry?
CVE-2020-13956: no packages for Image SLES15-SP5-SAP-GCE, but entry?
CVE-2020-13956: no packages for Container bci/openjdk-devel:11-6.2, but entry?
CVE-2020-13956: no packages for Image SLES15-SP6-SAPCAL-GCE, but entry?
CVE-2020-13956: no packages for Image SLES15-SP4-Manager-Server-4-3-BYOS-Azure, but entry?
CVE-2020-13956: no packages for Image SLES15-SP6-SAP-GCE, but entry?
CVE-2020-13956: no packages for SUSE Manager Server Module 4.2, but entry?
CVE-2020-13956: no packages for Image SLES15-SP5-SAP-Azure-LI-BYOS, but entry?
CVE-2020-13956: no packages for Image SLES15-SP4-SAP-Azure-VLI-BYOS-Production, but entry?
CVE-2020-13956: no packages for SUSE CaaS Platform 4.0, but entry?
CVE-2020-13956: no packages for Container suse/manager/5.0/x86_64/server-attestation:5.0.0-beta2.2.16, but entry?
CVE-2020-13956: no packages for Image SLES15-SP2-SAP-BYOS-EC2-HVM, but entry?
CVE-2020-13956: no packages for Image SLES15-SP2-SAP-Azure-VLI-BYOS-Production, but entry?
CVE-2020-13956: no packages for Image SLES15-SP3-SAP-Azure-VLI-BYOS-Production, but entry?
CVE-2020-13956: no packages for Image SLES15-SP4-Manager-Server-4-3-EC2-ltd, but entry?
CVE-2020-13956: no packages for Container bci/openjdk:17-7.1, but entry?
CVE-2020-13956: no packages for SUSE Linux Enterprise Server 15 SP3-LTSS, but entry?
CVE-2020-13956: no packages for SUSE Linux Enterprise Module for Package Hub 15 SP6, but entry?
CVE-2020-13956: no packages for SUSE Linux Enterprise Module for Basesystem 15 SP4, but entry?
CVE-2020-13956: no packages for Image SLES15-SP6-SAPCAL-EC2, but entry?
CVE-2020-13956: no packages for Image SLES15-SP4-SAPCAL, but entry?
CVE-2020-13956: no packages for SUSE Linux Enterprise Module for Web and Scripting 15 SP6, but entry?
CVE-2020-13956: no packages for SUSE Linux Enterprise Module for Development Tools 15 SP4, but entry?
CVE-2020-13956: no packages for Container bci/openjdk:latest, but entry?
CVE-2020-13956: no packages for Image SLES15-SP5-SAP-EC2, but entry?
CVE-2020-13956: no packages for Image SLES15-SP2-SAP-BYOS-Azure, but entry?
CVE-2020-13956: no packages for SUSE Linux Enterprise Module for Package Hub 15 SP4, but entry?
CVE-2020-13956: no packages for Image SLES15-SP6-SAP-Azure-LI-BYOS-Production, but entry?
CVE-2020-13956: no packages for SUSE Linux Enterprise Server 15 SP2-LTSS, but entry?
CVE-2020-13956: no packages for Image SLES15-SP4-SAP, but entry?
CVE-2020-13956: no packages for SUSE Manager Retail Branch Server 4.2, but entry?
CVE-2020-13956: no packages for Image SLES15-SP4-Manager-Server-4-3-EC2-llc, but entry?
CVE-2020-13956: no packages for Container suse/manager/5.0/x86_64/server:5.0.0-beta1.2.122, but entry?
CVE-2020-13956: no packages for SUSE Linux Enterprise Module for Development Tools 15 SP6, but entry?
CVE-2020-13956: no packages for Image SLES15-SP4-SAP-Azure-LI-BYOS, but entry?
CVE-2020-13956: no packages for SUSE Enterprise Storage 7.1, but entry?
CVE-2020-13956: no packages for Image SLES15-SP3-SAPCAL-EC2-HVM, but entry?
CVE-2020-13956: no packages for SUSE Manager Server 4.2, but entry?
CVE-2020-13956: no packages for Image SLES15-SP3-SAPCAL-GCE, but entry?
CVE-2020-13956: no packages for Image SLES15-SP6-SAP, but entry?
CVE-2020-13956: no packages for Image SLES15-SP4-SAPCAL-GCE, but entry?
CVE-2020-13956: no packages for SUSE Liberty Linux 8, but entry?
CVE-2020-13956: no packages for Container bci/kiwi:9.24.43-8.6, but entry?
CVE-2020-13956: no packages for Container bci/openjdk-devel:11-6.2, but entry?
CVE-2020-13956: no packages for Container bci/openjdk-devel:17-14.11, but entry?
CVE-2020-13956: no packages for Container bci/openjdk-devel:17-7.2, but entry?
CVE-2020-13956: no packages for Container bci/openjdk:11-7.1, but entry?
CVE-2020-13956: no packages for Container bci/openjdk:17-7.1, but entry?
CVE-2020-13956: no packages for Container bci/openjdk:latest, but entry?
CVE-2020-13956: no packages for Container suse/manager/5.0/x86_64/server-attestation:5.0.0-beta2.2.16, but entry?
CVE-2020-13956: no packages for Container suse/manager/5.0/x86_64/server:5.0.0-beta1.2.122, but entry?
CVE-2020-13956: no packages for Image SLES15-SP2-SAP-Azure, but entry?
CVE-2020-13956: no packages for Image SLES15-SP2-SAP-Azure-LI-BYOS-Production, but entry?
CVE-2020-13956: no packages for Image SLES15-SP2-SAP-Azure-VLI-BYOS-Production, but entry?
CVE-2020-13956: no packages for Image SLES15-SP2-SAP-BYOS-Azure, but entry?
CVE-2020-13956: no packages for Image SLES15-SP2-SAP-BYOS-EC2-HVM, but entry?
CVE-2020-13956: no packages for Image SLES15-SP2-SAP-BYOS-GCE, but entry?
CVE-2020-13956: no packages for Image SLES15-SP2-SAP-EC2-HVM, but entry?
CVE-2020-13956: no packages for Image SLES15-SP2-SAP-GCE, but entry?
CVE-2020-13956: no packages for Image SLES15-SP3-Manager-4-2-Server-BYOS-Azure, but entry?
CVE-2020-13956: no packages for Image SLES15-SP3-Manager-4-2-Server-BYOS-EC2-HVM, but entry?
CVE-2020-13956: no packages for Image SLES15-SP3-Manager-4-2-Server-BYOS-GCE, but entry?
CVE-2020-13956: no packages for Image SLES15-SP3-SAP-Azure-LI-BYOS-Production, but entry?
CVE-2020-13956: no packages for Image SLES15-SP3-SAP-Azure-VLI-BYOS-Production, but entry?
CVE-2020-13956: no packages for Image SLES15-SP3-SAPCAL-Azure, but entry?
CVE-2020-13956: no packages for Image SLES15-SP3-SAPCAL-EC2-HVM, but entry?
CVE-2020-13956: no packages for Image SLES15-SP3-SAPCAL-GCE, but entry?
CVE-2020-13956: no packages for Image SLES15-SP4-Manager-Server-4-3, but entry?
CVE-2020-13956: no packages for Image SLES15-SP4-Manager-Server-4-3-Azure-llc, but entry?
CVE-2020-13956: no packages for Image SLES15-SP4-Manager-Server-4-3-Azure-ltd, but entry?
CVE-2020-13956: no packages for Image SLES15-SP4-Manager-Server-4-3-BYOS, but entry?
CVE-2020-13956: no packages for Image SLES15-SP4-Manager-Server-4-3-BYOS-Azure, but entry?
CVE-2020-13956: no packages for Image SLES15-SP4-Manager-Server-4-3-BYOS-EC2, but entry?
CVE-2020-13956: no packages for Image SLES15-SP4-Manager-Server-4-3-BYOS-GCE, but entry?
CVE-2020-13956: no packages for Image SLES15-SP4-Manager-Server-4-3-EC2-llc, but entry?
CVE-2020-13956: no packages for Image SLES15-SP4-Manager-Server-4-3-EC2-ltd, but entry?
CVE-2020-13956: no packages for Image SLES15-SP4-SAP, but entry?
CVE-2020-13956: no packages for Image SLES15-SP4-SAP-Azure, but entry?
CVE-2020-13956: no packages for Image SLES15-SP4-SAP-Azure-LI-BYOS, but entry?
CVE-2020-13956: no packages for Image SLES15-SP4-SAP-Azure-LI-BYOS-Production, but entry?
CVE-2020-13956: no packages for Image SLES15-SP4-SAP-Azure-VLI-BYOS, but entry?
CVE-2020-13956: no packages for Image SLES15-SP4-SAP-Azure-VLI-BYOS-Production, but entry?
CVE-2020-13956: no packages for Image SLES15-SP4-SAP-EC2, but entry?
CVE-2020-13956: no packages for Image SLES15-SP4-SAP-GCE, but entry?
CVE-2020-13956: no packages for Image SLES15-SP4-SAPCAL, but entry?
CVE-2020-13956: no packages for Image SLES15-SP4-SAPCAL-Azure, but entry?
CVE-2020-13956: no packages for Image SLES15-SP4-SAPCAL-EC2, but entry?
CVE-2020-13956: no packages for Image SLES15-SP4-SAPCAL-GCE, but entry?
CVE-2020-13956: no packages for Image SLES15-SP5-SAP-Azure, but entry?
CVE-2020-13956: no packages for Image SLES15-SP5-SAP-Azure-LI-BYOS, but entry?
CVE-2020-13956: no packages for Image SLES15-SP5-SAP-Azure-LI-BYOS-Production, but entry?
CVE-2020-13956: no packages for Image SLES15-SP5-SAP-Azure-VLI-BYOS, but entry?
CVE-2020-13956: no packages for Image SLES15-SP5-SAP-Azure-VLI-BYOS-Production, but entry?
CVE-2020-13956: no packages for Image SLES15-SP5-SAP-EC2, but entry?
CVE-2020-13956: no packages for Image SLES15-SP5-SAP-GCE, but entry?
CVE-2020-13956: no packages for Image SLES15-SP5-SAPCAL-Azure, but entry?
CVE-2020-13956: no packages for Image SLES15-SP5-SAPCAL-EC2, but entry?
CVE-2020-13956: no packages for Image SLES15-SP5-SAPCAL-GCE, but entry?
CVE-2020-13956: no packages for Image SLES15-SP6-SAP, but entry?
CVE-2020-13956: no packages for Image SLES15-SP6-SAP-Azure, but entry?
CVE-2020-13956: no packages for Image SLES15-SP6-SAP-Azure-LI-BYOS, but entry?
CVE-2020-13956: no packages for Image SLES15-SP6-SAP-Azure-LI-BYOS-Production, but entry?
CVE-2020-13956: no packages for Image SLES15-SP6-SAP-Azure-VLI-BYOS, but entry?
CVE-2020-13956: no packages for Image SLES15-SP6-SAP-Azure-VLI-BYOS-Production, but entry?
CVE-2020-13956: no packages for Image SLES15-SP6-SAP-EC2, but entry?
CVE-2020-13956: no packages for Image SLES15-SP6-SAP-GCE, but entry?
CVE-2020-13956: no packages for Image SLES15-SP6-SAPCAL, but entry?
CVE-2020-13956: no packages for Image SLES15-SP6-SAPCAL-Azure, but entry?
CVE-2020-13956: no packages for Image SLES15-SP6-SAPCAL-EC2, but entry?
CVE-2020-13956: no packages for Image SLES15-SP6-SAPCAL-GCE, but entry?
CVE-2020-13956: no packages for SUSE CaaS Platform 4.0, but entry?
CVE-2020-13956: no packages for SUSE Enterprise Storage 7, but entry?
CVE-2020-13956: no packages for SUSE Enterprise Storage 7.1, but entry?
CVE-2020-13956: no packages for SUSE Liberty Linux 8, but entry?
CVE-2020-13956: no packages for SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS, but entry?
CVE-2020-13956: no packages for SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS, but entry?
CVE-2020-13956: no packages for SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS, but entry?
CVE-2020-13956: no packages for SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS, but entry?
CVE-2020-13956: no packages for SUSE Linux Enterprise Module for Basesystem 15 SP4, but entry?
CVE-2020-13956: no packages for SUSE Linux Enterprise Module for Basesystem 15 SP5, but entry?
CVE-2020-13956: no packages for SUSE Linux Enterprise Module for Basesystem 15 SP6, but entry?
CVE-2020-13956: no packages for SUSE Linux Enterprise Module for Development Tools 15 SP4, but entry?
CVE-2020-13956: no packages for SUSE Linux Enterprise Module for Development Tools 15 SP6, but entry?
CVE-2020-13956: no packages for SUSE Linux Enterprise Module for Package Hub 15 SP4, but entry?
CVE-2020-13956: no packages for SUSE Linux Enterprise Module for Package Hub 15 SP5, but entry?
CVE-2020-13956: no packages for SUSE Linux Enterprise Module for Package Hub 15 SP6, but entry?
CVE-2020-13956: no packages for SUSE Linux Enterprise Module for Web and Scripting 15 SP4, but entry?
CVE-2020-13956: no packages for SUSE Linux Enterprise Module for Web and Scripting 15 SP5, but entry?
CVE-2020-13956: no packages for SUSE Linux Enterprise Module for Web and Scripting 15 SP6, but entry?
CVE-2020-13956: no packages for SUSE Linux Enterprise Real Time 15 SP3, but entry?
CVE-2020-13956: no packages for SUSE Linux Enterprise Server 15 SP1-LTSS, but entry?
CVE-2020-13956: no packages for SUSE Linux Enterprise Server 15 SP2-LTSS, but entry?
CVE-2020-13956: no packages for SUSE Linux Enterprise Server 15 SP3-LTSS, but entry?
CVE-2020-13956: no packages for SUSE Linux Enterprise Server 15 SP4-TERADATA, but entry?
CVE-2020-13956: no packages for SUSE Linux Enterprise Server for SAP Applications 15 SP1, but entry?
CVE-2020-13956: no packages for SUSE Linux Enterprise Server for SAP Applications 15 SP2, but entry?
CVE-2020-13956: no packages for SUSE Linux Enterprise Server for SAP Applications 15 SP3, but entry?
CVE-2020-13956: no packages for SUSE Linux Enterprise Workstation Extension 15 SP4, but entry?
CVE-2020-13956: no packages for SUSE Linux Enterprise Workstation Extension 15 SP5, but entry?
CVE-2020-13956: no packages for SUSE Linux Enterprise Workstation Extension 15 SP6, but entry?
CVE-2020-13956: no packages for SUSE Manager Proxy 4.2, but entry?
CVE-2020-13956: no packages for SUSE Manager Retail Branch Server 4.2, but entry?
CVE-2020-13956: no packages for SUSE Manager Server 4.2, but entry?
CVE-2020-13956: no packages for SUSE Manager Server Module 4.2, but entry?
CVE-2020-13956: no packages for SUSE Manager Server Module 4.3, but entry?
CVE-2020-13956: no packages for openSUSE Leap 15.4, but entry?
CVE-2020-13956: no packages for Container bci/kiwi:9.24.43-8.6, but entry?
CVE-2020-13956: no packages for Container bci/openjdk-devel:11-6.2, but entry?
CVE-2020-13956: no packages for Container bci/openjdk-devel:17-14.11, but entry?
CVE-2020-13956: no packages for Container bci/openjdk-devel:17-7.2, but entry?
CVE-2020-13956: no packages for Container bci/openjdk:11-7.1, but entry?
CVE-2020-13956: no packages for Container bci/openjdk:17-7.1, but entry?
CVE-2020-13956: no packages for Container bci/openjdk:latest, but entry?
CVE-2020-13956: no packages for Container suse/manager/5.0/x86_64/server-attestation:5.0.0-beta2.2.16, but entry?
CVE-2020-13956: no packages for Container suse/manager/5.0/x86_64/server:5.0.0-beta1.2.122, but entry?
CVE-2020-13956: no packages for Image SLES15-SP2-SAP-Azure, but entry?
CVE-2020-13956: no packages for Image SLES15-SP2-SAP-Azure-LI-BYOS-Production, but entry?
CVE-2020-13956: no packages for Image SLES15-SP2-SAP-Azure-VLI-BYOS-Production, but entry?
CVE-2020-13956: no packages for Image SLES15-SP2-SAP-BYOS-Azure, but entry?
CVE-2020-13956: no packages for Image SLES15-SP2-SAP-BYOS-EC2-HVM, but entry?
CVE-2020-13956: no packages for Image SLES15-SP2-SAP-BYOS-GCE, but entry?
CVE-2020-13956: no packages for Image SLES15-SP2-SAP-EC2-HVM, but entry?
CVE-2020-13956: no packages for Image SLES15-SP2-SAP-GCE, but entry?
CVE-2020-13956: no packages for Image SLES15-SP3-Manager-4-2-Server-BYOS-Azure, but entry?
CVE-2020-13956: no packages for Image SLES15-SP3-Manager-4-2-Server-BYOS-EC2-HVM, but entry?
CVE-2020-13956: no packages for Image SLES15-SP3-Manager-4-2-Server-BYOS-GCE, but entry?
CVE-2020-13956: no packages for Image SLES15-SP3-SAP-Azure-LI-BYOS-Production, but entry?
CVE-2020-13956: no packages for Image SLES15-SP3-SAP-Azure-VLI-BYOS-Production, but entry?
CVE-2020-13956: no packages for Image SLES15-SP3-SAPCAL-Azure, but entry?
CVE-2020-13956: no packages for Image SLES15-SP3-SAPCAL-EC2-HVM, but entry?
CVE-2020-13956: no packages for Image SLES15-SP3-SAPCAL-GCE, but entry?
CVE-2020-13956: no packages for Image SLES15-SP4-Manager-Server-4-3, but entry?
CVE-2020-13956: no packages for Image SLES15-SP4-Manager-Server-4-3-Azure-llc, but entry?
CVE-2020-13956: no packages for Image SLES15-SP4-Manager-Server-4-3-Azure-ltd, but entry?
CVE-2020-13956: no packages for Image SLES15-SP4-Manager-Server-4-3-BYOS, but entry?
CVE-2020-13956: no packages for Image SLES15-SP4-Manager-Server-4-3-BYOS-Azure, but entry?
CVE-2020-13956: no packages for Image SLES15-SP4-Manager-Server-4-3-BYOS-EC2, but entry?
CVE-2020-13956: no packages for Image SLES15-SP4-Manager-Server-4-3-BYOS-GCE, but entry?
CVE-2020-13956: no packages for Image SLES15-SP4-Manager-Server-4-3-EC2-llc, but entry?
CVE-2020-13956: no packages for Image SLES15-SP4-Manager-Server-4-3-EC2-ltd, but entry?
CVE-2020-13956: no packages for Image SLES15-SP4-SAP, but entry?
CVE-2020-13956: no packages for Image SLES15-SP4-SAP-Azure, but entry?
CVE-2020-13956: no packages for Image SLES15-SP4-SAP-Azure-LI-BYOS, but entry?
CVE-2020-13956: no packages for Image SLES15-SP4-SAP-Azure-LI-BYOS-Production, but entry?
CVE-2020-13956: no packages for Image SLES15-SP4-SAP-Azure-VLI-BYOS, but entry?
CVE-2020-13956: no packages for Image SLES15-SP4-SAP-Azure-VLI-BYOS-Production, but entry?
CVE-2020-13956: no packages for Image SLES15-SP4-SAP-EC2, but entry?
CVE-2020-13956: no packages for Image SLES15-SP4-SAP-GCE, but entry?
CVE-2020-13956: no packages for Image SLES15-SP4-SAPCAL, but entry?
CVE-2020-13956: no packages for Image SLES15-SP4-SAPCAL-Azure, but entry?
CVE-2020-13956: no packages for Image SLES15-SP4-SAPCAL-EC2, but entry?
CVE-2020-13956: no packages for Image SLES15-SP4-SAPCAL-GCE, but entry?
CVE-2020-13956: no packages for Image SLES15-SP5-SAP-Azure, but entry?
CVE-2020-13956: no packages for Image SLES15-SP5-SAP-Azure-LI-BYOS, but entry?
CVE-2020-13956: no packages for Image SLES15-SP5-SAP-Azure-LI-BYOS-Production, but entry?
CVE-2020-13956: no packages for Image SLES15-SP5-SAP-Azure-VLI-BYOS, but entry?
CVE-2020-13956: no packages for Image SLES15-SP5-SAP-Azure-VLI-BYOS-Production, but entry?
CVE-2020-13956: no packages for Image SLES15-SP5-SAP-EC2, but entry?
CVE-2020-13956: no packages for Image SLES15-SP5-SAP-GCE, but entry?
CVE-2020-13956: no packages for Image SLES15-SP5-SAPCAL-Azure, but entry?
CVE-2020-13956: no packages for Image SLES15-SP5-SAPCAL-EC2, but entry?
CVE-2020-13956: no packages for Image SLES15-SP5-SAPCAL-GCE, but entry?
CVE-2020-13956: no packages for Image SLES15-SP6-SAP, but entry?
CVE-2020-13956: no packages for Image SLES15-SP6-SAP-Azure, but entry?
CVE-2020-13956: no packages for Image SLES15-SP6-SAP-Azure-LI-BYOS, but entry?
CVE-2020-13956: no packages for Image SLES15-SP6-SAP-Azure-LI-BYOS-Production, but entry?
CVE-2020-13956: no packages for Image SLES15-SP6-SAP-Azure-VLI-BYOS, but entry?
CVE-2020-13956: no packages for Image SLES15-SP6-SAP-Azure-VLI-BYOS-Production, but entry?
CVE-2020-13956: no packages for Image SLES15-SP6-SAP-EC2, but entry?
CVE-2020-13956: no packages for Image SLES15-SP6-SAP-GCE, but entry?
CVE-2020-13956: no packages for Image SLES15-SP6-SAPCAL, but entry?
CVE-2020-13956: no packages for Image SLES15-SP6-SAPCAL-Azure, but entry?
CVE-2020-13956: no packages for Image SLES15-SP6-SAPCAL-EC2, but entry?
CVE-2020-13956: no packages for Image SLES15-SP6-SAPCAL-GCE, but entry?
CVE-2020-13956: no packages for SUSE CaaS Platform 4.0, but entry?
CVE-2020-13956: no packages for SUSE Enterprise Storage 7, but entry?
CVE-2020-13956: no packages for SUSE Enterprise Storage 7.1, but entry?
CVE-2020-13956: no packages for SUSE Liberty Linux 8, but entry?
CVE-2020-13956: no packages for SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS, but entry?
CVE-2020-13956: no packages for SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS, but entry?
CVE-2020-13956: no packages for SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS, but entry?
CVE-2020-13956: no packages for SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS, but entry?
CVE-2020-13956: no packages for SUSE Linux Enterprise Module for Basesystem 15 SP4, but entry?
CVE-2020-13956: no packages for SUSE Linux Enterprise Module for Basesystem 15 SP5, but entry?
CVE-2020-13956: no packages for SUSE Linux Enterprise Module for Basesystem 15 SP6, but entry?
CVE-2020-13956: no packages for SUSE Linux Enterprise Module for Development Tools 15 SP4, but entry?
CVE-2020-13956: no packages for SUSE Linux Enterprise Module for Development Tools 15 SP6, but entry?
CVE-2020-13956: no packages for SUSE Linux Enterprise Module for Open Buildservice Development Tools 15 SP5, but entry?
CVE-2020-13956: no packages for SUSE Linux Enterprise Module for Open Buildservice Development Tools 15 SP6, but entry?
CVE-2020-13956: no packages for SUSE Linux Enterprise Module for Package Hub 15 SP4, but entry?
CVE-2020-13956: no packages for SUSE Linux Enterprise Module for Package Hub 15 SP5, but entry?
CVE-2020-13956: no packages for SUSE Linux Enterprise Module for Package Hub 15 SP6, but entry?
CVE-2020-13956: no packages for SUSE Linux Enterprise Module for Web and Scripting 15 SP4, but entry?
CVE-2020-13956: no packages for SUSE Linux Enterprise Module for Web and Scripting 15 SP5, but entry?
CVE-2020-13956: no packages for SUSE Linux Enterprise Module for Web and Scripting 15 SP6, but entry?
CVE-2020-13956: no packages for SUSE Linux Enterprise Real Time 15 SP3, but entry?
CVE-2020-13956: no packages for SUSE Linux Enterprise Server 15 SP1-LTSS, but entry?
CVE-2020-13956: no packages for SUSE Linux Enterprise Server 15 SP2-LTSS, but entry?
CVE-2020-13956: no packages for SUSE Linux Enterprise Server 15 SP3-LTSS, but entry?
CVE-2020-13956: no packages for SUSE Linux Enterprise Server 15 SP4-TERADATA, but entry?
CVE-2020-13956: no packages for SUSE Linux Enterprise Server for SAP Applications 15 SP1, but entry?
CVE-2020-13956: no packages for SUSE Linux Enterprise Server for SAP Applications 15 SP2, but entry?
CVE-2020-13956: no packages for SUSE Linux Enterprise Server for SAP Applications 15 SP3, but entry?
CVE-2020-13956: no packages for SUSE Linux Enterprise Workstation Extension 15 SP4, but entry?
CVE-2020-13956: no packages for SUSE Linux Enterprise Workstation Extension 15 SP5, but entry?
CVE-2020-13956: no packages for SUSE Linux Enterprise Workstation Extension 15 SP6, but entry?
CVE-2020-13956: no packages for SUSE Manager Proxy 4.2, but entry?
CVE-2020-13956: no packages for SUSE Manager Retail Branch Server 4.2, but entry?
CVE-2020-13956: no packages for SUSE Manager Server 4.2, but entry?
CVE-2020-13956: no packages for SUSE Manager Server Module 4.2, but entry?
CVE-2020-13956: no packages for SUSE Manager Server Module 4.3, but entry?
CVE-2020-13956: no packages for openSUSE Leap 15.4, but entry?
skipping CVE-2020-13962 as CVE page is older than CVRF-CVE file.
skipping CVE-2020-13950 as CVE page is older than CVRF-CVE file.
skipping CVE-2020-13936 as CVE page is older than CVRF-CVE file.
skipping CVE-2020-13902 as CVE page is older than CVRF-CVE file.
no cpe found for SUSE Liberty Linux 7 LTSS in CVE-2020-13867
skipping CVE-2020-13871 as CVE page is older than CVRF-CVE file.
no cpe found for SUSE Package Hub 15 SP1 in CVE-2020-13848
no cpe found for SUSE Package Hub 15 SP2 in CVE-2020-13847
no cpe found for SUSE Package Hub 15 SP2 in CVE-2020-13846
no cpe found for SUSE Package Hub 15 SP2 in CVE-2020-13845
no cpe found for SUSE Liberty Linux 7 LTSS in CVE-2020-13817
skipping CVE-2020-13844 as CVE page is older than CVRF-CVE file.
skipping CVE-2020-13800 as CVE page is older than CVRF-CVE file.
skipping CVE-2020-13791 as CVE page is older than CVRF-CVE file.
skipping CVE-2020-13777 as CVE page is older than CVRF-CVE file.
no cpe found for HPE Helion OpenStack Cloud 8 in CVE-2020-13757
no cpe found for SUSE Package Hub 15 SP1 in CVE-2020-13696
CVE-2020-13692: no packages for Image SLES15-SP1-Manager-4-0-EC2-HVM-BYOS-Proxy, but entry?
CVE-2020-13692: no packages for Image SLES15-SP2-Manager-4-1-Proxy-BYOS-GCE, but entry?
CVE-2020-13692: no packages for Image SLES15-SP1-Manager-4-0-Azure-BYOS-Proxy, but entry?
CVE-2020-13692: no packages for Image SLES15-SP2-Manager-4-1-Proxy-BYOS-Azure, but entry?
CVE-2020-13692: no packages for Image SLES15-SP1-Manager-4-0-GCE-BYOS-Proxy, but entry?
CVE-2020-13692: no packages for Image SLES15-SP2-Manager-4-1-Proxy-BYOS-EC2-HVM, but entry?
no cpe found for SUSE Liberty Linux 7 LTSS in CVE-2020-13692
CVE-2020-13692: no packages for Image SLES15-SP1-Manager-4-0-Azure-BYOS-Proxy, but entry?
CVE-2020-13692: no packages for Image SLES15-SP1-Manager-4-0-EC2-HVM-BYOS-Proxy, but entry?
CVE-2020-13692: no packages for Image SLES15-SP1-Manager-4-0-GCE-BYOS-Proxy, but entry?
CVE-2020-13692: no packages for Image SLES15-SP2-Manager-4-1-Proxy-BYOS-Azure, but entry?
CVE-2020-13692: no packages for Image SLES15-SP2-Manager-4-1-Proxy-BYOS-EC2-HVM, but entry?
CVE-2020-13692: no packages for Image SLES15-SP2-Manager-4-1-Proxy-BYOS-GCE, but entry?
CVE-2020-13692: no packages for Image SLES15-SP1-Manager-4-0-Azure-BYOS-Proxy, but entry?
CVE-2020-13692: no packages for Image SLES15-SP1-Manager-4-0-EC2-HVM-BYOS-Proxy, but entry?
CVE-2020-13692: no packages for Image SLES15-SP1-Manager-4-0-GCE-BYOS-Proxy, but entry?
CVE-2020-13692: no packages for Image SLES15-SP2-Manager-4-1-Proxy-BYOS-Azure, but entry?
CVE-2020-13692: no packages for Image SLES15-SP2-Manager-4-1-Proxy-BYOS-EC2-HVM, but entry?
CVE-2020-13692: no packages for Image SLES15-SP2-Manager-4-1-Proxy-BYOS-GCE, but entry?
skipping CVE-2020-13645 as CVE page is older than CVRF-CVE file.
no cpe found for SUSE Package Hub 15 SP1 in CVE-2020-13625
no cpe found for SUSE Package Hub 15 SP1 in CVE-2020-13614
no cpe found for HPE Helion OpenStack Cloud 8 in CVE-2020-13596
no cpe found for SUSE Package Hub 15 SP2 in CVE-2020-13576
skipping CVE-2020-13529 as CVE page is older than CVRF-CVE file.
no cpe found for HPE Helion OpenStack Cloud 8 in CVE-2020-13430
no cpe found for SUSE Manager Tools 15 SP1 in CVE-2020-13430
no cpe found for SUSE Package Hub 15 SP1 in CVE-2020-13428
no cpe found for SUSE Package Hub 15 SP2 in CVE-2020-13428
no cpe found for SUSE Manager Tools 15 SP1 in CVE-2020-13379
no cpe found for SUSE Package Hub 15 SP1 in CVE-2020-13379
no cpe found for SUSE Package Hub 15 SP2 in CVE-2020-13379
no cpe found for HPE Helion OpenStack Cloud 8 in CVE-2020-13254
No V5 entry found for CVE-2020-13233 / /home/securitybot/prod/cve-database/cvelistV5/cves/2020/13xxxx/CVE-2020-13233.json:No such file or directory
skipping CVE-2020-13249 as CVE page is older than CVRF-CVE file.
skipping CVE-2020-13164 as CVE page is older than CVRF-CVE file.
skipping CVE-2020-13143 as CVE page is older than CVRF-CVE file.
skipping CVE-2020-12965 as CVE page is older than CVRF-CVE file.
skipping CVE-2020-12912 as CVE page is older than CVRF-CVE file.
skipping CVE-2020-12888 as CVE page is older than CVRF-CVE file.
CVE-2020-12823: no packages for SUSE Linux Enterprise Server 15 SP4-TERADATA, but entry?
CVE-2020-12823: no packages for SUSE Linux Enterprise Module for Basesystem 15 SP5, but entry?
CVE-2020-12823: no packages for SUSE Linux Enterprise Module for Basesystem 15 SP6, but entry?
CVE-2020-12823: no packages for SUSE Linux Enterprise Module for Basesystem 15 SP5, but entry?
CVE-2020-12823: no packages for SUSE Linux Enterprise Module for Basesystem 15 SP6, but entry?
CVE-2020-12823: no packages for SUSE Linux Enterprise Server 15 SP4-TERADATA, but entry?
CVE-2020-12823: no packages for SUSE Linux Enterprise Module for Basesystem 15 SP5, but entry?
CVE-2020-12823: no packages for SUSE Linux Enterprise Module for Basesystem 15 SP6, but entry?
CVE-2020-12823: no packages for SUSE Linux Enterprise Server 15 SP4-TERADATA, but entry?
skipping CVE-2020-12826 as CVE page is older than CVRF-CVE file.
skipping CVE-2020-12825 as CVE page is older than CVRF-CVE file.
no cpe found for SUSE Package Hub 15 SP1 in CVE-2020-12783
no cpe found for SUSE Package Hub 15 SP2 in CVE-2020-12783
skipping CVE-2020-12771 as CVE page is older than CVRF-CVE file.
skipping CVE-2020-12769 as CVE page is older than CVRF-CVE file.
skipping CVE-2020-12768 as CVE page is older than CVRF-CVE file.
notsure where SUSE Linux Enterprise Software Bootstrap Kit 12 is contained?
skipping CVE-2020-12762 as CVE page is older than CVRF-CVE file.
no cpe found for SUSE Liberty Linux 7 LTSS in CVE-2020-12723
no cpe found for SUSE Package Hub 15 SP1 in CVE-2020-12695
no cpe found for SUSE Package Hub 15 SP2 in CVE-2020-12695
no cpe found for HPE Helion OpenStack Cloud 8 in CVE-2020-12692
no cpe found for HPE Helion OpenStack Cloud 8 in CVE-2020-12691
no cpe found for HPE Helion OpenStack Cloud 8 in CVE-2020-12690
no cpe found for HPE Helion OpenStack Cloud 8 in CVE-2020-12689
no cpe found for SUSE Package Hub 15 SP1 in CVE-2020-12672
skipping CVE-2020-12659 as CVE page is older than CVRF-CVE file.
no cpe found for SUSE Package Hub 15 SP1 in CVE-2020-12641
no cpe found for SUSE Package Hub 15 SP2 in CVE-2020-12641
no cpe found for SUSE Package Hub 15 SP3 in CVE-2020-12641
no cpe found for SUSE Package Hub 15 SP4 in CVE-2020-12641
skipping CVE-2020-12657 as CVE page is older than CVRF-CVE file.
skipping CVE-2020-12656 as CVE page is older than CVRF-CVE file.
skipping CVE-2020-12655 as CVE page is older than CVRF-CVE file.
skipping CVE-2020-12654 as CVE page is older than CVRF-CVE file.
skipping CVE-2020-12653 as CVE page is older than CVRF-CVE file.
skipping CVE-2020-12652 as CVE page is older than CVRF-CVE file.
no cpe found for SUSE Package Hub 15 SP1 in CVE-2020-12640
no cpe found for SUSE Package Hub 15 SP2 in CVE-2020-12640
no cpe found for SUSE Package Hub 15 SP1 in CVE-2020-12625
no cpe found for SUSE Package Hub 15 SP2 in CVE-2020-12625
no cpe found for SUSE Package Hub 15 SP3 in CVE-2020-12605
no cpe found for SUSE Package Hub 15 SP3 in CVE-2020-12604
no cpe found for SUSE Package Hub 15 SP3 in CVE-2020-12603
no cpe found for HPE Helion OpenStack Cloud 8 in CVE-2020-12459
no cpe found for SUSE Manager Tools 15 SP1 in CVE-2020-12459
skipping CVE-2020-12465 as CVE page is older than CVRF-CVE file.
skipping CVE-2020-12464 as CVE page is older than CVRF-CVE file.
no cpe found for HPE Helion OpenStack Cloud 8 in CVE-2020-12458
no cpe found for SUSE Manager Tools 15 SP1 in CVE-2020-12458
skipping CVE-2020-12413 as CVE page is older than CVRF-CVE file.
skipping CVE-2020-12399 as CVE page is older than CVRF-CVE file.
skipping CVE-2020-12373 as CVE page is older than CVRF-CVE file.
skipping CVE-2020-12364 as CVE page is older than CVRF-CVE file.
skipping CVE-2020-12363 as CVE page is older than CVRF-CVE file.
skipping CVE-2020-12362 as CVE page is older than CVRF-CVE file.
skipping CVE-2020-12319 as CVE page is older than CVRF-CVE file.
skipping CVE-2020-12317 as CVE page is older than CVRF-CVE file.
skipping CVE-2020-12313 as CVE page is older than CVRF-CVE file.
no cpe found for HPE Helion OpenStack Cloud 8 in CVE-2020-12245
no cpe found for SUSE Package Hub 15 SP1 in CVE-2020-12245
no cpe found for SUSE Package Hub 15 SP2 in CVE-2020-12245
skipping CVE-2020-12267 as CVE page is older than CVRF-CVE file.
no cpe found for SUSE Package Hub 15 SP1 in CVE-2020-12244
no cpe found for SUSE Package Hub 15 SP2 in CVE-2020-12137
skipping CVE-2020-12243 as CVE page is older than CVRF-CVE file.
no cpe found for SUSE Package Hub 15 SP1 in CVE-2020-12108
no cpe found for SUSE Package Hub 15 SP2 in CVE-2020-12108
skipping CVE-2020-12114 as CVE page is older than CVRF-CVE file.
CVE-2020-12105: no packages for SUSE Linux Enterprise Module for Basesystem 15 SP5, but entry?
CVE-2020-12105: no packages for SUSE Linux Enterprise Module for Basesystem 15 SP6, but entry?
CVE-2020-12105: no packages for SUSE Linux Enterprise Server 15 SP4-TERADATA, but entry?
CVE-2020-12105: no packages for SUSE Linux Enterprise Module for Basesystem 15 SP5, but entry?
CVE-2020-12105: no packages for SUSE Linux Enterprise Module for Basesystem 15 SP6, but entry?
CVE-2020-12105: no packages for SUSE Linux Enterprise Server 15 SP4-TERADATA, but entry?
CVE-2020-12105: no packages for SUSE Linux Enterprise Module for Basesystem 15 SP5, but entry?
CVE-2020-12105: no packages for SUSE Linux Enterprise Module for Basesystem 15 SP6, but entry?
CVE-2020-12105: no packages for SUSE Linux Enterprise Server 15 SP4-TERADATA, but entry?
no cpe found for SUSE Package Hub 15 SP1 in CVE-2020-12066
skipping CVE-2020-12100 as CVE page is older than CVRF-CVE file.
skipping CVE-2020-12063 as CVE page is older than CVRF-CVE file.
no cpe found for SUSE Manager Tools 15 SP1 in CVE-2020-12052
no cpe found for SUSE Package Hub 15 SP1 in CVE-2020-12050
skipping CVE-2020-12049 as CVE page is older than CVRF-CVE file.
CVE-2020-11988: no packages for SUSE Manager Retail Branch Server 4.2, but entry?
CVE-2020-11988: no packages for Image SLES15-SP4-SAP, but entry?
CVE-2020-11988: no packages for Image SLES15-SP4-Manager-Server-4-3-EC2-llc, but entry?
CVE-2020-11988: no packages for Image SLES15-SP6-SAP-Azure-LI-BYOS-Production, but entry?
CVE-2020-11988: no packages for SUSE Linux Enterprise Module for Package Hub 15 SP4, but entry?
CVE-2020-11988: no packages for Image SLES15-SP6-SAP, but entry?
CVE-2020-11988: no packages for Image SLES15-SP3-SAPCAL-GCE, but entry?
CVE-2020-11988: no packages for Image SLES15-SP4-SAPCAL-GCE, but entry?
CVE-2020-11988: no packages for Container suse/manager/5.0/x86_64/server:5.0.0-beta1.2.122, but entry?
CVE-2020-11988: no packages for SUSE Manager Server 4.2, but entry?
CVE-2020-11988: no packages for Image SLES15-SP3-SAPCAL-EC2-HVM, but entry?
CVE-2020-11988: no packages for Image SLES15-SP4-SAP-Azure-LI-BYOS, but entry?
CVE-2020-11988: no packages for SUSE Linux Enterprise Module for Development Tools 15 SP6, but entry?
CVE-2020-11988: no packages for Container bci/openjdk:17-7.1, but entry?
CVE-2020-11988: no packages for SUSE Linux Enterprise Module for Basesystem 15 SP4, but entry?
CVE-2020-11988: no packages for Image SLES15-SP4-Manager-Server-4-3-EC2-ltd, but entry?
CVE-2020-11988: no packages for Image SLES15-SP3-SAP-Azure-VLI-BYOS-Production, but entry?
CVE-2020-11988: no packages for Image SLES15-SP5-SAP-EC2, but entry?
CVE-2020-11988: no packages for Image SLES15-SP2-SAP-BYOS-Azure, but entry?
CVE-2020-11988: no packages for Image SLES15-SP4-SAPCAL, but entry?
CVE-2020-11988: no packages for Image SLES15-SP6-SAPCAL-EC2, but entry?
CVE-2020-11988: no packages for Container bci/openjdk:latest, but entry?
CVE-2020-11988: no packages for SUSE Linux Enterprise Module for Web and Scripting 15 SP6, but entry?
CVE-2020-11988: no packages for Image SLES15-SP6-SAP-GCE, but entry?
CVE-2020-11988: no packages for Image SLES15-SP4-Manager-Server-4-3-BYOS-Azure, but entry?
CVE-2020-11988: no packages for Image SLES15-SP6-SAPCAL-GCE, but entry?
CVE-2020-11988: no packages for Container bci/openjdk-devel:11-6.2, but entry?
CVE-2020-11988: no packages for Image SLES15-SP4-SAP-Azure-VLI-BYOS-Production, but entry?
CVE-2020-11988: no packages for Image SLES15-SP5-SAP-Azure-LI-BYOS, but entry?
CVE-2020-11988: no packages for SUSE Manager Server Module 4.2, but entry?
CVE-2020-11988: no packages for Container bci/openjdk-devel:17-7.2, but entry?
CVE-2020-11988: no packages for Image SLES15-SP5-SAPCAL-Azure, but entry?
CVE-2020-11988: no packages for Image SLES15-SP5-SAP-GCE, but entry?
CVE-2020-11988: no packages for SUSE Linux Enterprise Workstation Extension 15 SP5, but entry?
CVE-2020-11988: no packages for Container suse/manager/5.0/x86_64/server-attestation:5.0.0-beta2.2.16, but entry?
CVE-2020-11988: no packages for Image SLES15-SP2-SAP-Azure-VLI-BYOS-Production, but entry?
CVE-2020-11988: no packages for Image SLES15-SP2-SAP-BYOS-EC2-HVM, but entry?
CVE-2020-11988: no packages for SUSE CaaS Platform 4.0, but entry?
CVE-2020-11988: no packages for Container bci/kiwi:9.24.43-8.6, but entry?
CVE-2020-11988: no packages for Image SLES15-SP2-SAP-GCE, but entry?
CVE-2020-11988: no packages for SUSE Manager Server Module 4.3, but entry?
CVE-2020-11988: no packages for Image SLES15-SP6-SAP-Azure-VLI-BYOS-Production, but entry?
CVE-2020-11988: no packages for SUSE Linux Enterprise Workstation Extension 15 SP6, but entry?
CVE-2020-11988: no packages for Image SLES15-SP4-SAP-GCE, but entry?
CVE-2020-11988: no packages for SUSE Linux Enterprise Server 15 SP4-TERADATA, but entry?
CVE-2020-11988: no packages for Image SLES15-SP4-SAP-Azure-VLI-BYOS, but entry?
CVE-2020-11988: no packages for Image SLES15-SP6-SAP-Azure-LI-BYOS, but entry?
CVE-2020-11988: no packages for Image SLES15-SP4-Manager-Server-4-3, but entry?
CVE-2020-11988: no packages for SUSE Manager Proxy 4.2, but entry?
CVE-2020-11988: no packages for SUSE Linux Enterprise Module for Package Hub 15 SP5, but entry?
CVE-2020-11988: no packages for Image SLES15-SP4-SAP-Azure, but entry?
CVE-2020-11988: no packages for SUSE Linux Enterprise Workstation Extension 15 SP4, but entry?
CVE-2020-11988: no packages for Image SLES15-SP2-SAP-Azure, but entry?
CVE-2020-11988: no packages for SUSE Linux Enterprise Module for Basesystem 15 SP5, but entry?
CVE-2020-11988: no packages for Image SLES15-SP4-SAP-Azure-LI-BYOS-Production, but entry?
CVE-2020-11988: no packages for SUSE Linux Enterprise Software Development Kit 12 SP5, but entry?
CVE-2020-11988: no packages for Image SLES15-SP2-SAP-Azure-LI-BYOS-Production, but entry?
CVE-2020-11988: no packages for Image SLES15-SP4-Manager-Server-4-3-BYOS, but entry?
CVE-2020-11988: no packages for Image SLES15-SP4-Manager-Server-4-3-Azure-llc, but entry?
CVE-2020-11988: no packages for Image SLES15-SP2-SAP-BYOS-GCE, but entry?
CVE-2020-11988: no packages for Image SLES15-SP3-SAPCAL-Azure, but entry?
CVE-2020-11988: no packages for Image SLES15-SP5-SAP-Azure-LI-BYOS-Production, but entry?
CVE-2020-11988: no packages for SUSE Linux Enterprise Module for Basesystem 15 SP6, but entry?
CVE-2020-11988: no packages for Image SLES15-SP6-SAPCAL, but entry?
CVE-2020-11988: no packages for Image SLES15-SP5-SAP-Azure-VLI-BYOS, but entry?
CVE-2020-11988: no packages for SUSE Linux Enterprise Module for Web and Scripting 15 SP5, but entry?
CVE-2020-11988: no packages for Image SLES15-SP4-Manager-Server-4-3-Azure-ltd, but entry?
CVE-2020-11988: no packages for Image SLES15-SP3-Manager-4-2-Server-BYOS-GCE, but entry?
CVE-2020-11988: no packages for Image SLES15-SP3-Manager-4-2-Server-BYOS-EC2-HVM, but entry?
CVE-2020-11988: no packages for Image SLES15-SP4-Manager-Server-4-3-BYOS-GCE, but entry?
CVE-2020-11988: no packages for Image SLES15-SP6-SAP-Azure, but entry?
CVE-2020-11988: no packages for Image SLES15-SP5-SAPCAL-GCE, but entry?
CVE-2020-11988: no packages for Image SLES15-SP4-Manager-Server-4-3-BYOS-EC2, but entry?
CVE-2020-11988: no packages for SUSE Linux Enterprise Server 15 SP1-LTSS, but entry?
CVE-2020-11988: no packages for Image SLES15-SP6-SAP-Azure-VLI-BYOS, but entry?
CVE-2020-11988: no packages for Image SLES15-SP5-SAP-Azure, but entry?
CVE-2020-11988: no packages for Image SLES15-SP6-SAPCAL-Azure, but entry?
CVE-2020-11988: no packages for Image SLES15-SP5-SAP-Azure-VLI-BYOS-Production, but entry?
CVE-2020-11988: no packages for SUSE Linux Enterprise Module for Web and Scripting 15 SP4, but entry?
CVE-2020-11988: no packages for Image SLES15-SP4-SAPCAL-EC2, but entry?
CVE-2020-11988: no packages for Image SLES15-SP5-SAPCAL-EC2, but entry?
CVE-2020-11988: no packages for Image SLES15-SP4-SAPCAL-Azure, but entry?
CVE-2020-11988: no packages for SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS, but entry?
CVE-2020-11988: no packages for Image SLES15-SP4-SAP-EC2, but entry?
CVE-2020-11988: no packages for SUSE Linux Enterprise Server for SAP Applications 15 SP1, but entry?
CVE-2020-11988: no packages for Container bci/openjdk:11-7.1, but entry?
CVE-2020-11988: no packages for Container bci/openjdk-devel:17-14.11, but entry?
CVE-2020-11988: no packages for Image SLES15-SP3-Manager-4-2-Server-BYOS-Azure, but entry?
CVE-2020-11988: no packages for Image SLES15-SP2-SAP-EC2-HVM, but entry?
CVE-2020-11988: no packages for Image SLES15-SP3-SAP-Azure-LI-BYOS-Production, but entry?
CVE-2020-11988: no packages for Image SLES15-SP6-SAP-EC2, but entry?
CVE-2020-11988: no packages for Container bci/kiwi:9.24.43-8.6, but entry?
CVE-2020-11988: no packages for Container bci/openjdk-devel:11-6.2, but entry?
CVE-2020-11988: no packages for Container bci/openjdk-devel:17-14.11, but entry?
CVE-2020-11988: no packages for Container bci/openjdk-devel:17-7.2, but entry?
CVE-2020-11988: no packages for Container bci/openjdk:11-7.1, but entry?
CVE-2020-11988: no packages for Container bci/openjdk:17-7.1, but entry?
CVE-2020-11988: no packages for Container bci/openjdk:latest, but entry?
CVE-2020-11988: no packages for Container suse/manager/5.0/x86_64/server-attestation:5.0.0-beta2.2.16, but entry?
CVE-2020-11988: no packages for Container suse/manager/5.0/x86_64/server:5.0.0-beta1.2.122, but entry?
CVE-2020-11988: no packages for Image SLES15-SP2-SAP-Azure, but entry?
CVE-2020-11988: no packages for Image SLES15-SP2-SAP-Azure-LI-BYOS-Production, but entry?
CVE-2020-11988: no packages for Image SLES15-SP2-SAP-Azure-VLI-BYOS-Production, but entry?
CVE-2020-11988: no packages for Image SLES15-SP2-SAP-BYOS-Azure, but entry?
CVE-2020-11988: no packages for Image SLES15-SP2-SAP-BYOS-EC2-HVM, but entry?
CVE-2020-11988: no packages for Image SLES15-SP2-SAP-BYOS-GCE, but entry?
CVE-2020-11988: no packages for Image SLES15-SP2-SAP-EC2-HVM, but entry?
CVE-2020-11988: no packages for Image SLES15-SP2-SAP-GCE, but entry?
CVE-2020-11988: no packages for Image SLES15-SP3-Manager-4-2-Server-BYOS-Azure, but entry?
CVE-2020-11988: no packages for Image SLES15-SP3-Manager-4-2-Server-BYOS-EC2-HVM, but entry?
CVE-2020-11988: no packages for Image SLES15-SP3-Manager-4-2-Server-BYOS-GCE, but entry?
CVE-2020-11988: no packages for Image SLES15-SP3-SAP-Azure-LI-BYOS-Production, but entry?
CVE-2020-11988: no packages for Image SLES15-SP3-SAP-Azure-VLI-BYOS-Production, but entry?
CVE-2020-11988: no packages for Image SLES15-SP3-SAPCAL-Azure, but entry?
CVE-2020-11988: no packages for Image SLES15-SP3-SAPCAL-EC2-HVM, but entry?
CVE-2020-11988: no packages for Image SLES15-SP3-SAPCAL-GCE, but entry?
CVE-2020-11988: no packages for Image SLES15-SP4-Manager-Server-4-3, but entry?
CVE-2020-11988: no packages for Image SLES15-SP4-Manager-Server-4-3-Azure-llc, but entry?
CVE-2020-11988: no packages for Image SLES15-SP4-Manager-Server-4-3-Azure-ltd, but entry?
CVE-2020-11988: no packages for Image SLES15-SP4-Manager-Server-4-3-BYOS, but entry?
CVE-2020-11988: no packages for Image SLES15-SP4-Manager-Server-4-3-BYOS-Azure, but entry?
CVE-2020-11988: no packages for Image SLES15-SP4-Manager-Server-4-3-BYOS-EC2, but entry?
CVE-2020-11988: no packages for Image SLES15-SP4-Manager-Server-4-3-BYOS-GCE, but entry?
CVE-2020-11988: no packages for Image SLES15-SP4-Manager-Server-4-3-EC2-llc, but entry?
CVE-2020-11988: no packages for Image SLES15-SP4-Manager-Server-4-3-EC2-ltd, but entry?
CVE-2020-11988: no packages for Image SLES15-SP4-SAP, but entry?
CVE-2020-11988: no packages for Image SLES15-SP4-SAP-Azure, but entry?
CVE-2020-11988: no packages for Image SLES15-SP4-SAP-Azure-LI-BYOS, but entry?
CVE-2020-11988: no packages for Image SLES15-SP4-SAP-Azure-LI-BYOS-Production, but entry?
CVE-2020-11988: no packages for Image SLES15-SP4-SAP-Azure-VLI-BYOS, but entry?
CVE-2020-11988: no packages for Image SLES15-SP4-SAP-Azure-VLI-BYOS-Production, but entry?
CVE-2020-11988: no packages for Image SLES15-SP4-SAP-EC2, but entry?
CVE-2020-11988: no packages for Image SLES15-SP4-SAP-GCE, but entry?
CVE-2020-11988: no packages for Image SLES15-SP4-SAPCAL, but entry?
CVE-2020-11988: no packages for Image SLES15-SP4-SAPCAL-Azure, but entry?
CVE-2020-11988: no packages for Image SLES15-SP4-SAPCAL-EC2, but entry?
CVE-2020-11988: no packages for Image SLES15-SP4-SAPCAL-GCE, but entry?
CVE-2020-11988: no packages for Image SLES15-SP5-SAP-Azure, but entry?
CVE-2020-11988: no packages for Image SLES15-SP5-SAP-Azure-LI-BYOS, but entry?
CVE-2020-11988: no packages for Image SLES15-SP5-SAP-Azure-LI-BYOS-Production, but entry?
CVE-2020-11988: no packages for Image SLES15-SP5-SAP-Azure-VLI-BYOS, but entry?
CVE-2020-11988: no packages for Image SLES15-SP5-SAP-Azure-VLI-BYOS-Production, but entry?
CVE-2020-11988: no packages for Image SLES15-SP5-SAP-EC2, but entry?
CVE-2020-11988: no packages for Image SLES15-SP5-SAP-GCE, but entry?
CVE-2020-11988: no packages for Image SLES15-SP5-SAPCAL-Azure, but entry?
CVE-2020-11988: no packages for Image SLES15-SP5-SAPCAL-EC2, but entry?
CVE-2020-11988: no packages for Image SLES15-SP5-SAPCAL-GCE, but entry?
CVE-2020-11988: no packages for Image SLES15-SP6-SAP, but entry?
CVE-2020-11988: no packages for Image SLES15-SP6-SAP-Azure, but entry?
CVE-2020-11988: no packages for Image SLES15-SP6-SAP-Azure-LI-BYOS, but entry?
CVE-2020-11988: no packages for Image SLES15-SP6-SAP-Azure-LI-BYOS-Production, but entry?
CVE-2020-11988: no packages for Image SLES15-SP6-SAP-Azure-VLI-BYOS, but entry?
CVE-2020-11988: no packages for Image SLES15-SP6-SAP-Azure-VLI-BYOS-Production, but entry?
CVE-2020-11988: no packages for Image SLES15-SP6-SAP-EC2, but entry?
CVE-2020-11988: no packages for Image SLES15-SP6-SAP-GCE, but entry?
CVE-2020-11988: no packages for Image SLES15-SP6-SAPCAL, but entry?
CVE-2020-11988: no packages for Image SLES15-SP6-SAPCAL-Azure, but entry?
CVE-2020-11988: no packages for Image SLES15-SP6-SAPCAL-EC2, but entry?
CVE-2020-11988: no packages for Image SLES15-SP6-SAPCAL-GCE, but entry?
CVE-2020-11988: no packages for SUSE CaaS Platform 4.0, but entry?
CVE-2020-11988: no packages for SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS, but entry?
CVE-2020-11988: no packages for SUSE Linux Enterprise Module for Basesystem 15 SP4, but entry?
CVE-2020-11988: no packages for SUSE Linux Enterprise Module for Basesystem 15 SP5, but entry?
CVE-2020-11988: no packages for SUSE Linux Enterprise Module for Basesystem 15 SP6, but entry?
CVE-2020-11988: no packages for SUSE Linux Enterprise Module for Development Tools 15 SP6, but entry?
CVE-2020-11988: no packages for SUSE Linux Enterprise Module for Package Hub 15 SP4, but entry?
CVE-2020-11988: no packages for SUSE Linux Enterprise Module for Package Hub 15 SP5, but entry?
CVE-2020-11988: no packages for SUSE Linux Enterprise Module for Web and Scripting 15 SP4, but entry?
CVE-2020-11988: no packages for SUSE Linux Enterprise Module for Web and Scripting 15 SP5, but entry?
CVE-2020-11988: no packages for SUSE Linux Enterprise Module for Web and Scripting 15 SP6, but entry?
CVE-2020-11988: no packages for SUSE Linux Enterprise Server 15 SP1-LTSS, but entry?
CVE-2020-11988: no packages for SUSE Linux Enterprise Server 15 SP4-TERADATA, but entry?
CVE-2020-11988: no packages for SUSE Linux Enterprise Server for SAP Applications 15 SP1, but entry?
CVE-2020-11988: no packages for SUSE Linux Enterprise Software Development Kit 12 SP5, but entry?
CVE-2020-11988: no packages for SUSE Linux Enterprise Workstation Extension 15 SP4, but entry?
CVE-2020-11988: no packages for SUSE Linux Enterprise Workstation Extension 15 SP5, but entry?
CVE-2020-11988: no packages for SUSE Linux Enterprise Workstation Extension 15 SP6, but entry?
CVE-2020-11988: no packages for SUSE Manager Proxy 4.2, but entry?
CVE-2020-11988: no packages for SUSE Manager Retail Branch Server 4.2, but entry?
CVE-2020-11988: no packages for SUSE Manager Server 4.2, but entry?
CVE-2020-11988: no packages for SUSE Manager Server Module 4.2, but entry?
CVE-2020-11988: no packages for SUSE Manager Server Module 4.3, but entry?
CVE-2020-11988: no packages for Container bci/kiwi:9.24.43-8.6, but entry?
CVE-2020-11988: no packages for Container bci/openjdk-devel:11-6.2, but entry?
CVE-2020-11988: no packages for Container bci/openjdk-devel:17-14.11, but entry?
CVE-2020-11988: no packages for Container bci/openjdk-devel:17-7.2, but entry?
CVE-2020-11988: no packages for Container bci/openjdk:11-7.1, but entry?
CVE-2020-11988: no packages for Container bci/openjdk:17-7.1, but entry?
CVE-2020-11988: no packages for Container bci/openjdk:latest, but entry?
CVE-2020-11988: no packages for Container suse/manager/5.0/x86_64/server-attestation:5.0.0-beta2.2.16, but entry?
CVE-2020-11988: no packages for Container suse/manager/5.0/x86_64/server:5.0.0-beta1.2.122, but entry?
CVE-2020-11988: no packages for Image SLES15-SP2-SAP-Azure, but entry?
CVE-2020-11988: no packages for Image SLES15-SP2-SAP-Azure-LI-BYOS-Production, but entry?
CVE-2020-11988: no packages for Image SLES15-SP2-SAP-Azure-VLI-BYOS-Production, but entry?
CVE-2020-11988: no packages for Image SLES15-SP2-SAP-BYOS-Azure, but entry?
CVE-2020-11988: no packages for Image SLES15-SP2-SAP-BYOS-EC2-HVM, but entry?
CVE-2020-11988: no packages for Image SLES15-SP2-SAP-BYOS-GCE, but entry?
CVE-2020-11988: no packages for Image SLES15-SP2-SAP-EC2-HVM, but entry?
CVE-2020-11988: no packages for Image SLES15-SP2-SAP-GCE, but entry?
CVE-2020-11988: no packages for Image SLES15-SP3-Manager-4-2-Server-BYOS-Azure, but entry?
CVE-2020-11988: no packages for Image SLES15-SP3-Manager-4-2-Server-BYOS-EC2-HVM, but entry?
CVE-2020-11988: no packages for Image SLES15-SP3-Manager-4-2-Server-BYOS-GCE, but entry?
CVE-2020-11988: no packages for Image SLES15-SP3-SAP-Azure-LI-BYOS-Production, but entry?
CVE-2020-11988: no packages for Image SLES15-SP3-SAP-Azure-VLI-BYOS-Production, but entry?
CVE-2020-11988: no packages for Image SLES15-SP3-SAPCAL-Azure, but entry?
CVE-2020-11988: no packages for Image SLES15-SP3-SAPCAL-EC2-HVM, but entry?
CVE-2020-11988: no packages for Image SLES15-SP3-SAPCAL-GCE, but entry?
CVE-2020-11988: no packages for Image SLES15-SP4-Manager-Server-4-3, but entry?
CVE-2020-11988: no packages for Image SLES15-SP4-Manager-Server-4-3-Azure-llc, but entry?
CVE-2020-11988: no packages for Image SLES15-SP4-Manager-Server-4-3-Azure-ltd, but entry?
CVE-2020-11988: no packages for Image SLES15-SP4-Manager-Server-4-3-BYOS, but entry?
CVE-2020-11988: no packages for Image SLES15-SP4-Manager-Server-4-3-BYOS-Azure, but entry?
CVE-2020-11988: no packages for Image SLES15-SP4-Manager-Server-4-3-BYOS-EC2, but entry?
CVE-2020-11988: no packages for Image SLES15-SP4-Manager-Server-4-3-BYOS-GCE, but entry?
CVE-2020-11988: no packages for Image SLES15-SP4-Manager-Server-4-3-EC2-llc, but entry?
CVE-2020-11988: no packages for Image SLES15-SP4-Manager-Server-4-3-EC2-ltd, but entry?
CVE-2020-11988: no packages for Image SLES15-SP4-SAP, but entry?
CVE-2020-11988: no packages for Image SLES15-SP4-SAP-Azure, but entry?
CVE-2020-11988: no packages for Image SLES15-SP4-SAP-Azure-LI-BYOS, but entry?
CVE-2020-11988: no packages for Image SLES15-SP4-SAP-Azure-LI-BYOS-Production, but entry?
CVE-2020-11988: no packages for Image SLES15-SP4-SAP-Azure-VLI-BYOS, but entry?
CVE-2020-11988: no packages for Image SLES15-SP4-SAP-Azure-VLI-BYOS-Production, but entry?
CVE-2020-11988: no packages for Image SLES15-SP4-SAP-EC2, but entry?
CVE-2020-11988: no packages for Image SLES15-SP4-SAP-GCE, but entry?
CVE-2020-11988: no packages for Image SLES15-SP4-SAPCAL, but entry?
CVE-2020-11988: no packages for Image SLES15-SP4-SAPCAL-Azure, but entry?
CVE-2020-11988: no packages for Image SLES15-SP4-SAPCAL-EC2, but entry?
CVE-2020-11988: no packages for Image SLES15-SP4-SAPCAL-GCE, but entry?
CVE-2020-11988: no packages for Image SLES15-SP5-SAP-Azure, but entry?
CVE-2020-11988: no packages for Image SLES15-SP5-SAP-Azure-LI-BYOS, but entry?
CVE-2020-11988: no packages for Image SLES15-SP5-SAP-Azure-LI-BYOS-Production, but entry?
CVE-2020-11988: no packages for Image SLES15-SP5-SAP-Azure-VLI-BYOS, but entry?
CVE-2020-11988: no packages for Image SLES15-SP5-SAP-Azure-VLI-BYOS-Production, but entry?
CVE-2020-11988: no packages for Image SLES15-SP5-SAP-EC2, but entry?
CVE-2020-11988: no packages for Image SLES15-SP5-SAP-GCE, but entry?
CVE-2020-11988: no packages for Image SLES15-SP5-SAPCAL-Azure, but entry?
CVE-2020-11988: no packages for Image SLES15-SP5-SAPCAL-EC2, but entry?
CVE-2020-11988: no packages for Image SLES15-SP5-SAPCAL-GCE, but entry?
CVE-2020-11988: no packages for Image SLES15-SP6-SAP, but entry?
CVE-2020-11988: no packages for Image SLES15-SP6-SAP-Azure, but entry?
CVE-2020-11988: no packages for Image SLES15-SP6-SAP-Azure-LI-BYOS, but entry?
CVE-2020-11988: no packages for Image SLES15-SP6-SAP-Azure-LI-BYOS-Production, but entry?
CVE-2020-11988: no packages for Image SLES15-SP6-SAP-Azure-VLI-BYOS, but entry?
CVE-2020-11988: no packages for Image SLES15-SP6-SAP-Azure-VLI-BYOS-Production, but entry?
CVE-2020-11988: no packages for Image SLES15-SP6-SAP-EC2, but entry?
CVE-2020-11988: no packages for Image SLES15-SP6-SAP-GCE, but entry?
CVE-2020-11988: no packages for Image SLES15-SP6-SAPCAL, but entry?
CVE-2020-11988: no packages for Image SLES15-SP6-SAPCAL-Azure, but entry?
CVE-2020-11988: no packages for Image SLES15-SP6-SAPCAL-EC2, but entry?
CVE-2020-11988: no packages for Image SLES15-SP6-SAPCAL-GCE, but entry?
CVE-2020-11988: no packages for SUSE CaaS Platform 4.0, but entry?
CVE-2020-11988: no packages for SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS, but entry?
CVE-2020-11988: no packages for SUSE Linux Enterprise Module for Basesystem 15 SP4, but entry?
CVE-2020-11988: no packages for SUSE Linux Enterprise Module for Basesystem 15 SP5, but entry?
CVE-2020-11988: no packages for SUSE Linux Enterprise Module for Basesystem 15 SP6, but entry?
CVE-2020-11988: no packages for SUSE Linux Enterprise Module for Development Tools 15 SP6, but entry?
CVE-2020-11988: no packages for SUSE Linux Enterprise Module for Package Hub 15 SP4, but entry?
CVE-2020-11988: no packages for SUSE Linux Enterprise Module for Package Hub 15 SP5, but entry?
CVE-2020-11988: no packages for SUSE Linux Enterprise Module for Web and Scripting 15 SP4, but entry?
CVE-2020-11988: no packages for SUSE Linux Enterprise Module for Web and Scripting 15 SP5, but entry?
CVE-2020-11988: no packages for SUSE Linux Enterprise Module for Web and Scripting 15 SP6, but entry?
CVE-2020-11988: no packages for SUSE Linux Enterprise Server 15 SP1-LTSS, but entry?
CVE-2020-11988: no packages for SUSE Linux Enterprise Server 15 SP4-TERADATA, but entry?
CVE-2020-11988: no packages for SUSE Linux Enterprise Server for SAP Applications 15 SP1, but entry?
CVE-2020-11988: no packages for SUSE Linux Enterprise Software Development Kit 12 SP5, but entry?
CVE-2020-11988: no packages for SUSE Linux Enterprise Workstation Extension 15 SP4, but entry?
CVE-2020-11988: no packages for SUSE Linux Enterprise Workstation Extension 15 SP5, but entry?
CVE-2020-11988: no packages for SUSE Linux Enterprise Workstation Extension 15 SP6, but entry?
CVE-2020-11988: no packages for SUSE Manager Proxy 4.2, but entry?
CVE-2020-11988: no packages for SUSE Manager Retail Branch Server 4.2, but entry?
CVE-2020-11988: no packages for SUSE Manager Server 4.2, but entry?
CVE-2020-11988: no packages for SUSE Manager Server Module 4.2, but entry?
CVE-2020-11988: no packages for SUSE Manager Server Module 4.3, but entry?
skipping CVE-2020-11993 as CVE page is older than CVRF-CVE file.
CVE-2020-11987: no packages for Image SLES15-SP5-SAP-Azure-LI-BYOS-Production, but entry?
CVE-2020-11987: no packages for SUSE Linux Enterprise Module for Basesystem 15 SP6, but entry?
CVE-2020-11987: no packages for Image SLES15-SP6-SAPCAL, but entry?
CVE-2020-11987: no packages for Image SLES15-SP5-SAP-Azure-VLI-BYOS, but entry?
CVE-2020-11987: no packages for Image SLES15-SP3-SAPCAL-Azure, but entry?
CVE-2020-11987: no packages for Image SLES15-SP4-Manager-Server-4-3-Azure-llc, but entry?
CVE-2020-11987: no packages for Image SLES15-SP2-SAP-BYOS-GCE, but entry?
CVE-2020-11987: no packages for Image SLES15-SP3-Manager-4-2-Server-BYOS-GCE, but entry?
CVE-2020-11987: no packages for Image SLES15-SP4-Manager-Server-4-3-Azure-ltd, but entry?
CVE-2020-11987: no packages for SUSE Linux Enterprise Module for Web and Scripting 15 SP5, but entry?
CVE-2020-11987: no packages for SUSE Linux Enterprise Workstation Extension 15 SP4, but entry?
CVE-2020-11987: no packages for SUSE Linux Enterprise Module for Package Hub 15 SP5, but entry?
CVE-2020-11987: no packages for Image SLES15-SP4-SAP-Azure, but entry?
CVE-2020-11987: no packages for SUSE Manager Proxy 4.2, but entry?
CVE-2020-11987: no packages for Image SLES15-SP4-Manager-Server-4-3, but entry?
CVE-2020-11987: no packages for Image SLES15-SP4-SAP-Azure-LI-BYOS-Production, but entry?
CVE-2020-11987: no packages for Image SLES15-SP2-SAP-Azure-LI-BYOS-Production, but entry?
CVE-2020-11987: no packages for Image SLES15-SP4-Manager-Server-4-3-BYOS, but entry?
CVE-2020-11987: no packages for Image SLES15-SP2-SAP-Azure, but entry?
CVE-2020-11987: no packages for SUSE Linux Enterprise Module for Basesystem 15 SP5, but entry?
CVE-2020-11987: no packages for Image SLES15-SP3-Manager-4-2-Server-BYOS-Azure, but entry?
CVE-2020-11987: no packages for Image SLES15-SP4-SAP-EC2, but entry?
CVE-2020-11987: no packages for SUSE Linux Enterprise Server for SAP Applications 15 SP1, but entry?
CVE-2020-11987: no packages for Container bci/openjdk:11-7.1, but entry?
CVE-2020-11987: no packages for SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS, but entry?
CVE-2020-11987: no packages for Container bci/openjdk-devel:17-14.11, but entry?
CVE-2020-11987: no packages for SUSE Linux Enterprise Module for Web and Scripting 15 SP4, but entry?
CVE-2020-11987: no packages for Image SLES15-SP4-SAPCAL-EC2, but entry?
CVE-2020-11987: no packages for Image SLES15-SP5-SAPCAL-EC2, but entry?
CVE-2020-11987: no packages for Image SLES15-SP4-SAPCAL-Azure, but entry?
CVE-2020-11987: no packages for Image SLES15-SP6-SAP-EC2, but entry?
CVE-2020-11987: no packages for Image SLES15-SP2-SAP-EC2-HVM, but entry?
CVE-2020-11987: no packages for Image SLES15-SP3-SAP-Azure-LI-BYOS-Production, but entry?
CVE-2020-11987: no packages for SUSE Linux Enterprise Server 15 SP1-LTSS, but entry?
CVE-2020-11987: no packages for Image SLES15-SP6-SAP-Azure, but entry?
CVE-2020-11987: no packages for Image SLES15-SP5-SAPCAL-GCE, but entry?
CVE-2020-11987: no packages for Image SLES15-SP4-Manager-Server-4-3-BYOS-EC2, but entry?
CVE-2020-11987: no packages for Image SLES15-SP3-Manager-4-2-Server-BYOS-EC2-HVM, but entry?
CVE-2020-11987: no packages for Image SLES15-SP4-Manager-Server-4-3-BYOS-GCE, but entry?
CVE-2020-11987: no packages for Image SLES15-SP5-SAP-Azure-VLI-BYOS-Production, but entry?
CVE-2020-11987: no packages for Image SLES15-SP6-SAPCAL-Azure, but entry?
CVE-2020-11987: no packages for Image SLES15-SP6-SAP-Azure-VLI-BYOS, but entry?
CVE-2020-11987: no packages for Image SLES15-SP5-SAP-Azure, but entry?
CVE-2020-11987: no packages for Image SLES15-SP4-Manager-Server-4-3-EC2-ltd, but entry?
CVE-2020-11987: no packages for Image SLES15-SP3-SAP-Azure-VLI-BYOS-Production, but entry?
CVE-2020-11987: no packages for SUSE Linux Enterprise Module for Basesystem 15 SP4, but entry?
CVE-2020-11987: no packages for Container bci/openjdk:17-7.1, but entry?
CVE-2020-11987: no packages for SUSE Linux Enterprise Module for Web and Scripting 15 SP6, but entry?
CVE-2020-11987: no packages for Container bci/openjdk:latest, but entry?
CVE-2020-11987: no packages for Image SLES15-SP6-SAPCAL-EC2, but entry?
CVE-2020-11987: no packages for Image SLES15-SP4-SAPCAL, but entry?
CVE-2020-11987: no packages for Image SLES15-SP2-SAP-BYOS-Azure, but entry?
CVE-2020-11987: no packages for Image SLES15-SP5-SAP-EC2, but entry?
CVE-2020-11987: no packages for SUSE Linux Enterprise Module for Package Hub 15 SP4, but entry?
CVE-2020-11987: no packages for Image SLES15-SP6-SAP-Azure-LI-BYOS-Production, but entry?
CVE-2020-11987: no packages for Image SLES15-SP4-Manager-Server-4-3-EC2-llc, but entry?
CVE-2020-11987: no packages for Image SLES15-SP4-SAP, but entry?
CVE-2020-11987: no packages for SUSE Manager Retail Branch Server 4.2, but entry?
CVE-2020-11987: no packages for Image SLES15-SP4-SAP-Azure-LI-BYOS, but entry?
CVE-2020-11987: no packages for Image SLES15-SP3-SAPCAL-EC2-HVM, but entry?
CVE-2020-11987: no packages for SUSE Manager Server 4.2, but entry?
CVE-2020-11987: no packages for SUSE Linux Enterprise Module for Development Tools 15 SP6, but entry?
CVE-2020-11987: no packages for Container suse/manager/5.0/x86_64/server:5.0.0-beta1.2.122, but entry?
CVE-2020-11987: no packages for Image SLES15-SP4-SAPCAL-GCE, but entry?
CVE-2020-11987: no packages for Image SLES15-SP6-SAP, but entry?
CVE-2020-11987: no packages for Image SLES15-SP3-SAPCAL-GCE, but entry?
CVE-2020-11987: no packages for Image SLES15-SP2-SAP-GCE, but entry?
CVE-2020-11987: no packages for Container bci/kiwi:9.24.43-8.6, but entry?
CVE-2020-11987: no packages for Image SLES15-SP4-SAP-Azure-VLI-BYOS, but entry?
CVE-2020-11987: no packages for Image SLES15-SP6-SAP-Azure-LI-BYOS, but entry?
CVE-2020-11987: no packages for SUSE Linux Enterprise Server 15 SP4-TERADATA, but entry?
CVE-2020-11987: no packages for Image SLES15-SP4-SAP-GCE, but entry?
CVE-2020-11987: no packages for SUSE Manager Server Module 4.3, but entry?
CVE-2020-11987: no packages for Image SLES15-SP6-SAP-Azure-VLI-BYOS-Production, but entry?
CVE-2020-11987: no packages for SUSE Linux Enterprise Workstation Extension 15 SP6, but entry?
CVE-2020-11987: no packages for Image SLES15-SP5-SAP-GCE, but entry?
CVE-2020-11987: no packages for SUSE Linux Enterprise Workstation Extension 15 SP5, but entry?
CVE-2020-11987: no packages for Container bci/openjdk-devel:17-7.2, but entry?
CVE-2020-11987: no packages for Image SLES15-SP5-SAPCAL-Azure, but entry?
CVE-2020-11987: no packages for Image SLES15-SP4-SAP-Azure-VLI-BYOS-Production, but entry?
CVE-2020-11987: no packages for SUSE Manager Server Module 4.2, but entry?
CVE-2020-11987: no packages for Image SLES15-SP5-SAP-Azure-LI-BYOS, but entry?
CVE-2020-11987: no packages for Image SLES15-SP6-SAP-GCE, but entry?
CVE-2020-11987: no packages for Image SLES15-SP4-Manager-Server-4-3-BYOS-Azure, but entry?
CVE-2020-11987: no packages for Container bci/openjdk-devel:11-6.2, but entry?
CVE-2020-11987: no packages for Image SLES15-SP6-SAPCAL-GCE, but entry?
CVE-2020-11987: no packages for SUSE CaaS Platform 4.0, but entry?
CVE-2020-11987: no packages for Image SLES15-SP2-SAP-Azure-VLI-BYOS-Production, but entry?
CVE-2020-11987: no packages for Image SLES15-SP2-SAP-BYOS-EC2-HVM, but entry?
CVE-2020-11987: no packages for Container suse/manager/5.0/x86_64/server-attestation:5.0.0-beta2.2.16, but entry?
CVE-2020-11987: no packages for Container bci/kiwi:9.24.43-8.6, but entry?
CVE-2020-11987: no packages for Container bci/openjdk-devel:11-6.2, but entry?
CVE-2020-11987: no packages for Container bci/openjdk-devel:17-14.11, but entry?
CVE-2020-11987: no packages for Container bci/openjdk-devel:17-7.2, but entry?
CVE-2020-11987: no packages for Container bci/openjdk:11-7.1, but entry?
CVE-2020-11987: no packages for Container bci/openjdk:17-7.1, but entry?
CVE-2020-11987: no packages for Container bci/openjdk:latest, but entry?
CVE-2020-11987: no packages for Container suse/manager/5.0/x86_64/server-attestation:5.0.0-beta2.2.16, but entry?
CVE-2020-11987: no packages for Container suse/manager/5.0/x86_64/server:5.0.0-beta1.2.122, but entry?
CVE-2020-11987: no packages for Image SLES15-SP2-SAP-Azure, but entry?
CVE-2020-11987: no packages for Image SLES15-SP2-SAP-Azure-LI-BYOS-Production, but entry?
CVE-2020-11987: no packages for Image SLES15-SP2-SAP-Azure-VLI-BYOS-Production, but entry?
CVE-2020-11987: no packages for Image SLES15-SP2-SAP-BYOS-Azure, but entry?
CVE-2020-11987: no packages for Image SLES15-SP2-SAP-BYOS-EC2-HVM, but entry?
CVE-2020-11987: no packages for Image SLES15-SP2-SAP-BYOS-GCE, but entry?
CVE-2020-11987: no packages for Image SLES15-SP2-SAP-EC2-HVM, but entry?
CVE-2020-11987: no packages for Image SLES15-SP2-SAP-GCE, but entry?
CVE-2020-11987: no packages for Image SLES15-SP3-Manager-4-2-Server-BYOS-Azure, but entry?
CVE-2020-11987: no packages for Image SLES15-SP3-Manager-4-2-Server-BYOS-EC2-HVM, but entry?
CVE-2020-11987: no packages for Image SLES15-SP3-Manager-4-2-Server-BYOS-GCE, but entry?
CVE-2020-11987: no packages for Image SLES15-SP3-SAP-Azure-LI-BYOS-Production, but entry?
CVE-2020-11987: no packages for Image SLES15-SP3-SAP-Azure-VLI-BYOS-Production, but entry?
CVE-2020-11987: no packages for Image SLES15-SP3-SAPCAL-Azure, but entry?
CVE-2020-11987: no packages for Image SLES15-SP3-SAPCAL-EC2-HVM, but entry?
CVE-2020-11987: no packages for Image SLES15-SP3-SAPCAL-GCE, but entry?
CVE-2020-11987: no packages for Image SLES15-SP4-Manager-Server-4-3, but entry?
CVE-2020-11987: no packages for Image SLES15-SP4-Manager-Server-4-3-Azure-llc, but entry?
CVE-2020-11987: no packages for Image SLES15-SP4-Manager-Server-4-3-Azure-ltd, but entry?
CVE-2020-11987: no packages for Image SLES15-SP4-Manager-Server-4-3-BYOS, but entry?
CVE-2020-11987: no packages for Image SLES15-SP4-Manager-Server-4-3-BYOS-Azure, but entry?
CVE-2020-11987: no packages for Image SLES15-SP4-Manager-Server-4-3-BYOS-EC2, but entry?
CVE-2020-11987: no packages for Image SLES15-SP4-Manager-Server-4-3-BYOS-GCE, but entry?
CVE-2020-11987: no packages for Image SLES15-SP4-Manager-Server-4-3-EC2-llc, but entry?
CVE-2020-11987: no packages for Image SLES15-SP4-Manager-Server-4-3-EC2-ltd, but entry?
CVE-2020-11987: no packages for Image SLES15-SP4-SAP, but entry?
CVE-2020-11987: no packages for Image SLES15-SP4-SAP-Azure, but entry?
CVE-2020-11987: no packages for Image SLES15-SP4-SAP-Azure-LI-BYOS, but entry?
CVE-2020-11987: no packages for Image SLES15-SP4-SAP-Azure-LI-BYOS-Production, but entry?
CVE-2020-11987: no packages for Image SLES15-SP4-SAP-Azure-VLI-BYOS, but entry?
CVE-2020-11987: no packages for Image SLES15-SP4-SAP-Azure-VLI-BYOS-Production, but entry?
CVE-2020-11987: no packages for Image SLES15-SP4-SAP-EC2, but entry?
CVE-2020-11987: no packages for Image SLES15-SP4-SAP-GCE, but entry?
CVE-2020-11987: no packages for Image SLES15-SP4-SAPCAL, but entry?
CVE-2020-11987: no packages for Image SLES15-SP4-SAPCAL-Azure, but entry?
CVE-2020-11987: no packages for Image SLES15-SP4-SAPCAL-EC2, but entry?
CVE-2020-11987: no packages for Image SLES15-SP4-SAPCAL-GCE, but entry?
CVE-2020-11987: no packages for Image SLES15-SP5-SAP-Azure, but entry?
CVE-2020-11987: no packages for Image SLES15-SP5-SAP-Azure-LI-BYOS, but entry?
CVE-2020-11987: no packages for Image SLES15-SP5-SAP-Azure-LI-BYOS-Production, but entry?
CVE-2020-11987: no packages for Image SLES15-SP5-SAP-Azure-VLI-BYOS, but entry?
CVE-2020-11987: no packages for Image SLES15-SP5-SAP-Azure-VLI-BYOS-Production, but entry?
CVE-2020-11987: no packages for Image SLES15-SP5-SAP-EC2, but entry?
CVE-2020-11987: no packages for Image SLES15-SP5-SAP-GCE, but entry?
CVE-2020-11987: no packages for Image SLES15-SP5-SAPCAL-Azure, but entry?
CVE-2020-11987: no packages for Image SLES15-SP5-SAPCAL-EC2, but entry?
CVE-2020-11987: no packages for Image SLES15-SP5-SAPCAL-GCE, but entry?
CVE-2020-11987: no packages for Image SLES15-SP6-SAP, but entry?
CVE-2020-11987: no packages for Image SLES15-SP6-SAP-Azure, but entry?
CVE-2020-11987: no packages for Image SLES15-SP6-SAP-Azure-LI-BYOS, but entry?
CVE-2020-11987: no packages for Image SLES15-SP6-SAP-Azure-LI-BYOS-Production, but entry?
CVE-2020-11987: no packages for Image SLES15-SP6-SAP-Azure-VLI-BYOS, but entry?
CVE-2020-11987: no packages for Image SLES15-SP6-SAP-Azure-VLI-BYOS-Production, but entry?
CVE-2020-11987: no packages for Image SLES15-SP6-SAP-EC2, but entry?
CVE-2020-11987: no packages for Image SLES15-SP6-SAP-GCE, but entry?
CVE-2020-11987: no packages for Image SLES15-SP6-SAPCAL, but entry?
CVE-2020-11987: no packages for Image SLES15-SP6-SAPCAL-Azure, but entry?
CVE-2020-11987: no packages for Image SLES15-SP6-SAPCAL-EC2, but entry?
CVE-2020-11987: no packages for Image SLES15-SP6-SAPCAL-GCE, but entry?
CVE-2020-11987: no packages for SUSE CaaS Platform 4.0, but entry?
CVE-2020-11987: no packages for SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS, but entry?
CVE-2020-11987: no packages for SUSE Linux Enterprise Module for Basesystem 15 SP4, but entry?
CVE-2020-11987: no packages for SUSE Linux Enterprise Module for Basesystem 15 SP5, but entry?
CVE-2020-11987: no packages for SUSE Linux Enterprise Module for Basesystem 15 SP6, but entry?
CVE-2020-11987: no packages for SUSE Linux Enterprise Module for Development Tools 15 SP6, but entry?
CVE-2020-11987: no packages for SUSE Linux Enterprise Module for Package Hub 15 SP4, but entry?
CVE-2020-11987: no packages for SUSE Linux Enterprise Module for Package Hub 15 SP5, but entry?
CVE-2020-11987: no packages for SUSE Linux Enterprise Module for Web and Scripting 15 SP4, but entry?
CVE-2020-11987: no packages for SUSE Linux Enterprise Module for Web and Scripting 15 SP5, but entry?
CVE-2020-11987: no packages for SUSE Linux Enterprise Module for Web and Scripting 15 SP6, but entry?
CVE-2020-11987: no packages for SUSE Linux Enterprise Server 15 SP1-LTSS, but entry?
CVE-2020-11987: no packages for SUSE Linux Enterprise Server 15 SP4-TERADATA, but entry?
CVE-2020-11987: no packages for SUSE Linux Enterprise Server for SAP Applications 15 SP1, but entry?
CVE-2020-11987: no packages for SUSE Linux Enterprise Workstation Extension 15 SP4, but entry?
CVE-2020-11987: no packages for SUSE Linux Enterprise Workstation Extension 15 SP5, but entry?
CVE-2020-11987: no packages for SUSE Linux Enterprise Workstation Extension 15 SP6, but entry?
CVE-2020-11987: no packages for SUSE Manager Proxy 4.2, but entry?
CVE-2020-11987: no packages for SUSE Manager Retail Branch Server 4.2, but entry?
CVE-2020-11987: no packages for SUSE Manager Server 4.2, but entry?
CVE-2020-11987: no packages for SUSE Manager Server Module 4.2, but entry?
CVE-2020-11987: no packages for SUSE Manager Server Module 4.3, but entry?
CVE-2020-11987: no packages for Container bci/kiwi:9.24.43-8.6, but entry?
CVE-2020-11987: no packages for Container bci/openjdk-devel:11-6.2, but entry?
CVE-2020-11987: no packages for Container bci/openjdk-devel:17-14.11, but entry?
CVE-2020-11987: no packages for Container bci/openjdk-devel:17-7.2, but entry?
CVE-2020-11987: no packages for Container bci/openjdk:11-7.1, but entry?
CVE-2020-11987: no packages for Container bci/openjdk:17-7.1, but entry?
CVE-2020-11987: no packages for Container bci/openjdk:latest, but entry?
CVE-2020-11987: no packages for Container suse/manager/5.0/x86_64/server-attestation:5.0.0-beta2.2.16, but entry?
CVE-2020-11987: no packages for Container suse/manager/5.0/x86_64/server:5.0.0-beta1.2.122, but entry?
CVE-2020-11987: no packages for Image SLES15-SP2-SAP-Azure, but entry?
CVE-2020-11987: no packages for Image SLES15-SP2-SAP-Azure-LI-BYOS-Production, but entry?
CVE-2020-11987: no packages for Image SLES15-SP2-SAP-Azure-VLI-BYOS-Production, but entry?
CVE-2020-11987: no packages for Image SLES15-SP2-SAP-BYOS-Azure, but entry?
CVE-2020-11987: no packages for Image SLES15-SP2-SAP-BYOS-EC2-HVM, but entry?
CVE-2020-11987: no packages for Image SLES15-SP2-SAP-BYOS-GCE, but entry?
CVE-2020-11987: no packages for Image SLES15-SP2-SAP-EC2-HVM, but entry?
CVE-2020-11987: no packages for Image SLES15-SP2-SAP-GCE, but entry?
CVE-2020-11987: no packages for Image SLES15-SP3-Manager-4-2-Server-BYOS-Azure, but entry?
CVE-2020-11987: no packages for Image SLES15-SP3-Manager-4-2-Server-BYOS-EC2-HVM, but entry?
CVE-2020-11987: no packages for Image SLES15-SP3-Manager-4-2-Server-BYOS-GCE, but entry?
CVE-2020-11987: no packages for Image SLES15-SP3-SAP-Azure-LI-BYOS-Production, but entry?
CVE-2020-11987: no packages for Image SLES15-SP3-SAP-Azure-VLI-BYOS-Production, but entry?
CVE-2020-11987: no packages for Image SLES15-SP3-SAPCAL-Azure, but entry?
CVE-2020-11987: no packages for Image SLES15-SP3-SAPCAL-EC2-HVM, but entry?
CVE-2020-11987: no packages for Image SLES15-SP3-SAPCAL-GCE, but entry?
CVE-2020-11987: no packages for Image SLES15-SP4-Manager-Server-4-3, but entry?
CVE-2020-11987: no packages for Image SLES15-SP4-Manager-Server-4-3-Azure-llc, but entry?
CVE-2020-11987: no packages for Image SLES15-SP4-Manager-Server-4-3-Azure-ltd, but entry?
CVE-2020-11987: no packages for Image SLES15-SP4-Manager-Server-4-3-BYOS, but entry?
CVE-2020-11987: no packages for Image SLES15-SP4-Manager-Server-4-3-BYOS-Azure, but entry?
CVE-2020-11987: no packages for Image SLES15-SP4-Manager-Server-4-3-BYOS-EC2, but entry?
CVE-2020-11987: no packages for Image SLES15-SP4-Manager-Server-4-3-BYOS-GCE, but entry?
CVE-2020-11987: no packages for Image SLES15-SP4-Manager-Server-4-3-EC2-llc, but entry?
CVE-2020-11987: no packages for Image SLES15-SP4-Manager-Server-4-3-EC2-ltd, but entry?
CVE-2020-11987: no packages for Image SLES15-SP4-SAP, but entry?
CVE-2020-11987: no packages for Image SLES15-SP4-SAP-Azure, but entry?
CVE-2020-11987: no packages for Image SLES15-SP4-SAP-Azure-LI-BYOS, but entry?
CVE-2020-11987: no packages for Image SLES15-SP4-SAP-Azure-LI-BYOS-Production, but entry?
CVE-2020-11987: no packages for Image SLES15-SP4-SAP-Azure-VLI-BYOS, but entry?
CVE-2020-11987: no packages for Image SLES15-SP4-SAP-Azure-VLI-BYOS-Production, but entry?
CVE-2020-11987: no packages for Image SLES15-SP4-SAP-EC2, but entry?
CVE-2020-11987: no packages for Image SLES15-SP4-SAP-GCE, but entry?
CVE-2020-11987: no packages for Image SLES15-SP4-SAPCAL, but entry?
CVE-2020-11987: no packages for Image SLES15-SP4-SAPCAL-Azure, but entry?
CVE-2020-11987: no packages for Image SLES15-SP4-SAPCAL-EC2, but entry?
CVE-2020-11987: no packages for Image SLES15-SP4-SAPCAL-GCE, but entry?
CVE-2020-11987: no packages for Image SLES15-SP5-SAP-Azure, but entry?
CVE-2020-11987: no packages for Image SLES15-SP5-SAP-Azure-LI-BYOS, but entry?
CVE-2020-11987: no packages for Image SLES15-SP5-SAP-Azure-LI-BYOS-Production, but entry?
CVE-2020-11987: no packages for Image SLES15-SP5-SAP-Azure-VLI-BYOS, but entry?
CVE-2020-11987: no packages for Image SLES15-SP5-SAP-Azure-VLI-BYOS-Production, but entry?
CVE-2020-11987: no packages for Image SLES15-SP5-SAP-EC2, but entry?
CVE-2020-11987: no packages for Image SLES15-SP5-SAP-GCE, but entry?
CVE-2020-11987: no packages for Image SLES15-SP5-SAPCAL-Azure, but entry?
CVE-2020-11987: no packages for Image SLES15-SP5-SAPCAL-EC2, but entry?
CVE-2020-11987: no packages for Image SLES15-SP5-SAPCAL-GCE, but entry?
CVE-2020-11987: no packages for Image SLES15-SP6-SAP, but entry?
CVE-2020-11987: no packages for Image SLES15-SP6-SAP-Azure, but entry?
CVE-2020-11987: no packages for Image SLES15-SP6-SAP-Azure-LI-BYOS, but entry?
CVE-2020-11987: no packages for Image SLES15-SP6-SAP-Azure-LI-BYOS-Production, but entry?
CVE-2020-11987: no packages for Image SLES15-SP6-SAP-Azure-VLI-BYOS, but entry?
CVE-2020-11987: no packages for Image SLES15-SP6-SAP-Azure-VLI-BYOS-Production, but entry?
CVE-2020-11987: no packages for Image SLES15-SP6-SAP-EC2, but entry?
CVE-2020-11987: no packages for Image SLES15-SP6-SAP-GCE, but entry?
CVE-2020-11987: no packages for Image SLES15-SP6-SAPCAL, but entry?
CVE-2020-11987: no packages for Image SLES15-SP6-SAPCAL-Azure, but entry?
CVE-2020-11987: no packages for Image SLES15-SP6-SAPCAL-EC2, but entry?
CVE-2020-11987: no packages for Image SLES15-SP6-SAPCAL-GCE, but entry?
CVE-2020-11987: no packages for SUSE CaaS Platform 4.0, but entry?
CVE-2020-11987: no packages for SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS, but entry?
CVE-2020-11987: no packages for SUSE Linux Enterprise Module for Basesystem 15 SP4, but entry?
CVE-2020-11987: no packages for SUSE Linux Enterprise Module for Basesystem 15 SP5, but entry?
CVE-2020-11987: no packages for SUSE Linux Enterprise Module for Basesystem 15 SP6, but entry?
CVE-2020-11987: no packages for SUSE Linux Enterprise Module for Development Tools 15 SP6, but entry?
CVE-2020-11987: no packages for SUSE Linux Enterprise Module for Package Hub 15 SP4, but entry?
CVE-2020-11987: no packages for SUSE Linux Enterprise Module for Package Hub 15 SP5, but entry?
CVE-2020-11987: no packages for SUSE Linux Enterprise Module for Web and Scripting 15 SP4, but entry?
CVE-2020-11987: no packages for SUSE Linux Enterprise Module for Web and Scripting 15 SP5, but entry?
CVE-2020-11987: no packages for SUSE Linux Enterprise Module for Web and Scripting 15 SP6, but entry?
CVE-2020-11987: no packages for SUSE Linux Enterprise Server 15 SP1-LTSS, but entry?
CVE-2020-11987: no packages for SUSE Linux Enterprise Server 15 SP4-TERADATA, but entry?
CVE-2020-11987: no packages for SUSE Linux Enterprise Server for SAP Applications 15 SP1, but entry?
CVE-2020-11987: no packages for SUSE Linux Enterprise Workstation Extension 15 SP4, but entry?
CVE-2020-11987: no packages for SUSE Linux Enterprise Workstation Extension 15 SP5, but entry?
CVE-2020-11987: no packages for SUSE Linux Enterprise Workstation Extension 15 SP6, but entry?
CVE-2020-11987: no packages for SUSE Manager Proxy 4.2, but entry?
CVE-2020-11987: no packages for SUSE Manager Retail Branch Server 4.2, but entry?
CVE-2020-11987: no packages for SUSE Manager Server 4.2, but entry?
CVE-2020-11987: no packages for SUSE Manager Server Module 4.2, but entry?
CVE-2020-11987: no packages for SUSE Manager Server Module 4.3, but entry?
CVE-2020-11979: no packages for Image SLES15-SP5-SAP-Azure-VLI-BYOS-Production, but entry?
CVE-2020-11979: no packages for Image SLES15-SP6-SAP-Azure-VLI-BYOS, but entry?
CVE-2020-11979: no packages for Image SLES15-SP5-SAP-Azure, but entry?
CVE-2020-11979: no packages for Image SLES15-SP6-SAPCAL-Azure, but entry?
CVE-2020-11979: no packages for SUSE Linux Enterprise Server 15 SP1-LTSS, but entry?
CVE-2020-11979: no packages for Image SLES15-SP5-SAPCAL-GCE, but entry?
CVE-2020-11979: no packages for Image SLES15-SP6-SAP-Azure, but entry?
CVE-2020-11979: no packages for Image SLES15-SP6-SAP-EC2, but entry?
CVE-2020-11979: no packages for Image SLES15-SP2-SAP-EC2-HVM, but entry?
CVE-2020-11979: no packages for Image SLES15-SP3-SAP-Azure-LI-BYOS-Production, but entry?
CVE-2020-11979: no packages for Image SLES15-SP4-SAPCAL-EC2, but entry?
CVE-2020-11979: no packages for SUSE Linux Enterprise Module for Web and Scripting 15 SP4, but entry?
CVE-2020-11979: no packages for Image SLES15-SP4-SAPCAL-Azure, but entry?
CVE-2020-11979: no packages for Image SLES15-SP5-SAPCAL-EC2, but entry?
CVE-2020-11979: no packages for Container bci/openjdk:11-7.1, but entry?
CVE-2020-11979: no packages for SUSE Linux Enterprise Server for SAP Applications 15 SP1, but entry?
CVE-2020-11979: no packages for Image SLES15-SP4-SAP-EC2, but entry?
CVE-2020-11979: no packages for SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS, but entry?
CVE-2020-11979: no packages for Container bci/openjdk-devel:17-14.11, but entry?
CVE-2020-11979: no packages for Image SLES15-SP2-SAP-Azure-LI-BYOS-Production, but entry?
CVE-2020-11979: no packages for Image SLES15-SP4-SAP-Azure-LI-BYOS-Production, but entry?
CVE-2020-11979: no packages for Image SLES15-SP2-SAP-Azure, but entry?
CVE-2020-11979: no packages for SUSE Linux Enterprise Module for Basesystem 15 SP5, but entry?
CVE-2020-11979: no packages for Image SLES15-SP4-SAP-Azure, but entry?
CVE-2020-11979: no packages for SUSE Linux Enterprise Workstation Extension 15 SP4, but entry?
CVE-2020-11979: no packages for SUSE Manager Proxy 4.2, but entry?
CVE-2020-11979: no packages for SUSE Linux Enterprise Module for Web and Scripting 15 SP5, but entry?
CVE-2020-11979: no packages for Image SLES15-SP3-SAPCAL-Azure, but entry?
CVE-2020-11979: no packages for SUSE Linux Enterprise Module for Basesystem 15 SP6, but entry?
CVE-2020-11979: no packages for Image SLES15-SP5-SAP-Azure-LI-BYOS-Production, but entry?
CVE-2020-11979: no packages for Image SLES15-SP5-SAP-Azure-VLI-BYOS, but entry?
CVE-2020-11979: no packages for Image SLES15-SP6-SAPCAL, but entry?
CVE-2020-11979: no packages for Image SLES15-SP2-SAP-BYOS-GCE, but entry?
CVE-2020-11979: no packages for SUSE CaaS Platform 4.0, but entry?
CVE-2020-11979: no packages for Container suse/manager/5.0/x86_64/server-attestation:5.0.0-beta2.2.16, but entry?
CVE-2020-11979: no packages for Image SLES15-SP2-SAP-Azure-VLI-BYOS-Production, but entry?
CVE-2020-11979: no packages for Image SLES15-SP2-SAP-BYOS-EC2-HVM, but entry?
CVE-2020-11979: no packages for Container bci/openjdk-devel:17-7.2, but entry?
CVE-2020-11979: no packages for Image SLES15-SP5-SAPCAL-Azure, but entry?
CVE-2020-11979: no packages for SUSE Linux Enterprise Workstation Extension 15 SP5, but entry?
CVE-2020-11979: no packages for Image SLES15-SP5-SAP-GCE, but entry?
CVE-2020-11979: no packages for Image SLES15-SP6-SAP-GCE, but entry?
CVE-2020-11979: no packages for Container bci/openjdk-devel:11-6.2, but entry?
CVE-2020-11979: no packages for Image SLES15-SP6-SAPCAL-GCE, but entry?
CVE-2020-11979: no packages for Image SLES15-SP4-SAP-Azure-VLI-BYOS-Production, but entry?
CVE-2020-11979: no packages for Image SLES15-SP5-SAP-Azure-LI-BYOS, but entry?
CVE-2020-11979: no packages for Image SLES15-SP4-SAP-GCE, but entry?
CVE-2020-11979: no packages for Image SLES15-SP6-SAP-Azure-LI-BYOS, but entry?
CVE-2020-11979: no packages for Image SLES15-SP4-SAP-Azure-VLI-BYOS, but entry?
CVE-2020-11979: no packages for SUSE Linux Enterprise Server 15 SP4-TERADATA, but entry?
CVE-2020-11979: no packages for Image SLES15-SP6-SAP-Azure-VLI-BYOS-Production, but entry?
CVE-2020-11979: no packages for SUSE Linux Enterprise Workstation Extension 15 SP6, but entry?
CVE-2020-11979: no packages for Image SLES15-SP2-SAP-GCE, but entry?
CVE-2020-11979: no packages for Container bci/kiwi:9.24.43-8.6, but entry?
CVE-2020-11979: no packages for Image SLES15-SP4-SAP-Azure-LI-BYOS, but entry?
CVE-2020-11979: no packages for SUSE Manager Server 4.2, but entry?
CVE-2020-11979: no packages for Image SLES15-SP3-SAPCAL-EC2-HVM, but entry?
CVE-2020-11979: no packages for Image SLES15-SP6-SAP, but entry?
CVE-2020-11979: no packages for Image SLES15-SP3-SAPCAL-GCE, but entry?
CVE-2020-11979: no packages for Image SLES15-SP4-SAPCAL-GCE, but entry?
CVE-2020-11979: no packages for SUSE Linux Enterprise Module for Package Hub 15 SP4, but entry?
CVE-2020-11979: no packages for Image SLES15-SP6-SAP-Azure-LI-BYOS-Production, but entry?
CVE-2020-11979: no packages for Image SLES15-SP4-SAP, but entry?
CVE-2020-11979: no packages for SUSE Manager Retail Branch Server 4.2, but entry?
CVE-2020-11979: no packages for Image SLES15-SP6-SAPCAL-EC2, but entry?
CVE-2020-11979: no packages for Image SLES15-SP4-SAPCAL, but entry?
CVE-2020-11979: no packages for SUSE Linux Enterprise Module for Web and Scripting 15 SP6, but entry?
CVE-2020-11979: no packages for Container bci/openjdk:latest, but entry?
CVE-2020-11979: no packages for Image SLES15-SP5-SAP-EC2, but entry?
CVE-2020-11979: no packages for Image SLES15-SP2-SAP-BYOS-Azure, but entry?
CVE-2020-11979: no packages for Image SLES15-SP3-SAP-Azure-VLI-BYOS-Production, but entry?
CVE-2020-11979: no packages for Container bci/openjdk:17-7.1, but entry?
CVE-2020-11979: no packages for SUSE Linux Enterprise Module for Basesystem 15 SP4, but entry?
CVE-2020-11979: no packages for Container bci/kiwi:9.24.43-8.6, but entry?
CVE-2020-11979: no packages for Container bci/openjdk-devel:11-6.2, but entry?
CVE-2020-11979: no packages for Container bci/openjdk-devel:17-14.11, but entry?
CVE-2020-11979: no packages for Container bci/openjdk-devel:17-7.2, but entry?
CVE-2020-11979: no packages for Container bci/openjdk:11-7.1, but entry?
CVE-2020-11979: no packages for Container bci/openjdk:17-7.1, but entry?
CVE-2020-11979: no packages for Container bci/openjdk:latest, but entry?
CVE-2020-11979: no packages for Container suse/manager/5.0/x86_64/server-attestation:5.0.0-beta2.2.16, but entry?
CVE-2020-11979: no packages for Image SLES15-SP2-SAP-Azure, but entry?
CVE-2020-11979: no packages for Image SLES15-SP2-SAP-Azure-LI-BYOS-Production, but entry?
CVE-2020-11979: no packages for Image SLES15-SP2-SAP-Azure-VLI-BYOS-Production, but entry?
CVE-2020-11979: no packages for Image SLES15-SP2-SAP-BYOS-Azure, but entry?
CVE-2020-11979: no packages for Image SLES15-SP2-SAP-BYOS-EC2-HVM, but entry?
CVE-2020-11979: no packages for Image SLES15-SP2-SAP-BYOS-GCE, but entry?
CVE-2020-11979: no packages for Image SLES15-SP2-SAP-EC2-HVM, but entry?
CVE-2020-11979: no packages for Image SLES15-SP2-SAP-GCE, but entry?
CVE-2020-11979: no packages for Image SLES15-SP3-SAP-Azure-LI-BYOS-Production, but entry?
CVE-2020-11979: no packages for Image SLES15-SP3-SAP-Azure-VLI-BYOS-Production, but entry?
CVE-2020-11979: no packages for Image SLES15-SP3-SAPCAL-Azure, but entry?
CVE-2020-11979: no packages for Image SLES15-SP3-SAPCAL-EC2-HVM, but entry?
CVE-2020-11979: no packages for Image SLES15-SP3-SAPCAL-GCE, but entry?
CVE-2020-11979: no packages for Image SLES15-SP4-SAP, but entry?
CVE-2020-11979: no packages for Image SLES15-SP4-SAP-Azure, but entry?
CVE-2020-11979: no packages for Image SLES15-SP4-SAP-Azure-LI-BYOS, but entry?
CVE-2020-11979: no packages for Image SLES15-SP4-SAP-Azure-LI-BYOS-Production, but entry?
CVE-2020-11979: no packages for Image SLES15-SP4-SAP-Azure-VLI-BYOS, but entry?
CVE-2020-11979: no packages for Image SLES15-SP4-SAP-Azure-VLI-BYOS-Production, but entry?
CVE-2020-11979: no packages for Image SLES15-SP4-SAP-EC2, but entry?
CVE-2020-11979: no packages for Image SLES15-SP4-SAP-GCE, but entry?
CVE-2020-11979: no packages for Image SLES15-SP4-SAPCAL, but entry?
CVE-2020-11979: no packages for Image SLES15-SP4-SAPCAL-Azure, but entry?
CVE-2020-11979: no packages for Image SLES15-SP4-SAPCAL-EC2, but entry?
CVE-2020-11979: no packages for Image SLES15-SP4-SAPCAL-GCE, but entry?
CVE-2020-11979: no packages for Image SLES15-SP5-SAP-Azure, but entry?
CVE-2020-11979: no packages for Image SLES15-SP5-SAP-Azure-LI-BYOS, but entry?
CVE-2020-11979: no packages for Image SLES15-SP5-SAP-Azure-LI-BYOS-Production, but entry?
CVE-2020-11979: no packages for Image SLES15-SP5-SAP-Azure-VLI-BYOS, but entry?
CVE-2020-11979: no packages for Image SLES15-SP5-SAP-Azure-VLI-BYOS-Production, but entry?
CVE-2020-11979: no packages for Image SLES15-SP5-SAP-EC2, but entry?
CVE-2020-11979: no packages for Image SLES15-SP5-SAP-GCE, but entry?
CVE-2020-11979: no packages for Image SLES15-SP5-SAPCAL-Azure, but entry?
CVE-2020-11979: no packages for Image SLES15-SP5-SAPCAL-EC2, but entry?
CVE-2020-11979: no packages for Image SLES15-SP5-SAPCAL-GCE, but entry?
CVE-2020-11979: no packages for Image SLES15-SP6-SAP, but entry?
CVE-2020-11979: no packages for Image SLES15-SP6-SAP-Azure, but entry?
CVE-2020-11979: no packages for Image SLES15-SP6-SAP-Azure-LI-BYOS, but entry?
CVE-2020-11979: no packages for Image SLES15-SP6-SAP-Azure-LI-BYOS-Production, but entry?
CVE-2020-11979: no packages for Image SLES15-SP6-SAP-Azure-VLI-BYOS, but entry?
CVE-2020-11979: no packages for Image SLES15-SP6-SAP-Azure-VLI-BYOS-Production, but entry?
CVE-2020-11979: no packages for Image SLES15-SP6-SAP-EC2, but entry?
CVE-2020-11979: no packages for Image SLES15-SP6-SAP-GCE, but entry?
CVE-2020-11979: no packages for Image SLES15-SP6-SAPCAL, but entry?
CVE-2020-11979: no packages for Image SLES15-SP6-SAPCAL-Azure, but entry?
CVE-2020-11979: no packages for Image SLES15-SP6-SAPCAL-EC2, but entry?
CVE-2020-11979: no packages for Image SLES15-SP6-SAPCAL-GCE, but entry?
CVE-2020-11979: no packages for SUSE CaaS Platform 4.0, but entry?
CVE-2020-11979: no packages for SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS, but entry?
CVE-2020-11979: no packages for SUSE Linux Enterprise Module for Basesystem 15 SP4, but entry?
CVE-2020-11979: no packages for SUSE Linux Enterprise Module for Basesystem 15 SP5, but entry?
CVE-2020-11979: no packages for SUSE Linux Enterprise Module for Basesystem 15 SP6, but entry?
CVE-2020-11979: no packages for SUSE Linux Enterprise Module for Package Hub 15 SP4, but entry?
CVE-2020-11979: no packages for SUSE Linux Enterprise Module for Web and Scripting 15 SP4, but entry?
CVE-2020-11979: no packages for SUSE Linux Enterprise Module for Web and Scripting 15 SP5, but entry?
CVE-2020-11979: no packages for SUSE Linux Enterprise Module for Web and Scripting 15 SP6, but entry?
CVE-2020-11979: no packages for SUSE Linux Enterprise Server 15 SP1-LTSS, but entry?
CVE-2020-11979: no packages for SUSE Linux Enterprise Server 15 SP4-TERADATA, but entry?
CVE-2020-11979: no packages for SUSE Linux Enterprise Server for SAP Applications 15 SP1, but entry?
CVE-2020-11979: no packages for SUSE Linux Enterprise Workstation Extension 15 SP4, but entry?
CVE-2020-11979: no packages for SUSE Linux Enterprise Workstation Extension 15 SP5, but entry?
CVE-2020-11979: no packages for SUSE Linux Enterprise Workstation Extension 15 SP6, but entry?
CVE-2020-11979: no packages for SUSE Manager Proxy 4.2, but entry?
CVE-2020-11979: no packages for SUSE Manager Retail Branch Server 4.2, but entry?
CVE-2020-11979: no packages for SUSE Manager Server 4.2, but entry?
CVE-2020-11979: no packages for Container bci/kiwi:9.24.43-8.6, but entry?
CVE-2020-11979: no packages for Container bci/openjdk-devel:11-6.2, but entry?
CVE-2020-11979: no packages for Container bci/openjdk-devel:17-14.11, but entry?
CVE-2020-11979: no packages for Container bci/openjdk-devel:17-7.2, but entry?
CVE-2020-11979: no packages for Container bci/openjdk:11-7.1, but entry?
CVE-2020-11979: no packages for Container bci/openjdk:17-7.1, but entry?
CVE-2020-11979: no packages for Container bci/openjdk:latest, but entry?
CVE-2020-11979: no packages for Container suse/manager/5.0/x86_64/server-attestation:5.0.0-beta2.2.16, but entry?
CVE-2020-11979: no packages for Image SLES15-SP2-SAP-Azure, but entry?
CVE-2020-11979: no packages for Image SLES15-SP2-SAP-Azure-LI-BYOS-Production, but entry?
CVE-2020-11979: no packages for Image SLES15-SP2-SAP-Azure-VLI-BYOS-Production, but entry?
CVE-2020-11979: no packages for Image SLES15-SP2-SAP-BYOS-Azure, but entry?
CVE-2020-11979: no packages for Image SLES15-SP2-SAP-BYOS-EC2-HVM, but entry?
CVE-2020-11979: no packages for Image SLES15-SP2-SAP-BYOS-GCE, but entry?
CVE-2020-11979: no packages for Image SLES15-SP2-SAP-EC2-HVM, but entry?
CVE-2020-11979: no packages for Image SLES15-SP2-SAP-GCE, but entry?
CVE-2020-11979: no packages for Image SLES15-SP3-SAP-Azure-LI-BYOS-Production, but entry?
CVE-2020-11979: no packages for Image SLES15-SP3-SAP-Azure-VLI-BYOS-Production, but entry?
CVE-2020-11979: no packages for Image SLES15-SP3-SAPCAL-Azure, but entry?
CVE-2020-11979: no packages for Image SLES15-SP3-SAPCAL-EC2-HVM, but entry?
CVE-2020-11979: no packages for Image SLES15-SP3-SAPCAL-GCE, but entry?
CVE-2020-11979: no packages for Image SLES15-SP4-SAP, but entry?
CVE-2020-11979: no packages for Image SLES15-SP4-SAP-Azure, but entry?
CVE-2020-11979: no packages for Image SLES15-SP4-SAP-Azure-LI-BYOS, but entry?
CVE-2020-11979: no packages for Image SLES15-SP4-SAP-Azure-LI-BYOS-Production, but entry?
CVE-2020-11979: no packages for Image SLES15-SP4-SAP-Azure-VLI-BYOS, but entry?
CVE-2020-11979: no packages for Image SLES15-SP4-SAP-Azure-VLI-BYOS-Production, but entry?
CVE-2020-11979: no packages for Image SLES15-SP4-SAP-EC2, but entry?
CVE-2020-11979: no packages for Image SLES15-SP4-SAP-GCE, but entry?
CVE-2020-11979: no packages for Image SLES15-SP4-SAPCAL, but entry?
CVE-2020-11979: no packages for Image SLES15-SP4-SAPCAL-Azure, but entry?
CVE-2020-11979: no packages for Image SLES15-SP4-SAPCAL-EC2, but entry?
CVE-2020-11979: no packages for Image SLES15-SP4-SAPCAL-GCE, but entry?
CVE-2020-11979: no packages for Image SLES15-SP5-SAP-Azure, but entry?
CVE-2020-11979: no packages for Image SLES15-SP5-SAP-Azure-LI-BYOS, but entry?
CVE-2020-11979: no packages for Image SLES15-SP5-SAP-Azure-LI-BYOS-Production, but entry?
CVE-2020-11979: no packages for Image SLES15-SP5-SAP-Azure-VLI-BYOS, but entry?
CVE-2020-11979: no packages for Image SLES15-SP5-SAP-Azure-VLI-BYOS-Production, but entry?
CVE-2020-11979: no packages for Image SLES15-SP5-SAP-EC2, but entry?
CVE-2020-11979: no packages for Image SLES15-SP5-SAP-GCE, but entry?
CVE-2020-11979: no packages for Image SLES15-SP5-SAPCAL-Azure, but entry?
CVE-2020-11979: no packages for Image SLES15-SP5-SAPCAL-EC2, but entry?
CVE-2020-11979: no packages for Image SLES15-SP5-SAPCAL-GCE, but entry?
CVE-2020-11979: no packages for Image SLES15-SP6-SAP, but entry?
CVE-2020-11979: no packages for Image SLES15-SP6-SAP-Azure, but entry?
CVE-2020-11979: no packages for Image SLES15-SP6-SAP-Azure-LI-BYOS, but entry?
CVE-2020-11979: no packages for Image SLES15-SP6-SAP-Azure-LI-BYOS-Production, but entry?
CVE-2020-11979: no packages for Image SLES15-SP6-SAP-Azure-VLI-BYOS, but entry?
CVE-2020-11979: no packages for Image SLES15-SP6-SAP-Azure-VLI-BYOS-Production, but entry?
CVE-2020-11979: no packages for Image SLES15-SP6-SAP-EC2, but entry?
CVE-2020-11979: no packages for Image SLES15-SP6-SAP-GCE, but entry?
CVE-2020-11979: no packages for Image SLES15-SP6-SAPCAL, but entry?
CVE-2020-11979: no packages for Image SLES15-SP6-SAPCAL-Azure, but entry?
CVE-2020-11979: no packages for Image SLES15-SP6-SAPCAL-EC2, but entry?
CVE-2020-11979: no packages for Image SLES15-SP6-SAPCAL-GCE, but entry?
CVE-2020-11979: no packages for SUSE CaaS Platform 4.0, but entry?
CVE-2020-11979: no packages for SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS, but entry?
CVE-2020-11979: no packages for SUSE Linux Enterprise Module for Basesystem 15 SP4, but entry?
CVE-2020-11979: no packages for SUSE Linux Enterprise Module for Basesystem 15 SP5, but entry?
CVE-2020-11979: no packages for SUSE Linux Enterprise Module for Basesystem 15 SP6, but entry?
CVE-2020-11979: no packages for SUSE Linux Enterprise Module for Package Hub 15 SP4, but entry?
CVE-2020-11979: no packages for SUSE Linux Enterprise Module for Web and Scripting 15 SP4, but entry?
CVE-2020-11979: no packages for SUSE Linux Enterprise Module for Web and Scripting 15 SP5, but entry?
CVE-2020-11979: no packages for SUSE Linux Enterprise Module for Web and Scripting 15 SP6, but entry?
CVE-2020-11979: no packages for SUSE Linux Enterprise Server 15 SP1-LTSS, but entry?
CVE-2020-11979: no packages for SUSE Linux Enterprise Server 15 SP4-TERADATA, but entry?
CVE-2020-11979: no packages for SUSE Linux Enterprise Server for SAP Applications 15 SP1, but entry?
CVE-2020-11979: no packages for SUSE Linux Enterprise Workstation Extension 15 SP4, but entry?
CVE-2020-11979: no packages for SUSE Linux Enterprise Workstation Extension 15 SP5, but entry?
CVE-2020-11979: no packages for SUSE Linux Enterprise Workstation Extension 15 SP6, but entry?
CVE-2020-11979: no packages for SUSE Manager Proxy 4.2, but entry?
CVE-2020-11979: no packages for SUSE Manager Retail Branch Server 4.2, but entry?
CVE-2020-11979: no packages for SUSE Manager Server 4.2, but entry?
skipping CVE-2020-11984 as CVE page is older than CVRF-CVE file.
skipping CVE-2020-11947 as CVE page is older than CVRF-CVE file.
No V5 entry found for CVE-2020-11936 / /home/securitybot/prod/cve-database/cvelistV5/cves/2020/11xxxx/CVE-2020-11936.json:No such file or directory
skipping CVE-2020-11935 as CVE page is older than CVRF-CVE file.
skipping CVE-2020-11931 as CVE page is older than CVRF-CVE file.
no cpe found for SUSE Package Hub 15 SP1 in CVE-2020-11888
skipping CVE-2020-11884 as CVE page is older than CVRF-CVE file.
no cpe found for SUSE Liberty Linux 7 LTSS in CVE-2020-11868
skipping CVE-2020-11869 as CVE page is older than CVRF-CVE file.
no cpe found for SUSE Package Hub 15 SP1 in CVE-2020-11867
no cpe found for SUSE Package Hub 15 SP2 in CVE-2020-11867
skipping CVE-2020-11810 as CVE page is older than CVRF-CVE file.
skipping CVE-2020-11800 as CVE page is older than CVRF-CVE file.
no cpe found for SUSE Liberty Linux 7 LTSS in CVE-2020-11764
skipping CVE-2020-11765 as CVE page is older than CVRF-CVE file.
no cpe found for SUSE Liberty Linux 7 LTSS in CVE-2020-11763
skipping CVE-2020-11762 as CVE page is older than CVRF-CVE file.
skipping CVE-2020-11761 as CVE page is older than CVRF-CVE file.
skipping CVE-2020-11759 as CVE page is older than CVRF-CVE file.
no cpe found for SUSE Package Hub 15 SP1 in CVE-2020-11722
skipping CVE-2020-11669 as CVE page is older than CVRF-CVE file.
no cpe found for SUSE Package Hub 15 SP1 in CVE-2020-11653
skipping CVE-2020-11656 as CVE page is older than CVRF-CVE file.
skipping CVE-2020-11655 as CVE page is older than CVRF-CVE file.
skipping CVE-2020-11612 as CVE page is older than CVRF-CVE file.
no cpe found for HPE Helion OpenStack Cloud 8 in CVE-2020-11538
skipping CVE-2020-11501 as CVE page is older than CVRF-CVE file.
no cpe found for HPE Helion OpenStack Cloud 8 in CVE-2020-11110
no cpe found for SUSE Manager Tools 15 SP1 in CVE-2020-11110
no cpe found for HPE Helion OpenStack Cloud 8 in CVE-2020-11100
skipping CVE-2020-11102 as CVE page is older than CVRF-CVE file.
no cpe found for HPE Helion OpenStack Cloud 8 in CVE-2020-11078
no cpe found for SUSE Package Hub 15 SP2 in CVE-2020-11078
skipping CVE-2020-11077 as CVE page is older than CVRF-CVE file.
skipping CVE-2020-11076 as CVE page is older than CVRF-CVE file.
CVE-2020-11023: no packages for Container suse/manager/5.0/x86_64/server:5.0.0-beta1.2.122, but entry?
CVE-2020-11023: no packages for Image SLES15-SP3-SAPCAL-EC2-HVM, but entry?
CVE-2020-11023: no packages for SUSE Manager Server 4.2, but entry?
CVE-2020-11023: no packages for Image SLES15-SP4-SAP-Azure-LI-BYOS, but entry?
CVE-2020-11023: no packages for SUSE Package Hub 15 SP1, but entry?
CVE-2020-11023: no packages for Image SLES15-SP6-SAP, but entry?
CVE-2020-11023: no packages for Image SLES15-SP3-SAPCAL-GCE, but entry?
CVE-2020-11023: no packages for Image SLES15-SP1-Manager-4-0-Azure-BYOS-Server, but entry?
CVE-2020-11023: no packages for SUSE Liberty Linux 8, but entry?
CVE-2020-11023: no packages for Image SLES15-SP4-SAPCAL-GCE, but entry?
CVE-2020-11023: no packages for Image SLES15-SP6-SAP-Azure-LI-BYOS-Production, but entry?
CVE-2020-11023: no packages for Image SLES15-SP1-Manager-4-0-Azure-BYOS-Proxy, but entry?
CVE-2020-11023: no packages for SUSE Linux Enterprise Module for Package Hub 15 SP4, but entry?
CVE-2020-11023: no packages for SUSE Manager Retail Branch Server 4.2, but entry?
CVE-2020-11023: no packages for SUSE Package Hub 12, but entry?
CVE-2020-11023: no packages for Image SLES15-SP4-SAP, but entry?
CVE-2020-11023: no packages for Image SLES15-SP4-Manager-Server-4-3-EC2-llc, but entry?
CVE-2020-11023: no packages for Image SLES15-SP4-SAPCAL, but entry?
CVE-2020-11023: no packages for Image SLES15-SP6-SAPCAL-EC2, but entry?
CVE-2020-11023: no packages for Container bci/openjdk:latest, but entry?
CVE-2020-11023: no packages for SUSE Linux Enterprise Module for Web and Scripting 15 SP6, but entry?
CVE-2020-11023: no packages for Image SLES15-SP5-SAP-EC2, but entry?
CVE-2020-11023: no packages for Image SLES15-SP2-SAP-BYOS-Azure, but entry?
CVE-2020-11023: no packages for Image SLES15-SP4-Manager-Server-4-3-EC2-ltd, but entry?
CVE-2020-11023: no packages for Image SLES15-SP3-SAP-Azure-VLI-BYOS-Production, but entry?
CVE-2020-11023: no packages for Container bci/openjdk:17-7.1, but entry?
CVE-2020-11023: no packages for SUSE Linux Enterprise Module for Package Hub 15 SP6, but entry?
CVE-2020-11023: no packages for SUSE Linux Enterprise Module for Basesystem 15 SP4, but entry?
CVE-2020-11023: no packages for Image SLES15-SP1-Manager-4-0-EC2-HVM-BYOS-Proxy, but entry?
CVE-2020-11023: no packages for SUSE CaaS Platform 4.0, but entry?
CVE-2020-11023: no packages for Container suse/manager/5.0/x86_64/server-attestation:5.0.0-beta2.2.16, but entry?
CVE-2020-11023: no packages for Image SLES15-SP2-SAP-Azure-VLI-BYOS-Production, but entry?
CVE-2020-11023: no packages for Image SLES15-SP2-SAP-BYOS-EC2-HVM, but entry?
CVE-2020-11023: no packages for Container bci/openjdk-devel:17-7.2, but entry?
CVE-2020-11023: no packages for Image SLES15-SP5-SAPCAL-Azure, but entry?
CVE-2020-11023: no packages for SUSE Linux Enterprise Workstation Extension 15 SP5, but entry?
CVE-2020-11023: no packages for Image SLES15-SP5-SAP-GCE, but entry?
CVE-2020-11023: no packages for Image SLES15-SP4-Manager-Server-4-3-BYOS-Azure, but entry?
CVE-2020-11023: no packages for Image SLES15-SP6-SAP-GCE, but entry?
CVE-2020-11023: no packages for Image SLES15-SP6-SAPCAL-GCE, but entry?
CVE-2020-11023: no packages for Container bci/openjdk-devel:11-6.2, but entry?
CVE-2020-11023: no packages for SUSE Package Hub 15 SP2, but entry?
CVE-2020-11023: no packages for Image SLES15-SP4-SAP-Azure-VLI-BYOS-Production, but entry?
CVE-2020-11023: no packages for Image SLES15-SP5-SAP-Azure-LI-BYOS, but entry?
CVE-2020-11023: no packages for SUSE Manager Server Module 4.2, but entry?
CVE-2020-11023: no packages for Image SLES15-SP4-SAP-GCE, but entry?
CVE-2020-11023: no packages for Image SLES15-SP1-Manager-4-0-EC2-HVM-BYOS-Server, but entry?
CVE-2020-11023: no packages for SUSE Linux Enterprise Server 15 SP4-TERADATA, but entry?
CVE-2020-11023: no packages for Image SLES15-SP6-SAP-Azure-LI-BYOS, but entry?
CVE-2020-11023: no packages for Image SLES15-SP4-SAP-Azure-VLI-BYOS, but entry?
CVE-2020-11023: no packages for Image SLES15-SP6-SAP-Azure-VLI-BYOS-Production, but entry?
CVE-2020-11023: no packages for SUSE Manager Server Module 4.3, but entry?
CVE-2020-11023: no packages for SUSE Linux Enterprise Workstation Extension 15 SP6, but entry?
CVE-2020-11023: no packages for Image SLES15-SP2-SAP-GCE, but entry?
CVE-2020-11023: no packages for Container bci/kiwi:9.24.43-8.6, but entry?
CVE-2020-11023: no packages for Image SLES15-SP2-SAP-Azure-LI-BYOS-Production, but entry?
CVE-2020-11023: no packages for Image SLES15-SP4-SAP-Azure-LI-BYOS-Production, but entry?
CVE-2020-11023: no packages for Image SLES15-SP4-Manager-Server-4-3-BYOS, but entry?
CVE-2020-11023: no packages for openSUSE Leap 15.2, but entry?
CVE-2020-11023: no packages for Image SLES15-SP2-SAP-Azure, but entry?
CVE-2020-11023: no packages for SUSE Linux Enterprise Module for Basesystem 15 SP5, but entry?
CVE-2020-11023: no packages for SUSE Linux Enterprise Module for Package Hub 15 SP5, but entry?
CVE-2020-11023: no packages for Image SLES15-SP4-SAP-Azure, but entry?
CVE-2020-11023: no packages for SUSE Linux Enterprise Workstation Extension 15 SP4, but entry?
CVE-2020-11023: no packages for SUSE Liberty Linux 7, but entry?
CVE-2020-11023: no packages for Image SLES15-SP4-Manager-Server-4-3, but entry?
CVE-2020-11023: no packages for SUSE Manager Proxy 4.2, but entry?
CVE-2020-11023: no packages for Image SLES15-SP3-Manager-4-2-Server-BYOS-GCE, but entry?
CVE-2020-11023: no packages for SUSE Linux Enterprise Module for Web and Scripting 15 SP5, but entry?
CVE-2020-11023: no packages for Image SLES15-SP4-Manager-Server-4-3-Azure-ltd, but entry?
CVE-2020-11023: no packages for Image SLES15-SP3-SAPCAL-Azure, but entry?
CVE-2020-11023: no packages for SUSE Linux Enterprise Module for Basesystem 15 SP6, but entry?
CVE-2020-11023: no packages for Image SLES15-SP5-SAP-Azure-LI-BYOS-Production, but entry?
CVE-2020-11023: no packages for Image SLES15-SP5-SAP-Azure-VLI-BYOS, but entry?
CVE-2020-11023: no packages for Image SLES15-SP6-SAPCAL, but entry?
CVE-2020-11023: no packages for Image SLES15-SP4-Manager-Server-4-3-Azure-llc, but entry?
CVE-2020-11023: no packages for Image SLES15-SP2-SAP-BYOS-GCE, but entry?
CVE-2020-11023: no packages for Image SLES15-SP5-SAP-Azure-VLI-BYOS-Production, but entry?
CVE-2020-11023: no packages for Image SLES15-SP6-SAP-Azure-VLI-BYOS, but entry?
CVE-2020-11023: no packages for Image SLES15-SP5-SAP-Azure, but entry?
CVE-2020-11023: no packages for Image SLES15-SP6-SAPCAL-Azure, but entry?
CVE-2020-11023: no packages for SUSE Linux Enterprise Server 15 SP1-LTSS, but entry?
CVE-2020-11023: no packages for Image SLES15-SP3-Manager-4-2-Server-BYOS-EC2-HVM, but entry?
CVE-2020-11023: no packages for Image SLES15-SP1-Manager-4-0-GCE-BYOS-Proxy, but entry?
CVE-2020-11023: no packages for Image SLES15-SP4-Manager-Server-4-3-BYOS-GCE, but entry?
CVE-2020-11023: no packages for Image SLES15-SP5-SAPCAL-GCE, but entry?
CVE-2020-11023: no packages for Image SLES15-SP6-SAP-Azure, but entry?
CVE-2020-11023: no packages for Image SLES15-SP4-Manager-Server-4-3-BYOS-EC2, but entry?
CVE-2020-11023: no packages for Image SLES15-SP1-Manager-4-0-GCE-BYOS-Server, but entry?
CVE-2020-11023: no packages for Image SLES15-SP6-SAP-EC2, but entry?
CVE-2020-11023: no packages for Image SLES15-SP2-SAP-EC2-HVM, but entry?
CVE-2020-11023: no packages for Image SLES15-SP3-SAP-Azure-LI-BYOS-Production, but entry?
CVE-2020-11023: no packages for openSUSE Leap 15.1, but entry?
CVE-2020-11023: no packages for Image SLES15-SP3-Manager-4-2-Server-BYOS-Azure, but entry?
CVE-2020-11023: no packages for Image SLES15-SP4-SAPCAL-EC2, but entry?
CVE-2020-11023: no packages for SUSE Linux Enterprise Module for Web and Scripting 15 SP4, but entry?
CVE-2020-11023: no packages for Image SLES15-SP4-SAPCAL-Azure, but entry?
CVE-2020-11023: no packages for Image SLES15-SP5-SAPCAL-EC2, but entry?
CVE-2020-11023: no packages for SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS, but entry?
CVE-2020-11023: no packages for Container bci/openjdk:11-7.1, but entry?
CVE-2020-11023: no packages for SUSE Linux Enterprise Server for SAP Applications 15 SP1, but entry?
CVE-2020-11023: no packages for Image SLES15-SP4-SAP-EC2, but entry?
CVE-2020-11023: no packages for Container bci/openjdk-devel:17-14.11, but entry?
CVE-2020-11023: no packages for Container bci/kiwi:9.24.43-8.6, but entry?
CVE-2020-11023: no packages for Container bci/openjdk-devel:11-6.2, but entry?
CVE-2020-11023: no packages for Container bci/openjdk-devel:17-14.11, but entry?
CVE-2020-11023: no packages for Container bci/openjdk-devel:17-7.2, but entry?
CVE-2020-11023: no packages for Container bci/openjdk:11-7.1, but entry?
CVE-2020-11023: no packages for Container bci/openjdk:17-7.1, but entry?
CVE-2020-11023: no packages for Container bci/openjdk:latest, but entry?
CVE-2020-11023: no packages for Container suse/manager/5.0/x86_64/server-attestation:5.0.0-beta2.2.16, but entry?
CVE-2020-11023: no packages for Container suse/manager/5.0/x86_64/server:5.0.0-beta1.2.122, but entry?
CVE-2020-11023: no packages for Image SLES15-SP1-Manager-4-0-Azure-BYOS-Proxy, but entry?
CVE-2020-11023: no packages for Image SLES15-SP1-Manager-4-0-Azure-BYOS-Server, but entry?
CVE-2020-11023: no packages for Image SLES15-SP1-Manager-4-0-EC2-HVM-BYOS-Proxy, but entry?
CVE-2020-11023: no packages for Image SLES15-SP1-Manager-4-0-EC2-HVM-BYOS-Server, but entry?
CVE-2020-11023: no packages for Image SLES15-SP1-Manager-4-0-GCE-BYOS-Proxy, but entry?
CVE-2020-11023: no packages for Image SLES15-SP1-Manager-4-0-GCE-BYOS-Server, but entry?
CVE-2020-11023: no packages for Image SLES15-SP2-SAP-Azure, but entry?
CVE-2020-11023: no packages for Image SLES15-SP2-SAP-Azure-LI-BYOS-Production, but entry?
CVE-2020-11023: no packages for Image SLES15-SP2-SAP-Azure-VLI-BYOS-Production, but entry?
CVE-2020-11023: no packages for Image SLES15-SP2-SAP-BYOS-Azure, but entry?
CVE-2020-11023: no packages for Image SLES15-SP2-SAP-BYOS-EC2-HVM, but entry?
CVE-2020-11023: no packages for Image SLES15-SP2-SAP-BYOS-GCE, but entry?
CVE-2020-11023: no packages for Image SLES15-SP2-SAP-EC2-HVM, but entry?
CVE-2020-11023: no packages for Image SLES15-SP2-SAP-GCE, but entry?
CVE-2020-11023: no packages for Image SLES15-SP3-Manager-4-2-Server-BYOS-Azure, but entry?
CVE-2020-11023: no packages for Image SLES15-SP3-Manager-4-2-Server-BYOS-EC2-HVM, but entry?
CVE-2020-11023: no packages for Image SLES15-SP3-Manager-4-2-Server-BYOS-GCE, but entry?
CVE-2020-11023: no packages for Image SLES15-SP3-SAP-Azure-LI-BYOS-Production, but entry?
CVE-2020-11023: no packages for Image SLES15-SP3-SAP-Azure-VLI-BYOS-Production, but entry?
CVE-2020-11023: no packages for Image SLES15-SP3-SAPCAL-Azure, but entry?
CVE-2020-11023: no packages for Image SLES15-SP3-SAPCAL-EC2-HVM, but entry?
CVE-2020-11023: no packages for Image SLES15-SP3-SAPCAL-GCE, but entry?
CVE-2020-11023: no packages for Image SLES15-SP4-Manager-Server-4-3, but entry?
CVE-2020-11023: no packages for Image SLES15-SP4-Manager-Server-4-3-Azure-llc, but entry?
CVE-2020-11023: no packages for Image SLES15-SP4-Manager-Server-4-3-Azure-ltd, but entry?
CVE-2020-11023: no packages for Image SLES15-SP4-Manager-Server-4-3-BYOS, but entry?
CVE-2020-11023: no packages for Image SLES15-SP4-Manager-Server-4-3-BYOS-Azure, but entry?
CVE-2020-11023: no packages for Image SLES15-SP4-Manager-Server-4-3-BYOS-EC2, but entry?
CVE-2020-11023: no packages for Image SLES15-SP4-Manager-Server-4-3-BYOS-GCE, but entry?
CVE-2020-11023: no packages for Image SLES15-SP4-Manager-Server-4-3-EC2-llc, but entry?
CVE-2020-11023: no packages for Image SLES15-SP4-Manager-Server-4-3-EC2-ltd, but entry?
CVE-2020-11023: no packages for Image SLES15-SP4-SAP, but entry?
CVE-2020-11023: no packages for Image SLES15-SP4-SAP-Azure, but entry?
CVE-2020-11023: no packages for Image SLES15-SP4-SAP-Azure-LI-BYOS, but entry?
CVE-2020-11023: no packages for Image SLES15-SP4-SAP-Azure-LI-BYOS-Production, but entry?
CVE-2020-11023: no packages for Image SLES15-SP4-SAP-Azure-VLI-BYOS, but entry?
CVE-2020-11023: no packages for Image SLES15-SP4-SAP-Azure-VLI-BYOS-Production, but entry?
CVE-2020-11023: no packages for Image SLES15-SP4-SAP-EC2, but entry?
CVE-2020-11023: no packages for Image SLES15-SP4-SAP-GCE, but entry?
CVE-2020-11023: no packages for Image SLES15-SP4-SAPCAL, but entry?
CVE-2020-11023: no packages for Image SLES15-SP4-SAPCAL-Azure, but entry?
CVE-2020-11023: no packages for Image SLES15-SP4-SAPCAL-EC2, but entry?
CVE-2020-11023: no packages for Image SLES15-SP4-SAPCAL-GCE, but entry?
CVE-2020-11023: no packages for Image SLES15-SP5-SAP-Azure, but entry?
CVE-2020-11023: no packages for Image SLES15-SP5-SAP-Azure-LI-BYOS, but entry?
CVE-2020-11023: no packages for Image SLES15-SP5-SAP-Azure-LI-BYOS-Production, but entry?
CVE-2020-11023: no packages for Image SLES15-SP5-SAP-Azure-VLI-BYOS, but entry?
CVE-2020-11023: no packages for Image SLES15-SP5-SAP-Azure-VLI-BYOS-Production, but entry?
CVE-2020-11023: no packages for Image SLES15-SP5-SAP-EC2, but entry?
CVE-2020-11023: no packages for Image SLES15-SP5-SAP-GCE, but entry?
CVE-2020-11023: no packages for Image SLES15-SP5-SAPCAL-Azure, but entry?
CVE-2020-11023: no packages for Image SLES15-SP5-SAPCAL-EC2, but entry?
CVE-2020-11023: no packages for Image SLES15-SP5-SAPCAL-GCE, but entry?
CVE-2020-11023: no packages for Image SLES15-SP6-SAP, but entry?
CVE-2020-11023: no packages for Image SLES15-SP6-SAP-Azure, but entry?
CVE-2020-11023: no packages for Image SLES15-SP6-SAP-Azure-LI-BYOS, but entry?
CVE-2020-11023: no packages for Image SLES15-SP6-SAP-Azure-LI-BYOS-Production, but entry?
CVE-2020-11023: no packages for Image SLES15-SP6-SAP-Azure-VLI-BYOS, but entry?
CVE-2020-11023: no packages for Image SLES15-SP6-SAP-Azure-VLI-BYOS-Production, but entry?
CVE-2020-11023: no packages for Image SLES15-SP6-SAP-EC2, but entry?
CVE-2020-11023: no packages for Image SLES15-SP6-SAP-GCE, but entry?
CVE-2020-11023: no packages for Image SLES15-SP6-SAPCAL, but entry?
CVE-2020-11023: no packages for Image SLES15-SP6-SAPCAL-Azure, but entry?
CVE-2020-11023: no packages for Image SLES15-SP6-SAPCAL-EC2, but entry?
CVE-2020-11023: no packages for Image SLES15-SP6-SAPCAL-GCE, but entry?
CVE-2020-11023: no packages for SUSE CaaS Platform 4.0, but entry?
CVE-2020-11023: no packages for SUSE Liberty Linux 7, but entry?
CVE-2020-11023: no packages for SUSE Liberty Linux 8, but entry?
CVE-2020-11023: no packages for SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS, but entry?
CVE-2020-11023: no packages for SUSE Linux Enterprise Module for Basesystem 15 SP4, but entry?
CVE-2020-11023: no packages for SUSE Linux Enterprise Module for Basesystem 15 SP5, but entry?
CVE-2020-11023: no packages for SUSE Linux Enterprise Module for Basesystem 15 SP6, but entry?
CVE-2020-11023: no packages for SUSE Linux Enterprise Module for Package Hub 15 SP4, but entry?
CVE-2020-11023: no packages for SUSE Linux Enterprise Module for Package Hub 15 SP5, but entry?
CVE-2020-11023: no packages for SUSE Linux Enterprise Module for Package Hub 15 SP6, but entry?
CVE-2020-11023: no packages for SUSE Linux Enterprise Module for Web and Scripting 15 SP4, but entry?
CVE-2020-11023: no packages for SUSE Linux Enterprise Module for Web and Scripting 15 SP5, but entry?
CVE-2020-11023: no packages for SUSE Linux Enterprise Module for Web and Scripting 15 SP6, but entry?
CVE-2020-11023: no packages for SUSE Linux Enterprise Server 15 SP1-LTSS, but entry?
CVE-2020-11023: no packages for SUSE Linux Enterprise Server 15 SP4-TERADATA, but entry?
CVE-2020-11023: no packages for SUSE Linux Enterprise Server for SAP Applications 15 SP1, but entry?
CVE-2020-11023: no packages for SUSE Linux Enterprise Workstation Extension 15 SP4, but entry?
CVE-2020-11023: no packages for SUSE Linux Enterprise Workstation Extension 15 SP5, but entry?
CVE-2020-11023: no packages for SUSE Linux Enterprise Workstation Extension 15 SP6, but entry?
CVE-2020-11023: no packages for SUSE Manager Proxy 4.2, but entry?
CVE-2020-11023: no packages for SUSE Manager Retail Branch Server 4.2, but entry?
CVE-2020-11023: no packages for SUSE Manager Server 4.2, but entry?
CVE-2020-11023: no packages for SUSE Manager Server Module 4.2, but entry?
CVE-2020-11023: no packages for SUSE Manager Server Module 4.3, but entry?
CVE-2020-11023: no packages for SUSE Package Hub 12, but entry?
CVE-2020-11023: no packages for SUSE Package Hub 15 SP1, but entry?
CVE-2020-11023: no packages for SUSE Package Hub 15 SP2, but entry?
CVE-2020-11023: no packages for openSUSE Leap 15.1, but entry?
CVE-2020-11023: no packages for openSUSE Leap 15.2, but entry?
CVE-2020-11023: no packages for Container bci/kiwi:9.24.43-8.6, but entry?
CVE-2020-11023: no packages for Container bci/openjdk-devel:11-6.2, but entry?
CVE-2020-11023: no packages for Container bci/openjdk-devel:17-14.11, but entry?
CVE-2020-11023: no packages for Container bci/openjdk-devel:17-7.2, but entry?
CVE-2020-11023: no packages for Container bci/openjdk:11-7.1, but entry?
CVE-2020-11023: no packages for Container bci/openjdk:17-7.1, but entry?
CVE-2020-11023: no packages for Container bci/openjdk:latest, but entry?
CVE-2020-11023: no packages for Container suse/manager/5.0/x86_64/server-attestation:5.0.0-beta2.2.16, but entry?
CVE-2020-11023: no packages for Container suse/manager/5.0/x86_64/server:5.0.0-beta1.2.122, but entry?
CVE-2020-11023: no packages for Image SLES15-SP1-Manager-4-0-Azure-BYOS-Proxy, but entry?
CVE-2020-11023: no packages for Image SLES15-SP1-Manager-4-0-Azure-BYOS-Server, but entry?
CVE-2020-11023: no packages for Image SLES15-SP1-Manager-4-0-EC2-HVM-BYOS-Proxy, but entry?
CVE-2020-11023: no packages for Image SLES15-SP1-Manager-4-0-EC2-HVM-BYOS-Server, but entry?
CVE-2020-11023: no packages for Image SLES15-SP1-Manager-4-0-GCE-BYOS-Proxy, but entry?
CVE-2020-11023: no packages for Image SLES15-SP1-Manager-4-0-GCE-BYOS-Server, but entry?
CVE-2020-11023: no packages for Image SLES15-SP2-SAP-Azure, but entry?
CVE-2020-11023: no packages for Image SLES15-SP2-SAP-Azure-LI-BYOS-Production, but entry?
CVE-2020-11023: no packages for Image SLES15-SP2-SAP-Azure-VLI-BYOS-Production, but entry?
CVE-2020-11023: no packages for Image SLES15-SP2-SAP-BYOS-Azure, but entry?
CVE-2020-11023: no packages for Image SLES15-SP2-SAP-BYOS-EC2-HVM, but entry?
CVE-2020-11023: no packages for Image SLES15-SP2-SAP-BYOS-GCE, but entry?
CVE-2020-11023: no packages for Image SLES15-SP2-SAP-EC2-HVM, but entry?
CVE-2020-11023: no packages for Image SLES15-SP2-SAP-GCE, but entry?
CVE-2020-11023: no packages for Image SLES15-SP3-Manager-4-2-Server-BYOS-Azure, but entry?
CVE-2020-11023: no packages for Image SLES15-SP3-Manager-4-2-Server-BYOS-EC2-HVM, but entry?
CVE-2020-11023: no packages for Image SLES15-SP3-Manager-4-2-Server-BYOS-GCE, but entry?
CVE-2020-11023: no packages for Image SLES15-SP3-SAP-Azure-LI-BYOS-Production, but entry?
CVE-2020-11023: no packages for Image SLES15-SP3-SAP-Azure-VLI-BYOS-Production, but entry?
CVE-2020-11023: no packages for Image SLES15-SP3-SAPCAL-Azure, but entry?
CVE-2020-11023: no packages for Image SLES15-SP3-SAPCAL-EC2-HVM, but entry?
CVE-2020-11023: no packages for Image SLES15-SP3-SAPCAL-GCE, but entry?
CVE-2020-11023: no packages for Image SLES15-SP4-Manager-Server-4-3, but entry?
CVE-2020-11023: no packages for Image SLES15-SP4-Manager-Server-4-3-Azure-llc, but entry?
CVE-2020-11023: no packages for Image SLES15-SP4-Manager-Server-4-3-Azure-ltd, but entry?
CVE-2020-11023: no packages for Image SLES15-SP4-Manager-Server-4-3-BYOS, but entry?
CVE-2020-11023: no packages for Image SLES15-SP4-Manager-Server-4-3-BYOS-Azure, but entry?
CVE-2020-11023: no packages for Image SLES15-SP4-Manager-Server-4-3-BYOS-EC2, but entry?
CVE-2020-11023: no packages for Image SLES15-SP4-Manager-Server-4-3-BYOS-GCE, but entry?
CVE-2020-11023: no packages for Image SLES15-SP4-Manager-Server-4-3-EC2-llc, but entry?
CVE-2020-11023: no packages for Image SLES15-SP4-Manager-Server-4-3-EC2-ltd, but entry?
CVE-2020-11023: no packages for Image SLES15-SP4-SAP, but entry?
CVE-2020-11023: no packages for Image SLES15-SP4-SAP-Azure, but entry?
CVE-2020-11023: no packages for Image SLES15-SP4-SAP-Azure-LI-BYOS, but entry?
CVE-2020-11023: no packages for Image SLES15-SP4-SAP-Azure-LI-BYOS-Production, but entry?
CVE-2020-11023: no packages for Image SLES15-SP4-SAP-Azure-VLI-BYOS, but entry?
CVE-2020-11023: no packages for Image SLES15-SP4-SAP-Azure-VLI-BYOS-Production, but entry?
CVE-2020-11023: no packages for Image SLES15-SP4-SAP-EC2, but entry?
CVE-2020-11023: no packages for Image SLES15-SP4-SAP-GCE, but entry?
CVE-2020-11023: no packages for Image SLES15-SP4-SAPCAL, but entry?
CVE-2020-11023: no packages for Image SLES15-SP4-SAPCAL-Azure, but entry?
CVE-2020-11023: no packages for Image SLES15-SP4-SAPCAL-EC2, but entry?
CVE-2020-11023: no packages for Image SLES15-SP4-SAPCAL-GCE, but entry?
CVE-2020-11023: no packages for Image SLES15-SP5-SAP-Azure, but entry?
CVE-2020-11023: no packages for Image SLES15-SP5-SAP-Azure-LI-BYOS, but entry?
CVE-2020-11023: no packages for Image SLES15-SP5-SAP-Azure-LI-BYOS-Production, but entry?
CVE-2020-11023: no packages for Image SLES15-SP5-SAP-Azure-VLI-BYOS, but entry?
CVE-2020-11023: no packages for Image SLES15-SP5-SAP-Azure-VLI-BYOS-Production, but entry?
CVE-2020-11023: no packages for Image SLES15-SP5-SAP-EC2, but entry?
CVE-2020-11023: no packages for Image SLES15-SP5-SAP-GCE, but entry?
CVE-2020-11023: no packages for Image SLES15-SP5-SAPCAL-Azure, but entry?
CVE-2020-11023: no packages for Image SLES15-SP5-SAPCAL-EC2, but entry?
CVE-2020-11023: no packages for Image SLES15-SP5-SAPCAL-GCE, but entry?
CVE-2020-11023: no packages for Image SLES15-SP6-SAP, but entry?
CVE-2020-11023: no packages for Image SLES15-SP6-SAP-Azure, but entry?
CVE-2020-11023: no packages for Image SLES15-SP6-SAP-Azure-LI-BYOS, but entry?
CVE-2020-11023: no packages for Image SLES15-SP6-SAP-Azure-LI-BYOS-Production, but entry?
CVE-2020-11023: no packages for Image SLES15-SP6-SAP-Azure-VLI-BYOS, but entry?
CVE-2020-11023: no packages for Image SLES15-SP6-SAP-Azure-VLI-BYOS-Production, but entry?
CVE-2020-11023: no packages for Image SLES15-SP6-SAP-EC2, but entry?
CVE-2020-11023: no packages for Image SLES15-SP6-SAP-GCE, but entry?
CVE-2020-11023: no packages for Image SLES15-SP6-SAPCAL, but entry?
CVE-2020-11023: no packages for Image SLES15-SP6-SAPCAL-Azure, but entry?
CVE-2020-11023: no packages for Image SLES15-SP6-SAPCAL-EC2, but entry?
CVE-2020-11023: no packages for Image SLES15-SP6-SAPCAL-GCE, but entry?
CVE-2020-11023: no packages for SUSE CaaS Platform 4.0, but entry?
CVE-2020-11023: no packages for SUSE Liberty Linux 7, but entry?
CVE-2020-11023: no packages for SUSE Liberty Linux 8, but entry?
CVE-2020-11023: no packages for SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS, but entry?
CVE-2020-11023: no packages for SUSE Linux Enterprise Module for Basesystem 15 SP4, but entry?
CVE-2020-11023: no packages for SUSE Linux Enterprise Module for Basesystem 15 SP5, but entry?
CVE-2020-11023: no packages for SUSE Linux Enterprise Module for Basesystem 15 SP6, but entry?
CVE-2020-11023: no packages for SUSE Linux Enterprise Module for Package Hub 15 SP4, but entry?
CVE-2020-11023: no packages for SUSE Linux Enterprise Module for Package Hub 15 SP5, but entry?
CVE-2020-11023: no packages for SUSE Linux Enterprise Module for Package Hub 15 SP6, but entry?
CVE-2020-11023: no packages for SUSE Linux Enterprise Module for Web and Scripting 15 SP4, but entry?
CVE-2020-11023: no packages for SUSE Linux Enterprise Module for Web and Scripting 15 SP5, but entry?
CVE-2020-11023: no packages for SUSE Linux Enterprise Module for Web and Scripting 15 SP6, but entry?
CVE-2020-11023: no packages for SUSE Linux Enterprise Server 15 SP1-LTSS, but entry?
CVE-2020-11023: no packages for SUSE Linux Enterprise Server 15 SP4-TERADATA, but entry?
CVE-2020-11023: no packages for SUSE Linux Enterprise Server for SAP Applications 15 SP1, but entry?
CVE-2020-11023: no packages for SUSE Linux Enterprise Workstation Extension 15 SP4, but entry?
CVE-2020-11023: no packages for SUSE Linux Enterprise Workstation Extension 15 SP5, but entry?
CVE-2020-11023: no packages for SUSE Linux Enterprise Workstation Extension 15 SP6, but entry?
CVE-2020-11023: no packages for SUSE Manager Proxy 4.2, but entry?
CVE-2020-11023: no packages for SUSE Manager Retail Branch Server 4.2, but entry?
CVE-2020-11023: no packages for SUSE Manager Server 4.2, but entry?
CVE-2020-11023: no packages for SUSE Manager Server Module 4.2, but entry?
CVE-2020-11023: no packages for SUSE Manager Server Module 4.3, but entry?
CVE-2020-11023: no packages for SUSE Package Hub 12, but entry?
CVE-2020-11023: no packages for SUSE Package Hub 15 SP1, but entry?
CVE-2020-11023: no packages for SUSE Package Hub 15 SP2, but entry?
CVE-2020-11023: no packages for openSUSE Leap 15.1, but entry?
CVE-2020-11023: no packages for openSUSE Leap 15.2, but entry?
CVE-2020-11022: no packages for SUSE Manager Proxy Module 4.0, but entry?
CVE-2020-11022: no packages for SUSE CaaS Platform 4.0, but entry?
CVE-2020-11022: no packages for Image SLES15-SP1-Manager-4-0-EC2-HVM-BYOS-Proxy, but entry?
CVE-2020-11022: no packages for Image SLES15-SP2-SAP-Azure-VLI-BYOS-Production, but entry?
CVE-2020-11022: no packages for Image SLES15-SP2-SAP-BYOS-EC2-HVM, but entry?
CVE-2020-11022: no packages for Container suse/manager/5.0/x86_64/server-attestation:5.0.0-beta2.2.16, but entry?
CVE-2020-11022: no packages for Image SLES15-SP5-SAP-GCE, but entry?
CVE-2020-11022: no packages for SUSE Linux Enterprise Workstation Extension 15 SP5, but entry?
CVE-2020-11022: no packages for Container bci/openjdk-devel:17-7.2, but entry?
CVE-2020-11022: no packages for Image SLES15-SP5-SAPCAL-Azure, but entry?
CVE-2020-11022: no packages for Image SLES15-SP4-SAP-Azure-VLI-BYOS-Production, but entry?
CVE-2020-11022: no packages for SUSE Package Hub 15 SP2, but entry?
CVE-2020-11022: no packages for Image SLES15-SP5-SAP-Azure-LI-BYOS, but entry?
CVE-2020-11022: no packages for SUSE Manager Server Module 4.2, but entry?
CVE-2020-11022: no packages for Image SLES15-SP6-SAP-GCE, but entry?
CVE-2020-11022: no packages for Image SLES15-SP4-Manager-Server-4-3-BYOS-Azure, but entry?
CVE-2020-11022: no packages for Image SLES15-SP6-SAPCAL-GCE, but entry?
CVE-2020-11022: no packages for Container bci/openjdk-devel:11-6.2, but entry?
CVE-2020-11022: no packages for SUSE Linux Enterprise Server 15 SP4-TERADATA, but entry?
CVE-2020-11022: no packages for Image SLES15-SP4-SAP-Azure-VLI-BYOS, but entry?
CVE-2020-11022: no packages for Image SLES15-SP6-SAP-Azure-LI-BYOS, but entry?
CVE-2020-11022: no packages for Image SLES15-SP4-SAP-GCE, but entry?
CVE-2020-11022: no packages for Image SLES15-SP1-Manager-4-0-EC2-HVM-BYOS-Server, but entry?
CVE-2020-11022: no packages for SUSE Manager Server Module 4.3, but entry?
CVE-2020-11022: no packages for Image SLES15-SP6-SAP-Azure-VLI-BYOS-Production, but entry?
CVE-2020-11022: no packages for SUSE Linux Enterprise Workstation Extension 15 SP6, but entry?
CVE-2020-11022: no packages for Image SLES15-SP2-SAP-GCE, but entry?
CVE-2020-11022: no packages for SUSE Linux Enterprise Module for Development Tools 15 SP3, but entry?
CVE-2020-11022: no packages for Container bci/kiwi:9.24.43-8.6, but entry?
CVE-2020-11022: no packages for SUSE Manager Server 4.2, but entry?
CVE-2020-11022: no packages for Image SLES15-SP3-SAPCAL-EC2-HVM, but entry?
CVE-2020-11022: no packages for Image SLES15-SP4-SAP-Azure-LI-BYOS, but entry?
CVE-2020-11022: no packages for SUSE Package Hub 15 SP1, but entry?
CVE-2020-11022: no packages for Container suse/manager/5.0/x86_64/server:5.0.0-beta1.2.122, but entry?
CVE-2020-11022: no packages for Image SLES15-SP1-Manager-4-0-Azure-BYOS-Server, but entry?
CVE-2020-11022: no packages for Image SLES15-SP4-SAPCAL-GCE, but entry?
CVE-2020-11022: no packages for Image SLES15-SP6-SAP, but entry?
CVE-2020-11022: no packages for Image SLES15-SP3-SAPCAL-GCE, but entry?
CVE-2020-11022: no packages for Image SLES15-SP1-Manager-4-0-Azure-BYOS-Proxy, but entry?
CVE-2020-11022: no packages for Image SLES15-SP6-SAP-Azure-LI-BYOS-Production, but entry?
CVE-2020-11022: no packages for SUSE Linux Enterprise Module for Package Hub 15 SP4, but entry?
CVE-2020-11022: no packages for Image SLES15-SP4-Manager-Server-4-3-EC2-llc, but entry?
CVE-2020-11022: no packages for SUSE Manager Retail Branch Server 4.2, but entry?
CVE-2020-11022: no packages for SUSE Package Hub 12, but entry?
CVE-2020-11022: no packages for Image SLES15-SP4-SAP, but entry?
CVE-2020-11022: no packages for Container bci/openjdk:latest, but entry?
CVE-2020-11022: no packages for SUSE Linux Enterprise Module for Web and Scripting 15 SP6, but entry?
CVE-2020-11022: no packages for Image SLES15-SP4-SAPCAL, but entry?
CVE-2020-11022: no packages for Image SLES15-SP6-SAPCAL-EC2, but entry?
CVE-2020-11022: no packages for Image SLES15-SP2-SAP-BYOS-Azure, but entry?
CVE-2020-11022: no packages for Image SLES15-SP5-SAP-EC2, but entry?
CVE-2020-11022: no packages for Image SLES15-SP4-Manager-Server-4-3-EC2-ltd, but entry?
CVE-2020-11022: no packages for Image SLES15-SP3-SAP-Azure-VLI-BYOS-Production, but entry?
CVE-2020-11022: no packages for SUSE Linux Enterprise Module for Basesystem 15 SP4, but entry?
CVE-2020-11022: no packages for SUSE Linux Enterprise Module for Package Hub 15 SP6, but entry?
CVE-2020-11022: no packages for Container bci/openjdk:17-7.1, but entry?
CVE-2020-11022: no packages for Image SLES15-SP5-SAP-Azure-VLI-BYOS-Production, but entry?
CVE-2020-11022: no packages for Image SLES15-SP6-SAPCAL-Azure, but entry?
CVE-2020-11022: no packages for Image SLES15-SP6-SAP-Azure-VLI-BYOS, but entry?
CVE-2020-11022: no packages for Image SLES15-SP5-SAP-Azure, but entry?
CVE-2020-11022: no packages for SUSE Manager Server Module 4.1, but entry?
CVE-2020-11022: no packages for Image SLES15-SP2-Manager-4-1-Server-BYOS-Azure, but entry?
CVE-2020-11022: no packages for SUSE Linux Enterprise Server 15 SP1-LTSS, but entry?
CVE-2020-11022: no packages for Image SLES15-SP6-SAP-Azure, but entry?
CVE-2020-11022: no packages for Image SLES15-SP5-SAPCAL-GCE, but entry?
CVE-2020-11022: no packages for Image SLES15-SP4-Manager-Server-4-3-BYOS-EC2, but entry?
CVE-2020-11022: no packages for Image SLES15-SP1-Manager-4-0-GCE-BYOS-Proxy, but entry?
CVE-2020-11022: no packages for Image SLES15-SP3-Manager-4-2-Server-BYOS-EC2-HVM, but entry?
CVE-2020-11022: no packages for Image SLES15-SP4-Manager-Server-4-3-BYOS-GCE, but entry?
CVE-2020-11022: no packages for Image SLES15-SP1-Manager-4-0-GCE-BYOS-Server, but entry?
CVE-2020-11022: no packages for Image SLES15-SP6-SAP-EC2, but entry?
CVE-2020-11022: no packages for SUSE Manager Server 3.2, but entry?
CVE-2020-11022: no packages for Image SLES15-SP2-SAP-EC2-HVM, but entry?
CVE-2020-11022: no packages for Image SLES15-SP3-SAP-Azure-LI-BYOS-Production, but entry?
CVE-2020-11022: no packages for Image SLES15-SP3-Manager-4-2-Server-BYOS-Azure, but entry?
CVE-2020-11022: no packages for SUSE Manager Server Module 4.0, but entry?
CVE-2020-11022: no packages for openSUSE Leap 15.1, but entry?
CVE-2020-11022: no packages for SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS, but entry?
CVE-2020-11022: no packages for Image SLES15-SP4-SAP-EC2, but entry?
CVE-2020-11022: no packages for SUSE Linux Enterprise Server for SAP Applications 15 SP1, but entry?
CVE-2020-11022: no packages for Container bci/openjdk:11-7.1, but entry?
CVE-2020-11022: no packages for Container bci/openjdk-devel:17-14.11, but entry?
CVE-2020-11022: no packages for SUSE Linux Enterprise Module for Web and Scripting 15 SP4, but entry?
CVE-2020-11022: no packages for Image SLES15-SP4-SAPCAL-EC2, but entry?
CVE-2020-11022: no packages for Image SLES15-SP5-SAPCAL-EC2, but entry?
CVE-2020-11022: no packages for Image SLES15-SP4-SAPCAL-Azure, but entry?
CVE-2020-11022: no packages for Image SLES15-SP4-SAP-Azure-LI-BYOS-Production, but entry?
CVE-2020-11022: no packages for Image SLES15-SP2-SAP-Azure-LI-BYOS-Production, but entry?
CVE-2020-11022: no packages for Image SLES15-SP4-Manager-Server-4-3-BYOS, but entry?
CVE-2020-11022: no packages for openSUSE Leap 15.2, but entry?
CVE-2020-11022: no packages for Image SLES15-SP2-SAP-Azure, but entry?
CVE-2020-11022: no packages for SUSE Linux Enterprise Module for Basesystem 15 SP5, but entry?
CVE-2020-11022: no packages for SUSE Liberty Linux 7, but entry?
CVE-2020-11022: no packages for SUSE Linux Enterprise Workstation Extension 15 SP4, but entry?
CVE-2020-11022: no packages for Image SLES15-SP2-Manager-4-1-Server-BYOS-EC2-HVM, but entry?
CVE-2020-11022: no packages for SUSE Linux Enterprise Module for Package Hub 15 SP5, but entry?
CVE-2020-11022: no packages for Image SLES15-SP4-SAP-Azure, but entry?
CVE-2020-11022: no packages for Image SLES15-SP2-Manager-4-1-Server-BYOS-GCE, but entry?
CVE-2020-11022: no packages for SUSE Manager Proxy Module 4.1, but entry?
CVE-2020-11022: no packages for SUSE Manager Proxy 4.2, but entry?
CVE-2020-11022: no packages for Image SLES15-SP4-Manager-Server-4-3, but entry?
CVE-2020-11022: no packages for Image SLES15-SP3-Manager-4-2-Server-BYOS-GCE, but entry?
CVE-2020-11022: no packages for Image SLES15-SP4-Manager-Server-4-3-Azure-ltd, but entry?
CVE-2020-11022: no packages for SUSE Linux Enterprise Module for Web and Scripting 15 SP5, but entry?
CVE-2020-11022: no packages for Image SLES15-SP5-SAP-Azure-LI-BYOS-Production, but entry?
CVE-2020-11022: no packages for SUSE Linux Enterprise Module for Basesystem 15 SP6, but entry?
CVE-2020-11022: no packages for Image SLES15-SP6-SAPCAL, but entry?
CVE-2020-11022: no packages for Image SLES15-SP5-SAP-Azure-VLI-BYOS, but entry?
CVE-2020-11022: no packages for SUSE Manager Proxy 3.2, but entry?
CVE-2020-11022: no packages for Image SLES15-SP3-SAPCAL-Azure, but entry?
CVE-2020-11022: no packages for Image SLES15-SP4-Manager-Server-4-3-Azure-llc, but entry?
CVE-2020-11022: no packages for Image SLES15-SP2-SAP-BYOS-GCE, but entry?
CVE-2020-11022: no packages for Container bci/kiwi:9.24.43-8.6, but entry?
CVE-2020-11022: no packages for Container bci/openjdk-devel:11-6.2, but entry?
CVE-2020-11022: no packages for Container bci/openjdk-devel:17-14.11, but entry?
CVE-2020-11022: no packages for Container bci/openjdk-devel:17-7.2, but entry?
CVE-2020-11022: no packages for Container bci/openjdk:11-7.1, but entry?
CVE-2020-11022: no packages for Container bci/openjdk:17-7.1, but entry?
CVE-2020-11022: no packages for Container bci/openjdk:latest, but entry?
CVE-2020-11022: no packages for Container suse/manager/5.0/x86_64/server-attestation:5.0.0-beta2.2.16, but entry?
CVE-2020-11022: no packages for Container suse/manager/5.0/x86_64/server:5.0.0-beta1.2.122, but entry?
CVE-2020-11022: no packages for Image SLES15-SP1-Manager-4-0-Azure-BYOS-Proxy, but entry?
CVE-2020-11022: no packages for Image SLES15-SP1-Manager-4-0-Azure-BYOS-Server, but entry?
CVE-2020-11022: no packages for Image SLES15-SP1-Manager-4-0-EC2-HVM-BYOS-Proxy, but entry?
CVE-2020-11022: no packages for Image SLES15-SP1-Manager-4-0-EC2-HVM-BYOS-Server, but entry?
CVE-2020-11022: no packages for Image SLES15-SP1-Manager-4-0-GCE-BYOS-Proxy, but entry?
CVE-2020-11022: no packages for Image SLES15-SP1-Manager-4-0-GCE-BYOS-Server, but entry?
CVE-2020-11022: no packages for Image SLES15-SP2-Manager-4-1-Server-BYOS-Azure, but entry?
CVE-2020-11022: no packages for Image SLES15-SP2-Manager-4-1-Server-BYOS-EC2-HVM, but entry?
CVE-2020-11022: no packages for Image SLES15-SP2-Manager-4-1-Server-BYOS-GCE, but entry?
CVE-2020-11022: no packages for Image SLES15-SP2-SAP-Azure, but entry?
CVE-2020-11022: no packages for Image SLES15-SP2-SAP-Azure-LI-BYOS-Production, but entry?
CVE-2020-11022: no packages for Image SLES15-SP2-SAP-Azure-VLI-BYOS-Production, but entry?
CVE-2020-11022: no packages for Image SLES15-SP2-SAP-BYOS-Azure, but entry?
CVE-2020-11022: no packages for Image SLES15-SP2-SAP-BYOS-EC2-HVM, but entry?
CVE-2020-11022: no packages for Image SLES15-SP2-SAP-BYOS-GCE, but entry?
CVE-2020-11022: no packages for Image SLES15-SP2-SAP-EC2-HVM, but entry?
CVE-2020-11022: no packages for Image SLES15-SP2-SAP-GCE, but entry?
CVE-2020-11022: no packages for Image SLES15-SP3-Manager-4-2-Server-BYOS-Azure, but entry?
CVE-2020-11022: no packages for Image SLES15-SP3-Manager-4-2-Server-BYOS-EC2-HVM, but entry?
CVE-2020-11022: no packages for Image SLES15-SP3-Manager-4-2-Server-BYOS-GCE, but entry?
CVE-2020-11022: no packages for Image SLES15-SP3-SAP-Azure-LI-BYOS-Production, but entry?
CVE-2020-11022: no packages for Image SLES15-SP3-SAP-Azure-VLI-BYOS-Production, but entry?
CVE-2020-11022: no packages for Image SLES15-SP3-SAPCAL-Azure, but entry?
CVE-2020-11022: no packages for Image SLES15-SP3-SAPCAL-EC2-HVM, but entry?
CVE-2020-11022: no packages for Image SLES15-SP3-SAPCAL-GCE, but entry?
CVE-2020-11022: no packages for Image SLES15-SP4-Manager-Server-4-3, but entry?
CVE-2020-11022: no packages for Image SLES15-SP4-Manager-Server-4-3-Azure-llc, but entry?
CVE-2020-11022: no packages for Image SLES15-SP4-Manager-Server-4-3-Azure-ltd, but entry?
CVE-2020-11022: no packages for Image SLES15-SP4-Manager-Server-4-3-BYOS, but entry?
CVE-2020-11022: no packages for Image SLES15-SP4-Manager-Server-4-3-BYOS-Azure, but entry?
CVE-2020-11022: no packages for Image SLES15-SP4-Manager-Server-4-3-BYOS-EC2, but entry?
CVE-2020-11022: no packages for Image SLES15-SP4-Manager-Server-4-3-BYOS-GCE, but entry?
CVE-2020-11022: no packages for Image SLES15-SP4-Manager-Server-4-3-EC2-llc, but entry?
CVE-2020-11022: no packages for Image SLES15-SP4-Manager-Server-4-3-EC2-ltd, but entry?
CVE-2020-11022: no packages for Image SLES15-SP4-SAP, but entry?
CVE-2020-11022: no packages for Image SLES15-SP4-SAP-Azure, but entry?
CVE-2020-11022: no packages for Image SLES15-SP4-SAP-Azure-LI-BYOS, but entry?
CVE-2020-11022: no packages for Image SLES15-SP4-SAP-Azure-LI-BYOS-Production, but entry?
CVE-2020-11022: no packages for Image SLES15-SP4-SAP-Azure-VLI-BYOS, but entry?
CVE-2020-11022: no packages for Image SLES15-SP4-SAP-Azure-VLI-BYOS-Production, but entry?
CVE-2020-11022: no packages for Image SLES15-SP4-SAP-EC2, but entry?
CVE-2020-11022: no packages for Image SLES15-SP4-SAP-GCE, but entry?
CVE-2020-11022: no packages for Image SLES15-SP4-SAPCAL, but entry?
CVE-2020-11022: no packages for Image SLES15-SP4-SAPCAL-Azure, but entry?
CVE-2020-11022: no packages for Image SLES15-SP4-SAPCAL-EC2, but entry?
CVE-2020-11022: no packages for Image SLES15-SP4-SAPCAL-GCE, but entry?
CVE-2020-11022: no packages for Image SLES15-SP5-SAP-Azure, but entry?
CVE-2020-11022: no packages for Image SLES15-SP5-SAP-Azure-LI-BYOS, but entry?
CVE-2020-11022: no packages for Image SLES15-SP5-SAP-Azure-LI-BYOS-Production, but entry?
CVE-2020-11022: no packages for Image SLES15-SP5-SAP-Azure-VLI-BYOS, but entry?
CVE-2020-11022: no packages for Image SLES15-SP5-SAP-Azure-VLI-BYOS-Production, but entry?
CVE-2020-11022: no packages for Image SLES15-SP5-SAP-EC2, but entry?
CVE-2020-11022: no packages for Image SLES15-SP5-SAP-GCE, but entry?
CVE-2020-11022: no packages for Image SLES15-SP5-SAPCAL-Azure, but entry?
CVE-2020-11022: no packages for Image SLES15-SP5-SAPCAL-EC2, but entry?
CVE-2020-11022: no packages for Image SLES15-SP5-SAPCAL-GCE, but entry?
CVE-2020-11022: no packages for Image SLES15-SP6-SAP, but entry?
CVE-2020-11022: no packages for Image SLES15-SP6-SAP-Azure, but entry?
CVE-2020-11022: no packages for Image SLES15-SP6-SAP-Azure-LI-BYOS, but entry?
CVE-2020-11022: no packages for Image SLES15-SP6-SAP-Azure-LI-BYOS-Production, but entry?
CVE-2020-11022: no packages for Image SLES15-SP6-SAP-Azure-VLI-BYOS, but entry?
CVE-2020-11022: no packages for Image SLES15-SP6-SAP-Azure-VLI-BYOS-Production, but entry?
CVE-2020-11022: no packages for Image SLES15-SP6-SAP-EC2, but entry?
CVE-2020-11022: no packages for Image SLES15-SP6-SAP-GCE, but entry?
CVE-2020-11022: no packages for Image SLES15-SP6-SAPCAL, but entry?
CVE-2020-11022: no packages for Image SLES15-SP6-SAPCAL-Azure, but entry?
CVE-2020-11022: no packages for Image SLES15-SP6-SAPCAL-EC2, but entry?
CVE-2020-11022: no packages for Image SLES15-SP6-SAPCAL-GCE, but entry?
CVE-2020-11022: no packages for SUSE CaaS Platform 4.0, but entry?
CVE-2020-11022: no packages for SUSE Liberty Linux 7, but entry?
CVE-2020-11022: no packages for SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS, but entry?
CVE-2020-11022: no packages for SUSE Linux Enterprise Module for Basesystem 15 SP4, but entry?
CVE-2020-11022: no packages for SUSE Linux Enterprise Module for Basesystem 15 SP5, but entry?
CVE-2020-11022: no packages for SUSE Linux Enterprise Module for Basesystem 15 SP6, but entry?
CVE-2020-11022: no packages for SUSE Linux Enterprise Module for Development Tools 15 SP3, but entry?
CVE-2020-11022: no packages for SUSE Linux Enterprise Module for Package Hub 15 SP4, but entry?
CVE-2020-11022: no packages for SUSE Linux Enterprise Module for Package Hub 15 SP5, but entry?
CVE-2020-11022: no packages for SUSE Linux Enterprise Module for Package Hub 15 SP6, but entry?
CVE-2020-11022: no packages for SUSE Linux Enterprise Module for Web and Scripting 15 SP4, but entry?
CVE-2020-11022: no packages for SUSE Linux Enterprise Module for Web and Scripting 15 SP5, but entry?
CVE-2020-11022: no packages for SUSE Linux Enterprise Module for Web and Scripting 15 SP6, but entry?
CVE-2020-11022: no packages for SUSE Linux Enterprise Server 15 SP1-LTSS, but entry?
CVE-2020-11022: no packages for SUSE Linux Enterprise Server 15 SP4-TERADATA, but entry?
CVE-2020-11022: no packages for SUSE Linux Enterprise Server for SAP Applications 15 SP1, but entry?
CVE-2020-11022: no packages for SUSE Linux Enterprise Workstation Extension 15 SP4, but entry?
CVE-2020-11022: no packages for SUSE Linux Enterprise Workstation Extension 15 SP5, but entry?
CVE-2020-11022: no packages for SUSE Linux Enterprise Workstation Extension 15 SP6, but entry?
CVE-2020-11022: no packages for SUSE Manager Proxy 3.2, but entry?
CVE-2020-11022: no packages for SUSE Manager Proxy 4.2, but entry?
CVE-2020-11022: no packages for SUSE Manager Proxy Module 4.0, but entry?
CVE-2020-11022: no packages for SUSE Manager Proxy Module 4.1, but entry?
CVE-2020-11022: no packages for SUSE Manager Retail Branch Server 4.2, but entry?
CVE-2020-11022: no packages for SUSE Manager Server 3.2, but entry?
CVE-2020-11022: no packages for SUSE Manager Server 4.2, but entry?
CVE-2020-11022: no packages for SUSE Manager Server Module 4.0, but entry?
CVE-2020-11022: no packages for SUSE Manager Server Module 4.1, but entry?
CVE-2020-11022: no packages for SUSE Manager Server Module 4.2, but entry?
CVE-2020-11022: no packages for SUSE Manager Server Module 4.3, but entry?
CVE-2020-11022: no packages for SUSE Package Hub 12, but entry?
CVE-2020-11022: no packages for SUSE Package Hub 15 SP1, but entry?
CVE-2020-11022: no packages for SUSE Package Hub 15 SP2, but entry?
CVE-2020-11022: no packages for openSUSE Leap 15.1, but entry?
CVE-2020-11022: no packages for openSUSE Leap 15.2, but entry?
CVE-2020-11022: no packages for Container bci/kiwi:9.24.43-8.6, but entry?
CVE-2020-11022: no packages for Container bci/openjdk-devel:11-6.2, but entry?
CVE-2020-11022: no packages for Container bci/openjdk-devel:17-14.11, but entry?
CVE-2020-11022: no packages for Container bci/openjdk-devel:17-7.2, but entry?
CVE-2020-11022: no packages for Container bci/openjdk:11-7.1, but entry?
CVE-2020-11022: no packages for Container bci/openjdk:17-7.1, but entry?
CVE-2020-11022: no packages for Container bci/openjdk:latest, but entry?
CVE-2020-11022: no packages for Container suse/manager/5.0/x86_64/server-attestation:5.0.0-beta2.2.16, but entry?
CVE-2020-11022: no packages for Container suse/manager/5.0/x86_64/server:5.0.0-beta1.2.122, but entry?
CVE-2020-11022: no packages for Image SLES15-SP1-Manager-4-0-Azure-BYOS-Proxy, but entry?
CVE-2020-11022: no packages for Image SLES15-SP1-Manager-4-0-Azure-BYOS-Server, but entry?
CVE-2020-11022: no packages for Image SLES15-SP1-Manager-4-0-EC2-HVM-BYOS-Proxy, but entry?
CVE-2020-11022: no packages for Image SLES15-SP1-Manager-4-0-EC2-HVM-BYOS-Server, but entry?
CVE-2020-11022: no packages for Image SLES15-SP1-Manager-4-0-GCE-BYOS-Proxy, but entry?
CVE-2020-11022: no packages for Image SLES15-SP1-Manager-4-0-GCE-BYOS-Server, but entry?
CVE-2020-11022: no packages for Image SLES15-SP2-Manager-4-1-Server-BYOS-Azure, but entry?
CVE-2020-11022: no packages for Image SLES15-SP2-Manager-4-1-Server-BYOS-EC2-HVM, but entry?
CVE-2020-11022: no packages for Image SLES15-SP2-Manager-4-1-Server-BYOS-GCE, but entry?
CVE-2020-11022: no packages for Image SLES15-SP2-SAP-Azure, but entry?
CVE-2020-11022: no packages for Image SLES15-SP2-SAP-Azure-LI-BYOS-Production, but entry?
CVE-2020-11022: no packages for Image SLES15-SP2-SAP-Azure-VLI-BYOS-Production, but entry?
CVE-2020-11022: no packages for Image SLES15-SP2-SAP-BYOS-Azure, but entry?
CVE-2020-11022: no packages for Image SLES15-SP2-SAP-BYOS-EC2-HVM, but entry?
CVE-2020-11022: no packages for Image SLES15-SP2-SAP-BYOS-GCE, but entry?
CVE-2020-11022: no packages for Image SLES15-SP2-SAP-EC2-HVM, but entry?
CVE-2020-11022: no packages for Image SLES15-SP2-SAP-GCE, but entry?
CVE-2020-11022: no packages for Image SLES15-SP3-Manager-4-2-Server-BYOS-Azure, but entry?
CVE-2020-11022: no packages for Image SLES15-SP3-Manager-4-2-Server-BYOS-EC2-HVM, but entry?
CVE-2020-11022: no packages for Image SLES15-SP3-Manager-4-2-Server-BYOS-GCE, but entry?
CVE-2020-11022: no packages for Image SLES15-SP3-SAP-Azure-LI-BYOS-Production, but entry?
CVE-2020-11022: no packages for Image SLES15-SP3-SAP-Azure-VLI-BYOS-Production, but entry?
CVE-2020-11022: no packages for Image SLES15-SP3-SAPCAL-Azure, but entry?
CVE-2020-11022: no packages for Image SLES15-SP3-SAPCAL-EC2-HVM, but entry?
CVE-2020-11022: no packages for Image SLES15-SP3-SAPCAL-GCE, but entry?
CVE-2020-11022: no packages for Image SLES15-SP4-Manager-Server-4-3, but entry?
CVE-2020-11022: no packages for Image SLES15-SP4-Manager-Server-4-3-Azure-llc, but entry?
CVE-2020-11022: no packages for Image SLES15-SP4-Manager-Server-4-3-Azure-ltd, but entry?
CVE-2020-11022: no packages for Image SLES15-SP4-Manager-Server-4-3-BYOS, but entry?
CVE-2020-11022: no packages for Image SLES15-SP4-Manager-Server-4-3-BYOS-Azure, but entry?
CVE-2020-11022: no packages for Image SLES15-SP4-Manager-Server-4-3-BYOS-EC2, but entry?
CVE-2020-11022: no packages for Image SLES15-SP4-Manager-Server-4-3-BYOS-GCE, but entry?
CVE-2020-11022: no packages for Image SLES15-SP4-Manager-Server-4-3-EC2-llc, but entry?
CVE-2020-11022: no packages for Image SLES15-SP4-Manager-Server-4-3-EC2-ltd, but entry?
CVE-2020-11022: no packages for Image SLES15-SP4-SAP, but entry?
CVE-2020-11022: no packages for Image SLES15-SP4-SAP-Azure, but entry?
CVE-2020-11022: no packages for Image SLES15-SP4-SAP-Azure-LI-BYOS, but entry?
CVE-2020-11022: no packages for Image SLES15-SP4-SAP-Azure-LI-BYOS-Production, but entry?
CVE-2020-11022: no packages for Image SLES15-SP4-SAP-Azure-VLI-BYOS, but entry?
CVE-2020-11022: no packages for Image SLES15-SP4-SAP-Azure-VLI-BYOS-Production, but entry?
CVE-2020-11022: no packages for Image SLES15-SP4-SAP-EC2, but entry?
CVE-2020-11022: no packages for Image SLES15-SP4-SAP-GCE, but entry?
CVE-2020-11022: no packages for Image SLES15-SP4-SAPCAL, but entry?
CVE-2020-11022: no packages for Image SLES15-SP4-SAPCAL-Azure, but entry?
CVE-2020-11022: no packages for Image SLES15-SP4-SAPCAL-EC2, but entry?
CVE-2020-11022: no packages for Image SLES15-SP4-SAPCAL-GCE, but entry?
CVE-2020-11022: no packages for Image SLES15-SP5-SAP-Azure, but entry?
CVE-2020-11022: no packages for Image SLES15-SP5-SAP-Azure-LI-BYOS, but entry?
CVE-2020-11022: no packages for Image SLES15-SP5-SAP-Azure-LI-BYOS-Production, but entry?
CVE-2020-11022: no packages for Image SLES15-SP5-SAP-Azure-VLI-BYOS, but entry?
CVE-2020-11022: no packages for Image SLES15-SP5-SAP-Azure-VLI-BYOS-Production, but entry?
CVE-2020-11022: no packages for Image SLES15-SP5-SAP-EC2, but entry?
CVE-2020-11022: no packages for Image SLES15-SP5-SAP-GCE, but entry?
CVE-2020-11022: no packages for Image SLES15-SP5-SAPCAL-Azure, but entry?
CVE-2020-11022: no packages for Image SLES15-SP5-SAPCAL-EC2, but entry?
CVE-2020-11022: no packages for Image SLES15-SP5-SAPCAL-GCE, but entry?
CVE-2020-11022: no packages for Image SLES15-SP6-SAP, but entry?
CVE-2020-11022: no packages for Image SLES15-SP6-SAP-Azure, but entry?
CVE-2020-11022: no packages for Image SLES15-SP6-SAP-Azure-LI-BYOS, but entry?
CVE-2020-11022: no packages for Image SLES15-SP6-SAP-Azure-LI-BYOS-Production, but entry?
CVE-2020-11022: no packages for Image SLES15-SP6-SAP-Azure-VLI-BYOS, but entry?
CVE-2020-11022: no packages for Image SLES15-SP6-SAP-Azure-VLI-BYOS-Production, but entry?
CVE-2020-11022: no packages for Image SLES15-SP6-SAP-EC2, but entry?
CVE-2020-11022: no packages for Image SLES15-SP6-SAP-GCE, but entry?
CVE-2020-11022: no packages for Image SLES15-SP6-SAPCAL, but entry?
CVE-2020-11022: no packages for Image SLES15-SP6-SAPCAL-Azure, but entry?
CVE-2020-11022: no packages for Image SLES15-SP6-SAPCAL-EC2, but entry?
CVE-2020-11022: no packages for Image SLES15-SP6-SAPCAL-GCE, but entry?
CVE-2020-11022: no packages for SUSE CaaS Platform 4.0, but entry?
CVE-2020-11022: no packages for SUSE Liberty Linux 7, but entry?
CVE-2020-11022: no packages for SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS, but entry?
CVE-2020-11022: no packages for SUSE Linux Enterprise Module for Basesystem 15 SP4, but entry?
CVE-2020-11022: no packages for SUSE Linux Enterprise Module for Basesystem 15 SP5, but entry?
CVE-2020-11022: no packages for SUSE Linux Enterprise Module for Basesystem 15 SP6, but entry?
CVE-2020-11022: no packages for SUSE Linux Enterprise Module for Development Tools 15 SP3, but entry?
CVE-2020-11022: no packages for SUSE Linux Enterprise Module for Open Buildservice Development Tools 15 SP3, but entry?
CVE-2020-11022: no packages for SUSE Linux Enterprise Module for Open Buildservice Development Tools 15 SP4, but entry?
CVE-2020-11022: no packages for SUSE Linux Enterprise Module for Package Hub 15 SP4, but entry?
CVE-2020-11022: no packages for SUSE Linux Enterprise Module for Package Hub 15 SP5, but entry?
CVE-2020-11022: no packages for SUSE Linux Enterprise Module for Package Hub 15 SP6, but entry?
CVE-2020-11022: no packages for SUSE Linux Enterprise Module for Web and Scripting 15 SP4, but entry?
CVE-2020-11022: no packages for SUSE Linux Enterprise Module for Web and Scripting 15 SP5, but entry?
CVE-2020-11022: no packages for SUSE Linux Enterprise Module for Web and Scripting 15 SP6, but entry?
CVE-2020-11022: no packages for SUSE Linux Enterprise Server 15 SP1-LTSS, but entry?
CVE-2020-11022: no packages for SUSE Linux Enterprise Server 15 SP4-TERADATA, but entry?
CVE-2020-11022: no packages for SUSE Linux Enterprise Server for SAP Applications 15 SP1, but entry?
CVE-2020-11022: no packages for SUSE Linux Enterprise Workstation Extension 15 SP4, but entry?
CVE-2020-11022: no packages for SUSE Linux Enterprise Workstation Extension 15 SP5, but entry?
CVE-2020-11022: no packages for SUSE Linux Enterprise Workstation Extension 15 SP6, but entry?
CVE-2020-11022: no packages for SUSE Manager Proxy 3.2, but entry?
CVE-2020-11022: no packages for SUSE Manager Proxy 4.2, but entry?
CVE-2020-11022: no packages for SUSE Manager Proxy Module 4.0, but entry?
CVE-2020-11022: no packages for SUSE Manager Proxy Module 4.1, but entry?
CVE-2020-11022: no packages for SUSE Manager Retail Branch Server 4.2, but entry?
CVE-2020-11022: no packages for SUSE Manager Server 3.2, but entry?
CVE-2020-11022: no packages for SUSE Manager Server 4.2, but entry?
CVE-2020-11022: no packages for SUSE Manager Server Module 4.0, but entry?
CVE-2020-11022: no packages for SUSE Manager Server Module 4.1, but entry?
CVE-2020-11022: no packages for SUSE Manager Server Module 4.2, but entry?
CVE-2020-11022: no packages for SUSE Manager Server Module 4.3, but entry?
CVE-2020-11022: no packages for SUSE Package Hub 12, but entry?
CVE-2020-11022: no packages for SUSE Package Hub 15 SP1, but entry?
CVE-2020-11022: no packages for SUSE Package Hub 15 SP2, but entry?
CVE-2020-11022: no packages for openSUSE Leap 15.1, but entry?
CVE-2020-11022: no packages for openSUSE Leap 15.2, but entry?
no cpe found for HPE Helion OpenStack Cloud 8 in CVE-2020-11008
no cpe found for HPE Helion OpenStack Cloud 8 in CVE-2020-10997
no cpe found for SUSE Package Hub 15 SP4 in CVE-2020-10997
no cpe found for SUSE Package Hub 15 SP1 in CVE-2020-10995
no cpe found for HPE Helion OpenStack Cloud 8 in CVE-2020-10994
skipping CVE-2020-10942 as CVE page is older than CVRF-CVE file.
no cpe found for SUSE Package Hub 15 SP1 in CVE-2020-10938
no cpe found for SUSE Package Hub 15 SP2 in CVE-2020-10932
skipping CVE-2020-10933 as CVE page is older than CVRF-CVE file.
no cpe found for HPE Helion OpenStack Cloud 8 in CVE-2020-10931
no cpe found for SUSE Liberty Linux 7 LTSS in CVE-2020-10878
No V5 entry found for CVE-2020-10872 / /home/securitybot/prod/cve-database/cvelistV5/cves/2020/10xxxx/CVE-2020-10872.json:No such file or directory
no cpe found for SUSE Linux Enterprise Module for HPC 12 SP2 in CVE-2020-10812
no cpe found for SUSE Linux Enterprise Module for HPC 12 SP2 in CVE-2020-10812
no cpe found for SUSE Linux Enterprise Module for HPC 12 SP2 in CVE-2020-10812
no cpe found for SUSE Linux Enterprise Module for HPC 12 SP2 in CVE-2020-10812
no cpe found for SUSE Linux Enterprise Module for HPC 12 SP2 in CVE-2020-10812
no cpe found for SUSE Linux Enterprise Module for HPC 12 SP2 in CVE-2020-10812
no cpe found for SUSE Linux Enterprise Module for HPC 12 SP2 in CVE-2020-10812
no cpe found for SUSE Linux Enterprise Module for HPC 12 SP2 in CVE-2020-10812
no cpe found for SUSE Linux Enterprise Module for HPC 12 SP2 in CVE-2020-10812
no cpe found for SUSE Linux Enterprise Module for HPC 12 SP2 in CVE-2020-10812
no cpe found for SUSE Linux Enterprise Module for HPC 12 SP2 in CVE-2020-10812
no cpe found for SUSE Linux Enterprise Module for HPC 12 SP2 in CVE-2020-10812
no cpe found for SUSE Linux Enterprise Module for HPC 12 SP2 in CVE-2020-10811
no cpe found for SUSE Linux Enterprise Module for HPC 12 SP2 in CVE-2020-10811
no cpe found for SUSE Linux Enterprise Module for HPC 12 SP2 in CVE-2020-10811
no cpe found for SUSE Linux Enterprise Module for HPC 12 SP2 in CVE-2020-10811
no cpe found for SUSE Linux Enterprise Module for HPC 12 SP2 in CVE-2020-10811
no cpe found for SUSE Linux Enterprise Module for HPC 12 SP2 in CVE-2020-10811
no cpe found for SUSE Linux Enterprise Module for HPC 12 SP2 in CVE-2020-10811
no cpe found for SUSE Linux Enterprise Module for HPC 12 SP2 in CVE-2020-10811
no cpe found for SUSE Linux Enterprise Module for HPC 12 SP2 in CVE-2020-10811
no cpe found for SUSE Linux Enterprise Module for HPC 12 SP2 in CVE-2020-10811
no cpe found for SUSE Linux Enterprise Module for HPC 12 SP2 in CVE-2020-10811
no cpe found for SUSE Linux Enterprise Module for HPC 12 SP2 in CVE-2020-10811
no cpe found for SUSE Linux Enterprise Module for HPC 12 SP2 in CVE-2020-10810
no cpe found for SUSE Linux Enterprise Module for HPC 12 SP2 in CVE-2020-10810
no cpe found for SUSE Linux Enterprise Module for HPC 12 SP2 in CVE-2020-10810
no cpe found for SUSE Linux Enterprise Module for HPC 12 SP2 in CVE-2020-10810
no cpe found for SUSE Linux Enterprise Module for HPC 12 SP2 in CVE-2020-10810
no cpe found for SUSE Linux Enterprise Module for HPC 12 SP2 in CVE-2020-10810
no cpe found for SUSE Linux Enterprise Module for HPC 12 SP2 in CVE-2020-10810
no cpe found for SUSE Linux Enterprise Module for HPC 12 SP2 in CVE-2020-10810
no cpe found for SUSE Linux Enterprise Module for HPC 12 SP2 in CVE-2020-10810
no cpe found for SUSE Linux Enterprise Module for HPC 12 SP2 in CVE-2020-10810
no cpe found for SUSE Linux Enterprise Module for HPC 12 SP2 in CVE-2020-10810
no cpe found for SUSE Linux Enterprise Module for HPC 12 SP2 in CVE-2020-10810
no cpe found for SUSE Linux Enterprise Module for HPC 12 SP2 in CVE-2020-10809
no cpe found for SUSE Linux Enterprise Module for HPC 12 SP2 in CVE-2020-10809
no cpe found for SUSE Linux Enterprise Module for HPC 12 SP2 in CVE-2020-10809
no cpe found for SUSE Linux Enterprise Module for HPC 12 SP2 in CVE-2020-10809
no cpe found for SUSE Linux Enterprise Module for HPC 12 SP2 in CVE-2020-10809
no cpe found for SUSE Linux Enterprise Module for HPC 12 SP2 in CVE-2020-10809
no cpe found for SUSE Linux Enterprise Module for HPC 12 SP2 in CVE-2020-10809
no cpe found for SUSE Linux Enterprise Module for HPC 12 SP2 in CVE-2020-10809
no cpe found for SUSE Linux Enterprise Module for HPC 12 SP2 in CVE-2020-10809
no cpe found for SUSE Linux Enterprise Module for HPC 12 SP2 in CVE-2020-10809
no cpe found for SUSE Linux Enterprise Module for HPC 12 SP2 in CVE-2020-10809
no cpe found for SUSE Linux Enterprise Module for HPC 12 SP2 in CVE-2020-10809
no cpe found for SUSE Package Hub 15 in CVE-2020-10804
no cpe found for SUSE Package Hub 15 SP1 in CVE-2020-10804
no cpe found for SUSE Package Hub 15 in CVE-2020-10803
no cpe found for SUSE Package Hub 15 SP1 in CVE-2020-10803
no cpe found for SUSE Package Hub 15 in CVE-2020-10802
no cpe found for SUSE Package Hub 15 SP1 in CVE-2020-10802
skipping CVE-2020-10781 as CVE page is older than CVRF-CVE file.
no cpe found for SUSE Liberty Linux 7 LTSS in CVE-2020-10772
skipping CVE-2020-10773 as CVE page is older than CVRF-CVE file.
skipping CVE-2020-10769 as CVE page is older than CVRF-CVE file.
skipping CVE-2020-10761 as CVE page is older than CVRF-CVE file.
no cpe found for HPE Helion OpenStack Cloud 8 in CVE-2020-10755
skipping CVE-2020-10757 as CVE page is older than CVRF-CVE file.
skipping CVE-2020-10756 as CVE page is older than CVRF-CVE file.
skipping CVE-2020-10754 as CVE page is older than CVRF-CVE file.
skipping CVE-2020-10751 as CVE page is older than CVRF-CVE file.
no cpe found for HPE Helion OpenStack Cloud 8 in CVE-2020-10744
no cpe found for SUSE Manager Tools for SLE Micro 5 in CVE-2020-10744
no cpe found for HPE Helion OpenStack Cloud 8 in CVE-2020-10743
skipping CVE-2020-10742 as CVE page is older than CVRF-CVE file.
no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2020-10735
skipping CVE-2020-10736 as CVE page is older than CVRF-CVE file.
--- /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2020-10735.xml 2024-10-22 04:17:43.247395000 +0200
+++ /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2020-10735.xml.new 2024-10-29 02:14:29.394887000 +0100
@@ -14,13 +14,13 @@
1
- 139
- 2024-10-22T02:17:42Z
+ 140
+ 2024-10-29T01:14:28Z
current
2022-09-05T23:48:28Z
- 2024-10-22T02:17:42Z
+ 2024-10-29T01:14:28Z
cve-database/bin/generate-cvrf-cve.pl
2020-12-27T01:00:00Z
@@ -2787,6 +2787,24 @@
python313-x86-64-v3-3.13.0~b3-1.1
+
+ python314-3.14.0~a1-1.1
+
+
+ python314-curses-3.14.0~a1-1.1
+
+
+ python314-dbm-3.14.0~a1-1.1
+
+
+ python314-idle-3.14.0~a1-1.1
+
+
+ python314-tk-3.14.0~a1-1.1
+
+
+ python314-x86-64-v3-3.14.0~a1-1.1
+
python36-3.6.15-32.2
@@ -7590,6 +7608,24 @@
python313-x86-64-v3-3.13.0~b3-1.1 as a component of openSUSE Tumbleweed
+
+ python314-3.14.0~a1-1.1 as a component of openSUSE Tumbleweed
+
+
+ python314-curses-3.14.0~a1-1.1 as a component of openSUSE Tumbleweed
+
+
+ python314-dbm-3.14.0~a1-1.1 as a component of openSUSE Tumbleweed
+
+
+ python314-idle-3.14.0~a1-1.1 as a component of openSUSE Tumbleweed
+
+
+ python314-tk-3.14.0~a1-1.1 as a component of openSUSE Tumbleweed
+
+
+ python314-x86-64-v3-3.14.0~a1-1.1 as a component of openSUSE Tumbleweed
+
python38-3.8.14-1.1 as a component of openSUSE Tumbleweed
@@ -9702,6 +9738,12 @@
openSUSE Tumbleweed:python313-idle-3.13.0~b3-1.1
openSUSE Tumbleweed:python313-tk-3.13.0~b3-1.1
openSUSE Tumbleweed:python313-x86-64-v3-3.13.0~b3-1.1
+ openSUSE Tumbleweed:python314-3.14.0~a1-1.1
+ openSUSE Tumbleweed:python314-curses-3.14.0~a1-1.1
+ openSUSE Tumbleweed:python314-dbm-3.14.0~a1-1.1
+ openSUSE Tumbleweed:python314-idle-3.14.0~a1-1.1
+ openSUSE Tumbleweed:python314-tk-3.14.0~a1-1.1
+ openSUSE Tumbleweed:python314-x86-64-v3-3.14.0~a1-1.1
openSUSE Tumbleweed:python38-3.8.14-1.1
openSUSE Tumbleweed:python38-32bit-3.8.14-1.1
openSUSE Tumbleweed:python38-curses-3.8.14-1.1
skipping CVE-2020-10732 as CVE page is older than CVRF-CVE file.
no cpe found for HPE Helion OpenStack Cloud 8 in CVE-2020-10729
no cpe found for SUSE Package Hub 15 SP3 in CVE-2020-10729
skipping CVE-2020-10726 as CVE page is older than CVRF-CVE file.
skipping CVE-2020-10725 as CVE page is older than CVRF-CVE file.
skipping CVE-2020-10720 as CVE page is older than CVRF-CVE file.
skipping CVE-2020-10717 as CVE page is older than CVRF-CVE file.
skipping CVE-2020-10711 as CVE page is older than CVRF-CVE file.
skipping CVE-2020-10708 as CVE page is older than CVRF-CVE file.
skipping CVE-2020-10702 as CVE page is older than CVRF-CVE file.
skipping CVE-2020-10701 as CVE page is older than CVRF-CVE file.
CVE-2020-10696: no packages for Image SLES15-SP3-BYOS-EC2-HVM, but entry?
CVE-2020-10696: no packages for Container ses/7.1/cephcsi/csi-node-driver-registrar:v2.7.0, but entry?
CVE-2020-10696: no packages for Container ses/7.1/cephcsi/cephcsi:v3.7.0.0, but entry?
CVE-2020-10696: no packages for Image SLES15-SP3-CHOST-BYOS-Aliyun, but entry?
CVE-2020-10696: no packages for Image SLES15-SP3-CHOST-BYOS-GCE, but entry?
CVE-2020-10696: no packages for Container ses/7.1/rook/ceph:1.10.1.16.4.5.328, but entry?
CVE-2020-10696: no packages for Container ses/7.1/cephcsi/csi-snapshotter:v6.2.1, but entry?
CVE-2020-10696: no packages for Image SLES15-SP3-SAP-BYOS-EC2-HVM, but entry?
CVE-2020-10696: no packages for Image SLES15-SP3-Manager-4-2-Proxy-BYOS-EC2-HVM, but entry?
CVE-2020-10696: no packages for Image SLES15-SP3-HPC-BYOS-GCE, but entry?
CVE-2020-10696: no packages for Image SLES15-SP3-Micro-5-2-BYOS-Azure, but entry?
CVE-2020-10696: no packages for Image SLES15-SP3-Manager-4-2-Server-BYOS-GCE, but entry?
CVE-2020-10696: no packages for Image SLES15-SP3-CHOST-BYOS-Azure, but entry?
CVE-2020-10696: no packages for Image SLES15-SP3-HPC-BYOS-EC2-HVM, but entry?
CVE-2020-10696: no packages for Container ses/7.1/ceph/prometheus-alertmanager:0.23.0.3.2.368, but entry?
CVE-2020-10696: no packages for Container ses/7.1/ceph/haproxy:2.0.14.3.5.330, but entry?
CVE-2020-10696: no packages for Container suse/sle-micro/5.2/toolbox:12.1-6.2.199, but entry?
CVE-2020-10696: no packages for Container ses/7.1/ceph/keepalived:2.0.19.3.5.316, but entry?
CVE-2020-10696: no packages for Container trento/trento-web:1.2.0-build4.18.11, but entry?
CVE-2020-10696: no packages for Image SLES15-SP3-HPC-BYOS-Azure, but entry?
CVE-2020-10696: no packages for Image SLES15-SP3-SAPCAL-Azure, but entry?
CVE-2020-10696: no packages for Image SLES15-SP3-Micro-5-2-BYOS-EC2-HVM, but entry?
CVE-2020-10696: no packages for Image SLES15-SP3-Micro-5-1-BYOS-GCE, but entry?
CVE-2020-10696: no packages for Container bci/nodejs:12-17.28, but entry?
CVE-2020-10696: no packages for Image SLES15-SP3-Manager-4-2-Server-BYOS-EC2-HVM, but entry?
CVE-2020-10696: no packages for Container ses/7.1/ceph/prometheus-snmp_notifier:1.2.1.2.2.341, but entry?
CVE-2020-10696: no packages for Image SLES15-SP3-SAP-Azure-LI-BYOS-Production, but entry?
CVE-2020-10696: no packages for Image SLES15-SP3-Micro-5-1-BYOS-Azure, but entry?
CVE-2020-10696: no packages for SUSE Linux Enterprise Micro 5.2, but entry?
CVE-2020-10696: no packages for Image SLES15-SP3-CHOST-BYOS-SAP-CCloud, but entry?
CVE-2020-10696: no packages for Container ses/7.1/ceph/grafana:8.3.10.2.2.285, but entry?
CVE-2020-10696: no packages for Container ses/7.1/cephcsi/csi-attacher:v4.1.0, but entry?
CVE-2020-10696: no packages for Image SLES15-SP3-BYOS-GCE, but entry?
CVE-2020-10696: no packages for Container ses/7.1/cephcsi/csi-provisioner:v3.4.0, but entry?
CVE-2020-10696: no packages for openSUSE Leap Micro 5.2, but entry?
CVE-2020-10696: no packages for Container trento/trento-db:14.5-rev1.0.0-build2.2.178, but entry?
CVE-2020-10696: no packages for Image SLES15-SP3-Manager-4-2-Server-BYOS-Azure, but entry?
CVE-2020-10696: no packages for Container trento/trento-wanda:1.0.0-build1.5.2, but entry?
CVE-2020-10696: no packages for Image SLES15-SP3-SAPCAL-GCE, but entry?
CVE-2020-10696: no packages for Image SLES15-SP3-SAP-BYOS-Azure, but entry?
CVE-2020-10696: no packages for Image SLES15-SP3-SAPCAL-EC2-HVM, but entry?
CVE-2020-10696: no packages for Container suse/sle-micro/5.1/toolbox:12.1-2.2.377, but entry?
CVE-2020-10696: no packages for Container bci/bci-init:15.3.21.22, but entry?
CVE-2020-10696: no packages for Image SLES15-SP3-CHOST-BYOS-EC2, but entry?
CVE-2020-10696: no packages for Image SLES15-SP3-Micro-5-2-BYOS-GCE, but entry?
CVE-2020-10696: no packages for Container ses/7.1/cephcsi/csi-resizer:v1.7.0, but entry?
CVE-2020-10696: no packages for Image SLES15-SP3-SAP-BYOS-GCE, but entry?
CVE-2020-10696: no packages for Container ses/7.1/ceph/prometheus-node-exporter:1.3.0.3.2.359, but entry?
CVE-2020-10696: no packages for Image SLES15-SP3-BYOS-Azure, but entry?
CVE-2020-10696: no packages for SUSE Linux Enterprise Module for Basesystem 15 SP3, but entry?
CVE-2020-10696: no packages for Image SLES15-SP3-Manager-4-2-Proxy-BYOS-Azure, but entry?
CVE-2020-10696: no packages for Image SLES15-SP3-SAP-Azure-VLI-BYOS-Production, but entry?
CVE-2020-10696: no packages for Container trento/trento-runner:1.1.0-build4.19.12, but entry?
CVE-2020-10696: no packages for Container suse/ltss/sle15.3/bci-base:latest, but entry?
CVE-2020-10696: no packages for Container ses/7.1/ceph/prometheus-server:2.32.1.3.2.352, but entry?
CVE-2020-10696: no packages for SUSE Linux Enterprise Micro 5.1, but entry?
CVE-2020-10696: no packages for Container suse/sle-micro-rancher/5.2:latest, but entry?
CVE-2020-10696: no packages for Container suse/sle15:15.3.17.20.57, but entry?
CVE-2020-10696: no packages for Container bci/bci-minimal:15.3.32.15, but entry?
CVE-2020-10696: no packages for Image SLES15-SP3-Micro-5-1-BYOS-EC2-HVM, but entry?
CVE-2020-10696: no packages for Image SLES15-SP3-Manager-4-2-Proxy-BYOS-GCE, but entry?
CVE-2020-10696: no packages for Container bci/python:3.9-20.4, but entry?
no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2020-10696
CVE-2020-10696: no packages for Container bci/bci-init:15.3.21.22, but entry?
CVE-2020-10696: no packages for Container bci/bci-minimal:15.3.32.15, but entry?
CVE-2020-10696: no packages for Container bci/nodejs:12-17.28, but entry?
CVE-2020-10696: no packages for Container bci/python:3.9-20.4, but entry?
CVE-2020-10696: no packages for Container ses/7.1/ceph/grafana:8.3.10.2.2.285, but entry?
CVE-2020-10696: no packages for Container ses/7.1/ceph/haproxy:2.0.14.3.5.330, but entry?
CVE-2020-10696: no packages for Container ses/7.1/ceph/keepalived:2.0.19.3.5.316, but entry?
CVE-2020-10696: no packages for Container ses/7.1/ceph/prometheus-alertmanager:0.23.0.3.2.368, but entry?
CVE-2020-10696: no packages for Container ses/7.1/ceph/prometheus-node-exporter:1.3.0.3.2.359, but entry?
CVE-2020-10696: no packages for Container ses/7.1/ceph/prometheus-server:2.32.1.3.2.352, but entry?
CVE-2020-10696: no packages for Container ses/7.1/ceph/prometheus-snmp_notifier:1.2.1.2.2.341, but entry?
CVE-2020-10696: no packages for Container ses/7.1/cephcsi/cephcsi:v3.7.0.0, but entry?
CVE-2020-10696: no packages for Container ses/7.1/cephcsi/csi-attacher:v4.1.0, but entry?
CVE-2020-10696: no packages for Container ses/7.1/cephcsi/csi-node-driver-registrar:v2.7.0, but entry?
CVE-2020-10696: no packages for Container ses/7.1/cephcsi/csi-provisioner:v3.4.0, but entry?
CVE-2020-10696: no packages for Container ses/7.1/cephcsi/csi-resizer:v1.7.0, but entry?
CVE-2020-10696: no packages for Container ses/7.1/cephcsi/csi-snapshotter:v6.2.1, but entry?
CVE-2020-10696: no packages for Container ses/7.1/rook/ceph:1.10.1.16.4.5.328, but entry?
CVE-2020-10696: no packages for Container suse/ltss/sle15.3/bci-base:latest, but entry?
CVE-2020-10696: no packages for Container suse/sle-micro-rancher/5.2:latest, but entry?
CVE-2020-10696: no packages for Container suse/sle-micro/5.1/toolbox:12.1-2.2.377, but entry?
CVE-2020-10696: no packages for Container suse/sle-micro/5.2/toolbox:12.1-6.2.199, but entry?
CVE-2020-10696: no packages for Container suse/sle15:15.3.17.20.57, but entry?
CVE-2020-10696: no packages for Container trento/trento-db:14.5-rev1.0.0-build2.2.178, but entry?
CVE-2020-10696: no packages for Container trento/trento-runner:1.1.0-build4.19.12, but entry?
CVE-2020-10696: no packages for Container trento/trento-wanda:1.0.0-build1.5.2, but entry?
CVE-2020-10696: no packages for Container trento/trento-web:1.2.0-build4.18.11, but entry?
CVE-2020-10696: no packages for Image SLES15-SP3-BYOS-Azure, but entry?
CVE-2020-10696: no packages for Image SLES15-SP3-BYOS-EC2-HVM, but entry?
CVE-2020-10696: no packages for Image SLES15-SP3-BYOS-GCE, but entry?
CVE-2020-10696: no packages for Image SLES15-SP3-CHOST-BYOS-Aliyun, but entry?
CVE-2020-10696: no packages for Image SLES15-SP3-CHOST-BYOS-Azure, but entry?
CVE-2020-10696: no packages for Image SLES15-SP3-CHOST-BYOS-EC2, but entry?
CVE-2020-10696: no packages for Image SLES15-SP3-CHOST-BYOS-GCE, but entry?
CVE-2020-10696: no packages for Image SLES15-SP3-CHOST-BYOS-SAP-CCloud, but entry?
CVE-2020-10696: no packages for Image SLES15-SP3-HPC-BYOS-Azure, but entry?
CVE-2020-10696: no packages for Image SLES15-SP3-HPC-BYOS-EC2-HVM, but entry?
CVE-2020-10696: no packages for Image SLES15-SP3-HPC-BYOS-GCE, but entry?
CVE-2020-10696: no packages for Image SLES15-SP3-Manager-4-2-Proxy-BYOS-Azure, but entry?
CVE-2020-10696: no packages for Image SLES15-SP3-Manager-4-2-Proxy-BYOS-EC2-HVM, but entry?
CVE-2020-10696: no packages for Image SLES15-SP3-Manager-4-2-Proxy-BYOS-GCE, but entry?
CVE-2020-10696: no packages for Image SLES15-SP3-Manager-4-2-Server-BYOS-Azure, but entry?
CVE-2020-10696: no packages for Image SLES15-SP3-Manager-4-2-Server-BYOS-EC2-HVM, but entry?
CVE-2020-10696: no packages for Image SLES15-SP3-Manager-4-2-Server-BYOS-GCE, but entry?
CVE-2020-10696: no packages for Image SLES15-SP3-Micro-5-1-BYOS-Azure, but entry?
CVE-2020-10696: no packages for Image SLES15-SP3-Micro-5-1-BYOS-EC2-HVM, but entry?
CVE-2020-10696: no packages for Image SLES15-SP3-Micro-5-1-BYOS-GCE, but entry?
CVE-2020-10696: no packages for Image SLES15-SP3-Micro-5-2-BYOS-Azure, but entry?
CVE-2020-10696: no packages for Image SLES15-SP3-Micro-5-2-BYOS-EC2-HVM, but entry?
CVE-2020-10696: no packages for Image SLES15-SP3-Micro-5-2-BYOS-GCE, but entry?
CVE-2020-10696: no packages for Image SLES15-SP3-SAP-Azure-LI-BYOS-Production, but entry?
CVE-2020-10696: no packages for Image SLES15-SP3-SAP-Azure-VLI-BYOS-Production, but entry?
CVE-2020-10696: no packages for Image SLES15-SP3-SAP-BYOS-Azure, but entry?
CVE-2020-10696: no packages for Image SLES15-SP3-SAP-BYOS-EC2-HVM, but entry?
CVE-2020-10696: no packages for Image SLES15-SP3-SAP-BYOS-GCE, but entry?
CVE-2020-10696: no packages for Image SLES15-SP3-SAPCAL-Azure, but entry?
CVE-2020-10696: no packages for Image SLES15-SP3-SAPCAL-EC2-HVM, but entry?
CVE-2020-10696: no packages for Image SLES15-SP3-SAPCAL-GCE, but entry?
CVE-2020-10696: no packages for SUSE Linux Enterprise Micro 5.1, but entry?
CVE-2020-10696: no packages for SUSE Linux Enterprise Micro 5.2, but entry?
CVE-2020-10696: no packages for SUSE Linux Enterprise Module for Basesystem 15 SP3, but entry?
CVE-2020-10696: no packages for openSUSE Leap Micro 5.2, but entry?
CVE-2020-10696: no packages for Container bci/bci-init:15.3.21.22, but entry?
CVE-2020-10696: no packages for Container bci/bci-minimal:15.3.32.15, but entry?
CVE-2020-10696: no packages for Container bci/nodejs:12-17.28, but entry?
CVE-2020-10696: no packages for Container bci/python:3.9-20.4, but entry?
CVE-2020-10696: no packages for Container ses/7.1/ceph/grafana:8.3.10.2.2.285, but entry?
CVE-2020-10696: no packages for Container ses/7.1/ceph/haproxy:2.0.14.3.5.330, but entry?
CVE-2020-10696: no packages for Container ses/7.1/ceph/keepalived:2.0.19.3.5.316, but entry?
CVE-2020-10696: no packages for Container ses/7.1/ceph/prometheus-alertmanager:0.23.0.3.2.368, but entry?
CVE-2020-10696: no packages for Container ses/7.1/ceph/prometheus-node-exporter:1.3.0.3.2.359, but entry?
CVE-2020-10696: no packages for Container ses/7.1/ceph/prometheus-server:2.32.1.3.2.352, but entry?
CVE-2020-10696: no packages for Container ses/7.1/ceph/prometheus-snmp_notifier:1.2.1.2.2.341, but entry?
CVE-2020-10696: no packages for Container ses/7.1/cephcsi/cephcsi:v3.7.0.0, but entry?
CVE-2020-10696: no packages for Container ses/7.1/cephcsi/csi-attacher:v4.1.0, but entry?
CVE-2020-10696: no packages for Container ses/7.1/cephcsi/csi-node-driver-registrar:v2.7.0, but entry?
CVE-2020-10696: no packages for Container ses/7.1/cephcsi/csi-provisioner:v3.4.0, but entry?
CVE-2020-10696: no packages for Container ses/7.1/cephcsi/csi-resizer:v1.7.0, but entry?
CVE-2020-10696: no packages for Container ses/7.1/cephcsi/csi-snapshotter:v6.2.1, but entry?
CVE-2020-10696: no packages for Container ses/7.1/rook/ceph:1.10.1.16.4.5.328, but entry?
CVE-2020-10696: no packages for Container suse/ltss/sle15.3/bci-base:latest, but entry?
CVE-2020-10696: no packages for Container suse/sle-micro-rancher/5.2:latest, but entry?
CVE-2020-10696: no packages for Container suse/sle-micro/5.1/toolbox:12.1-2.2.377, but entry?
CVE-2020-10696: no packages for Container suse/sle-micro/5.2/toolbox:12.1-6.2.199, but entry?
CVE-2020-10696: no packages for Container suse/sle15:15.3.17.20.57, but entry?
CVE-2020-10696: no packages for Container trento/trento-db:14.5-rev1.0.0-build2.2.178, but entry?
CVE-2020-10696: no packages for Container trento/trento-runner:1.1.0-build4.19.12, but entry?
CVE-2020-10696: no packages for Container trento/trento-wanda:1.0.0-build1.5.2, but entry?
CVE-2020-10696: no packages for Container trento/trento-web:1.2.0-build4.18.11, but entry?
CVE-2020-10696: no packages for Image SLES15-SP3-BYOS-Azure, but entry?
CVE-2020-10696: no packages for Image SLES15-SP3-BYOS-EC2-HVM, but entry?
CVE-2020-10696: no packages for Image SLES15-SP3-BYOS-GCE, but entry?
CVE-2020-10696: no packages for Image SLES15-SP3-CHOST-BYOS-Aliyun, but entry?
CVE-2020-10696: no packages for Image SLES15-SP3-CHOST-BYOS-Azure, but entry?
CVE-2020-10696: no packages for Image SLES15-SP3-CHOST-BYOS-EC2, but entry?
CVE-2020-10696: no packages for Image SLES15-SP3-CHOST-BYOS-GCE, but entry?
CVE-2020-10696: no packages for Image SLES15-SP3-CHOST-BYOS-SAP-CCloud, but entry?
CVE-2020-10696: no packages for Image SLES15-SP3-HPC-BYOS-Azure, but entry?
CVE-2020-10696: no packages for Image SLES15-SP3-HPC-BYOS-EC2-HVM, but entry?
CVE-2020-10696: no packages for Image SLES15-SP3-HPC-BYOS-GCE, but entry?
CVE-2020-10696: no packages for Image SLES15-SP3-Manager-4-2-Proxy-BYOS-Azure, but entry?
CVE-2020-10696: no packages for Image SLES15-SP3-Manager-4-2-Proxy-BYOS-EC2-HVM, but entry?
CVE-2020-10696: no packages for Image SLES15-SP3-Manager-4-2-Proxy-BYOS-GCE, but entry?
CVE-2020-10696: no packages for Image SLES15-SP3-Manager-4-2-Server-BYOS-Azure, but entry?
CVE-2020-10696: no packages for Image SLES15-SP3-Manager-4-2-Server-BYOS-EC2-HVM, but entry?
CVE-2020-10696: no packages for Image SLES15-SP3-Manager-4-2-Server-BYOS-GCE, but entry?
CVE-2020-10696: no packages for Image SLES15-SP3-Micro-5-1-BYOS-Azure, but entry?
CVE-2020-10696: no packages for Image SLES15-SP3-Micro-5-1-BYOS-EC2-HVM, but entry?
CVE-2020-10696: no packages for Image SLES15-SP3-Micro-5-1-BYOS-GCE, but entry?
CVE-2020-10696: no packages for Image SLES15-SP3-Micro-5-2-BYOS-Azure, but entry?
CVE-2020-10696: no packages for Image SLES15-SP3-Micro-5-2-BYOS-EC2-HVM, but entry?
CVE-2020-10696: no packages for Image SLES15-SP3-Micro-5-2-BYOS-GCE, but entry?
CVE-2020-10696: no packages for Image SLES15-SP3-SAP-Azure-LI-BYOS-Production, but entry?
CVE-2020-10696: no packages for Image SLES15-SP3-SAP-Azure-VLI-BYOS-Production, but entry?
CVE-2020-10696: no packages for Image SLES15-SP3-SAP-BYOS-Azure, but entry?
CVE-2020-10696: no packages for Image SLES15-SP3-SAP-BYOS-EC2-HVM, but entry?
CVE-2020-10696: no packages for Image SLES15-SP3-SAP-BYOS-GCE, but entry?
CVE-2020-10696: no packages for Image SLES15-SP3-SAPCAL-Azure, but entry?
CVE-2020-10696: no packages for Image SLES15-SP3-SAPCAL-EC2-HVM, but entry?
CVE-2020-10696: no packages for Image SLES15-SP3-SAPCAL-GCE, but entry?
CVE-2020-10696: no packages for SUSE Linux Enterprise Micro 5.1, but entry?
CVE-2020-10696: no packages for SUSE Linux Enterprise Micro 5.2, but entry?
CVE-2020-10696: no packages for SUSE Linux Enterprise Module for Basesystem 15 SP3, but entry?
CVE-2020-10696: no packages for openSUSE Leap Micro 5.2, but entry?
no cpe found for HPE Helion OpenStack Cloud 8 in CVE-2020-10691
no cpe found for SUSE Package Hub 15 SP3 in CVE-2020-10691
no cpe found for HPE Helion OpenStack Cloud 8 in CVE-2020-10685
no cpe found for SUSE Package Hub 15 SP3 in CVE-2020-10685
no cpe found for HPE Helion OpenStack Cloud 8 in CVE-2020-10684
no cpe found for SUSE Package Hub 15 SP3 in CVE-2020-10684
skipping CVE-2020-10683 as CVE page is older than CVRF-CVE file.
skipping CVE-2020-10663 as CVE page is older than CVRF-CVE file.
no cpe found for SUSE Package Hub 15 SP1 in CVE-2020-10593
no cpe found for SUSE Package Hub 15 SP2 in CVE-2020-10593
no cpe found for SUSE Package Hub 15 SP1 in CVE-2020-10592
no cpe found for SUSE Package Hub 15 SP2 in CVE-2020-10592
no cpe found for SUSE Liberty Linux 7 LTSS in CVE-2020-10543
no cpe found for SUSE Liberty Linux 7 LTSS in CVE-2020-10531
no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2020-10531
no cpe found for HPE Helion OpenStack Cloud 8 in CVE-2020-10379
no cpe found for HPE Helion OpenStack Cloud 8 in CVE-2020-10378
No V5 entry found for CVE-2020-10370 / /home/securitybot/prod/cve-database/cvelistV5/cves/2020/10xxxx/CVE-2020-10370.json:No such file or directory
No V5 entry found for CVE-2020-10369 / /home/securitybot/prod/cve-database/cvelistV5/cves/2020/10xxxx/CVE-2020-10369.json:No such file or directory
No V5 entry found for CVE-2020-10368 / /home/securitybot/prod/cve-database/cvelistV5/cves/2020/10xxxx/CVE-2020-10368.json:No such file or directory
No V5 entry found for CVE-2020-10367 / /home/securitybot/prod/cve-database/cvelistV5/cves/2020/10xxxx/CVE-2020-10367.json:No such file or directory
skipping CVE-2020-10251 as CVE page is older than CVRF-CVE file.
no cpe found for HPE Helion OpenStack Cloud 8 in CVE-2020-10177
skipping CVE-2020-10188 as CVE page is older than CVRF-CVE file.
CVE-2020-10109: no packages for openSUSE Leap 15.4, but entry?
no cpe found for HPE Helion OpenStack Cloud 8 in CVE-2020-10109
CVE-2020-10109: no packages for openSUSE Leap 15.4, but entry?
CVE-2020-10109: no packages for openSUSE Leap 15.4, but entry?
skipping CVE-2020-10134 as CVE page is older than CVRF-CVE file.
no cpe found for HPE Helion OpenStack Cloud 8 in CVE-2020-10108
no cpe found for SUSE Package Hub 15 SP1 in CVE-2020-10030
skipping CVE-2020-9948 as CVE page is older than CVRF-CVE file.
no cpe found for HPE Helion OpenStack Cloud 8 in CVE-2020-9543
skipping CVE-2020-9490 as CVE page is older than CVRF-CVE file.
no cpe found for HPE Helion OpenStack Cloud 8 in CVE-2020-9402
skipping CVE-2020-9431 as CVE page is older than CVRF-CVE file.
skipping CVE-2020-9430 as CVE page is older than CVRF-CVE file.
skipping CVE-2020-9429 as CVE page is older than CVRF-CVE file.
skipping CVE-2020-9428 as CVE page is older than CVRF-CVE file.
skipping CVE-2020-9391 as CVE page is older than CVRF-CVE file.
no cpe found for SUSE Liberty Linux 7 LTSS in CVE-2020-9359
skipping CVE-2020-9308 as CVE page is older than CVRF-CVE file.
no cpe found for SUSE Package Hub 15 in CVE-2020-9273
no cpe found for SUSE Package Hub 15 SP1 in CVE-2020-9273
no cpe found for SUSE Package Hub 15 in CVE-2020-9272
no cpe found for SUSE Package Hub 15 SP1 in CVE-2020-9272
no cpe found for SUSE Package Hub 15 in CVE-2020-8955
no cpe found for SUSE Package Hub 15 SP1 in CVE-2020-8955
CVE-2020-8908: no packages for Image SLES15-SP6-SAPCAL-Azure, but entry?
CVE-2020-8908: no packages for Image SLES15-SP6-SAP-Azure-VLI-BYOS, but entry?
CVE-2020-8908: no packages for Image SLES15-SP5-SAP-Azure, but entry?
CVE-2020-8908: no packages for Image SLES15-SP5-SAP-Azure-VLI-BYOS-Production, but entry?
CVE-2020-8908: no packages for Image SLES15-SP5-SAPCAL-GCE, but entry?
CVE-2020-8908: no packages for Image SLES15-SP6-SAP-Azure, but entry?
CVE-2020-8908: no packages for SUSE Linux Enterprise Server 15 SP1-LTSS, but entry?
CVE-2020-8908: no packages for Image SLES15-SP2-SAP-EC2-HVM, but entry?
CVE-2020-8908: no packages for Image SLES15-SP3-SAP-Azure-LI-BYOS-Production, but entry?
CVE-2020-8908: no packages for Image SLES15-SP6-SAP-EC2, but entry?
CVE-2020-8908: no packages for Container bci/openjdk:11-7.1, but entry?
CVE-2020-8908: no packages for Image SLES15-SP4-SAP-EC2, but entry?
CVE-2020-8908: no packages for SUSE Linux Enterprise Server for SAP Applications 15 SP1, but entry?
CVE-2020-8908: no packages for SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS, but entry?
CVE-2020-8908: no packages for Image SLES15-SP4-SAPCAL-EC2, but entry?
CVE-2020-8908: no packages for SUSE Linux Enterprise Module for Web and Scripting 15 SP4, but entry?
CVE-2020-8908: no packages for Image SLES15-SP5-SAPCAL-EC2, but entry?
CVE-2020-8908: no packages for Image SLES15-SP4-SAPCAL-Azure, but entry?
CVE-2020-8908: no packages for Image SLES15-SP2-SAP-Azure, but entry?
CVE-2020-8908: no packages for SUSE Linux Enterprise Module for Basesystem 15 SP5, but entry?
CVE-2020-8908: no packages for Image SLES15-SP2-SAP-Azure-LI-BYOS-Production, but entry?
CVE-2020-8908: no packages for Image SLES15-SP4-SAP-Azure-LI-BYOS-Production, but entry?
CVE-2020-8908: no packages for SUSE Manager Proxy 4.2, but entry?
CVE-2020-8908: no packages for SUSE Linux Enterprise Workstation Extension 15 SP4, but entry?
CVE-2020-8908: no packages for SUSE Linux Enterprise Module for Package Hub 15 SP5, but entry?
CVE-2020-8908: no packages for Image SLES15-SP4-SAP-Azure, but entry?
CVE-2020-8908: no packages for Image SLES15-SP3-Manager-4-2-Proxy-BYOS-EC2-HVM, but entry?
CVE-2020-8908: no packages for SUSE Linux Enterprise Module for Web and Scripting 15 SP5, but entry?
CVE-2020-8908: no packages for Image SLES15-SP2-SAP-BYOS-GCE, but entry?
CVE-2020-8908: no packages for SUSE Linux Enterprise Module for Basesystem 15 SP6, but entry?
CVE-2020-8908: no packages for Image SLES15-SP5-SAP-Azure-LI-BYOS-Production, but entry?
CVE-2020-8908: no packages for Image SLES15-SP5-SAP-Azure-VLI-BYOS, but entry?
CVE-2020-8908: no packages for Image SLES15-SP6-SAPCAL, but entry?
CVE-2020-8908: no packages for Image SLES15-SP3-SAPCAL-Azure, but entry?
CVE-2020-8908: no packages for Image SLES15-SP2-SAP-Azure-VLI-BYOS-Production, but entry?
CVE-2020-8908: no packages for Image SLES15-SP2-SAP-BYOS-EC2-HVM, but entry?
CVE-2020-8908: no packages for Container suse/manager/5.0/x86_64/server-attestation:5.0.0-beta2.2.16, but entry?
CVE-2020-8908: no packages for SUSE CaaS Platform 4.0, but entry?
CVE-2020-8908: no packages for Image SLES15-SP4-SAP-Azure-VLI-BYOS-Production, but entry?
CVE-2020-8908: no packages for Image SLES15-SP5-SAP-Azure-LI-BYOS, but entry?
CVE-2020-8908: no packages for Image SLES15-SP6-SAP-GCE, but entry?
CVE-2020-8908: no packages for Image SLES15-SP6-SAPCAL-GCE, but entry?
CVE-2020-8908: no packages for SUSE Linux Enterprise Workstation Extension 15 SP5, but entry?
CVE-2020-8908: no packages for Image SLES15-SP5-SAP-GCE, but entry?
CVE-2020-8908: no packages for Image SLES15-SP5-SAPCAL-Azure, but entry?
CVE-2020-8908: no packages for Image SLES15-SP6-SAP-Azure-VLI-BYOS-Production, but entry?
CVE-2020-8908: no packages for SUSE Linux Enterprise Workstation Extension 15 SP6, but entry?
CVE-2020-8908: no packages for Image SLES15-SP6-SAP-Azure-LI-BYOS, but entry?
CVE-2020-8908: no packages for Image SLES15-SP4-SAP-Azure-VLI-BYOS, but entry?
CVE-2020-8908: no packages for Image SLES15-SP4-SAP-GCE, but entry?
CVE-2020-8908: no packages for Container bci/kiwi:9.24.43-8.6, but entry?
CVE-2020-8908: no packages for Image SLES15-SP3-Manager-4-2-Proxy-BYOS-GCE, but entry?
CVE-2020-8908: no packages for Image SLES15-SP2-SAP-GCE, but entry?
CVE-2020-8908: no packages for Image SLES15-SP4-SAPCAL-GCE, but entry?
CVE-2020-8908: no packages for Image SLES15-SP6-SAP, but entry?
CVE-2020-8908: no packages for Image SLES15-SP3-SAPCAL-GCE, but entry?
CVE-2020-8908: no packages for Image SLES15-SP4-SAP-Azure-LI-BYOS, but entry?
CVE-2020-8908: no packages for SUSE Manager Server 4.2, but entry?
CVE-2020-8908: no packages for Image SLES15-SP3-SAPCAL-EC2-HVM, but entry?
CVE-2020-8908: no packages for Image SLES15-SP4-SAP, but entry?
CVE-2020-8908: no packages for SUSE Manager Retail Branch Server 4.2, but entry?
CVE-2020-8908: no packages for SUSE Linux Enterprise Module for Package Hub 15 SP4, but entry?
CVE-2020-8908: no packages for Image SLES15-SP6-SAP-Azure-LI-BYOS-Production, but entry?
CVE-2020-8908: no packages for Image SLES15-SP2-SAP-BYOS-Azure, but entry?
CVE-2020-8908: no packages for Image SLES15-SP5-SAP-EC2, but entry?
CVE-2020-8908: no packages for SUSE Linux Enterprise Module for Web and Scripting 15 SP6, but entry?
CVE-2020-8908: no packages for Container bci/openjdk:latest, but entry?
CVE-2020-8908: no packages for Image SLES15-SP6-SAPCAL-EC2, but entry?
CVE-2020-8908: no packages for Image SLES15-SP4-SAPCAL, but entry?
CVE-2020-8908: no packages for SUSE Linux Enterprise Module for Basesystem 15 SP4, but entry?
CVE-2020-8908: no packages for SUSE Linux Enterprise Module for Package Hub 15 SP6, but entry?
CVE-2020-8908: no packages for Container bci/openjdk:17-7.1, but entry?
CVE-2020-8908: no packages for Image SLES15-SP3-SAP-Azure-VLI-BYOS-Production, but entry?
CVE-2020-8908: no packages for Image SLES15-SP3-Manager-4-2-Proxy-BYOS-Azure, but entry?
no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2020-8908
CVE-2020-8908: no packages for Container bci/kiwi:9.24.43-8.6, but entry?
CVE-2020-8908: no packages for Container bci/openjdk:11-7.1, but entry?
CVE-2020-8908: no packages for Container bci/openjdk:17-7.1, but entry?
CVE-2020-8908: no packages for Container bci/openjdk:latest, but entry?
CVE-2020-8908: no packages for Container suse/manager/5.0/x86_64/server-attestation:5.0.0-beta2.2.16, but entry?
CVE-2020-8908: no packages for Image SLES15-SP2-SAP-Azure, but entry?
CVE-2020-8908: no packages for Image SLES15-SP2-SAP-Azure-LI-BYOS-Production, but entry?
CVE-2020-8908: no packages for Image SLES15-SP2-SAP-Azure-VLI-BYOS-Production, but entry?
CVE-2020-8908: no packages for Image SLES15-SP2-SAP-BYOS-Azure, but entry?
CVE-2020-8908: no packages for Image SLES15-SP2-SAP-BYOS-EC2-HVM, but entry?
CVE-2020-8908: no packages for Image SLES15-SP2-SAP-BYOS-GCE, but entry?
CVE-2020-8908: no packages for Image SLES15-SP2-SAP-EC2-HVM, but entry?
CVE-2020-8908: no packages for Image SLES15-SP2-SAP-GCE, but entry?
CVE-2020-8908: no packages for Image SLES15-SP3-Manager-4-2-Proxy-BYOS-Azure, but entry?
CVE-2020-8908: no packages for Image SLES15-SP3-Manager-4-2-Proxy-BYOS-EC2-HVM, but entry?
CVE-2020-8908: no packages for Image SLES15-SP3-Manager-4-2-Proxy-BYOS-GCE, but entry?
CVE-2020-8908: no packages for Image SLES15-SP3-SAP-Azure-LI-BYOS-Production, but entry?
CVE-2020-8908: no packages for Image SLES15-SP3-SAP-Azure-VLI-BYOS-Production, but entry?
CVE-2020-8908: no packages for Image SLES15-SP3-SAPCAL-Azure, but entry?
CVE-2020-8908: no packages for Image SLES15-SP3-SAPCAL-EC2-HVM, but entry?
CVE-2020-8908: no packages for Image SLES15-SP3-SAPCAL-GCE, but entry?
CVE-2020-8908: no packages for Image SLES15-SP4-SAP, but entry?
CVE-2020-8908: no packages for Image SLES15-SP4-SAP-Azure, but entry?
CVE-2020-8908: no packages for Image SLES15-SP4-SAP-Azure-LI-BYOS, but entry?
CVE-2020-8908: no packages for Image SLES15-SP4-SAP-Azure-LI-BYOS-Production, but entry?
CVE-2020-8908: no packages for Image SLES15-SP4-SAP-Azure-VLI-BYOS, but entry?
CVE-2020-8908: no packages for Image SLES15-SP4-SAP-Azure-VLI-BYOS-Production, but entry?
CVE-2020-8908: no packages for Image SLES15-SP4-SAP-EC2, but entry?
CVE-2020-8908: no packages for Image SLES15-SP4-SAP-GCE, but entry?
CVE-2020-8908: no packages for Image SLES15-SP4-SAPCAL, but entry?
CVE-2020-8908: no packages for Image SLES15-SP4-SAPCAL-Azure, but entry?
CVE-2020-8908: no packages for Image SLES15-SP4-SAPCAL-EC2, but entry?
CVE-2020-8908: no packages for Image SLES15-SP4-SAPCAL-GCE, but entry?
CVE-2020-8908: no packages for Image SLES15-SP5-SAP-Azure, but entry?
CVE-2020-8908: no packages for Image SLES15-SP5-SAP-Azure-LI-BYOS, but entry?
CVE-2020-8908: no packages for Image SLES15-SP5-SAP-Azure-LI-BYOS-Production, but entry?
CVE-2020-8908: no packages for Image SLES15-SP5-SAP-Azure-VLI-BYOS, but entry?
CVE-2020-8908: no packages for Image SLES15-SP5-SAP-Azure-VLI-BYOS-Production, but entry?
CVE-2020-8908: no packages for Image SLES15-SP5-SAP-EC2, but entry?
CVE-2020-8908: no packages for Image SLES15-SP5-SAP-GCE, but entry?
CVE-2020-8908: no packages for Image SLES15-SP5-SAPCAL-Azure, but entry?
CVE-2020-8908: no packages for Image SLES15-SP5-SAPCAL-EC2, but entry?
CVE-2020-8908: no packages for Image SLES15-SP5-SAPCAL-GCE, but entry?
CVE-2020-8908: no packages for Image SLES15-SP6-SAP, but entry?
CVE-2020-8908: no packages for Image SLES15-SP6-SAP-Azure, but entry?
CVE-2020-8908: no packages for Image SLES15-SP6-SAP-Azure-LI-BYOS, but entry?
CVE-2020-8908: no packages for Image SLES15-SP6-SAP-Azure-LI-BYOS-Production, but entry?
CVE-2020-8908: no packages for Image SLES15-SP6-SAP-Azure-VLI-BYOS, but entry?
CVE-2020-8908: no packages for Image SLES15-SP6-SAP-Azure-VLI-BYOS-Production, but entry?
CVE-2020-8908: no packages for Image SLES15-SP6-SAP-EC2, but entry?
CVE-2020-8908: no packages for Image SLES15-SP6-SAP-GCE, but entry?
CVE-2020-8908: no packages for Image SLES15-SP6-SAPCAL, but entry?
CVE-2020-8908: no packages for Image SLES15-SP6-SAPCAL-Azure, but entry?
CVE-2020-8908: no packages for Image SLES15-SP6-SAPCAL-EC2, but entry?
CVE-2020-8908: no packages for Image SLES15-SP6-SAPCAL-GCE, but entry?
CVE-2020-8908: no packages for SUSE CaaS Platform 4.0, but entry?
CVE-2020-8908: no packages for SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS, but entry?
CVE-2020-8908: no packages for SUSE Linux Enterprise Module for Basesystem 15 SP4, but entry?
CVE-2020-8908: no packages for SUSE Linux Enterprise Module for Basesystem 15 SP5, but entry?
CVE-2020-8908: no packages for SUSE Linux Enterprise Module for Basesystem 15 SP6, but entry?
CVE-2020-8908: no packages for SUSE Linux Enterprise Module for Package Hub 15 SP4, but entry?
CVE-2020-8908: no packages for SUSE Linux Enterprise Module for Package Hub 15 SP5, but entry?
CVE-2020-8908: no packages for SUSE Linux Enterprise Module for Package Hub 15 SP6, but entry?
CVE-2020-8908: no packages for SUSE Linux Enterprise Module for Web and Scripting 15 SP4, but entry?
CVE-2020-8908: no packages for SUSE Linux Enterprise Module for Web and Scripting 15 SP5, but entry?
CVE-2020-8908: no packages for SUSE Linux Enterprise Module for Web and Scripting 15 SP6, but entry?
CVE-2020-8908: no packages for SUSE Linux Enterprise Server 15 SP1-LTSS, but entry?
CVE-2020-8908: no packages for SUSE Linux Enterprise Server for SAP Applications 15 SP1, but entry?
CVE-2020-8908: no packages for SUSE Linux Enterprise Workstation Extension 15 SP4, but entry?
CVE-2020-8908: no packages for SUSE Linux Enterprise Workstation Extension 15 SP5, but entry?
CVE-2020-8908: no packages for SUSE Linux Enterprise Workstation Extension 15 SP6, but entry?
CVE-2020-8908: no packages for SUSE Manager Proxy 4.2, but entry?
CVE-2020-8908: no packages for SUSE Manager Retail Branch Server 4.2, but entry?
CVE-2020-8908: no packages for SUSE Manager Server 4.2, but entry?
CVE-2020-8908: no packages for Container bci/kiwi:9.24.43-8.6, but entry?
CVE-2020-8908: no packages for Container bci/openjdk:11-7.1, but entry?
CVE-2020-8908: no packages for Container bci/openjdk:17-7.1, but entry?
CVE-2020-8908: no packages for Container bci/openjdk:latest, but entry?
CVE-2020-8908: no packages for Container suse/manager/5.0/x86_64/server-attestation:5.0.0-beta2.2.16, but entry?
CVE-2020-8908: no packages for Image SLES15-SP2-SAP-Azure, but entry?
CVE-2020-8908: no packages for Image SLES15-SP2-SAP-Azure-LI-BYOS-Production, but entry?
CVE-2020-8908: no packages for Image SLES15-SP2-SAP-Azure-VLI-BYOS-Production, but entry?
CVE-2020-8908: no packages for Image SLES15-SP2-SAP-BYOS-Azure, but entry?
CVE-2020-8908: no packages for Image SLES15-SP2-SAP-BYOS-EC2-HVM, but entry?
CVE-2020-8908: no packages for Image SLES15-SP2-SAP-BYOS-GCE, but entry?
CVE-2020-8908: no packages for Image SLES15-SP2-SAP-EC2-HVM, but entry?
CVE-2020-8908: no packages for Image SLES15-SP2-SAP-GCE, but entry?
CVE-2020-8908: no packages for Image SLES15-SP3-Manager-4-2-Proxy-BYOS-Azure, but entry?
CVE-2020-8908: no packages for Image SLES15-SP3-Manager-4-2-Proxy-BYOS-EC2-HVM, but entry?
CVE-2020-8908: no packages for Image SLES15-SP3-Manager-4-2-Proxy-BYOS-GCE, but entry?
CVE-2020-8908: no packages for Image SLES15-SP3-SAP-Azure-LI-BYOS-Production, but entry?
CVE-2020-8908: no packages for Image SLES15-SP3-SAP-Azure-VLI-BYOS-Production, but entry?
CVE-2020-8908: no packages for Image SLES15-SP3-SAPCAL-Azure, but entry?
CVE-2020-8908: no packages for Image SLES15-SP3-SAPCAL-EC2-HVM, but entry?
CVE-2020-8908: no packages for Image SLES15-SP3-SAPCAL-GCE, but entry?
CVE-2020-8908: no packages for Image SLES15-SP4-SAP, but entry?
CVE-2020-8908: no packages for Image SLES15-SP4-SAP-Azure, but entry?
CVE-2020-8908: no packages for Image SLES15-SP4-SAP-Azure-LI-BYOS, but entry?
CVE-2020-8908: no packages for Image SLES15-SP4-SAP-Azure-LI-BYOS-Production, but entry?
CVE-2020-8908: no packages for Image SLES15-SP4-SAP-Azure-VLI-BYOS, but entry?
CVE-2020-8908: no packages for Image SLES15-SP4-SAP-Azure-VLI-BYOS-Production, but entry?
CVE-2020-8908: no packages for Image SLES15-SP4-SAP-EC2, but entry?
CVE-2020-8908: no packages for Image SLES15-SP4-SAP-GCE, but entry?
CVE-2020-8908: no packages for Image SLES15-SP4-SAPCAL, but entry?
CVE-2020-8908: no packages for Image SLES15-SP4-SAPCAL-Azure, but entry?
CVE-2020-8908: no packages for Image SLES15-SP4-SAPCAL-EC2, but entry?
CVE-2020-8908: no packages for Image SLES15-SP4-SAPCAL-GCE, but entry?
CVE-2020-8908: no packages for Image SLES15-SP5-SAP-Azure, but entry?
CVE-2020-8908: no packages for Image SLES15-SP5-SAP-Azure-LI-BYOS, but entry?
CVE-2020-8908: no packages for Image SLES15-SP5-SAP-Azure-LI-BYOS-Production, but entry?
CVE-2020-8908: no packages for Image SLES15-SP5-SAP-Azure-VLI-BYOS, but entry?
CVE-2020-8908: no packages for Image SLES15-SP5-SAP-Azure-VLI-BYOS-Production, but entry?
CVE-2020-8908: no packages for Image SLES15-SP5-SAP-EC2, but entry?
CVE-2020-8908: no packages for Image SLES15-SP5-SAP-GCE, but entry?
CVE-2020-8908: no packages for Image SLES15-SP5-SAPCAL-Azure, but entry?
CVE-2020-8908: no packages for Image SLES15-SP5-SAPCAL-EC2, but entry?
CVE-2020-8908: no packages for Image SLES15-SP5-SAPCAL-GCE, but entry?
CVE-2020-8908: no packages for Image SLES15-SP6-SAP, but entry?
CVE-2020-8908: no packages for Image SLES15-SP6-SAP-Azure, but entry?
CVE-2020-8908: no packages for Image SLES15-SP6-SAP-Azure-LI-BYOS, but entry?
CVE-2020-8908: no packages for Image SLES15-SP6-SAP-Azure-LI-BYOS-Production, but entry?
CVE-2020-8908: no packages for Image SLES15-SP6-SAP-Azure-VLI-BYOS, but entry?
CVE-2020-8908: no packages for Image SLES15-SP6-SAP-Azure-VLI-BYOS-Production, but entry?
CVE-2020-8908: no packages for Image SLES15-SP6-SAP-EC2, but entry?
CVE-2020-8908: no packages for Image SLES15-SP6-SAP-GCE, but entry?
CVE-2020-8908: no packages for Image SLES15-SP6-SAPCAL, but entry?
CVE-2020-8908: no packages for Image SLES15-SP6-SAPCAL-Azure, but entry?
CVE-2020-8908: no packages for Image SLES15-SP6-SAPCAL-EC2, but entry?
CVE-2020-8908: no packages for Image SLES15-SP6-SAPCAL-GCE, but entry?
CVE-2020-8908: no packages for SUSE CaaS Platform 4.0, but entry?
CVE-2020-8908: no packages for SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS, but entry?
CVE-2020-8908: no packages for SUSE Linux Enterprise Module for Basesystem 15 SP4, but entry?
CVE-2020-8908: no packages for SUSE Linux Enterprise Module for Basesystem 15 SP5, but entry?
CVE-2020-8908: no packages for SUSE Linux Enterprise Module for Basesystem 15 SP6, but entry?
CVE-2020-8908: no packages for SUSE Linux Enterprise Module for Package Hub 15 SP4, but entry?
CVE-2020-8908: no packages for SUSE Linux Enterprise Module for Package Hub 15 SP5, but entry?
CVE-2020-8908: no packages for SUSE Linux Enterprise Module for Package Hub 15 SP6, but entry?
CVE-2020-8908: no packages for SUSE Linux Enterprise Module for Web and Scripting 15 SP4, but entry?
CVE-2020-8908: no packages for SUSE Linux Enterprise Module for Web and Scripting 15 SP5, but entry?
CVE-2020-8908: no packages for SUSE Linux Enterprise Module for Web and Scripting 15 SP6, but entry?
CVE-2020-8908: no packages for SUSE Linux Enterprise Server 15 SP1-LTSS, but entry?
CVE-2020-8908: no packages for SUSE Linux Enterprise Server for SAP Applications 15 SP1, but entry?
CVE-2020-8908: no packages for SUSE Linux Enterprise Workstation Extension 15 SP4, but entry?
CVE-2020-8908: no packages for SUSE Linux Enterprise Workstation Extension 15 SP5, but entry?
CVE-2020-8908: no packages for SUSE Linux Enterprise Workstation Extension 15 SP6, but entry?
CVE-2020-8908: no packages for SUSE Manager Proxy 4.2, but entry?
CVE-2020-8908: no packages for SUSE Manager Retail Branch Server 4.2, but entry?
CVE-2020-8908: no packages for SUSE Manager Server 4.2, but entry?
skipping CVE-2020-8927 as CVE page is older than CVRF-CVE file.
skipping CVE-2020-8835 as CVE page is older than CVRF-CVE file.
no cpe found for SUSE Package Hub 15 SP1 in CVE-2020-8813
skipping CVE-2020-8832 as CVE page is older than CVRF-CVE file.
no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2020-8695
no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2020-8694
no cpe found for SUSE Package Hub 15 SP3 in CVE-2020-8663
skipping CVE-2020-8649 as CVE page is older than CVRF-CVE file.
skipping CVE-2020-8648 as CVE page is older than CVRF-CVE file.
skipping CVE-2020-8647 as CVE page is older than CVRF-CVE file.
skipping CVE-2020-8619 as CVE page is older than CVRF-CVE file.
skipping CVE-2020-8618 as CVE page is older than CVRF-CVE file.
no cpe found for SUSE Liberty Linux 7 LTSS in CVE-2020-8597
no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2020-8492
--- /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2020-8492.xml 2024-10-14 02:57:25.581081000 +0200
+++ /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2020-8492.xml.new 2024-10-29 02:15:23.926005000 +0100
@@ -14,13 +14,13 @@
1
- 233
- 2024-10-14T00:57:24Z
+ 234
+ 2024-10-29T01:15:23Z
current
2021-05-30T14:38:00Z
- 2024-10-14T00:57:24Z
+ 2024-10-29T01:15:23Z
cve-database/bin/generate-cvrf-cve.pl
2020-12-27T01:00:00Z
@@ -4042,6 +4042,24 @@
python313-x86-64-v3-3.13.0~b3-1.1
+
+ python314-3.14.0~a1-1.1
+
+
+ python314-curses-3.14.0~a1-1.1
+
+
+ python314-dbm-3.14.0~a1-1.1
+
+
+ python314-idle-3.14.0~a1-1.1
+
+
+ python314-tk-3.14.0~a1-1.1
+
+
+ python314-x86-64-v3-3.14.0~a1-1.1
+
python36
@@ -11788,6 +11806,24 @@
python313-x86-64-v3-3.13.0~b3-1.1 as a component of openSUSE Tumbleweed
+
+ python314-3.14.0~a1-1.1 as a component of openSUSE Tumbleweed
+
+
+ python314-curses-3.14.0~a1-1.1 as a component of openSUSE Tumbleweed
+
+
+ python314-dbm-3.14.0~a1-1.1 as a component of openSUSE Tumbleweed
+
+
+ python314-idle-3.14.0~a1-1.1 as a component of openSUSE Tumbleweed
+
+
+ python314-tk-3.14.0~a1-1.1 as a component of openSUSE Tumbleweed
+
+
+ python314-x86-64-v3-3.14.0~a1-1.1 as a component of openSUSE Tumbleweed
+
python36-3.6.15-1.1 as a component of openSUSE Tumbleweed
@@ -14792,6 +14828,12 @@
openSUSE Tumbleweed:python313-idle-3.13.0~b3-1.1
openSUSE Tumbleweed:python313-tk-3.13.0~b3-1.1
openSUSE Tumbleweed:python313-x86-64-v3-3.13.0~b3-1.1
+ openSUSE Tumbleweed:python314-3.14.0~a1-1.1
+ openSUSE Tumbleweed:python314-curses-3.14.0~a1-1.1
+ openSUSE Tumbleweed:python314-dbm-3.14.0~a1-1.1
+ openSUSE Tumbleweed:python314-idle-3.14.0~a1-1.1
+ openSUSE Tumbleweed:python314-tk-3.14.0~a1-1.1
+ openSUSE Tumbleweed:python314-x86-64-v3-3.14.0~a1-1.1
openSUSE Tumbleweed:python36-3.6.15-1.1
openSUSE Tumbleweed:python36-32bit-3.6.15-1.1
openSUSE Tumbleweed:python36-curses-3.6.15-1.1
skipping CVE-2020-8428 as CVE page is older than CVRF-CVE file.
skipping CVE-2020-8315 as CVE page is older than CVRF-CVE file.
no cpe found for SUSE Package Hub 15 SP1 in CVE-2020-8295
no cpe found for SUSE Package Hub 15 SP2 in CVE-2020-8295
no cpe found for SUSE Package Hub 15 SP3 in CVE-2020-8295
no cpe found for SUSE Package Hub 15 SP1 in CVE-2020-8294
no cpe found for SUSE Package Hub 15 SP2 in CVE-2020-8294
no cpe found for SUSE Package Hub 15 SP3 in CVE-2020-8294
no cpe found for SUSE Package Hub 15 SP1 in CVE-2020-8293
no cpe found for SUSE Package Hub 15 SP2 in CVE-2020-8293
no cpe found for SUSE Package Hub 15 SP3 in CVE-2020-8293
no cpe found for SUSE Package Hub 15 SP1 in CVE-2020-8233
no cpe found for SUSE Package Hub 15 SP2 in CVE-2020-8233
no cpe found for SUSE Package Hub 15 SP1 in CVE-2020-8228
no cpe found for SUSE Package Hub 15 SP2 in CVE-2020-8228
no cpe found for SUSE Package Hub 15 SP1 in CVE-2020-8183
no cpe found for SUSE Package Hub 15 SP2 in CVE-2020-8183
skipping CVE-2020-8184 as CVE page is older than CVRF-CVE file.
skipping CVE-2020-8169 as CVE page is older than CVRF-CVE file.
skipping CVE-2020-8167 as CVE page is older than CVRF-CVE file.
skipping CVE-2020-8166 as CVE page is older than CVRF-CVE file.
skipping CVE-2020-8165 as CVE page is older than CVRF-CVE file.
skipping CVE-2020-8164 as CVE page is older than CVRF-CVE file.
no cpe found for SUSE Package Hub 15 SP1 in CVE-2020-8155
no cpe found for SUSE Package Hub 15 SP2 in CVE-2020-8155
skipping CVE-2020-8161 as CVE page is older than CVRF-CVE file.
no cpe found for SUSE Package Hub 15 SP1 in CVE-2020-8154
no cpe found for SUSE Package Hub 15 SP2 in CVE-2020-8154
no cpe found for SUSE Package Hub 15 in CVE-2020-8119
no cpe found for SUSE Package Hub 15 SP1 in CVE-2020-8119
no cpe found for SUSE Package Hub 15 in CVE-2020-8118
no cpe found for SUSE Package Hub 15 SP1 in CVE-2020-8118
skipping CVE-2020-8112 as CVE page is older than CVRF-CVE file.
skipping CVE-2020-8032 as CVE page is older than CVRF-CVE file.
no cpe found for SUSE Package Hub 15 SP1 in CVE-2020-8026
no cpe found for SUSE Package Hub 15 SP2 in CVE-2020-8026
skipping CVE-2020-8028 as CVE page is older than CVRF-CVE file.
skipping CVE-2020-8027 as CVE page is older than CVRF-CVE file.
no cpe found for SUSE Package Hub 15 SP1 in CVE-2020-8024
no cpe found for SUSE Package Hub 15 SP2 in CVE-2020-8024
skipping CVE-2020-8023 as CVE page is older than CVRF-CVE file.
no cpe found for SUSE Package Hub 15 SP1 in CVE-2020-8015
skipping CVE-2020-8016 as CVE page is older than CVRF-CVE file.
skipping CVE-2020-8003 as CVE page is older than CVRF-CVE file.
skipping CVE-2020-8002 as CVE page is older than CVRF-CVE file.
no cpe found for SUSE Manager Tools Beta for SLE Micro 5 in CVE-2020-7753
no cpe found for SUSE Manager Tools for SLE Micro 5 in CVE-2020-7753
skipping CVE-2020-7663 as CVE page is older than CVRF-CVE file.
no cpe found for HPE Helion OpenStack Cloud 8 in CVE-2020-7471
no cpe found for SUSE Package Hub 15 SP1 in CVE-2020-7237
no cpe found for HPE Helion OpenStack Cloud 8 in CVE-2020-7212
skipping CVE-2020-7221 as CVE page is older than CVRF-CVE file.
skipping CVE-2020-7217 as CVE page is older than CVRF-CVE file.
skipping CVE-2020-7216 as CVE page is older than CVRF-CVE file.
no cpe found for SUSE Package Hub 15 SP1 in CVE-2020-7106
skipping CVE-2020-7053 as CVE page is older than CVRF-CVE file.
no cpe found for SUSE Package Hub 15 SP1 in CVE-2020-7043
skipping CVE-2020-7045 as CVE page is older than CVRF-CVE file.
skipping CVE-2020-7044 as CVE page is older than CVRF-CVE file.
no cpe found for SUSE Package Hub 15 SP1 in CVE-2020-7042
no cpe found for SUSE Package Hub 15 SP1 in CVE-2020-7041
no cpe found for SUSE Package Hub 15 in CVE-2020-7040
no cpe found for SUSE Package Hub 15 SP1 in CVE-2020-7040
no cpe found for HPE Helion OpenStack Cloud 8 in CVE-2020-7019
no cpe found for HPE Helion OpenStack Cloud 8 in CVE-2020-7017
no cpe found for HPE Helion OpenStack Cloud 8 in CVE-2020-7016
no cpe found for HPE Helion OpenStack Cloud 8 in CVE-2020-7015
no cpe found for HPE Helion OpenStack Cloud 8 in CVE-2020-7014
no cpe found for HPE Helion OpenStack Cloud 8 in CVE-2020-7013
no cpe found for HPE Helion OpenStack Cloud 8 in CVE-2020-7012
no cpe found for HPE Helion OpenStack Cloud 8 in CVE-2020-7009
no cpe found for SUSE Package Hub 15 SP2 in CVE-2020-6860
no cpe found for SUSE Package Hub 15 SP1 in CVE-2020-6831
skipping CVE-2020-6851 as CVE page is older than CVRF-CVE file.
no cpe found for SUSE Package Hub 15 SP2 in CVE-2020-6817
no cpe found for SUSE Package Hub 15 SP2 in CVE-2020-6816
no cpe found for SUSE Package Hub 15 SP1 in CVE-2020-6802
no cpe found for SUSE Package Hub 15 SP2 in CVE-2020-6625
skipping CVE-2020-6750 as CVE page is older than CVRF-CVE file.
no cpe found for SUSE Package Hub 15 SP2 in CVE-2020-6624
no cpe found for SUSE Package Hub 15 SP1 in CVE-2020-6615
no cpe found for SUSE Package Hub 15 SP1 in CVE-2020-6614
no cpe found for SUSE Package Hub 15 SP1 in CVE-2020-6613
no cpe found for SUSE Package Hub 15 SP1 in CVE-2020-6612
no cpe found for SUSE Package Hub 15 SP1 in CVE-2020-6611
no cpe found for SUSE Package Hub 15 SP1 in CVE-2020-6610
no cpe found for SUSE Package Hub 15 SP1 in CVE-2020-6609
no cpe found for SUSE Package Hub 15 SP1 in CVE-2020-6576
no cpe found for SUSE Package Hub 15 SP2 in CVE-2020-6576
skipping CVE-2020-6582 as CVE page is older than CVRF-CVE file.
skipping CVE-2020-6581 as CVE page is older than CVRF-CVE file.
no cpe found for SUSE Package Hub 15 SP1 in CVE-2020-6575
no cpe found for SUSE Package Hub 15 SP2 in CVE-2020-6575
no cpe found for SUSE Package Hub 15 SP1 in CVE-2020-6574
no cpe found for SUSE Package Hub 15 SP2 in CVE-2020-6574
no cpe found for SUSE Package Hub 15 SP1 in CVE-2020-6573
no cpe found for SUSE Package Hub 15 SP2 in CVE-2020-6573
no cpe found for SUSE Package Hub 15 SP1 in CVE-2020-6571
no cpe found for SUSE Package Hub 15 SP2 in CVE-2020-6571
no cpe found for SUSE Package Hub 15 SP1 in CVE-2020-6570
no cpe found for SUSE Package Hub 15 SP2 in CVE-2020-6570
no cpe found for SUSE Package Hub 15 SP1 in CVE-2020-6569
no cpe found for SUSE Package Hub 15 SP2 in CVE-2020-6569
no cpe found for SUSE Package Hub 15 SP1 in CVE-2020-6568
no cpe found for SUSE Package Hub 15 SP2 in CVE-2020-6568
no cpe found for SUSE Package Hub 15 SP1 in CVE-2020-6567
no cpe found for SUSE Package Hub 15 SP2 in CVE-2020-6567
no cpe found for SUSE Package Hub 15 SP1 in CVE-2020-6566
no cpe found for SUSE Package Hub 15 SP2 in CVE-2020-6566
no cpe found for SUSE Package Hub 15 SP1 in CVE-2020-6565
no cpe found for SUSE Package Hub 15 SP2 in CVE-2020-6565
no cpe found for SUSE Package Hub 15 SP1 in CVE-2020-6564
no cpe found for SUSE Package Hub 15 SP2 in CVE-2020-6564
no cpe found for SUSE Package Hub 15 SP1 in CVE-2020-6563
no cpe found for SUSE Package Hub 15 SP2 in CVE-2020-6563
no cpe found for SUSE Package Hub 15 SP1 in CVE-2020-6562
no cpe found for SUSE Package Hub 15 SP2 in CVE-2020-6562
no cpe found for SUSE Package Hub 15 SP1 in CVE-2020-6561
no cpe found for SUSE Package Hub 15 SP2 in CVE-2020-6561
no cpe found for SUSE Package Hub 15 SP1 in CVE-2020-6560
no cpe found for SUSE Package Hub 15 SP2 in CVE-2020-6560
no cpe found for SUSE Package Hub 15 SP1 in CVE-2020-6559
no cpe found for SUSE Package Hub 15 SP2 in CVE-2020-6559
no cpe found for SUSE Package Hub 15 SP1 in CVE-2020-6558
no cpe found for SUSE Package Hub 15 SP2 in CVE-2020-6558
no cpe found for SUSE Package Hub 15 SP1 in CVE-2020-6557
no cpe found for SUSE Package Hub 15 SP2 in CVE-2020-6557
no cpe found for SUSE Package Hub 15 SP1 in CVE-2020-6555
no cpe found for SUSE Package Hub 15 SP2 in CVE-2020-6555
no cpe found for SUSE Package Hub 15 SP1 in CVE-2020-6554
no cpe found for SUSE Package Hub 15 SP2 in CVE-2020-6554
no cpe found for SUSE Package Hub 15 SP1 in CVE-2020-6553
no cpe found for SUSE Package Hub 15 SP2 in CVE-2020-6553
no cpe found for SUSE Package Hub 15 SP1 in CVE-2020-6552
no cpe found for SUSE Package Hub 15 SP2 in CVE-2020-6552
no cpe found for SUSE Package Hub 15 SP1 in CVE-2020-6551
no cpe found for SUSE Package Hub 15 SP2 in CVE-2020-6551
no cpe found for SUSE Package Hub 15 SP1 in CVE-2020-6550
no cpe found for SUSE Package Hub 15 SP2 in CVE-2020-6550
no cpe found for SUSE Package Hub 15 SP1 in CVE-2020-6549
no cpe found for SUSE Package Hub 15 SP2 in CVE-2020-6549
no cpe found for SUSE Package Hub 15 SP1 in CVE-2020-6548
no cpe found for SUSE Package Hub 15 SP2 in CVE-2020-6548
no cpe found for SUSE Package Hub 15 SP1 in CVE-2020-6547
no cpe found for SUSE Package Hub 15 SP2 in CVE-2020-6547
no cpe found for SUSE Package Hub 15 SP1 in CVE-2020-6546
no cpe found for SUSE Package Hub 15 SP2 in CVE-2020-6546
no cpe found for SUSE Package Hub 15 SP1 in CVE-2020-6545
no cpe found for SUSE Package Hub 15 SP2 in CVE-2020-6545
no cpe found for SUSE Package Hub 15 SP1 in CVE-2020-6544
no cpe found for SUSE Package Hub 15 SP2 in CVE-2020-6544
no cpe found for SUSE Package Hub 15 SP1 in CVE-2020-6543
no cpe found for SUSE Package Hub 15 SP2 in CVE-2020-6543
no cpe found for SUSE Package Hub 15 SP1 in CVE-2020-6542
no cpe found for SUSE Package Hub 15 SP2 in CVE-2020-6542
no cpe found for SUSE Package Hub 15 SP1 in CVE-2020-6541
no cpe found for SUSE Package Hub 15 SP2 in CVE-2020-6541
no cpe found for SUSE Package Hub 15 SP1 in CVE-2020-6540
no cpe found for SUSE Package Hub 15 SP2 in CVE-2020-6540
no cpe found for SUSE Package Hub 15 SP1 in CVE-2020-6539
no cpe found for SUSE Package Hub 15 SP2 in CVE-2020-6539
no cpe found for SUSE Package Hub 15 SP1 in CVE-2020-6538
no cpe found for SUSE Package Hub 15 SP2 in CVE-2020-6538
no cpe found for SUSE Package Hub 15 SP1 in CVE-2020-6537
no cpe found for SUSE Package Hub 15 SP2 in CVE-2020-6537
no cpe found for SUSE Package Hub 15 SP1 in CVE-2020-6536
no cpe found for SUSE Package Hub 15 SP2 in CVE-2020-6536
no cpe found for SUSE Package Hub 15 SP1 in CVE-2020-6535
no cpe found for SUSE Package Hub 15 SP2 in CVE-2020-6535
no cpe found for SUSE Package Hub 15 SP1 in CVE-2020-6534
no cpe found for SUSE Package Hub 15 SP2 in CVE-2020-6534
no cpe found for SUSE Package Hub 15 SP1 in CVE-2020-6533
no cpe found for SUSE Package Hub 15 SP2 in CVE-2020-6533
no cpe found for SUSE Package Hub 15 SP1 in CVE-2020-6532
no cpe found for SUSE Package Hub 15 SP2 in CVE-2020-6532
no cpe found for SUSE Package Hub 15 SP1 in CVE-2020-6531
no cpe found for SUSE Package Hub 15 SP2 in CVE-2020-6531
no cpe found for SUSE Package Hub 15 SP1 in CVE-2020-6530
no cpe found for SUSE Package Hub 15 SP2 in CVE-2020-6530
no cpe found for SUSE Package Hub 15 SP1 in CVE-2020-6529
no cpe found for SUSE Package Hub 15 SP2 in CVE-2020-6529
no cpe found for SUSE Package Hub 15 SP1 in CVE-2020-6528
no cpe found for SUSE Package Hub 15 SP2 in CVE-2020-6528
no cpe found for SUSE Package Hub 15 SP1 in CVE-2020-6527
no cpe found for SUSE Package Hub 15 SP2 in CVE-2020-6527
no cpe found for SUSE Package Hub 15 SP1 in CVE-2020-6526
no cpe found for SUSE Package Hub 15 SP2 in CVE-2020-6526
no cpe found for SUSE Package Hub 15 SP1 in CVE-2020-6525
no cpe found for SUSE Package Hub 15 SP2 in CVE-2020-6525
no cpe found for SUSE Package Hub 15 SP1 in CVE-2020-6524
no cpe found for SUSE Package Hub 15 SP2 in CVE-2020-6524
no cpe found for SUSE Package Hub 15 SP1 in CVE-2020-6523
no cpe found for SUSE Package Hub 15 SP2 in CVE-2020-6523
no cpe found for SUSE Package Hub 15 SP1 in CVE-2020-6522
no cpe found for SUSE Package Hub 15 SP2 in CVE-2020-6522
no cpe found for SUSE Package Hub 15 SP1 in CVE-2020-6521
no cpe found for SUSE Package Hub 15 SP2 in CVE-2020-6521
no cpe found for SUSE Package Hub 15 SP1 in CVE-2020-6520
no cpe found for SUSE Package Hub 15 SP2 in CVE-2020-6520
no cpe found for SUSE Package Hub 15 SP1 in CVE-2020-6519
no cpe found for SUSE Package Hub 15 SP2 in CVE-2020-6519
no cpe found for SUSE Package Hub 15 SP1 in CVE-2020-6518
no cpe found for SUSE Package Hub 15 SP2 in CVE-2020-6518
no cpe found for SUSE Package Hub 15 SP1 in CVE-2020-6517
no cpe found for SUSE Package Hub 15 SP2 in CVE-2020-6517
no cpe found for SUSE Package Hub 15 SP1 in CVE-2020-6516
no cpe found for SUSE Package Hub 15 SP2 in CVE-2020-6516
no cpe found for SUSE Package Hub 15 SP1 in CVE-2020-6515
no cpe found for SUSE Package Hub 15 SP2 in CVE-2020-6515
no cpe found for SUSE Package Hub 15 SP1 in CVE-2020-6514
no cpe found for SUSE Package Hub 15 SP2 in CVE-2020-6514
no cpe found for SUSE Package Hub 15 SP1 in CVE-2020-6513
no cpe found for SUSE Package Hub 15 SP2 in CVE-2020-6513
no cpe found for SUSE Package Hub 15 SP1 in CVE-2020-6512
no cpe found for SUSE Package Hub 15 SP2 in CVE-2020-6512
no cpe found for SUSE Package Hub 15 SP1 in CVE-2020-6511
no cpe found for SUSE Package Hub 15 SP2 in CVE-2020-6511
no cpe found for SUSE Package Hub 15 SP1 in CVE-2020-6510
no cpe found for SUSE Package Hub 15 SP2 in CVE-2020-6510
no cpe found for SUSE Package Hub 15 SP1 in CVE-2020-6509
no cpe found for SUSE Package Hub 15 SP2 in CVE-2020-6509
no cpe found for SUSE Package Hub 15 SP1 in CVE-2020-6507
no cpe found for SUSE Package Hub 15 SP1 in CVE-2020-6506
no cpe found for SUSE Package Hub 15 SP1 in CVE-2020-6505
no cpe found for SUSE Package Hub 15 SP1 in CVE-2020-6496
no cpe found for SUSE Package Hub 15 SP1 in CVE-2020-6495
no cpe found for SUSE Package Hub 15 SP1 in CVE-2020-6494
no cpe found for SUSE Package Hub 15 SP1 in CVE-2020-6493
no cpe found for SUSE Package Hub 15 SP1 in CVE-2020-6491
no cpe found for SUSE Package Hub 15 SP1 in CVE-2020-6490
no cpe found for SUSE Package Hub 15 SP1 in CVE-2020-6489
no cpe found for SUSE Package Hub 15 SP1 in CVE-2020-6488
no cpe found for SUSE Package Hub 15 SP1 in CVE-2020-6487
no cpe found for SUSE Package Hub 15 SP1 in CVE-2020-6486
no cpe found for SUSE Package Hub 15 SP1 in CVE-2020-6485
no cpe found for SUSE Package Hub 15 SP1 in CVE-2020-6484
no cpe found for SUSE Package Hub 15 SP1 in CVE-2020-6483
no cpe found for SUSE Package Hub 15 SP1 in CVE-2020-6482
no cpe found for SUSE Package Hub 15 SP1 in CVE-2020-6481
no cpe found for SUSE Package Hub 15 SP1 in CVE-2020-6480
no cpe found for SUSE Package Hub 15 SP1 in CVE-2020-6479
no cpe found for SUSE Package Hub 15 SP1 in CVE-2020-6478
no cpe found for SUSE Package Hub 15 SP1 in CVE-2020-6477
no cpe found for SUSE Package Hub 15 SP1 in CVE-2020-6476
no cpe found for SUSE Package Hub 15 SP1 in CVE-2020-6475
no cpe found for SUSE Package Hub 15 SP1 in CVE-2020-6474
no cpe found for SUSE Package Hub 15 SP1 in CVE-2020-6473
no cpe found for SUSE Package Hub 15 SP1 in CVE-2020-6472
no cpe found for SUSE Package Hub 15 SP1 in CVE-2020-6471
no cpe found for SUSE Package Hub 15 SP1 in CVE-2020-6470
no cpe found for SUSE Package Hub 15 SP1 in CVE-2020-6469
no cpe found for SUSE Package Hub 15 SP1 in CVE-2020-6468
no cpe found for SUSE Package Hub 15 SP1 in CVE-2020-6467
no cpe found for SUSE Package Hub 15 SP1 in CVE-2020-6466
no cpe found for SUSE Package Hub 15 SP1 in CVE-2020-6465
no cpe found for SUSE Package Hub 15 SP1 in CVE-2020-6464
no cpe found for SUSE Package Hub 15 SP1 in CVE-2020-6463
no cpe found for SUSE Package Hub 15 SP1 in CVE-2020-6462
no cpe found for SUSE Package Hub 15 SP1 in CVE-2020-6460
no cpe found for SUSE Package Hub 15 SP1 in CVE-2020-6459
no cpe found for SUSE Package Hub 15 SP1 in CVE-2020-6458
no cpe found for SUSE Package Hub 15 SP1 in CVE-2020-6457
no cpe found for SUSE Package Hub 15 SP1 in CVE-2020-6456
no cpe found for SUSE Package Hub 15 SP1 in CVE-2020-6455
no cpe found for SUSE Package Hub 15 SP1 in CVE-2020-6454
no cpe found for SUSE Package Hub 15 SP1 in CVE-2020-6452
no cpe found for SUSE Package Hub 15 SP1 in CVE-2020-6451
no cpe found for SUSE Package Hub 15 SP1 in CVE-2020-6450
no cpe found for SUSE Package Hub 15 SP1 in CVE-2020-6449
no cpe found for SUSE Package Hub 15 SP1 in CVE-2020-6448
no cpe found for SUSE Package Hub 15 SP1 in CVE-2020-6447
no cpe found for SUSE Package Hub 15 SP1 in CVE-2020-6446
no cpe found for SUSE Package Hub 15 SP1 in CVE-2020-6445
no cpe found for SUSE Package Hub 15 SP1 in CVE-2020-6444
no cpe found for SUSE Package Hub 15 SP1 in CVE-2020-6443
no cpe found for SUSE Package Hub 15 SP1 in CVE-2020-6442
no cpe found for SUSE Package Hub 15 SP1 in CVE-2020-6441
no cpe found for SUSE Package Hub 15 SP1 in CVE-2020-6440
no cpe found for SUSE Package Hub 15 SP1 in CVE-2020-6439
no cpe found for SUSE Package Hub 15 SP1 in CVE-2020-6438
no cpe found for SUSE Package Hub 15 SP1 in CVE-2020-6437
no cpe found for SUSE Package Hub 15 SP1 in CVE-2020-6436
no cpe found for SUSE Package Hub 15 SP1 in CVE-2020-6435
no cpe found for SUSE Package Hub 15 SP1 in CVE-2020-6434
no cpe found for SUSE Package Hub 15 SP1 in CVE-2020-6433
no cpe found for SUSE Package Hub 15 SP1 in CVE-2020-6432
no cpe found for SUSE Package Hub 15 SP1 in CVE-2020-6431
no cpe found for SUSE Package Hub 15 SP1 in CVE-2020-6430
no cpe found for SUSE Package Hub 15 SP1 in CVE-2020-6429
no cpe found for SUSE Package Hub 15 SP1 in CVE-2020-6428
no cpe found for SUSE Package Hub 15 SP1 in CVE-2020-6427
no cpe found for SUSE Package Hub 15 SP1 in CVE-2020-6426
no cpe found for SUSE Package Hub 15 SP1 in CVE-2020-6425
no cpe found for SUSE Package Hub 15 SP1 in CVE-2020-6424
no cpe found for SUSE Package Hub 15 SP1 in CVE-2020-6423
no cpe found for SUSE Package Hub 15 SP1 in CVE-2020-6422
no cpe found for SUSE Package Hub 15 SP1 in CVE-2020-6417
no cpe found for SUSE Package Hub 15 SP1 in CVE-2020-6416
no cpe found for SUSE Package Hub 15 SP1 in CVE-2020-6415
no cpe found for SUSE Package Hub 15 SP1 in CVE-2020-6414
no cpe found for SUSE Package Hub 15 SP1 in CVE-2020-6413
no cpe found for SUSE Package Hub 15 SP1 in CVE-2020-6412
no cpe found for SUSE Package Hub 15 SP1 in CVE-2020-6411
no cpe found for SUSE Package Hub 15 SP1 in CVE-2020-6410
no cpe found for SUSE Package Hub 15 SP1 in CVE-2020-6409
no cpe found for SUSE Package Hub 15 SP1 in CVE-2020-6408
no cpe found for SUSE Package Hub 15 SP1 in CVE-2020-6406
no cpe found for SUSE Package Hub 15 SP1 in CVE-2020-6405
no cpe found for SUSE Package Hub 15 SP1 in CVE-2020-6404
no cpe found for SUSE Package Hub 15 SP1 in CVE-2020-6403
no cpe found for SUSE Package Hub 15 SP1 in CVE-2020-6402
no cpe found for SUSE Package Hub 15 SP1 in CVE-2020-6401
no cpe found for SUSE Package Hub 15 SP1 in CVE-2020-6400
no cpe found for SUSE Package Hub 15 SP1 in CVE-2020-6399
no cpe found for SUSE Package Hub 15 SP1 in CVE-2020-6398
no cpe found for SUSE Package Hub 15 SP1 in CVE-2020-6397
no cpe found for SUSE Package Hub 15 SP1 in CVE-2020-6396
no cpe found for SUSE Package Hub 15 SP1 in CVE-2020-6395
no cpe found for SUSE Package Hub 15 SP1 in CVE-2020-6394
no cpe found for SUSE Package Hub 15 SP1 in CVE-2020-6393
no cpe found for SUSE Package Hub 15 SP1 in CVE-2020-6392
no cpe found for SUSE Package Hub 15 SP1 in CVE-2020-6391
no cpe found for SUSE Package Hub 15 SP1 in CVE-2020-6390
no cpe found for SUSE Package Hub 15 SP1 in CVE-2020-6389
no cpe found for SUSE Package Hub 15 SP1 in CVE-2020-6388
no cpe found for SUSE Package Hub 15 SP1 in CVE-2020-6387
no cpe found for SUSE Package Hub 15 SP1 in CVE-2020-6385
no cpe found for SUSE Package Hub 15 SP1 in CVE-2020-6382
no cpe found for SUSE Package Hub 15 SP1 in CVE-2020-6381
no cpe found for SUSE Package Hub 15 SP1 in CVE-2020-6380
no cpe found for SUSE Package Hub 15 SP1 in CVE-2020-6379
no cpe found for SUSE Package Hub 15 SP1 in CVE-2020-6378
no cpe found for SUSE Package Hub 15 SP1 in CVE-2020-6377
no cpe found for SUSE Package Hub 15 SP1 in CVE-2020-6095
skipping CVE-2020-6096 as CVE page is older than CVRF-CVE file.
no cpe found for SUSE Package Hub 15 in CVE-2020-5504
no cpe found for SUSE Package Hub 15 SP1 in CVE-2020-5504
no cpe found for HPE Helion OpenStack Cloud 8 in CVE-2020-5419
no cpe found for SUSE Liberty Linux 7 LTSS in CVE-2020-5395
no cpe found for HPE Helion OpenStack Cloud 8 in CVE-2020-5390
no cpe found for HPE Helion OpenStack Cloud 8 in CVE-2020-5313
no cpe found for HPE Helion OpenStack Cloud 8 in CVE-2020-5312
no cpe found for HPE Helion OpenStack Cloud 8 in CVE-2020-5311
no cpe found for HPE Helion OpenStack Cloud 8 in CVE-2020-5310
no cpe found for SUSE Package Hub 15 SP1 in CVE-2020-5283
no cpe found for SUSE Package Hub 15 SP2 in CVE-2020-5283
no cpe found for HPE Helion OpenStack Cloud 8 in CVE-2020-5260
skipping CVE-2020-5267 as CVE page is older than CVRF-CVE file.
no cpe found for HPE Helion OpenStack Cloud 8 in CVE-2020-5236
no cpe found for SUSE Package Hub 15 SP1 in CVE-2020-5202
skipping CVE-2020-3868 as CVE page is older than CVRF-CVE file.
skipping CVE-2020-3867 as CVE page is older than CVRF-CVE file.
skipping CVE-2020-3865 as CVE page is older than CVRF-CVE file.
skipping CVE-2020-3864 as CVE page is older than CVRF-CVE file.
skipping CVE-2020-3862 as CVE page is older than CVRF-CVE file.
CVE-2020-2934: no packages for Image SLES15-SP6-SAP-EC2, but entry?
CVE-2020-2934: no packages for Image SLES15-SP2-SAP-EC2-HVM, but entry?
CVE-2020-2934: no packages for SUSE Linux Enterprise Server for SAP Applications 15 SP3, but entry?
CVE-2020-2934: no packages for SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS, but entry?
CVE-2020-2934: no packages for Image SLES15-SP3-SAP-Azure-LI-BYOS-Production, but entry?
CVE-2020-2934: no packages for Image SLES15-SP3-Manager-4-2-Server-BYOS-Azure, but entry?
CVE-2020-2934: no packages for SUSE Linux Enterprise Module for Web and Scripting 15 SP4, but entry?
CVE-2020-2934: no packages for Image SLES15-SP4-SAPCAL-EC2, but entry?
CVE-2020-2934: no packages for Image SLES15-SP4-SAPCAL-Azure, but entry?
CVE-2020-2934: no packages for Image SLES15-SP5-SAPCAL-EC2, but entry?
CVE-2020-2934: no packages for SUSE Linux Enterprise Server for SAP Applications 15 SP1, but entry?
CVE-2020-2934: no packages for Image SLES15-SP4-SAP-EC2, but entry?
CVE-2020-2934: no packages for Container bci/openjdk:11-7.1, but entry?
CVE-2020-2934: no packages for SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS, but entry?
CVE-2020-2934: no packages for Container bci/openjdk-devel:17-14.11, but entry?
CVE-2020-2934: no packages for Image SLES15-SP5-SAP-Azure-VLI-BYOS-Production, but entry?
CVE-2020-2934: no packages for Image SLES15-SP6-SAP-Azure-VLI-BYOS, but entry?
CVE-2020-2934: no packages for Image SLES15-SP5-SAP-Azure, but entry?
CVE-2020-2934: no packages for Image SLES15-SP6-SAPCAL-Azure, but entry?
CVE-2020-2934: no packages for SUSE Linux Enterprise Server 15 SP1-LTSS, but entry?
CVE-2020-2934: no packages for Image SLES15-SP3-Manager-4-2-Server-BYOS-EC2-HVM, but entry?
CVE-2020-2934: no packages for Image SLES15-SP4-Manager-Server-4-3-BYOS-GCE, but entry?
CVE-2020-2934: no packages for Image SLES15-SP6-SAP-Azure, but entry?
CVE-2020-2934: no packages for Image SLES15-SP5-SAPCAL-GCE, but entry?
CVE-2020-2934: no packages for Image SLES15-SP4-Manager-Server-4-3-BYOS-EC2, but entry?
CVE-2020-2934: no packages for Image SLES15-SP3-Manager-4-2-Server-BYOS-GCE, but entry?
CVE-2020-2934: no packages for SUSE Linux Enterprise Real Time 15 SP3, but entry?
CVE-2020-2934: no packages for SUSE Linux Enterprise Module for Web and Scripting 15 SP5, but entry?
CVE-2020-2934: no packages for Image SLES15-SP4-Manager-Server-4-3-Azure-ltd, but entry?
CVE-2020-2934: no packages for Image SLES15-SP3-SAPCAL-Azure, but entry?
CVE-2020-2934: no packages for Image SLES15-SP5-SAP-Azure-LI-BYOS-Production, but entry?
CVE-2020-2934: no packages for SUSE Linux Enterprise Module for Basesystem 15 SP6, but entry?
CVE-2020-2934: no packages for Image SLES15-SP6-SAPCAL, but entry?
CVE-2020-2934: no packages for Image SLES15-SP5-SAP-Azure-VLI-BYOS, but entry?
CVE-2020-2934: no packages for Image SLES15-SP4-Manager-Server-4-3-Azure-llc, but entry?
CVE-2020-2934: no packages for Image SLES15-SP2-SAP-BYOS-GCE, but entry?
CVE-2020-2934: no packages for Image SLES15-SP4-SAP-Azure-LI-BYOS-Production, but entry?
CVE-2020-2934: no packages for Image SLES15-SP2-SAP-Azure-LI-BYOS-Production, but entry?
CVE-2020-2934: no packages for Image SLES15-SP4-Manager-Server-4-3-BYOS, but entry?
CVE-2020-2934: no packages for Image SLES15-SP2-SAP-Azure, but entry?
CVE-2020-2934: no packages for SUSE Linux Enterprise Module for Basesystem 15 SP5, but entry?
CVE-2020-2934: no packages for SUSE Linux Enterprise Module for Package Hub 15 SP5, but entry?
CVE-2020-2934: no packages for Image SLES15-SP4-SAP-Azure, but entry?
CVE-2020-2934: no packages for SUSE Linux Enterprise Workstation Extension 15 SP4, but entry?
CVE-2020-2934: no packages for Image SLES15-SP4-Manager-Server-4-3, but entry?
CVE-2020-2934: no packages for SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS, but entry?
CVE-2020-2934: no packages for SUSE Manager Proxy 4.2, but entry?
CVE-2020-2934: no packages for Image SLES15-SP4-SAP-GCE, but entry?
CVE-2020-2934: no packages for Image SLES15-SP4-SAP-Azure-VLI-BYOS, but entry?
CVE-2020-2934: no packages for Image SLES15-SP6-SAP-Azure-LI-BYOS, but entry?
CVE-2020-2934: no packages for SUSE Linux Enterprise Server 15 SP4-TERADATA, but entry?
CVE-2020-2934: no packages for SUSE Enterprise Storage 7, but entry?
CVE-2020-2934: no packages for SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS, but entry?
CVE-2020-2934: no packages for SUSE Manager Server Module 4.3, but entry?
CVE-2020-2934: no packages for Image SLES15-SP6-SAP-Azure-VLI-BYOS-Production, but entry?
CVE-2020-2934: no packages for SUSE Linux Enterprise Workstation Extension 15 SP6, but entry?
CVE-2020-2934: no packages for Image SLES15-SP2-SAP-GCE, but entry?
CVE-2020-2934: no packages for Container bci/kiwi:9.24.43-8.6, but entry?
CVE-2020-2934: no packages for SUSE CaaS Platform 4.0, but entry?
CVE-2020-2934: no packages for Container suse/manager/5.0/x86_64/server-attestation:5.0.0-beta2.2.16, but entry?
CVE-2020-2934: no packages for Image SLES15-SP2-SAP-Azure-VLI-BYOS-Production, but entry?
CVE-2020-2934: no packages for Image SLES15-SP2-SAP-BYOS-EC2-HVM, but entry?
CVE-2020-2934: no packages for Container bci/openjdk-devel:17-7.2, but entry?
CVE-2020-2934: no packages for SUSE Linux Enterprise Server for SAP Applications 15 SP2, but entry?
CVE-2020-2934: no packages for Image SLES15-SP5-SAPCAL-Azure, but entry?
CVE-2020-2934: no packages for Image SLES15-SP5-SAP-GCE, but entry?
CVE-2020-2934: no packages for SUSE Linux Enterprise Workstation Extension 15 SP5, but entry?
CVE-2020-2934: no packages for Image SLES15-SP6-SAP-GCE, but entry?
CVE-2020-2934: no packages for Image SLES15-SP4-Manager-Server-4-3-BYOS-Azure, but entry?
CVE-2020-2934: no packages for Container bci/openjdk-devel:11-6.2, but entry?
CVE-2020-2934: no packages for Image SLES15-SP6-SAPCAL-GCE, but entry?
CVE-2020-2934: no packages for Image SLES15-SP4-SAP-Azure-VLI-BYOS-Production, but entry?
CVE-2020-2934: no packages for SUSE Manager Server Module 4.2, but entry?
CVE-2020-2934: no packages for Image SLES15-SP5-SAP-Azure-LI-BYOS, but entry?
CVE-2020-2934: no packages for Image SLES15-SP6-SAPCAL-EC2, but entry?
CVE-2020-2934: no packages for Image SLES15-SP4-SAPCAL, but entry?
CVE-2020-2934: no packages for SUSE Linux Enterprise Module for Web and Scripting 15 SP6, but entry?
CVE-2020-2934: no packages for SUSE Linux Enterprise Module for Development Tools 15 SP4, but entry?
CVE-2020-2934: no packages for Container bci/openjdk:latest, but entry?
CVE-2020-2934: no packages for Image SLES15-SP5-SAP-EC2, but entry?
CVE-2020-2934: no packages for SUSE Linux Enterprise Module for Development Tools 15 SP5, but entry?
CVE-2020-2934: no packages for Image SLES15-SP2-SAP-BYOS-Azure, but entry?
CVE-2020-2934: no packages for Image SLES15-SP4-Manager-Server-4-3-EC2-ltd, but entry?
CVE-2020-2934: no packages for Image SLES15-SP3-SAP-Azure-VLI-BYOS-Production, but entry?
CVE-2020-2934: no packages for Container bci/openjdk:17-7.1, but entry?
CVE-2020-2934: no packages for SUSE Linux Enterprise Module for Package Hub 15 SP6, but entry?
CVE-2020-2934: no packages for SUSE Linux Enterprise Module for Basesystem 15 SP4, but entry?
CVE-2020-2934: no packages for SUSE Linux Enterprise Server 15 SP3-LTSS, but entry?
CVE-2020-2934: no packages for Container suse/manager/5.0/x86_64/server:5.0.0-beta1.2.122, but entry?
CVE-2020-2934: no packages for Image SLES15-SP4-SAP-Azure-LI-BYOS, but entry?
CVE-2020-2934: no packages for SUSE Enterprise Storage 7.1, but entry?
CVE-2020-2934: no packages for Image SLES15-SP3-SAPCAL-EC2-HVM, but entry?
CVE-2020-2934: no packages for SUSE Manager Server 4.2, but entry?
CVE-2020-2934: no packages for SUSE Linux Enterprise Module for Development Tools 15 SP6, but entry?
CVE-2020-2934: no packages for Image SLES15-SP6-SAP, but entry?
CVE-2020-2934: no packages for Image SLES15-SP3-SAPCAL-GCE, but entry?
CVE-2020-2934: no packages for Image SLES15-SP4-SAPCAL-GCE, but entry?
CVE-2020-2934: no packages for SUSE Linux Enterprise Module for Package Hub 15 SP4, but entry?
CVE-2020-2934: no packages for SUSE Linux Enterprise Server 15 SP2-LTSS, but entry?
CVE-2020-2934: no packages for Image SLES15-SP6-SAP-Azure-LI-BYOS-Production, but entry?
CVE-2020-2934: no packages for Image SLES15-SP4-SAP, but entry?
CVE-2020-2934: no packages for SUSE Manager Retail Branch Server 4.2, but entry?
CVE-2020-2934: no packages for Image SLES15-SP4-Manager-Server-4-3-EC2-llc, but entry?
CVE-2020-2934: no packages for Container bci/kiwi:9.24.43-8.6, but entry?
CVE-2020-2934: no packages for Container bci/openjdk-devel:11-6.2, but entry?
CVE-2020-2934: no packages for Container bci/openjdk-devel:17-14.11, but entry?
CVE-2020-2934: no packages for Container bci/openjdk-devel:17-7.2, but entry?
CVE-2020-2934: no packages for Container bci/openjdk:11-7.1, but entry?
CVE-2020-2934: no packages for Container bci/openjdk:17-7.1, but entry?
CVE-2020-2934: no packages for Container bci/openjdk:latest, but entry?
CVE-2020-2934: no packages for Container suse/manager/5.0/x86_64/server-attestation:5.0.0-beta2.2.16, but entry?
CVE-2020-2934: no packages for Container suse/manager/5.0/x86_64/server:5.0.0-beta1.2.122, but entry?
CVE-2020-2934: no packages for Image SLES15-SP2-SAP-Azure, but entry?
CVE-2020-2934: no packages for Image SLES15-SP2-SAP-Azure-LI-BYOS-Production, but entry?
CVE-2020-2934: no packages for Image SLES15-SP2-SAP-Azure-VLI-BYOS-Production, but entry?
CVE-2020-2934: no packages for Image SLES15-SP2-SAP-BYOS-Azure, but entry?
CVE-2020-2934: no packages for Image SLES15-SP2-SAP-BYOS-EC2-HVM, but entry?
CVE-2020-2934: no packages for Image SLES15-SP2-SAP-BYOS-GCE, but entry?
CVE-2020-2934: no packages for Image SLES15-SP2-SAP-EC2-HVM, but entry?
CVE-2020-2934: no packages for Image SLES15-SP2-SAP-GCE, but entry?
CVE-2020-2934: no packages for Image SLES15-SP3-Manager-4-2-Server-BYOS-Azure, but entry?
CVE-2020-2934: no packages for Image SLES15-SP3-Manager-4-2-Server-BYOS-EC2-HVM, but entry?
CVE-2020-2934: no packages for Image SLES15-SP3-Manager-4-2-Server-BYOS-GCE, but entry?
CVE-2020-2934: no packages for Image SLES15-SP3-SAP-Azure-LI-BYOS-Production, but entry?
CVE-2020-2934: no packages for Image SLES15-SP3-SAP-Azure-VLI-BYOS-Production, but entry?
CVE-2020-2934: no packages for Image SLES15-SP3-SAPCAL-Azure, but entry?
CVE-2020-2934: no packages for Image SLES15-SP3-SAPCAL-EC2-HVM, but entry?
CVE-2020-2934: no packages for Image SLES15-SP3-SAPCAL-GCE, but entry?
CVE-2020-2934: no packages for Image SLES15-SP4-Manager-Server-4-3, but entry?
CVE-2020-2934: no packages for Image SLES15-SP4-Manager-Server-4-3-Azure-llc, but entry?
CVE-2020-2934: no packages for Image SLES15-SP4-Manager-Server-4-3-Azure-ltd, but entry?
CVE-2020-2934: no packages for Image SLES15-SP4-Manager-Server-4-3-BYOS, but entry?
CVE-2020-2934: no packages for Image SLES15-SP4-Manager-Server-4-3-BYOS-Azure, but entry?
CVE-2020-2934: no packages for Image SLES15-SP4-Manager-Server-4-3-BYOS-EC2, but entry?
CVE-2020-2934: no packages for Image SLES15-SP4-Manager-Server-4-3-BYOS-GCE, but entry?
CVE-2020-2934: no packages for Image SLES15-SP4-Manager-Server-4-3-EC2-llc, but entry?
CVE-2020-2934: no packages for Image SLES15-SP4-Manager-Server-4-3-EC2-ltd, but entry?
CVE-2020-2934: no packages for Image SLES15-SP4-SAP, but entry?
CVE-2020-2934: no packages for Image SLES15-SP4-SAP-Azure, but entry?
CVE-2020-2934: no packages for Image SLES15-SP4-SAP-Azure-LI-BYOS, but entry?
CVE-2020-2934: no packages for Image SLES15-SP4-SAP-Azure-LI-BYOS-Production, but entry?
CVE-2020-2934: no packages for Image SLES15-SP4-SAP-Azure-VLI-BYOS, but entry?
CVE-2020-2934: no packages for Image SLES15-SP4-SAP-Azure-VLI-BYOS-Production, but entry?
CVE-2020-2934: no packages for Image SLES15-SP4-SAP-EC2, but entry?
CVE-2020-2934: no packages for Image SLES15-SP4-SAP-GCE, but entry?
CVE-2020-2934: no packages for Image SLES15-SP4-SAPCAL, but entry?
CVE-2020-2934: no packages for Image SLES15-SP4-SAPCAL-Azure, but entry?
CVE-2020-2934: no packages for Image SLES15-SP4-SAPCAL-EC2, but entry?
CVE-2020-2934: no packages for Image SLES15-SP4-SAPCAL-GCE, but entry?
CVE-2020-2934: no packages for Image SLES15-SP5-SAP-Azure, but entry?
CVE-2020-2934: no packages for Image SLES15-SP5-SAP-Azure-LI-BYOS, but entry?
CVE-2020-2934: no packages for Image SLES15-SP5-SAP-Azure-LI-BYOS-Production, but entry?
CVE-2020-2934: no packages for Image SLES15-SP5-SAP-Azure-VLI-BYOS, but entry?
CVE-2020-2934: no packages for Image SLES15-SP5-SAP-Azure-VLI-BYOS-Production, but entry?
CVE-2020-2934: no packages for Image SLES15-SP5-SAP-EC2, but entry?
CVE-2020-2934: no packages for Image SLES15-SP5-SAP-GCE, but entry?
CVE-2020-2934: no packages for Image SLES15-SP5-SAPCAL-Azure, but entry?
CVE-2020-2934: no packages for Image SLES15-SP5-SAPCAL-EC2, but entry?
CVE-2020-2934: no packages for Image SLES15-SP5-SAPCAL-GCE, but entry?
CVE-2020-2934: no packages for Image SLES15-SP6-SAP, but entry?
CVE-2020-2934: no packages for Image SLES15-SP6-SAP-Azure, but entry?
CVE-2020-2934: no packages for Image SLES15-SP6-SAP-Azure-LI-BYOS, but entry?
CVE-2020-2934: no packages for Image SLES15-SP6-SAP-Azure-LI-BYOS-Production, but entry?
CVE-2020-2934: no packages for Image SLES15-SP6-SAP-Azure-VLI-BYOS, but entry?
CVE-2020-2934: no packages for Image SLES15-SP6-SAP-Azure-VLI-BYOS-Production, but entry?
CVE-2020-2934: no packages for Image SLES15-SP6-SAP-EC2, but entry?
CVE-2020-2934: no packages for Image SLES15-SP6-SAP-GCE, but entry?
CVE-2020-2934: no packages for Image SLES15-SP6-SAPCAL, but entry?
CVE-2020-2934: no packages for Image SLES15-SP6-SAPCAL-Azure, but entry?
CVE-2020-2934: no packages for Image SLES15-SP6-SAPCAL-EC2, but entry?
CVE-2020-2934: no packages for Image SLES15-SP6-SAPCAL-GCE, but entry?
CVE-2020-2934: no packages for SUSE CaaS Platform 4.0, but entry?
CVE-2020-2934: no packages for SUSE Enterprise Storage 7, but entry?
CVE-2020-2934: no packages for SUSE Enterprise Storage 7.1, but entry?
CVE-2020-2934: no packages for SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS, but entry?
CVE-2020-2934: no packages for SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS, but entry?
CVE-2020-2934: no packages for SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS, but entry?
CVE-2020-2934: no packages for SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS, but entry?
CVE-2020-2934: no packages for SUSE Linux Enterprise Module for Basesystem 15 SP4, but entry?
CVE-2020-2934: no packages for SUSE Linux Enterprise Module for Basesystem 15 SP5, but entry?
CVE-2020-2934: no packages for SUSE Linux Enterprise Module for Basesystem 15 SP6, but entry?
CVE-2020-2934: no packages for SUSE Linux Enterprise Module for Development Tools 15 SP4, but entry?
CVE-2020-2934: no packages for SUSE Linux Enterprise Module for Development Tools 15 SP5, but entry?
CVE-2020-2934: no packages for SUSE Linux Enterprise Module for Development Tools 15 SP6, but entry?
CVE-2020-2934: no packages for SUSE Linux Enterprise Module for Package Hub 15 SP4, but entry?
CVE-2020-2934: no packages for SUSE Linux Enterprise Module for Package Hub 15 SP5, but entry?
CVE-2020-2934: no packages for SUSE Linux Enterprise Module for Package Hub 15 SP6, but entry?
CVE-2020-2934: no packages for SUSE Linux Enterprise Module for Web and Scripting 15 SP4, but entry?
CVE-2020-2934: no packages for SUSE Linux Enterprise Module for Web and Scripting 15 SP5, but entry?
CVE-2020-2934: no packages for SUSE Linux Enterprise Module for Web and Scripting 15 SP6, but entry?
CVE-2020-2934: no packages for SUSE Linux Enterprise Real Time 15 SP3, but entry?
CVE-2020-2934: no packages for SUSE Linux Enterprise Server 15 SP1-LTSS, but entry?
CVE-2020-2934: no packages for SUSE Linux Enterprise Server 15 SP2-LTSS, but entry?
CVE-2020-2934: no packages for SUSE Linux Enterprise Server 15 SP3-LTSS, but entry?
CVE-2020-2934: no packages for SUSE Linux Enterprise Server 15 SP4-TERADATA, but entry?
CVE-2020-2934: no packages for SUSE Linux Enterprise Server for SAP Applications 15 SP1, but entry?
CVE-2020-2934: no packages for SUSE Linux Enterprise Server for SAP Applications 15 SP2, but entry?
CVE-2020-2934: no packages for SUSE Linux Enterprise Server for SAP Applications 15 SP3, but entry?
CVE-2020-2934: no packages for SUSE Linux Enterprise Workstation Extension 15 SP4, but entry?
CVE-2020-2934: no packages for SUSE Linux Enterprise Workstation Extension 15 SP5, but entry?
CVE-2020-2934: no packages for SUSE Linux Enterprise Workstation Extension 15 SP6, but entry?
CVE-2020-2934: no packages for SUSE Manager Proxy 4.2, but entry?
CVE-2020-2934: no packages for SUSE Manager Retail Branch Server 4.2, but entry?
CVE-2020-2934: no packages for SUSE Manager Server 4.2, but entry?
CVE-2020-2934: no packages for SUSE Manager Server Module 4.2, but entry?
CVE-2020-2934: no packages for SUSE Manager Server Module 4.3, but entry?
CVE-2020-2934: no packages for Container bci/kiwi:9.24.43-8.6, but entry?
CVE-2020-2934: no packages for Container bci/openjdk-devel:11-6.2, but entry?
CVE-2020-2934: no packages for Container bci/openjdk-devel:17-14.11, but entry?
CVE-2020-2934: no packages for Container bci/openjdk-devel:17-7.2, but entry?
CVE-2020-2934: no packages for Container bci/openjdk:11-7.1, but entry?
CVE-2020-2934: no packages for Container bci/openjdk:17-7.1, but entry?
CVE-2020-2934: no packages for Container bci/openjdk:latest, but entry?
CVE-2020-2934: no packages for Container suse/manager/5.0/x86_64/server-attestation:5.0.0-beta2.2.16, but entry?
CVE-2020-2934: no packages for Container suse/manager/5.0/x86_64/server:5.0.0-beta1.2.122, but entry?
CVE-2020-2934: no packages for Image SLES15-SP2-SAP-Azure, but entry?
CVE-2020-2934: no packages for Image SLES15-SP2-SAP-Azure-LI-BYOS-Production, but entry?
CVE-2020-2934: no packages for Image SLES15-SP2-SAP-Azure-VLI-BYOS-Production, but entry?
CVE-2020-2934: no packages for Image SLES15-SP2-SAP-BYOS-Azure, but entry?
CVE-2020-2934: no packages for Image SLES15-SP2-SAP-BYOS-EC2-HVM, but entry?
CVE-2020-2934: no packages for Image SLES15-SP2-SAP-BYOS-GCE, but entry?
CVE-2020-2934: no packages for Image SLES15-SP2-SAP-EC2-HVM, but entry?
CVE-2020-2934: no packages for Image SLES15-SP2-SAP-GCE, but entry?
CVE-2020-2934: no packages for Image SLES15-SP3-Manager-4-2-Server-BYOS-Azure, but entry?
CVE-2020-2934: no packages for Image SLES15-SP3-Manager-4-2-Server-BYOS-EC2-HVM, but entry?
CVE-2020-2934: no packages for Image SLES15-SP3-Manager-4-2-Server-BYOS-GCE, but entry?
CVE-2020-2934: no packages for Image SLES15-SP3-SAP-Azure-LI-BYOS-Production, but entry?
CVE-2020-2934: no packages for Image SLES15-SP3-SAP-Azure-VLI-BYOS-Production, but entry?
CVE-2020-2934: no packages for Image SLES15-SP3-SAPCAL-Azure, but entry?
CVE-2020-2934: no packages for Image SLES15-SP3-SAPCAL-EC2-HVM, but entry?
CVE-2020-2934: no packages for Image SLES15-SP3-SAPCAL-GCE, but entry?
CVE-2020-2934: no packages for Image SLES15-SP4-Manager-Server-4-3, but entry?
CVE-2020-2934: no packages for Image SLES15-SP4-Manager-Server-4-3-Azure-llc, but entry?
CVE-2020-2934: no packages for Image SLES15-SP4-Manager-Server-4-3-Azure-ltd, but entry?
CVE-2020-2934: no packages for Image SLES15-SP4-Manager-Server-4-3-BYOS, but entry?
CVE-2020-2934: no packages for Image SLES15-SP4-Manager-Server-4-3-BYOS-Azure, but entry?
CVE-2020-2934: no packages for Image SLES15-SP4-Manager-Server-4-3-BYOS-EC2, but entry?
CVE-2020-2934: no packages for Image SLES15-SP4-Manager-Server-4-3-BYOS-GCE, but entry?
CVE-2020-2934: no packages for Image SLES15-SP4-Manager-Server-4-3-EC2-llc, but entry?
CVE-2020-2934: no packages for Image SLES15-SP4-Manager-Server-4-3-EC2-ltd, but entry?
CVE-2020-2934: no packages for Image SLES15-SP4-SAP, but entry?
CVE-2020-2934: no packages for Image SLES15-SP4-SAP-Azure, but entry?
CVE-2020-2934: no packages for Image SLES15-SP4-SAP-Azure-LI-BYOS, but entry?
CVE-2020-2934: no packages for Image SLES15-SP4-SAP-Azure-LI-BYOS-Production, but entry?
CVE-2020-2934: no packages for Image SLES15-SP4-SAP-Azure-VLI-BYOS, but entry?
CVE-2020-2934: no packages for Image SLES15-SP4-SAP-Azure-VLI-BYOS-Production, but entry?
CVE-2020-2934: no packages for Image SLES15-SP4-SAP-EC2, but entry?
CVE-2020-2934: no packages for Image SLES15-SP4-SAP-GCE, but entry?
CVE-2020-2934: no packages for Image SLES15-SP4-SAPCAL, but entry?
CVE-2020-2934: no packages for Image SLES15-SP4-SAPCAL-Azure, but entry?
CVE-2020-2934: no packages for Image SLES15-SP4-SAPCAL-EC2, but entry?
CVE-2020-2934: no packages for Image SLES15-SP4-SAPCAL-GCE, but entry?
CVE-2020-2934: no packages for Image SLES15-SP5-SAP-Azure, but entry?
CVE-2020-2934: no packages for Image SLES15-SP5-SAP-Azure-LI-BYOS, but entry?
CVE-2020-2934: no packages for Image SLES15-SP5-SAP-Azure-LI-BYOS-Production, but entry?
CVE-2020-2934: no packages for Image SLES15-SP5-SAP-Azure-VLI-BYOS, but entry?
CVE-2020-2934: no packages for Image SLES15-SP5-SAP-Azure-VLI-BYOS-Production, but entry?
CVE-2020-2934: no packages for Image SLES15-SP5-SAP-EC2, but entry?
CVE-2020-2934: no packages for Image SLES15-SP5-SAP-GCE, but entry?
CVE-2020-2934: no packages for Image SLES15-SP5-SAPCAL-Azure, but entry?
CVE-2020-2934: no packages for Image SLES15-SP5-SAPCAL-EC2, but entry?
CVE-2020-2934: no packages for Image SLES15-SP5-SAPCAL-GCE, but entry?
CVE-2020-2934: no packages for Image SLES15-SP6-SAP, but entry?
CVE-2020-2934: no packages for Image SLES15-SP6-SAP-Azure, but entry?
CVE-2020-2934: no packages for Image SLES15-SP6-SAP-Azure-LI-BYOS, but entry?
CVE-2020-2934: no packages for Image SLES15-SP6-SAP-Azure-LI-BYOS-Production, but entry?
CVE-2020-2934: no packages for Image SLES15-SP6-SAP-Azure-VLI-BYOS, but entry?
CVE-2020-2934: no packages for Image SLES15-SP6-SAP-Azure-VLI-BYOS-Production, but entry?
CVE-2020-2934: no packages for Image SLES15-SP6-SAP-EC2, but entry?
CVE-2020-2934: no packages for Image SLES15-SP6-SAP-GCE, but entry?
CVE-2020-2934: no packages for Image SLES15-SP6-SAPCAL, but entry?
CVE-2020-2934: no packages for Image SLES15-SP6-SAPCAL-Azure, but entry?
CVE-2020-2934: no packages for Image SLES15-SP6-SAPCAL-EC2, but entry?
CVE-2020-2934: no packages for Image SLES15-SP6-SAPCAL-GCE, but entry?
CVE-2020-2934: no packages for SUSE CaaS Platform 4.0, but entry?
CVE-2020-2934: no packages for SUSE Enterprise Storage 7, but entry?
CVE-2020-2934: no packages for SUSE Enterprise Storage 7.1, but entry?
CVE-2020-2934: no packages for SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS, but entry?
CVE-2020-2934: no packages for SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS, but entry?
CVE-2020-2934: no packages for SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS, but entry?
CVE-2020-2934: no packages for SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS, but entry?
CVE-2020-2934: no packages for SUSE Linux Enterprise Module for Basesystem 15 SP4, but entry?
CVE-2020-2934: no packages for SUSE Linux Enterprise Module for Basesystem 15 SP5, but entry?
CVE-2020-2934: no packages for SUSE Linux Enterprise Module for Basesystem 15 SP6, but entry?
CVE-2020-2934: no packages for SUSE Linux Enterprise Module for Development Tools 15 SP4, but entry?
CVE-2020-2934: no packages for SUSE Linux Enterprise Module for Development Tools 15 SP5, but entry?
CVE-2020-2934: no packages for SUSE Linux Enterprise Module for Development Tools 15 SP6, but entry?
CVE-2020-2934: no packages for SUSE Linux Enterprise Module for Package Hub 15 SP4, but entry?
CVE-2020-2934: no packages for SUSE Linux Enterprise Module for Package Hub 15 SP5, but entry?
CVE-2020-2934: no packages for SUSE Linux Enterprise Module for Package Hub 15 SP6, but entry?
CVE-2020-2934: no packages for SUSE Linux Enterprise Module for Web and Scripting 15 SP4, but entry?
CVE-2020-2934: no packages for SUSE Linux Enterprise Module for Web and Scripting 15 SP5, but entry?
CVE-2020-2934: no packages for SUSE Linux Enterprise Module for Web and Scripting 15 SP6, but entry?
CVE-2020-2934: no packages for SUSE Linux Enterprise Real Time 15 SP3, but entry?
CVE-2020-2934: no packages for SUSE Linux Enterprise Server 15 SP1-LTSS, but entry?
CVE-2020-2934: no packages for SUSE Linux Enterprise Server 15 SP2-LTSS, but entry?
CVE-2020-2934: no packages for SUSE Linux Enterprise Server 15 SP3-LTSS, but entry?
CVE-2020-2934: no packages for SUSE Linux Enterprise Server 15 SP4-TERADATA, but entry?
CVE-2020-2934: no packages for SUSE Linux Enterprise Server for SAP Applications 15 SP1, but entry?
CVE-2020-2934: no packages for SUSE Linux Enterprise Server for SAP Applications 15 SP2, but entry?
CVE-2020-2934: no packages for SUSE Linux Enterprise Server for SAP Applications 15 SP3, but entry?
CVE-2020-2934: no packages for SUSE Linux Enterprise Workstation Extension 15 SP4, but entry?
CVE-2020-2934: no packages for SUSE Linux Enterprise Workstation Extension 15 SP5, but entry?
CVE-2020-2934: no packages for SUSE Linux Enterprise Workstation Extension 15 SP6, but entry?
CVE-2020-2934: no packages for SUSE Manager Proxy 4.2, but entry?
CVE-2020-2934: no packages for SUSE Manager Retail Branch Server 4.2, but entry?
CVE-2020-2934: no packages for SUSE Manager Server 4.2, but entry?
CVE-2020-2934: no packages for SUSE Manager Server Module 4.2, but entry?
CVE-2020-2934: no packages for SUSE Manager Server Module 4.3, but entry?
CVE-2020-2933: no packages for Image SLES15-SP5-SAP-EC2, but entry?
CVE-2020-2933: no packages for Image SLES15-SP2-SAP-BYOS-Azure, but entry?
CVE-2020-2933: no packages for SUSE Linux Enterprise Module for Development Tools 15 SP5, but entry?
CVE-2020-2933: no packages for Image SLES15-SP4-SAPCAL, but entry?
CVE-2020-2933: no packages for Image SLES15-SP6-SAPCAL-EC2, but entry?
CVE-2020-2933: no packages for Container bci/openjdk:latest, but entry?
CVE-2020-2933: no packages for SUSE Linux Enterprise Module for Development Tools 15 SP4, but entry?
CVE-2020-2933: no packages for SUSE Linux Enterprise Module for Web and Scripting 15 SP6, but entry?
CVE-2020-2933: no packages for Container bci/openjdk:17-7.1, but entry?
CVE-2020-2933: no packages for SUSE Linux Enterprise Server 15 SP3-LTSS, but entry?
CVE-2020-2933: no packages for SUSE Linux Enterprise Module for Package Hub 15 SP6, but entry?
CVE-2020-2933: no packages for SUSE Linux Enterprise Module for Basesystem 15 SP4, but entry?
CVE-2020-2933: no packages for Image SLES15-SP3-SAP-Azure-VLI-BYOS-Production, but entry?
CVE-2020-2933: no packages for Image SLES15-SP4-Manager-Server-4-3-EC2-ltd, but entry?
CVE-2020-2933: no packages for Image SLES15-SP3-SAPCAL-GCE, but entry?
CVE-2020-2933: no packages for Image SLES15-SP6-SAP, but entry?
CVE-2020-2933: no packages for Image SLES15-SP4-SAPCAL-GCE, but entry?
CVE-2020-2933: no packages for Container suse/manager/5.0/x86_64/server:5.0.0-beta1.2.122, but entry?
CVE-2020-2933: no packages for SUSE Linux Enterprise Module for Development Tools 15 SP6, but entry?
CVE-2020-2933: no packages for SUSE Manager Server 4.2, but entry?
CVE-2020-2933: no packages for Image SLES15-SP3-SAPCAL-EC2-HVM, but entry?
CVE-2020-2933: no packages for Image SLES15-SP4-SAP-Azure-LI-BYOS, but entry?
CVE-2020-2933: no packages for SUSE Enterprise Storage 7.1, but entry?
CVE-2020-2933: no packages for SUSE Manager Retail Branch Server 4.2, but entry?
CVE-2020-2933: no packages for Image SLES15-SP4-SAP, but entry?
CVE-2020-2933: no packages for Image SLES15-SP4-Manager-Server-4-3-EC2-llc, but entry?
CVE-2020-2933: no packages for Image SLES15-SP6-SAP-Azure-LI-BYOS-Production, but entry?
CVE-2020-2933: no packages for SUSE Linux Enterprise Server 15 SP2-LTSS, but entry?
CVE-2020-2933: no packages for SUSE Linux Enterprise Module for Package Hub 15 SP4, but entry?
CVE-2020-2933: no packages for SUSE Enterprise Storage 7, but entry?
CVE-2020-2933: no packages for SUSE Linux Enterprise Workstation Extension 15 SP6, but entry?
CVE-2020-2933: no packages for Image SLES15-SP6-SAP-Azure-VLI-BYOS-Production, but entry?
CVE-2020-2933: no packages for SUSE Manager Server Module 4.3, but entry?
CVE-2020-2933: no packages for SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS, but entry?
CVE-2020-2933: no packages for Image SLES15-SP4-SAP-GCE, but entry?
CVE-2020-2933: no packages for SUSE Linux Enterprise Server 15 SP4-TERADATA, but entry?
CVE-2020-2933: no packages for Image SLES15-SP6-SAP-Azure-LI-BYOS, but entry?
CVE-2020-2933: no packages for Image SLES15-SP4-SAP-Azure-VLI-BYOS, but entry?
CVE-2020-2933: no packages for Container bci/kiwi:9.24.43-8.6, but entry?
CVE-2020-2933: no packages for Image SLES15-SP2-SAP-GCE, but entry?
CVE-2020-2933: no packages for Container suse/manager/5.0/x86_64/server-attestation:5.0.0-beta2.2.16, but entry?
CVE-2020-2933: no packages for Image SLES15-SP2-SAP-BYOS-EC2-HVM, but entry?
CVE-2020-2933: no packages for Image SLES15-SP2-SAP-Azure-VLI-BYOS-Production, but entry?
CVE-2020-2933: no packages for SUSE CaaS Platform 4.0, but entry?
CVE-2020-2933: no packages for Image SLES15-SP6-SAPCAL-GCE, but entry?
CVE-2020-2933: no packages for Container bci/openjdk-devel:11-6.2, but entry?
CVE-2020-2933: no packages for Image SLES15-SP4-Manager-Server-4-3-BYOS-Azure, but entry?
CVE-2020-2933: no packages for Image SLES15-SP6-SAP-GCE, but entry?
CVE-2020-2933: no packages for Image SLES15-SP5-SAP-Azure-LI-BYOS, but entry?
CVE-2020-2933: no packages for SUSE Manager Server Module 4.2, but entry?
CVE-2020-2933: no packages for Image SLES15-SP4-SAP-Azure-VLI-BYOS-Production, but entry?
CVE-2020-2933: no packages for SUSE Linux Enterprise Server for SAP Applications 15 SP2, but entry?
CVE-2020-2933: no packages for Image SLES15-SP5-SAPCAL-Azure, but entry?
CVE-2020-2933: no packages for Container bci/openjdk-devel:17-7.2, but entry?
CVE-2020-2933: no packages for SUSE Linux Enterprise Workstation Extension 15 SP5, but entry?
CVE-2020-2933: no packages for Image SLES15-SP5-SAP-GCE, but entry?
CVE-2020-2933: no packages for SUSE Linux Enterprise Module for Web and Scripting 15 SP5, but entry?
CVE-2020-2933: no packages for SUSE Linux Enterprise Real Time 15 SP3, but entry?
CVE-2020-2933: no packages for Image SLES15-SP4-Manager-Server-4-3-Azure-ltd, but entry?
CVE-2020-2933: no packages for Image SLES15-SP3-Manager-4-2-Server-BYOS-GCE, but entry?
CVE-2020-2933: no packages for Image SLES15-SP2-SAP-BYOS-GCE, but entry?
CVE-2020-2933: no packages for Image SLES15-SP4-Manager-Server-4-3-Azure-llc, but entry?
CVE-2020-2933: no packages for Image SLES15-SP3-SAPCAL-Azure, but entry?
CVE-2020-2933: no packages for Image SLES15-SP5-SAP-Azure-VLI-BYOS, but entry?
CVE-2020-2933: no packages for Image SLES15-SP6-SAPCAL, but entry?
CVE-2020-2933: no packages for SUSE Linux Enterprise Module for Basesystem 15 SP6, but entry?
CVE-2020-2933: no packages for Image SLES15-SP5-SAP-Azure-LI-BYOS-Production, but entry?
CVE-2020-2933: no packages for SUSE Linux Enterprise Module for Basesystem 15 SP5, but entry?
CVE-2020-2933: no packages for Image SLES15-SP2-SAP-Azure, but entry?
CVE-2020-2933: no packages for Image SLES15-SP4-Manager-Server-4-3-BYOS, but entry?
CVE-2020-2933: no packages for Image SLES15-SP2-SAP-Azure-LI-BYOS-Production, but entry?
CVE-2020-2933: no packages for Image SLES15-SP4-SAP-Azure-LI-BYOS-Production, but entry?
CVE-2020-2933: no packages for Image SLES15-SP4-Manager-Server-4-3, but entry?
CVE-2020-2933: no packages for SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS, but entry?
CVE-2020-2933: no packages for SUSE Manager Proxy 4.2, but entry?
CVE-2020-2933: no packages for Image SLES15-SP4-SAP-Azure, but entry?
CVE-2020-2933: no packages for SUSE Linux Enterprise Module for Package Hub 15 SP5, but entry?
CVE-2020-2933: no packages for SUSE Linux Enterprise Workstation Extension 15 SP4, but entry?
CVE-2020-2933: no packages for Image SLES15-SP3-SAP-Azure-LI-BYOS-Production, but entry?
CVE-2020-2933: no packages for SUSE Linux Enterprise Server for SAP Applications 15 SP3, but entry?
CVE-2020-2933: no packages for SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS, but entry?
CVE-2020-2933: no packages for Image SLES15-SP2-SAP-EC2-HVM, but entry?
CVE-2020-2933: no packages for Image SLES15-SP6-SAP-EC2, but entry?
CVE-2020-2933: no packages for Image SLES15-SP4-SAPCAL-Azure, but entry?
CVE-2020-2933: no packages for Image SLES15-SP5-SAPCAL-EC2, but entry?
CVE-2020-2933: no packages for Image SLES15-SP4-SAPCAL-EC2, but entry?
CVE-2020-2933: no packages for SUSE Linux Enterprise Module for Web and Scripting 15 SP4, but entry?
CVE-2020-2933: no packages for Container bci/openjdk-devel:17-14.11, but entry?
CVE-2020-2933: no packages for SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS, but entry?
CVE-2020-2933: no packages for Container bci/openjdk:11-7.1, but entry?
CVE-2020-2933: no packages for SUSE Linux Enterprise Server for SAP Applications 15 SP1, but entry?
CVE-2020-2933: no packages for Image SLES15-SP4-SAP-EC2, but entry?
CVE-2020-2933: no packages for Image SLES15-SP3-Manager-4-2-Server-BYOS-Azure, but entry?
CVE-2020-2933: no packages for Image SLES15-SP5-SAP-Azure, but entry?
CVE-2020-2933: no packages for Image SLES15-SP6-SAP-Azure-VLI-BYOS, but entry?
CVE-2020-2933: no packages for Image SLES15-SP6-SAPCAL-Azure, but entry?
CVE-2020-2933: no packages for Image SLES15-SP5-SAP-Azure-VLI-BYOS-Production, but entry?
CVE-2020-2933: no packages for Image SLES15-SP4-Manager-Server-4-3-BYOS-GCE, but entry?
CVE-2020-2933: no packages for Image SLES15-SP3-Manager-4-2-Server-BYOS-EC2-HVM, but entry?
CVE-2020-2933: no packages for Image SLES15-SP4-Manager-Server-4-3-BYOS-EC2, but entry?
CVE-2020-2933: no packages for Image SLES15-SP5-SAPCAL-GCE, but entry?
CVE-2020-2933: no packages for Image SLES15-SP6-SAP-Azure, but entry?
CVE-2020-2933: no packages for SUSE Linux Enterprise Server 15 SP1-LTSS, but entry?
CVE-2020-2933: no packages for Container bci/kiwi:9.24.43-8.6, but entry?
CVE-2020-2933: no packages for Container bci/openjdk-devel:11-6.2, but entry?
CVE-2020-2933: no packages for Container bci/openjdk-devel:17-14.11, but entry?
CVE-2020-2933: no packages for Container bci/openjdk-devel:17-7.2, but entry?
CVE-2020-2933: no packages for Container bci/openjdk:11-7.1, but entry?
CVE-2020-2933: no packages for Container bci/openjdk:17-7.1, but entry?
CVE-2020-2933: no packages for Container bci/openjdk:latest, but entry?
CVE-2020-2933: no packages for Container suse/manager/5.0/x86_64/server-attestation:5.0.0-beta2.2.16, but entry?
CVE-2020-2933: no packages for Container suse/manager/5.0/x86_64/server:5.0.0-beta1.2.122, but entry?
CVE-2020-2933: no packages for Image SLES15-SP2-SAP-Azure, but entry?
CVE-2020-2933: no packages for Image SLES15-SP2-SAP-Azure-LI-BYOS-Production, but entry?
CVE-2020-2933: no packages for Image SLES15-SP2-SAP-Azure-VLI-BYOS-Production, but entry?
CVE-2020-2933: no packages for Image SLES15-SP2-SAP-BYOS-Azure, but entry?
CVE-2020-2933: no packages for Image SLES15-SP2-SAP-BYOS-EC2-HVM, but entry?
CVE-2020-2933: no packages for Image SLES15-SP2-SAP-BYOS-GCE, but entry?
CVE-2020-2933: no packages for Image SLES15-SP2-SAP-EC2-HVM, but entry?
CVE-2020-2933: no packages for Image SLES15-SP2-SAP-GCE, but entry?
CVE-2020-2933: no packages for Image SLES15-SP3-Manager-4-2-Server-BYOS-Azure, but entry?
CVE-2020-2933: no packages for Image SLES15-SP3-Manager-4-2-Server-BYOS-EC2-HVM, but entry?
CVE-2020-2933: no packages for Image SLES15-SP3-Manager-4-2-Server-BYOS-GCE, but entry?
CVE-2020-2933: no packages for Image SLES15-SP3-SAP-Azure-LI-BYOS-Production, but entry?
CVE-2020-2933: no packages for Image SLES15-SP3-SAP-Azure-VLI-BYOS-Production, but entry?
CVE-2020-2933: no packages for Image SLES15-SP3-SAPCAL-Azure, but entry?
CVE-2020-2933: no packages for Image SLES15-SP3-SAPCAL-EC2-HVM, but entry?
CVE-2020-2933: no packages for Image SLES15-SP3-SAPCAL-GCE, but entry?
CVE-2020-2933: no packages for Image SLES15-SP4-Manager-Server-4-3, but entry?
CVE-2020-2933: no packages for Image SLES15-SP4-Manager-Server-4-3-Azure-llc, but entry?
CVE-2020-2933: no packages for Image SLES15-SP4-Manager-Server-4-3-Azure-ltd, but entry?
CVE-2020-2933: no packages for Image SLES15-SP4-Manager-Server-4-3-BYOS, but entry?
CVE-2020-2933: no packages for Image SLES15-SP4-Manager-Server-4-3-BYOS-Azure, but entry?
CVE-2020-2933: no packages for Image SLES15-SP4-Manager-Server-4-3-BYOS-EC2, but entry?
CVE-2020-2933: no packages for Image SLES15-SP4-Manager-Server-4-3-BYOS-GCE, but entry?
CVE-2020-2933: no packages for Image SLES15-SP4-Manager-Server-4-3-EC2-llc, but entry?
CVE-2020-2933: no packages for Image SLES15-SP4-Manager-Server-4-3-EC2-ltd, but entry?
CVE-2020-2933: no packages for Image SLES15-SP4-SAP, but entry?
CVE-2020-2933: no packages for Image SLES15-SP4-SAP-Azure, but entry?
CVE-2020-2933: no packages for Image SLES15-SP4-SAP-Azure-LI-BYOS, but entry?
CVE-2020-2933: no packages for Image SLES15-SP4-SAP-Azure-LI-BYOS-Production, but entry?
CVE-2020-2933: no packages for Image SLES15-SP4-SAP-Azure-VLI-BYOS, but entry?
CVE-2020-2933: no packages for Image SLES15-SP4-SAP-Azure-VLI-BYOS-Production, but entry?
CVE-2020-2933: no packages for Image SLES15-SP4-SAP-EC2, but entry?
CVE-2020-2933: no packages for Image SLES15-SP4-SAP-GCE, but entry?
CVE-2020-2933: no packages for Image SLES15-SP4-SAPCAL, but entry?
CVE-2020-2933: no packages for Image SLES15-SP4-SAPCAL-Azure, but entry?
CVE-2020-2933: no packages for Image SLES15-SP4-SAPCAL-EC2, but entry?
CVE-2020-2933: no packages for Image SLES15-SP4-SAPCAL-GCE, but entry?
CVE-2020-2933: no packages for Image SLES15-SP5-SAP-Azure, but entry?
CVE-2020-2933: no packages for Image SLES15-SP5-SAP-Azure-LI-BYOS, but entry?
CVE-2020-2933: no packages for Image SLES15-SP5-SAP-Azure-LI-BYOS-Production, but entry?
CVE-2020-2933: no packages for Image SLES15-SP5-SAP-Azure-VLI-BYOS, but entry?
CVE-2020-2933: no packages for Image SLES15-SP5-SAP-Azure-VLI-BYOS-Production, but entry?
CVE-2020-2933: no packages for Image SLES15-SP5-SAP-EC2, but entry?
CVE-2020-2933: no packages for Image SLES15-SP5-SAP-GCE, but entry?
CVE-2020-2933: no packages for Image SLES15-SP5-SAPCAL-Azure, but entry?
CVE-2020-2933: no packages for Image SLES15-SP5-SAPCAL-EC2, but entry?
CVE-2020-2933: no packages for Image SLES15-SP5-SAPCAL-GCE, but entry?
CVE-2020-2933: no packages for Image SLES15-SP6-SAP, but entry?
CVE-2020-2933: no packages for Image SLES15-SP6-SAP-Azure, but entry?
CVE-2020-2933: no packages for Image SLES15-SP6-SAP-Azure-LI-BYOS, but entry?
CVE-2020-2933: no packages for Image SLES15-SP6-SAP-Azure-LI-BYOS-Production, but entry?
CVE-2020-2933: no packages for Image SLES15-SP6-SAP-Azure-VLI-BYOS, but entry?
CVE-2020-2933: no packages for Image SLES15-SP6-SAP-Azure-VLI-BYOS-Production, but entry?
CVE-2020-2933: no packages for Image SLES15-SP6-SAP-EC2, but entry?
CVE-2020-2933: no packages for Image SLES15-SP6-SAP-GCE, but entry?
CVE-2020-2933: no packages for Image SLES15-SP6-SAPCAL, but entry?
CVE-2020-2933: no packages for Image SLES15-SP6-SAPCAL-Azure, but entry?
CVE-2020-2933: no packages for Image SLES15-SP6-SAPCAL-EC2, but entry?
CVE-2020-2933: no packages for Image SLES15-SP6-SAPCAL-GCE, but entry?
CVE-2020-2933: no packages for SUSE CaaS Platform 4.0, but entry?
CVE-2020-2933: no packages for SUSE Enterprise Storage 7, but entry?
CVE-2020-2933: no packages for SUSE Enterprise Storage 7.1, but entry?
CVE-2020-2933: no packages for SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS, but entry?
CVE-2020-2933: no packages for SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS, but entry?
CVE-2020-2933: no packages for SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS, but entry?
CVE-2020-2933: no packages for SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS, but entry?
CVE-2020-2933: no packages for SUSE Linux Enterprise Module for Basesystem 15 SP4, but entry?
CVE-2020-2933: no packages for SUSE Linux Enterprise Module for Basesystem 15 SP5, but entry?
CVE-2020-2933: no packages for SUSE Linux Enterprise Module for Basesystem 15 SP6, but entry?
CVE-2020-2933: no packages for SUSE Linux Enterprise Module for Development Tools 15 SP4, but entry?
CVE-2020-2933: no packages for SUSE Linux Enterprise Module for Development Tools 15 SP5, but entry?
CVE-2020-2933: no packages for SUSE Linux Enterprise Module for Development Tools 15 SP6, but entry?
CVE-2020-2933: no packages for SUSE Linux Enterprise Module for Package Hub 15 SP4, but entry?
CVE-2020-2933: no packages for SUSE Linux Enterprise Module for Package Hub 15 SP5, but entry?
CVE-2020-2933: no packages for SUSE Linux Enterprise Module for Package Hub 15 SP6, but entry?
CVE-2020-2933: no packages for SUSE Linux Enterprise Module for Web and Scripting 15 SP4, but entry?
CVE-2020-2933: no packages for SUSE Linux Enterprise Module for Web and Scripting 15 SP5, but entry?
CVE-2020-2933: no packages for SUSE Linux Enterprise Module for Web and Scripting 15 SP6, but entry?
CVE-2020-2933: no packages for SUSE Linux Enterprise Real Time 15 SP3, but entry?
CVE-2020-2933: no packages for SUSE Linux Enterprise Server 15 SP1-LTSS, but entry?
CVE-2020-2933: no packages for SUSE Linux Enterprise Server 15 SP2-LTSS, but entry?
CVE-2020-2933: no packages for SUSE Linux Enterprise Server 15 SP3-LTSS, but entry?
CVE-2020-2933: no packages for SUSE Linux Enterprise Server 15 SP4-TERADATA, but entry?
CVE-2020-2933: no packages for SUSE Linux Enterprise Server for SAP Applications 15 SP1, but entry?
CVE-2020-2933: no packages for SUSE Linux Enterprise Server for SAP Applications 15 SP2, but entry?
CVE-2020-2933: no packages for SUSE Linux Enterprise Server for SAP Applications 15 SP3, but entry?
CVE-2020-2933: no packages for SUSE Linux Enterprise Workstation Extension 15 SP4, but entry?
CVE-2020-2933: no packages for SUSE Linux Enterprise Workstation Extension 15 SP5, but entry?
CVE-2020-2933: no packages for SUSE Linux Enterprise Workstation Extension 15 SP6, but entry?
CVE-2020-2933: no packages for SUSE Manager Proxy 4.2, but entry?
CVE-2020-2933: no packages for SUSE Manager Retail Branch Server 4.2, but entry?
CVE-2020-2933: no packages for SUSE Manager Server 4.2, but entry?
CVE-2020-2933: no packages for SUSE Manager Server Module 4.2, but entry?
CVE-2020-2933: no packages for SUSE Manager Server Module 4.3, but entry?
CVE-2020-2933: no packages for Container bci/kiwi:9.24.43-8.6, but entry?
CVE-2020-2933: no packages for Container bci/openjdk-devel:11-6.2, but entry?
CVE-2020-2933: no packages for Container bci/openjdk-devel:17-14.11, but entry?
CVE-2020-2933: no packages for Container bci/openjdk-devel:17-7.2, but entry?
CVE-2020-2933: no packages for Container bci/openjdk:11-7.1, but entry?
CVE-2020-2933: no packages for Container bci/openjdk:17-7.1, but entry?
CVE-2020-2933: no packages for Container bci/openjdk:latest, but entry?
CVE-2020-2933: no packages for Container suse/manager/5.0/x86_64/server-attestation:5.0.0-beta2.2.16, but entry?
CVE-2020-2933: no packages for Container suse/manager/5.0/x86_64/server:5.0.0-beta1.2.122, but entry?
CVE-2020-2933: no packages for Image SLES15-SP2-SAP-Azure, but entry?
CVE-2020-2933: no packages for Image SLES15-SP2-SAP-Azure-LI-BYOS-Production, but entry?
CVE-2020-2933: no packages for Image SLES15-SP2-SAP-Azure-VLI-BYOS-Production, but entry?
CVE-2020-2933: no packages for Image SLES15-SP2-SAP-BYOS-Azure, but entry?
CVE-2020-2933: no packages for Image SLES15-SP2-SAP-BYOS-EC2-HVM, but entry?
CVE-2020-2933: no packages for Image SLES15-SP2-SAP-BYOS-GCE, but entry?
CVE-2020-2933: no packages for Image SLES15-SP2-SAP-EC2-HVM, but entry?
CVE-2020-2933: no packages for Image SLES15-SP2-SAP-GCE, but entry?
CVE-2020-2933: no packages for Image SLES15-SP3-Manager-4-2-Server-BYOS-Azure, but entry?
CVE-2020-2933: no packages for Image SLES15-SP3-Manager-4-2-Server-BYOS-EC2-HVM, but entry?
CVE-2020-2933: no packages for Image SLES15-SP3-Manager-4-2-Server-BYOS-GCE, but entry?
CVE-2020-2933: no packages for Image SLES15-SP3-SAP-Azure-LI-BYOS-Production, but entry?
CVE-2020-2933: no packages for Image SLES15-SP3-SAP-Azure-VLI-BYOS-Production, but entry?
CVE-2020-2933: no packages for Image SLES15-SP3-SAPCAL-Azure, but entry?
CVE-2020-2933: no packages for Image SLES15-SP3-SAPCAL-EC2-HVM, but entry?
CVE-2020-2933: no packages for Image SLES15-SP3-SAPCAL-GCE, but entry?
CVE-2020-2933: no packages for Image SLES15-SP4-Manager-Server-4-3, but entry?
CVE-2020-2933: no packages for Image SLES15-SP4-Manager-Server-4-3-Azure-llc, but entry?
CVE-2020-2933: no packages for Image SLES15-SP4-Manager-Server-4-3-Azure-ltd, but entry?
CVE-2020-2933: no packages for Image SLES15-SP4-Manager-Server-4-3-BYOS, but entry?
CVE-2020-2933: no packages for Image SLES15-SP4-Manager-Server-4-3-BYOS-Azure, but entry?
CVE-2020-2933: no packages for Image SLES15-SP4-Manager-Server-4-3-BYOS-EC2, but entry?
CVE-2020-2933: no packages for Image SLES15-SP4-Manager-Server-4-3-BYOS-GCE, but entry?
CVE-2020-2933: no packages for Image SLES15-SP4-Manager-Server-4-3-EC2-llc, but entry?
CVE-2020-2933: no packages for Image SLES15-SP4-Manager-Server-4-3-EC2-ltd, but entry?
CVE-2020-2933: no packages for Image SLES15-SP4-SAP, but entry?
CVE-2020-2933: no packages for Image SLES15-SP4-SAP-Azure, but entry?
CVE-2020-2933: no packages for Image SLES15-SP4-SAP-Azure-LI-BYOS, but entry?
CVE-2020-2933: no packages for Image SLES15-SP4-SAP-Azure-LI-BYOS-Production, but entry?
CVE-2020-2933: no packages for Image SLES15-SP4-SAP-Azure-VLI-BYOS, but entry?
CVE-2020-2933: no packages for Image SLES15-SP4-SAP-Azure-VLI-BYOS-Production, but entry?
CVE-2020-2933: no packages for Image SLES15-SP4-SAP-EC2, but entry?
CVE-2020-2933: no packages for Image SLES15-SP4-SAP-GCE, but entry?
CVE-2020-2933: no packages for Image SLES15-SP4-SAPCAL, but entry?
CVE-2020-2933: no packages for Image SLES15-SP4-SAPCAL-Azure, but entry?
CVE-2020-2933: no packages for Image SLES15-SP4-SAPCAL-EC2, but entry?
CVE-2020-2933: no packages for Image SLES15-SP4-SAPCAL-GCE, but entry?
CVE-2020-2933: no packages for Image SLES15-SP5-SAP-Azure, but entry?
CVE-2020-2933: no packages for Image SLES15-SP5-SAP-Azure-LI-BYOS, but entry?
CVE-2020-2933: no packages for Image SLES15-SP5-SAP-Azure-LI-BYOS-Production, but entry?
CVE-2020-2933: no packages for Image SLES15-SP5-SAP-Azure-VLI-BYOS, but entry?
CVE-2020-2933: no packages for Image SLES15-SP5-SAP-Azure-VLI-BYOS-Production, but entry?
CVE-2020-2933: no packages for Image SLES15-SP5-SAP-EC2, but entry?
CVE-2020-2933: no packages for Image SLES15-SP5-SAP-GCE, but entry?
CVE-2020-2933: no packages for Image SLES15-SP5-SAPCAL-Azure, but entry?
CVE-2020-2933: no packages for Image SLES15-SP5-SAPCAL-EC2, but entry?
CVE-2020-2933: no packages for Image SLES15-SP5-SAPCAL-GCE, but entry?
CVE-2020-2933: no packages for Image SLES15-SP6-SAP, but entry?
CVE-2020-2933: no packages for Image SLES15-SP6-SAP-Azure, but entry?
CVE-2020-2933: no packages for Image SLES15-SP6-SAP-Azure-LI-BYOS, but entry?
CVE-2020-2933: no packages for Image SLES15-SP6-SAP-Azure-LI-BYOS-Production, but entry?
CVE-2020-2933: no packages for Image SLES15-SP6-SAP-Azure-VLI-BYOS, but entry?
CVE-2020-2933: no packages for Image SLES15-SP6-SAP-Azure-VLI-BYOS-Production, but entry?
CVE-2020-2933: no packages for Image SLES15-SP6-SAP-EC2, but entry?
CVE-2020-2933: no packages for Image SLES15-SP6-SAP-GCE, but entry?
CVE-2020-2933: no packages for Image SLES15-SP6-SAPCAL, but entry?
CVE-2020-2933: no packages for Image SLES15-SP6-SAPCAL-Azure, but entry?
CVE-2020-2933: no packages for Image SLES15-SP6-SAPCAL-EC2, but entry?
CVE-2020-2933: no packages for Image SLES15-SP6-SAPCAL-GCE, but entry?
CVE-2020-2933: no packages for SUSE CaaS Platform 4.0, but entry?
CVE-2020-2933: no packages for SUSE Enterprise Storage 7, but entry?
CVE-2020-2933: no packages for SUSE Enterprise Storage 7.1, but entry?
CVE-2020-2933: no packages for SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS, but entry?
CVE-2020-2933: no packages for SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS, but entry?
CVE-2020-2933: no packages for SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS, but entry?
CVE-2020-2933: no packages for SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS, but entry?
CVE-2020-2933: no packages for SUSE Linux Enterprise Module for Basesystem 15 SP4, but entry?
CVE-2020-2933: no packages for SUSE Linux Enterprise Module for Basesystem 15 SP5, but entry?
CVE-2020-2933: no packages for SUSE Linux Enterprise Module for Basesystem 15 SP6, but entry?
CVE-2020-2933: no packages for SUSE Linux Enterprise Module for Development Tools 15 SP4, but entry?
CVE-2020-2933: no packages for SUSE Linux Enterprise Module for Development Tools 15 SP5, but entry?
CVE-2020-2933: no packages for SUSE Linux Enterprise Module for Development Tools 15 SP6, but entry?
CVE-2020-2933: no packages for SUSE Linux Enterprise Module for Package Hub 15 SP4, but entry?
CVE-2020-2933: no packages for SUSE Linux Enterprise Module for Package Hub 15 SP5, but entry?
CVE-2020-2933: no packages for SUSE Linux Enterprise Module for Package Hub 15 SP6, but entry?
CVE-2020-2933: no packages for SUSE Linux Enterprise Module for Web and Scripting 15 SP4, but entry?
CVE-2020-2933: no packages for SUSE Linux Enterprise Module for Web and Scripting 15 SP5, but entry?
CVE-2020-2933: no packages for SUSE Linux Enterprise Module for Web and Scripting 15 SP6, but entry?
CVE-2020-2933: no packages for SUSE Linux Enterprise Real Time 15 SP3, but entry?
CVE-2020-2933: no packages for SUSE Linux Enterprise Server 15 SP1-LTSS, but entry?
CVE-2020-2933: no packages for SUSE Linux Enterprise Server 15 SP2-LTSS, but entry?
CVE-2020-2933: no packages for SUSE Linux Enterprise Server 15 SP3-LTSS, but entry?
CVE-2020-2933: no packages for SUSE Linux Enterprise Server 15 SP4-TERADATA, but entry?
CVE-2020-2933: no packages for SUSE Linux Enterprise Server for SAP Applications 15 SP1, but entry?
CVE-2020-2933: no packages for SUSE Linux Enterprise Server for SAP Applications 15 SP2, but entry?
CVE-2020-2933: no packages for SUSE Linux Enterprise Server for SAP Applications 15 SP3, but entry?
CVE-2020-2933: no packages for SUSE Linux Enterprise Workstation Extension 15 SP4, but entry?
CVE-2020-2933: no packages for SUSE Linux Enterprise Workstation Extension 15 SP5, but entry?
CVE-2020-2933: no packages for SUSE Linux Enterprise Workstation Extension 15 SP6, but entry?
CVE-2020-2933: no packages for SUSE Manager Proxy 4.2, but entry?
CVE-2020-2933: no packages for SUSE Manager Retail Branch Server 4.2, but entry?
CVE-2020-2933: no packages for SUSE Manager Server 4.2, but entry?
CVE-2020-2933: no packages for SUSE Manager Server Module 4.2, but entry?
CVE-2020-2933: no packages for SUSE Manager Server Module 4.3, but entry?
CVE-2020-2875: no packages for Container bci/kiwi:9.24.43-8.6, but entry?
CVE-2020-2875: no packages for Image SLES15-SP2-SAP-GCE, but entry?
CVE-2020-2875: no packages for SUSE Enterprise Storage 7, but entry?
CVE-2020-2875: no packages for SUSE Linux Enterprise Workstation Extension 15 SP6, but entry?
CVE-2020-2875: no packages for Image SLES15-SP6-SAP-Azure-VLI-BYOS-Production, but entry?
CVE-2020-2875: no packages for SUSE Manager Server Module 4.3, but entry?
CVE-2020-2875: no packages for SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS, but entry?
CVE-2020-2875: no packages for Image SLES15-SP4-SAP-GCE, but entry?
CVE-2020-2875: no packages for SUSE Linux Enterprise Server 15 SP4-TERADATA, but entry?
CVE-2020-2875: no packages for Image SLES15-SP6-SAP-Azure-LI-BYOS, but entry?
CVE-2020-2875: no packages for Image SLES15-SP4-SAP-Azure-VLI-BYOS, but entry?
CVE-2020-2875: no packages for Image SLES15-SP6-SAPCAL-GCE, but entry?
CVE-2020-2875: no packages for Container bci/openjdk-devel:11-6.2, but entry?
CVE-2020-2875: no packages for Image SLES15-SP4-Manager-Server-4-3-BYOS-Azure, but entry?
CVE-2020-2875: no packages for Image SLES15-SP6-SAP-GCE, but entry?
CVE-2020-2875: no packages for Image SLES15-SP5-SAP-Azure-LI-BYOS, but entry?
CVE-2020-2875: no packages for SUSE Manager Server Module 4.2, but entry?
CVE-2020-2875: no packages for Image SLES15-SP4-SAP-Azure-VLI-BYOS-Production, but entry?
CVE-2020-2875: no packages for SUSE Linux Enterprise Server for SAP Applications 15 SP2, but entry?
CVE-2020-2875: no packages for Image SLES15-SP5-SAPCAL-Azure, but entry?
CVE-2020-2875: no packages for Container bci/openjdk-devel:17-7.2, but entry?
CVE-2020-2875: no packages for SUSE Linux Enterprise Workstation Extension 15 SP5, but entry?
CVE-2020-2875: no packages for Image SLES15-SP5-SAP-GCE, but entry?
CVE-2020-2875: no packages for Container suse/manager/5.0/x86_64/server-attestation:5.0.0-beta2.2.16, but entry?
CVE-2020-2875: no packages for Image SLES15-SP2-SAP-BYOS-EC2-HVM, but entry?
CVE-2020-2875: no packages for Image SLES15-SP2-SAP-Azure-VLI-BYOS-Production, but entry?
CVE-2020-2875: no packages for SUSE CaaS Platform 4.0, but entry?
CVE-2020-2875: no packages for Container bci/openjdk:17-7.1, but entry?
CVE-2020-2875: no packages for SUSE Linux Enterprise Server 15 SP3-LTSS, but entry?
CVE-2020-2875: no packages for SUSE Linux Enterprise Module for Basesystem 15 SP4, but entry?
CVE-2020-2875: no packages for SUSE Linux Enterprise Module for Package Hub 15 SP6, but entry?
CVE-2020-2875: no packages for Image SLES15-SP3-SAP-Azure-VLI-BYOS-Production, but entry?
CVE-2020-2875: no packages for Image SLES15-SP4-Manager-Server-4-3-EC2-ltd, but entry?
CVE-2020-2875: no packages for Image SLES15-SP5-SAP-EC2, but entry?
CVE-2020-2875: no packages for Image SLES15-SP2-SAP-BYOS-Azure, but entry?
CVE-2020-2875: no packages for SUSE Linux Enterprise Module for Development Tools 15 SP5, but entry?
CVE-2020-2875: no packages for Image SLES15-SP4-SAPCAL, but entry?
CVE-2020-2875: no packages for Image SLES15-SP6-SAPCAL-EC2, but entry?
CVE-2020-2875: no packages for SUSE Linux Enterprise Module for Development Tools 15 SP4, but entry?
CVE-2020-2875: no packages for Container bci/openjdk:latest, but entry?
CVE-2020-2875: no packages for SUSE Linux Enterprise Module for Web and Scripting 15 SP6, but entry?
CVE-2020-2875: no packages for SUSE Manager Retail Branch Server 4.2, but entry?
CVE-2020-2875: no packages for Image SLES15-SP4-SAP, but entry?
CVE-2020-2875: no packages for Image SLES15-SP4-Manager-Server-4-3-EC2-llc, but entry?
CVE-2020-2875: no packages for Image SLES15-SP6-SAP-Azure-LI-BYOS-Production, but entry?
CVE-2020-2875: no packages for SUSE Linux Enterprise Server 15 SP2-LTSS, but entry?
CVE-2020-2875: no packages for SUSE Linux Enterprise Module for Package Hub 15 SP4, but entry?
CVE-2020-2875: no packages for Image SLES15-SP3-SAPCAL-GCE, but entry?
CVE-2020-2875: no packages for Image SLES15-SP6-SAP, but entry?
CVE-2020-2875: no packages for Image SLES15-SP4-SAPCAL-GCE, but entry?
CVE-2020-2875: no packages for Container suse/manager/5.0/x86_64/server:5.0.0-beta1.2.122, but entry?
CVE-2020-2875: no packages for SUSE Linux Enterprise Module for Development Tools 15 SP6, but entry?
CVE-2020-2875: no packages for Image SLES15-SP3-SAPCAL-EC2-HVM, but entry?
CVE-2020-2875: no packages for SUSE Manager Server 4.2, but entry?
CVE-2020-2875: no packages for SUSE Enterprise Storage 7.1, but entry?
CVE-2020-2875: no packages for Image SLES15-SP4-SAP-Azure-LI-BYOS, but entry?
CVE-2020-2875: no packages for Image SLES15-SP5-SAPCAL-EC2, but entry?
CVE-2020-2875: no packages for Image SLES15-SP4-SAPCAL-Azure, but entry?
CVE-2020-2875: no packages for Image SLES15-SP4-SAPCAL-EC2, but entry?
CVE-2020-2875: no packages for SUSE Linux Enterprise Module for Web and Scripting 15 SP4, but entry?
CVE-2020-2875: no packages for Container bci/openjdk-devel:17-14.11, but entry?
CVE-2020-2875: no packages for SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS, but entry?
CVE-2020-2875: no packages for Container bci/openjdk:11-7.1, but entry?
CVE-2020-2875: no packages for Image SLES15-SP4-SAP-EC2, but entry?
CVE-2020-2875: no packages for SUSE Linux Enterprise Server for SAP Applications 15 SP1, but entry?
CVE-2020-2875: no packages for Image SLES15-SP3-Manager-4-2-Server-BYOS-Azure, but entry?
CVE-2020-2875: no packages for Image SLES15-SP3-SAP-Azure-LI-BYOS-Production, but entry?
CVE-2020-2875: no packages for SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS, but entry?
CVE-2020-2875: no packages for SUSE Linux Enterprise Server for SAP Applications 15 SP3, but entry?
CVE-2020-2875: no packages for Image SLES15-SP2-SAP-EC2-HVM, but entry?
CVE-2020-2875: no packages for Image SLES15-SP6-SAP-EC2, but entry?
CVE-2020-2875: no packages for Image SLES15-SP4-Manager-Server-4-3-BYOS-GCE, but entry?
CVE-2020-2875: no packages for Image SLES15-SP3-Manager-4-2-Server-BYOS-EC2-HVM, but entry?
CVE-2020-2875: no packages for Image SLES15-SP4-Manager-Server-4-3-BYOS-EC2, but entry?
CVE-2020-2875: no packages for Image SLES15-SP5-SAPCAL-GCE, but entry?
CVE-2020-2875: no packages for Image SLES15-SP6-SAP-Azure, but entry?
CVE-2020-2875: no packages for SUSE Linux Enterprise Server 15 SP1-LTSS, but entry?
CVE-2020-2875: no packages for Image SLES15-SP5-SAP-Azure, but entry?
CVE-2020-2875: no packages for Image SLES15-SP6-SAP-Azure-VLI-BYOS, but entry?
CVE-2020-2875: no packages for Image SLES15-SP6-SAPCAL-Azure, but entry?
CVE-2020-2875: no packages for Image SLES15-SP5-SAP-Azure-VLI-BYOS-Production, but entry?
CVE-2020-2875: no packages for Image SLES15-SP2-SAP-BYOS-GCE, but entry?
CVE-2020-2875: no packages for Image SLES15-SP4-Manager-Server-4-3-Azure-llc, but entry?
CVE-2020-2875: no packages for Image SLES15-SP3-SAPCAL-Azure, but entry?
CVE-2020-2875: no packages for Image SLES15-SP5-SAP-Azure-VLI-BYOS, but entry?
CVE-2020-2875: no packages for Image SLES15-SP6-SAPCAL, but entry?
CVE-2020-2875: no packages for SUSE Linux Enterprise Module for Basesystem 15 SP6, but entry?
CVE-2020-2875: no packages for Image SLES15-SP5-SAP-Azure-LI-BYOS-Production, but entry?
CVE-2020-2875: no packages for SUSE Linux Enterprise Module for Web and Scripting 15 SP5, but entry?
CVE-2020-2875: no packages for SUSE Linux Enterprise Real Time 15 SP3, but entry?
CVE-2020-2875: no packages for Image SLES15-SP4-Manager-Server-4-3-Azure-ltd, but entry?
CVE-2020-2875: no packages for Image SLES15-SP3-Manager-4-2-Server-BYOS-GCE, but entry?
CVE-2020-2875: no packages for Image SLES15-SP4-Manager-Server-4-3, but entry?
CVE-2020-2875: no packages for SUSE Manager Proxy 4.2, but entry?
CVE-2020-2875: no packages for SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS, but entry?
CVE-2020-2875: no packages for Image SLES15-SP4-SAP-Azure, but entry?
CVE-2020-2875: no packages for SUSE Linux Enterprise Module for Package Hub 15 SP5, but entry?
CVE-2020-2875: no packages for SUSE Linux Enterprise Workstation Extension 15 SP4, but entry?
CVE-2020-2875: no packages for SUSE Linux Enterprise Module for Basesystem 15 SP5, but entry?
CVE-2020-2875: no packages for Image SLES15-SP2-SAP-Azure, but entry?
CVE-2020-2875: no packages for Image SLES15-SP4-Manager-Server-4-3-BYOS, but entry?
CVE-2020-2875: no packages for Image SLES15-SP2-SAP-Azure-LI-BYOS-Production, but entry?
CVE-2020-2875: no packages for Image SLES15-SP4-SAP-Azure-LI-BYOS-Production, but entry?
CVE-2020-2875: no packages for Container bci/kiwi:9.24.43-8.6, but entry?
CVE-2020-2875: no packages for Container bci/openjdk-devel:11-6.2, but entry?
CVE-2020-2875: no packages for Container bci/openjdk-devel:17-14.11, but entry?
CVE-2020-2875: no packages for Container bci/openjdk-devel:17-7.2, but entry?
CVE-2020-2875: no packages for Container bci/openjdk:11-7.1, but entry?
CVE-2020-2875: no packages for Container bci/openjdk:17-7.1, but entry?
CVE-2020-2875: no packages for Container bci/openjdk:latest, but entry?
CVE-2020-2875: no packages for Container suse/manager/5.0/x86_64/server-attestation:5.0.0-beta2.2.16, but entry?
CVE-2020-2875: no packages for Container suse/manager/5.0/x86_64/server:5.0.0-beta1.2.122, but entry?
CVE-2020-2875: no packages for Image SLES15-SP2-SAP-Azure, but entry?
CVE-2020-2875: no packages for Image SLES15-SP2-SAP-Azure-LI-BYOS-Production, but entry?
CVE-2020-2875: no packages for Image SLES15-SP2-SAP-Azure-VLI-BYOS-Production, but entry?
CVE-2020-2875: no packages for Image SLES15-SP2-SAP-BYOS-Azure, but entry?
CVE-2020-2875: no packages for Image SLES15-SP2-SAP-BYOS-EC2-HVM, but entry?
CVE-2020-2875: no packages for Image SLES15-SP2-SAP-BYOS-GCE, but entry?
CVE-2020-2875: no packages for Image SLES15-SP2-SAP-EC2-HVM, but entry?
CVE-2020-2875: no packages for Image SLES15-SP2-SAP-GCE, but entry?
CVE-2020-2875: no packages for Image SLES15-SP3-Manager-4-2-Server-BYOS-Azure, but entry?
CVE-2020-2875: no packages for Image SLES15-SP3-Manager-4-2-Server-BYOS-EC2-HVM, but entry?
CVE-2020-2875: no packages for Image SLES15-SP3-Manager-4-2-Server-BYOS-GCE, but entry?
CVE-2020-2875: no packages for Image SLES15-SP3-SAP-Azure-LI-BYOS-Production, but entry?
CVE-2020-2875: no packages for Image SLES15-SP3-SAP-Azure-VLI-BYOS-Production, but entry?
CVE-2020-2875: no packages for Image SLES15-SP3-SAPCAL-Azure, but entry?
CVE-2020-2875: no packages for Image SLES15-SP3-SAPCAL-EC2-HVM, but entry?
CVE-2020-2875: no packages for Image SLES15-SP3-SAPCAL-GCE, but entry?
CVE-2020-2875: no packages for Image SLES15-SP4-Manager-Server-4-3, but entry?
CVE-2020-2875: no packages for Image SLES15-SP4-Manager-Server-4-3-Azure-llc, but entry?
CVE-2020-2875: no packages for Image SLES15-SP4-Manager-Server-4-3-Azure-ltd, but entry?
CVE-2020-2875: no packages for Image SLES15-SP4-Manager-Server-4-3-BYOS, but entry?
CVE-2020-2875: no packages for Image SLES15-SP4-Manager-Server-4-3-BYOS-Azure, but entry?
CVE-2020-2875: no packages for Image SLES15-SP4-Manager-Server-4-3-BYOS-EC2, but entry?
CVE-2020-2875: no packages for Image SLES15-SP4-Manager-Server-4-3-BYOS-GCE, but entry?
CVE-2020-2875: no packages for Image SLES15-SP4-Manager-Server-4-3-EC2-llc, but entry?
CVE-2020-2875: no packages for Image SLES15-SP4-Manager-Server-4-3-EC2-ltd, but entry?
CVE-2020-2875: no packages for Image SLES15-SP4-SAP, but entry?
CVE-2020-2875: no packages for Image SLES15-SP4-SAP-Azure, but entry?
CVE-2020-2875: no packages for Image SLES15-SP4-SAP-Azure-LI-BYOS, but entry?
CVE-2020-2875: no packages for Image SLES15-SP4-SAP-Azure-LI-BYOS-Production, but entry?
CVE-2020-2875: no packages for Image SLES15-SP4-SAP-Azure-VLI-BYOS, but entry?
CVE-2020-2875: no packages for Image SLES15-SP4-SAP-Azure-VLI-BYOS-Production, but entry?
CVE-2020-2875: no packages for Image SLES15-SP4-SAP-EC2, but entry?
CVE-2020-2875: no packages for Image SLES15-SP4-SAP-GCE, but entry?
CVE-2020-2875: no packages for Image SLES15-SP4-SAPCAL, but entry?
CVE-2020-2875: no packages for Image SLES15-SP4-SAPCAL-Azure, but entry?
CVE-2020-2875: no packages for Image SLES15-SP4-SAPCAL-EC2, but entry?
CVE-2020-2875: no packages for Image SLES15-SP4-SAPCAL-GCE, but entry?
CVE-2020-2875: no packages for Image SLES15-SP5-SAP-Azure, but entry?
CVE-2020-2875: no packages for Image SLES15-SP5-SAP-Azure-LI-BYOS, but entry?
CVE-2020-2875: no packages for Image SLES15-SP5-SAP-Azure-LI-BYOS-Production, but entry?
CVE-2020-2875: no packages for Image SLES15-SP5-SAP-Azure-VLI-BYOS, but entry?
CVE-2020-2875: no packages for Image SLES15-SP5-SAP-Azure-VLI-BYOS-Production, but entry?
CVE-2020-2875: no packages for Image SLES15-SP5-SAP-EC2, but entry?
CVE-2020-2875: no packages for Image SLES15-SP5-SAP-GCE, but entry?
CVE-2020-2875: no packages for Image SLES15-SP5-SAPCAL-Azure, but entry?
CVE-2020-2875: no packages for Image SLES15-SP5-SAPCAL-EC2, but entry?
CVE-2020-2875: no packages for Image SLES15-SP5-SAPCAL-GCE, but entry?
CVE-2020-2875: no packages for Image SLES15-SP6-SAP, but entry?
CVE-2020-2875: no packages for Image SLES15-SP6-SAP-Azure, but entry?
CVE-2020-2875: no packages for Image SLES15-SP6-SAP-Azure-LI-BYOS, but entry?
CVE-2020-2875: no packages for Image SLES15-SP6-SAP-Azure-LI-BYOS-Production, but entry?
CVE-2020-2875: no packages for Image SLES15-SP6-SAP-Azure-VLI-BYOS, but entry?
CVE-2020-2875: no packages for Image SLES15-SP6-SAP-Azure-VLI-BYOS-Production, but entry?
CVE-2020-2875: no packages for Image SLES15-SP6-SAP-EC2, but entry?
CVE-2020-2875: no packages for Image SLES15-SP6-SAP-GCE, but entry?
CVE-2020-2875: no packages for Image SLES15-SP6-SAPCAL, but entry?
CVE-2020-2875: no packages for Image SLES15-SP6-SAPCAL-Azure, but entry?
CVE-2020-2875: no packages for Image SLES15-SP6-SAPCAL-EC2, but entry?
CVE-2020-2875: no packages for Image SLES15-SP6-SAPCAL-GCE, but entry?
CVE-2020-2875: no packages for SUSE CaaS Platform 4.0, but entry?
CVE-2020-2875: no packages for SUSE Enterprise Storage 7, but entry?
CVE-2020-2875: no packages for SUSE Enterprise Storage 7.1, but entry?
CVE-2020-2875: no packages for SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS, but entry?
CVE-2020-2875: no packages for SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS, but entry?
CVE-2020-2875: no packages for SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS, but entry?
CVE-2020-2875: no packages for SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS, but entry?
CVE-2020-2875: no packages for SUSE Linux Enterprise Module for Basesystem 15 SP4, but entry?
CVE-2020-2875: no packages for SUSE Linux Enterprise Module for Basesystem 15 SP5, but entry?
CVE-2020-2875: no packages for SUSE Linux Enterprise Module for Basesystem 15 SP6, but entry?
CVE-2020-2875: no packages for SUSE Linux Enterprise Module for Development Tools 15 SP4, but entry?
CVE-2020-2875: no packages for SUSE Linux Enterprise Module for Development Tools 15 SP5, but entry?
CVE-2020-2875: no packages for SUSE Linux Enterprise Module for Development Tools 15 SP6, but entry?
CVE-2020-2875: no packages for SUSE Linux Enterprise Module for Package Hub 15 SP4, but entry?
CVE-2020-2875: no packages for SUSE Linux Enterprise Module for Package Hub 15 SP5, but entry?
CVE-2020-2875: no packages for SUSE Linux Enterprise Module for Package Hub 15 SP6, but entry?
CVE-2020-2875: no packages for SUSE Linux Enterprise Module for Web and Scripting 15 SP4, but entry?
CVE-2020-2875: no packages for SUSE Linux Enterprise Module for Web and Scripting 15 SP5, but entry?
CVE-2020-2875: no packages for SUSE Linux Enterprise Module for Web and Scripting 15 SP6, but entry?
CVE-2020-2875: no packages for SUSE Linux Enterprise Real Time 15 SP3, but entry?
CVE-2020-2875: no packages for SUSE Linux Enterprise Server 15 SP1-LTSS, but entry?
CVE-2020-2875: no packages for SUSE Linux Enterprise Server 15 SP2-LTSS, but entry?
CVE-2020-2875: no packages for SUSE Linux Enterprise Server 15 SP3-LTSS, but entry?
CVE-2020-2875: no packages for SUSE Linux Enterprise Server 15 SP4-TERADATA, but entry?
CVE-2020-2875: no packages for SUSE Linux Enterprise Server for SAP Applications 15 SP1, but entry?
CVE-2020-2875: no packages for SUSE Linux Enterprise Server for SAP Applications 15 SP2, but entry?
CVE-2020-2875: no packages for SUSE Linux Enterprise Server for SAP Applications 15 SP3, but entry?
CVE-2020-2875: no packages for SUSE Linux Enterprise Workstation Extension 15 SP4, but entry?
CVE-2020-2875: no packages for SUSE Linux Enterprise Workstation Extension 15 SP5, but entry?
CVE-2020-2875: no packages for SUSE Linux Enterprise Workstation Extension 15 SP6, but entry?
CVE-2020-2875: no packages for SUSE Manager Proxy 4.2, but entry?
CVE-2020-2875: no packages for SUSE Manager Retail Branch Server 4.2, but entry?
CVE-2020-2875: no packages for SUSE Manager Server 4.2, but entry?
CVE-2020-2875: no packages for SUSE Manager Server Module 4.2, but entry?
CVE-2020-2875: no packages for SUSE Manager Server Module 4.3, but entry?
CVE-2020-2875: no packages for Container bci/kiwi:9.24.43-8.6, but entry?
CVE-2020-2875: no packages for Container bci/openjdk-devel:11-6.2, but entry?
CVE-2020-2875: no packages for Container bci/openjdk-devel:17-14.11, but entry?
CVE-2020-2875: no packages for Container bci/openjdk-devel:17-7.2, but entry?
CVE-2020-2875: no packages for Container bci/openjdk:11-7.1, but entry?
CVE-2020-2875: no packages for Container bci/openjdk:17-7.1, but entry?
CVE-2020-2875: no packages for Container bci/openjdk:latest, but entry?
CVE-2020-2875: no packages for Container suse/manager/5.0/x86_64/server-attestation:5.0.0-beta2.2.16, but entry?
CVE-2020-2875: no packages for Container suse/manager/5.0/x86_64/server:5.0.0-beta1.2.122, but entry?
CVE-2020-2875: no packages for Image SLES15-SP2-SAP-Azure, but entry?
CVE-2020-2875: no packages for Image SLES15-SP2-SAP-Azure-LI-BYOS-Production, but entry?
CVE-2020-2875: no packages for Image SLES15-SP2-SAP-Azure-VLI-BYOS-Production, but entry?
CVE-2020-2875: no packages for Image SLES15-SP2-SAP-BYOS-Azure, but entry?
CVE-2020-2875: no packages for Image SLES15-SP2-SAP-BYOS-EC2-HVM, but entry?
CVE-2020-2875: no packages for Image SLES15-SP2-SAP-BYOS-GCE, but entry?
CVE-2020-2875: no packages for Image SLES15-SP2-SAP-EC2-HVM, but entry?
CVE-2020-2875: no packages for Image SLES15-SP2-SAP-GCE, but entry?
CVE-2020-2875: no packages for Image SLES15-SP3-Manager-4-2-Server-BYOS-Azure, but entry?
CVE-2020-2875: no packages for Image SLES15-SP3-Manager-4-2-Server-BYOS-EC2-HVM, but entry?
CVE-2020-2875: no packages for Image SLES15-SP3-Manager-4-2-Server-BYOS-GCE, but entry?
CVE-2020-2875: no packages for Image SLES15-SP3-SAP-Azure-LI-BYOS-Production, but entry?
CVE-2020-2875: no packages for Image SLES15-SP3-SAP-Azure-VLI-BYOS-Production, but entry?
CVE-2020-2875: no packages for Image SLES15-SP3-SAPCAL-Azure, but entry?
CVE-2020-2875: no packages for Image SLES15-SP3-SAPCAL-EC2-HVM, but entry?
CVE-2020-2875: no packages for Image SLES15-SP3-SAPCAL-GCE, but entry?
CVE-2020-2875: no packages for Image SLES15-SP4-Manager-Server-4-3, but entry?
CVE-2020-2875: no packages for Image SLES15-SP4-Manager-Server-4-3-Azure-llc, but entry?
CVE-2020-2875: no packages for Image SLES15-SP4-Manager-Server-4-3-Azure-ltd, but entry?
CVE-2020-2875: no packages for Image SLES15-SP4-Manager-Server-4-3-BYOS, but entry?
CVE-2020-2875: no packages for Image SLES15-SP4-Manager-Server-4-3-BYOS-Azure, but entry?
CVE-2020-2875: no packages for Image SLES15-SP4-Manager-Server-4-3-BYOS-EC2, but entry?
CVE-2020-2875: no packages for Image SLES15-SP4-Manager-Server-4-3-BYOS-GCE, but entry?
CVE-2020-2875: no packages for Image SLES15-SP4-Manager-Server-4-3-EC2-llc, but entry?
CVE-2020-2875: no packages for Image SLES15-SP4-Manager-Server-4-3-EC2-ltd, but entry?
CVE-2020-2875: no packages for Image SLES15-SP4-SAP, but entry?
CVE-2020-2875: no packages for Image SLES15-SP4-SAP-Azure, but entry?
CVE-2020-2875: no packages for Image SLES15-SP4-SAP-Azure-LI-BYOS, but entry?
CVE-2020-2875: no packages for Image SLES15-SP4-SAP-Azure-LI-BYOS-Production, but entry?
CVE-2020-2875: no packages for Image SLES15-SP4-SAP-Azure-VLI-BYOS, but entry?
CVE-2020-2875: no packages for Image SLES15-SP4-SAP-Azure-VLI-BYOS-Production, but entry?
CVE-2020-2875: no packages for Image SLES15-SP4-SAP-EC2, but entry?
CVE-2020-2875: no packages for Image SLES15-SP4-SAP-GCE, but entry?
CVE-2020-2875: no packages for Image SLES15-SP4-SAPCAL, but entry?
CVE-2020-2875: no packages for Image SLES15-SP4-SAPCAL-Azure, but entry?
CVE-2020-2875: no packages for Image SLES15-SP4-SAPCAL-EC2, but entry?
CVE-2020-2875: no packages for Image SLES15-SP4-SAPCAL-GCE, but entry?
CVE-2020-2875: no packages for Image SLES15-SP5-SAP-Azure, but entry?
CVE-2020-2875: no packages for Image SLES15-SP5-SAP-Azure-LI-BYOS, but entry?
CVE-2020-2875: no packages for Image SLES15-SP5-SAP-Azure-LI-BYOS-Production, but entry?
CVE-2020-2875: no packages for Image SLES15-SP5-SAP-Azure-VLI-BYOS, but entry?
CVE-2020-2875: no packages for Image SLES15-SP5-SAP-Azure-VLI-BYOS-Production, but entry?
CVE-2020-2875: no packages for Image SLES15-SP5-SAP-EC2, but entry?
CVE-2020-2875: no packages for Image SLES15-SP5-SAP-GCE, but entry?
CVE-2020-2875: no packages for Image SLES15-SP5-SAPCAL-Azure, but entry?
CVE-2020-2875: no packages for Image SLES15-SP5-SAPCAL-EC2, but entry?
CVE-2020-2875: no packages for Image SLES15-SP5-SAPCAL-GCE, but entry?
CVE-2020-2875: no packages for Image SLES15-SP6-SAP, but entry?
CVE-2020-2875: no packages for Image SLES15-SP6-SAP-Azure, but entry?
CVE-2020-2875: no packages for Image SLES15-SP6-SAP-Azure-LI-BYOS, but entry?
CVE-2020-2875: no packages for Image SLES15-SP6-SAP-Azure-LI-BYOS-Production, but entry?
CVE-2020-2875: no packages for Image SLES15-SP6-SAP-Azure-VLI-BYOS, but entry?
CVE-2020-2875: no packages for Image SLES15-SP6-SAP-Azure-VLI-BYOS-Production, but entry?
CVE-2020-2875: no packages for Image SLES15-SP6-SAP-EC2, but entry?
CVE-2020-2875: no packages for Image SLES15-SP6-SAP-GCE, but entry?
CVE-2020-2875: no packages for Image SLES15-SP6-SAPCAL, but entry?
CVE-2020-2875: no packages for Image SLES15-SP6-SAPCAL-Azure, but entry?
CVE-2020-2875: no packages for Image SLES15-SP6-SAPCAL-EC2, but entry?
CVE-2020-2875: no packages for Image SLES15-SP6-SAPCAL-GCE, but entry?
CVE-2020-2875: no packages for SUSE CaaS Platform 4.0, but entry?
CVE-2020-2875: no packages for SUSE Enterprise Storage 7, but entry?
CVE-2020-2875: no packages for SUSE Enterprise Storage 7.1, but entry?
CVE-2020-2875: no packages for SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS, but entry?
CVE-2020-2875: no packages for SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS, but entry?
CVE-2020-2875: no packages for SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS, but entry?
CVE-2020-2875: no packages for SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS, but entry?
CVE-2020-2875: no packages for SUSE Linux Enterprise Module for Basesystem 15 SP4, but entry?
CVE-2020-2875: no packages for SUSE Linux Enterprise Module for Basesystem 15 SP5, but entry?
CVE-2020-2875: no packages for SUSE Linux Enterprise Module for Basesystem 15 SP6, but entry?
CVE-2020-2875: no packages for SUSE Linux Enterprise Module for Development Tools 15 SP4, but entry?
CVE-2020-2875: no packages for SUSE Linux Enterprise Module for Development Tools 15 SP5, but entry?
CVE-2020-2875: no packages for SUSE Linux Enterprise Module for Development Tools 15 SP6, but entry?
CVE-2020-2875: no packages for SUSE Linux Enterprise Module for Package Hub 15 SP4, but entry?
CVE-2020-2875: no packages for SUSE Linux Enterprise Module for Package Hub 15 SP5, but entry?
CVE-2020-2875: no packages for SUSE Linux Enterprise Module for Package Hub 15 SP6, but entry?
CVE-2020-2875: no packages for SUSE Linux Enterprise Module for Web and Scripting 15 SP4, but entry?
CVE-2020-2875: no packages for SUSE Linux Enterprise Module for Web and Scripting 15 SP5, but entry?
CVE-2020-2875: no packages for SUSE Linux Enterprise Module for Web and Scripting 15 SP6, but entry?
CVE-2020-2875: no packages for SUSE Linux Enterprise Real Time 15 SP3, but entry?
CVE-2020-2875: no packages for SUSE Linux Enterprise Server 15 SP1-LTSS, but entry?
CVE-2020-2875: no packages for SUSE Linux Enterprise Server 15 SP2-LTSS, but entry?
CVE-2020-2875: no packages for SUSE Linux Enterprise Server 15 SP3-LTSS, but entry?
CVE-2020-2875: no packages for SUSE Linux Enterprise Server 15 SP4-TERADATA, but entry?
CVE-2020-2875: no packages for SUSE Linux Enterprise Server for SAP Applications 15 SP1, but entry?
CVE-2020-2875: no packages for SUSE Linux Enterprise Server for SAP Applications 15 SP2, but entry?
CVE-2020-2875: no packages for SUSE Linux Enterprise Server for SAP Applications 15 SP3, but entry?
CVE-2020-2875: no packages for SUSE Linux Enterprise Workstation Extension 15 SP4, but entry?
CVE-2020-2875: no packages for SUSE Linux Enterprise Workstation Extension 15 SP5, but entry?
CVE-2020-2875: no packages for SUSE Linux Enterprise Workstation Extension 15 SP6, but entry?
CVE-2020-2875: no packages for SUSE Manager Proxy 4.2, but entry?
CVE-2020-2875: no packages for SUSE Manager Retail Branch Server 4.2, but entry?
CVE-2020-2875: no packages for SUSE Manager Server 4.2, but entry?
CVE-2020-2875: no packages for SUSE Manager Server Module 4.2, but entry?
CVE-2020-2875: no packages for SUSE Manager Server Module 4.3, but entry?
no cpe found for SUSE Liberty Linux 7 LTSS in CVE-2020-2830
no cpe found for SUSE Liberty Linux 7 LTSS in CVE-2020-2812
no cpe found for SUSE Liberty Linux 7 LTSS in CVE-2020-2805
no cpe found for SUSE Liberty Linux 7 LTSS in CVE-2020-2803
no cpe found for SUSE Liberty Linux 7 LTSS in CVE-2020-2800
no cpe found for SUSE Liberty Linux 7 LTSS in CVE-2020-2781
no cpe found for SUSE Liberty Linux 7 LTSS in CVE-2020-2780
no cpe found for SUSE Liberty Linux 7 LTSS in CVE-2020-2773
no cpe found for SUSE Liberty Linux 7 LTSS in CVE-2020-2757
no cpe found for SUSE Liberty Linux 7 LTSS in CVE-2020-2756
no cpe found for SUSE Liberty Linux 7 LTSS in CVE-2020-2752
skipping CVE-2020-2732 as CVE page is older than CVRF-CVE file.
skipping CVE-2020-2659 as CVE page is older than CVRF-CVE file.
skipping CVE-2020-2655 as CVE page is older than CVRF-CVE file.
skipping CVE-2020-2604 as CVE page is older than CVRF-CVE file.
skipping CVE-2020-2601 as CVE page is older than CVRF-CVE file.
skipping CVE-2020-2593 as CVE page is older than CVRF-CVE file.
skipping CVE-2020-2590 as CVE page is older than CVRF-CVE file.
skipping CVE-2020-2585 as CVE page is older than CVRF-CVE file.
skipping CVE-2020-2583 as CVE page is older than CVRF-CVE file.
skipping CVE-2020-2574 as CVE page is older than CVRF-CVE file.
skipping CVE-2020-2521 as CVE page is older than CVRF-CVE file.
skipping CVE-2020-1971 as CVE page is older than CVRF-CVE file.
skipping CVE-2020-1968 as CVE page is older than CVRF-CVE file.
skipping CVE-2020-1967 as CVE page is older than CVRF-CVE file.
CVE-2020-1945: no packages for Image SLES15-SP2-SAP-BYOS-Azure, but entry?
CVE-2020-1945: no packages for Image SLES15-SP5-SAP-EC2, but entry?
CVE-2020-1945: no packages for Container bci/openjdk:latest, but entry?
CVE-2020-1945: no packages for SUSE Linux Enterprise Module for Web and Scripting 15 SP6, but entry?
CVE-2020-1945: no packages for Image SLES15-SP4-SAPCAL, but entry?
CVE-2020-1945: no packages for Image SLES15-SP6-SAPCAL-EC2, but entry?
CVE-2020-1945: no packages for SUSE Linux Enterprise Module for Basesystem 15 SP4, but entry?
CVE-2020-1945: no packages for Container bci/openjdk:17-7.1, but entry?
CVE-2020-1945: no packages for Image SLES15-SP3-SAP-Azure-VLI-BYOS-Production, but entry?
CVE-2020-1945: no packages for Image SLES15-SP4-SAPCAL-GCE, but entry?
CVE-2020-1945: no packages for Image SLES15-SP6-SAP, but entry?
CVE-2020-1945: no packages for Image SLES15-SP3-SAPCAL-GCE, but entry?
CVE-2020-1945: no packages for SUSE Manager Server 4.2, but entry?
CVE-2020-1945: no packages for Image SLES15-SP3-SAPCAL-EC2-HVM, but entry?
CVE-2020-1945: no packages for Image SLES15-SP4-SAP-Azure-LI-BYOS, but entry?
CVE-2020-1945: no packages for SUSE Manager Retail Branch Server 4.2, but entry?
CVE-2020-1945: no packages for Image SLES15-SP4-SAP, but entry?
CVE-2020-1945: no packages for Image SLES15-SP6-SAP-Azure-LI-BYOS-Production, but entry?
CVE-2020-1945: no packages for SUSE Linux Enterprise Module for Package Hub 15 SP4, but entry?
CVE-2020-1945: no packages for Image SLES15-SP6-SAP-Azure-VLI-BYOS-Production, but entry?
CVE-2020-1945: no packages for SUSE Linux Enterprise Workstation Extension 15 SP6, but entry?
CVE-2020-1945: no packages for SUSE Linux Enterprise Server 15 SP4-TERADATA, but entry?
CVE-2020-1945: no packages for Image SLES15-SP6-SAP-Azure-LI-BYOS, but entry?
CVE-2020-1945: no packages for Image SLES15-SP4-SAP-Azure-VLI-BYOS, but entry?
CVE-2020-1945: no packages for Image SLES15-SP4-SAP-GCE, but entry?
CVE-2020-1945: no packages for Container bci/kiwi:9.24.43-8.6, but entry?
CVE-2020-1945: no packages for Image SLES15-SP2-SAP-GCE, but entry?
CVE-2020-1945: no packages for Image SLES15-SP2-SAP-Azure-VLI-BYOS-Production, but entry?
CVE-2020-1945: no packages for Image SLES15-SP2-SAP-BYOS-EC2-HVM, but entry?
CVE-2020-1945: no packages for Container suse/manager/5.0/x86_64/server-attestation:5.0.0-beta2.2.16, but entry?
CVE-2020-1945: no packages for SUSE CaaS Platform 4.0, but entry?
CVE-2020-1945: no packages for Image SLES15-SP4-SAP-Azure-VLI-BYOS-Production, but entry?
CVE-2020-1945: no packages for Image SLES15-SP5-SAP-Azure-LI-BYOS, but entry?
CVE-2020-1945: no packages for Image SLES15-SP6-SAP-GCE, but entry?
CVE-2020-1945: no packages for Image SLES15-SP6-SAPCAL-GCE, but entry?
CVE-2020-1945: no packages for Container bci/openjdk-devel:11-6.2, but entry?
CVE-2020-1945: no packages for SUSE Linux Enterprise Workstation Extension 15 SP5, but entry?
CVE-2020-1945: no packages for Image SLES15-SP5-SAP-GCE, but entry?
CVE-2020-1945: no packages for Container bci/openjdk-devel:17-7.2, but entry?
CVE-2020-1945: no packages for Image SLES15-SP5-SAPCAL-Azure, but entry?
CVE-2020-1945: no packages for SUSE Linux Enterprise Module for Web and Scripting 15 SP5, but entry?
CVE-2020-1945: no packages for Image SLES15-SP2-SAP-BYOS-GCE, but entry?
CVE-2020-1945: no packages for SUSE Linux Enterprise Module for Basesystem 15 SP6, but entry?
CVE-2020-1945: no packages for Image SLES15-SP5-SAP-Azure-LI-BYOS-Production, but entry?
CVE-2020-1945: no packages for Image SLES15-SP5-SAP-Azure-VLI-BYOS, but entry?
CVE-2020-1945: no packages for Image SLES15-SP6-SAPCAL, but entry?
CVE-2020-1945: no packages for Image SLES15-SP3-SAPCAL-Azure, but entry?
CVE-2020-1945: no packages for Image SLES15-SP2-SAP-Azure, but entry?
CVE-2020-1945: no packages for SUSE Linux Enterprise Module for Basesystem 15 SP5, but entry?
CVE-2020-1945: no packages for Image SLES15-SP2-SAP-Azure-LI-BYOS-Production, but entry?
CVE-2020-1945: no packages for Image SLES15-SP4-SAP-Azure-LI-BYOS-Production, but entry?
CVE-2020-1945: no packages for SUSE Manager Proxy 4.2, but entry?
CVE-2020-1945: no packages for SUSE Linux Enterprise Workstation Extension 15 SP4, but entry?
CVE-2020-1945: no packages for Image SLES15-SP4-SAP-Azure, but entry?
CVE-2020-1945: no packages for Image SLES15-SP2-SAP-EC2-HVM, but entry?
CVE-2020-1945: no packages for Image SLES15-SP3-SAP-Azure-LI-BYOS-Production, but entry?
CVE-2020-1945: no packages for Image SLES15-SP6-SAP-EC2, but entry?
CVE-2020-1945: no packages for SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS, but entry?
CVE-2020-1945: no packages for Container bci/openjdk:11-7.1, but entry?
CVE-2020-1945: no packages for Image SLES15-SP4-SAP-EC2, but entry?
CVE-2020-1945: no packages for SUSE Linux Enterprise Server for SAP Applications 15 SP1, but entry?
CVE-2020-1945: no packages for Container bci/openjdk-devel:17-14.11, but entry?
CVE-2020-1945: no packages for Image SLES15-SP4-SAPCAL-EC2, but entry?
CVE-2020-1945: no packages for SUSE Linux Enterprise Module for Web and Scripting 15 SP4, but entry?
CVE-2020-1945: no packages for Image SLES15-SP5-SAPCAL-EC2, but entry?
CVE-2020-1945: no packages for Image SLES15-SP4-SAPCAL-Azure, but entry?
CVE-2020-1945: no packages for Image SLES15-SP6-SAPCAL-Azure, but entry?
CVE-2020-1945: no packages for Image SLES15-SP6-SAP-Azure-VLI-BYOS, but entry?
CVE-2020-1945: no packages for Image SLES15-SP5-SAP-Azure, but entry?
CVE-2020-1945: no packages for Image SLES15-SP5-SAP-Azure-VLI-BYOS-Production, but entry?
CVE-2020-1945: no packages for Image SLES15-SP5-SAPCAL-GCE, but entry?
CVE-2020-1945: no packages for Image SLES15-SP6-SAP-Azure, but entry?
CVE-2020-1945: no packages for SUSE Linux Enterprise Server 15 SP1-LTSS, but entry?
CVE-2020-1945: no packages for Container bci/kiwi:9.24.43-8.6, but entry?
CVE-2020-1945: no packages for Container bci/openjdk-devel:11-6.2, but entry?
CVE-2020-1945: no packages for Container bci/openjdk-devel:17-14.11, but entry?
CVE-2020-1945: no packages for Container bci/openjdk-devel:17-7.2, but entry?
CVE-2020-1945: no packages for Container bci/openjdk:11-7.1, but entry?
CVE-2020-1945: no packages for Container bci/openjdk:17-7.1, but entry?
CVE-2020-1945: no packages for Container bci/openjdk:latest, but entry?
CVE-2020-1945: no packages for Container suse/manager/5.0/x86_64/server-attestation:5.0.0-beta2.2.16, but entry?
CVE-2020-1945: no packages for Image SLES15-SP2-SAP-Azure, but entry?
CVE-2020-1945: no packages for Image SLES15-SP2-SAP-Azure-LI-BYOS-Production, but entry?
CVE-2020-1945: no packages for Image SLES15-SP2-SAP-Azure-VLI-BYOS-Production, but entry?
CVE-2020-1945: no packages for Image SLES15-SP2-SAP-BYOS-Azure, but entry?
CVE-2020-1945: no packages for Image SLES15-SP2-SAP-BYOS-EC2-HVM, but entry?
CVE-2020-1945: no packages for Image SLES15-SP2-SAP-BYOS-GCE, but entry?
CVE-2020-1945: no packages for Image SLES15-SP2-SAP-EC2-HVM, but entry?
CVE-2020-1945: no packages for Image SLES15-SP2-SAP-GCE, but entry?
CVE-2020-1945: no packages for Image SLES15-SP3-SAP-Azure-LI-BYOS-Production, but entry?
CVE-2020-1945: no packages for Image SLES15-SP3-SAP-Azure-VLI-BYOS-Production, but entry?
CVE-2020-1945: no packages for Image SLES15-SP3-SAPCAL-Azure, but entry?
CVE-2020-1945: no packages for Image SLES15-SP3-SAPCAL-EC2-HVM, but entry?
CVE-2020-1945: no packages for Image SLES15-SP3-SAPCAL-GCE, but entry?
CVE-2020-1945: no packages for Image SLES15-SP4-SAP, but entry?
CVE-2020-1945: no packages for Image SLES15-SP4-SAP-Azure, but entry?
CVE-2020-1945: no packages for Image SLES15-SP4-SAP-Azure-LI-BYOS, but entry?
CVE-2020-1945: no packages for Image SLES15-SP4-SAP-Azure-LI-BYOS-Production, but entry?
CVE-2020-1945: no packages for Image SLES15-SP4-SAP-Azure-VLI-BYOS, but entry?
CVE-2020-1945: no packages for Image SLES15-SP4-SAP-Azure-VLI-BYOS-Production, but entry?
CVE-2020-1945: no packages for Image SLES15-SP4-SAP-EC2, but entry?
CVE-2020-1945: no packages for Image SLES15-SP4-SAP-GCE, but entry?
CVE-2020-1945: no packages for Image SLES15-SP4-SAPCAL, but entry?
CVE-2020-1945: no packages for Image SLES15-SP4-SAPCAL-Azure, but entry?
CVE-2020-1945: no packages for Image SLES15-SP4-SAPCAL-EC2, but entry?
CVE-2020-1945: no packages for Image SLES15-SP4-SAPCAL-GCE, but entry?
CVE-2020-1945: no packages for Image SLES15-SP5-SAP-Azure, but entry?
CVE-2020-1945: no packages for Image SLES15-SP5-SAP-Azure-LI-BYOS, but entry?
CVE-2020-1945: no packages for Image SLES15-SP5-SAP-Azure-LI-BYOS-Production, but entry?
CVE-2020-1945: no packages for Image SLES15-SP5-SAP-Azure-VLI-BYOS, but entry?
CVE-2020-1945: no packages for Image SLES15-SP5-SAP-Azure-VLI-BYOS-Production, but entry?
CVE-2020-1945: no packages for Image SLES15-SP5-SAP-EC2, but entry?
CVE-2020-1945: no packages for Image SLES15-SP5-SAP-GCE, but entry?
CVE-2020-1945: no packages for Image SLES15-SP5-SAPCAL-Azure, but entry?
CVE-2020-1945: no packages for Image SLES15-SP5-SAPCAL-EC2, but entry?
CVE-2020-1945: no packages for Image SLES15-SP5-SAPCAL-GCE, but entry?
CVE-2020-1945: no packages for Image SLES15-SP6-SAP, but entry?
CVE-2020-1945: no packages for Image SLES15-SP6-SAP-Azure, but entry?
CVE-2020-1945: no packages for Image SLES15-SP6-SAP-Azure-LI-BYOS, but entry?
CVE-2020-1945: no packages for Image SLES15-SP6-SAP-Azure-LI-BYOS-Production, but entry?
CVE-2020-1945: no packages for Image SLES15-SP6-SAP-Azure-VLI-BYOS, but entry?
CVE-2020-1945: no packages for Image SLES15-SP6-SAP-Azure-VLI-BYOS-Production, but entry?
CVE-2020-1945: no packages for Image SLES15-SP6-SAP-EC2, but entry?
CVE-2020-1945: no packages for Image SLES15-SP6-SAP-GCE, but entry?
CVE-2020-1945: no packages for Image SLES15-SP6-SAPCAL, but entry?
CVE-2020-1945: no packages for Image SLES15-SP6-SAPCAL-Azure, but entry?
CVE-2020-1945: no packages for Image SLES15-SP6-SAPCAL-EC2, but entry?
CVE-2020-1945: no packages for Image SLES15-SP6-SAPCAL-GCE, but entry?
CVE-2020-1945: no packages for SUSE CaaS Platform 4.0, but entry?
CVE-2020-1945: no packages for SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS, but entry?
CVE-2020-1945: no packages for SUSE Linux Enterprise Module for Basesystem 15 SP4, but entry?
CVE-2020-1945: no packages for SUSE Linux Enterprise Module for Basesystem 15 SP5, but entry?
CVE-2020-1945: no packages for SUSE Linux Enterprise Module for Basesystem 15 SP6, but entry?
CVE-2020-1945: no packages for SUSE Linux Enterprise Module for Package Hub 15 SP4, but entry?
CVE-2020-1945: no packages for SUSE Linux Enterprise Module for Web and Scripting 15 SP4, but entry?
CVE-2020-1945: no packages for SUSE Linux Enterprise Module for Web and Scripting 15 SP5, but entry?
CVE-2020-1945: no packages for SUSE Linux Enterprise Module for Web and Scripting 15 SP6, but entry?
CVE-2020-1945: no packages for SUSE Linux Enterprise Server 15 SP1-LTSS, but entry?
CVE-2020-1945: no packages for SUSE Linux Enterprise Server 15 SP4-TERADATA, but entry?
CVE-2020-1945: no packages for SUSE Linux Enterprise Server for SAP Applications 15 SP1, but entry?
CVE-2020-1945: no packages for SUSE Linux Enterprise Workstation Extension 15 SP4, but entry?
CVE-2020-1945: no packages for SUSE Linux Enterprise Workstation Extension 15 SP5, but entry?
CVE-2020-1945: no packages for SUSE Linux Enterprise Workstation Extension 15 SP6, but entry?
CVE-2020-1945: no packages for SUSE Manager Proxy 4.2, but entry?
CVE-2020-1945: no packages for SUSE Manager Retail Branch Server 4.2, but entry?
CVE-2020-1945: no packages for SUSE Manager Server 4.2, but entry?
CVE-2020-1945: no packages for Container bci/kiwi:9.24.43-8.6, but entry?
CVE-2020-1945: no packages for Container bci/openjdk-devel:11-6.2, but entry?
CVE-2020-1945: no packages for Container bci/openjdk-devel:17-14.11, but entry?
CVE-2020-1945: no packages for Container bci/openjdk-devel:17-7.2, but entry?
CVE-2020-1945: no packages for Container bci/openjdk:11-7.1, but entry?
CVE-2020-1945: no packages for Container bci/openjdk:17-7.1, but entry?
CVE-2020-1945: no packages for Container bci/openjdk:latest, but entry?
CVE-2020-1945: no packages for Container suse/manager/5.0/x86_64/server-attestation:5.0.0-beta2.2.16, but entry?
CVE-2020-1945: no packages for Image SLES15-SP2-SAP-Azure, but entry?
CVE-2020-1945: no packages for Image SLES15-SP2-SAP-Azure-LI-BYOS-Production, but entry?
CVE-2020-1945: no packages for Image SLES15-SP2-SAP-Azure-VLI-BYOS-Production, but entry?
CVE-2020-1945: no packages for Image SLES15-SP2-SAP-BYOS-Azure, but entry?
CVE-2020-1945: no packages for Image SLES15-SP2-SAP-BYOS-EC2-HVM, but entry?
CVE-2020-1945: no packages for Image SLES15-SP2-SAP-BYOS-GCE, but entry?
CVE-2020-1945: no packages for Image SLES15-SP2-SAP-EC2-HVM, but entry?
CVE-2020-1945: no packages for Image SLES15-SP2-SAP-GCE, but entry?
CVE-2020-1945: no packages for Image SLES15-SP3-SAP-Azure-LI-BYOS-Production, but entry?
CVE-2020-1945: no packages for Image SLES15-SP3-SAP-Azure-VLI-BYOS-Production, but entry?
CVE-2020-1945: no packages for Image SLES15-SP3-SAPCAL-Azure, but entry?
CVE-2020-1945: no packages for Image SLES15-SP3-SAPCAL-EC2-HVM, but entry?
CVE-2020-1945: no packages for Image SLES15-SP3-SAPCAL-GCE, but entry?
CVE-2020-1945: no packages for Image SLES15-SP4-SAP, but entry?
CVE-2020-1945: no packages for Image SLES15-SP4-SAP-Azure, but entry?
CVE-2020-1945: no packages for Image SLES15-SP4-SAP-Azure-LI-BYOS, but entry?
CVE-2020-1945: no packages for Image SLES15-SP4-SAP-Azure-LI-BYOS-Production, but entry?
CVE-2020-1945: no packages for Image SLES15-SP4-SAP-Azure-VLI-BYOS, but entry?
CVE-2020-1945: no packages for Image SLES15-SP4-SAP-Azure-VLI-BYOS-Production, but entry?
CVE-2020-1945: no packages for Image SLES15-SP4-SAP-EC2, but entry?
CVE-2020-1945: no packages for Image SLES15-SP4-SAP-GCE, but entry?
CVE-2020-1945: no packages for Image SLES15-SP4-SAPCAL, but entry?
CVE-2020-1945: no packages for Image SLES15-SP4-SAPCAL-Azure, but entry?
CVE-2020-1945: no packages for Image SLES15-SP4-SAPCAL-EC2, but entry?
CVE-2020-1945: no packages for Image SLES15-SP4-SAPCAL-GCE, but entry?
CVE-2020-1945: no packages for Image SLES15-SP5-SAP-Azure, but entry?
CVE-2020-1945: no packages for Image SLES15-SP5-SAP-Azure-LI-BYOS, but entry?
CVE-2020-1945: no packages for Image SLES15-SP5-SAP-Azure-LI-BYOS-Production, but entry?
CVE-2020-1945: no packages for Image SLES15-SP5-SAP-Azure-VLI-BYOS, but entry?
CVE-2020-1945: no packages for Image SLES15-SP5-SAP-Azure-VLI-BYOS-Production, but entry?
CVE-2020-1945: no packages for Image SLES15-SP5-SAP-EC2, but entry?
CVE-2020-1945: no packages for Image SLES15-SP5-SAP-GCE, but entry?
CVE-2020-1945: no packages for Image SLES15-SP5-SAPCAL-Azure, but entry?
CVE-2020-1945: no packages for Image SLES15-SP5-SAPCAL-EC2, but entry?
CVE-2020-1945: no packages for Image SLES15-SP5-SAPCAL-GCE, but entry?
CVE-2020-1945: no packages for Image SLES15-SP6-SAP, but entry?
CVE-2020-1945: no packages for Image SLES15-SP6-SAP-Azure, but entry?
CVE-2020-1945: no packages for Image SLES15-SP6-SAP-Azure-LI-BYOS, but entry?
CVE-2020-1945: no packages for Image SLES15-SP6-SAP-Azure-LI-BYOS-Production, but entry?
CVE-2020-1945: no packages for Image SLES15-SP6-SAP-Azure-VLI-BYOS, but entry?
CVE-2020-1945: no packages for Image SLES15-SP6-SAP-Azure-VLI-BYOS-Production, but entry?
CVE-2020-1945: no packages for Image SLES15-SP6-SAP-EC2, but entry?
CVE-2020-1945: no packages for Image SLES15-SP6-SAP-GCE, but entry?
CVE-2020-1945: no packages for Image SLES15-SP6-SAPCAL, but entry?
CVE-2020-1945: no packages for Image SLES15-SP6-SAPCAL-Azure, but entry?
CVE-2020-1945: no packages for Image SLES15-SP6-SAPCAL-EC2, but entry?
CVE-2020-1945: no packages for Image SLES15-SP6-SAPCAL-GCE, but entry?
CVE-2020-1945: no packages for SUSE CaaS Platform 4.0, but entry?
CVE-2020-1945: no packages for SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS, but entry?
CVE-2020-1945: no packages for SUSE Linux Enterprise Module for Basesystem 15 SP4, but entry?
CVE-2020-1945: no packages for SUSE Linux Enterprise Module for Basesystem 15 SP5, but entry?
CVE-2020-1945: no packages for SUSE Linux Enterprise Module for Basesystem 15 SP6, but entry?
CVE-2020-1945: no packages for SUSE Linux Enterprise Module for Package Hub 15 SP4, but entry?
CVE-2020-1945: no packages for SUSE Linux Enterprise Module for Web and Scripting 15 SP4, but entry?
CVE-2020-1945: no packages for SUSE Linux Enterprise Module for Web and Scripting 15 SP5, but entry?
CVE-2020-1945: no packages for SUSE Linux Enterprise Module for Web and Scripting 15 SP6, but entry?
CVE-2020-1945: no packages for SUSE Linux Enterprise Server 15 SP1-LTSS, but entry?
CVE-2020-1945: no packages for SUSE Linux Enterprise Server 15 SP4-TERADATA, but entry?
CVE-2020-1945: no packages for SUSE Linux Enterprise Server for SAP Applications 15 SP1, but entry?
CVE-2020-1945: no packages for SUSE Linux Enterprise Workstation Extension 15 SP4, but entry?
CVE-2020-1945: no packages for SUSE Linux Enterprise Workstation Extension 15 SP5, but entry?
CVE-2020-1945: no packages for SUSE Linux Enterprise Workstation Extension 15 SP6, but entry?
CVE-2020-1945: no packages for SUSE Manager Proxy 4.2, but entry?
CVE-2020-1945: no packages for SUSE Manager Retail Branch Server 4.2, but entry?
CVE-2020-1945: no packages for SUSE Manager Server 4.2, but entry?
no cpe found for SUSE Liberty Linux 7 LTSS in CVE-2020-1935
no cpe found for SUSE Package Hub 15 in CVE-2020-1773
no cpe found for SUSE Package Hub 15 SP1 in CVE-2020-1773
no cpe found for SUSE Package Hub 15 SP2 in CVE-2020-1773
no cpe found for SUSE Package Hub 15 in CVE-2020-1772
no cpe found for SUSE Package Hub 15 SP1 in CVE-2020-1772
no cpe found for SUSE Package Hub 15 SP2 in CVE-2020-1772
no cpe found for SUSE Package Hub 15 in CVE-2020-1771
no cpe found for SUSE Package Hub 15 SP1 in CVE-2020-1771
no cpe found for SUSE Package Hub 15 SP2 in CVE-2020-1771
no cpe found for SUSE Package Hub 15 in CVE-2020-1770
no cpe found for SUSE Package Hub 15 SP1 in CVE-2020-1770
no cpe found for SUSE Package Hub 15 SP2 in CVE-2020-1770
no cpe found for SUSE Package Hub 15 in CVE-2020-1769
no cpe found for SUSE Package Hub 15 SP1 in CVE-2020-1769
no cpe found for SUSE Package Hub 15 SP2 in CVE-2020-1769
no cpe found for SUSE Package Hub 15 in CVE-2020-1766
no cpe found for SUSE Package Hub 15 SP1 in CVE-2020-1766
no cpe found for SUSE Package Hub 15 SP2 in CVE-2020-1766
no cpe found for SUSE Package Hub 15 in CVE-2020-1765
no cpe found for SUSE Package Hub 15 SP1 in CVE-2020-1765
no cpe found for SUSE Package Hub 15 SP2 in CVE-2020-1765
no cpe found for HPE Helion OpenStack Cloud 8 in CVE-2020-1753
no cpe found for SUSE Manager Tools for SLE Micro 5 in CVE-2020-1753
no cpe found for SUSE Package Hub 15 SP3 in CVE-2020-1753
skipping CVE-2020-1759 as CVE page is older than CVRF-CVE file.
no cpe found for HPE Helion OpenStack Cloud 8 in CVE-2020-1747
--- /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2020-1747.xml 2024-10-22 04:25:23.360332000 +0200
+++ /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2020-1747.xml.new 2024-10-29 02:19:08.573765000 +0100
@@ -14,13 +14,13 @@
1
- 105
- 2024-10-22T02:25:22Z
+ 106
+ 2024-10-29T01:19:08Z
current
2021-05-30T14:35:10Z
- 2024-10-22T02:25:22Z
+ 2024-10-29T01:19:08Z
cve-database/bin/generate-cvrf-cve.pl
2020-12-27T01:00:00Z
@@ -295,6 +295,11 @@
Image SLES12-SP5-EC2-SAP-On-Demand
+
+
+ Image SLES12-SP5-GCE-BYOS
+
+
Image SLES12-SP5-GCE-SAP-BYOS
@@ -1546,6 +1551,9 @@
python3-PyYAML-5.1.2-3.3.1 as a component of Image SLES12-SP5-EC2-SAP-On-Demand
+
+ python3-PyYAML-5.1.2-3.3.1 as a component of Image SLES12-SP5-GCE-BYOS
+
python3-PyYAML-5.1.2-3.3.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
@@ -2364,6 +2372,7 @@
Image SLES12-SP5-EC2-On-Demand:python3-PyYAML-5.1.2-3.3.1
Image SLES12-SP5-EC2-SAP-BYOS:python3-PyYAML-5.1.2-3.3.1
Image SLES12-SP5-EC2-SAP-On-Demand:python3-PyYAML-5.1.2-3.3.1
+ Image SLES12-SP5-GCE-BYOS:python3-PyYAML-5.1.2-3.3.1
Image SLES12-SP5-GCE-SAP-BYOS:python3-PyYAML-5.1.2-3.3.1
Image SLES12-SP5-GCE-SAP-On-Demand:python3-PyYAML-5.1.2-3.3.1
Image SLES12-SP5-OCI-BYOS-BYOS:python3-PyYAML-5.1.2-3.3.1
no cpe found for HPE Helion OpenStack Cloud 8 in CVE-2020-1746
no cpe found for SUSE Package Hub 15 SP3 in CVE-2020-1746
no cpe found for SUSE Package Hub 15 SP3 in CVE-2020-1740
no cpe found for HPE Helion OpenStack Cloud 8 in CVE-2020-1739
no cpe found for SUSE Package Hub 15 SP3 in CVE-2020-1739
no cpe found for HPE Helion OpenStack Cloud 8 in CVE-2020-1738
no cpe found for SUSE Package Hub 15 SP3 in CVE-2020-1738
no cpe found for HPE Helion OpenStack Cloud 8 in CVE-2020-1737
no cpe found for SUSE Package Hub 15 SP3 in CVE-2020-1737
no cpe found for SUSE Package Hub 15 SP3 in CVE-2020-1736
no cpe found for SUSE Package Hub 15 SP3 in CVE-2020-1735
no cpe found for HPE Helion OpenStack Cloud 8 in CVE-2020-1734
no cpe found for SUSE Package Hub 15 SP3 in CVE-2020-1734
no cpe found for HPE Helion OpenStack Cloud 8 in CVE-2020-1733
no cpe found for SUSE Package Hub 15 SP3 in CVE-2020-1733
skipping CVE-2020-1720 as CVE page is older than CVRF-CVE file.
skipping CVE-2020-1700 as CVE page is older than CVRF-CVE file.
skipping CVE-2020-1699 as CVE page is older than CVRF-CVE file.
skipping CVE-2020-1693 as CVE page is older than CVRF-CVE file.
skipping CVE-2020-0570 as CVE page is older than CVRF-CVE file.
no cpe found for SUSE Package Hub 15 SP1 in CVE-2020-0561
no cpe found for SUSE Liberty Linux 7 LTSS in CVE-2020-0556
skipping CVE-2020-0499 as CVE page is older than CVRF-CVE file.
skipping CVE-2020-0487 as CVE page is older than CVRF-CVE file.
no cpe found for SUSE Liberty Linux 7 LTSS in CVE-2020-0452
skipping CVE-2020-0435 as CVE page is older than CVRF-CVE file.
skipping CVE-2020-0423 as CVE page is older than CVRF-CVE file.
skipping CVE-2020-0305 as CVE page is older than CVRF-CVE file.
skipping CVE-2020-0255 as CVE page is older than CVRF-CVE file.
skipping CVE-2020-0198 as CVE page is older than CVRF-CVE file.
skipping CVE-2020-0182 as CVE page is older than CVRF-CVE file.
skipping CVE-2020-0181 as CVE page is older than CVRF-CVE file.
skipping CVE-2020-0110 as CVE page is older than CVRF-CVE file.
skipping CVE-2020-0067 as CVE page is older than CVRF-CVE file.
skipping CVE-2020-0066 as CVE page is older than CVRF-CVE file.
skipping CVE-2020-0034 as CVE page is older than CVRF-CVE file.
skipping CVE-2020-0030 as CVE page is older than CVRF-CVE file.
no cpe found for SUSE Liberty Linux 7 LTSS in CVE-2019-1010305
no cpe found for SUSE Package Hub 15 SP2 in CVE-2019-1010302
no cpe found for SUSE Package Hub 15 SP2 in CVE-2019-1010301
no cpe found for SUSE Liberty Linux 7 LTSS in CVE-2019-1010238
no cpe found for SUSE Package Hub 15 in CVE-2019-1010224
no cpe found for SUSE Package Hub 15 SP1 in CVE-2019-1010224
no cpe found for SUSE Package Hub 15 in CVE-2019-1010223
no cpe found for SUSE Package Hub 15 SP1 in CVE-2019-1010223
no cpe found for SUSE Package Hub 15 in CVE-2019-1010222
no cpe found for SUSE Package Hub 15 SP1 in CVE-2019-1010222
skipping CVE-2019-1010204 as CVE page is older than CVRF-CVE file.
skipping CVE-2019-1010180 as CVE page is older than CVRF-CVE file.
no cpe found for SUSE Package Hub 15 SP1 in CVE-2019-1010048
no entry found for CVE-2019-1002162 / /home/securitybot/prod/cve-database/cvelist/2019/1002xxxx/CVE-2019-1002162.json:No such file or directory
No V5 entry found for CVE-2019-1002162 / /home/securitybot/prod/cve-database/cvelistV5/cves/2019/1002xxxx/CVE-2019-1002162.json:No such file or directory
no entry found for CVE-2019-1000029 / /home/securitybot/prod/cve-database/cvelist/2019/1000xxxx/CVE-2019-1000029.json:No such file or directory
No V5 entry found for CVE-2019-1000029 / /home/securitybot/prod/cve-database/cvelistV5/cves/2019/1000xxxx/CVE-2019-1000029.json:No such file or directory
no cpe found for SUSE Package Hub 15 in CVE-2019-1000021
skipping CVE-2019-1000020 as CVE page is older than CVRF-CVE file.
skipping CVE-2019-1000019 as CVE page is older than CVRF-CVE file.
No V5 entry found for CVE-2019-25074 / /home/securitybot/prod/cve-database/cvelistV5/cves/2019/25xxxx/CVE-2019-25074.json:No such file or directory
no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2019-25074
skipping CVE-2019-25162 as CVE page is older than CVRF-CVE file.
skipping CVE-2019-25161 as CVE page is older than CVRF-CVE file.
skipping CVE-2019-25160 as CVE page is older than CVRF-CVE file.
skipping CVE-2019-25136 as CVE page is older than CVRF-CVE file.
skipping CVE-2019-25085 as CVE page is older than CVRF-CVE file.
skipping CVE-2019-25076 as CVE page is older than CVRF-CVE file.
skipping CVE-2019-25059 as CVE page is older than CVRF-CVE file.
skipping CVE-2019-25051 as CVE page is older than CVRF-CVE file.
skipping CVE-2019-25044 as CVE page is older than CVRF-CVE file.
no cpe found for HPE Helion OpenStack Cloud 8 in CVE-2019-20916
no cpe found for SUSE Liberty Linux 7 LTSS in CVE-2019-20916
skipping CVE-2019-20908 as CVE page is older than CVRF-CVE file.
--- /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2019-20907.xml 2024-09-23 02:07:45.838399000 +0200
+++ /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2019-20907.xml.new 2024-10-29 02:20:00.008522000 +0100
@@ -14,13 +14,13 @@
1
- 171
- 2024-09-23T00:07:44Z
+ 172
+ 2024-10-29T01:19:59Z
current
2021-05-30T14:34:25Z
- 2024-09-23T00:07:44Z
+ 2024-10-29T01:19:59Z
cve-database/bin/generate-cvrf-cve.pl
2020-12-27T01:00:00Z
@@ -2925,6 +2925,24 @@
python313-x86-64-v3-3.13.0~b3-1.1
+
+ python314-3.14.0~a1-1.1
+
+
+ python314-curses-3.14.0~a1-1.1
+
+
+ python314-dbm-3.14.0~a1-1.1
+
+
+ python314-idle-3.14.0~a1-1.1
+
+
+ python314-tk-3.14.0~a1-1.1
+
+
+ python314-x86-64-v3-3.14.0~a1-1.1
+
python36-3.6.12-4.22.2
@@ -7140,6 +7158,24 @@
python313-x86-64-v3-3.13.0~b3-1.1 as a component of openSUSE Tumbleweed
+
+ python314-3.14.0~a1-1.1 as a component of openSUSE Tumbleweed
+
+
+ python314-curses-3.14.0~a1-1.1 as a component of openSUSE Tumbleweed
+
+
+ python314-dbm-3.14.0~a1-1.1 as a component of openSUSE Tumbleweed
+
+
+ python314-idle-3.14.0~a1-1.1 as a component of openSUSE Tumbleweed
+
+
+ python314-tk-3.14.0~a1-1.1 as a component of openSUSE Tumbleweed
+
+
+ python314-x86-64-v3-3.14.0~a1-1.1 as a component of openSUSE Tumbleweed
+
python36-3.6.15-1.1 as a component of openSUSE Tumbleweed
@@ -8912,6 +8948,12 @@
openSUSE Tumbleweed:python313-idle-3.13.0~b3-1.1
openSUSE Tumbleweed:python313-tk-3.13.0~b3-1.1
openSUSE Tumbleweed:python313-x86-64-v3-3.13.0~b3-1.1
+ openSUSE Tumbleweed:python314-3.14.0~a1-1.1
+ openSUSE Tumbleweed:python314-curses-3.14.0~a1-1.1
+ openSUSE Tumbleweed:python314-dbm-3.14.0~a1-1.1
+ openSUSE Tumbleweed:python314-idle-3.14.0~a1-1.1
+ openSUSE Tumbleweed:python314-tk-3.14.0~a1-1.1
+ openSUSE Tumbleweed:python314-x86-64-v3-3.14.0~a1-1.1
openSUSE Tumbleweed:python36-3.6.15-1.1
openSUSE Tumbleweed:python36-32bit-3.6.15-1.1
openSUSE Tumbleweed:python36-curses-3.6.15-1.1
skipping CVE-2019-20892 as CVE page is older than CVRF-CVE file.
skipping CVE-2019-20812 as CVE page is older than CVRF-CVE file.
skipping CVE-2019-20810 as CVE page is older than CVRF-CVE file.
skipping CVE-2019-20808 as CVE page is older than CVRF-CVE file.
no cpe found for SUSE Package Hub 15 SP1 in CVE-2019-20797
skipping CVE-2019-20794 as CVE page is older than CVRF-CVE file.
no cpe found for SUSE Package Hub 15 SP1 in CVE-2019-20787
skipping CVE-2019-20788 as CVE page is older than CVRF-CVE file.
no cpe found for SUSE Package Hub 15 SP1 in CVE-2019-20637
no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2019-20633
skipping CVE-2019-20636 as CVE page is older than CVRF-CVE file.
no cpe found for SUSE Package Hub 15 SP1 in CVE-2019-20503
skipping CVE-2019-20477 as CVE page is older than CVRF-CVE file.
skipping CVE-2019-20454 as CVE page is older than CVRF-CVE file.
skipping CVE-2019-20422 as CVE page is older than CVRF-CVE file.
skipping CVE-2019-20387 as CVE page is older than CVRF-CVE file.
no cpe found for SUSE Linux Enterprise Module for HPC 12 SP2 in CVE-2019-20378
no cpe found for SUSE Linux Enterprise Module for HPC 12 SP2 in CVE-2019-20378
no cpe found for SUSE Linux Enterprise Module for HPC 12 SP2 in CVE-2019-20378
no cpe found for SUSE Linux Enterprise Module for HPC 12 SP2 in CVE-2019-20378
no cpe found for SUSE Linux Enterprise Module for HPC 12 SP2 in CVE-2019-20378
no cpe found for SUSE Linux Enterprise Module for HPC 12 SP2 in CVE-2019-20378
no cpe found for SUSE Linux Enterprise Module for HPC 12 SP2 in CVE-2019-20378
no cpe found for SUSE Linux Enterprise Module for HPC 12 SP2 in CVE-2019-20378
no cpe found for SUSE Linux Enterprise Module for HPC 12 SP2 in CVE-2019-20378
no cpe found for SUSE Linux Enterprise Module for HPC 12 SP2 in CVE-2019-20378
no cpe found for SUSE Linux Enterprise Module for HPC 12 SP2 in CVE-2019-20378
no cpe found for SUSE Linux Enterprise Module for HPC 12 SP2 in CVE-2019-20378
skipping CVE-2019-20095 as CVE page is older than CVRF-CVE file.
no cpe found for SUSE Package Hub 15 SP2 in CVE-2019-20063
skipping CVE-2019-20079 as CVE page is older than CVRF-CVE file.
no cpe found for SUSE Package Hub 15 SP1 in CVE-2019-20053
skipping CVE-2019-20054 as CVE page is older than CVRF-CVE file.
no cpe found for SUSE Package Hub 15 SP1 in CVE-2019-20021
no cpe found for SUSE Package Hub 15 SP2 in CVE-2019-20016
no cpe found for SUSE Package Hub 15 SP1 in CVE-2019-20015
no cpe found for SUSE Package Hub 15 SP1 in CVE-2019-20014
no cpe found for SUSE Package Hub 15 SP1 in CVE-2019-20013
no cpe found for SUSE Package Hub 15 SP1 in CVE-2019-20012
no cpe found for SUSE Package Hub 15 SP1 in CVE-2019-20011
no cpe found for SUSE Package Hub 15 SP1 in CVE-2019-20010
no cpe found for SUSE Package Hub 15 SP1 in CVE-2019-20009
skipping CVE-2019-19965 as CVE page is older than CVRF-CVE file.
no cpe found for SUSE Package Hub 15 SP1 in CVE-2019-19950
skipping CVE-2019-19953 as CVE page is older than CVRF-CVE file.
skipping CVE-2019-19952 as CVE page is older than CVRF-CVE file.
skipping CVE-2019-19951 as CVE page is older than CVRF-CVE file.
no cpe found for SUSE Liberty Linux 7 LTSS in CVE-2019-19949
no cpe found for SUSE Liberty Linux 7 LTSS in CVE-2019-19948
skipping CVE-2019-19947 as CVE page is older than CVRF-CVE file.
no cpe found for SUSE Package Hub 15 SP1 in CVE-2019-19926
no cpe found for SUSE Package Hub 15 SP1 in CVE-2019-19925
no cpe found for SUSE Package Hub 15 SP1 in CVE-2019-19923
skipping CVE-2019-19922 as CVE page is older than CVRF-CVE file.
no cpe found for SUSE Package Hub 15 SP1 in CVE-2019-19918
no cpe found for SUSE Package Hub 15 SP2 in CVE-2019-19918
no cpe found for SUSE Package Hub 15 SP1 in CVE-2019-19917
no cpe found for SUSE Package Hub 15 SP2 in CVE-2019-19917
no cpe found for HPE Helion OpenStack Cloud 8 in CVE-2019-19911
skipping CVE-2019-19906 as CVE page is older than CVRF-CVE file.
no cpe found for SUSE Package Hub 15 SP1 in CVE-2019-19880
no cpe found for HPE Helion OpenStack Cloud 8 in CVE-2019-19844
no cpe found for SUSE Package Hub 15 SP2 in CVE-2019-19797
no cpe found for SUSE Package Hub 15 SP3 in CVE-2019-19797
skipping CVE-2019-19816 as CVE page is older than CVRF-CVE file.
skipping CVE-2019-19815 as CVE page is older than CVRF-CVE file.
skipping CVE-2019-19814 as CVE page is older than CVRF-CVE file.
skipping CVE-2019-19813 as CVE page is older than CVRF-CVE file.
skipping CVE-2019-19807 as CVE page is older than CVRF-CVE file.
no cpe found for SUSE Package Hub 15 SP2 in CVE-2019-19746
no cpe found for SUSE Package Hub 15 SP3 in CVE-2019-19746
skipping CVE-2019-19770 as CVE page is older than CVRF-CVE file.
skipping CVE-2019-19769 as CVE page is older than CVRF-CVE file.
skipping CVE-2019-19768 as CVE page is older than CVRF-CVE file.
skipping CVE-2019-19767 as CVE page is older than CVRF-CVE file.
skipping CVE-2019-19722 as CVE page is older than CVRF-CVE file.
no cpe found for HPE Helion OpenStack Cloud 8 in CVE-2019-19687
skipping CVE-2019-19602 as CVE page is older than CVRF-CVE file.
no cpe found for SUSE Package Hub 15 SP2 in CVE-2019-19555
no cpe found for SUSE Package Hub 15 SP3 in CVE-2019-19555
no cpe found for HPE Helion OpenStack Cloud 8 in CVE-2019-19499
no cpe found for SUSE Manager Tools 15 SP1 in CVE-2019-19499
skipping CVE-2019-19553 as CVE page is older than CVRF-CVE file.
skipping CVE-2019-19543 as CVE page is older than CVRF-CVE file.
skipping CVE-2019-19537 as CVE page is older than CVRF-CVE file.
skipping CVE-2019-19536 as CVE page is older than CVRF-CVE file.
skipping CVE-2019-19535 as CVE page is older than CVRF-CVE file.
skipping CVE-2019-19534 as CVE page is older than CVRF-CVE file.
skipping CVE-2019-19533 as CVE page is older than CVRF-CVE file.
skipping CVE-2019-19532 as CVE page is older than CVRF-CVE file.
skipping CVE-2019-19531 as CVE page is older than CVRF-CVE file.
skipping CVE-2019-19530 as CVE page is older than CVRF-CVE file.
skipping CVE-2019-19529 as CVE page is older than CVRF-CVE file.
skipping CVE-2019-19528 as CVE page is older than CVRF-CVE file.
skipping CVE-2019-19527 as CVE page is older than CVRF-CVE file.
skipping CVE-2019-19526 as CVE page is older than CVRF-CVE file.
skipping CVE-2019-19525 as CVE page is older than CVRF-CVE file.
skipping CVE-2019-19524 as CVE page is older than CVRF-CVE file.
skipping CVE-2019-19523 as CVE page is older than CVRF-CVE file.
skipping CVE-2019-19462 as CVE page is older than CVRF-CVE file.
no cpe found for SUSE Liberty Linux 7 LTSS in CVE-2019-19450
skipping CVE-2019-19449 as CVE page is older than CVRF-CVE file.
skipping CVE-2019-19448 as CVE page is older than CVRF-CVE file.
skipping CVE-2019-19447 as CVE page is older than CVRF-CVE file.
skipping CVE-2019-19378 as CVE page is older than CVRF-CVE file.
skipping CVE-2019-19338 as CVE page is older than CVRF-CVE file.
skipping CVE-2019-19337 as CVE page is older than CVRF-CVE file.
no cpe found for HPE Helion OpenStack Cloud 8 in CVE-2019-19330
skipping CVE-2019-19332 as CVE page is older than CVRF-CVE file.
skipping CVE-2019-19319 as CVE page is older than CVRF-CVE file.
skipping CVE-2019-19318 as CVE page is older than CVRF-CVE file.
no cpe found for SUSE Package Hub 15 SP1 in CVE-2019-19275
no cpe found for SUSE Package Hub 15 SP1 in CVE-2019-19274
no cpe found for SUSE Package Hub 15 in CVE-2019-19270
no cpe found for SUSE Package Hub 15 SP1 in CVE-2019-19270
no cpe found for SUSE Package Hub 15 in CVE-2019-19269
no cpe found for SUSE Package Hub 15 SP1 in CVE-2019-19269
skipping CVE-2019-19252 as CVE page is older than CVRF-CVE file.
skipping CVE-2019-19246 as CVE page is older than CVRF-CVE file.
skipping CVE-2019-19241 as CVE page is older than CVRF-CVE file.
skipping CVE-2019-19227 as CVE page is older than CVRF-CVE file.
skipping CVE-2019-19221 as CVE page is older than CVRF-CVE file.
skipping CVE-2019-19204 as CVE page is older than CVRF-CVE file.
skipping CVE-2019-19203 as CVE page is older than CVRF-CVE file.
no cpe found for HPE Helion OpenStack Cloud 8 in CVE-2019-19118
no cpe found for SUSE Package Hub 15 SP1 in CVE-2019-19118
skipping CVE-2019-19126 as CVE page is older than CVRF-CVE file.
skipping CVE-2019-19083 as CVE page is older than CVRF-CVE file.
skipping CVE-2019-19082 as CVE page is older than CVRF-CVE file.
skipping CVE-2019-19081 as CVE page is older than CVRF-CVE file.
skipping CVE-2019-19080 as CVE page is older than CVRF-CVE file.
skipping CVE-2019-19078 as CVE page is older than CVRF-CVE file.
skipping CVE-2019-19077 as CVE page is older than CVRF-CVE file.
skipping CVE-2019-19076 as CVE page is older than CVRF-CVE file.
skipping CVE-2019-19075 as CVE page is older than CVRF-CVE file.
skipping CVE-2019-19074 as CVE page is older than CVRF-CVE file.
skipping CVE-2019-19073 as CVE page is older than CVRF-CVE file.
skipping CVE-2019-19072 as CVE page is older than CVRF-CVE file.
skipping CVE-2019-19071 as CVE page is older than CVRF-CVE file.
skipping CVE-2019-19070 as CVE page is older than CVRF-CVE file.
skipping CVE-2019-19069 as CVE page is older than CVRF-CVE file.
skipping CVE-2019-19068 as CVE page is older than CVRF-CVE file.
skipping CVE-2019-19067 as CVE page is older than CVRF-CVE file.
skipping CVE-2019-19065 as CVE page is older than CVRF-CVE file.
skipping CVE-2019-19064 as CVE page is older than CVRF-CVE file.
skipping CVE-2019-19063 as CVE page is older than CVRF-CVE file.
skipping CVE-2019-19062 as CVE page is older than CVRF-CVE file.
skipping CVE-2019-19061 as CVE page is older than CVRF-CVE file.
skipping CVE-2019-19060 as CVE page is older than CVRF-CVE file.
skipping CVE-2019-19059 as CVE page is older than CVRF-CVE file.
skipping CVE-2019-19058 as CVE page is older than CVRF-CVE file.
skipping CVE-2019-19057 as CVE page is older than CVRF-CVE file.
skipping CVE-2019-19056 as CVE page is older than CVRF-CVE file.
skipping CVE-2019-19055 as CVE page is older than CVRF-CVE file.
skipping CVE-2019-19053 as CVE page is older than CVRF-CVE file.
skipping CVE-2019-19052 as CVE page is older than CVRF-CVE file.
skipping CVE-2019-19051 as CVE page is older than CVRF-CVE file.
skipping CVE-2019-19050 as CVE page is older than CVRF-CVE file.
skipping CVE-2019-19048 as CVE page is older than CVRF-CVE file.
skipping CVE-2019-19047 as CVE page is older than CVRF-CVE file.
skipping CVE-2019-19046 as CVE page is older than CVRF-CVE file.
skipping CVE-2019-19044 as CVE page is older than CVRF-CVE file.
skipping CVE-2019-19043 as CVE page is older than CVRF-CVE file.
skipping CVE-2019-19039 as CVE page is older than CVRF-CVE file.
skipping CVE-2019-19037 as CVE page is older than CVRF-CVE file.
skipping CVE-2019-19036 as CVE page is older than CVRF-CVE file.
no cpe found for SUSE Package Hub 15 SP3 in CVE-2019-19005
no cpe found for SUSE Package Hub 15 SP3 in CVE-2019-19004
no cpe found for SUSE Package Hub 15 SP1 in CVE-2019-18932
skipping CVE-2019-18905 as CVE page is older than CVRF-CVE file.
no cpe found for HPE Helion OpenStack Cloud 8 in CVE-2019-18901
skipping CVE-2019-18903 as CVE page is older than CVRF-CVE file.
skipping CVE-2019-18902 as CVE page is older than CVRF-CVE file.
no cpe found for SUSE Package Hub 15 SP1 in CVE-2019-18899
no cpe found for HPE Helion OpenStack Cloud 8 in CVE-2019-18874
skipping CVE-2019-18898 as CVE page is older than CVRF-CVE file.
skipping CVE-2019-18897 as CVE page is older than CVRF-CVE file.
skipping CVE-2019-18885 as CVE page is older than CVRF-CVE file.
skipping CVE-2019-18814 as CVE page is older than CVRF-CVE file.
skipping CVE-2019-18813 as CVE page is older than CVRF-CVE file.
skipping CVE-2019-18812 as CVE page is older than CVRF-CVE file.
skipping CVE-2019-18811 as CVE page is older than CVRF-CVE file.
skipping CVE-2019-18810 as CVE page is older than CVRF-CVE file.
skipping CVE-2019-18809 as CVE page is older than CVRF-CVE file.
skipping CVE-2019-18808 as CVE page is older than CVRF-CVE file.
skipping CVE-2019-18807 as CVE page is older than CVRF-CVE file.
skipping CVE-2019-18805 as CVE page is older than CVRF-CVE file.
skipping CVE-2019-18802 as CVE page is older than CVRF-CVE file.
skipping CVE-2019-18786 as CVE page is older than CVRF-CVE file.
skipping CVE-2019-18683 as CVE page is older than CVRF-CVE file.
skipping CVE-2019-18680 as CVE page is older than CVRF-CVE file.
skipping CVE-2019-18675 as CVE page is older than CVRF-CVE file.
no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2019-18658
no cpe found for SUSE Package Hub 15 in CVE-2019-18622
no cpe found for SUSE Package Hub 15 SP1 in CVE-2019-18622
no cpe found for SUSE Liberty Linux 7 LTSS in CVE-2019-18609
skipping CVE-2019-18408 as CVE page is older than CVRF-CVE file.
skipping CVE-2019-18397 as CVE page is older than CVRF-CVE file.
skipping CVE-2019-18392 as CVE page is older than CVRF-CVE file.
no cpe found for SUSE Package Hub 15 SP1 in CVE-2019-18359
no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2019-18348
no cpe found for HPE Helion OpenStack Cloud 8 in CVE-2019-18277
skipping CVE-2019-18276 as CVE page is older than CVRF-CVE file.
skipping CVE-2019-18224 as CVE page is older than CVRF-CVE file.
no cpe found for SUSE Package Hub 15 in CVE-2019-18217
no cpe found for SUSE Package Hub 15 SP1 in CVE-2019-18217
skipping CVE-2019-18218 as CVE page is older than CVRF-CVE file.
no cpe found for SUSE Liberty Linux 7 LTSS in CVE-2019-18197
no cpe found for SUSE Package Hub 15 SP1 in CVE-2019-18197
skipping CVE-2019-18198 as CVE page is older than CVRF-CVE file.
no cpe found for SUSE Package Hub 15 in CVE-2019-18180
no cpe found for SUSE Package Hub 15 SP1 in CVE-2019-18180
no cpe found for SUSE Package Hub 15 SP2 in CVE-2019-18180
no cpe found for SUSE Package Hub 15 in CVE-2019-18179
no cpe found for SUSE Package Hub 15 SP1 in CVE-2019-18179
no cpe found for SUSE Package Hub 15 SP2 in CVE-2019-18179
skipping CVE-2019-17666 as CVE page is older than CVRF-CVE file.
skipping CVE-2019-17595 as CVE page is older than CVRF-CVE file.
skipping CVE-2019-17594 as CVE page is older than CVRF-CVE file.
skipping CVE-2019-17582 as CVE page is older than CVRF-CVE file.
CVE-2019-17566: no packages for Image SLES15-SP3-Manager-4-2-Server-BYOS-Azure, but entry?
CVE-2019-17566: no packages for Container bci/openjdk-devel:17-14.11, but entry?
CVE-2019-17566: no packages for SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS, but entry?
CVE-2019-17566: no packages for Container bci/openjdk:11-7.1, but entry?
CVE-2019-17566: no packages for SUSE Linux Enterprise Server for SAP Applications 15 SP1, but entry?
CVE-2019-17566: no packages for Image SLES15-SP4-SAP-EC2, but entry?
CVE-2019-17566: no packages for Image SLES15-SP4-SAPCAL-Azure, but entry?
CVE-2019-17566: no packages for Image SLES15-SP5-SAPCAL-EC2, but entry?
CVE-2019-17566: no packages for Image SLES15-SP4-SAPCAL-EC2, but entry?
CVE-2019-17566: no packages for SUSE Linux Enterprise Module for Web and Scripting 15 SP4, but entry?
CVE-2019-17566: no packages for Image SLES15-SP6-SAP-EC2, but entry?
CVE-2019-17566: no packages for Image SLES15-SP3-SAP-Azure-LI-BYOS-Production, but entry?
CVE-2019-17566: no packages for Image SLES15-SP2-SAP-EC2-HVM, but entry?
CVE-2019-17566: no packages for SUSE Linux Enterprise Server 15 SP1-LTSS, but entry?
CVE-2019-17566: no packages for Image SLES15-SP4-Manager-Server-4-3-BYOS-EC2, but entry?
CVE-2019-17566: no packages for Image SLES15-SP5-SAPCAL-GCE, but entry?
CVE-2019-17566: no packages for Image SLES15-SP6-SAP-Azure, but entry?
CVE-2019-17566: no packages for Image SLES15-SP4-Manager-Server-4-3-BYOS-GCE, but entry?
CVE-2019-17566: no packages for Image SLES15-SP3-Manager-4-2-Server-BYOS-EC2-HVM, but entry?
CVE-2019-17566: no packages for Image SLES15-SP5-SAP-Azure-VLI-BYOS-Production, but entry?
CVE-2019-17566: no packages for Image SLES15-SP6-SAPCAL-Azure, but entry?
CVE-2019-17566: no packages for Image SLES15-SP5-SAP-Azure, but entry?
CVE-2019-17566: no packages for Image SLES15-SP6-SAP-Azure-VLI-BYOS, but entry?
CVE-2019-17566: no packages for Image SLES15-SP5-SAP-Azure-VLI-BYOS, but entry?
CVE-2019-17566: no packages for Image SLES15-SP6-SAPCAL, but entry?
CVE-2019-17566: no packages for SUSE Linux Enterprise Module for Basesystem 15 SP6, but entry?
CVE-2019-17566: no packages for Image SLES15-SP5-SAP-Azure-LI-BYOS-Production, but entry?
CVE-2019-17566: no packages for Image SLES15-SP3-SAPCAL-Azure, but entry?
CVE-2019-17566: no packages for Image SLES15-SP2-SAP-BYOS-GCE, but entry?
CVE-2019-17566: no packages for Image SLES15-SP4-Manager-Server-4-3-Azure-llc, but entry?
CVE-2019-17566: no packages for Image SLES15-SP3-Manager-4-2-Server-BYOS-GCE, but entry?
CVE-2019-17566: no packages for Image SLES15-SP4-Manager-Server-4-3-Azure-ltd, but entry?
CVE-2019-17566: no packages for SUSE Linux Enterprise Module for Web and Scripting 15 SP5, but entry?
CVE-2019-17566: no packages for SUSE Linux Enterprise Workstation Extension 15 SP4, but entry?
CVE-2019-17566: no packages for Image SLES15-SP4-SAP-Azure, but entry?
CVE-2019-17566: no packages for SUSE Linux Enterprise Module for Package Hub 15 SP5, but entry?
CVE-2019-17566: no packages for SUSE Manager Proxy 4.2, but entry?
CVE-2019-17566: no packages for Image SLES15-SP4-Manager-Server-4-3, but entry?
CVE-2019-17566: no packages for Image SLES15-SP4-Manager-Server-4-3-BYOS, but entry?
CVE-2019-17566: no packages for Image SLES15-SP2-SAP-Azure-LI-BYOS-Production, but entry?
CVE-2019-17566: no packages for Image SLES15-SP4-SAP-Azure-LI-BYOS-Production, but entry?
CVE-2019-17566: no packages for SUSE Linux Enterprise Module for Basesystem 15 SP5, but entry?
CVE-2019-17566: no packages for Image SLES15-SP2-SAP-Azure, but entry?
CVE-2019-17566: no packages for Image SLES15-SP2-SAP-GCE, but entry?
CVE-2019-17566: no packages for Container bci/kiwi:9.24.43-8.6, but entry?
CVE-2019-17566: no packages for SUSE Linux Enterprise Server 15 SP4-TERADATA, but entry?
CVE-2019-17566: no packages for Image SLES15-SP6-SAP-Azure-LI-BYOS, but entry?
CVE-2019-17566: no packages for Image SLES15-SP4-SAP-Azure-VLI-BYOS, but entry?
CVE-2019-17566: no packages for Image SLES15-SP4-SAP-GCE, but entry?
CVE-2019-17566: no packages for SUSE Linux Enterprise Workstation Extension 15 SP6, but entry?
CVE-2019-17566: no packages for Image SLES15-SP6-SAP-Azure-VLI-BYOS-Production, but entry?
CVE-2019-17566: no packages for SUSE Manager Server Module 4.3, but entry?
CVE-2019-17566: no packages for SUSE Linux Enterprise Workstation Extension 15 SP5, but entry?
CVE-2019-17566: no packages for Image SLES15-SP5-SAP-GCE, but entry?
CVE-2019-17566: no packages for Image SLES15-SP5-SAPCAL-Azure, but entry?
CVE-2019-17566: no packages for Container bci/openjdk-devel:17-7.2, but entry?
CVE-2019-17566: no packages for Image SLES15-SP5-SAP-Azure-LI-BYOS, but entry?
CVE-2019-17566: no packages for SUSE Manager Server Module 4.2, but entry?
CVE-2019-17566: no packages for Image SLES15-SP4-SAP-Azure-VLI-BYOS-Production, but entry?
CVE-2019-17566: no packages for Image SLES15-SP6-SAPCAL-GCE, but entry?
CVE-2019-17566: no packages for Container bci/openjdk-devel:11-6.2, but entry?
CVE-2019-17566: no packages for Image SLES15-SP4-Manager-Server-4-3-BYOS-Azure, but entry?
CVE-2019-17566: no packages for Image SLES15-SP6-SAP-GCE, but entry?
CVE-2019-17566: no packages for SUSE CaaS Platform 4.0, but entry?
CVE-2019-17566: no packages for Image SLES15-SP2-SAP-BYOS-EC2-HVM, but entry?
CVE-2019-17566: no packages for Image SLES15-SP2-SAP-Azure-VLI-BYOS-Production, but entry?
CVE-2019-17566: no packages for Container suse/manager/5.0/x86_64/server-attestation:5.0.0-beta2.2.16, but entry?
CVE-2019-17566: no packages for Image SLES15-SP3-SAP-Azure-VLI-BYOS-Production, but entry?
CVE-2019-17566: no packages for Image SLES15-SP4-Manager-Server-4-3-EC2-ltd, but entry?
CVE-2019-17566: no packages for SUSE Linux Enterprise Module for Basesystem 15 SP4, but entry?
CVE-2019-17566: no packages for Container bci/openjdk:17-7.1, but entry?
CVE-2019-17566: no packages for Container bci/openjdk:latest, but entry?
CVE-2019-17566: no packages for SUSE Linux Enterprise Module for Web and Scripting 15 SP6, but entry?
CVE-2019-17566: no packages for Image SLES15-SP4-SAPCAL, but entry?
CVE-2019-17566: no packages for Image SLES15-SP6-SAPCAL-EC2, but entry?
CVE-2019-17566: no packages for Image SLES15-SP2-SAP-BYOS-Azure, but entry?
CVE-2019-17566: no packages for Image SLES15-SP5-SAP-EC2, but entry?
CVE-2019-17566: no packages for Image SLES15-SP6-SAP-Azure-LI-BYOS-Production, but entry?
CVE-2019-17566: no packages for SUSE Linux Enterprise Module for Package Hub 15 SP4, but entry?
CVE-2019-17566: no packages for Image SLES15-SP4-Manager-Server-4-3-EC2-llc, but entry?
CVE-2019-17566: no packages for SUSE Manager Retail Branch Server 4.2, but entry?
CVE-2019-17566: no packages for Image SLES15-SP4-SAP, but entry?
CVE-2019-17566: no packages for SUSE Linux Enterprise Module for Development Tools 15 SP6, but entry?
CVE-2019-17566: no packages for SUSE Manager Server 4.2, but entry?
CVE-2019-17566: no packages for Image SLES15-SP3-SAPCAL-EC2-HVM, but entry?
CVE-2019-17566: no packages for Image SLES15-SP4-SAP-Azure-LI-BYOS, but entry?
CVE-2019-17566: no packages for Container suse/manager/5.0/x86_64/server:5.0.0-beta1.2.122, but entry?
CVE-2019-17566: no packages for Image SLES15-SP4-SAPCAL-GCE, but entry?
CVE-2019-17566: no packages for Image SLES15-SP3-SAPCAL-GCE, but entry?
CVE-2019-17566: no packages for Image SLES15-SP6-SAP, but entry?
no cpe found for SUSE Package Hub 15 SP1 in CVE-2019-17566
CVE-2019-17566: no packages for Container bci/kiwi:9.24.43-8.6, but entry?
CVE-2019-17566: no packages for Container bci/openjdk-devel:11-6.2, but entry?
CVE-2019-17566: no packages for Container bci/openjdk-devel:17-14.11, but entry?
CVE-2019-17566: no packages for Container bci/openjdk-devel:17-7.2, but entry?
CVE-2019-17566: no packages for Container bci/openjdk:11-7.1, but entry?
CVE-2019-17566: no packages for Container bci/openjdk:17-7.1, but entry?
CVE-2019-17566: no packages for Container bci/openjdk:latest, but entry?
CVE-2019-17566: no packages for Container suse/manager/5.0/x86_64/server-attestation:5.0.0-beta2.2.16, but entry?
CVE-2019-17566: no packages for Container suse/manager/5.0/x86_64/server:5.0.0-beta1.2.122, but entry?
CVE-2019-17566: no packages for Image SLES15-SP2-SAP-Azure, but entry?
CVE-2019-17566: no packages for Image SLES15-SP2-SAP-Azure-LI-BYOS-Production, but entry?
CVE-2019-17566: no packages for Image SLES15-SP2-SAP-Azure-VLI-BYOS-Production, but entry?
CVE-2019-17566: no packages for Image SLES15-SP2-SAP-BYOS-Azure, but entry?
CVE-2019-17566: no packages for Image SLES15-SP2-SAP-BYOS-EC2-HVM, but entry?
CVE-2019-17566: no packages for Image SLES15-SP2-SAP-BYOS-GCE, but entry?
CVE-2019-17566: no packages for Image SLES15-SP2-SAP-EC2-HVM, but entry?
CVE-2019-17566: no packages for Image SLES15-SP2-SAP-GCE, but entry?
CVE-2019-17566: no packages for Image SLES15-SP3-Manager-4-2-Server-BYOS-Azure, but entry?
CVE-2019-17566: no packages for Image SLES15-SP3-Manager-4-2-Server-BYOS-EC2-HVM, but entry?
CVE-2019-17566: no packages for Image SLES15-SP3-Manager-4-2-Server-BYOS-GCE, but entry?
CVE-2019-17566: no packages for Image SLES15-SP3-SAP-Azure-LI-BYOS-Production, but entry?
CVE-2019-17566: no packages for Image SLES15-SP3-SAP-Azure-VLI-BYOS-Production, but entry?
CVE-2019-17566: no packages for Image SLES15-SP3-SAPCAL-Azure, but entry?
CVE-2019-17566: no packages for Image SLES15-SP3-SAPCAL-EC2-HVM, but entry?
CVE-2019-17566: no packages for Image SLES15-SP3-SAPCAL-GCE, but entry?
CVE-2019-17566: no packages for Image SLES15-SP4-Manager-Server-4-3, but entry?
CVE-2019-17566: no packages for Image SLES15-SP4-Manager-Server-4-3-Azure-llc, but entry?
CVE-2019-17566: no packages for Image SLES15-SP4-Manager-Server-4-3-Azure-ltd, but entry?
CVE-2019-17566: no packages for Image SLES15-SP4-Manager-Server-4-3-BYOS, but entry?
CVE-2019-17566: no packages for Image SLES15-SP4-Manager-Server-4-3-BYOS-Azure, but entry?
CVE-2019-17566: no packages for Image SLES15-SP4-Manager-Server-4-3-BYOS-EC2, but entry?
CVE-2019-17566: no packages for Image SLES15-SP4-Manager-Server-4-3-BYOS-GCE, but entry?
CVE-2019-17566: no packages for Image SLES15-SP4-Manager-Server-4-3-EC2-llc, but entry?
CVE-2019-17566: no packages for Image SLES15-SP4-Manager-Server-4-3-EC2-ltd, but entry?
CVE-2019-17566: no packages for Image SLES15-SP4-SAP, but entry?
CVE-2019-17566: no packages for Image SLES15-SP4-SAP-Azure, but entry?
CVE-2019-17566: no packages for Image SLES15-SP4-SAP-Azure-LI-BYOS, but entry?
CVE-2019-17566: no packages for Image SLES15-SP4-SAP-Azure-LI-BYOS-Production, but entry?
CVE-2019-17566: no packages for Image SLES15-SP4-SAP-Azure-VLI-BYOS, but entry?
CVE-2019-17566: no packages for Image SLES15-SP4-SAP-Azure-VLI-BYOS-Production, but entry?
CVE-2019-17566: no packages for Image SLES15-SP4-SAP-EC2, but entry?
CVE-2019-17566: no packages for Image SLES15-SP4-SAP-GCE, but entry?
CVE-2019-17566: no packages for Image SLES15-SP4-SAPCAL, but entry?
CVE-2019-17566: no packages for Image SLES15-SP4-SAPCAL-Azure, but entry?
CVE-2019-17566: no packages for Image SLES15-SP4-SAPCAL-EC2, but entry?
CVE-2019-17566: no packages for Image SLES15-SP4-SAPCAL-GCE, but entry?
CVE-2019-17566: no packages for Image SLES15-SP5-SAP-Azure, but entry?
CVE-2019-17566: no packages for Image SLES15-SP5-SAP-Azure-LI-BYOS, but entry?
CVE-2019-17566: no packages for Image SLES15-SP5-SAP-Azure-LI-BYOS-Production, but entry?
CVE-2019-17566: no packages for Image SLES15-SP5-SAP-Azure-VLI-BYOS, but entry?
CVE-2019-17566: no packages for Image SLES15-SP5-SAP-Azure-VLI-BYOS-Production, but entry?
CVE-2019-17566: no packages for Image SLES15-SP5-SAP-EC2, but entry?
CVE-2019-17566: no packages for Image SLES15-SP5-SAP-GCE, but entry?
CVE-2019-17566: no packages for Image SLES15-SP5-SAPCAL-Azure, but entry?
CVE-2019-17566: no packages for Image SLES15-SP5-SAPCAL-EC2, but entry?
CVE-2019-17566: no packages for Image SLES15-SP5-SAPCAL-GCE, but entry?
CVE-2019-17566: no packages for Image SLES15-SP6-SAP, but entry?
CVE-2019-17566: no packages for Image SLES15-SP6-SAP-Azure, but entry?
CVE-2019-17566: no packages for Image SLES15-SP6-SAP-Azure-LI-BYOS, but entry?
CVE-2019-17566: no packages for Image SLES15-SP6-SAP-Azure-LI-BYOS-Production, but entry?
CVE-2019-17566: no packages for Image SLES15-SP6-SAP-Azure-VLI-BYOS, but entry?
CVE-2019-17566: no packages for Image SLES15-SP6-SAP-Azure-VLI-BYOS-Production, but entry?
CVE-2019-17566: no packages for Image SLES15-SP6-SAP-EC2, but entry?
CVE-2019-17566: no packages for Image SLES15-SP6-SAP-GCE, but entry?
CVE-2019-17566: no packages for Image SLES15-SP6-SAPCAL, but entry?
CVE-2019-17566: no packages for Image SLES15-SP6-SAPCAL-Azure, but entry?
CVE-2019-17566: no packages for Image SLES15-SP6-SAPCAL-EC2, but entry?
CVE-2019-17566: no packages for Image SLES15-SP6-SAPCAL-GCE, but entry?
CVE-2019-17566: no packages for SUSE CaaS Platform 4.0, but entry?
CVE-2019-17566: no packages for SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS, but entry?
CVE-2019-17566: no packages for SUSE Linux Enterprise Module for Basesystem 15 SP4, but entry?
CVE-2019-17566: no packages for SUSE Linux Enterprise Module for Basesystem 15 SP5, but entry?
CVE-2019-17566: no packages for SUSE Linux Enterprise Module for Basesystem 15 SP6, but entry?
CVE-2019-17566: no packages for SUSE Linux Enterprise Module for Development Tools 15 SP6, but entry?
CVE-2019-17566: no packages for SUSE Linux Enterprise Module for Package Hub 15 SP4, but entry?
CVE-2019-17566: no packages for SUSE Linux Enterprise Module for Package Hub 15 SP5, but entry?
CVE-2019-17566: no packages for SUSE Linux Enterprise Module for Web and Scripting 15 SP4, but entry?
CVE-2019-17566: no packages for SUSE Linux Enterprise Module for Web and Scripting 15 SP5, but entry?
CVE-2019-17566: no packages for SUSE Linux Enterprise Module for Web and Scripting 15 SP6, but entry?
CVE-2019-17566: no packages for SUSE Linux Enterprise Server 15 SP1-LTSS, but entry?
CVE-2019-17566: no packages for SUSE Linux Enterprise Server 15 SP4-TERADATA, but entry?
CVE-2019-17566: no packages for SUSE Linux Enterprise Server for SAP Applications 15 SP1, but entry?
CVE-2019-17566: no packages for SUSE Linux Enterprise Workstation Extension 15 SP4, but entry?
CVE-2019-17566: no packages for SUSE Linux Enterprise Workstation Extension 15 SP5, but entry?
CVE-2019-17566: no packages for SUSE Linux Enterprise Workstation Extension 15 SP6, but entry?
CVE-2019-17566: no packages for SUSE Manager Proxy 4.2, but entry?
CVE-2019-17566: no packages for SUSE Manager Retail Branch Server 4.2, but entry?
CVE-2019-17566: no packages for SUSE Manager Server 4.2, but entry?
CVE-2019-17566: no packages for SUSE Manager Server Module 4.2, but entry?
CVE-2019-17566: no packages for SUSE Manager Server Module 4.3, but entry?
CVE-2019-17566: no packages for Container bci/kiwi:9.24.43-8.6, but entry?
CVE-2019-17566: no packages for Container bci/openjdk-devel:11-6.2, but entry?
CVE-2019-17566: no packages for Container bci/openjdk-devel:17-14.11, but entry?
CVE-2019-17566: no packages for Container bci/openjdk-devel:17-7.2, but entry?
CVE-2019-17566: no packages for Container bci/openjdk:11-7.1, but entry?
CVE-2019-17566: no packages for Container bci/openjdk:17-7.1, but entry?
CVE-2019-17566: no packages for Container bci/openjdk:latest, but entry?
CVE-2019-17566: no packages for Container suse/manager/5.0/x86_64/server-attestation:5.0.0-beta2.2.16, but entry?
CVE-2019-17566: no packages for Container suse/manager/5.0/x86_64/server:5.0.0-beta1.2.122, but entry?
CVE-2019-17566: no packages for Image SLES15-SP2-SAP-Azure, but entry?
CVE-2019-17566: no packages for Image SLES15-SP2-SAP-Azure-LI-BYOS-Production, but entry?
CVE-2019-17566: no packages for Image SLES15-SP2-SAP-Azure-VLI-BYOS-Production, but entry?
CVE-2019-17566: no packages for Image SLES15-SP2-SAP-BYOS-Azure, but entry?
CVE-2019-17566: no packages for Image SLES15-SP2-SAP-BYOS-EC2-HVM, but entry?
CVE-2019-17566: no packages for Image SLES15-SP2-SAP-BYOS-GCE, but entry?
CVE-2019-17566: no packages for Image SLES15-SP2-SAP-EC2-HVM, but entry?
CVE-2019-17566: no packages for Image SLES15-SP2-SAP-GCE, but entry?
CVE-2019-17566: no packages for Image SLES15-SP3-Manager-4-2-Server-BYOS-Azure, but entry?
CVE-2019-17566: no packages for Image SLES15-SP3-Manager-4-2-Server-BYOS-EC2-HVM, but entry?
CVE-2019-17566: no packages for Image SLES15-SP3-Manager-4-2-Server-BYOS-GCE, but entry?
CVE-2019-17566: no packages for Image SLES15-SP3-SAP-Azure-LI-BYOS-Production, but entry?
CVE-2019-17566: no packages for Image SLES15-SP3-SAP-Azure-VLI-BYOS-Production, but entry?
CVE-2019-17566: no packages for Image SLES15-SP3-SAPCAL-Azure, but entry?
CVE-2019-17566: no packages for Image SLES15-SP3-SAPCAL-EC2-HVM, but entry?
CVE-2019-17566: no packages for Image SLES15-SP3-SAPCAL-GCE, but entry?
CVE-2019-17566: no packages for Image SLES15-SP4-Manager-Server-4-3, but entry?
CVE-2019-17566: no packages for Image SLES15-SP4-Manager-Server-4-3-Azure-llc, but entry?
CVE-2019-17566: no packages for Image SLES15-SP4-Manager-Server-4-3-Azure-ltd, but entry?
CVE-2019-17566: no packages for Image SLES15-SP4-Manager-Server-4-3-BYOS, but entry?
CVE-2019-17566: no packages for Image SLES15-SP4-Manager-Server-4-3-BYOS-Azure, but entry?
CVE-2019-17566: no packages for Image SLES15-SP4-Manager-Server-4-3-BYOS-EC2, but entry?
CVE-2019-17566: no packages for Image SLES15-SP4-Manager-Server-4-3-BYOS-GCE, but entry?
CVE-2019-17566: no packages for Image SLES15-SP4-Manager-Server-4-3-EC2-llc, but entry?
CVE-2019-17566: no packages for Image SLES15-SP4-Manager-Server-4-3-EC2-ltd, but entry?
CVE-2019-17566: no packages for Image SLES15-SP4-SAP, but entry?
CVE-2019-17566: no packages for Image SLES15-SP4-SAP-Azure, but entry?
CVE-2019-17566: no packages for Image SLES15-SP4-SAP-Azure-LI-BYOS, but entry?
CVE-2019-17566: no packages for Image SLES15-SP4-SAP-Azure-LI-BYOS-Production, but entry?
CVE-2019-17566: no packages for Image SLES15-SP4-SAP-Azure-VLI-BYOS, but entry?
CVE-2019-17566: no packages for Image SLES15-SP4-SAP-Azure-VLI-BYOS-Production, but entry?
CVE-2019-17566: no packages for Image SLES15-SP4-SAP-EC2, but entry?
CVE-2019-17566: no packages for Image SLES15-SP4-SAP-GCE, but entry?
CVE-2019-17566: no packages for Image SLES15-SP4-SAPCAL, but entry?
CVE-2019-17566: no packages for Image SLES15-SP4-SAPCAL-Azure, but entry?
CVE-2019-17566: no packages for Image SLES15-SP4-SAPCAL-EC2, but entry?
CVE-2019-17566: no packages for Image SLES15-SP4-SAPCAL-GCE, but entry?
CVE-2019-17566: no packages for Image SLES15-SP5-SAP-Azure, but entry?
CVE-2019-17566: no packages for Image SLES15-SP5-SAP-Azure-LI-BYOS, but entry?
CVE-2019-17566: no packages for Image SLES15-SP5-SAP-Azure-LI-BYOS-Production, but entry?
CVE-2019-17566: no packages for Image SLES15-SP5-SAP-Azure-VLI-BYOS, but entry?
CVE-2019-17566: no packages for Image SLES15-SP5-SAP-Azure-VLI-BYOS-Production, but entry?
CVE-2019-17566: no packages for Image SLES15-SP5-SAP-EC2, but entry?
CVE-2019-17566: no packages for Image SLES15-SP5-SAP-GCE, but entry?
CVE-2019-17566: no packages for Image SLES15-SP5-SAPCAL-Azure, but entry?
CVE-2019-17566: no packages for Image SLES15-SP5-SAPCAL-EC2, but entry?
CVE-2019-17566: no packages for Image SLES15-SP5-SAPCAL-GCE, but entry?
CVE-2019-17566: no packages for Image SLES15-SP6-SAP, but entry?
CVE-2019-17566: no packages for Image SLES15-SP6-SAP-Azure, but entry?
CVE-2019-17566: no packages for Image SLES15-SP6-SAP-Azure-LI-BYOS, but entry?
CVE-2019-17566: no packages for Image SLES15-SP6-SAP-Azure-LI-BYOS-Production, but entry?
CVE-2019-17566: no packages for Image SLES15-SP6-SAP-Azure-VLI-BYOS, but entry?
CVE-2019-17566: no packages for Image SLES15-SP6-SAP-Azure-VLI-BYOS-Production, but entry?
CVE-2019-17566: no packages for Image SLES15-SP6-SAP-EC2, but entry?
CVE-2019-17566: no packages for Image SLES15-SP6-SAP-GCE, but entry?
CVE-2019-17566: no packages for Image SLES15-SP6-SAPCAL, but entry?
CVE-2019-17566: no packages for Image SLES15-SP6-SAPCAL-Azure, but entry?
CVE-2019-17566: no packages for Image SLES15-SP6-SAPCAL-EC2, but entry?
CVE-2019-17566: no packages for Image SLES15-SP6-SAPCAL-GCE, but entry?
CVE-2019-17566: no packages for SUSE CaaS Platform 4.0, but entry?
CVE-2019-17566: no packages for SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS, but entry?
CVE-2019-17566: no packages for SUSE Linux Enterprise Module for Basesystem 15 SP4, but entry?
CVE-2019-17566: no packages for SUSE Linux Enterprise Module for Basesystem 15 SP5, but entry?
CVE-2019-17566: no packages for SUSE Linux Enterprise Module for Basesystem 15 SP6, but entry?
CVE-2019-17566: no packages for SUSE Linux Enterprise Module for Development Tools 15 SP6, but entry?
CVE-2019-17566: no packages for SUSE Linux Enterprise Module for Package Hub 15 SP4, but entry?
CVE-2019-17566: no packages for SUSE Linux Enterprise Module for Package Hub 15 SP5, but entry?
CVE-2019-17566: no packages for SUSE Linux Enterprise Module for Web and Scripting 15 SP4, but entry?
CVE-2019-17566: no packages for SUSE Linux Enterprise Module for Web and Scripting 15 SP5, but entry?
CVE-2019-17566: no packages for SUSE Linux Enterprise Module for Web and Scripting 15 SP6, but entry?
CVE-2019-17566: no packages for SUSE Linux Enterprise Server 15 SP1-LTSS, but entry?
CVE-2019-17566: no packages for SUSE Linux Enterprise Server 15 SP4-TERADATA, but entry?
CVE-2019-17566: no packages for SUSE Linux Enterprise Server for SAP Applications 15 SP1, but entry?
CVE-2019-17566: no packages for SUSE Linux Enterprise Workstation Extension 15 SP4, but entry?
CVE-2019-17566: no packages for SUSE Linux Enterprise Workstation Extension 15 SP5, but entry?
CVE-2019-17566: no packages for SUSE Linux Enterprise Workstation Extension 15 SP6, but entry?
CVE-2019-17566: no packages for SUSE Manager Proxy 4.2, but entry?
CVE-2019-17566: no packages for SUSE Manager Retail Branch Server 4.2, but entry?
CVE-2019-17566: no packages for SUSE Manager Server 4.2, but entry?
CVE-2019-17566: no packages for SUSE Manager Server Module 4.2, but entry?
CVE-2019-17566: no packages for SUSE Manager Server Module 4.3, but entry?
skipping CVE-2019-17567 as CVE page is older than CVRF-CVE file.
skipping CVE-2019-17563 as CVE page is older than CVRF-CVE file.
no cpe found for SUSE Package Hub 15 SP1 in CVE-2019-17545
skipping CVE-2019-17546 as CVE page is older than CVRF-CVE file.
no cpe found for SUSE Liberty Linux 7 LTSS in CVE-2019-17541
no cpe found for SUSE Liberty Linux 7 LTSS in CVE-2019-17540
no cpe found for SUSE Package Hub 15 SP1 in CVE-2019-17455
skipping CVE-2019-17498 as CVE page is older than CVRF-CVE file.
no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2019-17402
skipping CVE-2019-17451 as CVE page is older than CVRF-CVE file.
skipping CVE-2019-17450 as CVE page is older than CVRF-CVE file.
skipping CVE-2019-17361 as CVE page is older than CVRF-CVE file.
no cpe found for SUSE Package Hub 15 SP1 in CVE-2019-17358
no cpe found for SUSE Package Hub 15 SP1 in CVE-2019-17357
skipping CVE-2019-17351 as CVE page is older than CVRF-CVE file.
skipping CVE-2019-17350 as CVE page is older than CVRF-CVE file.
skipping CVE-2019-17349 as CVE page is older than CVRF-CVE file.
skipping CVE-2019-17348 as CVE page is older than CVRF-CVE file.
skipping CVE-2019-17347 as CVE page is older than CVRF-CVE file.
skipping CVE-2019-17346 as CVE page is older than CVRF-CVE file.
skipping CVE-2019-17345 as CVE page is older than CVRF-CVE file.
skipping CVE-2019-17344 as CVE page is older than CVRF-CVE file.
skipping CVE-2019-17343 as CVE page is older than CVRF-CVE file.
skipping CVE-2019-17342 as CVE page is older than CVRF-CVE file.
skipping CVE-2019-17341 as CVE page is older than CVRF-CVE file.
skipping CVE-2019-17340 as CVE page is older than CVRF-CVE file.
no cpe found for SUSE Liberty Linux 7 LTSS in CVE-2019-17185
no cpe found for HPE Helion OpenStack Cloud 8 in CVE-2019-17134
skipping CVE-2019-17133 as CVE page is older than CVRF-CVE file.
no cpe found for SUSE Package Hub 15 in CVE-2019-17069
no cpe found for SUSE Package Hub 15 SP1 in CVE-2019-17069
skipping CVE-2019-17075 as CVE page is older than CVRF-CVE file.
no cpe found for SUSE Package Hub 15 in CVE-2019-17068
no cpe found for SUSE Package Hub 15 SP1 in CVE-2019-17068
skipping CVE-2019-17064 as CVE page is older than CVRF-CVE file.
skipping CVE-2019-17056 as CVE page is older than CVRF-CVE file.
skipping CVE-2019-17055 as CVE page is older than CVRF-CVE file.
skipping CVE-2019-17053 as CVE page is older than CVRF-CVE file.
skipping CVE-2019-17042 as CVE page is older than CVRF-CVE file.
notsure where SUSE Linux Enterprise Module for Certifications 15 SP3 is contained?
skipping CVE-2019-17014 as CVE page is older than CVRF-CVE file.
skipping CVE-2019-17013 as CVE page is older than CVRF-CVE file.
skipping CVE-2019-17007 as CVE page is older than CVRF-CVE file.
skipping CVE-2019-16994 as CVE page is older than CVRF-CVE file.
no cpe found for SUSE Package Hub 15 SP1 in CVE-2019-16928
no cpe found for SUSE Package Hub 15 SP2 in CVE-2019-16928
skipping CVE-2019-16927 as CVE page is older than CVRF-CVE file.
skipping CVE-2019-16921 as CVE page is older than CVRF-CVE file.
no cpe found for HPE Helion OpenStack Cloud 8 in CVE-2019-16865
no cpe found for HPE Helion OpenStack Cloud 8 in CVE-2019-16792
no cpe found for HPE Helion OpenStack Cloud 8 in CVE-2019-16789
no cpe found for HPE Helion OpenStack Cloud 8 in CVE-2019-16786
no cpe found for HPE Helion OpenStack Cloud 8 in CVE-2019-16785
no cpe found for SUSE Package Hub 15 SP1 in CVE-2019-16779
skipping CVE-2019-16782 as CVE page is older than CVRF-CVE file.
skipping CVE-2019-16746 as CVE page is older than CVRF-CVE file.
no cpe found for SUSE Package Hub 15 SP1 in CVE-2019-16723
no cpe found for SUSE Liberty Linux 7 LTSS in CVE-2019-16707
skipping CVE-2019-16714 as CVE page is older than CVRF-CVE file.
skipping CVE-2019-16713 as CVE page is older than CVRF-CVE file.
skipping CVE-2019-16712 as CVE page is older than CVRF-CVE file.
skipping CVE-2019-16711 as CVE page is older than CVRF-CVE file.
skipping CVE-2019-16710 as CVE page is older than CVRF-CVE file.
skipping CVE-2019-16709 as CVE page is older than CVRF-CVE file.
skipping CVE-2019-16708 as CVE page is older than CVRF-CVE file.
skipping CVE-2019-16413 as CVE page is older than CVRF-CVE file.
no cpe found for SUSE Package Hub 15 in CVE-2019-16375
no cpe found for SUSE Package Hub 15 SP1 in CVE-2019-16375
no cpe found for SUSE Package Hub 15 SP2 in CVE-2019-16375
no cpe found for SUSE Package Hub 15 SP1 in CVE-2019-16328
no cpe found for SUSE Package Hub 15 SP2 in CVE-2019-16275
skipping CVE-2019-16234 as CVE page is older than CVRF-CVE file.
skipping CVE-2019-16233 as CVE page is older than CVRF-CVE file.
skipping CVE-2019-16232 as CVE page is older than CVRF-CVE file.
skipping CVE-2019-16231 as CVE page is older than CVRF-CVE file.
skipping CVE-2019-16229 as CVE page is older than CVRF-CVE file.
skipping CVE-2019-16168 as CVE page is older than CVRF-CVE file.
skipping CVE-2019-16167 as CVE page is older than CVRF-CVE file.
no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2019-16163
no cpe found for SUSE Package Hub 15 SP1 in CVE-2019-16159
no cpe found for SUSE Package Hub 15 SP2 in CVE-2019-16095
skipping CVE-2019-16115 as CVE page is older than CVRF-CVE file.
no cpe found for SUSE Package Hub 15 SP2 in CVE-2019-16094
no cpe found for SUSE Package Hub 15 SP2 in CVE-2019-16093
no cpe found for SUSE Package Hub 15 SP2 in CVE-2019-16092
no cpe found for SUSE Package Hub 15 SP2 in CVE-2019-16091
skipping CVE-2019-16089 as CVE page is older than CVRF-CVE file.
skipping CVE-2019-16088 as CVE page is older than CVRF-CVE file.
skipping CVE-2019-16058 as CVE page is older than CVRF-CVE file.
no cpe found for SUSE Package Hub 15 in CVE-2019-15942
no cpe found for SUSE Package Hub 15 SP1 in CVE-2019-15942
no cpe found for SUSE Package Hub 15 in CVE-2019-15903
no cpe found for SUSE Package Hub 15 SP1 in CVE-2019-15903
skipping CVE-2019-15927 as CVE page is older than CVRF-CVE file.
skipping CVE-2019-15926 as CVE page is older than CVRF-CVE file.
skipping CVE-2019-15925 as CVE page is older than CVRF-CVE file.
skipping CVE-2019-15924 as CVE page is older than CVRF-CVE file.
skipping CVE-2019-15923 as CVE page is older than CVRF-CVE file.
skipping CVE-2019-15922 as CVE page is older than CVRF-CVE file.
skipping CVE-2019-15921 as CVE page is older than CVRF-CVE file.
skipping CVE-2019-15920 as CVE page is older than CVRF-CVE file.
skipping CVE-2019-15919 as CVE page is older than CVRF-CVE file.
skipping CVE-2019-15918 as CVE page is older than CVRF-CVE file.
skipping CVE-2019-15917 as CVE page is older than CVRF-CVE file.
skipping CVE-2019-15916 as CVE page is older than CVRF-CVE file.
no cpe found for SUSE Package Hub 15 in CVE-2019-15892
no cpe found for SUSE Package Hub 15 SP1 in CVE-2019-15892
skipping CVE-2019-15902 as CVE page is older than CVRF-CVE file.
no cpe found for SUSE Package Hub 15 SP1 in CVE-2019-15846
skipping CVE-2019-15890 as CVE page is older than CVRF-CVE file.
skipping CVE-2019-15860 as CVE page is older than CVRF-CVE file.
skipping CVE-2019-15847 as CVE page is older than CVRF-CVE file.
skipping CVE-2019-15807 as CVE page is older than CVRF-CVE file.
skipping CVE-2019-15794 as CVE page is older than CVRF-CVE file.
no cpe found for SUSE Package Hub 15 SP1 in CVE-2019-15784
no cpe found for SUSE Package Hub 15 in CVE-2019-15757
no cpe found for SUSE Package Hub 15 SP1 in CVE-2019-15757
no cpe found for HPE Helion OpenStack Cloud 8 in CVE-2019-15753
skipping CVE-2019-15690 as CVE page is older than CVRF-CVE file.
no cpe found for HPE Helion OpenStack Cloud 8 in CVE-2019-15635
no cpe found for SUSE Manager Tools 15 SP1 in CVE-2019-15635
skipping CVE-2019-15666 as CVE page is older than CVRF-CVE file.
no cpe found for SUSE Package Hub 15 in CVE-2019-15624
no cpe found for SUSE Package Hub 15 SP1 in CVE-2019-15624
no cpe found for SUSE Package Hub 15 in CVE-2019-15623
no cpe found for SUSE Package Hub 15 SP1 in CVE-2019-15623
no cpe found for SUSE Package Hub 15 in CVE-2019-15621
no cpe found for SUSE Package Hub 15 SP1 in CVE-2019-15621
no cpe found for SUSE Package Hub 15 in CVE-2019-15613
no cpe found for SUSE Package Hub 15 SP1 in CVE-2019-15613
skipping CVE-2019-15601 as CVE page is older than CVRF-CVE file.
skipping CVE-2019-15587 as CVE page is older than CVRF-CVE file.
no cpe found for SUSE Package Hub 15 in CVE-2019-15540
no cpe found for SUSE Package Hub 15 SP1 in CVE-2019-15540
skipping CVE-2019-15538 as CVE page is older than CVRF-CVE file.
skipping CVE-2019-15523 as CVE page is older than CVRF-CVE file.
skipping CVE-2019-15522 as CVE page is older than CVRF-CVE file.
skipping CVE-2019-15505 as CVE page is older than CVRF-CVE file.
skipping CVE-2019-15504 as CVE page is older than CVRF-CVE file.
skipping CVE-2019-15292 as CVE page is older than CVRF-CVE file.
skipping CVE-2019-15291 as CVE page is older than CVRF-CVE file.
skipping CVE-2019-15290 as CVE page is older than CVRF-CVE file.
skipping CVE-2019-15239 as CVE page is older than CVRF-CVE file.
no cpe found for SUSE Package Hub 15 SP2 in CVE-2019-15232
no cpe found for SUSE Package Hub 15 SP3 in CVE-2019-15232
skipping CVE-2019-15222 as CVE page is older than CVRF-CVE file.
skipping CVE-2019-15221 as CVE page is older than CVRF-CVE file.
skipping CVE-2019-15220 as CVE page is older than CVRF-CVE file.
skipping CVE-2019-15219 as CVE page is older than CVRF-CVE file.
skipping CVE-2019-15218 as CVE page is older than CVRF-CVE file.
skipping CVE-2019-15217 as CVE page is older than CVRF-CVE file.
skipping CVE-2019-15216 as CVE page is older than CVRF-CVE file.
skipping CVE-2019-15215 as CVE page is older than CVRF-CVE file.
skipping CVE-2019-15214 as CVE page is older than CVRF-CVE file.
skipping CVE-2019-15213 as CVE page is older than CVRF-CVE file.
skipping CVE-2019-15212 as CVE page is older than CVRF-CVE file.
skipping CVE-2019-15211 as CVE page is older than CVRF-CVE file.
skipping CVE-2019-15145 as CVE page is older than CVRF-CVE file.
skipping CVE-2019-15144 as CVE page is older than CVRF-CVE file.
skipping CVE-2019-15143 as CVE page is older than CVRF-CVE file.
skipping CVE-2019-15142 as CVE page is older than CVRF-CVE file.
skipping CVE-2019-15141 as CVE page is older than CVRF-CVE file.
skipping CVE-2019-15140 as CVE page is older than CVRF-CVE file.
skipping CVE-2019-15139 as CVE page is older than CVRF-CVE file.
skipping CVE-2019-15118 as CVE page is older than CVRF-CVE file.
skipping CVE-2019-15117 as CVE page is older than CVRF-CVE file.
skipping CVE-2019-15099 as CVE page is older than CVRF-CVE file.
skipping CVE-2019-15098 as CVE page is older than CVRF-CVE file.
skipping CVE-2019-15090 as CVE page is older than CVRF-CVE file.
no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2019-15052
no cpe found for HPE Helion OpenStack Cloud 8 in CVE-2019-15043
no cpe found for SUSE Manager Tools 15 SP1 in CVE-2019-15043
no cpe found for SUSE Package Hub 15 SP1 in CVE-2019-15043
no cpe found for HPE Helion OpenStack Cloud 8 in CVE-2019-15026
skipping CVE-2019-15031 as CVE page is older than CVRF-CVE file.
skipping CVE-2019-15030 as CVE page is older than CVRF-CVE file.
no cpe found for SUSE Liberty Linux 7 LTSS in CVE-2019-14981
skipping CVE-2019-14980 as CVE page is older than CVRF-CVE file.
no cpe found for SUSE Liberty Linux 7 LTSS in CVE-2019-14973
no cpe found for SUSE Package Hub 15 SP1 in CVE-2019-14970
no cpe found for HPE Helion OpenStack Cloud 8 in CVE-2019-14905
no cpe found for SUSE Package Hub 15 SP1 in CVE-2019-14905
no cpe found for SUSE Package Hub 15 SP3 in CVE-2019-14905
no cpe found for HPE Helion OpenStack Cloud 8 in CVE-2019-14904
no cpe found for SUSE Package Hub 15 SP1 in CVE-2019-14904
no cpe found for SUSE Package Hub 15 SP3 in CVE-2019-14904
skipping CVE-2019-14901 as CVE page is older than CVRF-CVE file.
skipping CVE-2019-14900 as CVE page is older than CVRF-CVE file.
skipping CVE-2019-14899 as CVE page is older than CVRF-CVE file.
skipping CVE-2019-14898 as CVE page is older than CVRF-CVE file.
skipping CVE-2019-14895 as CVE page is older than CVRF-CVE file.
no cpe found for SUSE Package Hub 15 SP3 in CVE-2019-14870
no cpe found for SUSE Package Hub 15 SP4 in CVE-2019-14870
no cpe found for SUSE Package Hub 15 SP6 in CVE-2019-14868
--- /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2019-14868.xml 2024-09-21 02:32:01.540346000 +0200
+++ /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2019-14868.xml.new 2024-10-29 02:22:55.409847000 +0100
@@ -14,13 +14,13 @@
1
- 32
- 2024-09-21T00:32:00Z
+ 33
+ 2024-10-29T01:22:55Z
current
2021-05-30T14:30:42Z
- 2024-09-21T00:32:00Z
+ 2024-10-29T01:22:55Z
cve-database/bin/generate-cvrf-cve.pl
2020-12-27T01:00:00Z
@@ -62,6 +62,21 @@
Image SLES12-SP5-EC2-SAP-BYOS
+
+
+ Image SLES12-SP5-GCE-BYOS
+
+
+
+
+ Image SLES12-SP5-GCE-SAP-BYOS
+
+
+
+
+ Image SLES12-SP5-GCE-SAP-On-Demand
+
+
Image SLES12-SP5-SAP-Azure-LI-BYOS-Production
@@ -463,6 +478,15 @@
ksh-93vu-19.3.2 as a component of Image SLES12-SP5-EC2-SAP-BYOS
+
+ ksh-93vu-19.3.2 as a component of Image SLES12-SP5-GCE-BYOS
+
+
+ ksh-93vu-19.3.2 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+
+ ksh-93vu-19.3.2 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
ksh-93vu-19.3.2 as a component of Image SLES12-SP5-SAP-Azure-LI-BYOS-Production
@@ -526,6 +550,9 @@
Image SLES12-SP5-Azure-SAP-BYOS:ksh-93vu-19.3.2
Image SLES12-SP5-EC2-BYOS:ksh-93vu-19.3.2
Image SLES12-SP5-EC2-SAP-BYOS:ksh-93vu-19.3.2
+ Image SLES12-SP5-GCE-BYOS:ksh-93vu-19.3.2
+ Image SLES12-SP5-GCE-SAP-BYOS:ksh-93vu-19.3.2
+ Image SLES12-SP5-GCE-SAP-On-Demand:ksh-93vu-19.3.2
Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:ksh-93vu-19.3.2
Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production:ksh-93vu-19.3.2
SUSE Liberty Linux 7:ksh-20120801-140.el7_7
no cpe found for SUSE Liberty Linux 7 LTSS in CVE-2019-14866
no cpe found for SUSE Package Hub 15 SP1 in CVE-2019-14864
skipping CVE-2019-14865 as CVE page is older than CVRF-CVE file.
no cpe found for HPE Helion OpenStack Cloud 8 in CVE-2019-14859
no cpe found for HPE Helion OpenStack Cloud 8 in CVE-2019-14858
no cpe found for SUSE Package Hub 15 SP1 in CVE-2019-14858
no cpe found for HPE Helion OpenStack Cloud 8 in CVE-2019-14856
no cpe found for SUSE Package Hub 15 SP1 in CVE-2019-14856
skipping CVE-2019-14855 as CVE page is older than CVRF-CVE file.
no cpe found for HPE Helion OpenStack Cloud 8 in CVE-2019-14846
no cpe found for SUSE Package Hub 15 SP1 in CVE-2019-14846
no cpe found for SUSE Package Hub 15 SP3 in CVE-2019-14846
no cpe found for HPE Helion OpenStack Cloud 8 in CVE-2019-14834
skipping CVE-2019-14844 as CVE page is older than CVRF-CVE file.
skipping CVE-2019-14835 as CVE page is older than CVRF-CVE file.
skipping CVE-2019-14822 as CVE page is older than CVRF-CVE file.
skipping CVE-2019-14816 as CVE page is older than CVRF-CVE file.
skipping CVE-2019-14815 as CVE page is older than CVRF-CVE file.
skipping CVE-2019-14814 as CVE page is older than CVRF-CVE file.
no cpe found for SUSE Package Hub 15 SP1 in CVE-2019-14778
no cpe found for SUSE Package Hub 15 SP1 in CVE-2019-14777
no cpe found for SUSE Package Hub 15 SP1 in CVE-2019-14776
no cpe found for SUSE Package Hub 15 in CVE-2019-14744
no cpe found for SUSE Package Hub 15 SP1 in CVE-2019-14744
skipping CVE-2019-14763 as CVE page is older than CVRF-CVE file.
skipping CVE-2019-14751 as CVE page is older than CVRF-CVE file.
skipping CVE-2019-14615 as CVE page is older than CVRF-CVE file.
skipping CVE-2019-14587 as CVE page is older than CVRF-CVE file.
skipping CVE-2019-14586 as CVE page is older than CVRF-CVE file.
skipping CVE-2019-14560 as CVE page is older than CVRF-CVE file.
skipping CVE-2019-14558 as CVE page is older than CVRF-CVE file.
no cpe found for SUSE Package Hub 15 SP1 in CVE-2019-14535
no cpe found for SUSE Package Hub 15 SP1 in CVE-2019-14534
no cpe found for SUSE Package Hub 15 SP1 in CVE-2019-14533
no cpe found for SUSE Package Hub 15 SP5 in CVE-2019-14531
no cpe found for SUSE Package Hub 15 in CVE-2019-14524
no cpe found for SUSE Package Hub 15 SP1 in CVE-2019-14524
no cpe found for SUSE Package Hub 15 in CVE-2019-14523
no cpe found for SUSE Package Hub 15 SP1 in CVE-2019-14523
no cpe found for HPE Helion OpenStack Cloud 8 in CVE-2019-14513
no cpe found for SUSE Package Hub 15 SP1 in CVE-2019-14498
skipping CVE-2019-14494 as CVE page is older than CVRF-CVE file.
skipping CVE-2019-14444 as CVE page is older than CVRF-CVE file.
no cpe found for SUSE Package Hub 15 SP1 in CVE-2019-14438
no cpe found for SUSE Package Hub 15 SP1 in CVE-2019-14437
skipping CVE-2019-14378 as CVE page is older than CVRF-CVE file.
no cpe found for SUSE Package Hub 15 in CVE-2019-14318
no cpe found for SUSE Package Hub 15 SP1 in CVE-2019-14318
no cpe found for SUSE Package Hub 15 SP1 in CVE-2019-14296
skipping CVE-2019-14293 as CVE page is older than CVRF-CVE file.
skipping CVE-2019-14292 as CVE page is older than CVRF-CVE file.
skipping CVE-2019-14291 as CVE page is older than CVRF-CVE file.
skipping CVE-2019-14290 as CVE page is older than CVRF-CVE file.
skipping CVE-2019-14289 as CVE page is older than CVRF-CVE file.
no cpe found for SUSE Package Hub 15 SP2 in CVE-2019-14275
no cpe found for SUSE Package Hub 15 SP3 in CVE-2019-14275
skipping CVE-2019-14284 as CVE page is older than CVRF-CVE file.
skipping CVE-2019-14283 as CVE page is older than CVRF-CVE file.
no cpe found for SUSE Package Hub 15 SP1 in CVE-2019-14274
skipping CVE-2019-14250 as CVE page is older than CVRF-CVE file.
no cpe found for SUSE Package Hub 15 SP1 in CVE-2019-14235
no cpe found for SUSE Package Hub 15 SP1 in CVE-2019-14234
no cpe found for SUSE Package Hub 15 SP1 in CVE-2019-14233
no cpe found for SUSE Package Hub 15 SP1 in CVE-2019-14232
no cpe found for SUSE Package Hub 15 in CVE-2019-13962
no cpe found for SUSE Package Hub 15 SP1 in CVE-2019-13962
no cpe found for SUSE Package Hub 15 SP1 in CVE-2019-13917
no cpe found for SUSE Package Hub 15 SP1 in CVE-2019-13767
no cpe found for SUSE Package Hub 15 in CVE-2019-13764
no cpe found for SUSE Package Hub 15 SP1 in CVE-2019-13764
no cpe found for SUSE Package Hub 15 in CVE-2019-13763
no cpe found for SUSE Package Hub 15 SP1 in CVE-2019-13763
no cpe found for SUSE Package Hub 15 in CVE-2019-13762
no cpe found for SUSE Package Hub 15 SP1 in CVE-2019-13762
no cpe found for SUSE Package Hub 15 in CVE-2019-13761
no cpe found for SUSE Package Hub 15 SP1 in CVE-2019-13761
no cpe found for SUSE Package Hub 15 in CVE-2019-13759
no cpe found for SUSE Package Hub 15 SP1 in CVE-2019-13759
no cpe found for SUSE Package Hub 15 in CVE-2019-13758
no cpe found for SUSE Package Hub 15 SP1 in CVE-2019-13758
no cpe found for SUSE Package Hub 15 in CVE-2019-13757
no cpe found for SUSE Package Hub 15 SP1 in CVE-2019-13757
no cpe found for SUSE Package Hub 15 in CVE-2019-13756
no cpe found for SUSE Package Hub 15 SP1 in CVE-2019-13756
no cpe found for SUSE Package Hub 15 in CVE-2019-13755
no cpe found for SUSE Package Hub 15 SP1 in CVE-2019-13755
no cpe found for SUSE Package Hub 15 in CVE-2019-13754
no cpe found for SUSE Package Hub 15 SP1 in CVE-2019-13754
no cpe found for SUSE Package Hub 15 in CVE-2019-13753
no cpe found for SUSE Package Hub 15 SP1 in CVE-2019-13753
no cpe found for SUSE Package Hub 15 in CVE-2019-13752
no cpe found for SUSE Package Hub 15 SP1 in CVE-2019-13752
no cpe found for SUSE Package Hub 15 in CVE-2019-13751
no cpe found for SUSE Package Hub 15 SP1 in CVE-2019-13751
no cpe found for SUSE Package Hub 15 in CVE-2019-13750
no cpe found for SUSE Package Hub 15 SP1 in CVE-2019-13750
no cpe found for SUSE Package Hub 15 in CVE-2019-13749
no cpe found for SUSE Package Hub 15 SP1 in CVE-2019-13749
no cpe found for SUSE Package Hub 15 in CVE-2019-13748
no cpe found for SUSE Package Hub 15 SP1 in CVE-2019-13748
no cpe found for SUSE Package Hub 15 in CVE-2019-13747
no cpe found for SUSE Package Hub 15 SP1 in CVE-2019-13747
no cpe found for SUSE Package Hub 15 in CVE-2019-13746
no cpe found for SUSE Package Hub 15 SP1 in CVE-2019-13746
no cpe found for SUSE Package Hub 15 in CVE-2019-13745
no cpe found for SUSE Package Hub 15 SP1 in CVE-2019-13745
no cpe found for SUSE Package Hub 15 in CVE-2019-13744
no cpe found for SUSE Package Hub 15 SP1 in CVE-2019-13744
no cpe found for SUSE Package Hub 15 in CVE-2019-13743
no cpe found for SUSE Package Hub 15 SP1 in CVE-2019-13743
no cpe found for SUSE Package Hub 15 in CVE-2019-13742
no cpe found for SUSE Package Hub 15 SP1 in CVE-2019-13742
no cpe found for SUSE Package Hub 15 in CVE-2019-13741
no cpe found for SUSE Package Hub 15 SP1 in CVE-2019-13741
no cpe found for SUSE Package Hub 15 in CVE-2019-13740
no cpe found for SUSE Package Hub 15 SP1 in CVE-2019-13740
no cpe found for SUSE Package Hub 15 in CVE-2019-13739
no cpe found for SUSE Package Hub 15 SP1 in CVE-2019-13739
no cpe found for SUSE Package Hub 15 in CVE-2019-13738
no cpe found for SUSE Package Hub 15 SP1 in CVE-2019-13738
no cpe found for SUSE Package Hub 15 in CVE-2019-13737
no cpe found for SUSE Package Hub 15 SP1 in CVE-2019-13737
no cpe found for SUSE Package Hub 15 in CVE-2019-13736
no cpe found for SUSE Package Hub 15 SP1 in CVE-2019-13736
no cpe found for SUSE Package Hub 15 in CVE-2019-13735
no cpe found for SUSE Package Hub 15 SP1 in CVE-2019-13735
no cpe found for SUSE Package Hub 15 in CVE-2019-13732
no cpe found for SUSE Package Hub 15 SP1 in CVE-2019-13732
skipping CVE-2019-13734 as CVE page is older than CVRF-CVE file.
no cpe found for SUSE Package Hub 15 in CVE-2019-13730
no cpe found for SUSE Package Hub 15 SP1 in CVE-2019-13730
no cpe found for SUSE Package Hub 15 in CVE-2019-13729
no cpe found for SUSE Package Hub 15 SP1 in CVE-2019-13729
no cpe found for SUSE Package Hub 15 in CVE-2019-13728
no cpe found for SUSE Package Hub 15 SP1 in CVE-2019-13728
no cpe found for SUSE Package Hub 15 in CVE-2019-13727
no cpe found for SUSE Package Hub 15 SP1 in CVE-2019-13727
no cpe found for SUSE Package Hub 15 in CVE-2019-13726
no cpe found for SUSE Package Hub 15 SP1 in CVE-2019-13726
no cpe found for SUSE Package Hub 15 in CVE-2019-13725
no cpe found for SUSE Package Hub 15 SP1 in CVE-2019-13725
no cpe found for SUSE Package Hub 15 in CVE-2019-13724
no cpe found for SUSE Package Hub 15 SP1 in CVE-2019-13724
no cpe found for SUSE Package Hub 15 in CVE-2019-13723
no cpe found for SUSE Package Hub 15 SP1 in CVE-2019-13723
no cpe found for SUSE Package Hub 15 in CVE-2019-13721
no cpe found for SUSE Package Hub 15 SP1 in CVE-2019-13721
no cpe found for SUSE Package Hub 15 in CVE-2019-13720
no cpe found for SUSE Package Hub 15 SP1 in CVE-2019-13720
no cpe found for SUSE Package Hub 15 in CVE-2019-13719
no cpe found for SUSE Package Hub 15 SP1 in CVE-2019-13719
no cpe found for SUSE Package Hub 15 in CVE-2019-13718
no cpe found for SUSE Package Hub 15 SP1 in CVE-2019-13718
no cpe found for SUSE Package Hub 15 in CVE-2019-13717
no cpe found for SUSE Package Hub 15 SP1 in CVE-2019-13717
no cpe found for SUSE Package Hub 15 in CVE-2019-13716
no cpe found for SUSE Package Hub 15 SP1 in CVE-2019-13716
no cpe found for SUSE Package Hub 15 in CVE-2019-13715
no cpe found for SUSE Package Hub 15 SP1 in CVE-2019-13715
no cpe found for SUSE Package Hub 15 in CVE-2019-13714
no cpe found for SUSE Package Hub 15 SP1 in CVE-2019-13714
no cpe found for SUSE Package Hub 15 in CVE-2019-13713
no cpe found for SUSE Package Hub 15 SP1 in CVE-2019-13713
no cpe found for SUSE Package Hub 15 in CVE-2019-13711
no cpe found for SUSE Package Hub 15 SP1 in CVE-2019-13711
no cpe found for SUSE Package Hub 15 in CVE-2019-13710
no cpe found for SUSE Package Hub 15 SP1 in CVE-2019-13710
no cpe found for SUSE Package Hub 15 in CVE-2019-13709
no cpe found for SUSE Package Hub 15 SP1 in CVE-2019-13709
no cpe found for SUSE Package Hub 15 in CVE-2019-13708
no cpe found for SUSE Package Hub 15 SP1 in CVE-2019-13708
no cpe found for SUSE Package Hub 15 in CVE-2019-13707
no cpe found for SUSE Package Hub 15 SP1 in CVE-2019-13707
no cpe found for SUSE Package Hub 15 in CVE-2019-13706
no cpe found for SUSE Package Hub 15 SP1 in CVE-2019-13706
no cpe found for SUSE Package Hub 15 in CVE-2019-13705
no cpe found for SUSE Package Hub 15 SP1 in CVE-2019-13705
no cpe found for SUSE Package Hub 15 in CVE-2019-13704
no cpe found for SUSE Package Hub 15 SP1 in CVE-2019-13704
no cpe found for SUSE Package Hub 15 in CVE-2019-13703
no cpe found for SUSE Package Hub 15 SP1 in CVE-2019-13703
no cpe found for SUSE Package Hub 15 in CVE-2019-13702
no cpe found for SUSE Package Hub 15 SP1 in CVE-2019-13702
no cpe found for SUSE Package Hub 15 in CVE-2019-13701
no cpe found for SUSE Package Hub 15 SP1 in CVE-2019-13701
no cpe found for SUSE Package Hub 15 in CVE-2019-13700
no cpe found for SUSE Package Hub 15 SP1 in CVE-2019-13700
no cpe found for SUSE Package Hub 15 in CVE-2019-13699
no cpe found for SUSE Package Hub 15 SP1 in CVE-2019-13699
no cpe found for SUSE Package Hub 15 in CVE-2019-13697
no cpe found for SUSE Package Hub 15 SP1 in CVE-2019-13697
no cpe found for SUSE Package Hub 15 in CVE-2019-13696
no cpe found for SUSE Package Hub 15 SP1 in CVE-2019-13696
no cpe found for SUSE Package Hub 15 in CVE-2019-13695
no cpe found for SUSE Package Hub 15 SP1 in CVE-2019-13695
no cpe found for SUSE Package Hub 15 in CVE-2019-13694
no cpe found for SUSE Package Hub 15 SP1 in CVE-2019-13694
no cpe found for SUSE Package Hub 15 in CVE-2019-13693
no cpe found for SUSE Package Hub 15 SP1 in CVE-2019-13693
no cpe found for SUSE Package Hub 15 in CVE-2019-13688
no cpe found for SUSE Package Hub 15 SP1 in CVE-2019-13688
no cpe found for SUSE Package Hub 15 in CVE-2019-13687
no cpe found for SUSE Package Hub 15 SP1 in CVE-2019-13687
no cpe found for SUSE Package Hub 15 in CVE-2019-13686
no cpe found for SUSE Package Hub 15 SP1 in CVE-2019-13686
no cpe found for SUSE Package Hub 15 in CVE-2019-13685
no cpe found for SUSE Package Hub 15 SP1 in CVE-2019-13685
no cpe found for SUSE Package Hub 15 in CVE-2019-13683
no cpe found for SUSE Package Hub 15 SP1 in CVE-2019-13683
no cpe found for SUSE Package Hub 15 in CVE-2019-13682
no cpe found for SUSE Package Hub 15 SP1 in CVE-2019-13682
no cpe found for SUSE Package Hub 15 in CVE-2019-13681
no cpe found for SUSE Package Hub 15 SP1 in CVE-2019-13681
no cpe found for SUSE Package Hub 15 in CVE-2019-13680
no cpe found for SUSE Package Hub 15 SP1 in CVE-2019-13680
no cpe found for SUSE Package Hub 15 in CVE-2019-13679
no cpe found for SUSE Package Hub 15 SP1 in CVE-2019-13679
no cpe found for SUSE Package Hub 15 in CVE-2019-13678
no cpe found for SUSE Package Hub 15 SP1 in CVE-2019-13678
no cpe found for SUSE Package Hub 15 in CVE-2019-13677
no cpe found for SUSE Package Hub 15 SP1 in CVE-2019-13677
no cpe found for SUSE Package Hub 15 in CVE-2019-13676
no cpe found for SUSE Package Hub 15 SP1 in CVE-2019-13676
no cpe found for SUSE Package Hub 15 in CVE-2019-13675
no cpe found for SUSE Package Hub 15 SP1 in CVE-2019-13675
no cpe found for SUSE Package Hub 15 in CVE-2019-13674
no cpe found for SUSE Package Hub 15 SP1 in CVE-2019-13674
no cpe found for SUSE Package Hub 15 in CVE-2019-13673
no cpe found for SUSE Package Hub 15 SP1 in CVE-2019-13673
no cpe found for SUSE Package Hub 15 in CVE-2019-13671
no cpe found for SUSE Package Hub 15 SP1 in CVE-2019-13671
no cpe found for SUSE Package Hub 15 in CVE-2019-13670
no cpe found for SUSE Package Hub 15 SP1 in CVE-2019-13670
no cpe found for SUSE Package Hub 15 in CVE-2019-13669
no cpe found for SUSE Package Hub 15 SP1 in CVE-2019-13669
no cpe found for SUSE Package Hub 15 in CVE-2019-13668
no cpe found for SUSE Package Hub 15 SP1 in CVE-2019-13668
no cpe found for SUSE Package Hub 15 in CVE-2019-13667
no cpe found for SUSE Package Hub 15 SP1 in CVE-2019-13667
no cpe found for SUSE Package Hub 15 in CVE-2019-13666
no cpe found for SUSE Package Hub 15 SP1 in CVE-2019-13666
no cpe found for SUSE Package Hub 15 in CVE-2019-13665
no cpe found for SUSE Package Hub 15 SP1 in CVE-2019-13665
no cpe found for SUSE Package Hub 15 in CVE-2019-13664
no cpe found for SUSE Package Hub 15 SP1 in CVE-2019-13664
no cpe found for SUSE Package Hub 15 in CVE-2019-13663
no cpe found for SUSE Package Hub 15 SP1 in CVE-2019-13663
no cpe found for SUSE Package Hub 15 in CVE-2019-13662
no cpe found for SUSE Package Hub 15 SP1 in CVE-2019-13662
no cpe found for SUSE Package Hub 15 in CVE-2019-13661
no cpe found for SUSE Package Hub 15 SP1 in CVE-2019-13661
no cpe found for SUSE Package Hub 15 in CVE-2019-13660
no cpe found for SUSE Package Hub 15 SP1 in CVE-2019-13660
no cpe found for SUSE Package Hub 15 in CVE-2019-13659
no cpe found for SUSE Package Hub 15 SP1 in CVE-2019-13659
no cpe found for SUSE Package Hub 15 SP1 in CVE-2019-13640
skipping CVE-2019-13648 as CVE page is older than CVRF-CVE file.
no cpe found for SUSE Liberty Linux 7 LTSS in CVE-2019-13638
no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2019-13636
skipping CVE-2019-13631 as CVE page is older than CVRF-CVE file.
skipping CVE-2019-13627 as CVE page is older than CVRF-CVE file.
skipping CVE-2019-13619 as CVE page is older than CVRF-CVE file.
no cpe found for SUSE Package Hub 15 in CVE-2019-13616
no cpe found for SUSE Package Hub 15 SP1 in CVE-2019-13616
no cpe found for SUSE Package Hub 15 in CVE-2019-13602
no cpe found for SUSE Package Hub 15 SP1 in CVE-2019-13602
no cpe found for SUSE Package Hub 15 SP4 in CVE-2019-13590
no cpe found for SUSE Package Hub 15 SP5 in CVE-2019-13590
skipping CVE-2019-13565 as CVE page is older than CVRF-CVE file.
no cpe found for SUSE Package Hub 15 in CVE-2019-13458
no cpe found for SUSE Package Hub 15 SP1 in CVE-2019-13458
no cpe found for SUSE Package Hub 15 SP2 in CVE-2019-13458
no cpe found for SUSE Package Hub 15 in CVE-2019-13457
no cpe found for SUSE Package Hub 15 SP1 in CVE-2019-13457
no cpe found for SUSE Package Hub 15 SP2 in CVE-2019-13457
no cpe found for SUSE Liberty Linux 7 LTSS in CVE-2019-13456
skipping CVE-2019-13454 as CVE page is older than CVRF-CVE file.
no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2019-13390
skipping CVE-2019-13391 as CVE page is older than CVRF-CVE file.
skipping CVE-2019-13313 as CVE page is older than CVRF-CVE file.
no cpe found for SUSE Liberty Linux 7 LTSS in CVE-2019-13309
skipping CVE-2019-13311 as CVE page is older than CVRF-CVE file.
skipping CVE-2019-13310 as CVE page is older than CVRF-CVE file.
no cpe found for SUSE Liberty Linux 7 LTSS in CVE-2019-13306
skipping CVE-2019-13308 as CVE page is older than CVRF-CVE file.
skipping CVE-2019-13307 as CVE page is older than CVRF-CVE file.
no cpe found for SUSE Liberty Linux 7 LTSS in CVE-2019-13305
no cpe found for SUSE Liberty Linux 7 LTSS in CVE-2019-13304
skipping CVE-2019-13301 as CVE page is older than CVRF-CVE file.
skipping CVE-2019-13300 as CVE page is older than CVRF-CVE file.
skipping CVE-2019-13299 as CVE page is older than CVRF-CVE file.
skipping CVE-2019-13298 as CVE page is older than CVRF-CVE file.
skipping CVE-2019-13297 as CVE page is older than CVRF-CVE file.
skipping CVE-2019-13296 as CVE page is older than CVRF-CVE file.
skipping CVE-2019-13295 as CVE page is older than CVRF-CVE file.
skipping CVE-2019-13272 as CVE page is older than CVRF-CVE file.
skipping CVE-2019-13233 as CVE page is older than CVRF-CVE file.
no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2019-13225
no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2019-13224
no cpe found for SUSE Package Hub 15 SP1 in CVE-2019-13207
no cpe found for SUSE Package Hub 15 SP2 in CVE-2019-13207
no cpe found for SUSE Package Hub 15 in CVE-2019-13178
no cpe found for SUSE Package Hub 15 SP1 in CVE-2019-13178
skipping CVE-2019-13164 as CVE page is older than CVRF-CVE file.
skipping CVE-2019-13147 as CVE page is older than CVRF-CVE file.
skipping CVE-2019-13135 as CVE page is older than CVRF-CVE file.
skipping CVE-2019-13134 as CVE page is older than CVRF-CVE file.
skipping CVE-2019-13133 as CVE page is older than CVRF-CVE file.
skipping CVE-2019-13115 as CVE page is older than CVRF-CVE file.
no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2019-13111
skipping CVE-2019-13112 as CVE page is older than CVRF-CVE file.
no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2019-13110
no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2019-13109
no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2019-13108
no cpe found for SUSE Manager Tools 15 SP1 in CVE-2019-13068
no cpe found for SUSE Package Hub 15 in CVE-2019-13045
no cpe found for SUSE Package Hub 15 SP1 in CVE-2019-13045
skipping CVE-2019-13057 as CVE page is older than CVRF-CVE file.
skipping CVE-2019-13050 as CVE page is older than CVRF-CVE file.
skipping CVE-2019-12983 as CVE page is older than CVRF-CVE file.
skipping CVE-2019-12979 as CVE page is older than CVRF-CVE file.
skipping CVE-2019-12978 as CVE page is older than CVRF-CVE file.
skipping CVE-2019-12976 as CVE page is older than CVRF-CVE file.
skipping CVE-2019-12975 as CVE page is older than CVRF-CVE file.
skipping CVE-2019-12974 as CVE page is older than CVRF-CVE file.
skipping CVE-2019-12973 as CVE page is older than CVRF-CVE file.
skipping CVE-2019-12972 as CVE page is older than CVRF-CVE file.
no cpe found for SUSE Package Hub 15 in CVE-2019-12922
no cpe found for SUSE Package Hub 15 SP1 in CVE-2019-12922
skipping CVE-2019-12921 as CVE page is older than CVRF-CVE file.
skipping CVE-2019-12900 as CVE page is older than CVRF-CVE file.
no cpe found for SUSE Package Hub 15 in CVE-2019-12874
no cpe found for SUSE Package Hub 15 SP1 in CVE-2019-12874
no cpe found for SUSE Package Hub 15 in CVE-2019-12855
no cpe found for SUSE Package Hub 15 in CVE-2019-12816
no cpe found for SUSE Package Hub 15 SP1 in CVE-2019-12816
skipping CVE-2019-12819 as CVE page is older than CVRF-CVE file.
skipping CVE-2019-12818 as CVE page is older than CVRF-CVE file.
skipping CVE-2019-12817 as CVE page is older than CVRF-CVE file.
no cpe found for SUSE Package Hub 15 in CVE-2019-12815
no cpe found for SUSE Package Hub 15 SP1 in CVE-2019-12815
no cpe found for SUSE Package Hub 15 SP1 in CVE-2019-12781
skipping CVE-2019-12779 as CVE page is older than CVRF-CVE file.
no cpe found for SUSE Liberty Linux 7 LTSS in CVE-2019-12749
no cpe found for SUSE Package Hub 15 in CVE-2019-12746
no cpe found for SUSE Package Hub 15 SP1 in CVE-2019-12746
no cpe found for SUSE Package Hub 15 SP2 in CVE-2019-12746
skipping CVE-2019-12735 as CVE page is older than CVRF-CVE file.
no cpe found for SUSE Package Hub 15 in CVE-2019-12616
no cpe found for SUSE Package Hub 15 SP1 in CVE-2019-12616
no cpe found for SUSE Package Hub 15 in CVE-2019-12594
no cpe found for SUSE Package Hub 15 SP1 in CVE-2019-12594
skipping CVE-2019-12614 as CVE page is older than CVRF-CVE file.
no cpe found for SUSE Package Hub 15 in CVE-2019-12497
no cpe found for SUSE Package Hub 15 SP1 in CVE-2019-12497
no cpe found for SUSE Package Hub 15 SP2 in CVE-2019-12497
skipping CVE-2019-12456 as CVE page is older than CVRF-CVE file.
skipping CVE-2019-12455 as CVE page is older than CVRF-CVE file.
skipping CVE-2019-12454 as CVE page is older than CVRF-CVE file.
no cpe found for SUSE Liberty Linux 7 LTSS in CVE-2019-12420
skipping CVE-2019-12436 as CVE page is older than CVRF-CVE file.
skipping CVE-2019-12435 as CVE page is older than CVRF-CVE file.
skipping CVE-2019-12418 as CVE page is older than CVRF-CVE file.
no cpe found for HPE Helion OpenStack Cloud 8 in CVE-2019-12399
no cpe found for SUSE Package Hub 15 in CVE-2019-12387
skipping CVE-2019-12382 as CVE page is older than CVRF-CVE file.
skipping CVE-2019-12380 as CVE page is older than CVRF-CVE file.
skipping CVE-2019-12378 as CVE page is older than CVRF-CVE file.
no cpe found for SUSE Package Hub 15 SP1 in CVE-2019-12308
skipping CVE-2019-12290 as CVE page is older than CVRF-CVE file.
no cpe found for SUSE Package Hub 15 in CVE-2019-12248
no cpe found for SUSE Package Hub 15 SP1 in CVE-2019-12248
no cpe found for SUSE Package Hub 15 SP2 in CVE-2019-12248
no cpe found for SUSE Package Hub 15 in CVE-2019-12222
no cpe found for SUSE Package Hub 15 SP1 in CVE-2019-12222
no cpe found for SUSE Package Hub 15 in CVE-2019-12221
no cpe found for SUSE Package Hub 15 SP1 in CVE-2019-12221
no cpe found for SUSE Package Hub 15 in CVE-2019-12220
no cpe found for SUSE Package Hub 15 SP1 in CVE-2019-12220
no cpe found for SUSE Package Hub 15 in CVE-2019-12218
no cpe found for SUSE Package Hub 15 SP1 in CVE-2019-12218
no cpe found for SUSE Package Hub 15 in CVE-2019-12217
no cpe found for SUSE Package Hub 15 SP1 in CVE-2019-12217
skipping CVE-2019-12155 as CVE page is older than CVRF-CVE file.
no cpe found for SUSE Package Hub 15 in CVE-2019-12098
no cpe found for SUSE Package Hub 15 SP1 in CVE-2019-12098
skipping CVE-2019-12068 as CVE page is older than CVRF-CVE file.
no cpe found for SUSE Package Hub 15 in CVE-2019-11922
no cpe found for SUSE Package Hub 15 SP1 in CVE-2019-11922
skipping CVE-2019-11884 as CVE page is older than CVRF-CVE file.
no cpe found for SUSE Package Hub 15 SP1 in CVE-2019-11779
skipping CVE-2019-11833 as CVE page is older than CVRF-CVE file.
skipping CVE-2019-11815 as CVE page is older than CVRF-CVE file.
skipping CVE-2019-11811 as CVE page is older than CVRF-CVE file.
skipping CVE-2019-11810 as CVE page is older than CVRF-CVE file.
no cpe found for SUSE Package Hub 15 in CVE-2019-11768
no cpe found for SUSE Package Hub 15 SP1 in CVE-2019-11768
skipping CVE-2019-11775 as CVE page is older than CVRF-CVE file.
skipping CVE-2019-11772 as CVE page is older than CVRF-CVE file.
skipping CVE-2019-11771 as CVE page is older than CVRF-CVE file.
CVE-2019-11757: no packages for SUSE Liberty Linux 7, but entry?
CVE-2019-11757: no packages for SUSE Liberty Linux 8, but entry?
CVE-2019-11757: no packages for SUSE Liberty Linux 7, but entry?
CVE-2019-11757: no packages for SUSE Liberty Linux 8, but entry?
CVE-2019-11757: no packages for SUSE Liberty Linux 7, but entry?
CVE-2019-11757: no packages for SUSE Liberty Linux 8, but entry?
skipping CVE-2019-11756 as CVE page is older than CVRF-CVE file.
skipping CVE-2019-11727 as CVE page is older than CVRF-CVE file.
skipping CVE-2019-11683 as CVE page is older than CVRF-CVE file.
skipping CVE-2019-11599 as CVE page is older than CVRF-CVE file.
skipping CVE-2019-11598 as CVE page is older than CVRF-CVE file.
skipping CVE-2019-11597 as CVE page is older than CVRF-CVE file.
no cpe found for SUSE Package Hub 15 SP1 in CVE-2019-11556
skipping CVE-2019-11506 as CVE page is older than CVRF-CVE file.
skipping CVE-2019-11505 as CVE page is older than CVRF-CVE file.
skipping CVE-2019-11487 as CVE page is older than CVRF-CVE file.
skipping CVE-2019-11486 as CVE page is older than CVRF-CVE file.
no cpe found for SUSE Package Hub 15 in CVE-2019-11474
skipping CVE-2019-11479 as CVE page is older than CVRF-CVE file.
skipping CVE-2019-11478 as CVE page is older than CVRF-CVE file.
skipping CVE-2019-11477 as CVE page is older than CVRF-CVE file.
no cpe found for SUSE Package Hub 15 in CVE-2019-11473
skipping CVE-2019-11472 as CVE page is older than CVRF-CVE file.
skipping CVE-2019-11470 as CVE page is older than CVRF-CVE file.
no cpe found for SUSE Package Hub 15 in CVE-2019-11373
no cpe found for SUSE Package Hub 15 SP1 in CVE-2019-11373
no cpe found for SUSE Package Hub 15 in CVE-2019-11372
no cpe found for SUSE Package Hub 15 SP1 in CVE-2019-11372
no cpe found for SUSE Package Hub 15 SP1 in CVE-2019-11358
no cpe found for SUSE Package Hub 15 SP5 in CVE-2019-11358
no cpe found for SUSE Package Hub 15 SP6 in CVE-2019-11358
no cpe found for SUSE Package Hub 15 in CVE-2019-11339
no cpe found for SUSE Package Hub 15 SP1 in CVE-2019-11339
no cpe found for SUSE Package Hub 15 in CVE-2019-11338
no cpe found for SUSE Package Hub 15 SP1 in CVE-2019-11338
no cpe found for SUSE Package Hub 15 in CVE-2019-11328
no cpe found for SUSE Package Hub 15 SP1 in CVE-2019-11328
skipping CVE-2019-11324 as CVE page is older than CVRF-CVE file.
no cpe found for HPE Helion OpenStack Cloud 8 in CVE-2019-11291
no cpe found for HPE Helion OpenStack Cloud 8 in CVE-2019-11287
no cpe found for HPE Helion OpenStack Cloud 8 in CVE-2019-11281
skipping CVE-2019-11236 as CVE page is older than CVRF-CVE file.
skipping CVE-2019-11235 as CVE page is older than CVRF-CVE file.
skipping CVE-2019-11234 as CVE page is older than CVRF-CVE file.
skipping CVE-2019-11098 as CVE page is older than CVRF-CVE file.
skipping CVE-2019-11091 as CVE page is older than CVRF-CVE file.
skipping CVE-2019-11085 as CVE page is older than CVRF-CVE file.
skipping CVE-2019-11070 as CVE page is older than CVRF-CVE file.
skipping CVE-2019-11068 as CVE page is older than CVRF-CVE file.
no cpe found for SUSE Package Hub 15 SP1 in CVE-2019-11037
no cpe found for SUSE Package Hub 15 in CVE-2019-11010
skipping CVE-2019-11023 as CVE page is older than CVRF-CVE file.
no cpe found for SUSE Package Hub 15 in CVE-2019-11009
no cpe found for SUSE Package Hub 15 in CVE-2019-11008
no cpe found for SUSE Package Hub 15 in CVE-2019-11007
no cpe found for SUSE Package Hub 15 in CVE-2019-11006
no cpe found for SUSE Package Hub 15 in CVE-2019-11005
no cpe found for SUSE Package Hub 15 SP1 in CVE-2019-10879
skipping CVE-2019-10903 as CVE page is older than CVRF-CVE file.
skipping CVE-2019-10902 as CVE page is older than CVRF-CVE file.
skipping CVE-2019-10901 as CVE page is older than CVRF-CVE file.
skipping CVE-2019-10900 as CVE page is older than CVRF-CVE file.
skipping CVE-2019-10899 as CVE page is older than CVRF-CVE file.
skipping CVE-2019-10898 as CVE page is older than CVRF-CVE file.
skipping CVE-2019-10897 as CVE page is older than CVRF-CVE file.
skipping CVE-2019-10896 as CVE page is older than CVRF-CVE file.
skipping CVE-2019-10895 as CVE page is older than CVRF-CVE file.
skipping CVE-2019-10894 as CVE page is older than CVRF-CVE file.
no cpe found for SUSE Package Hub 15 SP1 in CVE-2019-10878
no cpe found for SUSE Package Hub 15 SP1 in CVE-2019-10877
no cpe found for SUSE Package Hub 15 in CVE-2019-10868
skipping CVE-2019-10872 as CVE page is older than CVRF-CVE file.
skipping CVE-2019-10871 as CVE page is older than CVRF-CVE file.
no cpe found for SUSE Package Hub 15 SP3 in CVE-2019-10784
no cpe found for SUSE Package Hub 15 SP4 in CVE-2019-10784
no cpe found for SUSE Package Hub 15 SP1 in CVE-2019-10751
no cpe found for SUSE Package Hub 15 SP1 in CVE-2019-10740
no cpe found for SUSE Package Hub 15 SP2 in CVE-2019-10740
no cpe found for SUSE Package Hub 15 SP3 in CVE-2019-10740
no cpe found for SUSE Package Hub 15 SP4 in CVE-2019-10740
no cpe found for SUSE Package Hub 15 SP1 in CVE-2019-10732
skipping CVE-2019-10714 as CVE page is older than CVRF-CVE file.
no cpe found for SUSE Liberty Linux 7 LTSS in CVE-2019-10650
skipping CVE-2019-10639 as CVE page is older than CVRF-CVE file.
skipping CVE-2019-10638 as CVE page is older than CVRF-CVE file.
skipping CVE-2019-10557 as CVE page is older than CVRF-CVE file.
skipping CVE-2019-10220 as CVE page is older than CVRF-CVE file.
no cpe found for HPE Helion OpenStack Cloud 8 in CVE-2019-10217
no cpe found for SUSE Package Hub 15 SP1 in CVE-2019-10217
no cpe found for HPE Helion OpenStack Cloud 8 in CVE-2019-10206
no cpe found for SUSE Package Hub 15 SP1 in CVE-2019-10206
skipping CVE-2019-10208 as CVE page is older than CVRF-CVE file.
skipping CVE-2019-10207 as CVE page is older than CVRF-CVE file.
no cpe found for SUSE Package Hub 15 in CVE-2019-10203
no cpe found for SUSE Package Hub 15 SP1 in CVE-2019-10203
no cpe found for SUSE Package Hub 15 in CVE-2019-10163
no cpe found for SUSE Package Hub 15 SP1 in CVE-2019-10163
skipping CVE-2019-10168 as CVE page is older than CVRF-CVE file.
skipping CVE-2019-10167 as CVE page is older than CVRF-CVE file.
skipping CVE-2019-10166 as CVE page is older than CVRF-CVE file.
skipping CVE-2019-10164 as CVE page is older than CVRF-CVE file.
no cpe found for SUSE Package Hub 15 in CVE-2019-10162
no cpe found for SUSE Package Hub 15 SP1 in CVE-2019-10162
no cpe found for SUSE Package Hub 15 SP3 in CVE-2019-10156
skipping CVE-2019-10161 as CVE page is older than CVRF-CVE file.
skipping CVE-2019-10160 as CVE page is older than CVRF-CVE file.
skipping CVE-2019-10153 as CVE page is older than CVRF-CVE file.
no cpe found for SUSE Package Hub 15 SP1 in CVE-2019-10149
no cpe found for SUSE Liberty Linux 7 LTSS in CVE-2019-10143
skipping CVE-2019-10142 as CVE page is older than CVRF-CVE file.
skipping CVE-2019-10137 as CVE page is older than CVRF-CVE file.
skipping CVE-2019-10136 as CVE page is older than CVRF-CVE file.
skipping CVE-2019-10132 as CVE page is older than CVRF-CVE file.
skipping CVE-2019-10131 as CVE page is older than CVRF-CVE file.
skipping CVE-2019-10130 as CVE page is older than CVRF-CVE file.
skipping CVE-2019-10126 as CVE page is older than CVRF-CVE file.
skipping CVE-2019-10125 as CVE page is older than CVRF-CVE file.
skipping CVE-2019-10124 as CVE page is older than CVRF-CVE file.
no cpe found for SUSE Liberty Linux 7 LTSS in CVE-2019-10086
skipping CVE-2019-10098 as CVE page is older than CVRF-CVE file.
skipping CVE-2019-10097 as CVE page is older than CVRF-CVE file.
skipping CVE-2019-10094 as CVE page is older than CVRF-CVE file.
skipping CVE-2019-10093 as CVE page is older than CVRF-CVE file.
skipping CVE-2019-10092 as CVE page is older than CVRF-CVE file.
skipping CVE-2019-10088 as CVE page is older than CVRF-CVE file.
skipping CVE-2019-10082 as CVE page is older than CVRF-CVE file.
skipping CVE-2019-10081 as CVE page is older than CVRF-CVE file.
no cpe found for SUSE Package Hub 15 in CVE-2019-10067
no cpe found for SUSE Package Hub 15 SP1 in CVE-2019-10067
no cpe found for SUSE Package Hub 15 SP2 in CVE-2019-10067
skipping CVE-2019-10063 as CVE page is older than CVRF-CVE file.
skipping CVE-2019-10025 as CVE page is older than CVRF-CVE file.
no cpe found for SUSE Liberty Linux 7 LTSS in CVE-2019-9956
skipping CVE-2019-9959 as CVE page is older than CVRF-CVE file.
CVE-2019-9947: no packages for SUSE Linux Enterprise Server 11 SP4-LTSS, but entry?
CVE-2019-9947: no packages for SUSE Linux Enterprise Server 11 SP4-LTSS, but entry?
CVE-2019-9947: no packages for SUSE Linux Enterprise Server 11 SP4-LTSS, but entry?
skipping CVE-2019-9948 as CVE page is older than CVRF-CVE file.
--- /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2019-9947.xml 2024-09-23 02:14:43.508494000 +0200
+++ /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2019-9947.xml.new 2024-10-29 02:26:45.411810000 +0100
@@ -14,13 +14,13 @@
1
- 156
- 2024-09-23T00:14:43Z
+ 157
+ 2024-10-29T01:26:44Z
current
2021-05-30T14:26:26Z
- 2024-09-23T00:14:43Z
+ 2024-10-29T01:26:44Z
cve-database/bin/generate-cvrf-cve.pl
2020-12-27T01:00:00Z
@@ -2763,6 +2763,24 @@
python313-x86-64-v3-3.13.0~b3-1.1
+
+ python314-3.14.0~a1-1.1
+
+
+ python314-curses-3.14.0~a1-1.1
+
+
+ python314-dbm-3.14.0~a1-1.1
+
+
+ python314-idle-3.14.0~a1-1.1
+
+
+ python314-tk-3.14.0~a1-1.1
+
+
+ python314-x86-64-v3-3.14.0~a1-1.1
+
python36-3.6.10-4.3.5
@@ -6405,6 +6423,24 @@
python313-x86-64-v3-3.13.0~b3-1.1 as a component of openSUSE Tumbleweed
+
+ python314-3.14.0~a1-1.1 as a component of openSUSE Tumbleweed
+
+
+ python314-curses-3.14.0~a1-1.1 as a component of openSUSE Tumbleweed
+
+
+ python314-dbm-3.14.0~a1-1.1 as a component of openSUSE Tumbleweed
+
+
+ python314-idle-3.14.0~a1-1.1 as a component of openSUSE Tumbleweed
+
+
+ python314-tk-3.14.0~a1-1.1 as a component of openSUSE Tumbleweed
+
+
+ python314-x86-64-v3-3.14.0~a1-1.1 as a component of openSUSE Tumbleweed
+
python36-3.6.15-1.1 as a component of openSUSE Tumbleweed
@@ -7894,6 +7930,12 @@
openSUSE Tumbleweed:python313-idle-3.13.0~b3-1.1
openSUSE Tumbleweed:python313-tk-3.13.0~b3-1.1
openSUSE Tumbleweed:python313-x86-64-v3-3.13.0~b3-1.1
+ openSUSE Tumbleweed:python314-3.14.0~a1-1.1
+ openSUSE Tumbleweed:python314-curses-3.14.0~a1-1.1
+ openSUSE Tumbleweed:python314-dbm-3.14.0~a1-1.1
+ openSUSE Tumbleweed:python314-idle-3.14.0~a1-1.1
+ openSUSE Tumbleweed:python314-tk-3.14.0~a1-1.1
+ openSUSE Tumbleweed:python314-x86-64-v3-3.14.0~a1-1.1
openSUSE Tumbleweed:python36-3.6.15-1.1
openSUSE Tumbleweed:python36-32bit-3.6.15-1.1
openSUSE Tumbleweed:python36-curses-3.6.15-1.1
skipping CVE-2019-9928 as CVE page is older than CVRF-CVE file.
skipping CVE-2019-9924 as CVE page is older than CVRF-CVE file.
no cpe found for SUSE Package Hub 15 in CVE-2019-9917
no cpe found for SUSE Package Hub 15 SP1 in CVE-2019-9917
no cpe found for SUSE Package Hub 15 in CVE-2019-9898
skipping CVE-2019-9903 as CVE page is older than CVRF-CVE file.
no cpe found for SUSE Package Hub 15 in CVE-2019-9897
no cpe found for SUSE Package Hub 15 in CVE-2019-9896
no cpe found for SUSE Package Hub 15 in CVE-2019-9895
no cpe found for SUSE Package Hub 15 in CVE-2019-9894
no cpe found for SUSE Package Hub 15 in CVE-2019-9892
no cpe found for SUSE Package Hub 15 SP1 in CVE-2019-9892
no cpe found for SUSE Package Hub 15 SP2 in CVE-2019-9892
skipping CVE-2019-9857 as CVE page is older than CVRF-CVE file.
skipping CVE-2019-9824 as CVE page is older than CVRF-CVE file.
no cpe found for SUSE Package Hub 15 SP1 in CVE-2019-9779
no cpe found for SUSE Package Hub 15 SP1 in CVE-2019-9778
no cpe found for SUSE Package Hub 15 SP1 in CVE-2019-9777
no cpe found for SUSE Package Hub 15 SP1 in CVE-2019-9776
no cpe found for SUSE Package Hub 15 SP1 in CVE-2019-9775
no cpe found for SUSE Package Hub 15 SP1 in CVE-2019-9774
no cpe found for SUSE Package Hub 15 SP1 in CVE-2019-9773
no cpe found for SUSE Package Hub 15 SP1 in CVE-2019-9772
no cpe found for SUSE Package Hub 15 SP1 in CVE-2019-9771
no cpe found for SUSE Package Hub 15 SP1 in CVE-2019-9770
no cpe found for SUSE Liberty Linux 7 LTSS in CVE-2019-9755
no cpe found for SUSE Package Hub 15 in CVE-2019-9752
no cpe found for SUSE Package Hub 15 SP1 in CVE-2019-9752
no cpe found for SUSE Package Hub 15 SP2 in CVE-2019-9752
skipping CVE-2019-9740 as CVE page is older than CVRF-CVE file.
skipping CVE-2019-9674 as CVE page is older than CVRF-CVE file.
skipping CVE-2019-9636 as CVE page is older than CVRF-CVE file.
skipping CVE-2019-9631 as CVE page is older than CVRF-CVE file.
skipping CVE-2019-9628 as CVE page is older than CVRF-CVE file.
skipping CVE-2019-9587 as CVE page is older than CVRF-CVE file.
no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2019-9545
skipping CVE-2019-9517 as CVE page is older than CVRF-CVE file.
skipping CVE-2019-9506 as CVE page is older than CVRF-CVE file.
no cpe found for SUSE Package Hub 15 in CVE-2019-9499
no cpe found for SUSE Package Hub 15 SP1 in CVE-2019-9499
no cpe found for SUSE Package Hub 15 in CVE-2019-9498
no cpe found for SUSE Package Hub 15 SP1 in CVE-2019-9498
no cpe found for SUSE Package Hub 15 in CVE-2019-9497
no cpe found for SUSE Package Hub 15 SP1 in CVE-2019-9497
no cpe found for SUSE Package Hub 15 in CVE-2019-9496
no cpe found for SUSE Package Hub 15 SP1 in CVE-2019-9496
no cpe found for SUSE Package Hub 15 in CVE-2019-9495
no cpe found for SUSE Package Hub 15 SP1 in CVE-2019-9495
no cpe found for SUSE Package Hub 15 in CVE-2019-9494
no cpe found for SUSE Package Hub 15 SP1 in CVE-2019-9494
skipping CVE-2019-9475 as CVE page is older than CVRF-CVE file.
skipping CVE-2019-9458 as CVE page is older than CVRF-CVE file.
skipping CVE-2019-9457 as CVE page is older than CVRF-CVE file.
skipping CVE-2019-9450 as CVE page is older than CVRF-CVE file.
skipping CVE-2019-9449 as CVE page is older than CVRF-CVE file.
skipping CVE-2019-9448 as CVE page is older than CVRF-CVE file.
skipping CVE-2019-9447 as CVE page is older than CVRF-CVE file.
skipping CVE-2019-9446 as CVE page is older than CVRF-CVE file.
skipping CVE-2019-9445 as CVE page is older than CVRF-CVE file.
no cpe found for SUSE Liberty Linux 7 LTSS in CVE-2019-9433
skipping CVE-2019-9371 as CVE page is older than CVRF-CVE file.
skipping CVE-2019-9325 as CVE page is older than CVRF-CVE file.
no cpe found for SUSE Liberty Linux 7 LTSS in CVE-2019-9232
no cpe found for SUSE Package Hub 15 in CVE-2019-9215
no cpe found for SUSE Package Hub 15 SP1 in CVE-2019-9215
no cpe found for SUSE Package Hub 15 in CVE-2019-9211
skipping CVE-2019-9214 as CVE page is older than CVRF-CVE file.
skipping CVE-2019-9213 as CVE page is older than CVRF-CVE file.
no cpe found for SUSE Liberty Linux 7 LTSS in CVE-2019-9210
skipping CVE-2019-9209 as CVE page is older than CVRF-CVE file.
skipping CVE-2019-9208 as CVE page is older than CVRF-CVE file.
no cpe found for SUSE Linux Enterprise Module for HPC 12 SP2 in CVE-2019-9152
no cpe found for SUSE Linux Enterprise Module for HPC 12 SP2 in CVE-2019-9152
no cpe found for SUSE Linux Enterprise Module for HPC 12 SP2 in CVE-2019-9152
no cpe found for SUSE Linux Enterprise Module for HPC 12 SP2 in CVE-2019-9152
no cpe found for SUSE Linux Enterprise Module for HPC 12 SP2 in CVE-2019-9152
no cpe found for SUSE Linux Enterprise Module for HPC 12 SP2 in CVE-2019-9152
no cpe found for SUSE Linux Enterprise Module for HPC 12 SP2 in CVE-2019-9152
no cpe found for SUSE Linux Enterprise Module for HPC 12 SP2 in CVE-2019-9152
no cpe found for SUSE Linux Enterprise Module for HPC 12 SP2 in CVE-2019-9152
no cpe found for SUSE Linux Enterprise Module for HPC 12 SP2 in CVE-2019-9152
no cpe found for SUSE Linux Enterprise Module for HPC 12 SP2 in CVE-2019-9152
no cpe found for SUSE Linux Enterprise Module for HPC 12 SP2 in CVE-2019-9152
skipping CVE-2019-9162 as CVE page is older than CVRF-CVE file.
no cpe found for SUSE Linux Enterprise Module for HPC 12 SP2 in CVE-2019-9151
no cpe found for SUSE Linux Enterprise Module for HPC 12 SP2 in CVE-2019-9151
no cpe found for SUSE Linux Enterprise Module for HPC 12 SP2 in CVE-2019-9151
no cpe found for SUSE Linux Enterprise Module for HPC 12 SP2 in CVE-2019-9151
no cpe found for SUSE Linux Enterprise Module for HPC 12 SP2 in CVE-2019-9151
no cpe found for SUSE Linux Enterprise Module for HPC 12 SP2 in CVE-2019-9151
no cpe found for SUSE Linux Enterprise Module for HPC 12 SP2 in CVE-2019-9151
no cpe found for SUSE Linux Enterprise Module for HPC 12 SP2 in CVE-2019-9151
no cpe found for SUSE Linux Enterprise Module for HPC 12 SP2 in CVE-2019-9151
no cpe found for SUSE Linux Enterprise Module for HPC 12 SP2 in CVE-2019-9151
no cpe found for SUSE Linux Enterprise Module for HPC 12 SP2 in CVE-2019-9151
no cpe found for SUSE Linux Enterprise Module for HPC 12 SP2 in CVE-2019-9151
skipping CVE-2019-9077 as CVE page is older than CVRF-CVE file.
skipping CVE-2019-9075 as CVE page is older than CVRF-CVE file.
skipping CVE-2019-9074 as CVE page is older than CVRF-CVE file.
no cpe found for SUSE Liberty Linux 7 LTSS in CVE-2019-9024
skipping CVE-2019-9003 as CVE page is older than CVRF-CVE file.
skipping CVE-2019-8980 as CVE page is older than CVRF-CVE file.
no cpe found for SUSE Package Hub 15 in CVE-2019-8955
skipping CVE-2019-8956 as CVE page is older than CVRF-CVE file.
skipping CVE-2019-8936 as CVE page is older than CVRF-CVE file.
skipping CVE-2019-8934 as CVE page is older than CVRF-CVE file.
skipping CVE-2019-8922 as CVE page is older than CVRF-CVE file.
skipping CVE-2019-8912 as CVE page is older than CVRF-CVE file.
skipping CVE-2019-8907 as CVE page is older than CVRF-CVE file.
skipping CVE-2019-8906 as CVE page is older than CVRF-CVE file.
skipping CVE-2019-8905 as CVE page is older than CVRF-CVE file.
skipping CVE-2019-8690 as CVE page is older than CVRF-CVE file.
skipping CVE-2019-8689 as CVE page is older than CVRF-CVE file.
skipping CVE-2019-8688 as CVE page is older than CVRF-CVE file.
skipping CVE-2019-8687 as CVE page is older than CVRF-CVE file.
skipping CVE-2019-8686 as CVE page is older than CVRF-CVE file.
skipping CVE-2019-8684 as CVE page is older than CVRF-CVE file.
skipping CVE-2019-8683 as CVE page is older than CVRF-CVE file.
skipping CVE-2019-8681 as CVE page is older than CVRF-CVE file.
skipping CVE-2019-8680 as CVE page is older than CVRF-CVE file.
skipping CVE-2019-8679 as CVE page is older than CVRF-CVE file.
skipping CVE-2019-8678 as CVE page is older than CVRF-CVE file.
skipping CVE-2019-8677 as CVE page is older than CVRF-CVE file.
skipping CVE-2019-8676 as CVE page is older than CVRF-CVE file.
skipping CVE-2019-8673 as CVE page is older than CVRF-CVE file.
skipping CVE-2019-8672 as CVE page is older than CVRF-CVE file.
skipping CVE-2019-8671 as CVE page is older than CVRF-CVE file.
skipping CVE-2019-8669 as CVE page is older than CVRF-CVE file.
skipping CVE-2019-8666 as CVE page is older than CVRF-CVE file.
skipping CVE-2019-8658 as CVE page is older than CVRF-CVE file.
skipping CVE-2019-8649 as CVE page is older than CVRF-CVE file.
skipping CVE-2019-8644 as CVE page is older than CVRF-CVE file.
skipping CVE-2019-8623 as CVE page is older than CVRF-CVE file.
skipping CVE-2019-8622 as CVE page is older than CVRF-CVE file.
skipping CVE-2019-8619 as CVE page is older than CVRF-CVE file.
skipping CVE-2019-8615 as CVE page is older than CVRF-CVE file.
skipping CVE-2019-8611 as CVE page is older than CVRF-CVE file.
skipping CVE-2019-8610 as CVE page is older than CVRF-CVE file.
skipping CVE-2019-8609 as CVE page is older than CVRF-CVE file.
skipping CVE-2019-8608 as CVE page is older than CVRF-CVE file.
skipping CVE-2019-8607 as CVE page is older than CVRF-CVE file.
skipping CVE-2019-8601 as CVE page is older than CVRF-CVE file.
skipping CVE-2019-8597 as CVE page is older than CVRF-CVE file.
skipping CVE-2019-8596 as CVE page is older than CVRF-CVE file.
skipping CVE-2019-8595 as CVE page is older than CVRF-CVE file.
skipping CVE-2019-8594 as CVE page is older than CVRF-CVE file.
skipping CVE-2019-8587 as CVE page is older than CVRF-CVE file.
skipping CVE-2019-8586 as CVE page is older than CVRF-CVE file.
skipping CVE-2019-8584 as CVE page is older than CVRF-CVE file.
skipping CVE-2019-8583 as CVE page is older than CVRF-CVE file.
skipping CVE-2019-8571 as CVE page is older than CVRF-CVE file.
skipping CVE-2019-8563 as CVE page is older than CVRF-CVE file.
skipping CVE-2019-8559 as CVE page is older than CVRF-CVE file.
skipping CVE-2019-8558 as CVE page is older than CVRF-CVE file.
skipping CVE-2019-8551 as CVE page is older than CVRF-CVE file.
skipping CVE-2019-8544 as CVE page is older than CVRF-CVE file.
skipping CVE-2019-8536 as CVE page is older than CVRF-CVE file.
skipping CVE-2019-8535 as CVE page is older than CVRF-CVE file.
skipping CVE-2019-8524 as CVE page is older than CVRF-CVE file.
skipping CVE-2019-8523 as CVE page is older than CVRF-CVE file.
skipping CVE-2019-8515 as CVE page is older than CVRF-CVE file.
skipping CVE-2019-8506 as CVE page is older than CVRF-CVE file.
skipping CVE-2019-8503 as CVE page is older than CVRF-CVE file.
no cpe found for SUSE Package Hub 15 in CVE-2019-8358
skipping CVE-2019-8375 as CVE page is older than CVRF-CVE file.
no cpe found for SUSE Package Hub 15 SP1 in CVE-2019-8075
no cpe found for SUSE Package Hub 15 SP2 in CVE-2019-8075
skipping CVE-2019-7665 as CVE page is older than CVRF-CVE file.
no cpe found for SUSE Liberty Linux 7 LTSS in CVE-2019-7637
skipping CVE-2019-7638 as CVE page is older than CVRF-CVE file.
skipping CVE-2019-7636 as CVE page is older than CVRF-CVE file.
skipping CVE-2019-7635 as CVE page is older than CVRF-CVE file.
no cpe found for HPE Helion OpenStack Cloud 8 in CVE-2019-7621
no cpe found for HPE Helion OpenStack Cloud 8 in CVE-2019-7620
no cpe found for SUSE Package Hub 15 in CVE-2019-7548
skipping CVE-2019-7578 as CVE page is older than CVRF-CVE file.
skipping CVE-2019-7577 as CVE page is older than CVRF-CVE file.
skipping CVE-2019-7576 as CVE page is older than CVRF-CVE file.
skipping CVE-2019-7575 as CVE page is older than CVRF-CVE file.
skipping CVE-2019-7574 as CVE page is older than CVRF-CVE file.
skipping CVE-2019-7573 as CVE page is older than CVRF-CVE file.
skipping CVE-2019-7572 as CVE page is older than CVRF-CVE file.
no cpe found for SUSE Package Hub 15 in CVE-2019-7443
skipping CVE-2019-7524 as CVE page is older than CVRF-CVE file.
no cpe found for SUSE Liberty Linux 7 LTSS in CVE-2019-7398
no cpe found for SUSE Liberty Linux 7 LTSS in CVE-2019-7397
no cpe found for SUSE Package Hub 15 in CVE-2019-7397
no cpe found for SUSE Package Hub 15 in CVE-2019-7314
no cpe found for SUSE Package Hub 15 SP1 in CVE-2019-7314
skipping CVE-2019-7317 as CVE page is older than CVRF-CVE file.
skipping CVE-2019-7310 as CVE page is older than CVRF-CVE file.
skipping CVE-2019-7308 as CVE page is older than CVRF-CVE file.
skipping CVE-2019-7292 as CVE page is older than CVRF-CVE file.
skipping CVE-2019-7285 as CVE page is older than CVRF-CVE file.
no cpe found for SUSE Linux Enterprise Real Time 11 SP4 in CVE-2019-7222
no cpe found for SUSE Liberty Linux 7 LTSS in CVE-2019-7175
no cpe found for SUSE Package Hub 15 in CVE-2019-7165
no cpe found for SUSE Package Hub 15 SP1 in CVE-2019-7165
no cpe found for SUSE Package Hub 15 in CVE-2019-7164
skipping CVE-2019-7150 as CVE page is older than CVRF-CVE file.
no cpe found for SUSE Liberty Linux 7 LTSS in CVE-2019-6978
no cpe found for SUSE Package Hub 15 in CVE-2019-6799
skipping CVE-2019-6974 as CVE page is older than CVRF-CVE file.
no cpe found for SUSE Package Hub 15 in CVE-2019-6798
no cpe found for SUSE Package Hub 15 in CVE-2019-6690
no cpe found for SUSE Package Hub 15 in CVE-2019-6486
skipping CVE-2019-6476 as CVE page is older than CVRF-CVE file.
skipping CVE-2019-6475 as CVE page is older than CVRF-CVE file.
skipping CVE-2019-6467 as CVE page is older than CVRF-CVE file.
skipping CVE-2019-6462 as CVE page is older than CVRF-CVE file.
skipping CVE-2019-6461 as CVE page is older than CVRF-CVE file.
no cpe found for SUSE Package Hub 15 SP1 in CVE-2019-6446
skipping CVE-2019-6454 as CVE page is older than CVRF-CVE file.
no cpe found for SUSE Linux Enterprise Installer Updates 15 SP2 in CVE-2019-6292
no cpe found for SUSE Linux Enterprise Installer Updates 15 SP2 in CVE-2019-6292
no cpe found for SUSE Linux Enterprise Installer Updates 15 SP2 in CVE-2019-6292
no cpe found for SUSE Linux Enterprise Installer Updates 15 SP2 in CVE-2019-6292
no cpe found for SUSE Linux Enterprise Installer Updates 15 SP2 in CVE-2019-6292
no cpe found for SUSE Linux Enterprise Installer Updates 15 SP2 in CVE-2019-6292
no cpe found for SUSE Linux Enterprise Installer Updates 15 SP2 in CVE-2019-6292
no cpe found for SUSE Linux Enterprise Installer Updates 15 SP2 in CVE-2019-6292
no cpe found for SUSE Package Hub 15 in CVE-2019-6286
no cpe found for SUSE Package Hub 15 SP1 in CVE-2019-6286
no cpe found for SUSE Linux Enterprise Installer Updates 15 SP2 in CVE-2019-6285
no cpe found for SUSE Linux Enterprise Installer Updates 15 SP2 in CVE-2019-6285
no cpe found for SUSE Linux Enterprise Installer Updates 15 SP2 in CVE-2019-6285
no cpe found for SUSE Linux Enterprise Installer Updates 15 SP2 in CVE-2019-6285
no cpe found for SUSE Linux Enterprise Installer Updates 15 SP2 in CVE-2019-6285
no cpe found for SUSE Linux Enterprise Installer Updates 15 SP2 in CVE-2019-6285
no cpe found for SUSE Linux Enterprise Installer Updates 15 SP2 in CVE-2019-6285
no cpe found for SUSE Linux Enterprise Installer Updates 15 SP2 in CVE-2019-6285
no cpe found for SUSE Package Hub 15 in CVE-2019-6284
no cpe found for SUSE Package Hub 15 SP1 in CVE-2019-6284
no cpe found for SUSE Package Hub 15 in CVE-2019-6283
no cpe found for SUSE Package Hub 15 SP1 in CVE-2019-6283
no cpe found for SUSE Package Hub 15 in CVE-2019-6256
skipping CVE-2019-6251 as CVE page is older than CVRF-CVE file.
skipping CVE-2019-6237 as CVE page is older than CVRF-CVE file.
skipping CVE-2019-6201 as CVE page is older than CVRF-CVE file.
skipping CVE-2019-6133 as CVE page is older than CVRF-CVE file.
skipping CVE-2019-6111 as CVE page is older than CVRF-CVE file.
no cpe found for SUSE Liberty Linux 7 LTSS in CVE-2019-5953
no cpe found for SUSE Package Hub 15 in CVE-2019-5882
no cpe found for SUSE Package Hub 15 in CVE-2019-5881
no cpe found for SUSE Package Hub 15 SP1 in CVE-2019-5881
no cpe found for SUSE Package Hub 15 in CVE-2019-5880
no cpe found for SUSE Package Hub 15 SP1 in CVE-2019-5880
no cpe found for SUSE Package Hub 15 in CVE-2019-5879
no cpe found for SUSE Package Hub 15 SP1 in CVE-2019-5879
no cpe found for SUSE Package Hub 15 in CVE-2019-5878
no cpe found for SUSE Package Hub 15 SP1 in CVE-2019-5878
no cpe found for SUSE Package Hub 15 in CVE-2019-5877
no cpe found for SUSE Package Hub 15 SP1 in CVE-2019-5877
no cpe found for SUSE Package Hub 15 in CVE-2019-5876
no cpe found for SUSE Package Hub 15 SP1 in CVE-2019-5876
no cpe found for SUSE Package Hub 15 in CVE-2019-5875
no cpe found for SUSE Package Hub 15 SP1 in CVE-2019-5875
no cpe found for SUSE Package Hub 15 in CVE-2019-5874
no cpe found for SUSE Package Hub 15 SP1 in CVE-2019-5874
no cpe found for SUSE Package Hub 15 in CVE-2019-5872
no cpe found for SUSE Package Hub 15 SP1 in CVE-2019-5872
no cpe found for SUSE Package Hub 15 in CVE-2019-5871
no cpe found for SUSE Package Hub 15 SP1 in CVE-2019-5871
no cpe found for SUSE Package Hub 15 in CVE-2019-5870
no cpe found for SUSE Package Hub 15 SP1 in CVE-2019-5870
no cpe found for SUSE Package Hub 15 in CVE-2019-5869
no cpe found for SUSE Package Hub 15 SP1 in CVE-2019-5869
no cpe found for SUSE Package Hub 15 in CVE-2019-5868
no cpe found for SUSE Package Hub 15 SP1 in CVE-2019-5868
no cpe found for SUSE Package Hub 15 in CVE-2019-5867
no cpe found for SUSE Package Hub 15 SP1 in CVE-2019-5867
no cpe found for SUSE Package Hub 15 in CVE-2019-5865
no cpe found for SUSE Package Hub 15 SP1 in CVE-2019-5865
no cpe found for SUSE Package Hub 15 in CVE-2019-5864
no cpe found for SUSE Package Hub 15 SP1 in CVE-2019-5864
no cpe found for SUSE Package Hub 15 in CVE-2019-5863
no cpe found for SUSE Package Hub 15 SP1 in CVE-2019-5863
no cpe found for SUSE Package Hub 15 in CVE-2019-5862
no cpe found for SUSE Package Hub 15 SP1 in CVE-2019-5862
no cpe found for SUSE Package Hub 15 in CVE-2019-5861
no cpe found for SUSE Package Hub 15 SP1 in CVE-2019-5861
no cpe found for SUSE Package Hub 15 in CVE-2019-5860
no cpe found for SUSE Package Hub 15 SP1 in CVE-2019-5860
no cpe found for SUSE Package Hub 15 in CVE-2019-5859
no cpe found for SUSE Package Hub 15 SP1 in CVE-2019-5859
no cpe found for SUSE Package Hub 15 in CVE-2019-5858
no cpe found for SUSE Package Hub 15 SP1 in CVE-2019-5858
no cpe found for SUSE Package Hub 15 in CVE-2019-5857
no cpe found for SUSE Package Hub 15 SP1 in CVE-2019-5857
no cpe found for SUSE Package Hub 15 in CVE-2019-5856
no cpe found for SUSE Package Hub 15 SP1 in CVE-2019-5856
no cpe found for SUSE Package Hub 15 in CVE-2019-5855
no cpe found for SUSE Package Hub 15 SP1 in CVE-2019-5855
no cpe found for SUSE Package Hub 15 in CVE-2019-5854
no cpe found for SUSE Package Hub 15 SP1 in CVE-2019-5854
no cpe found for SUSE Package Hub 15 in CVE-2019-5853
no cpe found for SUSE Package Hub 15 SP1 in CVE-2019-5853
no cpe found for SUSE Package Hub 15 in CVE-2019-5852
no cpe found for SUSE Package Hub 15 SP1 in CVE-2019-5852
no cpe found for SUSE Package Hub 15 in CVE-2019-5851
no cpe found for SUSE Package Hub 15 SP1 in CVE-2019-5851
no cpe found for SUSE Package Hub 15 in CVE-2019-5850
no cpe found for SUSE Package Hub 15 SP1 in CVE-2019-5850
no cpe found for SUSE Package Hub 15 in CVE-2019-5848
no cpe found for SUSE Package Hub 15 in CVE-2019-5847
no cpe found for SUSE Package Hub 15 SP1 in CVE-2019-5846
no cpe found for SUSE Package Hub 15 SP1 in CVE-2019-5845
no cpe found for SUSE Package Hub 15 SP1 in CVE-2019-5844
no cpe found for SUSE Package Hub 15 in CVE-2019-5842
no cpe found for SUSE Package Hub 15 in CVE-2019-5840
no cpe found for SUSE Package Hub 15 in CVE-2019-5839
no cpe found for SUSE Package Hub 15 in CVE-2019-5838
no cpe found for SUSE Package Hub 15 in CVE-2019-5837
no cpe found for SUSE Package Hub 15 in CVE-2019-5836
no cpe found for SUSE Package Hub 15 in CVE-2019-5835
no cpe found for SUSE Package Hub 15 in CVE-2019-5834
no cpe found for SUSE Package Hub 15 in CVE-2019-5833
no cpe found for SUSE Package Hub 15 in CVE-2019-5832
no cpe found for SUSE Package Hub 15 in CVE-2019-5831
no cpe found for SUSE Package Hub 15 in CVE-2019-5830
no cpe found for SUSE Package Hub 15 in CVE-2019-5829
no cpe found for SUSE Package Hub 15 in CVE-2019-5828
no cpe found for SUSE Package Hub 15 in CVE-2019-5827
no cpe found for SUSE Package Hub 15 in CVE-2019-5824
no cpe found for SUSE Package Hub 15 in CVE-2019-5823
no cpe found for SUSE Package Hub 15 in CVE-2019-5822
no cpe found for SUSE Package Hub 15 in CVE-2019-5821
no cpe found for SUSE Package Hub 15 in CVE-2019-5820
no cpe found for SUSE Package Hub 15 in CVE-2019-5819
no cpe found for SUSE Package Hub 15 in CVE-2019-5818
no cpe found for SUSE Package Hub 15 in CVE-2019-5817
no cpe found for SUSE Package Hub 15 in CVE-2019-5816
no cpe found for SUSE Package Hub 15 in CVE-2019-5815
no cpe found for SUSE Package Hub 15 in CVE-2019-5814
no cpe found for SUSE Package Hub 15 in CVE-2019-5813
no cpe found for SUSE Package Hub 15 in CVE-2019-5812
no cpe found for SUSE Package Hub 15 in CVE-2019-5811
no cpe found for SUSE Package Hub 15 in CVE-2019-5810
no cpe found for SUSE Package Hub 15 in CVE-2019-5809
no cpe found for SUSE Package Hub 15 in CVE-2019-5808
no cpe found for SUSE Package Hub 15 in CVE-2019-5807
no cpe found for SUSE Package Hub 15 in CVE-2019-5806
no cpe found for SUSE Package Hub 15 in CVE-2019-5805
no cpe found for SUSE Package Hub 15 in CVE-2019-5804
no cpe found for SUSE Package Hub 15 in CVE-2019-5803
no cpe found for SUSE Package Hub 15 in CVE-2019-5802
no cpe found for SUSE Package Hub 15 in CVE-2019-5801
no cpe found for SUSE Package Hub 15 in CVE-2019-5800
no cpe found for SUSE Package Hub 15 in CVE-2019-5799
no cpe found for SUSE Package Hub 15 in CVE-2019-5798
no cpe found for SUSE Package Hub 15 in CVE-2019-5797
no cpe found for SUSE Package Hub 15 in CVE-2019-5796
no cpe found for SUSE Package Hub 15 in CVE-2019-5795
no cpe found for SUSE Package Hub 15 in CVE-2019-5794
no cpe found for SUSE Package Hub 15 in CVE-2019-5793
no cpe found for SUSE Package Hub 15 in CVE-2019-5792
no cpe found for SUSE Package Hub 15 in CVE-2019-5791
no cpe found for SUSE Package Hub 15 in CVE-2019-5790
no cpe found for SUSE Package Hub 15 in CVE-2019-5789
no cpe found for SUSE Package Hub 15 in CVE-2019-5788
no cpe found for SUSE Package Hub 15 in CVE-2019-5787
no cpe found for SUSE Package Hub 15 in CVE-2019-5786
no cpe found for SUSE Package Hub 15 in CVE-2019-5784
no cpe found for SUSE Package Hub 15 in CVE-2019-5782
no cpe found for SUSE Package Hub 15 in CVE-2019-5781
no cpe found for SUSE Package Hub 15 in CVE-2019-5780
no cpe found for SUSE Package Hub 15 in CVE-2019-5779
no cpe found for SUSE Package Hub 15 in CVE-2019-5778
no cpe found for SUSE Package Hub 15 in CVE-2019-5777
no cpe found for SUSE Package Hub 15 in CVE-2019-5776
no cpe found for SUSE Package Hub 15 in CVE-2019-5775
no cpe found for SUSE Package Hub 15 in CVE-2019-5774
no cpe found for SUSE Package Hub 15 in CVE-2019-5773
no cpe found for SUSE Package Hub 15 in CVE-2019-5772
no cpe found for SUSE Package Hub 15 in CVE-2019-5771
no cpe found for SUSE Package Hub 15 in CVE-2019-5770
no cpe found for SUSE Package Hub 15 in CVE-2019-5769
no cpe found for SUSE Package Hub 15 in CVE-2019-5768
no cpe found for SUSE Package Hub 15 in CVE-2019-5767
no cpe found for SUSE Package Hub 15 in CVE-2019-5766
no cpe found for SUSE Package Hub 15 in CVE-2019-5765
no cpe found for SUSE Package Hub 15 in CVE-2019-5764
no cpe found for SUSE Package Hub 15 in CVE-2019-5763
no cpe found for SUSE Package Hub 15 in CVE-2019-5762
no cpe found for SUSE Package Hub 15 in CVE-2019-5761
no cpe found for SUSE Package Hub 15 in CVE-2019-5760
no cpe found for SUSE Package Hub 15 in CVE-2019-5759
no cpe found for SUSE Package Hub 15 in CVE-2019-5758
no cpe found for SUSE Package Hub 15 in CVE-2019-5757
no cpe found for SUSE Package Hub 15 in CVE-2019-5756
no cpe found for SUSE Package Hub 15 in CVE-2019-5755
no cpe found for SUSE Package Hub 15 in CVE-2019-5754
no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2019-5747
no cpe found for SUSE Package Hub 15 in CVE-2019-5736
no cpe found for SUSE Package Hub 15 SP1 in CVE-2019-5736
no cpe found for SUSE Package Hub 15 in CVE-2019-5460
no cpe found for SUSE Package Hub 15 SP1 in CVE-2019-5460
skipping CVE-2019-5544 as CVE page is older than CVRF-CVE file.
skipping CVE-2019-5489 as CVE page is older than CVRF-CVE file.
skipping CVE-2019-5482 as CVE page is older than CVRF-CVE file.
skipping CVE-2019-5481 as CVE page is older than CVRF-CVE file.
skipping CVE-2019-5477 as CVE page is older than CVRF-CVE file.
no cpe found for SUSE Package Hub 15 in CVE-2019-5459
no cpe found for SUSE Package Hub 15 SP1 in CVE-2019-5459
no cpe found for SUSE Package Hub 15 in CVE-2019-5439
no cpe found for SUSE Package Hub 15 SP1 in CVE-2019-5439
skipping CVE-2019-5436 as CVE page is older than CVRF-CVE file.
skipping CVE-2019-5427 as CVE page is older than CVRF-CVE file.
no cpe found for SUSE Liberty Linux 7 LTSS in CVE-2019-5188
skipping CVE-2019-5419 as CVE page is older than CVRF-CVE file.
skipping CVE-2019-5418 as CVE page is older than CVRF-CVE file.
no cpe found for SUSE Package Hub 15 SP1 in CVE-2019-5164
no cpe found for SUSE Package Hub 15 SP1 in CVE-2019-5163
no cpe found for SUSE Liberty Linux 7 LTSS in CVE-2019-5094
skipping CVE-2019-5108 as CVE page is older than CVRF-CVE file.
no cpe found for SUSE Package Hub 15 in CVE-2019-5060
no cpe found for SUSE Package Hub 15 SP1 in CVE-2019-5060
no cpe found for SUSE Package Hub 15 in CVE-2019-5059
no cpe found for SUSE Package Hub 15 SP1 in CVE-2019-5059
no cpe found for SUSE Package Hub 15 in CVE-2019-5058
no cpe found for SUSE Package Hub 15 SP1 in CVE-2019-5058
no cpe found for SUSE Package Hub 15 in CVE-2019-5057
no cpe found for SUSE Package Hub 15 SP1 in CVE-2019-5057
no cpe found for SUSE Package Hub 15 in CVE-2019-5052
no cpe found for SUSE Package Hub 15 SP1 in CVE-2019-5052
no cpe found for SUSE Package Hub 15 in CVE-2019-5051
no cpe found for SUSE Package Hub 15 SP1 in CVE-2019-5051
skipping CVE-2019-5021 as CVE page is older than CVRF-CVE file.
--- /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2019-5010.xml 2024-10-23 02:20:51.803559000 +0200
+++ /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2019-5010.xml.new 2024-10-29 02:29:45.095883000 +0100
@@ -14,13 +14,13 @@
1
- 158
- 2024-10-23T00:20:51Z
+ 159
+ 2024-10-29T01:29:44Z
current
2021-05-30T14:23:00Z
- 2024-10-23T00:20:51Z
+ 2024-10-29T01:29:44Z
cve-database/bin/generate-cvrf-cve.pl
2020-12-27T01:00:00Z
@@ -3036,6 +3036,24 @@
python313-x86-64-v3-3.13.0~b3-1.1
+
+ python314-3.14.0~a1-1.1
+
+
+ python314-curses-3.14.0~a1-1.1
+
+
+ python314-dbm-3.14.0~a1-1.1
+
+
+ python314-idle-3.14.0~a1-1.1
+
+
+ python314-tk-3.14.0~a1-1.1
+
+
+ python314-x86-64-v3-3.14.0~a1-1.1
+
python36-3.6.12-4.22.2
@@ -7635,6 +7653,24 @@
python313-x86-64-v3-3.13.0~b3-1.1 as a component of openSUSE Tumbleweed
+
+ python314-3.14.0~a1-1.1 as a component of openSUSE Tumbleweed
+
+
+ python314-curses-3.14.0~a1-1.1 as a component of openSUSE Tumbleweed
+
+
+ python314-dbm-3.14.0~a1-1.1 as a component of openSUSE Tumbleweed
+
+
+ python314-idle-3.14.0~a1-1.1 as a component of openSUSE Tumbleweed
+
+
+ python314-tk-3.14.0~a1-1.1 as a component of openSUSE Tumbleweed
+
+
+ python314-x86-64-v3-3.14.0~a1-1.1 as a component of openSUSE Tumbleweed
+
python36-3.6.15-1.1 as a component of openSUSE Tumbleweed
@@ -9491,6 +9527,12 @@
openSUSE Tumbleweed:python313-idle-3.13.0~b3-1.1
openSUSE Tumbleweed:python313-tk-3.13.0~b3-1.1
openSUSE Tumbleweed:python313-x86-64-v3-3.13.0~b3-1.1
+ openSUSE Tumbleweed:python314-3.14.0~a1-1.1
+ openSUSE Tumbleweed:python314-curses-3.14.0~a1-1.1
+ openSUSE Tumbleweed:python314-dbm-3.14.0~a1-1.1
+ openSUSE Tumbleweed:python314-idle-3.14.0~a1-1.1
+ openSUSE Tumbleweed:python314-tk-3.14.0~a1-1.1
+ openSUSE Tumbleweed:python314-x86-64-v3-3.14.0~a1-1.1
openSUSE Tumbleweed:python36-3.6.15-1.1
openSUSE Tumbleweed:python36-32bit-3.6.15-1.1
openSUSE Tumbleweed:python36-curses-3.6.15-1.1
skipping CVE-2019-4473 as CVE page is older than CVRF-CVE file.
skipping CVE-2019-3896 as CVE page is older than CVRF-CVE file.
no cpe found for SUSE Liberty Linux 7 LTSS in CVE-2019-3890
skipping CVE-2019-3886 as CVE page is older than CVRF-CVE file.
skipping CVE-2019-3881 as CVE page is older than CVRF-CVE file.
skipping CVE-2019-3880 as CVE page is older than CVRF-CVE file.
no cpe found for SUSE Package Hub 15 in CVE-2019-3871
skipping CVE-2019-3870 as CVE page is older than CVRF-CVE file.
skipping CVE-2019-3863 as CVE page is older than CVRF-CVE file.
skipping CVE-2019-3862 as CVE page is older than CVRF-CVE file.
skipping CVE-2019-3861 as CVE page is older than CVRF-CVE file.
skipping CVE-2019-3860 as CVE page is older than CVRF-CVE file.
skipping CVE-2019-3859 as CVE page is older than CVRF-CVE file.
skipping CVE-2019-3858 as CVE page is older than CVRF-CVE file.
skipping CVE-2019-3857 as CVE page is older than CVRF-CVE file.
skipping CVE-2019-3856 as CVE page is older than CVRF-CVE file.
skipping CVE-2019-3855 as CVE page is older than CVRF-CVE file.
skipping CVE-2019-3846 as CVE page is older than CVRF-CVE file.
skipping CVE-2019-3844 as CVE page is older than CVRF-CVE file.
skipping CVE-2019-3843 as CVE page is older than CVRF-CVE file.
skipping CVE-2019-3842 as CVE page is older than CVRF-CVE file.
skipping CVE-2019-3840 as CVE page is older than CVRF-CVE file.
skipping CVE-2019-3838 as CVE page is older than CVRF-CVE file.
no cpe found for SUSE Liberty Linux 7 LTSS in CVE-2019-3833
skipping CVE-2019-3835 as CVE page is older than CVRF-CVE file.
no cpe found for HPE Helion OpenStack Cloud 8 in CVE-2019-3828
no cpe found for SUSE Package Hub 15 in CVE-2019-3828
no cpe found for SUSE Package Hub 15 SP1 in CVE-2019-3828
skipping CVE-2019-3824 as CVE page is older than CVRF-CVE file.
no cpe found for SUSE Package Hub 15 in CVE-2019-3817
skipping CVE-2019-3820 as CVE page is older than CVRF-CVE file.
skipping CVE-2019-3819 as CVE page is older than CVRF-CVE file.
skipping CVE-2019-3814 as CVE page is older than CVRF-CVE file.
skipping CVE-2019-3813 as CVE page is older than CVRF-CVE file.
skipping CVE-2019-3812 as CVE page is older than CVRF-CVE file.
no cpe found for SUSE Package Hub 15 in CVE-2019-3807
notsure where SUSE Linux Enterprise Module for CAP 15 SP2 is contained?
notsure where SUSE Linux Enterprise Module for CAP 15 SP3 is contained?
notsure where SUSE Linux Enterprise Module for CAP 15 is contained?
notsure where SUSE Linux Enterprise Module for CAP 15 SP1 is contained?
skipping CVE-2019-3701 as CVE page is older than CVRF-CVE file.
skipping CVE-2019-3700 as CVE page is older than CVRF-CVE file.
no cpe found for SUSE Package Hub 15 SP1 in CVE-2019-3698
no cpe found for SUSE Package Hub 15 SP1 in CVE-2019-3693
no cpe found for SUSE Package Hub 15 SP1 in CVE-2019-3692
skipping CVE-2019-3689 as CVE page is older than CVRF-CVE file.
skipping CVE-2019-3684 as CVE page is older than CVRF-CVE file.
no cpe found for SUSE Package Hub 15 in CVE-2019-3500
no cpe found for SUSE Package Hub 15 SP1 in CVE-2019-3500
no cpe found for SUSE Package Hub 15 SP2 in CVE-2019-3500
no cpe found for SUSE Package Hub 15 SP3 in CVE-2019-3500
skipping CVE-2019-3460 as CVE page is older than CVRF-CVE file.
skipping CVE-2019-3459 as CVE page is older than CVRF-CVE file.
skipping CVE-2019-3018 as CVE page is older than CVRF-CVE file.
skipping CVE-2019-3016 as CVE page is older than CVRF-CVE file.
skipping CVE-2019-3011 as CVE page is older than CVRF-CVE file.
skipping CVE-2019-3009 as CVE page is older than CVRF-CVE file.
skipping CVE-2019-3004 as CVE page is older than CVRF-CVE file.
skipping CVE-2019-3003 as CVE page is older than CVRF-CVE file.
skipping CVE-2019-2999 as CVE page is older than CVRF-CVE file.
skipping CVE-2019-2998 as CVE page is older than CVRF-CVE file.
skipping CVE-2019-2997 as CVE page is older than CVRF-CVE file.
skipping CVE-2019-2996 as CVE page is older than CVRF-CVE file.
skipping CVE-2019-2993 as CVE page is older than CVRF-CVE file.
skipping CVE-2019-2992 as CVE page is older than CVRF-CVE file.
skipping CVE-2019-2991 as CVE page is older than CVRF-CVE file.
skipping CVE-2019-2989 as CVE page is older than CVRF-CVE file.
skipping CVE-2019-2988 as CVE page is older than CVRF-CVE file.
skipping CVE-2019-2987 as CVE page is older than CVRF-CVE file.
skipping CVE-2019-2983 as CVE page is older than CVRF-CVE file.
skipping CVE-2019-2982 as CVE page is older than CVRF-CVE file.
skipping CVE-2019-2981 as CVE page is older than CVRF-CVE file.
skipping CVE-2019-2978 as CVE page is older than CVRF-CVE file.
skipping CVE-2019-2977 as CVE page is older than CVRF-CVE file.
skipping CVE-2019-2975 as CVE page is older than CVRF-CVE file.
skipping CVE-2019-2974 as CVE page is older than CVRF-CVE file.
skipping CVE-2019-2973 as CVE page is older than CVRF-CVE file.
skipping CVE-2019-2969 as CVE page is older than CVRF-CVE file.
skipping CVE-2019-2968 as CVE page is older than CVRF-CVE file.
skipping CVE-2019-2967 as CVE page is older than CVRF-CVE file.
skipping CVE-2019-2966 as CVE page is older than CVRF-CVE file.
skipping CVE-2019-2964 as CVE page is older than CVRF-CVE file.
skipping CVE-2019-2963 as CVE page is older than CVRF-CVE file.
skipping CVE-2019-2962 as CVE page is older than CVRF-CVE file.
skipping CVE-2019-2960 as CVE page is older than CVRF-CVE file.
skipping CVE-2019-2958 as CVE page is older than CVRF-CVE file.
skipping CVE-2019-2957 as CVE page is older than CVRF-CVE file.
skipping CVE-2019-2950 as CVE page is older than CVRF-CVE file.
skipping CVE-2019-2949 as CVE page is older than CVRF-CVE file.
skipping CVE-2019-2948 as CVE page is older than CVRF-CVE file.
skipping CVE-2019-2946 as CVE page is older than CVRF-CVE file.
skipping CVE-2019-2945 as CVE page is older than CVRF-CVE file.
skipping CVE-2019-2938 as CVE page is older than CVRF-CVE file.
skipping CVE-2019-2933 as CVE page is older than CVRF-CVE file.
skipping CVE-2019-2924 as CVE page is older than CVRF-CVE file.
skipping CVE-2019-2923 as CVE page is older than CVRF-CVE file.
skipping CVE-2019-2922 as CVE page is older than CVRF-CVE file.
skipping CVE-2019-2920 as CVE page is older than CVRF-CVE file.
skipping CVE-2019-2914 as CVE page is older than CVRF-CVE file.
skipping CVE-2019-2911 as CVE page is older than CVRF-CVE file.
skipping CVE-2019-2910 as CVE page is older than CVRF-CVE file.
skipping CVE-2019-2821 as CVE page is older than CVRF-CVE file.
skipping CVE-2019-2818 as CVE page is older than CVRF-CVE file.
skipping CVE-2019-2816 as CVE page is older than CVRF-CVE file.
skipping CVE-2019-2786 as CVE page is older than CVRF-CVE file.
skipping CVE-2019-2769 as CVE page is older than CVRF-CVE file.
skipping CVE-2019-2766 as CVE page is older than CVRF-CVE file.
skipping CVE-2019-2762 as CVE page is older than CVRF-CVE file.
skipping CVE-2019-2745 as CVE page is older than CVRF-CVE file.
skipping CVE-2019-2708 as CVE page is older than CVRF-CVE file.
skipping CVE-2019-2698 as CVE page is older than CVRF-CVE file.
skipping CVE-2019-2684 as CVE page is older than CVRF-CVE file.
skipping CVE-2019-2602 as CVE page is older than CVRF-CVE file.
skipping CVE-2019-2539 as CVE page is older than CVRF-CVE file.
skipping CVE-2019-2537 as CVE page is older than CVRF-CVE file.
skipping CVE-2019-2536 as CVE page is older than CVRF-CVE file.
skipping CVE-2019-2535 as CVE page is older than CVRF-CVE file.
skipping CVE-2019-2534 as CVE page is older than CVRF-CVE file.
skipping CVE-2019-2533 as CVE page is older than CVRF-CVE file.
skipping CVE-2019-2532 as CVE page is older than CVRF-CVE file.
skipping CVE-2019-2531 as CVE page is older than CVRF-CVE file.
skipping CVE-2019-2530 as CVE page is older than CVRF-CVE file.
skipping CVE-2019-2529 as CVE page is older than CVRF-CVE file.
skipping CVE-2019-2528 as CVE page is older than CVRF-CVE file.
skipping CVE-2019-2513 as CVE page is older than CVRF-CVE file.
skipping CVE-2019-2510 as CVE page is older than CVRF-CVE file.
skipping CVE-2019-2507 as CVE page is older than CVRF-CVE file.
skipping CVE-2019-2503 as CVE page is older than CVRF-CVE file.
skipping CVE-2019-2482 as CVE page is older than CVRF-CVE file.
skipping CVE-2019-2481 as CVE page is older than CVRF-CVE file.
skipping CVE-2019-2455 as CVE page is older than CVRF-CVE file.
no cpe found for SUSE Package Hub 15 SP1 in CVE-2019-2435
skipping CVE-2019-2426 as CVE page is older than CVRF-CVE file.
skipping CVE-2019-2422 as CVE page is older than CVRF-CVE file.
no cpe found for HPE Helion OpenStack Cloud 8 in CVE-2019-2390
no cpe found for HPE Helion OpenStack Cloud 8 in CVE-2019-2389
skipping CVE-2019-2215 as CVE page is older than CVRF-CVE file.
skipping CVE-2019-2126 as CVE page is older than CVRF-CVE file.
skipping CVE-2019-2054 as CVE page is older than CVRF-CVE file.
notsure where Security Module for SUSE Linux Enterprise 11 is contained?
skipping CVE-2019-1559 as CVE page is older than CVRF-CVE file.
skipping CVE-2019-1549 as CVE page is older than CVRF-CVE file.
skipping CVE-2019-1547 as CVE page is older than CVRF-CVE file.
skipping CVE-2019-1543 as CVE page is older than CVRF-CVE file.
skipping CVE-2019-1125 as CVE page is older than CVRF-CVE file.
no cpe found for SUSE Linux Enterprise Server 11-PUBCLOUD in CVE-2019-0804
CVE-2019-0223: no packages for SUSE Linux Enterprise Module for Package Hub 15 SP5, but entry?
CVE-2019-0223: no packages for SUSE Linux Enterprise Module for Package Hub 15 SP5, but entry?
CVE-2019-0223: no packages for SUSE Linux Enterprise Module for Package Hub 15 SP5, but entry?
skipping CVE-2019-0221 as CVE page is older than CVRF-CVE file.
skipping CVE-2019-0220 as CVE page is older than CVRF-CVE file.
skipping CVE-2019-0217 as CVE page is older than CVRF-CVE file.
no cpe found for HPE Helion OpenStack Cloud 8 in CVE-2019-0210
skipping CVE-2019-0211 as CVE page is older than CVRF-CVE file.
no cpe found for HPE Helion OpenStack Cloud 8 in CVE-2019-0205
skipping CVE-2019-0199 as CVE page is older than CVRF-CVE file.
skipping CVE-2019-0197 as CVE page is older than CVRF-CVE file.
skipping CVE-2019-0196 as CVE page is older than CVRF-CVE file.
no cpe found for SUSE Liberty Linux 7 LTSS in CVE-2019-0161
skipping CVE-2019-0160 as CVE page is older than CVRF-CVE file.
skipping CVE-2019-0155 as CVE page is older than CVRF-CVE file.
skipping CVE-2019-0136 as CVE page is older than CVRF-CVE file.
no entry found for CVE-2018-1002161 / /home/securitybot/prod/cve-database/cvelist/2018/1002xxxx/CVE-2018-1002161.json:No such file or directory
No V5 entry found for CVE-2018-1002161 / /home/securitybot/prod/cve-database/cvelistV5/cves/2018/1002xxxx/CVE-2018-1002161.json:No such file or directory
skipping CVE-2018-1000880 as CVE page is older than CVRF-CVE file.
skipping CVE-2018-1000879 as CVE page is older than CVRF-CVE file.
skipping CVE-2018-1000878 as CVE page is older than CVRF-CVE file.
skipping CVE-2018-1000877 as CVE page is older than CVRF-CVE file.
skipping CVE-2018-1000876 as CVE page is older than CVRF-CVE file.
no cpe found for SUSE Manager Tools 15 SP1 in CVE-2018-1000816
skipping CVE-2018-1000845 as CVE page is older than CVRF-CVE file.
no cpe found for SUSE Linux Enterprise Server 12 SP5 LTSS Extended Security in CVE-2018-1000807
--- /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2018-1000807.xml 2024-10-24 02:20:55.318586000 +0200
+++ /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2018-1000807.xml.new 2024-10-29 02:31:29.448957000 +0100
@@ -14,13 +14,13 @@
1
- 105
- 2024-10-24T00:20:53Z
+ 106
+ 2024-10-29T01:31:28Z
current
2021-05-30T14:20:45Z
- 2024-10-24T00:20:53Z
+ 2024-10-29T01:31:28Z
cve-database/bin/generate-cvrf-cve.pl
2020-12-27T01:00:00Z
@@ -2547,8 +2547,8 @@
python-cryptography-1.3.1-7.13.4 as a component of Image SLES12-SP5-GCE-BYOS
-
- python-pyOpenSSL-17.1.0-4.26.1 as a component of Image SLES12-SP5-GCE-BYOS
+
+ python-pyOpenSSL-17.1.0-4.29.1 as a component of Image SLES12-SP5-GCE-BYOS
python-setuptools-18.0.1-4.8.1 as a component of Image SLES12-SP5-GCE-BYOS
@@ -2556,8 +2556,8 @@
python3-cryptography-1.3.1-7.13.4 as a component of Image SLES12-SP5-GCE-BYOS
-
- python3-pyOpenSSL-17.1.0-4.26.1 as a component of Image SLES12-SP5-GCE-BYOS
+
+ python3-pyOpenSSL-17.1.0-4.29.1 as a component of Image SLES12-SP5-GCE-BYOS
python3-setuptools-18.0.1-4.8.1 as a component of Image SLES12-SP5-GCE-BYOS
@@ -2574,8 +2574,8 @@
python-cryptography-1.3.1-7.13.4 as a component of Image SLES12-SP5-GCE-SAP-BYOS
-
- python-pyOpenSSL-17.1.0-4.26.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+ python-pyOpenSSL-17.1.0-4.29.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
python-setuptools-18.0.1-4.8.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
@@ -2583,8 +2583,8 @@
python3-cryptography-1.3.1-7.13.4 as a component of Image SLES12-SP5-GCE-SAP-BYOS
-
- python3-pyOpenSSL-17.1.0-4.26.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+ python3-pyOpenSSL-17.1.0-4.29.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
python3-setuptools-18.0.1-4.8.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
@@ -2592,8 +2592,8 @@
python-cryptography-1.3.1-7.13.4 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
-
- python-pyOpenSSL-17.1.0-4.26.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
+ python-pyOpenSSL-17.1.0-4.29.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
python-setuptools-18.0.1-4.8.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
@@ -2601,8 +2601,8 @@
python3-cryptography-1.3.1-7.13.4 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
-
- python3-pyOpenSSL-17.1.0-4.26.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
+ python3-pyOpenSSL-17.1.0-4.29.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
python3-setuptools-18.0.1-4.8.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
@@ -4436,25 +4436,25 @@
Image SLES12-SP5-EC2-SAP-On-Demand:python3-pyOpenSSL-17.1.0-4.26.1
Image SLES12-SP5-EC2-SAP-On-Demand:python3-setuptools-18.0.1-4.8.1
Image SLES12-SP5-GCE-BYOS:python-cryptography-1.3.1-7.13.4
- Image SLES12-SP5-GCE-BYOS:python-pyOpenSSL-17.1.0-4.26.1
+ Image SLES12-SP5-GCE-BYOS:python-pyOpenSSL-17.1.0-4.29.1
Image SLES12-SP5-GCE-BYOS:python-setuptools-18.0.1-4.8.1
Image SLES12-SP5-GCE-BYOS:python3-cryptography-1.3.1-7.13.4
- Image SLES12-SP5-GCE-BYOS:python3-pyOpenSSL-17.1.0-4.26.1
+ Image SLES12-SP5-GCE-BYOS:python3-pyOpenSSL-17.1.0-4.29.1
Image SLES12-SP5-GCE-BYOS:python3-setuptools-18.0.1-4.8.1
Image SLES12-SP5-GCE-On-Demand:python3-cryptography-1.3.1-7.13.4
Image SLES12-SP5-GCE-On-Demand:python3-pyOpenSSL-17.1.0-4.26.1
Image SLES12-SP5-GCE-On-Demand:python3-setuptools-18.0.1-4.8.1
Image SLES12-SP5-GCE-SAP-BYOS:python-cryptography-1.3.1-7.13.4
- Image SLES12-SP5-GCE-SAP-BYOS:python-pyOpenSSL-17.1.0-4.26.1
+ Image SLES12-SP5-GCE-SAP-BYOS:python-pyOpenSSL-17.1.0-4.29.1
Image SLES12-SP5-GCE-SAP-BYOS:python-setuptools-18.0.1-4.8.1
Image SLES12-SP5-GCE-SAP-BYOS:python3-cryptography-1.3.1-7.13.4
- Image SLES12-SP5-GCE-SAP-BYOS:python3-pyOpenSSL-17.1.0-4.26.1
+ Image SLES12-SP5-GCE-SAP-BYOS:python3-pyOpenSSL-17.1.0-4.29.1
Image SLES12-SP5-GCE-SAP-BYOS:python3-setuptools-18.0.1-4.8.1
Image SLES12-SP5-GCE-SAP-On-Demand:python-cryptography-1.3.1-7.13.4
- Image SLES12-SP5-GCE-SAP-On-Demand:python-pyOpenSSL-17.1.0-4.26.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:python-pyOpenSSL-17.1.0-4.29.1
Image SLES12-SP5-GCE-SAP-On-Demand:python-setuptools-18.0.1-4.8.1
Image SLES12-SP5-GCE-SAP-On-Demand:python3-cryptography-1.3.1-7.13.4
- Image SLES12-SP5-GCE-SAP-On-Demand:python3-pyOpenSSL-17.1.0-4.26.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:python3-pyOpenSSL-17.1.0-4.29.1
Image SLES12-SP5-GCE-SAP-On-Demand:python3-setuptools-18.0.1-4.8.1
Image SLES12-SP5-OCI-BYOS-BYOS:python3-cryptography-1.3.1-7.13.4
Image SLES12-SP5-OCI-BYOS-BYOS:python3-pyOpenSSL-16.0.0-4.11.3
no cpe found for SUSE Package Hub 15 in CVE-2018-1000801
skipping CVE-2018-1000805 as CVE page is older than CVRF-CVE file.
skipping CVE-2018-1000802 as CVE page is older than CVRF-CVE file.
skipping CVE-2018-1000654 as CVE page is older than CVRF-CVE file.
skipping CVE-2018-1000632 as CVE page is older than CVRF-CVE file.
CVE-2018-1000518: no packages for SUSE Linux Enterprise Module for Package Hub 15 SP6, but entry?
CVE-2018-1000518: no packages for Image SLES15-SP3-SAP-Azure-VLI-BYOS-Production, but entry?
CVE-2018-1000518: no packages for SUSE Linux Enterprise Module for Public Cloud 15 SP5, but entry?
CVE-2018-1000518: no packages for Image SLES15-SP6-SAP-Azure-LI-BYOS-Production, but entry?
CVE-2018-1000518: no packages for Image SLES15-SP4-SAP-Azure-LI-BYOS, but entry?
CVE-2018-1000518: no packages for Image SLES15-SP2-SAP-GCE, but entry?
CVE-2018-1000518: no packages for SUSE Linux Enterprise Installer Updates 15 SP1, but entry?
CVE-2018-1000518: no packages for Image SLES15-SP6-SAP-Azure-VLI-BYOS-Production, but entry?
CVE-2018-1000518: no packages for Image SLES15-SP6-SAP-Azure-LI-BYOS, but entry?
CVE-2018-1000518: no packages for Image SLES15-SP4-SAP-Azure-VLI-BYOS, but entry?
CVE-2018-1000518: no packages for Image SLES15-SP5-SAP-Azure-LI-BYOS, but entry?
CVE-2018-1000518: no packages for Image SLES15-SP4-SAP-Azure-VLI-BYOS-Production, but entry?
CVE-2018-1000518: no packages for Image SLES15-SP2-SAP-BYOS-EC2-HVM, but entry?
CVE-2018-1000518: no packages for SUSE Linux Enterprise Module for Public Cloud 15 SP6, but entry?
CVE-2018-1000518: no packages for Image SLES15-SP2-SAP-Azure-VLI-BYOS-Production, but entry?
CVE-2018-1000518: no packages for SUSE Linux Enterprise Module for Server Applications 15 SP4, but entry?
CVE-2018-1000518: no packages for SUSE Linux Enterprise Module for Server Applications 15 SP5, but entry?
CVE-2018-1000518: no packages for Image SLES15-SP2-SAP-BYOS-GCE, but entry?
CVE-2018-1000518: no packages for Image SLES15-SP5-SAP-Azure-VLI-BYOS, but entry?
CVE-2018-1000518: no packages for Image SLES15-SP5-SAP-Azure-LI-BYOS-Production, but entry?
CVE-2018-1000518: no packages for Container suse/sle15:15.1.6.2.811, but entry?
CVE-2018-1000518: no packages for SUSE Linux Enterprise Module for Package Hub 15 SP5, but entry?
CVE-2018-1000518: no packages for Image SLES15-SP1-SAP-Azure-VLI-BYOS-Production, but entry?
CVE-2018-1000518: no packages for Image SLES15-SP2-SAP-Azure-LI-BYOS-Production, but entry?
CVE-2018-1000518: no packages for Image SLES15-SP4-SAP-Azure-LI-BYOS-Production, but entry?
CVE-2018-1000518: no packages for SUSE Linux Enterprise Module for Server Applications 15 SP6, but entry?
CVE-2018-1000518: no packages for Image SLES15-SP1-SAP-Azure-LI-BYOS-Production, but entry?
CVE-2018-1000518: no packages for Image SLES15-SP3-SAP-Azure-LI-BYOS-Production, but entry?
CVE-2018-1000518: no packages for Image SLES15-SP2-SAP-EC2-HVM, but entry?
CVE-2018-1000518: no packages for Image SLES15-SP6-SAP-Azure-VLI-BYOS, but entry?
CVE-2018-1000518: no packages for Image SLES15-SP5-SAP-Azure-VLI-BYOS-Production, but entry?
no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2018-1000518
CVE-2018-1000518: no packages for Container suse/sle15:15.1.6.2.811, but entry?
CVE-2018-1000518: no packages for Image SLES15-SP1-SAP-Azure-LI-BYOS-Production, but entry?
CVE-2018-1000518: no packages for Image SLES15-SP1-SAP-Azure-VLI-BYOS-Production, but entry?
CVE-2018-1000518: no packages for Image SLES15-SP2-SAP-Azure-LI-BYOS-Production, but entry?
CVE-2018-1000518: no packages for Image SLES15-SP2-SAP-Azure-VLI-BYOS-Production, but entry?
CVE-2018-1000518: no packages for Image SLES15-SP2-SAP-BYOS-EC2-HVM, but entry?
CVE-2018-1000518: no packages for Image SLES15-SP2-SAP-BYOS-GCE, but entry?
CVE-2018-1000518: no packages for Image SLES15-SP2-SAP-EC2-HVM, but entry?
CVE-2018-1000518: no packages for Image SLES15-SP2-SAP-GCE, but entry?
CVE-2018-1000518: no packages for Image SLES15-SP3-SAP-Azure-LI-BYOS-Production, but entry?
CVE-2018-1000518: no packages for Image SLES15-SP3-SAP-Azure-VLI-BYOS-Production, but entry?
CVE-2018-1000518: no packages for Image SLES15-SP4-SAP-Azure-LI-BYOS, but entry?
CVE-2018-1000518: no packages for Image SLES15-SP4-SAP-Azure-LI-BYOS-Production, but entry?
CVE-2018-1000518: no packages for Image SLES15-SP4-SAP-Azure-VLI-BYOS, but entry?
CVE-2018-1000518: no packages for Image SLES15-SP4-SAP-Azure-VLI-BYOS-Production, but entry?
CVE-2018-1000518: no packages for Image SLES15-SP5-SAP-Azure-LI-BYOS, but entry?
CVE-2018-1000518: no packages for Image SLES15-SP5-SAP-Azure-LI-BYOS-Production, but entry?
CVE-2018-1000518: no packages for Image SLES15-SP5-SAP-Azure-VLI-BYOS, but entry?
CVE-2018-1000518: no packages for Image SLES15-SP5-SAP-Azure-VLI-BYOS-Production, but entry?
CVE-2018-1000518: no packages for Image SLES15-SP6-SAP-Azure-LI-BYOS, but entry?
CVE-2018-1000518: no packages for Image SLES15-SP6-SAP-Azure-LI-BYOS-Production, but entry?
CVE-2018-1000518: no packages for Image SLES15-SP6-SAP-Azure-VLI-BYOS, but entry?
CVE-2018-1000518: no packages for Image SLES15-SP6-SAP-Azure-VLI-BYOS-Production, but entry?
CVE-2018-1000518: no packages for SUSE Linux Enterprise Installer Updates 15 SP1, but entry?
CVE-2018-1000518: no packages for SUSE Linux Enterprise Module for Package Hub 15 SP5, but entry?
CVE-2018-1000518: no packages for SUSE Linux Enterprise Module for Package Hub 15 SP6, but entry?
CVE-2018-1000518: no packages for SUSE Linux Enterprise Module for Public Cloud 15 SP5, but entry?
CVE-2018-1000518: no packages for SUSE Linux Enterprise Module for Public Cloud 15 SP6, but entry?
CVE-2018-1000518: no packages for SUSE Linux Enterprise Module for Server Applications 15 SP4, but entry?
CVE-2018-1000518: no packages for SUSE Linux Enterprise Module for Server Applications 15 SP5, but entry?
CVE-2018-1000518: no packages for SUSE Linux Enterprise Module for Server Applications 15 SP6, but entry?
CVE-2018-1000518: no packages for Container suse/sle15:15.1.6.2.811, but entry?
CVE-2018-1000518: no packages for Image SLES15-SP1-SAP-Azure-LI-BYOS-Production, but entry?
CVE-2018-1000518: no packages for Image SLES15-SP1-SAP-Azure-VLI-BYOS-Production, but entry?
CVE-2018-1000518: no packages for Image SLES15-SP2-SAP-Azure-LI-BYOS-Production, but entry?
CVE-2018-1000518: no packages for Image SLES15-SP2-SAP-Azure-VLI-BYOS-Production, but entry?
CVE-2018-1000518: no packages for Image SLES15-SP2-SAP-BYOS-EC2-HVM, but entry?
CVE-2018-1000518: no packages for Image SLES15-SP2-SAP-BYOS-GCE, but entry?
CVE-2018-1000518: no packages for Image SLES15-SP2-SAP-EC2-HVM, but entry?
CVE-2018-1000518: no packages for Image SLES15-SP2-SAP-GCE, but entry?
CVE-2018-1000518: no packages for Image SLES15-SP3-SAP-Azure-LI-BYOS-Production, but entry?
CVE-2018-1000518: no packages for Image SLES15-SP3-SAP-Azure-VLI-BYOS-Production, but entry?
CVE-2018-1000518: no packages for Image SLES15-SP4-SAP-Azure-LI-BYOS, but entry?
CVE-2018-1000518: no packages for Image SLES15-SP4-SAP-Azure-LI-BYOS-Production, but entry?
CVE-2018-1000518: no packages for Image SLES15-SP4-SAP-Azure-VLI-BYOS, but entry?
CVE-2018-1000518: no packages for Image SLES15-SP4-SAP-Azure-VLI-BYOS-Production, but entry?
CVE-2018-1000518: no packages for Image SLES15-SP5-SAP-Azure-LI-BYOS, but entry?
CVE-2018-1000518: no packages for Image SLES15-SP5-SAP-Azure-LI-BYOS-Production, but entry?
CVE-2018-1000518: no packages for Image SLES15-SP5-SAP-Azure-VLI-BYOS, but entry?
CVE-2018-1000518: no packages for Image SLES15-SP5-SAP-Azure-VLI-BYOS-Production, but entry?
CVE-2018-1000518: no packages for Image SLES15-SP6-SAP-Azure-LI-BYOS, but entry?
CVE-2018-1000518: no packages for Image SLES15-SP6-SAP-Azure-LI-BYOS-Production, but entry?
CVE-2018-1000518: no packages for Image SLES15-SP6-SAP-Azure-VLI-BYOS, but entry?
CVE-2018-1000518: no packages for Image SLES15-SP6-SAP-Azure-VLI-BYOS-Production, but entry?
CVE-2018-1000518: no packages for SUSE Linux Enterprise Installer Updates 15 SP1, but entry?
CVE-2018-1000518: no packages for SUSE Linux Enterprise Module for Package Hub 15 SP5, but entry?
CVE-2018-1000518: no packages for SUSE Linux Enterprise Module for Package Hub 15 SP6, but entry?
CVE-2018-1000518: no packages for SUSE Linux Enterprise Module for Public Cloud 15 SP5, but entry?
CVE-2018-1000518: no packages for SUSE Linux Enterprise Module for Public Cloud 15 SP6, but entry?
CVE-2018-1000518: no packages for SUSE Linux Enterprise Module for Server Applications 15 SP4, but entry?
CVE-2018-1000518: no packages for SUSE Linux Enterprise Module for Server Applications 15 SP5, but entry?
CVE-2018-1000518: no packages for SUSE Linux Enterprise Module for Server Applications 15 SP6, but entry?
no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2018-1000517
no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2018-1000500
skipping CVE-2018-1000301 as CVE page is older than CVRF-CVE file.
skipping CVE-2018-1000300 as CVE page is older than CVRF-CVE file.
skipping CVE-2018-1000226 as CVE page is older than CVRF-CVE file.
skipping CVE-2018-1000225 as CVE page is older than CVRF-CVE file.
skipping CVE-2018-1000223 as CVE page is older than CVRF-CVE file.
skipping CVE-2018-1000204 as CVE page is older than CVRF-CVE file.
skipping CVE-2018-1000199 as CVE page is older than CVRF-CVE file.
skipping CVE-2018-1000140 as CVE page is older than CVRF-CVE file.
skipping CVE-2018-1000135 as CVE page is older than CVRF-CVE file.
skipping CVE-2018-1000122 as CVE page is older than CVRF-CVE file.
skipping CVE-2018-1000120 as CVE page is older than CVRF-CVE file.
no cpe found for SUSE Studio Onsite Runner 1.3 in CVE-2018-1000115
skipping CVE-2018-1000030 as CVE page is older than CVRF-CVE file.
skipping CVE-2018-1000005 as CVE page is older than CVRF-CVE file.
skipping CVE-2018-1000004 as CVE page is older than CVRF-CVE file.
skipping CVE-2018-1000001 as CVE page is older than CVRF-CVE file.
skipping CVE-2018-25103 as CVE page is older than CVRF-CVE file.
no cpe found for SUSE Package Hub 15 SP5 in CVE-2018-25099
skipping CVE-2018-25091 as CVE page is older than CVRF-CVE file.
skipping CVE-2018-25032 as CVE page is older than CVRF-CVE file.
no cpe found for SUSE Liberty Linux 7 LTSS in CVE-2018-25014
skipping CVE-2018-25015 as CVE page is older than CVRF-CVE file.
skipping CVE-2018-25013 as CVE page is older than CVRF-CVE file.
skipping CVE-2018-25012 as CVE page is older than CVRF-CVE file.
skipping CVE-2018-25011 as CVE page is older than CVRF-CVE file.
skipping CVE-2018-25010 as CVE page is older than CVRF-CVE file.
skipping CVE-2018-25009 as CVE page is older than CVRF-CVE file.
no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2018-21232
skipping CVE-2018-21010 as CVE page is older than CVRF-CVE file.
skipping CVE-2018-21009 as CVE page is older than CVRF-CVE file.
skipping CVE-2018-21008 as CVE page is older than CVRF-CVE file.
no cpe found for SUSE Liberty Linux 7 LTSS in CVE-2018-20969
skipping CVE-2018-20976 as CVE page is older than CVRF-CVE file.
skipping CVE-2018-20856 as CVE page is older than CVRF-CVE file.
skipping CVE-2018-20855 as CVE page is older than CVRF-CVE file.
no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2018-20846
skipping CVE-2018-20847 as CVE page is older than CVRF-CVE file.
no cpe found for SUSE Package Hub 15 in CVE-2018-20822
no cpe found for SUSE Package Hub 15 SP1 in CVE-2018-20822
skipping CVE-2018-20843 as CVE page is older than CVRF-CVE file.
skipping CVE-2018-20839 as CVE page is older than CVRF-CVE file.
skipping CVE-2018-20836 as CVE page is older than CVRF-CVE file.
no cpe found for SUSE Package Hub 15 in CVE-2018-20821
no cpe found for SUSE Package Hub 15 SP1 in CVE-2018-20821
skipping CVE-2018-20815 as CVE page is older than CVRF-CVE file.
skipping CVE-2018-20786 as CVE page is older than CVRF-CVE file.
skipping CVE-2018-20784 as CVE page is older than CVRF-CVE file.
skipping CVE-2018-20781 as CVE page is older than CVRF-CVE file.
no cpe found for SUSE Package Hub 15 in CVE-2018-20743
no cpe found for SUSE Package Hub 15 SP1 in CVE-2018-20743
no cpe found for SUSE Package Hub 15 SP1 in CVE-2018-20726
no cpe found for SUSE Package Hub 15 SP1 in CVE-2018-20725
no cpe found for SUSE Package Hub 15 SP1 in CVE-2018-20724
no cpe found for SUSE Package Hub 15 SP1 in CVE-2018-20723
no cpe found for SUSE Package Hub 15 in CVE-2018-20721
skipping CVE-2018-20712 as CVE page is older than CVRF-CVE file.
no cpe found for SUSE Package Hub 15 in CVE-2018-20683
no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2018-20679
skipping CVE-2018-20671 as CVE page is older than CVRF-CVE file.
skipping CVE-2018-20651 as CVE page is older than CVRF-CVE file.
skipping CVE-2018-20623 as CVE page is older than CVRF-CVE file.
no cpe found for SUSE Linux Enterprise Installer Updates 15 SP2 in CVE-2018-20574
no cpe found for SUSE Linux Enterprise Installer Updates 15 SP2 in CVE-2018-20574
no cpe found for SUSE Linux Enterprise Installer Updates 15 SP2 in CVE-2018-20574
no cpe found for SUSE Linux Enterprise Installer Updates 15 SP2 in CVE-2018-20574
no cpe found for SUSE Linux Enterprise Installer Updates 15 SP2 in CVE-2018-20574
no cpe found for SUSE Linux Enterprise Installer Updates 15 SP2 in CVE-2018-20574
no cpe found for SUSE Linux Enterprise Installer Updates 15 SP2 in CVE-2018-20574
no cpe found for SUSE Linux Enterprise Installer Updates 15 SP2 in CVE-2018-20574
no cpe found for SUSE Linux Enterprise Installer Updates 15 SP2 in CVE-2018-20573
no cpe found for SUSE Linux Enterprise Installer Updates 15 SP2 in CVE-2018-20573
no cpe found for SUSE Linux Enterprise Installer Updates 15 SP2 in CVE-2018-20573
no cpe found for SUSE Linux Enterprise Installer Updates 15 SP2 in CVE-2018-20573
no cpe found for SUSE Linux Enterprise Installer Updates 15 SP2 in CVE-2018-20573
no cpe found for SUSE Linux Enterprise Installer Updates 15 SP2 in CVE-2018-20573
no cpe found for SUSE Linux Enterprise Installer Updates 15 SP2 in CVE-2018-20573
no cpe found for SUSE Linux Enterprise Installer Updates 15 SP2 in CVE-2018-20573
no cpe found for SUSE Liberty Linux 7 LTSS in CVE-2018-20534
no cpe found for SUSE Liberty Linux 7 LTSS in CVE-2018-20533
no cpe found for SUSE Liberty Linux 7 LTSS in CVE-2018-20532
skipping CVE-2018-20511 as CVE page is older than CVRF-CVE file.
no cpe found for SUSE Liberty Linux 7 LTSS in CVE-2018-20467
skipping CVE-2018-20433 as CVE page is older than CVRF-CVE file.
skipping CVE-2018-20406 as CVE page is older than CVRF-CVE file.
skipping CVE-2018-20346 as CVE page is older than CVRF-CVE file.
No V5 entry found for CVE-2018-20319 / /home/securitybot/prod/cve-database/cvelistV5/cves/2018/20xxxx/CVE-2018-20319.json:No such file or directory
CVE-2018-20319: no packages for SUSE Linux Enterprise Server 15 SP4-TERADATA, but entry?
CVE-2018-20319: no packages for SUSE Linux Enterprise Module for Basesystem 15 SP5, but entry?
CVE-2018-20319: no packages for SUSE Linux Enterprise Module for Basesystem 15 SP6, but entry?
CVE-2018-20319: no packages for SUSE Linux Enterprise Module for Basesystem 15 SP5, but entry?
CVE-2018-20319: no packages for SUSE Linux Enterprise Module for Basesystem 15 SP6, but entry?
CVE-2018-20319: no packages for SUSE Linux Enterprise Server 15 SP4-TERADATA, but entry?
CVE-2018-20319: no packages for SUSE Linux Enterprise Module for Basesystem 15 SP5, but entry?
CVE-2018-20319: no packages for SUSE Linux Enterprise Module for Basesystem 15 SP6, but entry?
CVE-2018-20319: no packages for SUSE Linux Enterprise Server 15 SP4-TERADATA, but entry?
no cpe found for SUSE Package Hub 15 in CVE-2018-20230
no cpe found for SUSE Package Hub 15 in CVE-2018-20190
no cpe found for SUSE Package Hub 15 SP1 in CVE-2018-20190
skipping CVE-2018-20217 as CVE page is older than CVRF-CVE file.
skipping CVE-2018-20216 as CVE page is older than CVRF-CVE file.
skipping CVE-2018-20191 as CVE page is older than CVRF-CVE file.
no cpe found for SUSE Package Hub 15 in CVE-2018-20189
no cpe found for SUSE Package Hub 15 in CVE-2018-20184
no cpe found for SUSE Package Hub 15 SP1 in CVE-2018-20182
no cpe found for SUSE Package Hub 15 SP1 in CVE-2018-20181
no cpe found for SUSE Package Hub 15 SP1 in CVE-2018-20180
no cpe found for SUSE Package Hub 15 SP1 in CVE-2018-20179
no cpe found for SUSE Package Hub 15 SP1 in CVE-2018-20178
no cpe found for SUSE Package Hub 15 SP1 in CVE-2018-20177
no cpe found for SUSE Package Hub 15 SP1 in CVE-2018-20176
no cpe found for SUSE Package Hub 15 SP1 in CVE-2018-20175
no cpe found for SUSE Package Hub 15 SP1 in CVE-2018-20174
skipping CVE-2018-20169 as CVE page is older than CVRF-CVE file.
skipping CVE-2018-20126 as CVE page is older than CVRF-CVE file.
skipping CVE-2018-20125 as CVE page is older than CVRF-CVE file.
skipping CVE-2018-20124 as CVE page is older than CVRF-CVE file.
skipping CVE-2018-20123 as CVE page is older than CVRF-CVE file.
no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2018-20099
no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2018-20098
skipping CVE-2018-20097 as CVE page is older than CVRF-CVE file.
no cpe found for SUSE Package Hub 15 in CVE-2018-20073
skipping CVE-2018-20060 as CVE page is older than CVRF-CVE file.
skipping CVE-2018-20024 as CVE page is older than CVRF-CVE file.
skipping CVE-2018-20023 as CVE page is older than CVRF-CVE file.
skipping CVE-2018-20022 as CVE page is older than CVRF-CVE file.
skipping CVE-2018-20021 as CVE page is older than CVRF-CVE file.
skipping CVE-2018-20020 as CVE page is older than CVRF-CVE file.
skipping CVE-2018-20019 as CVE page is older than CVRF-CVE file.
no cpe found for SUSE Linux Enterprise Real Time 11 SP4 in CVE-2018-19985
no cpe found for SUSE Package Hub 15 in CVE-2018-19970
no cpe found for SUSE Package Hub 15 in CVE-2018-19969
no cpe found for SUSE Package Hub 15 in CVE-2018-19968
skipping CVE-2018-19932 as CVE page is older than CVRF-CVE file.
skipping CVE-2018-19931 as CVE page is older than CVRF-CVE file.
skipping CVE-2018-19873 as CVE page is older than CVRF-CVE file.
no cpe found for SUSE Liberty Linux 7 LTSS in CVE-2018-19871
no cpe found for SUSE Liberty Linux 7 LTSS in CVE-2018-19870
no cpe found for SUSE Liberty Linux 7 LTSS in CVE-2018-19869
no cpe found for SUSE Package Hub 15 SP1 in CVE-2018-19869
no cpe found for SUSE Package Hub 15 SP2 in CVE-2018-19869
no cpe found for SUSE Package Hub 15 in CVE-2018-19865
no cpe found for SUSE Package Hub 15 in CVE-2018-19857
no cpe found for SUSE Package Hub 15 SP1 in CVE-2018-19857
skipping CVE-2018-19854 as CVE page is older than CVRF-CVE file.
no cpe found for SUSE Package Hub 15 in CVE-2018-19839
no cpe found for SUSE Package Hub 15 SP1 in CVE-2018-19839
no cpe found for SUSE Package Hub 15 in CVE-2018-19838
no cpe found for SUSE Package Hub 15 SP1 in CVE-2018-19838
no cpe found for SUSE Package Hub 15 in CVE-2018-19837
no cpe found for SUSE Package Hub 15 SP1 in CVE-2018-19837
no cpe found for SUSE Package Hub 15 in CVE-2018-19827
no cpe found for SUSE Package Hub 15 SP1 in CVE-2018-19827
no cpe found for SUSE Package Hub 15 in CVE-2018-19802
no cpe found for SUSE Package Hub 15 SP1 in CVE-2018-19802
skipping CVE-2018-19824 as CVE page is older than CVRF-CVE file.
no cpe found for SUSE Package Hub 15 in CVE-2018-19801
no cpe found for SUSE Package Hub 15 in CVE-2018-19800
no cpe found for SUSE Package Hub 15 in CVE-2018-19797
no cpe found for SUSE Package Hub 15 SP1 in CVE-2018-19797
no cpe found for SUSE Linux Enterprise Module for HPC 12 SP2 in CVE-2018-19760
no cpe found for SUSE Linux Enterprise Module for HPC 12 SP2 in CVE-2018-19760
no cpe found for SUSE Linux Enterprise Module for HPC 12 SP2 in CVE-2018-19760
no cpe found for SUSE Linux Enterprise Module for HPC 12 SP2 in CVE-2018-19760
no cpe found for SUSE Linux Enterprise Module for HPC 12 SP2 in CVE-2018-19760
no cpe found for SUSE Linux Enterprise Module for HPC 12 SP2 in CVE-2018-19760
no cpe found for SUSE Linux Enterprise Module for HPC 12 SP2 in CVE-2018-19760
no cpe found for SUSE Linux Enterprise Module for HPC 12 SP2 in CVE-2018-19760
no cpe found for SUSE Linux Enterprise Module for HPC 12 SP2 in CVE-2018-19760
no cpe found for SUSE Linux Enterprise Module for HPC 12 SP2 in CVE-2018-19760
no cpe found for SUSE Linux Enterprise Module for HPC 12 SP2 in CVE-2018-19760
no cpe found for SUSE Linux Enterprise Module for HPC 12 SP2 in CVE-2018-19760
skipping CVE-2018-19758 as CVE page is older than CVRF-CVE file.
skipping CVE-2018-19627 as CVE page is older than CVRF-CVE file.
skipping CVE-2018-19626 as CVE page is older than CVRF-CVE file.
skipping CVE-2018-19625 as CVE page is older than CVRF-CVE file.
skipping CVE-2018-19624 as CVE page is older than CVRF-CVE file.
skipping CVE-2018-19623 as CVE page is older than CVRF-CVE file.
skipping CVE-2018-19622 as CVE page is older than CVRF-CVE file.
skipping CVE-2018-19591 as CVE page is older than CVRF-CVE file.
skipping CVE-2018-19542 as CVE page is older than CVRF-CVE file.
skipping CVE-2018-19541 as CVE page is older than CVRF-CVE file.
skipping CVE-2018-19540 as CVE page is older than CVRF-CVE file.
skipping CVE-2018-19539 as CVE page is older than CVRF-CVE file.
no cpe found for SUSE Liberty Linux 7 LTSS in CVE-2018-19519
no cpe found for SUSE Package Hub 15 in CVE-2018-19516
skipping CVE-2018-19492 as CVE page is older than CVRF-CVE file.
no cpe found for SUSE Package Hub 15 in CVE-2018-19443
skipping CVE-2018-19432 as CVE page is older than CVRF-CVE file.
skipping CVE-2018-19407 as CVE page is older than CVRF-CVE file.
no cpe found for SUSE Package Hub 15 SP1 in CVE-2018-19387
no cpe found for SUSE Package Hub 15 SP2 in CVE-2018-19387
no cpe found for SUSE Package Hub 15 in CVE-2018-19295
skipping CVE-2018-19211 as CVE page is older than CVRF-CVE file.
skipping CVE-2018-19210 as CVE page is older than CVRF-CVE file.
no cpe found for SUSE Liberty Linux 7 LTSS in CVE-2018-19208
no cpe found for SUSE Package Hub 15 in CVE-2018-19200
no cpe found for SUSE Liberty Linux 7 LTSS in CVE-2018-19199
no cpe found for SUSE Package Hub 15 in CVE-2018-19199
no cpe found for SUSE Liberty Linux 7 LTSS in CVE-2018-19198
no cpe found for SUSE Package Hub 15 in CVE-2018-19198
no cpe found for SUSE Package Hub 15 in CVE-2018-19143
no cpe found for SUSE Package Hub 15 in CVE-2018-19141
skipping CVE-2018-19134 as CVE page is older than CVRF-CVE file.
no cpe found for SUSE Package Hub 15 in CVE-2018-19052
no cpe found for SUSE Package Hub 15 SP1 in CVE-2018-19052
no cpe found for SUSE Package Hub 15 in CVE-2018-19046
no cpe found for SUSE Package Hub 15 in CVE-2018-19045
no cpe found for SUSE Package Hub 15 in CVE-2018-19044
no cpe found for SUSE Package Hub 15 SP1 in CVE-2018-19039
no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2018-18915
no cpe found for SUSE Package Hub 15 SP2 in CVE-2018-18839
no cpe found for SUSE Package Hub 15 SP3 in CVE-2018-18839
no cpe found for SUSE Package Hub 15 SP2 in CVE-2018-18838
no cpe found for SUSE Package Hub 15 SP3 in CVE-2018-18838
no cpe found for SUSE Package Hub 15 SP2 in CVE-2018-18837
no cpe found for SUSE Package Hub 15 SP3 in CVE-2018-18837
no cpe found for SUSE Package Hub 15 SP2 in CVE-2018-18836
no cpe found for SUSE Package Hub 15 SP3 in CVE-2018-18836
no cpe found for SUSE Package Hub 15 in CVE-2018-18820
no cpe found for SUSE Package Hub 15 in CVE-2018-18718
skipping CVE-2018-18751 as CVE page is older than CVRF-CVE file.
no cpe found for SUSE Linux Enterprise Real Time 11 SP4 in CVE-2018-18710
skipping CVE-2018-18690 as CVE page is older than CVRF-CVE file.
skipping CVE-2018-18661 as CVE page is older than CVRF-CVE file.
skipping CVE-2018-18650 as CVE page is older than CVRF-CVE file.
no cpe found for HPE Helion OpenStack Cloud 8 in CVE-2018-18625
no cpe found for SUSE Manager Tools 15 SP1 in CVE-2018-18625
no cpe found for HPE Helion OpenStack Cloud 8 in CVE-2018-18624
no cpe found for SUSE Manager Tools 15 SP1 in CVE-2018-18624
no cpe found for HPE Helion OpenStack Cloud 8 in CVE-2018-18623
no cpe found for SUSE Manager Tools 15 SP1 in CVE-2018-18623
skipping CVE-2018-18607 as CVE page is older than CVRF-CVE file.
skipping CVE-2018-18606 as CVE page is older than CVRF-CVE file.
skipping CVE-2018-18605 as CVE page is older than CVRF-CVE file.
no cpe found for SUSE Package Hub 15 SP1 in CVE-2018-18541
skipping CVE-2018-18559 as CVE page is older than CVRF-CVE file.
skipping CVE-2018-18557 as CVE page is older than CVRF-CVE file.
skipping CVE-2018-18544 as CVE page is older than CVRF-CVE file.
skipping CVE-2018-18521 as CVE page is older than CVRF-CVE file.
skipping CVE-2018-18520 as CVE page is older than CVRF-CVE file.
skipping CVE-2018-18484 as CVE page is older than CVRF-CVE file.
skipping CVE-2018-18483 as CVE page is older than CVRF-CVE file.
skipping CVE-2018-18459 as CVE page is older than CVRF-CVE file.
skipping CVE-2018-18458 as CVE page is older than CVRF-CVE file.
skipping CVE-2018-18457 as CVE page is older than CVRF-CVE file.
skipping CVE-2018-18455 as CVE page is older than CVRF-CVE file.
skipping CVE-2018-18445 as CVE page is older than CVRF-CVE file.
no cpe found for SUSE Linux Enterprise Real Time 11 SP4 in CVE-2018-18386
skipping CVE-2018-18397 as CVE page is older than CVRF-CVE file.
no cpe found for SUSE Package Hub 15 in CVE-2018-18359
no cpe found for SUSE Package Hub 15 in CVE-2018-18358
no cpe found for SUSE Package Hub 15 in CVE-2018-18357
no cpe found for SUSE Package Hub 15 in CVE-2018-18356
no cpe found for SUSE Package Hub 15 in CVE-2018-18355
no cpe found for SUSE Package Hub 15 in CVE-2018-18354
no cpe found for SUSE Package Hub 15 in CVE-2018-18353
no cpe found for SUSE Package Hub 15 in CVE-2018-18352
no cpe found for SUSE Package Hub 15 in CVE-2018-18351
no cpe found for SUSE Package Hub 15 in CVE-2018-18350
no cpe found for SUSE Package Hub 15 in CVE-2018-18349
no cpe found for SUSE Package Hub 15 in CVE-2018-18348
no cpe found for SUSE Package Hub 15 in CVE-2018-18347
no cpe found for SUSE Package Hub 15 in CVE-2018-18346
no cpe found for SUSE Package Hub 15 in CVE-2018-18345
no cpe found for SUSE Package Hub 15 in CVE-2018-18344
no cpe found for SUSE Package Hub 15 in CVE-2018-18343
no cpe found for SUSE Package Hub 15 in CVE-2018-18342
no cpe found for SUSE Package Hub 15 in CVE-2018-18341
no cpe found for SUSE Package Hub 15 in CVE-2018-18340
no cpe found for SUSE Package Hub 15 in CVE-2018-18339
no cpe found for SUSE Package Hub 15 in CVE-2018-18338
no cpe found for SUSE Package Hub 15 in CVE-2018-18337
no cpe found for SUSE Package Hub 15 in CVE-2018-18336
no cpe found for SUSE Package Hub 15 in CVE-2018-18335
skipping CVE-2018-18312 as CVE page is older than CVRF-CVE file.
skipping CVE-2018-18310 as CVE page is older than CVRF-CVE file.
skipping CVE-2018-18309 as CVE page is older than CVRF-CVE file.
no cpe found for SUSE Linux Enterprise Real Time 11 SP4 in CVE-2018-18281
no cpe found for SUSE Package Hub 15 in CVE-2018-18250
no cpe found for SUSE Package Hub 15 SP1 in CVE-2018-18250
no cpe found for SUSE Package Hub 15 in CVE-2018-18249
no cpe found for SUSE Package Hub 15 SP1 in CVE-2018-18249
no cpe found for SUSE Package Hub 15 in CVE-2018-18248
no cpe found for SUSE Package Hub 15 SP1 in CVE-2018-18248
no cpe found for SUSE Package Hub 15 in CVE-2018-18247
no cpe found for SUSE Package Hub 15 SP1 in CVE-2018-18247
no cpe found for SUSE Package Hub 15 in CVE-2018-18246
no cpe found for SUSE Package Hub 15 SP1 in CVE-2018-18246
no cpe found for SUSE Package Hub 15 SP1 in CVE-2018-18245
skipping CVE-2018-18227 as CVE page is older than CVRF-CVE file.
skipping CVE-2018-18226 as CVE page is older than CVRF-CVE file.
skipping CVE-2018-18225 as CVE page is older than CVRF-CVE file.
CVE-2018-18074: no packages for SUSE Linux Enterprise High Availability Extension 12 SP2, but entry?
CVE-2018-18074: no packages for SUSE Linux Enterprise Point of Sale 12 SP2, but entry?
CVE-2018-18074: no packages for SUSE Linux Enterprise High Availability Extension 12 SP1, but entry?
CVE-2018-18074: no packages for SUSE Linux Enterprise Module for Containers 12, but entry?
CVE-2018-18074: no packages for SUSE Linux Enterprise Server for SAP Applications 12 SP1, but entry?
CVE-2018-18074: no packages for Image SLES12-SP4-SAP-OCI-BYOS, but entry?
CVE-2018-18074: no packages for Image SLES12-SP4-OCI-BYOS, but entry?
CVE-2018-18074: no packages for SUSE Linux Enterprise Server 12 SP1-LTSS, but entry?
CVE-2018-18074: no packages for SUSE CaaS Platform 3.0, but entry?
CVE-2018-18074: no packages for Image SLES12-SP4-OCI-BYOS, but entry?
CVE-2018-18074: no packages for Image SLES12-SP4-SAP-OCI-BYOS, but entry?
CVE-2018-18074: no packages for SUSE CaaS Platform 3.0, but entry?
CVE-2018-18074: no packages for SUSE Linux Enterprise High Availability Extension 12 SP1, but entry?
CVE-2018-18074: no packages for SUSE Linux Enterprise High Availability Extension 12 SP2, but entry?
CVE-2018-18074: no packages for SUSE Linux Enterprise Module for Containers 12, but entry?
CVE-2018-18074: no packages for SUSE Linux Enterprise Point of Sale 12 SP2, but entry?
CVE-2018-18074: no packages for SUSE Linux Enterprise Server 12 SP1-LTSS, but entry?
CVE-2018-18074: no packages for SUSE Linux Enterprise Server for SAP Applications 12 SP1, but entry?
CVE-2018-18074: no packages for Image SLES12-SP4-OCI-BYOS, but entry?
CVE-2018-18074: no packages for Image SLES12-SP4-SAP-OCI-BYOS, but entry?
CVE-2018-18074: no packages for SUSE CaaS Platform 3.0, but entry?
CVE-2018-18074: no packages for SUSE Linux Enterprise High Availability Extension 12 SP1, but entry?
CVE-2018-18074: no packages for SUSE Linux Enterprise High Availability Extension 12 SP2, but entry?
CVE-2018-18074: no packages for SUSE Linux Enterprise Module for Containers 12, but entry?
CVE-2018-18074: no packages for SUSE Linux Enterprise Point of Sale 12 SP2, but entry?
CVE-2018-18074: no packages for SUSE Linux Enterprise Server 12 SP1-LTSS, but entry?
CVE-2018-18074: no packages for SUSE Linux Enterprise Server for SAP Applications 12 SP1, but entry?
skipping CVE-2018-18066 as CVE page is older than CVRF-CVE file.
skipping CVE-2018-18065 as CVE page is older than CVRF-CVE file.
skipping CVE-2018-18021 as CVE page is older than CVRF-CVE file.
skipping CVE-2018-17985 as CVE page is older than CVRF-CVE file.
skipping CVE-2018-17972 as CVE page is older than CVRF-CVE file.
no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2018-17956
skipping CVE-2018-17953 as CVE page is older than CVRF-CVE file.
no cpe found for SUSE Liberty Linux 7 LTSS in CVE-2018-17828
skipping CVE-2018-17795 as CVE page is older than CVRF-CVE file.
no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2018-17581
no cpe found for HPE Helion OpenStack Cloud 8 in CVE-2018-17572
no cpe found for SUSE Package Hub 15 in CVE-2018-17481
no cpe found for SUSE Package Hub 15 in CVE-2018-17480
no cpe found for SUSE Package Hub 15 in CVE-2018-17479
no cpe found for SUSE Package Hub 15 in CVE-2018-17478
no cpe found for SUSE Package Hub 15 in CVE-2018-17477
no cpe found for SUSE Package Hub 15 in CVE-2018-17476
no cpe found for SUSE Package Hub 15 in CVE-2018-17475
no cpe found for SUSE Package Hub 15 in CVE-2018-17474
no cpe found for SUSE Package Hub 15 in CVE-2018-17473
no cpe found for SUSE Package Hub 15 in CVE-2018-17472
no cpe found for SUSE Package Hub 15 in CVE-2018-17471
no cpe found for SUSE Package Hub 15 in CVE-2018-17470
no cpe found for SUSE Package Hub 15 in CVE-2018-17469
no cpe found for SUSE Package Hub 15 in CVE-2018-17468
no cpe found for SUSE Package Hub 15 in CVE-2018-17467
no cpe found for SUSE Package Hub 15 in CVE-2018-17466
no cpe found for SUSE Package Hub 15 in CVE-2018-17465
no cpe found for SUSE Package Hub 15 in CVE-2018-17464
no cpe found for SUSE Package Hub 15 in CVE-2018-17463
no cpe found for SUSE Package Hub 15 in CVE-2018-17462
skipping CVE-2018-17456 as CVE page is older than CVRF-CVE file.
no cpe found for SUSE Linux Enterprise Module for HPC 12 SP2 in CVE-2018-17439
no cpe found for SUSE Linux Enterprise Module for HPC 12 SP2 in CVE-2018-17439
no cpe found for SUSE Linux Enterprise Module for HPC 12 SP2 in CVE-2018-17439
no cpe found for SUSE Linux Enterprise Module for HPC 12 SP2 in CVE-2018-17439
no cpe found for SUSE Linux Enterprise Module for HPC 12 SP2 in CVE-2018-17439
no cpe found for SUSE Linux Enterprise Module for HPC 12 SP2 in CVE-2018-17439
no cpe found for SUSE Linux Enterprise Module for HPC 12 SP2 in CVE-2018-17439
no cpe found for SUSE Linux Enterprise Module for HPC 12 SP2 in CVE-2018-17439
no cpe found for SUSE Linux Enterprise Module for HPC 12 SP2 in CVE-2018-17439
no cpe found for SUSE Linux Enterprise Module for HPC 12 SP2 in CVE-2018-17439
no cpe found for SUSE Linux Enterprise Module for HPC 12 SP2 in CVE-2018-17439
no cpe found for SUSE Linux Enterprise Module for HPC 12 SP2 in CVE-2018-17439
no cpe found for SUSE Linux Enterprise Module for HPC 12 SP2 in CVE-2018-17438
no cpe found for SUSE Linux Enterprise Module for HPC 12 SP2 in CVE-2018-17438
no cpe found for SUSE Linux Enterprise Module for HPC 12 SP2 in CVE-2018-17438
no cpe found for SUSE Linux Enterprise Module for HPC 12 SP2 in CVE-2018-17438
no cpe found for SUSE Linux Enterprise Module for HPC 12 SP2 in CVE-2018-17438
no cpe found for SUSE Linux Enterprise Module for HPC 12 SP2 in CVE-2018-17438
no cpe found for SUSE Linux Enterprise Module for HPC 12 SP2 in CVE-2018-17438
no cpe found for SUSE Linux Enterprise Module for HPC 12 SP2 in CVE-2018-17438
no cpe found for SUSE Linux Enterprise Module for HPC 12 SP2 in CVE-2018-17438
no cpe found for SUSE Linux Enterprise Module for HPC 12 SP2 in CVE-2018-17438
no cpe found for SUSE Linux Enterprise Module for HPC 12 SP2 in CVE-2018-17438
no cpe found for SUSE Linux Enterprise Module for HPC 12 SP2 in CVE-2018-17438
no cpe found for SUSE Linux Enterprise Module for HPC 12 SP2 in CVE-2018-17437
no cpe found for SUSE Linux Enterprise Module for HPC 12 SP2 in CVE-2018-17437
no cpe found for SUSE Linux Enterprise Module for HPC 12 SP2 in CVE-2018-17437
no cpe found for SUSE Linux Enterprise Module for HPC 12 SP2 in CVE-2018-17437
no cpe found for SUSE Linux Enterprise Module for HPC 12 SP2 in CVE-2018-17437
no cpe found for SUSE Linux Enterprise Module for HPC 12 SP2 in CVE-2018-17437
no cpe found for SUSE Linux Enterprise Module for HPC 12 SP2 in CVE-2018-17437
no cpe found for SUSE Linux Enterprise Module for HPC 12 SP2 in CVE-2018-17437
no cpe found for SUSE Linux Enterprise Module for HPC 12 SP2 in CVE-2018-17437
no cpe found for SUSE Linux Enterprise Module for HPC 12 SP2 in CVE-2018-17437
no cpe found for SUSE Linux Enterprise Module for HPC 12 SP2 in CVE-2018-17437
no cpe found for SUSE Linux Enterprise Module for HPC 12 SP2 in CVE-2018-17437
no cpe found for SUSE Linux Enterprise Module for HPC 12 SP2 in CVE-2018-17436
no cpe found for SUSE Linux Enterprise Module for HPC 12 SP2 in CVE-2018-17436
no cpe found for SUSE Linux Enterprise Module for HPC 12 SP2 in CVE-2018-17436
no cpe found for SUSE Linux Enterprise Module for HPC 12 SP2 in CVE-2018-17436
no cpe found for SUSE Linux Enterprise Module for HPC 12 SP2 in CVE-2018-17436
no cpe found for SUSE Linux Enterprise Module for HPC 12 SP2 in CVE-2018-17436
no cpe found for SUSE Linux Enterprise Module for HPC 12 SP2 in CVE-2018-17436
no cpe found for SUSE Linux Enterprise Module for HPC 12 SP2 in CVE-2018-17436
no cpe found for SUSE Linux Enterprise Module for HPC 12 SP2 in CVE-2018-17436
no cpe found for SUSE Linux Enterprise Module for HPC 12 SP2 in CVE-2018-17436
no cpe found for SUSE Linux Enterprise Module for HPC 12 SP2 in CVE-2018-17436
no cpe found for SUSE Linux Enterprise Module for HPC 12 SP2 in CVE-2018-17436
no cpe found for SUSE Linux Enterprise Module for HPC 12 SP2 in CVE-2018-17435
no cpe found for SUSE Linux Enterprise Module for HPC 12 SP2 in CVE-2018-17435
no cpe found for SUSE Linux Enterprise Module for HPC 12 SP2 in CVE-2018-17435
no cpe found for SUSE Linux Enterprise Module for HPC 12 SP2 in CVE-2018-17435
no cpe found for SUSE Linux Enterprise Module for HPC 12 SP2 in CVE-2018-17435
no cpe found for SUSE Linux Enterprise Module for HPC 12 SP2 in CVE-2018-17435
no cpe found for SUSE Linux Enterprise Module for HPC 12 SP2 in CVE-2018-17435
no cpe found for SUSE Linux Enterprise Module for HPC 12 SP2 in CVE-2018-17435
no cpe found for SUSE Linux Enterprise Module for HPC 12 SP2 in CVE-2018-17435
no cpe found for SUSE Linux Enterprise Module for HPC 12 SP2 in CVE-2018-17435
no cpe found for SUSE Linux Enterprise Module for HPC 12 SP2 in CVE-2018-17435
no cpe found for SUSE Linux Enterprise Module for HPC 12 SP2 in CVE-2018-17435
no cpe found for SUSE Linux Enterprise Module for HPC 12 SP2 in CVE-2018-17434
no cpe found for SUSE Linux Enterprise Module for HPC 12 SP2 in CVE-2018-17434
no cpe found for SUSE Linux Enterprise Module for HPC 12 SP2 in CVE-2018-17434
no cpe found for SUSE Linux Enterprise Module for HPC 12 SP2 in CVE-2018-17434
no cpe found for SUSE Linux Enterprise Module for HPC 12 SP2 in CVE-2018-17434
no cpe found for SUSE Linux Enterprise Module for HPC 12 SP2 in CVE-2018-17434
no cpe found for SUSE Linux Enterprise Module for HPC 12 SP2 in CVE-2018-17434
no cpe found for SUSE Linux Enterprise Module for HPC 12 SP2 in CVE-2018-17434
no cpe found for SUSE Linux Enterprise Module for HPC 12 SP2 in CVE-2018-17434
no cpe found for SUSE Linux Enterprise Module for HPC 12 SP2 in CVE-2018-17434
no cpe found for SUSE Linux Enterprise Module for HPC 12 SP2 in CVE-2018-17434
no cpe found for SUSE Linux Enterprise Module for HPC 12 SP2 in CVE-2018-17434
no cpe found for SUSE Linux Enterprise Module for HPC 12 SP2 in CVE-2018-17433
no cpe found for SUSE Linux Enterprise Module for HPC 12 SP2 in CVE-2018-17433
no cpe found for SUSE Linux Enterprise Module for HPC 12 SP2 in CVE-2018-17433
no cpe found for SUSE Linux Enterprise Module for HPC 12 SP2 in CVE-2018-17433
no cpe found for SUSE Linux Enterprise Module for HPC 12 SP2 in CVE-2018-17433
no cpe found for SUSE Linux Enterprise Module for HPC 12 SP2 in CVE-2018-17433
no cpe found for SUSE Linux Enterprise Module for HPC 12 SP2 in CVE-2018-17433
no cpe found for SUSE Linux Enterprise Module for HPC 12 SP2 in CVE-2018-17433
no cpe found for SUSE Linux Enterprise Module for HPC 12 SP2 in CVE-2018-17433
no cpe found for SUSE Linux Enterprise Module for HPC 12 SP2 in CVE-2018-17433
no cpe found for SUSE Linux Enterprise Module for HPC 12 SP2 in CVE-2018-17433
no cpe found for SUSE Linux Enterprise Module for HPC 12 SP2 in CVE-2018-17433
no cpe found for SUSE Linux Enterprise Module for HPC 12 SP2 in CVE-2018-17432
no cpe found for SUSE Linux Enterprise Module for HPC 12 SP2 in CVE-2018-17432
no cpe found for SUSE Linux Enterprise Module for HPC 12 SP2 in CVE-2018-17432
no cpe found for SUSE Linux Enterprise Module for HPC 12 SP2 in CVE-2018-17432
no cpe found for SUSE Linux Enterprise Module for HPC 12 SP2 in CVE-2018-17432
no cpe found for SUSE Linux Enterprise Module for HPC 12 SP2 in CVE-2018-17432
no cpe found for SUSE Linux Enterprise Module for HPC 12 SP2 in CVE-2018-17432
no cpe found for SUSE Linux Enterprise Module for HPC 12 SP2 in CVE-2018-17432
no cpe found for SUSE Linux Enterprise Module for HPC 12 SP2 in CVE-2018-17432
no cpe found for SUSE Linux Enterprise Module for HPC 12 SP2 in CVE-2018-17432
no cpe found for SUSE Linux Enterprise Module for HPC 12 SP2 in CVE-2018-17432
no cpe found for SUSE Linux Enterprise Module for HPC 12 SP2 in CVE-2018-17432
skipping CVE-2018-17407 as CVE page is older than CVRF-CVE file.
skipping CVE-2018-17360 as CVE page is older than CVRF-CVE file.
skipping CVE-2018-17359 as CVE page is older than CVRF-CVE file.
skipping CVE-2018-17358 as CVE page is older than CVRF-CVE file.
no cpe found for SUSE Linux Enterprise Module for HPC 12 SP2 in CVE-2018-17237
no cpe found for SUSE Linux Enterprise Module for HPC 12 SP2 in CVE-2018-17237
no cpe found for SUSE Linux Enterprise Module for HPC 12 SP2 in CVE-2018-17237
no cpe found for SUSE Linux Enterprise Module for HPC 12 SP2 in CVE-2018-17237
no cpe found for SUSE Linux Enterprise Module for HPC 12 SP2 in CVE-2018-17237
no cpe found for SUSE Linux Enterprise Module for HPC 12 SP2 in CVE-2018-17237
no cpe found for SUSE Linux Enterprise Module for HPC 12 SP2 in CVE-2018-17237
no cpe found for SUSE Linux Enterprise Module for HPC 12 SP2 in CVE-2018-17237
no cpe found for SUSE Linux Enterprise Module for HPC 12 SP2 in CVE-2018-17237
no cpe found for SUSE Linux Enterprise Module for HPC 12 SP2 in CVE-2018-17237
no cpe found for SUSE Linux Enterprise Module for HPC 12 SP2 in CVE-2018-17237
no cpe found for SUSE Linux Enterprise Module for HPC 12 SP2 in CVE-2018-17237
no cpe found for SUSE Linux Enterprise Module for HPC 12 SP2 in CVE-2018-17234
no cpe found for SUSE Linux Enterprise Module for HPC 12 SP2 in CVE-2018-17234
no cpe found for SUSE Linux Enterprise Module for HPC 12 SP2 in CVE-2018-17234
no cpe found for SUSE Linux Enterprise Module for HPC 12 SP2 in CVE-2018-17234
no cpe found for SUSE Linux Enterprise Module for HPC 12 SP2 in CVE-2018-17234
no cpe found for SUSE Linux Enterprise Module for HPC 12 SP2 in CVE-2018-17234
no cpe found for SUSE Linux Enterprise Module for HPC 12 SP2 in CVE-2018-17234
no cpe found for SUSE Linux Enterprise Module for HPC 12 SP2 in CVE-2018-17234
no cpe found for SUSE Linux Enterprise Module for HPC 12 SP2 in CVE-2018-17234
no cpe found for SUSE Linux Enterprise Module for HPC 12 SP2 in CVE-2018-17234
no cpe found for SUSE Linux Enterprise Module for HPC 12 SP2 in CVE-2018-17234
no cpe found for SUSE Linux Enterprise Module for HPC 12 SP2 in CVE-2018-17234
no cpe found for SUSE Linux Enterprise Module for HPC 12 SP2 in CVE-2018-17233
no cpe found for SUSE Linux Enterprise Module for HPC 12 SP2 in CVE-2018-17233
no cpe found for SUSE Linux Enterprise Module for HPC 12 SP2 in CVE-2018-17233
no cpe found for SUSE Linux Enterprise Module for HPC 12 SP2 in CVE-2018-17233
no cpe found for SUSE Linux Enterprise Module for HPC 12 SP2 in CVE-2018-17233
no cpe found for SUSE Linux Enterprise Module for HPC 12 SP2 in CVE-2018-17233
no cpe found for SUSE Linux Enterprise Module for HPC 12 SP2 in CVE-2018-17233
no cpe found for SUSE Linux Enterprise Module for HPC 12 SP2 in CVE-2018-17233
no cpe found for SUSE Linux Enterprise Module for HPC 12 SP2 in CVE-2018-17233
no cpe found for SUSE Linux Enterprise Module for HPC 12 SP2 in CVE-2018-17233
no cpe found for SUSE Linux Enterprise Module for HPC 12 SP2 in CVE-2018-17233
no cpe found for SUSE Linux Enterprise Module for HPC 12 SP2 in CVE-2018-17233
skipping CVE-2018-17199 as CVE page is older than CVRF-CVE file.
skipping CVE-2018-17197 as CVE page is older than CVRF-CVE file.
skipping CVE-2018-17189 as CVE page is older than CVRF-CVE file.
skipping CVE-2018-17182 as CVE page is older than CVRF-CVE file.
no cpe found for SUSE Package Hub 15 in CVE-2018-17144
no cpe found for SUSE Package Hub 15 SP5 in CVE-2018-17144
no cpe found for SUSE Package Hub 15 in CVE-2018-17141
skipping CVE-2018-17101 as CVE page is older than CVRF-CVE file.
skipping CVE-2018-17100 as CVE page is older than CVRF-CVE file.
skipping CVE-2018-17095 as CVE page is older than CVRF-CVE file.
no cpe found for SUSE Package Hub 15 in CVE-2018-17088
no cpe found for SUSE Package Hub 15 SP2 in CVE-2018-17088
no cpe found for SUSE Package Hub 15 SP4 in CVE-2018-17076
no cpe found for SUSE Package Hub 15 SP5 in CVE-2018-17076
no cpe found for SUSE Package Hub 15 in CVE-2018-16976
skipping CVE-2018-16982 as CVE page is older than CVRF-CVE file.
skipping CVE-2018-16884 as CVE page is older than CVRF-CVE file.
skipping CVE-2018-16882 as CVE page is older than CVRF-CVE file.
skipping CVE-2018-16880 as CVE page is older than CVRF-CVE file.
no cpe found for HPE Helion OpenStack Cloud 8 in CVE-2018-16876
no cpe found for SUSE Package Hub 15 in CVE-2018-16876
no cpe found for SUSE Package Hub 15 SP1 in CVE-2018-16876
skipping CVE-2018-16877 as CVE page is older than CVRF-CVE file.
no cpe found for SUSE Package Hub 15 in CVE-2018-16875
no cpe found for SUSE Package Hub 15 in CVE-2018-16874
no cpe found for SUSE Package Hub 15 in CVE-2018-16873
skipping CVE-2018-16871 as CVE page is older than CVRF-CVE file.
no cpe found for HPE Helion OpenStack Cloud 8 in CVE-2018-16859
no cpe found for SUSE Package Hub 15 in CVE-2018-16859
no cpe found for SUSE Package Hub 15 SP1 in CVE-2018-16859
skipping CVE-2018-16865 as CVE page is older than CVRF-CVE file.
skipping CVE-2018-16864 as CVE page is older than CVRF-CVE file.
skipping CVE-2018-16863 as CVE page is older than CVRF-CVE file.
skipping CVE-2018-16862 as CVE page is older than CVRF-CVE file.
skipping CVE-2018-16860 as CVE page is older than CVRF-CVE file.
skipping CVE-2018-16857 as CVE page is older than CVRF-CVE file.
no cpe found for SUSE Package Hub 15 in CVE-2018-16855
skipping CVE-2018-16853 as CVE page is older than CVRF-CVE file.
skipping CVE-2018-16852 as CVE page is older than CVRF-CVE file.
skipping CVE-2018-16851 as CVE page is older than CVRF-CVE file.
skipping CVE-2018-16850 as CVE page is older than CVRF-CVE file.
skipping CVE-2018-16841 as CVE page is older than CVRF-CVE file.
no cpe found for HPE Helion OpenStack Cloud 8 in CVE-2018-16837
no cpe found for SUSE Package Hub 15 in CVE-2018-16837
no cpe found for SUSE Package Hub 15 SP1 in CVE-2018-16837
no cpe found for SUSE Package Hub 15 SP3 in CVE-2018-16837
skipping CVE-2018-16750 as CVE page is older than CVRF-CVE file.
skipping CVE-2018-16749 as CVE page is older than CVRF-CVE file.
no cpe found for SUSE Linux Enterprise Real Time 11 SP4 in CVE-2018-16658
skipping CVE-2018-16648 as CVE page is older than CVRF-CVE file.
no cpe found for SUSE Package Hub 15 in CVE-2018-16644
skipping CVE-2018-16645 as CVE page is older than CVRF-CVE file.
skipping CVE-2018-16643 as CVE page is older than CVRF-CVE file.
skipping CVE-2018-16642 as CVE page is older than CVRF-CVE file.
skipping CVE-2018-16640 as CVE page is older than CVRF-CVE file.
skipping CVE-2018-16597 as CVE page is older than CVRF-CVE file.
no cpe found for SUSE Package Hub 15 in CVE-2018-16587
no cpe found for SUSE Package Hub 15 in CVE-2018-16586
no cpe found for SUSE Package Hub 15 in CVE-2018-16554
no cpe found for SUSE Package Hub 15 SP2 in CVE-2018-16554
skipping CVE-2018-16476 as CVE page is older than CVRF-CVE file.
skipping CVE-2018-16471 as CVE page is older than CVRF-CVE file.
skipping CVE-2018-16468 as CVE page is older than CVRF-CVE file.
no cpe found for SUSE Linux Enterprise Module for HPC 12 SP2 in CVE-2018-16438
no cpe found for SUSE Linux Enterprise Module for HPC 12 SP2 in CVE-2018-16438
no cpe found for SUSE Linux Enterprise Module for HPC 12 SP2 in CVE-2018-16438
no cpe found for SUSE Linux Enterprise Module for HPC 12 SP2 in CVE-2018-16438
no cpe found for SUSE Linux Enterprise Module for HPC 12 SP2 in CVE-2018-16438
no cpe found for SUSE Linux Enterprise Module for HPC 12 SP2 in CVE-2018-16438
no cpe found for SUSE Linux Enterprise Module for HPC 12 SP2 in CVE-2018-16438
no cpe found for SUSE Linux Enterprise Module for HPC 12 SP2 in CVE-2018-16438
no cpe found for SUSE Linux Enterprise Module for HPC 12 SP2 in CVE-2018-16438
no cpe found for SUSE Linux Enterprise Module for HPC 12 SP2 in CVE-2018-16438
no cpe found for SUSE Linux Enterprise Module for HPC 12 SP2 in CVE-2018-16438
no cpe found for SUSE Linux Enterprise Module for HPC 12 SP2 in CVE-2018-16438
skipping CVE-2018-16403 as CVE page is older than CVRF-CVE file.
skipping CVE-2018-16369 as CVE page is older than CVRF-CVE file.
skipping CVE-2018-16368 as CVE page is older than CVRF-CVE file.
skipping CVE-2018-16335 as CVE page is older than CVRF-CVE file.
no cpe found for SUSE Liberty Linux 7 LTSS in CVE-2018-16328
skipping CVE-2018-16276 as CVE page is older than CVRF-CVE file.
no cpe found for SUSE Package Hub 15 in CVE-2018-16088
no cpe found for SUSE Package Hub 15 in CVE-2018-16087
no cpe found for SUSE Package Hub 15 in CVE-2018-16086
no cpe found for SUSE Package Hub 15 in CVE-2018-16085
no cpe found for SUSE Package Hub 15 in CVE-2018-16084
no cpe found for SUSE Package Hub 15 in CVE-2018-16083
no cpe found for SUSE Package Hub 15 in CVE-2018-16082
no cpe found for SUSE Package Hub 15 in CVE-2018-16081
no cpe found for SUSE Package Hub 15 in CVE-2018-16080
no cpe found for SUSE Package Hub 15 in CVE-2018-16079
no cpe found for SUSE Package Hub 15 in CVE-2018-16078
no cpe found for SUSE Package Hub 15 in CVE-2018-16077
no cpe found for SUSE Package Hub 15 in CVE-2018-16076
no cpe found for SUSE Package Hub 15 in CVE-2018-16075
no cpe found for SUSE Package Hub 15 in CVE-2018-16074
no cpe found for SUSE Package Hub 15 in CVE-2018-16073
no cpe found for SUSE Package Hub 15 in CVE-2018-16071
no cpe found for SUSE Package Hub 15 in CVE-2018-16070
no cpe found for SUSE Package Hub 15 in CVE-2018-16069
no cpe found for SUSE Package Hub 15 in CVE-2018-16068
no cpe found for SUSE Package Hub 15 in CVE-2018-16067
no cpe found for SUSE Package Hub 15 in CVE-2018-16066
no cpe found for SUSE Package Hub 15 in CVE-2018-16065
skipping CVE-2018-16062 as CVE page is older than CVRF-CVE file.
skipping CVE-2018-16058 as CVE page is older than CVRF-CVE file.
skipping CVE-2018-16057 as CVE page is older than CVRF-CVE file.
skipping CVE-2018-16056 as CVE page is older than CVRF-CVE file.
no cpe found for SUSE Liberty Linux 7 LTSS in CVE-2018-15864
skipping CVE-2018-15869 as CVE page is older than CVRF-CVE file.
no cpe found for SUSE Liberty Linux 7 LTSS in CVE-2018-15863
no cpe found for SUSE Liberty Linux 7 LTSS in CVE-2018-15862
no cpe found for SUSE Liberty Linux 7 LTSS in CVE-2018-15861
no cpe found for SUSE Liberty Linux 7 LTSS in CVE-2018-15859
no cpe found for SUSE Liberty Linux 7 LTSS in CVE-2018-15857
no cpe found for SUSE Liberty Linux 7 LTSS in CVE-2018-15856
no cpe found for SUSE Liberty Linux 7 LTSS in CVE-2018-15855
no cpe found for SUSE Liberty Linux 7 LTSS in CVE-2018-15854
no cpe found for SUSE Liberty Linux 7 LTSS in CVE-2018-15853
no cpe found for SUSE Package Hub 15 in CVE-2018-15822
no cpe found for SUSE Manager Tools 15 SP1 in CVE-2018-15727
skipping CVE-2018-15746 as CVE page is older than CVRF-CVE file.
no cpe found for SUSE Linux Enterprise Module for HPC 12 SP2 in CVE-2018-15672
no cpe found for SUSE Linux Enterprise Module for HPC 12 SP2 in CVE-2018-15672
no cpe found for SUSE Linux Enterprise Module for HPC 12 SP2 in CVE-2018-15672
no cpe found for SUSE Linux Enterprise Module for HPC 12 SP2 in CVE-2018-15672
no cpe found for SUSE Linux Enterprise Module for HPC 12 SP2 in CVE-2018-15672
no cpe found for SUSE Linux Enterprise Module for HPC 12 SP2 in CVE-2018-15672
no cpe found for SUSE Linux Enterprise Module for HPC 12 SP2 in CVE-2018-15672
no cpe found for SUSE Linux Enterprise Module for HPC 12 SP2 in CVE-2018-15672
no cpe found for SUSE Linux Enterprise Module for HPC 12 SP2 in CVE-2018-15672
no cpe found for SUSE Linux Enterprise Module for HPC 12 SP2 in CVE-2018-15672
no cpe found for SUSE Linux Enterprise Module for HPC 12 SP2 in CVE-2018-15672
no cpe found for SUSE Linux Enterprise Module for HPC 12 SP2 in CVE-2018-15672
skipping CVE-2018-15688 as CVE page is older than CVRF-CVE file.
skipping CVE-2018-15687 as CVE page is older than CVRF-CVE file.
skipping CVE-2018-15686 as CVE page is older than CVRF-CVE file.
no cpe found for SUSE Linux Enterprise Module for HPC 12 SP2 in CVE-2018-15671
no cpe found for SUSE Linux Enterprise Module for HPC 12 SP2 in CVE-2018-15671
no cpe found for SUSE Linux Enterprise Module for HPC 12 SP2 in CVE-2018-15671
no cpe found for SUSE Linux Enterprise Module for HPC 12 SP2 in CVE-2018-15671
no cpe found for SUSE Linux Enterprise Module for HPC 12 SP2 in CVE-2018-15671
no cpe found for SUSE Linux Enterprise Module for HPC 12 SP2 in CVE-2018-15671
no cpe found for SUSE Linux Enterprise Module for HPC 12 SP2 in CVE-2018-15671
no cpe found for SUSE Linux Enterprise Module for HPC 12 SP2 in CVE-2018-15671
no cpe found for SUSE Linux Enterprise Module for HPC 12 SP2 in CVE-2018-15671
no cpe found for SUSE Linux Enterprise Module for HPC 12 SP2 in CVE-2018-15671
no cpe found for SUSE Linux Enterprise Module for HPC 12 SP2 in CVE-2018-15671
no cpe found for SUSE Linux Enterprise Module for HPC 12 SP2 in CVE-2018-15671
no cpe found for SUSE Liberty Linux 7 LTSS in CVE-2018-15607
no cpe found for SUSE Package Hub 15 in CVE-2018-15605
no cpe found for SUSE Liberty Linux 7 LTSS in CVE-2018-15587
skipping CVE-2018-15594 as CVE page is older than CVRF-CVE file.
skipping CVE-2018-15572 as CVE page is older than CVRF-CVE file.
skipping CVE-2018-15518 as CVE page is older than CVRF-CVE file.
no cpe found for SUSE Package Hub 15 SP3 in CVE-2018-15473
skipping CVE-2018-15471 as CVE page is older than CVRF-CVE file.
skipping CVE-2018-15127 as CVE page is older than CVRF-CVE file.
skipping CVE-2018-15126 as CVE page is older than CVRF-CVE file.
no cpe found for SUSE Linux Enterprise Real Time 11 SP4 in CVE-2018-14734
skipping CVE-2018-14780 as CVE page is older than CVRF-CVE file.
skipping CVE-2018-14779 as CVE page is older than CVRF-CVE file.
skipping CVE-2018-14682 as CVE page is older than CVRF-CVE file.
skipping CVE-2018-14681 as CVE page is older than CVRF-CVE file.
skipping CVE-2018-14680 as CVE page is older than CVRF-CVE file.
skipping CVE-2018-14679 as CVE page is older than CVRF-CVE file.
no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2018-14663
skipping CVE-2018-14665 as CVE page is older than CVRF-CVE file.
no cpe found for SUSE Package Hub 15 in CVE-2018-14644
no cpe found for SUSE Package Hub 15 in CVE-2018-14626
skipping CVE-2018-14634 as CVE page is older than CVRF-CVE file.
skipping CVE-2018-14633 as CVE page is older than CVRF-CVE file.
skipping CVE-2018-14629 as CVE page is older than CVRF-CVE file.
skipping CVE-2018-14628 as CVE page is older than CVRF-CVE file.
skipping CVE-2018-14625 as CVE page is older than CVRF-CVE file.
no cpe found for SUSE Linux Enterprise Real Time 11 SP4 in CVE-2018-14617
no cpe found for SUSE Liberty Linux 7 LTSS in CVE-2018-14600
skipping CVE-2018-14613 as CVE page is older than CVRF-CVE file.
skipping CVE-2018-14612 as CVE page is older than CVRF-CVE file.
skipping CVE-2018-14611 as CVE page is older than CVRF-CVE file.
skipping CVE-2018-14610 as CVE page is older than CVRF-CVE file.
skipping CVE-2018-14609 as CVE page is older than CVRF-CVE file.
no cpe found for SUSE Liberty Linux 7 LTSS in CVE-2018-14599
no cpe found for SUSE Liberty Linux 7 LTSS in CVE-2018-14598
no cpe found for SUSE Package Hub 15 in CVE-2018-14593
no cpe found for SUSE Package Hub 15 in CVE-2018-14574
skipping CVE-2018-14567 as CVE page is older than CVRF-CVE file.
no cpe found for SUSE Package Hub 15 in CVE-2018-14526
no cpe found for SUSE Package Hub 15 in CVE-2018-14523
no cpe found for SUSE Package Hub 15 in CVE-2018-14522
no cpe found for SUSE Liberty Linux 7 LTSS in CVE-2018-14498
no cpe found for SUSE Linux Enterprise Module for HPC 12 SP2 in CVE-2018-14460
no cpe found for SUSE Linux Enterprise Module for HPC 12 SP2 in CVE-2018-14460
no cpe found for SUSE Linux Enterprise Module for HPC 12 SP2 in CVE-2018-14460
no cpe found for SUSE Linux Enterprise Module for HPC 12 SP2 in CVE-2018-14460
no cpe found for SUSE Linux Enterprise Module for HPC 12 SP2 in CVE-2018-14460
no cpe found for SUSE Linux Enterprise Module for HPC 12 SP2 in CVE-2018-14460
no cpe found for SUSE Linux Enterprise Module for HPC 12 SP2 in CVE-2018-14460
no cpe found for SUSE Linux Enterprise Module for HPC 12 SP2 in CVE-2018-14460
no cpe found for SUSE Linux Enterprise Module for HPC 12 SP2 in CVE-2018-14460
no cpe found for SUSE Linux Enterprise Module for HPC 12 SP2 in CVE-2018-14460
no cpe found for SUSE Linux Enterprise Module for HPC 12 SP2 in CVE-2018-14460
no cpe found for SUSE Linux Enterprise Module for HPC 12 SP2 in CVE-2018-14460
no cpe found for SUSE Linux Enterprise Module for HPC 12 SP2 in CVE-2018-14447
no cpe found for SUSE Linux Enterprise Module for HPC 12 SP2 in CVE-2018-14447
no cpe found for SUSE Linux Enterprise Module for HPC 12 SP2 in CVE-2018-14447
no cpe found for SUSE Linux Enterprise Module for HPC 12 SP2 in CVE-2018-14447
no cpe found for SUSE Linux Enterprise Module for HPC 12 SP2 in CVE-2018-14447
no cpe found for SUSE Linux Enterprise Module for HPC 12 SP2 in CVE-2018-14447
no cpe found for SUSE Linux Enterprise Module for HPC 12 SP2 in CVE-2018-14447
no cpe found for SUSE Linux Enterprise Module for HPC 12 SP2 in CVE-2018-14447
no cpe found for SUSE Linux Enterprise Module for HPC 12 SP2 in CVE-2018-14447
no cpe found for SUSE Linux Enterprise Module for HPC 12 SP2 in CVE-2018-14447
no cpe found for SUSE Linux Enterprise Module for HPC 12 SP2 in CVE-2018-14447
no cpe found for SUSE Linux Enterprise Module for HPC 12 SP2 in CVE-2018-14447
no cpe found for SUSE Liberty Linux 7 LTSS in CVE-2018-14437
no cpe found for SUSE Liberty Linux 7 LTSS in CVE-2018-14436
no cpe found for SUSE Liberty Linux 7 LTSS in CVE-2018-14435
no cpe found for SUSE Liberty Linux 7 LTSS in CVE-2018-14434
skipping CVE-2018-14424 as CVE page is older than CVRF-CVE file.
skipping CVE-2018-14404 as CVE page is older than CVRF-CVE file.
skipping CVE-2018-14370 as CVE page is older than CVRF-CVE file.
skipping CVE-2018-14369 as CVE page is older than CVRF-CVE file.
skipping CVE-2018-14368 as CVE page is older than CVRF-CVE file.
skipping CVE-2018-14367 as CVE page is older than CVRF-CVE file.
no cpe found for SUSE Liberty Linux 7 LTSS in CVE-2018-14355
skipping CVE-2018-14348 as CVE page is older than CVRF-CVE file.
skipping CVE-2018-14344 as CVE page is older than CVRF-CVE file.
skipping CVE-2018-14343 as CVE page is older than CVRF-CVE file.
skipping CVE-2018-14342 as CVE page is older than CVRF-CVE file.
skipping CVE-2018-14341 as CVE page is older than CVRF-CVE file.
skipping CVE-2018-14340 as CVE page is older than CVRF-CVE file.
skipping CVE-2018-14339 as CVE page is older than CVRF-CVE file.
no cpe found for SUSE Package Hub 15 in CVE-2018-14332
no cpe found for SUSE Package Hub 15 SP1 in CVE-2018-14332
no cpe found for SUSE Liberty Linux 7 LTSS in CVE-2018-13988
no cpe found for SUSE Linux Enterprise Module for HPC 12 SP2 in CVE-2018-13876
no cpe found for SUSE Linux Enterprise Module for HPC 12 SP2 in CVE-2018-13876
no cpe found for SUSE Linux Enterprise Module for HPC 12 SP2 in CVE-2018-13876
no cpe found for SUSE Linux Enterprise Module for HPC 12 SP2 in CVE-2018-13876
no cpe found for SUSE Linux Enterprise Module for HPC 12 SP2 in CVE-2018-13876
no cpe found for SUSE Linux Enterprise Module for HPC 12 SP2 in CVE-2018-13876
no cpe found for SUSE Linux Enterprise Module for HPC 12 SP2 in CVE-2018-13876
no cpe found for SUSE Linux Enterprise Module for HPC 12 SP2 in CVE-2018-13876
no cpe found for SUSE Linux Enterprise Module for HPC 12 SP2 in CVE-2018-13876
no cpe found for SUSE Linux Enterprise Module for HPC 12 SP2 in CVE-2018-13876
no cpe found for SUSE Linux Enterprise Module for HPC 12 SP2 in CVE-2018-13876
no cpe found for SUSE Linux Enterprise Module for HPC 12 SP2 in CVE-2018-13876
no cpe found for SUSE Linux Enterprise Module for HPC 12 SP2 in CVE-2018-13874
no cpe found for SUSE Linux Enterprise Module for HPC 12 SP2 in CVE-2018-13874
no cpe found for SUSE Linux Enterprise Module for HPC 12 SP2 in CVE-2018-13874
no cpe found for SUSE Linux Enterprise Module for HPC 12 SP2 in CVE-2018-13874
no cpe found for SUSE Linux Enterprise Module for HPC 12 SP2 in CVE-2018-13874
no cpe found for SUSE Linux Enterprise Module for HPC 12 SP2 in CVE-2018-13874
no cpe found for SUSE Linux Enterprise Module for HPC 12 SP2 in CVE-2018-13874
no cpe found for SUSE Linux Enterprise Module for HPC 12 SP2 in CVE-2018-13874
no cpe found for SUSE Linux Enterprise Module for HPC 12 SP2 in CVE-2018-13874
no cpe found for SUSE Linux Enterprise Module for HPC 12 SP2 in CVE-2018-13874
no cpe found for SUSE Linux Enterprise Module for HPC 12 SP2 in CVE-2018-13874
no cpe found for SUSE Linux Enterprise Module for HPC 12 SP2 in CVE-2018-13874
no cpe found for SUSE Linux Enterprise Module for HPC 12 SP2 in CVE-2018-13873
no cpe found for SUSE Linux Enterprise Module for HPC 12 SP2 in CVE-2018-13873
no cpe found for SUSE Linux Enterprise Module for HPC 12 SP2 in CVE-2018-13873
no cpe found for SUSE Linux Enterprise Module for HPC 12 SP2 in CVE-2018-13873
no cpe found for SUSE Linux Enterprise Module for HPC 12 SP2 in CVE-2018-13873
no cpe found for SUSE Linux Enterprise Module for HPC 12 SP2 in CVE-2018-13873
no cpe found for SUSE Linux Enterprise Module for HPC 12 SP2 in CVE-2018-13873
no cpe found for SUSE Linux Enterprise Module for HPC 12 SP2 in CVE-2018-13873
no cpe found for SUSE Linux Enterprise Module for HPC 12 SP2 in CVE-2018-13873
no cpe found for SUSE Linux Enterprise Module for HPC 12 SP2 in CVE-2018-13873
no cpe found for SUSE Linux Enterprise Module for HPC 12 SP2 in CVE-2018-13873
no cpe found for SUSE Linux Enterprise Module for HPC 12 SP2 in CVE-2018-13873
no cpe found for SUSE Linux Enterprise Module for HPC 12 SP2 in CVE-2018-13872
no cpe found for SUSE Linux Enterprise Module for HPC 12 SP2 in CVE-2018-13872
no cpe found for SUSE Linux Enterprise Module for HPC 12 SP2 in CVE-2018-13872
no cpe found for SUSE Linux Enterprise Module for HPC 12 SP2 in CVE-2018-13872
no cpe found for SUSE Linux Enterprise Module for HPC 12 SP2 in CVE-2018-13872
no cpe found for SUSE Linux Enterprise Module for HPC 12 SP2 in CVE-2018-13872
no cpe found for SUSE Linux Enterprise Module for HPC 12 SP2 in CVE-2018-13872
no cpe found for SUSE Linux Enterprise Module for HPC 12 SP2 in CVE-2018-13872
no cpe found for SUSE Linux Enterprise Module for HPC 12 SP2 in CVE-2018-13872
no cpe found for SUSE Linux Enterprise Module for HPC 12 SP2 in CVE-2018-13872
no cpe found for SUSE Linux Enterprise Module for HPC 12 SP2 in CVE-2018-13872
no cpe found for SUSE Linux Enterprise Module for HPC 12 SP2 in CVE-2018-13872
no cpe found for SUSE Linux Enterprise Module for HPC 12 SP2 in CVE-2018-13871
no cpe found for SUSE Linux Enterprise Module for HPC 12 SP2 in CVE-2018-13871
no cpe found for SUSE Linux Enterprise Module for HPC 12 SP2 in CVE-2018-13871
no cpe found for SUSE Linux Enterprise Module for HPC 12 SP2 in CVE-2018-13871
no cpe found for SUSE Linux Enterprise Module for HPC 12 SP2 in CVE-2018-13871
no cpe found for SUSE Linux Enterprise Module for HPC 12 SP2 in CVE-2018-13871
no cpe found for SUSE Linux Enterprise Module for HPC 12 SP2 in CVE-2018-13871
no cpe found for SUSE Linux Enterprise Module for HPC 12 SP2 in CVE-2018-13871
no cpe found for SUSE Linux Enterprise Module for HPC 12 SP2 in CVE-2018-13871
no cpe found for SUSE Linux Enterprise Module for HPC 12 SP2 in CVE-2018-13871
no cpe found for SUSE Linux Enterprise Module for HPC 12 SP2 in CVE-2018-13871
no cpe found for SUSE Linux Enterprise Module for HPC 12 SP2 in CVE-2018-13871
no cpe found for SUSE Linux Enterprise Module for HPC 12 SP2 in CVE-2018-13870
no cpe found for SUSE Linux Enterprise Module for HPC 12 SP2 in CVE-2018-13870
no cpe found for SUSE Linux Enterprise Module for HPC 12 SP2 in CVE-2018-13870
no cpe found for SUSE Linux Enterprise Module for HPC 12 SP2 in CVE-2018-13870
no cpe found for SUSE Linux Enterprise Module for HPC 12 SP2 in CVE-2018-13870
no cpe found for SUSE Linux Enterprise Module for HPC 12 SP2 in CVE-2018-13870
no cpe found for SUSE Linux Enterprise Module for HPC 12 SP2 in CVE-2018-13870
no cpe found for SUSE Linux Enterprise Module for HPC 12 SP2 in CVE-2018-13870
no cpe found for SUSE Linux Enterprise Module for HPC 12 SP2 in CVE-2018-13870
no cpe found for SUSE Linux Enterprise Module for HPC 12 SP2 in CVE-2018-13870
no cpe found for SUSE Linux Enterprise Module for HPC 12 SP2 in CVE-2018-13870
no cpe found for SUSE Linux Enterprise Module for HPC 12 SP2 in CVE-2018-13870
no cpe found for SUSE Linux Enterprise Module for HPC 12 SP2 in CVE-2018-13869
no cpe found for SUSE Linux Enterprise Module for HPC 12 SP2 in CVE-2018-13869
no cpe found for SUSE Linux Enterprise Module for HPC 12 SP2 in CVE-2018-13869
no cpe found for SUSE Linux Enterprise Module for HPC 12 SP2 in CVE-2018-13869
no cpe found for SUSE Linux Enterprise Module for HPC 12 SP2 in CVE-2018-13869
no cpe found for SUSE Linux Enterprise Module for HPC 12 SP2 in CVE-2018-13869
no cpe found for SUSE Linux Enterprise Module for HPC 12 SP2 in CVE-2018-13869
no cpe found for SUSE Linux Enterprise Module for HPC 12 SP2 in CVE-2018-13869
no cpe found for SUSE Linux Enterprise Module for HPC 12 SP2 in CVE-2018-13869
no cpe found for SUSE Linux Enterprise Module for HPC 12 SP2 in CVE-2018-13869
no cpe found for SUSE Linux Enterprise Module for HPC 12 SP2 in CVE-2018-13869
no cpe found for SUSE Linux Enterprise Module for HPC 12 SP2 in CVE-2018-13869
no cpe found for SUSE Linux Enterprise Module for HPC 12 SP2 in CVE-2018-13868
no cpe found for SUSE Linux Enterprise Module for HPC 12 SP2 in CVE-2018-13868
no cpe found for SUSE Linux Enterprise Module for HPC 12 SP2 in CVE-2018-13868
no cpe found for SUSE Linux Enterprise Module for HPC 12 SP2 in CVE-2018-13868
no cpe found for SUSE Linux Enterprise Module for HPC 12 SP2 in CVE-2018-13868
no cpe found for SUSE Linux Enterprise Module for HPC 12 SP2 in CVE-2018-13868
no cpe found for SUSE Linux Enterprise Module for HPC 12 SP2 in CVE-2018-13868
no cpe found for SUSE Linux Enterprise Module for HPC 12 SP2 in CVE-2018-13868
no cpe found for SUSE Linux Enterprise Module for HPC 12 SP2 in CVE-2018-13868
no cpe found for SUSE Linux Enterprise Module for HPC 12 SP2 in CVE-2018-13868
no cpe found for SUSE Linux Enterprise Module for HPC 12 SP2 in CVE-2018-13868
no cpe found for SUSE Linux Enterprise Module for HPC 12 SP2 in CVE-2018-13868
no cpe found for SUSE Linux Enterprise Module for HPC 12 SP2 in CVE-2018-13866
no cpe found for SUSE Linux Enterprise Module for HPC 12 SP2 in CVE-2018-13866
no cpe found for SUSE Linux Enterprise Module for HPC 12 SP2 in CVE-2018-13866
no cpe found for SUSE Linux Enterprise Module for HPC 12 SP2 in CVE-2018-13866
no cpe found for SUSE Linux Enterprise Module for HPC 12 SP2 in CVE-2018-13866
no cpe found for SUSE Linux Enterprise Module for HPC 12 SP2 in CVE-2018-13866
no cpe found for SUSE Linux Enterprise Module for HPC 12 SP2 in CVE-2018-13866
no cpe found for SUSE Linux Enterprise Module for HPC 12 SP2 in CVE-2018-13866
no cpe found for SUSE Linux Enterprise Module for HPC 12 SP2 in CVE-2018-13866
no cpe found for SUSE Linux Enterprise Module for HPC 12 SP2 in CVE-2018-13866
no cpe found for SUSE Linux Enterprise Module for HPC 12 SP2 in CVE-2018-13866
no cpe found for SUSE Linux Enterprise Module for HPC 12 SP2 in CVE-2018-13866
no cpe found for SUSE Package Hub 15 SP1 in CVE-2018-13458
no cpe found for SUSE Package Hub 15 SP1 in CVE-2018-13457
no cpe found for SUSE Package Hub 15 SP1 in CVE-2018-13441
no cpe found for SUSE Liberty Linux 7 LTSS in CVE-2018-13440
no cpe found for SUSE Linux Enterprise Real Time 11 SP4 in CVE-2018-13406
skipping CVE-2018-13405 as CVE page is older than CVRF-CVE file.
no cpe found for SUSE Package Hub 15 in CVE-2018-13305
no cpe found for SUSE Package Hub 15 SP1 in CVE-2018-13305
no cpe found for SUSE Package Hub 15 in CVE-2018-13300
no cpe found for SUSE Liberty Linux 7 LTSS in CVE-2018-13153
skipping CVE-2018-13094 as CVE page is older than CVRF-CVE file.
skipping CVE-2018-13093 as CVE page is older than CVRF-CVE file.
no cpe found for SUSE Linux Enterprise Real Time 11 SP4 in CVE-2018-13053
skipping CVE-2018-12934 as CVE page is older than CVRF-CVE file.
skipping CVE-2018-12930 as CVE page is older than CVRF-CVE file.
no cpe found for SUSE Liberty Linux 7 LTSS in CVE-2018-12910
skipping CVE-2018-12928 as CVE page is older than CVRF-CVE file.
skipping CVE-2018-12911 as CVE page is older than CVRF-CVE file.
no cpe found for SUSE Linux Enterprise Real Time 11 SP4 in CVE-2018-12896
skipping CVE-2018-12904 as CVE page is older than CVRF-CVE file.
skipping CVE-2018-12900 as CVE page is older than CVRF-CVE file.
skipping CVE-2018-12699 as CVE page is older than CVRF-CVE file.
no cpe found for SUSE Liberty Linux 7 LTSS in CVE-2018-12600
no cpe found for SUSE Liberty Linux 7 LTSS in CVE-2018-12599
no cpe found for SUSE Package Hub 15 in CVE-2018-12558
no cpe found for SUSE Package Hub 15 in CVE-2018-12551
no cpe found for SUSE Package Hub 15 in CVE-2018-12550
no cpe found for SUSE Package Hub 15 in CVE-2018-12546
skipping CVE-2018-12539 as CVE page is older than CVRF-CVE file.
no cpe found for SUSE Package Hub 15 in CVE-2018-12495
no cpe found for SUSE Package Hub 15 in CVE-2018-12476
no cpe found for SUSE Package Hub 15 in CVE-2018-12474
no cpe found for SUSE Package Hub 15 in CVE-2018-12473
skipping CVE-2018-12437 as CVE page is older than CVRF-CVE file.
skipping CVE-2018-12434 as CVE page is older than CVRF-CVE file.
skipping CVE-2018-12433 as CVE page is older than CVRF-CVE file.
no cpe found for SUSE Package Hub 15 in CVE-2018-12366
no cpe found for SUSE Package Hub 15 in CVE-2018-12365
no cpe found for SUSE Package Hub 15 in CVE-2018-12364
no cpe found for SUSE Package Hub 15 in CVE-2018-12363
no cpe found for SUSE Package Hub 15 in CVE-2018-12362
no cpe found for SUSE Package Hub 15 in CVE-2018-12360
no cpe found for SUSE Package Hub 15 in CVE-2018-12359
skipping CVE-2018-12327 as CVE page is older than CVRF-CVE file.
skipping CVE-2018-12294 as CVE page is older than CVRF-CVE file.
skipping CVE-2018-12293 as CVE page is older than CVRF-CVE file.
skipping CVE-2018-12233 as CVE page is older than CVRF-CVE file.
skipping CVE-2018-12232 as CVE page is older than CVRF-CVE file.
skipping CVE-2018-12207 as CVE page is older than CVRF-CVE file.
skipping CVE-2018-12181 as CVE page is older than CVRF-CVE file.
skipping CVE-2018-12180 as CVE page is older than CVRF-CVE file.
skipping CVE-2018-12178 as CVE page is older than CVRF-CVE file.
skipping CVE-2018-12130 as CVE page is older than CVRF-CVE file.
skipping CVE-2018-12127 as CVE page is older than CVRF-CVE file.
skipping CVE-2018-12126 as CVE page is older than CVRF-CVE file.
no cpe found for SUSE Manager Tools 15 SP1 in CVE-2018-12099
skipping CVE-2018-12086 as CVE page is older than CVRF-CVE file.
skipping CVE-2018-12085 as CVE page is older than CVRF-CVE file.
no cpe found for SUSE Package Hub 15 in CVE-2018-12021
skipping CVE-2018-12020 as CVE page is older than CVRF-CVE file.
no cpe found for SUSE Liberty Linux 7 LTSS in CVE-2018-12015
no cpe found for SUSE Liberty Linux 7 LTSS in CVE-2018-11813
skipping CVE-2018-11784 as CVE page is older than CVRF-CVE file.
no cpe found for SUSE Liberty Linux 7 LTSS in CVE-2018-11782
skipping CVE-2018-11761 as CVE page is older than CVRF-CVE file.
no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2018-11759
skipping CVE-2018-11713 as CVE page is older than CVRF-CVE file.
skipping CVE-2018-11712 as CVE page is older than CVRF-CVE file.
skipping CVE-2018-11685 as CVE page is older than CVRF-CVE file.
skipping CVE-2018-11684 as CVE page is older than CVRF-CVE file.
skipping CVE-2018-11683 as CVE page is older than CVRF-CVE file.
skipping CVE-2018-11656 as CVE page is older than CVRF-CVE file.
skipping CVE-2018-11646 as CVE page is older than CVRF-CVE file.
skipping CVE-2018-11645 as CVE page is older than CVRF-CVE file.
skipping CVE-2018-11577 as CVE page is older than CVRF-CVE file.
no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2018-11531
no cpe found for SUSE Package Hub 15 in CVE-2018-11499
no cpe found for SUSE Package Hub 15 SP1 in CVE-2018-11499
no cpe found for SUSE Package Hub 15 in CVE-2018-11468
no cpe found for SUSE Liberty Linux 7 LTSS in CVE-2018-11439
skipping CVE-2018-11440 as CVE page is older than CVRF-CVE file.
skipping CVE-2018-11412 as CVE page is older than CVRF-CVE file.
no cpe found for SUSE Package Hub 15 in CVE-2018-11396
no cpe found for SUSE Package Hub 15 SP1 in CVE-2018-11396
skipping CVE-2018-11362 as CVE page is older than CVRF-CVE file.
skipping CVE-2018-11361 as CVE page is older than CVRF-CVE file.
skipping CVE-2018-11360 as CVE page is older than CVRF-CVE file.
skipping CVE-2018-11359 as CVE page is older than CVRF-CVE file.
skipping CVE-2018-11358 as CVE page is older than CVRF-CVE file.
skipping CVE-2018-11357 as CVE page is older than CVRF-CVE file.
skipping CVE-2018-11356 as CVE page is older than CVRF-CVE file.
skipping CVE-2018-11355 as CVE page is older than CVRF-CVE file.
skipping CVE-2018-11354 as CVE page is older than CVRF-CVE file.
no cpe found for SUSE Package Hub 15 SP1 in CVE-2018-11243
skipping CVE-2018-11237 as CVE page is older than CVRF-CVE file.
skipping CVE-2018-11236 as CVE page is older than CVRF-CVE file.
skipping CVE-2018-11235 as CVE page is older than CVRF-CVE file.
skipping CVE-2018-11233 as CVE page is older than CVRF-CVE file.
no cpe found for SUSE Liberty Linux 7 LTSS in CVE-2018-11214
no cpe found for SUSE Liberty Linux 7 LTSS in CVE-2018-11213
skipping CVE-2018-11212 as CVE page is older than CVRF-CVE file.
no cpe found for SUSE Linux Enterprise Module for HPC 12 SP2 in CVE-2018-11207
no cpe found for SUSE Linux Enterprise Module for HPC 12 SP2 in CVE-2018-11207
no cpe found for SUSE Linux Enterprise Module for HPC 12 SP2 in CVE-2018-11207
no cpe found for SUSE Linux Enterprise Module for HPC 12 SP2 in CVE-2018-11207
no cpe found for SUSE Linux Enterprise Module for HPC 12 SP2 in CVE-2018-11207
no cpe found for SUSE Linux Enterprise Module for HPC 12 SP2 in CVE-2018-11207
no cpe found for SUSE Linux Enterprise Module for HPC 12 SP2 in CVE-2018-11207
no cpe found for SUSE Linux Enterprise Module for HPC 12 SP2 in CVE-2018-11207
no cpe found for SUSE Linux Enterprise Module for HPC 12 SP2 in CVE-2018-11207
no cpe found for SUSE Linux Enterprise Module for HPC 12 SP2 in CVE-2018-11207
no cpe found for SUSE Linux Enterprise Module for HPC 12 SP2 in CVE-2018-11207
no cpe found for SUSE Linux Enterprise Module for HPC 12 SP2 in CVE-2018-11207
no cpe found for SUSE Linux Enterprise Module for HPC 12 SP2 in CVE-2018-11206
no cpe found for SUSE Linux Enterprise Module for HPC 12 SP2 in CVE-2018-11206
no cpe found for SUSE Linux Enterprise Module for HPC 12 SP2 in CVE-2018-11206
no cpe found for SUSE Linux Enterprise Module for HPC 12 SP2 in CVE-2018-11206
no cpe found for SUSE Linux Enterprise Module for HPC 12 SP2 in CVE-2018-11206
no cpe found for SUSE Linux Enterprise Module for HPC 12 SP2 in CVE-2018-11206
no cpe found for SUSE Linux Enterprise Module for HPC 12 SP2 in CVE-2018-11206
no cpe found for SUSE Linux Enterprise Module for HPC 12 SP2 in CVE-2018-11206
no cpe found for SUSE Linux Enterprise Module for HPC 12 SP2 in CVE-2018-11206
no cpe found for SUSE Linux Enterprise Module for HPC 12 SP2 in CVE-2018-11206
no cpe found for SUSE Linux Enterprise Module for HPC 12 SP2 in CVE-2018-11206
no cpe found for SUSE Linux Enterprise Module for HPC 12 SP2 in CVE-2018-11206
no cpe found for SUSE Linux Enterprise Module for HPC 12 SP2 in CVE-2018-11205
no cpe found for SUSE Linux Enterprise Module for HPC 12 SP2 in CVE-2018-11205
no cpe found for SUSE Linux Enterprise Module for HPC 12 SP2 in CVE-2018-11205
no cpe found for SUSE Linux Enterprise Module for HPC 12 SP2 in CVE-2018-11205
no cpe found for SUSE Linux Enterprise Module for HPC 12 SP2 in CVE-2018-11205
no cpe found for SUSE Linux Enterprise Module for HPC 12 SP2 in CVE-2018-11205
no cpe found for SUSE Linux Enterprise Module for HPC 12 SP2 in CVE-2018-11205
no cpe found for SUSE Linux Enterprise Module for HPC 12 SP2 in CVE-2018-11205
no cpe found for SUSE Linux Enterprise Module for HPC 12 SP2 in CVE-2018-11205
no cpe found for SUSE Linux Enterprise Module for HPC 12 SP2 in CVE-2018-11205
no cpe found for SUSE Linux Enterprise Module for HPC 12 SP2 in CVE-2018-11205
no cpe found for SUSE Linux Enterprise Module for HPC 12 SP2 in CVE-2018-11205
no cpe found for SUSE Linux Enterprise Module for HPC 12 SP2 in CVE-2018-11204
no cpe found for SUSE Linux Enterprise Module for HPC 12 SP2 in CVE-2018-11204
no cpe found for SUSE Linux Enterprise Module for HPC 12 SP2 in CVE-2018-11204
no cpe found for SUSE Linux Enterprise Module for HPC 12 SP2 in CVE-2018-11204
no cpe found for SUSE Linux Enterprise Module for HPC 12 SP2 in CVE-2018-11204
no cpe found for SUSE Linux Enterprise Module for HPC 12 SP2 in CVE-2018-11204
no cpe found for SUSE Linux Enterprise Module for HPC 12 SP2 in CVE-2018-11204
no cpe found for SUSE Linux Enterprise Module for HPC 12 SP2 in CVE-2018-11204
no cpe found for SUSE Linux Enterprise Module for HPC 12 SP2 in CVE-2018-11204
no cpe found for SUSE Linux Enterprise Module for HPC 12 SP2 in CVE-2018-11204
no cpe found for SUSE Linux Enterprise Module for HPC 12 SP2 in CVE-2018-11204
no cpe found for SUSE Linux Enterprise Module for HPC 12 SP2 in CVE-2018-11204
no cpe found for SUSE Linux Enterprise Module for HPC 12 SP2 in CVE-2018-11203
no cpe found for SUSE Linux Enterprise Module for HPC 12 SP2 in CVE-2018-11203
no cpe found for SUSE Linux Enterprise Module for HPC 12 SP2 in CVE-2018-11203
no cpe found for SUSE Linux Enterprise Module for HPC 12 SP2 in CVE-2018-11203
no cpe found for SUSE Linux Enterprise Module for HPC 12 SP2 in CVE-2018-11203
no cpe found for SUSE Linux Enterprise Module for HPC 12 SP2 in CVE-2018-11203
no cpe found for SUSE Linux Enterprise Module for HPC 12 SP2 in CVE-2018-11203
no cpe found for SUSE Linux Enterprise Module for HPC 12 SP2 in CVE-2018-11203
no cpe found for SUSE Linux Enterprise Module for HPC 12 SP2 in CVE-2018-11203
no cpe found for SUSE Linux Enterprise Module for HPC 12 SP2 in CVE-2018-11203
no cpe found for SUSE Linux Enterprise Module for HPC 12 SP2 in CVE-2018-11203
no cpe found for SUSE Linux Enterprise Module for HPC 12 SP2 in CVE-2018-11203
no cpe found for SUSE Linux Enterprise Module for HPC 12 SP2 in CVE-2018-11202
no cpe found for SUSE Linux Enterprise Module for HPC 12 SP2 in CVE-2018-11202
no cpe found for SUSE Linux Enterprise Module for HPC 12 SP2 in CVE-2018-11202
no cpe found for SUSE Linux Enterprise Module for HPC 12 SP2 in CVE-2018-11202
no cpe found for SUSE Linux Enterprise Module for HPC 12 SP2 in CVE-2018-11202
no cpe found for SUSE Linux Enterprise Module for HPC 12 SP2 in CVE-2018-11202
no cpe found for SUSE Linux Enterprise Module for HPC 12 SP2 in CVE-2018-11202
no cpe found for SUSE Linux Enterprise Module for HPC 12 SP2 in CVE-2018-11202
no cpe found for SUSE Linux Enterprise Module for HPC 12 SP2 in CVE-2018-11202
no cpe found for SUSE Linux Enterprise Module for HPC 12 SP2 in CVE-2018-11202
no cpe found for SUSE Linux Enterprise Module for HPC 12 SP2 in CVE-2018-11202
no cpe found for SUSE Linux Enterprise Module for HPC 12 SP2 in CVE-2018-11202
skipping CVE-2018-10963 as CVE page is older than CVRF-CVE file.
no cpe found for SUSE Linux Enterprise Real Time 11 SP4 in CVE-2018-10940
skipping CVE-2018-10938 as CVE page is older than CVRF-CVE file.
skipping CVE-2018-10933 as CVE page is older than CVRF-CVE file.
skipping CVE-2018-10931 as CVE page is older than CVRF-CVE file.
skipping CVE-2018-10925 as CVE page is older than CVRF-CVE file.
skipping CVE-2018-10919 as CVE page is older than CVRF-CVE file.
skipping CVE-2018-10918 as CVE page is older than CVRF-CVE file.
skipping CVE-2018-10915 as CVE page is older than CVRF-CVE file.
skipping CVE-2018-10906 as CVE page is older than CVRF-CVE file.
skipping CVE-2018-10902 as CVE page is older than CVRF-CVE file.
skipping CVE-2018-10893 as CVE page is older than CVRF-CVE file.
skipping CVE-2018-10882 as CVE page is older than CVRF-CVE file.
skipping CVE-2018-10880 as CVE page is older than CVRF-CVE file.
no cpe found for HPE Helion OpenStack Cloud 8 in CVE-2018-10875
no cpe found for SUSE Package Hub 15 in CVE-2018-10875
no cpe found for SUSE Package Hub 15 SP3 in CVE-2018-10875
CVE-2018-10874: no packages for SUSE Linux Enterprise Module for Package Hub 15 SP5, but entry?
CVE-2018-10874: no packages for SUSE Manager Tools for SLE Micro 5, but entry?
CVE-2018-10874: no packages for SUSE Manager Tools Beta for SLE Micro 5, but entry?
no cpe found for HPE Helion OpenStack Cloud 8 in CVE-2018-10874
CVE-2018-10874: no packages for SUSE Linux Enterprise Module for Package Hub 15 SP5, but entry?
CVE-2018-10874: no packages for SUSE Manager Tools Beta for SLE Micro 5, but entry?
CVE-2018-10874: no packages for SUSE Manager Tools for SLE Micro 5, but entry?
CVE-2018-10874: no packages for SUSE Linux Enterprise Module for Package Hub 15 SP5, but entry?
CVE-2018-10874: no packages for SUSE Manager Tools Beta for SLE Micro 5, but entry?
CVE-2018-10874: no packages for SUSE Manager Tools for SLE Micro 5, but entry?
skipping CVE-2018-10873 as CVE page is older than CVRF-CVE file.
skipping CVE-2018-10858 as CVE page is older than CVRF-CVE file.
no cpe found for HPE Helion OpenStack Cloud 8 in CVE-2018-10855
no cpe found for SUSE Package Hub 15 in CVE-2018-10855
skipping CVE-2018-10853 as CVE page is older than CVRF-CVE file.
no cpe found for SUSE Package Hub 15 in CVE-2018-10851
skipping CVE-2018-10846 as CVE page is older than CVRF-CVE file.
skipping CVE-2018-10845 as CVE page is older than CVRF-CVE file.
skipping CVE-2018-10844 as CVE page is older than CVRF-CVE file.
no cpe found for SUSE Liberty Linux 7 LTSS in CVE-2018-10805
no cpe found for SUSE Liberty Linux 7 LTSS in CVE-2018-10804
no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2018-10772
no cpe found for SUSE Liberty Linux 7 LTSS in CVE-2018-10768
skipping CVE-2018-10767 as CVE page is older than CVRF-CVE file.
no cpe found for SUSE Liberty Linux 7 LTSS in CVE-2018-10733
no cpe found for SUSE Liberty Linux 7 LTSS in CVE-2018-10689
skipping CVE-2018-10675 as CVE page is older than CVRF-CVE file.
no cpe found for SUSE Liberty Linux 7 LTSS in CVE-2018-10547
skipping CVE-2018-10540 as CVE page is older than CVRF-CVE file.
skipping CVE-2018-10539 as CVE page is older than CVRF-CVE file.
skipping CVE-2018-10538 as CVE page is older than CVRF-CVE file.
skipping CVE-2018-10537 as CVE page is older than CVRF-CVE file.
skipping CVE-2018-10536 as CVE page is older than CVRF-CVE file.
skipping CVE-2018-10535 as CVE page is older than CVRF-CVE file.
skipping CVE-2018-10534 as CVE page is older than CVRF-CVE file.
skipping CVE-2018-10393 as CVE page is older than CVRF-CVE file.
skipping CVE-2018-10392 as CVE page is older than CVRF-CVE file.
skipping CVE-2018-10373 as CVE page is older than CVRF-CVE file.
skipping CVE-2018-10372 as CVE page is older than CVRF-CVE file.
skipping CVE-2018-10360 as CVE page is older than CVRF-CVE file.
skipping CVE-2018-10323 as CVE page is older than CVRF-CVE file.
skipping CVE-2018-10322 as CVE page is older than CVRF-CVE file.
skipping CVE-2018-10244 as CVE page is older than CVRF-CVE file.
skipping CVE-2018-10242 as CVE page is older than CVRF-CVE file.
skipping CVE-2018-10194 as CVE page is older than CVRF-CVE file.
skipping CVE-2018-10177 as CVE page is older than CVRF-CVE file.
skipping CVE-2018-10124 as CVE page is older than CVRF-CVE file.
skipping CVE-2018-10087 as CVE page is older than CVRF-CVE file.
skipping CVE-2018-10021 as CVE page is older than CVRF-CVE file.
no cpe found for SUSE Linux Enterprise Real Time 11 SP4 in CVE-2018-9568
no cpe found for SUSE Linux Enterprise Real Time 11 SP4 in CVE-2018-9516
skipping CVE-2018-9274 as CVE page is older than CVRF-CVE file.
skipping CVE-2018-9273 as CVE page is older than CVRF-CVE file.
skipping CVE-2018-9272 as CVE page is older than CVRF-CVE file.
skipping CVE-2018-9271 as CVE page is older than CVRF-CVE file.
skipping CVE-2018-9270 as CVE page is older than CVRF-CVE file.
skipping CVE-2018-9269 as CVE page is older than CVRF-CVE file.
skipping CVE-2018-9268 as CVE page is older than CVRF-CVE file.
skipping CVE-2018-9267 as CVE page is older than CVRF-CVE file.
skipping CVE-2018-9266 as CVE page is older than CVRF-CVE file.
skipping CVE-2018-9265 as CVE page is older than CVRF-CVE file.
skipping CVE-2018-9264 as CVE page is older than CVRF-CVE file.
skipping CVE-2018-9263 as CVE page is older than CVRF-CVE file.
skipping CVE-2018-9262 as CVE page is older than CVRF-CVE file.
skipping CVE-2018-9261 as CVE page is older than CVRF-CVE file.
skipping CVE-2018-9260 as CVE page is older than CVRF-CVE file.
skipping CVE-2018-9259 as CVE page is older than CVRF-CVE file.
skipping CVE-2018-9258 as CVE page is older than CVRF-CVE file.
skipping CVE-2018-9257 as CVE page is older than CVRF-CVE file.
skipping CVE-2018-9256 as CVE page is older than CVRF-CVE file.
skipping CVE-2018-9251 as CVE page is older than CVRF-CVE file.
no cpe found for SUSE Liberty Linux 7 LTSS in CVE-2018-9133
skipping CVE-2018-9138 as CVE page is older than CVRF-CVE file.
skipping CVE-2018-9135 as CVE page is older than CVRF-CVE file.
no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2018-8977
skipping CVE-2018-9055 as CVE page is older than CVRF-CVE file.
skipping CVE-2018-9018 as CVE page is older than CVRF-CVE file.
no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2018-8976
skipping CVE-2018-8960 as CVE page is older than CVRF-CVE file.
skipping CVE-2018-8945 as CVE page is older than CVRF-CVE file.
skipping CVE-2018-8905 as CVE page is older than CVRF-CVE file.
no cpe found for SUSE Linux Enterprise Real Time 11 SP4 in CVE-2018-8822
no cpe found for SUSE Package Hub 15 SP1 in CVE-2018-8800
skipping CVE-2018-8804 as CVE page is older than CVRF-CVE file.
no cpe found for SUSE Package Hub 15 SP1 in CVE-2018-8799
no cpe found for SUSE Package Hub 15 SP1 in CVE-2018-8798
no cpe found for SUSE Package Hub 15 SP1 in CVE-2018-8797
no cpe found for SUSE Package Hub 15 SP1 in CVE-2018-8796
no cpe found for SUSE Package Hub 15 SP1 in CVE-2018-8795
no cpe found for SUSE Package Hub 15 SP1 in CVE-2018-8794
no cpe found for SUSE Package Hub 15 SP1 in CVE-2018-8793
no cpe found for SUSE Package Hub 15 SP1 in CVE-2018-8792
no cpe found for SUSE Package Hub 15 SP1 in CVE-2018-8791
skipping CVE-2018-8781 as CVE page is older than CVRF-CVE file.
skipping CVE-2018-8769 as CVE page is older than CVRF-CVE file.
skipping CVE-2018-8740 as CVE page is older than CVRF-CVE file.
No V5 entry found for CVE-2018-8704 / /home/securitybot/prod/cve-database/cvelistV5/cves/2018/8xxxx/CVE-2018-8704.json:No such file or directory
No V5 entry found for CVE-2018-8523 / /home/securitybot/prod/cve-database/cvelistV5/cves/2018/8xxxx/CVE-2018-8523.json:No such file or directory
skipping CVE-2018-8107 as CVE page is older than CVRF-CVE file.
skipping CVE-2018-8106 as CVE page is older than CVRF-CVE file.
skipping CVE-2018-8105 as CVE page is older than CVRF-CVE file.
skipping CVE-2018-8104 as CVE page is older than CVRF-CVE file.
skipping CVE-2018-8103 as CVE page is older than CVRF-CVE file.
skipping CVE-2018-8102 as CVE page is older than CVRF-CVE file.
skipping CVE-2018-8101 as CVE page is older than CVRF-CVE file.
skipping CVE-2018-8100 as CVE page is older than CVRF-CVE file.
skipping CVE-2018-8088 as CVE page is older than CVRF-CVE file.
skipping CVE-2018-8048 as CVE page is older than CVRF-CVE file.
skipping CVE-2018-8034 as CVE page is older than CVRF-CVE file.
skipping CVE-2018-8014 as CVE page is older than CVRF-CVE file.
skipping CVE-2018-8011 as CVE page is older than CVRF-CVE file.
skipping CVE-2018-7995 as CVE page is older than CVRF-CVE file.
skipping CVE-2018-7858 as CVE page is older than CVRF-CVE file.
skipping CVE-2018-7757 as CVE page is older than CVRF-CVE file.
skipping CVE-2018-7750 as CVE page is older than CVRF-CVE file.
skipping CVE-2018-7738 as CVE page is older than CVRF-CVE file.
no cpe found for SUSE Liberty Linux 7 LTSS in CVE-2018-7730
skipping CVE-2018-7685 as CVE page is older than CVRF-CVE file.
no cpe found for SUSE Liberty Linux 7 LTSS in CVE-2018-7584
skipping CVE-2018-7643 as CVE page is older than CVRF-CVE file.
skipping CVE-2018-7642 as CVE page is older than CVRF-CVE file.
no cpe found for SUSE Linux Enterprise Real Time 11 SP4 in CVE-2018-7566
skipping CVE-2018-7570 as CVE page is older than CVRF-CVE file.
skipping CVE-2018-7569 as CVE page is older than CVRF-CVE file.
skipping CVE-2018-7568 as CVE page is older than CVRF-CVE file.
skipping CVE-2018-7544 as CVE page is older than CVRF-CVE file.
no cpe found for SUSE Linux Enterprise Real Time 11 SP4 in CVE-2018-7492
no cpe found for SUSE Liberty Linux 7 LTSS in CVE-2018-7485
skipping CVE-2018-7480 as CVE page is older than CVRF-CVE file.
skipping CVE-2018-7470 as CVE page is older than CVRF-CVE file.
skipping CVE-2018-7456 as CVE page is older than CVRF-CVE file.
skipping CVE-2018-7455 as CVE page is older than CVRF-CVE file.
skipping CVE-2018-7454 as CVE page is older than CVRF-CVE file.
skipping CVE-2018-7453 as CVE page is older than CVRF-CVE file.
skipping CVE-2018-7452 as CVE page is older than CVRF-CVE file.
skipping CVE-2018-7443 as CVE page is older than CVRF-CVE file.
no cpe found for SUSE Liberty Linux 7 LTSS in CVE-2018-7409
skipping CVE-2018-7254 as CVE page is older than CVRF-CVE file.
skipping CVE-2018-7225 as CVE page is older than CVRF-CVE file.
no cpe found for SUSE Package Hub 15 in CVE-2018-7187
skipping CVE-2018-7208 as CVE page is older than CVRF-CVE file.
skipping CVE-2018-7191 as CVE page is older than CVRF-CVE file.
skipping CVE-2018-7175 as CVE page is older than CVRF-CVE file.
skipping CVE-2018-7174 as CVE page is older than CVRF-CVE file.
skipping CVE-2018-7173 as CVE page is older than CVRF-CVE file.
skipping CVE-2018-7169 as CVE page is older than CVRF-CVE file.
no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2018-6952
skipping CVE-2018-6954 as CVE page is older than CVRF-CVE file.
skipping CVE-2018-6927 as CVE page is older than CVRF-CVE file.
no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2018-6913
skipping CVE-2018-6872 as CVE page is older than CVRF-CVE file.
skipping CVE-2018-6836 as CVE page is older than CVRF-CVE file.
no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2018-6798
no cpe found for SUSE Liberty Linux 7 LTSS in CVE-2018-6790
no cpe found for SUSE Package Hub 15 SP1 in CVE-2018-6789
no cpe found for SUSE Package Hub 15 SP2 in CVE-2018-6789
skipping CVE-2018-6764 as CVE page is older than CVRF-CVE file.
skipping CVE-2018-6759 as CVE page is older than CVRF-CVE file.
no cpe found for SUSE Package Hub 15 SP2 in CVE-2018-6612
skipping CVE-2018-6616 as CVE page is older than CVRF-CVE file.
no cpe found for SUSE Liberty Linux 7 LTSS in CVE-2018-6574
no cpe found for SUSE Package Hub 15 in CVE-2018-6556
skipping CVE-2018-6555 as CVE page is older than CVRF-CVE file.
skipping CVE-2018-6554 as CVE page is older than CVRF-CVE file.
skipping CVE-2018-6543 as CVE page is older than CVRF-CVE file.
skipping CVE-2018-6467 as CVE page is older than CVRF-CVE file.
skipping CVE-2018-6405 as CVE page is older than CVRF-CVE file.
skipping CVE-2018-6323 as CVE page is older than CVRF-CVE file.
skipping CVE-2018-6307 as CVE page is older than CVRF-CVE file.
no cpe found for SUSE Linux Enterprise Real Time 11 SP4 in CVE-2018-5814
skipping CVE-2018-5803 as CVE page is older than CVRF-CVE file.
skipping CVE-2018-5784 as CVE page is older than CVRF-CVE file.
no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2018-5772
skipping CVE-2018-5748 as CVE page is older than CVRF-CVE file.
skipping CVE-2018-5744 as CVE page is older than CVRF-CVE file.
skipping CVE-2018-5738 as CVE page is older than CVRF-CVE file.
skipping CVE-2018-5737 as CVE page is older than CVRF-CVE file.
skipping CVE-2018-5736 as CVE page is older than CVRF-CVE file.
skipping CVE-2018-5733 as CVE page is older than CVRF-CVE file.
skipping CVE-2018-5732 as CVE page is older than CVRF-CVE file.
skipping CVE-2018-5730 as CVE page is older than CVRF-CVE file.
skipping CVE-2018-5729 as CVE page is older than CVRF-CVE file.
no cpe found for SUSE Liberty Linux 7 LTSS in CVE-2018-5712
skipping CVE-2018-5703 as CVE page is older than CVRF-CVE file.
skipping CVE-2018-5685 as CVE page is older than CVRF-CVE file.
skipping CVE-2018-5407 as CVE page is older than CVRF-CVE file.
skipping CVE-2018-5391 as CVE page is older than CVRF-CVE file.
no cpe found for SUSE Liberty Linux 7 LTSS in CVE-2018-5379
no cpe found for SUSE Liberty Linux 7 LTSS in CVE-2018-5345
skipping CVE-2018-5357 as CVE page is older than CVRF-CVE file.
skipping CVE-2018-5344 as CVE page is older than CVRF-CVE file.
skipping CVE-2018-5336 as CVE page is older than CVRF-CVE file.
skipping CVE-2018-5335 as CVE page is older than CVRF-CVE file.
skipping CVE-2018-5334 as CVE page is older than CVRF-CVE file.
skipping CVE-2018-5333 as CVE page is older than CVRF-CVE file.
skipping CVE-2018-5332 as CVE page is older than CVRF-CVE file.
no cpe found for SUSE Package Hub 15 in CVE-2018-5188
no cpe found for SUSE Package Hub 15 in CVE-2018-5179
no cpe found for SUSE Package Hub 15 in CVE-2018-5156
skipping CVE-2018-5147 as CVE page is older than CVRF-CVE file.
skipping CVE-2018-5146 as CVE page is older than CVRF-CVE file.
skipping CVE-2018-4700 as CVE page is older than CVRF-CVE file.
skipping CVE-2018-4464 as CVE page is older than CVRF-CVE file.
skipping CVE-2018-4443 as CVE page is older than CVRF-CVE file.
skipping CVE-2018-4442 as CVE page is older than CVRF-CVE file.
skipping CVE-2018-4441 as CVE page is older than CVRF-CVE file.
skipping CVE-2018-4438 as CVE page is older than CVRF-CVE file.
skipping CVE-2018-4437 as CVE page is older than CVRF-CVE file.
skipping CVE-2018-4416 as CVE page is older than CVRF-CVE file.
skipping CVE-2018-4392 as CVE page is older than CVRF-CVE file.
skipping CVE-2018-4386 as CVE page is older than CVRF-CVE file.
skipping CVE-2018-4382 as CVE page is older than CVRF-CVE file.
skipping CVE-2018-4378 as CVE page is older than CVRF-CVE file.
skipping CVE-2018-4376 as CVE page is older than CVRF-CVE file.
skipping CVE-2018-4375 as CVE page is older than CVRF-CVE file.
skipping CVE-2018-4373 as CVE page is older than CVRF-CVE file.
skipping CVE-2018-4372 as CVE page is older than CVRF-CVE file.
skipping CVE-2018-4361 as CVE page is older than CVRF-CVE file.
skipping CVE-2018-4359 as CVE page is older than CVRF-CVE file.
skipping CVE-2018-4358 as CVE page is older than CVRF-CVE file.
skipping CVE-2018-4345 as CVE page is older than CVRF-CVE file.
skipping CVE-2018-4328 as CVE page is older than CVRF-CVE file.
skipping CVE-2018-4323 as CVE page is older than CVRF-CVE file.
skipping CVE-2018-4319 as CVE page is older than CVRF-CVE file.
skipping CVE-2018-4318 as CVE page is older than CVRF-CVE file.
skipping CVE-2018-4317 as CVE page is older than CVRF-CVE file.
skipping CVE-2018-4316 as CVE page is older than CVRF-CVE file.
skipping CVE-2018-4315 as CVE page is older than CVRF-CVE file.
skipping CVE-2018-4314 as CVE page is older than CVRF-CVE file.
skipping CVE-2018-4312 as CVE page is older than CVRF-CVE file.
skipping CVE-2018-4311 as CVE page is older than CVRF-CVE file.
skipping CVE-2018-4309 as CVE page is older than CVRF-CVE file.
skipping CVE-2018-4306 as CVE page is older than CVRF-CVE file.
skipping CVE-2018-4300 as CVE page is older than CVRF-CVE file.
skipping CVE-2018-4299 as CVE page is older than CVRF-CVE file.
skipping CVE-2018-4284 as CVE page is older than CVRF-CVE file.
skipping CVE-2018-4278 as CVE page is older than CVRF-CVE file.
skipping CVE-2018-4273 as CVE page is older than CVRF-CVE file.
skipping CVE-2018-4272 as CVE page is older than CVRF-CVE file.
skipping CVE-2018-4271 as CVE page is older than CVRF-CVE file.
skipping CVE-2018-4270 as CVE page is older than CVRF-CVE file.
skipping CVE-2018-4267 as CVE page is older than CVRF-CVE file.
skipping CVE-2018-4266 as CVE page is older than CVRF-CVE file.
skipping CVE-2018-4265 as CVE page is older than CVRF-CVE file.
skipping CVE-2018-4264 as CVE page is older than CVRF-CVE file.
skipping CVE-2018-4263 as CVE page is older than CVRF-CVE file.
skipping CVE-2018-4262 as CVE page is older than CVRF-CVE file.
skipping CVE-2018-4261 as CVE page is older than CVRF-CVE file.
skipping CVE-2018-4246 as CVE page is older than CVRF-CVE file.
skipping CVE-2018-4233 as CVE page is older than CVRF-CVE file.
skipping CVE-2018-4232 as CVE page is older than CVRF-CVE file.
skipping CVE-2018-4222 as CVE page is older than CVRF-CVE file.
skipping CVE-2018-4218 as CVE page is older than CVRF-CVE file.
skipping CVE-2018-4214 as CVE page is older than CVRF-CVE file.
skipping CVE-2018-4213 as CVE page is older than CVRF-CVE file.
skipping CVE-2018-4212 as CVE page is older than CVRF-CVE file.
skipping CVE-2018-4210 as CVE page is older than CVRF-CVE file.
skipping CVE-2018-4209 as CVE page is older than CVRF-CVE file.
skipping CVE-2018-4208 as CVE page is older than CVRF-CVE file.
skipping CVE-2018-4207 as CVE page is older than CVRF-CVE file.
skipping CVE-2018-4204 as CVE page is older than CVRF-CVE file.
skipping CVE-2018-4200 as CVE page is older than CVRF-CVE file.
skipping CVE-2018-4199 as CVE page is older than CVRF-CVE file.
skipping CVE-2018-4197 as CVE page is older than CVRF-CVE file.
skipping CVE-2018-4191 as CVE page is older than CVRF-CVE file.
skipping CVE-2018-4190 as CVE page is older than CVRF-CVE file.
no cpe found for SUSE Package Hub 15 in CVE-2018-4022
skipping CVE-2018-4165 as CVE page is older than CVRF-CVE file.
skipping CVE-2018-4163 as CVE page is older than CVRF-CVE file.
skipping CVE-2018-4162 as CVE page is older than CVRF-CVE file.
skipping CVE-2018-4161 as CVE page is older than CVRF-CVE file.
skipping CVE-2018-4146 as CVE page is older than CVRF-CVE file.
skipping CVE-2018-4133 as CVE page is older than CVRF-CVE file.
skipping CVE-2018-4129 as CVE page is older than CVRF-CVE file.
skipping CVE-2018-4128 as CVE page is older than CVRF-CVE file.
skipping CVE-2018-4127 as CVE page is older than CVRF-CVE file.
skipping CVE-2018-4125 as CVE page is older than CVRF-CVE file.
skipping CVE-2018-4122 as CVE page is older than CVRF-CVE file.
skipping CVE-2018-4121 as CVE page is older than CVRF-CVE file.
skipping CVE-2018-4120 as CVE page is older than CVRF-CVE file.
skipping CVE-2018-4119 as CVE page is older than CVRF-CVE file.
skipping CVE-2018-4118 as CVE page is older than CVRF-CVE file.
skipping CVE-2018-4117 as CVE page is older than CVRF-CVE file.
skipping CVE-2018-4114 as CVE page is older than CVRF-CVE file.
skipping CVE-2018-4113 as CVE page is older than CVRF-CVE file.
skipping CVE-2018-4101 as CVE page is older than CVRF-CVE file.
skipping CVE-2018-4096 as CVE page is older than CVRF-CVE file.
skipping CVE-2018-4089 as CVE page is older than CVRF-CVE file.
skipping CVE-2018-4088 as CVE page is older than CVRF-CVE file.
no cpe found for SUSE Package Hub 15 in CVE-2018-4013
no cpe found for SUSE Package Hub 15 in CVE-2018-3977
no cpe found for SUSE Package Hub 15 in CVE-2018-3839
no cpe found for HPE Helion OpenStack Cloud 8 in CVE-2018-3817
no cpe found for SUSE Package Hub 15 in CVE-2018-3780
skipping CVE-2018-3760 as CVE page is older than CVRF-CVE file.
skipping CVE-2018-3741 as CVE page is older than CVRF-CVE file.
no cpe found for SUSE Linux Enterprise Real Time 11 SP4 in CVE-2018-3665
skipping CVE-2018-3646 as CVE page is older than CVRF-CVE file.
no cpe found for SUSE Linux Enterprise Real Time 11 SP4 in CVE-2018-3620
skipping CVE-2018-3639 as CVE page is older than CVRF-CVE file.
skipping CVE-2018-3630 as CVE page is older than CVRF-CVE file.
no cpe found for SUSE Liberty Linux 7 LTSS in CVE-2018-3613
skipping CVE-2018-3284 as CVE page is older than CVRF-CVE file.
skipping CVE-2018-3282 as CVE page is older than CVRF-CVE file.
skipping CVE-2018-3277 as CVE page is older than CVRF-CVE file.
skipping CVE-2018-3251 as CVE page is older than CVRF-CVE file.
skipping CVE-2018-3200 as CVE page is older than CVRF-CVE file.
skipping CVE-2018-3185 as CVE page is older than CVRF-CVE file.
skipping CVE-2018-3183 as CVE page is older than CVRF-CVE file.
skipping CVE-2018-3180 as CVE page is older than CVRF-CVE file.
skipping CVE-2018-3174 as CVE page is older than CVRF-CVE file.
skipping CVE-2018-3173 as CVE page is older than CVRF-CVE file.
skipping CVE-2018-3169 as CVE page is older than CVRF-CVE file.
skipping CVE-2018-3162 as CVE page is older than CVRF-CVE file.
skipping CVE-2018-3157 as CVE page is older than CVRF-CVE file.
skipping CVE-2018-3156 as CVE page is older than CVRF-CVE file.
skipping CVE-2018-3150 as CVE page is older than CVRF-CVE file.
skipping CVE-2018-3149 as CVE page is older than CVRF-CVE file.
skipping CVE-2018-3143 as CVE page is older than CVRF-CVE file.
skipping CVE-2018-3139 as CVE page is older than CVRF-CVE file.
skipping CVE-2018-3136 as CVE page is older than CVRF-CVE file.
skipping CVE-2018-3066 as CVE page is older than CVRF-CVE file.
skipping CVE-2018-3064 as CVE page is older than CVRF-CVE file.
skipping CVE-2018-3063 as CVE page is older than CVRF-CVE file.
skipping CVE-2018-3060 as CVE page is older than CVRF-CVE file.
skipping CVE-2018-3058 as CVE page is older than CVRF-CVE file.
skipping CVE-2018-2973 as CVE page is older than CVRF-CVE file.
skipping CVE-2018-2972 as CVE page is older than CVRF-CVE file.
skipping CVE-2018-2964 as CVE page is older than CVRF-CVE file.
skipping CVE-2018-2952 as CVE page is older than CVRF-CVE file.
skipping CVE-2018-2940 as CVE page is older than CVRF-CVE file.
skipping CVE-2018-2938 as CVE page is older than CVRF-CVE file.
skipping CVE-2018-2826 as CVE page is older than CVRF-CVE file.
skipping CVE-2018-2825 as CVE page is older than CVRF-CVE file.
skipping CVE-2018-2819 as CVE page is older than CVRF-CVE file.
skipping CVE-2018-2817 as CVE page is older than CVRF-CVE file.
skipping CVE-2018-2815 as CVE page is older than CVRF-CVE file.
skipping CVE-2018-2814 as CVE page is older than CVRF-CVE file.
skipping CVE-2018-2813 as CVE page is older than CVRF-CVE file.
skipping CVE-2018-2810 as CVE page is older than CVRF-CVE file.
skipping CVE-2018-2800 as CVE page is older than CVRF-CVE file.
skipping CVE-2018-2799 as CVE page is older than CVRF-CVE file.
skipping CVE-2018-2798 as CVE page is older than CVRF-CVE file.
skipping CVE-2018-2797 as CVE page is older than CVRF-CVE file.
skipping CVE-2018-2796 as CVE page is older than CVRF-CVE file.
skipping CVE-2018-2795 as CVE page is older than CVRF-CVE file.
skipping CVE-2018-2794 as CVE page is older than CVRF-CVE file.
skipping CVE-2018-2790 as CVE page is older than CVRF-CVE file.
skipping CVE-2018-2787 as CVE page is older than CVRF-CVE file.
skipping CVE-2018-2786 as CVE page is older than CVRF-CVE file.
skipping CVE-2018-2784 as CVE page is older than CVRF-CVE file.
skipping CVE-2018-2782 as CVE page is older than CVRF-CVE file.
skipping CVE-2018-2781 as CVE page is older than CVRF-CVE file.
skipping CVE-2018-2777 as CVE page is older than CVRF-CVE file.
skipping CVE-2018-2771 as CVE page is older than CVRF-CVE file.
skipping CVE-2018-2767 as CVE page is older than CVRF-CVE file.
skipping CVE-2018-2766 as CVE page is older than CVRF-CVE file.
skipping CVE-2018-2761 as CVE page is older than CVRF-CVE file.
skipping CVE-2018-2759 as CVE page is older than CVRF-CVE file.
skipping CVE-2018-2755 as CVE page is older than CVRF-CVE file.
skipping CVE-2018-2668 as CVE page is older than CVRF-CVE file.
skipping CVE-2018-2665 as CVE page is older than CVRF-CVE file.
skipping CVE-2018-2640 as CVE page is older than CVRF-CVE file.
skipping CVE-2018-2622 as CVE page is older than CVRF-CVE file.
skipping CVE-2018-2612 as CVE page is older than CVRF-CVE file.
No V5 entry found for CVE-2018-1537 / /home/securitybot/prod/cve-database/cvelistV5/cves/2018/1xxxx/CVE-2018-1537.json:No such file or directory
skipping CVE-2018-2562 as CVE page is older than CVRF-CVE file.
skipping CVE-2018-1890 as CVE page is older than CVRF-CVE file.
skipping CVE-2018-1656 as CVE page is older than CVRF-CVE file.
skipping CVE-2018-1517 as CVE page is older than CVRF-CVE file.
skipping CVE-2018-1336 as CVE page is older than CVRF-CVE file.
skipping CVE-2018-1312 as CVE page is older than CVRF-CVE file.
skipping CVE-2018-1311 as CVE page is older than CVRF-CVE file.
skipping CVE-2018-1305 as CVE page is older than CVRF-CVE file.
skipping CVE-2018-1303 as CVE page is older than CVRF-CVE file.
skipping CVE-2018-1302 as CVE page is older than CVRF-CVE file.
skipping CVE-2018-1301 as CVE page is older than CVRF-CVE file.
skipping CVE-2018-1283 as CVE page is older than CVRF-CVE file.
no cpe found for SUSE Linux Enterprise Real Time 11 SP4 in CVE-2018-1130
skipping CVE-2018-1140 as CVE page is older than CVRF-CVE file.
skipping CVE-2018-1139 as CVE page is older than CVRF-CVE file.
skipping CVE-2018-1126 as CVE page is older than CVRF-CVE file.
skipping CVE-2018-1125 as CVE page is older than CVRF-CVE file.
skipping CVE-2018-1124 as CVE page is older than CVRF-CVE file.
skipping CVE-2018-1123 as CVE page is older than CVRF-CVE file.
skipping CVE-2018-1122 as CVE page is older than CVRF-CVE file.
skipping CVE-2018-1115 as CVE page is older than CVRF-CVE file.
skipping CVE-2018-1108 as CVE page is older than CVRF-CVE file.
skipping CVE-2018-1095 as CVE page is older than CVRF-CVE file.
skipping CVE-2018-1094 as CVE page is older than CVRF-CVE file.
skipping CVE-2018-1092 as CVE page is older than CVRF-CVE file.
skipping CVE-2018-1084 as CVE page is older than CVRF-CVE file.
no cpe found for SUSE Linux Enterprise Real Time 11 SP4 in CVE-2018-1068
skipping CVE-2018-1065 as CVE page is older than CVRF-CVE file.
skipping CVE-2018-1064 as CVE page is older than CVRF-CVE file.
skipping CVE-2018-1059 as CVE page is older than CVRF-CVE file.
skipping CVE-2018-1058 as CVE page is older than CVRF-CVE file.
skipping CVE-2018-1057 as CVE page is older than CVRF-CVE file.
skipping CVE-2018-1052 as CVE page is older than CVRF-CVE file.
skipping CVE-2018-1050 as CVE page is older than CVRF-CVE file.
skipping CVE-2018-0739 as CVE page is older than CVRF-CVE file.
skipping CVE-2018-0737 as CVE page is older than CVRF-CVE file.
skipping CVE-2018-0735 as CVE page is older than CVRF-CVE file.
skipping CVE-2018-0734 as CVE page is older than CVRF-CVE file.
skipping CVE-2018-0732 as CVE page is older than CVRF-CVE file.
skipping CVE-2017-1000476 as CVE page is older than CVRF-CVE file.
skipping CVE-2017-1000469 as CVE page is older than CVRF-CVE file.
skipping CVE-2017-1000456 as CVE page is older than CVRF-CVE file.
no cpe found for HPE Helion OpenStack Cloud 8 in CVE-2017-1000433
skipping CVE-2017-1000445 as CVE page is older than CVRF-CVE file.
no cpe found for SUSE Linux Enterprise Real Time 11 SP4 in CVE-2017-1000407
skipping CVE-2017-1000408 as CVE page is older than CVRF-CVE file.
skipping CVE-2017-1000380 as CVE page is older than CVRF-CVE file.
no cpe found for SUSE Package Hub 15 SP1 in CVE-2017-1000369
no cpe found for SUSE Package Hub 15 SP2 in CVE-2017-1000369
skipping CVE-2017-1000371 as CVE page is older than CVRF-CVE file.
skipping CVE-2017-1000370 as CVE page is older than CVRF-CVE file.
no cpe found for SUSE Linux Enterprise Real Time 11 SP4 in CVE-2017-1000364
skipping CVE-2017-1000365 as CVE page is older than CVRF-CVE file.
no cpe found for SUSE Linux Enterprise Real Time 11 SP4 in CVE-2017-1000363
skipping CVE-2017-1000257 as CVE page is older than CVRF-CVE file.
skipping CVE-2017-1000256 as CVE page is older than CVRF-CVE file.
no cpe found for SUSE Linux Enterprise Real Time 11 SP4 in CVE-2017-1000253
skipping CVE-2017-1000254 as CVE page is older than CVRF-CVE file.
skipping CVE-2017-1000251 as CVE page is older than CVRF-CVE file.
no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2017-1000128
skipping CVE-2017-1000122 as CVE page is older than CVRF-CVE file.
no cpe found for SUSE Linux Enterprise Real Time 11 SP4 in CVE-2017-1000112
skipping CVE-2017-1000101 as CVE page is older than CVRF-CVE file.
skipping CVE-2017-1000100 as CVE page is older than CVRF-CVE file.
skipping CVE-2017-1000099 as CVE page is older than CVRF-CVE file.
skipping CVE-2017-1000082 as CVE page is older than CVRF-CVE file.
no cpe found for SUSE Liberty Linux 7 LTSS in CVE-2017-1000050
no cpe found for SUSE Liberty Linux 7 LTSS in CVE-2017-18922
skipping CVE-2017-18926 as CVE page is older than CVRF-CVE file.
skipping CVE-2017-18640 as CVE page is older than CVRF-CVE file.
no cpe found for HPE Helion OpenStack Cloud 8 in CVE-2017-18635
skipping CVE-2017-18595 as CVE page is older than CVRF-CVE file.
skipping CVE-2017-18551 as CVE page is older than CVRF-CVE file.
skipping CVE-2017-18550 as CVE page is older than CVRF-CVE file.
skipping CVE-2017-18549 as CVE page is older than CVRF-CVE file.
skipping CVE-2017-18509 as CVE page is older than CVRF-CVE file.
skipping CVE-2017-18379 as CVE page is older than CVRF-CVE file.
no cpe found for SUSE Package Hub 15 SP4 in CVE-2017-18359
skipping CVE-2017-18360 as CVE page is older than CVRF-CVE file.
skipping CVE-2017-18344 as CVE page is older than CVRF-CVE file.
--- /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2017-18342.xml 2024-10-23 02:48:38.725907000 +0200
+++ /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2017-18342.xml.new 2024-10-29 02:45:19.691470000 +0100
@@ -14,13 +14,13 @@
1
- 127
- 2024-10-23T00:48:38Z
+ 128
+ 2024-10-29T01:45:17Z
current
2021-05-30T14:05:44Z
- 2024-10-23T00:48:38Z
+ 2024-10-29T01:45:17Z
cve-database/bin/generate-cvrf-cve.pl
2020-12-27T01:00:00Z
@@ -195,6 +195,11 @@
Image SLES12-SP5-EC2-SAP-On-Demand
+
+
+ Image SLES12-SP5-GCE-BYOS
+
+
Image SLES12-SP5-GCE-SAP-BYOS
@@ -1107,6 +1112,9 @@
python3-PyYAML-5.1.2-3.3.1 as a component of Image SLES12-SP5-EC2-SAP-On-Demand
+
+ python3-PyYAML-5.1.2-3.3.1 as a component of Image SLES12-SP5-GCE-BYOS
+
python3-PyYAML-5.1.2-3.3.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
@@ -1550,6 +1558,7 @@
Image SLES12-SP5-EC2-On-Demand:python3-PyYAML-5.1.2-3.3.1
Image SLES12-SP5-EC2-SAP-BYOS:python3-PyYAML-5.1.2-3.3.1
Image SLES12-SP5-EC2-SAP-On-Demand:python3-PyYAML-5.1.2-3.3.1
+ Image SLES12-SP5-GCE-BYOS:python3-PyYAML-5.1.2-3.3.1
Image SLES12-SP5-GCE-SAP-BYOS:python3-PyYAML-5.1.2-3.3.1
Image SLES12-SP5-GCE-SAP-On-Demand:python3-PyYAML-5.1.2-3.3.1
Image SLES12-SP5-OCI-BYOS-BYOS:python3-PyYAML-5.1.2-3.3.1
no cpe found for SUSE Liberty Linux 7 LTSS in CVE-2017-18273
no cpe found for SUSE Liberty Linux 7 LTSS in CVE-2017-18271
no cpe found for SUSE Liberty Linux 7 LTSS in CVE-2017-18267
skipping CVE-2017-18270 as CVE page is older than CVRF-CVE file.
skipping CVE-2017-18269 as CVE page is older than CVRF-CVE file.
skipping CVE-2017-18261 as CVE page is older than CVRF-CVE file.
skipping CVE-2017-18258 as CVE page is older than CVRF-CVE file.
skipping CVE-2017-18257 as CVE page is older than CVRF-CVE file.
skipping CVE-2017-18255 as CVE page is older than CVRF-CVE file.
skipping CVE-2017-18254 as CVE page is older than CVRF-CVE file.
skipping CVE-2017-18252 as CVE page is older than CVRF-CVE file.
skipping CVE-2017-18251 as CVE page is older than CVRF-CVE file.
skipping CVE-2017-18250 as CVE page is older than CVRF-CVE file.
skipping CVE-2017-18249 as CVE page is older than CVRF-CVE file.
no cpe found for SUSE Liberty Linux 7 LTSS in CVE-2017-18238
no cpe found for SUSE Liberty Linux 7 LTSS in CVE-2017-18236
no cpe found for SUSE Liberty Linux 7 LTSS in CVE-2017-18234
no cpe found for SUSE Liberty Linux 7 LTSS in CVE-2017-18233
skipping CVE-2017-18224 as CVE page is older than CVRF-CVE file.
skipping CVE-2017-18222 as CVE page is older than CVRF-CVE file.
skipping CVE-2017-18221 as CVE page is older than CVRF-CVE file.
skipping CVE-2017-18218 as CVE page is older than CVRF-CVE file.
skipping CVE-2017-18211 as CVE page is older than CVRF-CVE file.
skipping CVE-2017-18209 as CVE page is older than CVRF-CVE file.
skipping CVE-2017-18208 as CVE page is older than CVRF-CVE file.
skipping CVE-2017-18207 as CVE page is older than CVRF-CVE file.
skipping CVE-2017-18204 as CVE page is older than CVRF-CVE file.
skipping CVE-2017-18203 as CVE page is older than CVRF-CVE file.
skipping CVE-2017-18201 as CVE page is older than CVRF-CVE file.
no cpe found for SUSE Liberty Linux 7 LTSS in CVE-2017-18199
no cpe found for SUSE Liberty Linux 7 LTSS in CVE-2017-18198
skipping CVE-2017-18193 as CVE page is older than CVRF-CVE file.
no cpe found for SUSE Liberty Linux 7 LTSS in CVE-2017-18189
skipping CVE-2017-18174 as CVE page is older than CVRF-CVE file.
skipping CVE-2017-18079 as CVE page is older than CVRF-CVE file.
skipping CVE-2017-18078 as CVE page is older than CVRF-CVE file.
skipping CVE-2017-18075 as CVE page is older than CVRF-CVE file.
skipping CVE-2017-18029 as CVE page is older than CVRF-CVE file.
skipping CVE-2017-18028 as CVE page is older than CVRF-CVE file.
skipping CVE-2017-18027 as CVE page is older than CVRF-CVE file.
skipping CVE-2017-18017 as CVE page is older than CVRF-CVE file.
skipping CVE-2017-18013 as CVE page is older than CVRF-CVE file.
skipping CVE-2017-18008 as CVE page is older than CVRF-CVE file.
skipping CVE-2017-17975 as CVE page is older than CVRF-CVE file.
skipping CVE-2017-17973 as CVE page is older than CVRF-CVE file.
skipping CVE-2017-17935 as CVE page is older than CVRF-CVE file.
skipping CVE-2017-17934 as CVE page is older than CVRF-CVE file.
skipping CVE-2017-17914 as CVE page is older than CVRF-CVE file.
skipping CVE-2017-17887 as CVE page is older than CVRF-CVE file.
skipping CVE-2017-17885 as CVE page is older than CVRF-CVE file.
skipping CVE-2017-17884 as CVE page is older than CVRF-CVE file.
skipping CVE-2017-17882 as CVE page is older than CVRF-CVE file.
skipping CVE-2017-17879 as CVE page is older than CVRF-CVE file.
no cpe found for SUSE Linux Enterprise Real Time 11 SP4 in CVE-2017-17805
skipping CVE-2017-17807 as CVE page is older than CVRF-CVE file.
skipping CVE-2017-17806 as CVE page is older than CVRF-CVE file.
skipping CVE-2017-17741 as CVE page is older than CVRF-CVE file.
skipping CVE-2017-17740 as CVE page is older than CVRF-CVE file.
skipping CVE-2017-17725 as CVE page is older than CVRF-CVE file.
skipping CVE-2017-17682 as CVE page is older than CVRF-CVE file.
skipping CVE-2017-17681 as CVE page is older than CVRF-CVE file.
skipping CVE-2017-17680 as CVE page is older than CVRF-CVE file.
no cpe found for SUSE Package Hub 15 in CVE-2017-17555
no cpe found for SUSE Package Hub 15 SP1 in CVE-2017-17555
skipping CVE-2017-17558 as CVE page is older than CVRF-CVE file.
skipping CVE-2017-17504 as CVE page is older than CVRF-CVE file.
skipping CVE-2017-17450 as CVE page is older than CVRF-CVE file.
skipping CVE-2017-17121 as CVE page is older than CVRF-CVE file.
skipping CVE-2017-17095 as CVE page is older than CVRF-CVE file.
skipping CVE-2017-17087 as CVE page is older than CVRF-CVE file.
skipping CVE-2017-17053 as CVE page is older than CVRF-CVE file.
skipping CVE-2017-16997 as CVE page is older than CVRF-CVE file.
no cpe found for SUSE Package Hub 15 SP1 in CVE-2017-16944
no cpe found for SUSE Package Hub 15 SP2 in CVE-2017-16944
no cpe found for SUSE Package Hub 15 SP1 in CVE-2017-16943
no cpe found for SUSE Package Hub 15 SP2 in CVE-2017-16943
skipping CVE-2017-16939 as CVE page is older than CVRF-CVE file.
skipping CVE-2017-16932 as CVE page is older than CVRF-CVE file.
skipping CVE-2017-16914 as CVE page is older than CVRF-CVE file.
skipping CVE-2017-16913 as CVE page is older than CVRF-CVE file.
skipping CVE-2017-16912 as CVE page is older than CVRF-CVE file.
skipping CVE-2017-16911 as CVE page is older than CVRF-CVE file.
skipping CVE-2017-16879 as CVE page is older than CVRF-CVE file.
no cpe found for SUSE Liberty Linux 7 LTSS in CVE-2017-16844
skipping CVE-2017-16832 as CVE page is older than CVRF-CVE file.
skipping CVE-2017-16831 as CVE page is older than CVRF-CVE file.
skipping CVE-2017-16830 as CVE page is older than CVRF-CVE file.
skipping CVE-2017-16829 as CVE page is older than CVRF-CVE file.
skipping CVE-2017-16828 as CVE page is older than CVRF-CVE file.
skipping CVE-2017-16827 as CVE page is older than CVRF-CVE file.
skipping CVE-2017-16826 as CVE page is older than CVRF-CVE file.
skipping CVE-2017-16669 as CVE page is older than CVRF-CVE file.
skipping CVE-2017-16650 as CVE page is older than CVRF-CVE file.
skipping CVE-2017-16649 as CVE page is older than CVRF-CVE file.
skipping CVE-2017-16648 as CVE page is older than CVRF-CVE file.
skipping CVE-2017-16644 as CVE page is older than CVRF-CVE file.
skipping CVE-2017-16643 as CVE page is older than CVRF-CVE file.
skipping CVE-2017-16611 as CVE page is older than CVRF-CVE file.
no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2017-16544
skipping CVE-2017-16546 as CVE page is older than CVRF-CVE file.
skipping CVE-2017-16545 as CVE page is older than CVRF-CVE file.
no cpe found for SUSE Linux Enterprise Real Time 11 SP4 in CVE-2017-16537
skipping CVE-2017-16538 as CVE page is older than CVRF-CVE file.
no cpe found for SUSE Linux Enterprise Real Time 11 SP4 in CVE-2017-16536
no cpe found for SUSE Linux Enterprise Real Time 11 SP4 in CVE-2017-16533
skipping CVE-2017-16535 as CVE page is older than CVRF-CVE file.
skipping CVE-2017-16534 as CVE page is older than CVRF-CVE file.
skipping CVE-2017-16532 as CVE page is older than CVRF-CVE file.
skipping CVE-2017-16531 as CVE page is older than CVRF-CVE file.
skipping CVE-2017-16530 as CVE page is older than CVRF-CVE file.
skipping CVE-2017-16529 as CVE page is older than CVRF-CVE file.
skipping CVE-2017-16528 as CVE page is older than CVRF-CVE file.
skipping CVE-2017-16527 as CVE page is older than CVRF-CVE file.
skipping CVE-2017-16525 as CVE page is older than CVRF-CVE file.
skipping CVE-2017-16353 as CVE page is older than CVRF-CVE file.
skipping CVE-2017-16352 as CVE page is older than CVRF-CVE file.
skipping CVE-2017-16340 as CVE page is older than CVRF-CVE file.
skipping CVE-2017-16232 as CVE page is older than CVRF-CVE file.
skipping CVE-2017-16011 as CVE page is older than CVRF-CVE file.
skipping CVE-2017-15996 as CVE page is older than CVRF-CVE file.
skipping CVE-2017-15951 as CVE page is older than CVRF-CVE file.
skipping CVE-2017-15939 as CVE page is older than CVRF-CVE file.
skipping CVE-2017-15938 as CVE page is older than CVRF-CVE file.
skipping CVE-2017-15930 as CVE page is older than CVRF-CVE file.
skipping CVE-2017-15908 as CVE page is older than CVRF-CVE file.
no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2017-15874
no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2017-15873
skipping CVE-2017-15868 as CVE page is older than CVRF-CVE file.
skipping CVE-2017-15865 as CVE page is older than CVRF-CVE file.
skipping CVE-2017-15715 as CVE page is older than CVRF-CVE file.
skipping CVE-2017-15710 as CVE page is older than CVRF-CVE file.
skipping CVE-2017-15706 as CVE page is older than CVRF-CVE file.
skipping CVE-2017-15652 as CVE page is older than CVRF-CVE file.
skipping CVE-2017-15649 as CVE page is older than CVRF-CVE file.
skipping CVE-2017-15565 as CVE page is older than CVRF-CVE file.
skipping CVE-2017-15537 as CVE page is older than CVRF-CVE file.
no cpe found for SUSE Package Hub 15 in CVE-2017-15430
skipping CVE-2017-15365 as CVE page is older than CVRF-CVE file.
skipping CVE-2017-15299 as CVE page is older than CVRF-CVE file.
skipping CVE-2017-15298 as CVE page is older than CVRF-CVE file.
skipping CVE-2017-15281 as CVE page is older than CVRF-CVE file.
skipping CVE-2017-15277 as CVE page is older than CVRF-CVE file.
skipping CVE-2017-15275 as CVE page is older than CVRF-CVE file.
skipping CVE-2017-15274 as CVE page is older than CVRF-CVE file.
skipping CVE-2017-15268 as CVE page is older than CVRF-CVE file.
skipping CVE-2017-15265 as CVE page is older than CVRF-CVE file.
skipping CVE-2017-15218 as CVE page is older than CVRF-CVE file.
skipping CVE-2017-15217 as CVE page is older than CVRF-CVE file.
no cpe found for HPE Helion OpenStack Cloud 8 in CVE-2017-15139
no cpe found for SUSE Liberty Linux 7 LTSS in CVE-2017-15131
skipping CVE-2017-15130 as CVE page is older than CVRF-CVE file.
skipping CVE-2017-15126 as CVE page is older than CVRF-CVE file.
no cpe found for SUSE Liberty Linux 7 LTSS in CVE-2017-15112
skipping CVE-2017-15118 as CVE page is older than CVRF-CVE file.
skipping CVE-2017-15116 as CVE page is older than CVRF-CVE file.
skipping CVE-2017-15115 as CVE page is older than CVRF-CVE file.
no cpe found for SUSE Liberty Linux 7 LTSS in CVE-2017-15111
no cpe found for SUSE Liberty Linux 7 LTSS in CVE-2017-15101
skipping CVE-2017-15102 as CVE page is older than CVRF-CVE file.
skipping CVE-2017-15099 as CVE page is older than CVRF-CVE file.
skipping CVE-2017-15098 as CVE page is older than CVRF-CVE file.
skipping CVE-2017-15088 as CVE page is older than CVRF-CVE file.
no cpe found for SUSE Liberty Linux 7 LTSS in CVE-2017-15042
no cpe found for SUSE Liberty Linux 7 LTSS in CVE-2017-15041
skipping CVE-2017-15038 as CVE page is older than CVRF-CVE file.
skipping CVE-2017-15023 as CVE page is older than CVRF-CVE file.
skipping CVE-2017-15017 as CVE page is older than CVRF-CVE file.
skipping CVE-2017-15016 as CVE page is older than CVRF-CVE file.
skipping CVE-2017-14997 as CVE page is older than CVRF-CVE file.
skipping CVE-2017-14989 as CVE page is older than CVRF-CVE file.
skipping CVE-2017-14988 as CVE page is older than CVRF-CVE file.
skipping CVE-2017-14980 as CVE page is older than CVRF-CVE file.
skipping CVE-2017-14977 as CVE page is older than CVRF-CVE file.
skipping CVE-2017-14976 as CVE page is older than CVRF-CVE file.
skipping CVE-2017-14975 as CVE page is older than CVRF-CVE file.
skipping CVE-2017-14928 as CVE page is older than CVRF-CVE file.
skipping CVE-2017-14867 as CVE page is older than CVRF-CVE file.
skipping CVE-2017-14858 as CVE page is older than CVRF-CVE file.
skipping CVE-2017-14798 as CVE page is older than CVRF-CVE file.
skipping CVE-2017-14746 as CVE page is older than CVRF-CVE file.
skipping CVE-2017-14739 as CVE page is older than CVRF-CVE file.
skipping CVE-2017-14733 as CVE page is older than CVRF-CVE file.
skipping CVE-2017-14696 as CVE page is older than CVRF-CVE file.
skipping CVE-2017-14695 as CVE page is older than CVRF-CVE file.
skipping CVE-2017-14682 as CVE page is older than CVRF-CVE file.
skipping CVE-2017-14649 as CVE page is older than CVRF-CVE file.
skipping CVE-2017-14633 as CVE page is older than CVRF-CVE file.
skipping CVE-2017-14632 as CVE page is older than CVRF-CVE file.
skipping CVE-2017-14617 as CVE page is older than CVRF-CVE file.
skipping CVE-2017-14607 as CVE page is older than CVRF-CVE file.
skipping CVE-2017-14531 as CVE page is older than CVRF-CVE file.
skipping CVE-2017-14520 as CVE page is older than CVRF-CVE file.
skipping CVE-2017-14519 as CVE page is older than CVRF-CVE file.
skipping CVE-2017-14518 as CVE page is older than CVRF-CVE file.
skipping CVE-2017-14517 as CVE page is older than CVRF-CVE file.
skipping CVE-2017-14505 as CVE page is older than CVRF-CVE file.
skipping CVE-2017-14503 as CVE page is older than CVRF-CVE file.
skipping CVE-2017-14502 as CVE page is older than CVRF-CVE file.
skipping CVE-2017-14501 as CVE page is older than CVRF-CVE file.
skipping CVE-2017-14497 as CVE page is older than CVRF-CVE file.
no cpe found for SUSE Linux Enterprise Real Time 11 SP4 in CVE-2017-14489
skipping CVE-2017-14343 as CVE page is older than CVRF-CVE file.
skipping CVE-2017-14342 as CVE page is older than CVRF-CVE file.
skipping CVE-2017-14341 as CVE page is older than CVRF-CVE file.
skipping CVE-2017-14340 as CVE page is older than CVRF-CVE file.
skipping CVE-2017-14325 as CVE page is older than CVRF-CVE file.
skipping CVE-2017-14314 as CVE page is older than CVRF-CVE file.
skipping CVE-2017-14249 as CVE page is older than CVRF-CVE file.
skipping CVE-2017-14230 as CVE page is older than CVRF-CVE file.
skipping CVE-2017-14224 as CVE page is older than CVRF-CVE file.
skipping CVE-2017-14175 as CVE page is older than CVRF-CVE file.
skipping CVE-2017-14174 as CVE page is older than CVRF-CVE file.
skipping CVE-2017-14173 as CVE page is older than CVRF-CVE file.
skipping CVE-2017-14172 as CVE page is older than CVRF-CVE file.
skipping CVE-2017-14167 as CVE page is older than CVRF-CVE file.
skipping CVE-2017-14166 as CVE page is older than CVRF-CVE file.
skipping CVE-2017-14160 as CVE page is older than CVRF-CVE file.
skipping CVE-2017-14140 as CVE page is older than CVRF-CVE file.
skipping CVE-2017-14139 as CVE page is older than CVRF-CVE file.
skipping CVE-2017-14138 as CVE page is older than CVRF-CVE file.
skipping CVE-2017-14121 as CVE page is older than CVRF-CVE file.
skipping CVE-2017-14106 as CVE page is older than CVRF-CVE file.
skipping CVE-2017-14103 as CVE page is older than CVRF-CVE file.
skipping CVE-2017-14062 as CVE page is older than CVRF-CVE file.
skipping CVE-2017-14060 as CVE page is older than CVRF-CVE file.
skipping CVE-2017-14051 as CVE page is older than CVRF-CVE file.
skipping CVE-2017-14042 as CVE page is older than CVRF-CVE file.
skipping CVE-2017-13885 as CVE page is older than CVRF-CVE file.
skipping CVE-2017-13884 as CVE page is older than CVRF-CVE file.
skipping CVE-2017-13771 as CVE page is older than CVRF-CVE file.
skipping CVE-2017-13769 as CVE page is older than CVRF-CVE file.
skipping CVE-2017-13768 as CVE page is older than CVRF-CVE file.
skipping CVE-2017-13767 as CVE page is older than CVRF-CVE file.
skipping CVE-2017-13766 as CVE page is older than CVRF-CVE file.
skipping CVE-2017-13765 as CVE page is older than CVRF-CVE file.
skipping CVE-2017-13744 as CVE page is older than CVRF-CVE file.
skipping CVE-2017-13743 as CVE page is older than CVRF-CVE file.
skipping CVE-2017-13742 as CVE page is older than CVRF-CVE file.
skipping CVE-2017-13741 as CVE page is older than CVRF-CVE file.
skipping CVE-2017-13740 as CVE page is older than CVRF-CVE file.
skipping CVE-2017-13739 as CVE page is older than CVRF-CVE file.
skipping CVE-2017-13738 as CVE page is older than CVRF-CVE file.
skipping CVE-2017-13734 as CVE page is older than CVRF-CVE file.
skipping CVE-2017-13733 as CVE page is older than CVRF-CVE file.
skipping CVE-2017-13732 as CVE page is older than CVRF-CVE file.
skipping CVE-2017-13731 as CVE page is older than CVRF-CVE file.
skipping CVE-2017-13730 as CVE page is older than CVRF-CVE file.
skipping CVE-2017-13729 as CVE page is older than CVRF-CVE file.
skipping CVE-2017-13728 as CVE page is older than CVRF-CVE file.
skipping CVE-2017-13721 as CVE page is older than CVRF-CVE file.
skipping CVE-2017-13715 as CVE page is older than CVRF-CVE file.
skipping CVE-2017-13711 as CVE page is older than CVRF-CVE file.
skipping CVE-2017-13694 as CVE page is older than CVRF-CVE file.
skipping CVE-2017-13693 as CVE page is older than CVRF-CVE file.
skipping CVE-2017-13673 as CVE page is older than CVRF-CVE file.
no cpe found for SUSE Linux Enterprise Real Time 11 SP4 in CVE-2017-13305
no cpe found for SUSE Linux Enterprise Real Time 11 SP4 in CVE-2017-13215
no cpe found for SUSE Linux Enterprise Real Time 11 SP4 in CVE-2017-13167
skipping CVE-2017-13166 as CVE page is older than CVRF-CVE file.
skipping CVE-2017-13147 as CVE page is older than CVRF-CVE file.
skipping CVE-2017-13142 as CVE page is older than CVRF-CVE file.
skipping CVE-2017-13141 as CVE page is older than CVRF-CVE file.
skipping CVE-2017-13134 as CVE page is older than CVRF-CVE file.
skipping CVE-2017-13131 as CVE page is older than CVRF-CVE file.
skipping CVE-2017-13088 as CVE page is older than CVRF-CVE file.
skipping CVE-2017-13087 as CVE page is older than CVRF-CVE file.
skipping CVE-2017-13086 as CVE page is older than CVRF-CVE file.
skipping CVE-2017-13084 as CVE page is older than CVRF-CVE file.
skipping CVE-2017-13082 as CVE page is older than CVRF-CVE file.
skipping CVE-2017-13081 as CVE page is older than CVRF-CVE file.
skipping CVE-2017-13080 as CVE page is older than CVRF-CVE file.
skipping CVE-2017-13079 as CVE page is older than CVRF-CVE file.
skipping CVE-2017-13078 as CVE page is older than CVRF-CVE file.
skipping CVE-2017-13077 as CVE page is older than CVRF-CVE file.
skipping CVE-2017-13069 as CVE page is older than CVRF-CVE file.
skipping CVE-2017-13062 as CVE page is older than CVRF-CVE file.
skipping CVE-2017-13061 as CVE page is older than CVRF-CVE file.
skipping CVE-2017-13059 as CVE page is older than CVRF-CVE file.
skipping CVE-2017-12983 as CVE page is older than CVRF-CVE file.
skipping CVE-2017-12944 as CVE page is older than CVRF-CVE file.
skipping CVE-2017-12942 as CVE page is older than CVRF-CVE file.
skipping CVE-2017-12935 as CVE page is older than CVRF-CVE file.
no cpe found for SUSE Package Hub 15 SP1 in CVE-2017-12911
skipping CVE-2017-12883 as CVE page is older than CVRF-CVE file.
skipping CVE-2017-12880 as CVE page is older than CVRF-CVE file.
skipping CVE-2017-12837 as CVE page is older than CVRF-CVE file.
skipping CVE-2017-12836 as CVE page is older than CVRF-CVE file.
skipping CVE-2017-12814 as CVE page is older than CVRF-CVE file.
skipping CVE-2017-12806 as CVE page is older than CVRF-CVE file.
skipping CVE-2017-12805 as CVE page is older than CVRF-CVE file.
skipping CVE-2017-12791 as CVE page is older than CVRF-CVE file.
no cpe found for SUSE Linux Enterprise Real Time 11 SP4 in CVE-2017-12762
skipping CVE-2017-12693 as CVE page is older than CVRF-CVE file.
skipping CVE-2017-12692 as CVE page is older than CVRF-CVE file.
skipping CVE-2017-12691 as CVE page is older than CVRF-CVE file.
skipping CVE-2017-12676 as CVE page is older than CVRF-CVE file.
skipping CVE-2017-12674 as CVE page is older than CVRF-CVE file.
skipping CVE-2017-12673 as CVE page is older than CVRF-CVE file.
skipping CVE-2017-12671 as CVE page is older than CVRF-CVE file.
skipping CVE-2017-12669 as CVE page is older than CVRF-CVE file.
skipping CVE-2017-12668 as CVE page is older than CVRF-CVE file.
no cpe found for SUSE Liberty Linux 7 LTSS in CVE-2017-12652
skipping CVE-2017-12666 as CVE page is older than CVRF-CVE file.
skipping CVE-2017-12665 as CVE page is older than CVRF-CVE file.
skipping CVE-2017-12664 as CVE page is older than CVRF-CVE file.
skipping CVE-2017-12663 as CVE page is older than CVRF-CVE file.
skipping CVE-2017-12662 as CVE page is older than CVRF-CVE file.
skipping CVE-2017-12654 as CVE page is older than CVRF-CVE file.
skipping CVE-2017-12644 as CVE page is older than CVRF-CVE file.
skipping CVE-2017-12643 as CVE page is older than CVRF-CVE file.
skipping CVE-2017-12642 as CVE page is older than CVRF-CVE file.
skipping CVE-2017-12641 as CVE page is older than CVRF-CVE file.
skipping CVE-2017-12640 as CVE page is older than CVRF-CVE file.
skipping CVE-2017-12618 as CVE page is older than CVRF-CVE file.
skipping CVE-2017-12617 as CVE page is older than CVRF-CVE file.
skipping CVE-2017-12615 as CVE page is older than CVRF-CVE file.
skipping CVE-2017-12588 as CVE page is older than CVRF-CVE file.
skipping CVE-2017-12587 as CVE page is older than CVRF-CVE file.
skipping CVE-2017-12566 as CVE page is older than CVRF-CVE file.
skipping CVE-2017-12565 as CVE page is older than CVRF-CVE file.
skipping CVE-2017-12563 as CVE page is older than CVRF-CVE file.
no cpe found for SUSE Package Hub 15 in CVE-2017-12482
no cpe found for SUSE Package Hub 15 SP1 in CVE-2017-12482
no cpe found for SUSE Package Hub 15 in CVE-2017-12481
no cpe found for SUSE Package Hub 15 SP1 in CVE-2017-12481
skipping CVE-2017-12447 as CVE page is older than CVRF-CVE file.
skipping CVE-2017-12435 as CVE page is older than CVRF-CVE file.
skipping CVE-2017-12432 as CVE page is older than CVRF-CVE file.
skipping CVE-2017-12430 as CVE page is older than CVRF-CVE file.
skipping CVE-2017-12429 as CVE page is older than CVRF-CVE file.
skipping CVE-2017-12427 as CVE page is older than CVRF-CVE file.
skipping CVE-2017-12418 as CVE page is older than CVRF-CVE file.
no cpe found for SUSE Linux Enterprise Real Time 11 SP4 in CVE-2017-12190
skipping CVE-2017-12192 as CVE page is older than CVRF-CVE file.
skipping CVE-2017-12188 as CVE page is older than CVRF-CVE file.
skipping CVE-2017-12187 as CVE page is older than CVRF-CVE file.
skipping CVE-2017-12176 as CVE page is older than CVRF-CVE file.
skipping CVE-2017-12166 as CVE page is older than CVRF-CVE file.
skipping CVE-2017-12163 as CVE page is older than CVRF-CVE file.
skipping CVE-2017-12151 as CVE page is older than CVRF-CVE file.
skipping CVE-2017-12150 as CVE page is older than CVRF-CVE file.
skipping CVE-2017-12140 as CVE page is older than CVRF-CVE file.
skipping CVE-2017-11754 as CVE page is older than CVRF-CVE file.
no cpe found for SUSE Package Hub 15 SP5 in CVE-2017-11747
skipping CVE-2017-11752 as CVE page is older than CVRF-CVE file.
skipping CVE-2017-11751 as CVE page is older than CVRF-CVE file.
skipping CVE-2017-11750 as CVE page is older than CVRF-CVE file.
skipping CVE-2017-11642 as CVE page is older than CVRF-CVE file.
skipping CVE-2017-11640 as CVE page is older than CVRF-CVE file.
skipping CVE-2017-11639 as CVE page is older than CVRF-CVE file.
skipping CVE-2017-11638 as CVE page is older than CVRF-CVE file.
skipping CVE-2017-11613 as CVE page is older than CVRF-CVE file.
skipping CVE-2017-11600 as CVE page is older than CVRF-CVE file.
no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2017-11591
skipping CVE-2017-11548 as CVE page is older than CVRF-CVE file.
skipping CVE-2017-11539 as CVE page is older than CVRF-CVE file.
skipping CVE-2017-11537 as CVE page is older than CVRF-CVE file.
skipping CVE-2017-11535 as CVE page is older than CVRF-CVE file.
skipping CVE-2017-11533 as CVE page is older than CVRF-CVE file.
skipping CVE-2017-11532 as CVE page is older than CVRF-CVE file.
skipping CVE-2017-11531 as CVE page is older than CVRF-CVE file.
skipping CVE-2017-11530 as CVE page is older than CVRF-CVE file.
skipping CVE-2017-11528 as CVE page is older than CVRF-CVE file.
skipping CVE-2017-11526 as CVE page is older than CVRF-CVE file.
skipping CVE-2017-11525 as CVE page is older than CVRF-CVE file.
skipping CVE-2017-11524 as CVE page is older than CVRF-CVE file.
skipping CVE-2017-11523 as CVE page is older than CVRF-CVE file.
skipping CVE-2017-11505 as CVE page is older than CVRF-CVE file.
no cpe found for SUSE Package Hub 15 SP2 in CVE-2017-11468
skipping CVE-2017-11478 as CVE page is older than CVRF-CVE file.
skipping CVE-2017-11473 as CVE page is older than CVRF-CVE file.
skipping CVE-2017-11472 as CVE page is older than CVRF-CVE file.
skipping CVE-2017-11462 as CVE page is older than CVRF-CVE file.
skipping CVE-2017-11455 as CVE page is older than CVRF-CVE file.
skipping CVE-2017-11450 as CVE page is older than CVRF-CVE file.
skipping CVE-2017-11449 as CVE page is older than CVRF-CVE file.
skipping CVE-2017-11448 as CVE page is older than CVRF-CVE file.
skipping CVE-2017-11411 as CVE page is older than CVRF-CVE file.
skipping CVE-2017-11410 as CVE page is older than CVRF-CVE file.
skipping CVE-2017-11409 as CVE page is older than CVRF-CVE file.
skipping CVE-2017-11408 as CVE page is older than CVRF-CVE file.
skipping CVE-2017-11407 as CVE page is older than CVRF-CVE file.
skipping CVE-2017-11406 as CVE page is older than CVRF-CVE file.
skipping CVE-2017-11368 as CVE page is older than CVRF-CVE file.
skipping CVE-2017-11360 as CVE page is older than CVRF-CVE file.
skipping CVE-2017-11188 as CVE page is older than CVRF-CVE file.
skipping CVE-2017-11185 as CVE page is older than CVRF-CVE file.
skipping CVE-2017-11176 as CVE page is older than CVRF-CVE file.
skipping CVE-2017-11170 as CVE page is older than CVRF-CVE file.
skipping CVE-2017-11166 as CVE page is older than CVRF-CVE file.
no cpe found for SUSE Package Hub 15 SP1 in CVE-2017-11104
no cpe found for SUSE Package Hub 15 SP2 in CVE-2017-11104
skipping CVE-2017-11103 as CVE page is older than CVRF-CVE file.
skipping CVE-2017-10995 as CVE page is older than CVRF-CVE file.
skipping CVE-2017-10989 as CVE page is older than CVRF-CVE file.
skipping CVE-2017-10988 as CVE page is older than CVRF-CVE file.
skipping CVE-2017-10987 as CVE page is older than CVRF-CVE file.
skipping CVE-2017-10986 as CVE page is older than CVRF-CVE file.
skipping CVE-2017-10985 as CVE page is older than CVRF-CVE file.
skipping CVE-2017-10984 as CVE page is older than CVRF-CVE file.
skipping CVE-2017-10983 as CVE page is older than CVRF-CVE file.
skipping CVE-2017-10982 as CVE page is older than CVRF-CVE file.
skipping CVE-2017-10981 as CVE page is older than CVRF-CVE file.
skipping CVE-2017-10980 as CVE page is older than CVRF-CVE file.
skipping CVE-2017-10979 as CVE page is older than CVRF-CVE file.
skipping CVE-2017-10978 as CVE page is older than CVRF-CVE file.
skipping CVE-2017-10971 as CVE page is older than CVRF-CVE file.
skipping CVE-2017-10915 as CVE page is older than CVRF-CVE file.
skipping CVE-2017-10911 as CVE page is older than CVRF-CVE file.
skipping CVE-2017-10862 as CVE page is older than CVRF-CVE file.
skipping CVE-2017-10810 as CVE page is older than CVRF-CVE file.
skipping CVE-2017-10807 as CVE page is older than CVRF-CVE file.
skipping CVE-2017-10790 as CVE page is older than CVRF-CVE file.
skipping CVE-2017-10700 as CVE page is older than CVRF-CVE file.
skipping CVE-2017-10661 as CVE page is older than CVRF-CVE file.
skipping CVE-2017-10388 as CVE page is older than CVRF-CVE file.
skipping CVE-2017-10384 as CVE page is older than CVRF-CVE file.
skipping CVE-2017-10379 as CVE page is older than CVRF-CVE file.
skipping CVE-2017-10378 as CVE page is older than CVRF-CVE file.
skipping CVE-2017-10365 as CVE page is older than CVRF-CVE file.
skipping CVE-2017-10357 as CVE page is older than CVRF-CVE file.
skipping CVE-2017-10356 as CVE page is older than CVRF-CVE file.
skipping CVE-2017-10355 as CVE page is older than CVRF-CVE file.
skipping CVE-2017-10350 as CVE page is older than CVRF-CVE file.
skipping CVE-2017-10349 as CVE page is older than CVRF-CVE file.
skipping CVE-2017-10348 as CVE page is older than CVRF-CVE file.
skipping CVE-2017-10347 as CVE page is older than CVRF-CVE file.
skipping CVE-2017-10346 as CVE page is older than CVRF-CVE file.
skipping CVE-2017-10345 as CVE page is older than CVRF-CVE file.
skipping CVE-2017-10320 as CVE page is older than CVRF-CVE file.
skipping CVE-2017-10295 as CVE page is older than CVRF-CVE file.
skipping CVE-2017-10286 as CVE page is older than CVRF-CVE file.
skipping CVE-2017-10285 as CVE page is older than CVRF-CVE file.
skipping CVE-2017-10281 as CVE page is older than CVRF-CVE file.
skipping CVE-2017-10274 as CVE page is older than CVRF-CVE file.
skipping CVE-2017-10268 as CVE page is older than CVRF-CVE file.
skipping CVE-2017-10115 as CVE page is older than CVRF-CVE file.
skipping CVE-2017-9986 as CVE page is older than CVRF-CVE file.
skipping CVE-2017-9985 as CVE page is older than CVRF-CVE file.
skipping CVE-2017-9984 as CVE page is older than CVRF-CVE file.
no cpe found for SUSE Studio Onsite Runner 1.3 in CVE-2017-9951
skipping CVE-2017-9936 as CVE page is older than CVRF-CVE file.
skipping CVE-2017-9935 as CVE page is older than CVRF-CVE file.
skipping CVE-2017-9865 as CVE page is older than CVRF-CVE file.
skipping CVE-2017-9832 as CVE page is older than CVRF-CVE file.
skipping CVE-2017-9831 as CVE page is older than CVRF-CVE file.
skipping CVE-2017-9814 as CVE page is older than CVRF-CVE file.
skipping CVE-2017-9798 as CVE page is older than CVRF-CVE file.
skipping CVE-2017-9776 as CVE page is older than CVRF-CVE file.
skipping CVE-2017-9775 as CVE page is older than CVRF-CVE file.
skipping CVE-2017-9766 as CVE page is older than CVRF-CVE file.
skipping CVE-2017-9617 as CVE page is older than CVRF-CVE file.
skipping CVE-2017-9614 as CVE page is older than CVRF-CVE file.
skipping CVE-2017-9524 as CVE page is older than CVRF-CVE file.
skipping CVE-2017-9500 as CVE page is older than CVRF-CVE file.
skipping CVE-2017-9445 as CVE page is older than CVRF-CVE file.
skipping CVE-2017-9409 as CVE page is older than CVRF-CVE file.
skipping CVE-2017-9408 as CVE page is older than CVRF-CVE file.
skipping CVE-2017-9407 as CVE page is older than CVRF-CVE file.
skipping CVE-2017-9406 as CVE page is older than CVRF-CVE file.
skipping CVE-2017-9405 as CVE page is older than CVRF-CVE file.
skipping CVE-2017-9404 as CVE page is older than CVRF-CVE file.
skipping CVE-2017-9403 as CVE page is older than CVRF-CVE file.
no cpe found for SUSE Linux Enterprise Installer Updates 15 SP1 in CVE-2017-9271
no cpe found for SUSE Linux Enterprise Installer Updates 15 SP2 in CVE-2017-9271
no cpe found for SUSE Linux Enterprise Installer Updates 15 in CVE-2017-9271
no cpe found for SUSE Linux Enterprise Installer Updates 15 SP1 in CVE-2017-9271
no cpe found for SUSE Linux Enterprise Installer Updates 15 SP2 in CVE-2017-9271
no cpe found for SUSE Linux Enterprise Installer Updates 15 in CVE-2017-9271
no cpe found for SUSE Linux Enterprise Installer Updates 15 SP1 in CVE-2017-9271
no cpe found for SUSE Linux Enterprise Installer Updates 15 SP2 in CVE-2017-9271
no cpe found for SUSE Linux Enterprise Installer Updates 15 in CVE-2017-9271
no cpe found for SUSE Linux Enterprise Installer Updates 15 SP1 in CVE-2017-9271
no cpe found for SUSE Linux Enterprise Installer Updates 15 SP2 in CVE-2017-9271
no cpe found for SUSE Linux Enterprise Installer Updates 15 in CVE-2017-9271
no cpe found for SUSE Linux Enterprise Installer Updates 15 SP1 in CVE-2017-9271
no cpe found for SUSE Linux Enterprise Installer Updates 15 SP2 in CVE-2017-9271
no cpe found for SUSE Linux Enterprise Installer Updates 15 SP1 in CVE-2017-9271
no cpe found for SUSE Linux Enterprise Installer Updates 15 SP2 in CVE-2017-9271
no cpe found for SUSE Linux Enterprise Installer Updates 15 SP1 in CVE-2017-9271
no cpe found for SUSE Linux Enterprise Installer Updates 15 SP2 in CVE-2017-9271
no cpe found for SUSE Linux Enterprise Installer Updates 15 SP1 in CVE-2017-9271
no cpe found for SUSE Linux Enterprise Installer Updates 15 SP2 in CVE-2017-9271
skipping CVE-2017-9269 as CVE page is older than CVRF-CVE file.
skipping CVE-2017-9262 as CVE page is older than CVRF-CVE file.
skipping CVE-2017-9261 as CVE page is older than CVRF-CVE file.
skipping CVE-2017-9242 as CVE page is older than CVRF-CVE file.
skipping CVE-2017-9227 as CVE page is older than CVRF-CVE file.
skipping CVE-2017-9224 as CVE page is older than CVRF-CVE file.
no cpe found for SUSE Package Hub 15 SP3 in CVE-2017-9190
no cpe found for SUSE Package Hub 15 SP3 in CVE-2017-9182
skipping CVE-2017-9150 as CVE page is older than CVRF-CVE file.
skipping CVE-2017-9128 as CVE page is older than CVRF-CVE file.
skipping CVE-2017-9127 as CVE page is older than CVRF-CVE file.
skipping CVE-2017-9126 as CVE page is older than CVRF-CVE file.
skipping CVE-2017-9125 as CVE page is older than CVRF-CVE file.
skipping CVE-2017-9124 as CVE page is older than CVRF-CVE file.
skipping CVE-2017-9123 as CVE page is older than CVRF-CVE file.
skipping CVE-2017-9122 as CVE page is older than CVRF-CVE file.
skipping CVE-2017-9083 as CVE page is older than CVRF-CVE file.
skipping CVE-2017-9077 as CVE page is older than CVRF-CVE file.
skipping CVE-2017-9076 as CVE page is older than CVRF-CVE file.
skipping CVE-2017-9075 as CVE page is older than CVRF-CVE file.
skipping CVE-2017-9074 as CVE page is older than CVRF-CVE file.
skipping CVE-2017-9023 as CVE page is older than CVRF-CVE file.
skipping CVE-2017-9022 as CVE page is older than CVRF-CVE file.
no cpe found for SUSE Package Hub 15 SP3 in CVE-2017-8934
no cpe found for SUSE Linux Enterprise Real Time 11 SP4 in CVE-2017-8924
skipping CVE-2017-8925 as CVE page is older than CVRF-CVE file.
skipping CVE-2017-8890 as CVE page is older than CVRF-CVE file.
skipping CVE-2017-8872 as CVE page is older than CVRF-CVE file.
skipping CVE-2017-8831 as CVE page is older than CVRF-CVE file.
skipping CVE-2017-8824 as CVE page is older than CVRF-CVE file.
skipping CVE-2017-8816 as CVE page is older than CVRF-CVE file.
skipping CVE-2017-8813 as CVE page is older than CVRF-CVE file.
skipping CVE-2017-8797 as CVE page is older than CVRF-CVE file.
skipping CVE-2017-8786 as CVE page is older than CVRF-CVE file.
no cpe found for HPE Helion OpenStack Cloud 8 in CVE-2017-8761
no cpe found for HPE Helion OpenStack Cloud 8 in CVE-2017-8452
skipping CVE-2017-8386 as CVE page is older than CVRF-CVE file.
skipping CVE-2017-8380 as CVE page is older than CVRF-CVE file.
skipping CVE-2017-8379 as CVE page is older than CVRF-CVE file.
no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2017-8373
no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2017-8372
skipping CVE-2017-8284 as CVE page is older than CVRF-CVE file.
skipping CVE-2017-8106 as CVE page is older than CVRF-CVE file.
skipping CVE-2017-7982 as CVE page is older than CVRF-CVE file.
skipping CVE-2017-7957 as CVE page is older than CVRF-CVE file.
skipping CVE-2017-7889 as CVE page is older than CVRF-CVE file.
skipping CVE-2017-7874 as CVE page is older than CVRF-CVE file.
skipping CVE-2017-7843 as CVE page is older than CVRF-CVE file.
no cpe found for SUSE Liberty Linux 7 LTSS in CVE-2017-7778
no cpe found for SUSE Liberty Linux 7 LTSS in CVE-2017-7777
no cpe found for SUSE Liberty Linux 7 LTSS in CVE-2017-7776
no cpe found for SUSE Liberty Linux 7 LTSS in CVE-2017-7775
no cpe found for SUSE Liberty Linux 7 LTSS in CVE-2017-7774
no cpe found for SUSE Liberty Linux 7 LTSS in CVE-2017-7773
no cpe found for SUSE Liberty Linux 7 LTSS in CVE-2017-7772
no cpe found for SUSE Liberty Linux 7 LTSS in CVE-2017-7771
skipping CVE-2017-7645 as CVE page is older than CVRF-CVE file.
skipping CVE-2017-7618 as CVE page is older than CVRF-CVE file.
skipping CVE-2017-7616 as CVE page is older than CVRF-CVE file.
skipping CVE-2017-7613 as CVE page is older than CVRF-CVE file.
skipping CVE-2017-7612 as CVE page is older than CVRF-CVE file.
skipping CVE-2017-7611 as CVE page is older than CVRF-CVE file.
skipping CVE-2017-7610 as CVE page is older than CVRF-CVE file.
skipping CVE-2017-7608 as CVE page is older than CVRF-CVE file.
skipping CVE-2017-7607 as CVE page is older than CVRF-CVE file.
skipping CVE-2017-7602 as CVE page is older than CVRF-CVE file.
skipping CVE-2017-7601 as CVE page is older than CVRF-CVE file.
skipping CVE-2017-7600 as CVE page is older than CVRF-CVE file.
skipping CVE-2017-7599 as CVE page is older than CVRF-CVE file.
skipping CVE-2017-7598 as CVE page is older than CVRF-CVE file.
skipping CVE-2017-7597 as CVE page is older than CVRF-CVE file.
skipping CVE-2017-7596 as CVE page is older than CVRF-CVE file.
skipping CVE-2017-7595 as CVE page is older than CVRF-CVE file.
skipping CVE-2017-7594 as CVE page is older than CVRF-CVE file.
skipping CVE-2017-7593 as CVE page is older than CVRF-CVE file.
skipping CVE-2017-7592 as CVE page is older than CVRF-CVE file.
skipping CVE-2017-7586 as CVE page is older than CVRF-CVE file.
skipping CVE-2017-7562 as CVE page is older than CVRF-CVE file.
no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2017-7557
skipping CVE-2017-7555 as CVE page is older than CVRF-CVE file.
CVE-2017-7550: no packages for SUSE Manager Tools for SLE Micro 5, but entry?
CVE-2017-7550: no packages for SUSE Linux Enterprise Module for Package Hub 15 SP5, but entry?
CVE-2017-7550: no packages for SUSE Manager Tools Beta for SLE Micro 5, but entry?
CVE-2017-7550: no packages for SUSE Linux Enterprise Module for Package Hub 15 SP5, but entry?
CVE-2017-7550: no packages for SUSE Manager Tools Beta for SLE Micro 5, but entry?
CVE-2017-7550: no packages for SUSE Manager Tools for SLE Micro 5, but entry?
CVE-2017-7550: no packages for SUSE Linux Enterprise Module for Package Hub 15 SP5, but entry?
CVE-2017-7550: no packages for SUSE Manager Tools Beta for SLE Micro 5, but entry?
CVE-2017-7550: no packages for SUSE Manager Tools for SLE Micro 5, but entry?
skipping CVE-2017-7542 as CVE page is older than CVRF-CVE file.
skipping CVE-2017-7541 as CVE page is older than CVRF-CVE file.
skipping CVE-2017-7538 as CVE page is older than CVRF-CVE file.
skipping CVE-2017-7533 as CVE page is older than CVRF-CVE file.
skipping CVE-2017-7526 as CVE page is older than CVRF-CVE file.
skipping CVE-2017-7522 as CVE page is older than CVRF-CVE file.
skipping CVE-2017-7521 as CVE page is older than CVRF-CVE file.
skipping CVE-2017-7520 as CVE page is older than CVRF-CVE file.
skipping CVE-2017-7518 as CVE page is older than CVRF-CVE file.
skipping CVE-2017-7511 as CVE page is older than CVRF-CVE file.
skipping CVE-2017-7508 as CVE page is older than CVRF-CVE file.
skipping CVE-2017-7495 as CVE page is older than CVRF-CVE file.
skipping CVE-2017-7494 as CVE page is older than CVRF-CVE file.
skipping CVE-2017-7493 as CVE page is older than CVRF-CVE file.
no cpe found for SUSE Liberty Linux 7 LTSS in CVE-2017-7488
skipping CVE-2017-7487 as CVE page is older than CVRF-CVE file.
no cpe found for SUSE Package Hub 15 in CVE-2017-7481
skipping CVE-2017-7482 as CVE page is older than CVRF-CVE file.
skipping CVE-2017-7479 as CVE page is older than CVRF-CVE file.
skipping CVE-2017-7478 as CVE page is older than CVRF-CVE file.
skipping CVE-2017-7475 as CVE page is older than CVRF-CVE file.
skipping CVE-2017-7472 as CVE page is older than CVRF-CVE file.
skipping CVE-2017-7471 as CVE page is older than CVRF-CVE file.
skipping CVE-2017-7470 as CVE page is older than CVRF-CVE file.
no cpe found for SUSE Package Hub 15 in CVE-2017-7466
skipping CVE-2017-7436 as CVE page is older than CVRF-CVE file.
skipping CVE-2017-7435 as CVE page is older than CVRF-CVE file.
no cpe found for SUSE Package Hub 15 in CVE-2017-7418
no cpe found for SUSE Package Hub 15 SP1 in CVE-2017-7418
skipping CVE-2017-7374 as CVE page is older than CVRF-CVE file.
skipping CVE-2017-7346 as CVE page is older than CVRF-CVE file.
skipping CVE-2017-7308 as CVE page is older than CVRF-CVE file.
skipping CVE-2017-7294 as CVE page is older than CVRF-CVE file.
skipping CVE-2017-7273 as CVE page is older than CVRF-CVE file.
skipping CVE-2017-7261 as CVE page is older than CVRF-CVE file.
skipping CVE-2017-7187 as CVE page is older than CVRF-CVE file.
skipping CVE-2017-7184 as CVE page is older than CVRF-CVE file.
skipping CVE-2017-7165 as CVE page is older than CVRF-CVE file.
skipping CVE-2017-7161 as CVE page is older than CVRF-CVE file.
skipping CVE-2017-7160 as CVE page is older than CVRF-CVE file.
skipping CVE-2017-7153 as CVE page is older than CVRF-CVE file.
skipping CVE-2017-6951 as CVE page is older than CVRF-CVE file.
skipping CVE-2017-6888 as CVE page is older than CVRF-CVE file.
skipping CVE-2017-6874 as CVE page is older than CVRF-CVE file.
skipping CVE-2017-6852 as CVE page is older than CVRF-CVE file.
skipping CVE-2017-6839 as CVE page is older than CVRF-CVE file.
skipping CVE-2017-6838 as CVE page is older than CVRF-CVE file.
skipping CVE-2017-6837 as CVE page is older than CVRF-CVE file.
skipping CVE-2017-6836 as CVE page is older than CVRF-CVE file.
skipping CVE-2017-6835 as CVE page is older than CVRF-CVE file.
skipping CVE-2017-6834 as CVE page is older than CVRF-CVE file.
skipping CVE-2017-6833 as CVE page is older than CVRF-CVE file.
skipping CVE-2017-6832 as CVE page is older than CVRF-CVE file.
skipping CVE-2017-6831 as CVE page is older than CVRF-CVE file.
skipping CVE-2017-6830 as CVE page is older than CVRF-CVE file.
skipping CVE-2017-6829 as CVE page is older than CVRF-CVE file.
skipping CVE-2017-6828 as CVE page is older than CVRF-CVE file.
skipping CVE-2017-6827 as CVE page is older than CVRF-CVE file.
skipping CVE-2017-6590 as CVE page is older than CVRF-CVE file.
no cpe found for SUSE Liberty Linux 7 LTSS in CVE-2017-6519
no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2017-6512
skipping CVE-2017-6507 as CVE page is older than CVRF-CVE file.
skipping CVE-2017-6468 as CVE page is older than CVRF-CVE file.
skipping CVE-2017-6467 as CVE page is older than CVRF-CVE file.
skipping CVE-2017-6464 as CVE page is older than CVRF-CVE file.
skipping CVE-2017-6463 as CVE page is older than CVRF-CVE file.
skipping CVE-2017-6462 as CVE page is older than CVRF-CVE file.
skipping CVE-2017-6460 as CVE page is older than CVRF-CVE file.
skipping CVE-2017-6458 as CVE page is older than CVRF-CVE file.
skipping CVE-2017-6451 as CVE page is older than CVRF-CVE file.
skipping CVE-2017-6440 as CVE page is older than CVRF-CVE file.
skipping CVE-2017-6353 as CVE page is older than CVRF-CVE file.
skipping CVE-2017-6348 as CVE page is older than CVRF-CVE file.
skipping CVE-2017-6347 as CVE page is older than CVRF-CVE file.
skipping CVE-2017-6346 as CVE page is older than CVRF-CVE file.
skipping CVE-2017-6345 as CVE page is older than CVRF-CVE file.
skipping CVE-2017-6214 as CVE page is older than CVRF-CVE file.
skipping CVE-2017-6074 as CVE page is older than CVRF-CVE file.
skipping CVE-2017-6058 as CVE page is older than CVRF-CVE file.
no cpe found for SUSE Liberty Linux 7 LTSS in CVE-2017-6011
no cpe found for SUSE Liberty Linux 7 LTSS in CVE-2017-6010
no cpe found for SUSE Liberty Linux 7 LTSS in CVE-2017-6009
skipping CVE-2017-6001 as CVE page is older than CVRF-CVE file.
no cpe found for SUSE Linux Enterprise Real Time 11 SP4 in CVE-2017-5986
skipping CVE-2017-5972 as CVE page is older than CVRF-CVE file.
skipping CVE-2017-5970 as CVE page is older than CVRF-CVE file.
skipping CVE-2017-5967 as CVE page is older than CVRF-CVE file.
skipping CVE-2017-5950 as CVE page is older than CVRF-CVE file.
no cpe found for SUSE Package Hub 15 in CVE-2017-5934
skipping CVE-2017-5932 as CVE page is older than CVRF-CVE file.
skipping CVE-2017-5897 as CVE page is older than CVRF-CVE file.
skipping CVE-2017-5857 as CVE page is older than CVRF-CVE file.
no cpe found for SUSE Liberty Linux 7 LTSS in CVE-2017-5848
no cpe found for SUSE Liberty Linux 7 LTSS in CVE-2017-5845
no cpe found for SUSE Liberty Linux 7 LTSS in CVE-2017-5843
skipping CVE-2017-5844 as CVE page is older than CVRF-CVE file.
no cpe found for SUSE Liberty Linux 7 LTSS in CVE-2017-5841
skipping CVE-2017-5842 as CVE page is older than CVRF-CVE file.
no cpe found for SUSE Liberty Linux 7 LTSS in CVE-2017-5840
no cpe found for SUSE Linux Enterprise Real Time 11 SP4 in CVE-2017-5754
skipping CVE-2017-5839 as CVE page is older than CVRF-CVE file.
skipping CVE-2017-5838 as CVE page is older than CVRF-CVE file.
skipping CVE-2017-5837 as CVE page is older than CVRF-CVE file.
skipping CVE-2017-5836 as CVE page is older than CVRF-CVE file.
skipping CVE-2017-5835 as CVE page is older than CVRF-CVE file.
skipping CVE-2017-5834 as CVE page is older than CVRF-CVE file.
skipping CVE-2017-5753 as CVE page is older than CVRF-CVE file.
no cpe found for SUSE Liberty Linux 7 LTSS in CVE-2017-5735
no cpe found for SUSE Liberty Linux 7 LTSS in CVE-2017-5734
no cpe found for SUSE Liberty Linux 7 LTSS in CVE-2017-5733
no cpe found for SUSE Liberty Linux 7 LTSS in CVE-2017-5732
no cpe found for SUSE Liberty Linux 7 LTSS in CVE-2017-5731
skipping CVE-2017-5715 as CVE page is older than CVRF-CVE file.
skipping CVE-2017-5669 as CVE page is older than CVRF-CVE file.
skipping CVE-2017-5664 as CVE page is older than CVRF-CVE file.
skipping CVE-2017-5648 as CVE page is older than CVRF-CVE file.
skipping CVE-2017-5647 as CVE page is older than CVRF-CVE file.
skipping CVE-2017-5601 as CVE page is older than CVRF-CVE file.
skipping CVE-2017-5578 as CVE page is older than CVRF-CVE file.
skipping CVE-2017-5577 as CVE page is older than CVRF-CVE file.
skipping CVE-2017-5576 as CVE page is older than CVRF-CVE file.
skipping CVE-2017-5552 as CVE page is older than CVRF-CVE file.
skipping CVE-2017-5551 as CVE page is older than CVRF-CVE file.
skipping CVE-2017-5549 as CVE page is older than CVRF-CVE file.
skipping CVE-2017-5545 as CVE page is older than CVRF-CVE file.
skipping CVE-2017-5525 as CVE page is older than CVRF-CVE file.
no cpe found for SUSE Liberty Linux 7 LTSS in CVE-2017-5333
no cpe found for SUSE Liberty Linux 7 LTSS in CVE-2017-5332
skipping CVE-2017-5225 as CVE page is older than CVRF-CVE file.
no cpe found for SUSE Liberty Linux 7 LTSS in CVE-2017-5208
skipping CVE-2017-5209 as CVE page is older than CVRF-CVE file.
skipping CVE-2017-5029 as CVE page is older than CVRF-CVE file.
no cpe found for HPE Helion OpenStack Cloud 8 in CVE-2017-4967
no cpe found for HPE Helion OpenStack Cloud 8 in CVE-2017-4965
skipping CVE-2017-3738 as CVE page is older than CVRF-CVE file.
skipping CVE-2017-3737 as CVE page is older than CVRF-CVE file.
skipping CVE-2017-3736 as CVE page is older than CVRF-CVE file.
skipping CVE-2017-3735 as CVE page is older than CVRF-CVE file.
skipping CVE-2017-3732 as CVE page is older than CVRF-CVE file.
skipping CVE-2017-3731 as CVE page is older than CVRF-CVE file.
skipping CVE-2017-3653 as CVE page is older than CVRF-CVE file.
skipping CVE-2017-3652 as CVE page is older than CVRF-CVE file.
skipping CVE-2017-3651 as CVE page is older than CVRF-CVE file.
skipping CVE-2017-3650 as CVE page is older than CVRF-CVE file.
skipping CVE-2017-3649 as CVE page is older than CVRF-CVE file.
skipping CVE-2017-3648 as CVE page is older than CVRF-CVE file.
skipping CVE-2017-3647 as CVE page is older than CVRF-CVE file.
skipping CVE-2017-3646 as CVE page is older than CVRF-CVE file.
skipping CVE-2017-3645 as CVE page is older than CVRF-CVE file.
skipping CVE-2017-3644 as CVE page is older than CVRF-CVE file.
skipping CVE-2017-3643 as CVE page is older than CVRF-CVE file.
skipping CVE-2017-3642 as CVE page is older than CVRF-CVE file.
skipping CVE-2017-3641 as CVE page is older than CVRF-CVE file.
skipping CVE-2017-3640 as CVE page is older than CVRF-CVE file.
skipping CVE-2017-3639 as CVE page is older than CVRF-CVE file.
skipping CVE-2017-3638 as CVE page is older than CVRF-CVE file.
skipping CVE-2017-3637 as CVE page is older than CVRF-CVE file.
skipping CVE-2017-3636 as CVE page is older than CVRF-CVE file.
skipping CVE-2017-3634 as CVE page is older than CVRF-CVE file.
skipping CVE-2017-3633 as CVE page is older than CVRF-CVE file.
skipping CVE-2017-3617 as CVE page is older than CVRF-CVE file.
skipping CVE-2017-3616 as CVE page is older than CVRF-CVE file.
skipping CVE-2017-3615 as CVE page is older than CVRF-CVE file.
skipping CVE-2017-3614 as CVE page is older than CVRF-CVE file.
skipping CVE-2017-3613 as CVE page is older than CVRF-CVE file.
skipping CVE-2017-3612 as CVE page is older than CVRF-CVE file.
skipping CVE-2017-3611 as CVE page is older than CVRF-CVE file.
skipping CVE-2017-3610 as CVE page is older than CVRF-CVE file.
skipping CVE-2017-3609 as CVE page is older than CVRF-CVE file.
skipping CVE-2017-3608 as CVE page is older than CVRF-CVE file.
skipping CVE-2017-3607 as CVE page is older than CVRF-CVE file.
skipping CVE-2017-3606 as CVE page is older than CVRF-CVE file.
skipping CVE-2017-3605 as CVE page is older than CVRF-CVE file.
skipping CVE-2017-3604 as CVE page is older than CVRF-CVE file.
skipping CVE-2017-3600 as CVE page is older than CVRF-CVE file.
skipping CVE-2017-3599 as CVE page is older than CVRF-CVE file.
skipping CVE-2017-3529 as CVE page is older than CVRF-CVE file.
skipping CVE-2017-3467 as CVE page is older than CVRF-CVE file.
skipping CVE-2017-3465 as CVE page is older than CVRF-CVE file.
skipping CVE-2017-3464 as CVE page is older than CVRF-CVE file.
skipping CVE-2017-3463 as CVE page is older than CVRF-CVE file.
skipping CVE-2017-3462 as CVE page is older than CVRF-CVE file.
skipping CVE-2017-3461 as CVE page is older than CVRF-CVE file.
skipping CVE-2017-3460 as CVE page is older than CVRF-CVE file.
skipping CVE-2017-3459 as CVE page is older than CVRF-CVE file.
skipping CVE-2017-3458 as CVE page is older than CVRF-CVE file.
skipping CVE-2017-3457 as CVE page is older than CVRF-CVE file.
skipping CVE-2017-3456 as CVE page is older than CVRF-CVE file.
skipping CVE-2017-3454 as CVE page is older than CVRF-CVE file.
skipping CVE-2017-3453 as CVE page is older than CVRF-CVE file.
skipping CVE-2017-3452 as CVE page is older than CVRF-CVE file.
skipping CVE-2017-3450 as CVE page is older than CVRF-CVE file.
skipping CVE-2017-3331 as CVE page is older than CVRF-CVE file.
skipping CVE-2017-3329 as CVE page is older than CVRF-CVE file.
skipping CVE-2017-3320 as CVE page is older than CVRF-CVE file.
skipping CVE-2017-3319 as CVE page is older than CVRF-CVE file.
skipping CVE-2017-3318 as CVE page is older than CVRF-CVE file.
skipping CVE-2017-3317 as CVE page is older than CVRF-CVE file.
skipping CVE-2017-3313 as CVE page is older than CVRF-CVE file.
skipping CVE-2017-3312 as CVE page is older than CVRF-CVE file.
skipping CVE-2017-3309 as CVE page is older than CVRF-CVE file.
skipping CVE-2017-3308 as CVE page is older than CVRF-CVE file.
skipping CVE-2017-3305 as CVE page is older than CVRF-CVE file.
skipping CVE-2017-3302 as CVE page is older than CVRF-CVE file.
skipping CVE-2017-3291 as CVE page is older than CVRF-CVE file.
skipping CVE-2017-3289 as CVE page is older than CVRF-CVE file.
skipping CVE-2017-3273 as CVE page is older than CVRF-CVE file.
skipping CVE-2017-3272 as CVE page is older than CVRF-CVE file.
skipping CVE-2017-3265 as CVE page is older than CVRF-CVE file.
skipping CVE-2017-3262 as CVE page is older than CVRF-CVE file.
skipping CVE-2017-3261 as CVE page is older than CVRF-CVE file.
skipping CVE-2017-3260 as CVE page is older than CVRF-CVE file.
skipping CVE-2017-3259 as CVE page is older than CVRF-CVE file.
skipping CVE-2017-3258 as CVE page is older than CVRF-CVE file.
skipping CVE-2017-3257 as CVE page is older than CVRF-CVE file.
skipping CVE-2017-3256 as CVE page is older than CVRF-CVE file.
skipping CVE-2017-3253 as CVE page is older than CVRF-CVE file.
skipping CVE-2017-3252 as CVE page is older than CVRF-CVE file.
skipping CVE-2017-3251 as CVE page is older than CVRF-CVE file.
skipping CVE-2017-3244 as CVE page is older than CVRF-CVE file.
skipping CVE-2017-3243 as CVE page is older than CVRF-CVE file.
skipping CVE-2017-3241 as CVE page is older than CVRF-CVE file.
skipping CVE-2017-3238 as CVE page is older than CVRF-CVE file.
skipping CVE-2017-3231 as CVE page is older than CVRF-CVE file.
skipping CVE-2017-3145 as CVE page is older than CVRF-CVE file.
skipping CVE-2017-3143 as CVE page is older than CVRF-CVE file.
skipping CVE-2017-3142 as CVE page is older than CVRF-CVE file.
skipping CVE-2017-3141 as CVE page is older than CVRF-CVE file.
skipping CVE-2017-3140 as CVE page is older than CVRF-CVE file.
skipping CVE-2017-3139 as CVE page is older than CVRF-CVE file.
skipping CVE-2017-3138 as CVE page is older than CVRF-CVE file.
skipping CVE-2017-3137 as CVE page is older than CVRF-CVE file.
skipping CVE-2017-3136 as CVE page is older than CVRF-CVE file.
skipping CVE-2017-3135 as CVE page is older than CVRF-CVE file.
no cpe found for SUSE Package Hub 15 in CVE-2017-2808
no cpe found for SUSE Package Hub 15 SP1 in CVE-2017-2808
no cpe found for SUSE Package Hub 15 in CVE-2017-2807
no cpe found for SUSE Package Hub 15 SP1 in CVE-2017-2807
skipping CVE-2017-2671 as CVE page is older than CVRF-CVE file.
skipping CVE-2017-2647 as CVE page is older than CVRF-CVE file.
skipping CVE-2017-2636 as CVE page is older than CVRF-CVE file.
skipping CVE-2017-2635 as CVE page is older than CVRF-CVE file.
skipping CVE-2017-2630 as CVE page is older than CVRF-CVE file.
skipping CVE-2017-2629 as CVE page is older than CVRF-CVE file.
no cpe found for SUSE Liberty Linux 7 LTSS in CVE-2017-2626
no cpe found for SUSE Liberty Linux 7 LTSS in CVE-2017-2625
skipping CVE-2017-2619 as CVE page is older than CVRF-CVE file.
skipping CVE-2017-2596 as CVE page is older than CVRF-CVE file.
skipping CVE-2017-2584 as CVE page is older than CVRF-CVE file.
skipping CVE-2017-2583 as CVE page is older than CVRF-CVE file.
skipping CVE-2017-2538 as CVE page is older than CVRF-CVE file.
No V5 entry found for CVE-2017-1809 / /home/securitybot/prod/cve-database/cvelistV5/cves/2017/1xxxx/CVE-2017-1809.json:No such file or directory
skipping CVE-2017-1376 as CVE page is older than CVRF-CVE file.
skipping CVE-2017-0861 as CVE page is older than CVRF-CVE file.
skipping CVE-2017-0663 as CVE page is older than CVRF-CVE file.
no cpe found for SUSE Liberty Linux 7 LTSS in CVE-2017-0553
no cpe found for SUSE Liberty Linux 7 LTSS in CVE-2017-0393
skipping CVE-2017-0386 as CVE page is older than CVRF-CVE file.
no entry found for CVE-2016-1000212 / /home/securitybot/prod/cve-database/cvelist/2016/1000xxxx/CVE-2016-1000212.json:No such file or directory
No V5 entry found for CVE-2016-1000212 / /home/securitybot/prod/cve-database/cvelistV5/cves/2016/1000xxxx/CVE-2016-1000212.json:No such file or directory
skipping CVE-2016-1000110 as CVE page is older than CVRF-CVE file.
skipping CVE-2016-20022 as CVE page is older than CVRF-CVE file.
skipping CVE-2016-20013 as CVE page is older than CVRF-CVE file.
no cpe found for SUSE Package Hub 15 SP1 in CVE-2016-10937
skipping CVE-2016-10905 as CVE page is older than CVRF-CVE file.
skipping CVE-2016-10741 as CVE page is older than CVRF-CVE file.
no cpe found for HPE Helion OpenStack Cloud 8 in CVE-2016-10516
skipping CVE-2016-10371 as CVE page is older than CVRF-CVE file.
no cpe found for SUSE Linux Enterprise Real Time 11 SP4 in CVE-2016-10277
skipping CVE-2016-10272 as CVE page is older than CVRF-CVE file.
skipping CVE-2016-10271 as CVE page is older than CVRF-CVE file.
skipping CVE-2016-10270 as CVE page is older than CVRF-CVE file.
skipping CVE-2016-10269 as CVE page is older than CVRF-CVE file.
skipping CVE-2016-10268 as CVE page is older than CVRF-CVE file.
skipping CVE-2016-10267 as CVE page is older than CVRF-CVE file.
skipping CVE-2016-10266 as CVE page is older than CVRF-CVE file.
skipping CVE-2016-10255 as CVE page is older than CVRF-CVE file.
skipping CVE-2016-10254 as CVE page is older than CVRF-CVE file.
no cpe found for SUSE Liberty Linux 7 LTSS in CVE-2016-10245
skipping CVE-2016-10229 as CVE page is older than CVRF-CVE file.
skipping CVE-2016-10228 as CVE page is older than CVRF-CVE file.
skipping CVE-2016-10218 as CVE page is older than CVRF-CVE file.
skipping CVE-2016-10208 as CVE page is older than CVRF-CVE file.
no cpe found for SUSE Liberty Linux 7 LTSS in CVE-2016-10199
skipping CVE-2016-10200 as CVE page is older than CVRF-CVE file.
no cpe found for SUSE Liberty Linux 7 LTSS in CVE-2016-10198
skipping CVE-2016-10197 as CVE page is older than CVRF-CVE file.
skipping CVE-2016-10195 as CVE page is older than CVRF-CVE file.
skipping CVE-2016-10172 as CVE page is older than CVRF-CVE file.
skipping CVE-2016-10171 as CVE page is older than CVRF-CVE file.
skipping CVE-2016-10170 as CVE page is older than CVRF-CVE file.
skipping CVE-2016-10169 as CVE page is older than CVRF-CVE file.
no cpe found for SUSE Liberty Linux 7 LTSS in CVE-2016-10164
skipping CVE-2016-10156 as CVE page is older than CVRF-CVE file.
skipping CVE-2016-10147 as CVE page is older than CVRF-CVE file.
skipping CVE-2016-10095 as CVE page is older than CVRF-CVE file.
skipping CVE-2016-10094 as CVE page is older than CVRF-CVE file.
skipping CVE-2016-10093 as CVE page is older than CVRF-CVE file.
skipping CVE-2016-10092 as CVE page is older than CVRF-CVE file.
skipping CVE-2016-10088 as CVE page is older than CVRF-CVE file.
skipping CVE-2016-10044 as CVE page is older than CVRF-CVE file.
skipping CVE-2016-10028 as CVE page is older than CVRF-CVE file.
skipping CVE-2016-10012 as CVE page is older than CVRF-CVE file.
skipping CVE-2016-10011 as CVE page is older than CVRF-CVE file.
skipping CVE-2016-10009 as CVE page is older than CVRF-CVE file.
No V5 entry found for CVE-2016-9971 / /home/securitybot/prod/cve-database/cvelistV5/cves/2016/9xxxx/CVE-2016-9971.json:No such file or directory
skipping CVE-2016-9942 as CVE page is older than CVRF-CVE file.
skipping CVE-2016-9941 as CVE page is older than CVRF-CVE file.
skipping CVE-2016-9918 as CVE page is older than CVRF-CVE file.
skipping CVE-2016-9917 as CVE page is older than CVRF-CVE file.
skipping CVE-2016-9888 as CVE page is older than CVRF-CVE file.
skipping CVE-2016-9811 as CVE page is older than CVRF-CVE file.
skipping CVE-2016-9810 as CVE page is older than CVRF-CVE file.
no cpe found for SUSE Linux Enterprise Real Time 12 SP1 in CVE-2016-9806
skipping CVE-2016-9808 as CVE page is older than CVRF-CVE file.
skipping CVE-2016-9807 as CVE page is older than CVRF-CVE file.
skipping CVE-2016-9803 as CVE page is older than CVRF-CVE file.
skipping CVE-2016-9802 as CVE page is older than CVRF-CVE file.
no cpe found for SUSE Linux Enterprise Real Time 11 SP4 in CVE-2016-9793
no cpe found for SUSE Linux Enterprise Real Time 12 SP1 in CVE-2016-9793
skipping CVE-2016-9798 as CVE page is older than CVRF-CVE file.
skipping CVE-2016-9797 as CVE page is older than CVRF-CVE file.
skipping CVE-2016-9794 as CVE page is older than CVRF-CVE file.
skipping CVE-2016-9756 as CVE page is older than CVRF-CVE file.
no cpe found for SUSE Linux Enterprise Real Time 11 SP4 in CVE-2016-9685
skipping CVE-2016-9639 as CVE page is older than CVRF-CVE file.
skipping CVE-2016-9636 as CVE page is older than CVRF-CVE file.
skipping CVE-2016-9635 as CVE page is older than CVRF-CVE file.
skipping CVE-2016-9634 as CVE page is older than CVRF-CVE file.
skipping CVE-2016-9605 as CVE page is older than CVRF-CVE file.
skipping CVE-2016-9604 as CVE page is older than CVRF-CVE file.
skipping CVE-2016-9602 as CVE page is older than CVRF-CVE file.
skipping CVE-2016-9597 as CVE page is older than CVRF-CVE file.
skipping CVE-2016-9596 as CVE page is older than CVRF-CVE file.
skipping CVE-2016-9594 as CVE page is older than CVRF-CVE file.
CVE-2016-9587: no packages for SUSE Linux Enterprise Module for Package Hub 15 SP5, but entry?
CVE-2016-9587: no packages for SUSE Manager Tools for SLE Micro 5, but entry?
CVE-2016-9587: no packages for SUSE Manager Tools Beta for SLE Micro 5, but entry?
CVE-2016-9587: no packages for SUSE Linux Enterprise Module for Package Hub 15 SP5, but entry?
CVE-2016-9587: no packages for SUSE Manager Tools Beta for SLE Micro 5, but entry?
CVE-2016-9587: no packages for SUSE Manager Tools for SLE Micro 5, but entry?
CVE-2016-9587: no packages for SUSE Linux Enterprise Module for Package Hub 15 SP5, but entry?
CVE-2016-9587: no packages for SUSE Manager Tools Beta for SLE Micro 5, but entry?
CVE-2016-9587: no packages for SUSE Manager Tools for SLE Micro 5, but entry?
skipping CVE-2016-9588 as CVE page is older than CVRF-CVE file.
skipping CVE-2016-9578 as CVE page is older than CVRF-CVE file.
skipping CVE-2016-9577 as CVE page is older than CVRF-CVE file.
skipping CVE-2016-9576 as CVE page is older than CVRF-CVE file.
no cpe found for SUSE Package Hub 15 SP1 in CVE-2016-9566
skipping CVE-2016-9555 as CVE page is older than CVRF-CVE file.
no cpe found for SUSE Liberty Linux 7 LTSS in CVE-2016-9446
skipping CVE-2016-9444 as CVE page is older than CVRF-CVE file.
skipping CVE-2016-9396 as CVE page is older than CVRF-CVE file.
skipping CVE-2016-9395 as CVE page is older than CVRF-CVE file.
skipping CVE-2016-9372 as CVE page is older than CVRF-CVE file.
skipping CVE-2016-9313 as CVE page is older than CVRF-CVE file.
skipping CVE-2016-9311 as CVE page is older than CVRF-CVE file.
skipping CVE-2016-9310 as CVE page is older than CVRF-CVE file.
skipping CVE-2016-9191 as CVE page is older than CVRF-CVE file.
skipping CVE-2016-9178 as CVE page is older than CVRF-CVE file.
skipping CVE-2016-9147 as CVE page is older than CVRF-CVE file.
skipping CVE-2016-9131 as CVE page is older than CVRF-CVE file.
skipping CVE-2016-9106 as CVE page is older than CVRF-CVE file.
skipping CVE-2016-9105 as CVE page is older than CVRF-CVE file.
skipping CVE-2016-9104 as CVE page is older than CVRF-CVE file.
skipping CVE-2016-9103 as CVE page is older than CVRF-CVE file.
skipping CVE-2016-9102 as CVE page is older than CVRF-CVE file.
skipping CVE-2016-9084 as CVE page is older than CVRF-CVE file.
skipping CVE-2016-9083 as CVE page is older than CVRF-CVE file.
skipping CVE-2016-9082 as CVE page is older than CVRF-CVE file.
skipping CVE-2016-9074 as CVE page is older than CVRF-CVE file.
no cpe found for HPE Helion OpenStack Cloud 8 in CVE-2016-9015
skipping CVE-2016-9042 as CVE page is older than CVRF-CVE file.
no cpe found for HPE Helion OpenStack Cloud 8 in CVE-2016-9013
skipping CVE-2016-8888 as CVE page is older than CVRF-CVE file.
skipping CVE-2016-8864 as CVE page is older than CVRF-CVE file.
skipping CVE-2016-8858 as CVE page is older than CVRF-CVE file.
skipping CVE-2016-8745 as CVE page is older than CVRF-CVE file.
skipping CVE-2016-8743 as CVE page is older than CVRF-CVE file.
skipping CVE-2016-8740 as CVE page is older than CVRF-CVE file.
no cpe found for SUSE Liberty Linux 7 LTSS in CVE-2016-8706
no cpe found for SUSE Liberty Linux 7 LTSS in CVE-2016-8705
no cpe found for SUSE Studio Onsite Runner 1.3 in CVE-2016-8705
no cpe found for SUSE Liberty Linux 7 LTSS in CVE-2016-8704
skipping CVE-2016-8689 as CVE page is older than CVRF-CVE file.
skipping CVE-2016-8688 as CVE page is older than CVRF-CVE file.
skipping CVE-2016-8687 as CVE page is older than CVRF-CVE file.
skipping CVE-2016-8684 as CVE page is older than CVRF-CVE file.
skipping CVE-2016-8683 as CVE page is older than CVRF-CVE file.
skipping CVE-2016-8682 as CVE page is older than CVRF-CVE file.
skipping CVE-2016-8677 as CVE page is older than CVRF-CVE file.
skipping CVE-2016-8668 as CVE page is older than CVRF-CVE file.
skipping CVE-2016-8666 as CVE page is older than CVRF-CVE file.
skipping CVE-2016-8658 as CVE page is older than CVRF-CVE file.
skipping CVE-2016-8655 as CVE page is older than CVRF-CVE file.
skipping CVE-2016-8650 as CVE page is older than CVRF-CVE file.
CVE-2016-8647: no packages for SUSE Manager Tools for SLE Micro 5, but entry?
CVE-2016-8647: no packages for SUSE Linux Enterprise Module for Package Hub 15 SP5, but entry?
CVE-2016-8647: no packages for SUSE Manager Tools Beta for SLE Micro 5, but entry?
CVE-2016-8647: no packages for SUSE Linux Enterprise Module for Package Hub 15 SP5, but entry?
CVE-2016-8647: no packages for SUSE Manager Tools Beta for SLE Micro 5, but entry?
CVE-2016-8647: no packages for SUSE Manager Tools for SLE Micro 5, but entry?
CVE-2016-8647: no packages for SUSE Linux Enterprise Module for Package Hub 15 SP5, but entry?
CVE-2016-8647: no packages for SUSE Manager Tools Beta for SLE Micro 5, but entry?
CVE-2016-8647: no packages for SUSE Manager Tools for SLE Micro 5, but entry?
skipping CVE-2016-8646 as CVE page is older than CVRF-CVE file.
skipping CVE-2016-8645 as CVE page is older than CVRF-CVE file.
no cpe found for SUSE Liberty Linux 7 LTSS in CVE-2016-8638
skipping CVE-2016-8637 as CVE page is older than CVRF-CVE file.
no cpe found for SUSE Manager Tools for SLE Micro 5 in CVE-2016-8628
skipping CVE-2016-8633 as CVE page is older than CVRF-CVE file.
skipping CVE-2016-8632 as CVE page is older than CVRF-CVE file.
skipping CVE-2016-8630 as CVE page is older than CVRF-CVE file.
skipping CVE-2016-8624 as CVE page is older than CVRF-CVE file.
skipping CVE-2016-8623 as CVE page is older than CVRF-CVE file.
skipping CVE-2016-8622 as CVE page is older than CVRF-CVE file.
skipping CVE-2016-8621 as CVE page is older than CVRF-CVE file.
skipping CVE-2016-8620 as CVE page is older than CVRF-CVE file.
skipping CVE-2016-8619 as CVE page is older than CVRF-CVE file.
skipping CVE-2016-8618 as CVE page is older than CVRF-CVE file.
skipping CVE-2016-8617 as CVE page is older than CVRF-CVE file.
skipping CVE-2016-8616 as CVE page is older than CVRF-CVE file.
no cpe found for SUSE Manager Tools for SLE Micro 5 in CVE-2016-8614
skipping CVE-2016-8610 as CVE page is older than CVRF-CVE file.
no cpe found for SUSE Package Hub 15 SP4 in CVE-2016-8605
skipping CVE-2016-8602 as CVE page is older than CVRF-CVE file.
skipping CVE-2016-8578 as CVE page is older than CVRF-CVE file.
skipping CVE-2016-8577 as CVE page is older than CVRF-CVE file.
no cpe found for SUSE Linux Enterprise Real Time 11 SP4 in CVE-2016-8405
no cpe found for SUSE Linux Enterprise Real Time 11 SP4 in CVE-2016-8399
no cpe found for SUSE Linux Enterprise Real Time 12 SP1 in CVE-2016-8399
skipping CVE-2016-8331 as CVE page is older than CVRF-CVE file.
skipping CVE-2016-8328 as CVE page is older than CVRF-CVE file.
skipping CVE-2016-8327 as CVE page is older than CVRF-CVE file.
skipping CVE-2016-8283 as CVE page is older than CVRF-CVE file.
skipping CVE-2016-7997 as CVE page is older than CVRF-CVE file.
skipping CVE-2016-7996 as CVE page is older than CVRF-CVE file.
skipping CVE-2016-7994 as CVE page is older than CVRF-CVE file.
skipping CVE-2016-7948 as CVE page is older than CVRF-CVE file.
skipping CVE-2016-7947 as CVE page is older than CVRF-CVE file.
no cpe found for SUSE Linux Enterprise Real Time 12 SP1 in CVE-2016-7914
skipping CVE-2016-7916 as CVE page is older than CVRF-CVE file.
skipping CVE-2016-7915 as CVE page is older than CVRF-CVE file.
skipping CVE-2016-7913 as CVE page is older than CVRF-CVE file.
no cpe found for SUSE Linux Enterprise Real Time 11 SP4 in CVE-2016-7911
no cpe found for SUSE Linux Enterprise Real Time 12 SP1 in CVE-2016-7911
skipping CVE-2016-7910 as CVE page is older than CVRF-CVE file.
skipping CVE-2016-7907 as CVE page is older than CVRF-CVE file.
skipping CVE-2016-7800 as CVE page is older than CVRF-CVE file.
skipping CVE-2016-7799 as CVE page is older than CVRF-CVE file.
skipping CVE-2016-7797 as CVE page is older than CVRF-CVE file.
skipping CVE-2016-7567 as CVE page is older than CVRF-CVE file.
skipping CVE-2016-7540 as CVE page is older than CVRF-CVE file.
skipping CVE-2016-7539 as CVE page is older than CVRF-CVE file.
skipping CVE-2016-7538 as CVE page is older than CVRF-CVE file.
skipping CVE-2016-7537 as CVE page is older than CVRF-CVE file.
skipping CVE-2016-7535 as CVE page is older than CVRF-CVE file.
skipping CVE-2016-7534 as CVE page is older than CVRF-CVE file.
skipping CVE-2016-7533 as CVE page is older than CVRF-CVE file.
skipping CVE-2016-7532 as CVE page is older than CVRF-CVE file.
skipping CVE-2016-7531 as CVE page is older than CVRF-CVE file.
skipping CVE-2016-7529 as CVE page is older than CVRF-CVE file.
skipping CVE-2016-7528 as CVE page is older than CVRF-CVE file.
skipping CVE-2016-7527 as CVE page is older than CVRF-CVE file.
skipping CVE-2016-7526 as CVE page is older than CVRF-CVE file.
skipping CVE-2016-7525 as CVE page is older than CVRF-CVE file.
skipping CVE-2016-7524 as CVE page is older than CVRF-CVE file.
skipping CVE-2016-7523 as CVE page is older than CVRF-CVE file.
skipping CVE-2016-7522 as CVE page is older than CVRF-CVE file.
skipping CVE-2016-7521 as CVE page is older than CVRF-CVE file.
skipping CVE-2016-7520 as CVE page is older than CVRF-CVE file.
skipping CVE-2016-7519 as CVE page is older than CVRF-CVE file.
skipping CVE-2016-7518 as CVE page is older than CVRF-CVE file.
skipping CVE-2016-7517 as CVE page is older than CVRF-CVE file.
skipping CVE-2016-7516 as CVE page is older than CVRF-CVE file.
skipping CVE-2016-7515 as CVE page is older than CVRF-CVE file.
skipping CVE-2016-7514 as CVE page is older than CVRF-CVE file.
skipping CVE-2016-7513 as CVE page is older than CVRF-CVE file.
no cpe found for SUSE Cloud 2.0 in CVE-2016-7498
skipping CVE-2016-7466 as CVE page is older than CVRF-CVE file.
no cpe found for SUSE Linux Enterprise Real Time 11 SP4 in CVE-2016-7425
no cpe found for SUSE Linux Enterprise Real Time 12 SP1 in CVE-2016-7425
skipping CVE-2016-7440 as CVE page is older than CVRF-CVE file.
skipping CVE-2016-7434 as CVE page is older than CVRF-CVE file.
skipping CVE-2016-7433 as CVE page is older than CVRF-CVE file.
skipping CVE-2016-7431 as CVE page is older than CVRF-CVE file.
skipping CVE-2016-7429 as CVE page is older than CVRF-CVE file.
skipping CVE-2016-7428 as CVE page is older than CVRF-CVE file.
skipping CVE-2016-7427 as CVE page is older than CVRF-CVE file.
skipping CVE-2016-7426 as CVE page is older than CVRF-CVE file.
skipping CVE-2016-7423 as CVE page is older than CVRF-CVE file.
skipping CVE-2016-7422 as CVE page is older than CVRF-CVE file.
skipping CVE-2016-7421 as CVE page is older than CVRF-CVE file.
skipping CVE-2016-7415 as CVE page is older than CVRF-CVE file.
skipping CVE-2016-7170 as CVE page is older than CVRF-CVE file.
skipping CVE-2016-7167 as CVE page is older than CVRF-CVE file.
skipping CVE-2016-7166 as CVE page is older than CVRF-CVE file.
skipping CVE-2016-7162 as CVE page is older than CVRF-CVE file.
skipping CVE-2016-7161 as CVE page is older than CVRF-CVE file.
skipping CVE-2016-7157 as CVE page is older than CVRF-CVE file.
skipping CVE-2016-7156 as CVE page is older than CVRF-CVE file.
skipping CVE-2016-7117 as CVE page is older than CVRF-CVE file.
skipping CVE-2016-7101 as CVE page is older than CVRF-CVE file.
skipping CVE-2016-7097 as CVE page is older than CVRF-CVE file.
no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2016-7069
skipping CVE-2016-7056 as CVE page is older than CVRF-CVE file.
skipping CVE-2016-7055 as CVE page is older than CVRF-CVE file.
no cpe found for SUSE Liberty Linux 7 LTSS in CVE-2016-7050
skipping CVE-2016-7052 as CVE page is older than CVRF-CVE file.
skipping CVE-2016-7042 as CVE page is older than CVRF-CVE file.
skipping CVE-2016-7039 as CVE page is older than CVRF-CVE file.
skipping CVE-2016-7035 as CVE page is older than CVRF-CVE file.
no cpe found for SUSE Liberty Linux 7 LTSS in CVE-2016-6893
skipping CVE-2016-6855 as CVE page is older than CVRF-CVE file.
skipping CVE-2016-6828 as CVE page is older than CVRF-CVE file.
no cpe found for SUSE Liberty Linux 7 LTSS in CVE-2016-6814
skipping CVE-2016-6816 as CVE page is older than CVRF-CVE file.
skipping CVE-2016-6796 as CVE page is older than CVRF-CVE file.
skipping CVE-2016-6787 as CVE page is older than CVRF-CVE file.
skipping CVE-2016-6786 as CVE page is older than CVRF-CVE file.
skipping CVE-2016-6664 as CVE page is older than CVRF-CVE file.
skipping CVE-2016-6663 as CVE page is older than CVRF-CVE file.
skipping CVE-2016-6662 as CVE page is older than CVRF-CVE file.
No V5 entry found for CVE-2016-6583 / /home/securitybot/prod/cve-database/cvelistV5/cves/2016/6xxxx/CVE-2016-6583.json:No such file or directory
No V5 entry found for CVE-2016-6524 / /home/securitybot/prod/cve-database/cvelistV5/cves/2016/6xxxx/CVE-2016-6524.json:No such file or directory
skipping CVE-2016-6515 as CVE page is older than CVRF-CVE file.
skipping CVE-2016-6490 as CVE page is older than CVRF-CVE file.
skipping CVE-2016-6480 as CVE page is older than CVRF-CVE file.
skipping CVE-2016-6352 as CVE page is older than CVRF-CVE file.
skipping CVE-2016-6329 as CVE page is older than CVRF-CVE file.
skipping CVE-2016-6327 as CVE page is older than CVRF-CVE file.
skipping CVE-2016-6323 as CVE page is older than CVRF-CVE file.
skipping CVE-2016-6306 as CVE page is older than CVRF-CVE file.
no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2016-6301
skipping CVE-2016-6304 as CVE page is older than CVRF-CVE file.
skipping CVE-2016-6303 as CVE page is older than CVRF-CVE file.
skipping CVE-2016-6302 as CVE page is older than CVRF-CVE file.
skipping CVE-2016-6250 as CVE page is older than CVRF-CVE file.
skipping CVE-2016-6223 as CVE page is older than CVRF-CVE file.
skipping CVE-2016-6213 as CVE page is older than CVRF-CVE file.
no cpe found for SUSE Package Hub 15 SP1 in CVE-2016-6209
no cpe found for SUSE Package Hub 15 SP2 in CVE-2016-6209
skipping CVE-2016-6207 as CVE page is older than CVRF-CVE file.
skipping CVE-2016-6198 as CVE page is older than CVRF-CVE file.
skipping CVE-2016-6197 as CVE page is older than CVRF-CVE file.
skipping CVE-2016-6185 as CVE page is older than CVRF-CVE file.
skipping CVE-2016-6170 as CVE page is older than CVRF-CVE file.
skipping CVE-2016-6163 as CVE page is older than CVRF-CVE file.
skipping CVE-2016-6153 as CVE page is older than CVRF-CVE file.
skipping CVE-2016-6136 as CVE page is older than CVRF-CVE file.
skipping CVE-2016-6130 as CVE page is older than CVRF-CVE file.
skipping CVE-2016-6128 as CVE page is older than CVRF-CVE file.
skipping CVE-2016-5844 as CVE page is older than CVRF-CVE file.
no cpe found for SUSE Linux Enterprise Real Time 11 SP4 in CVE-2016-5829
no cpe found for SUSE Linux Enterprise Real Time 12 SP1 in CVE-2016-5829
skipping CVE-2016-5842 as CVE page is older than CVRF-CVE file.
skipping CVE-2016-5841 as CVE page is older than CVRF-CVE file.
skipping CVE-2016-5828 as CVE page is older than CVRF-CVE file.
skipping CVE-2016-5766 as CVE page is older than CVRF-CVE file.
skipping CVE-2016-5759 as CVE page is older than CVRF-CVE file.
skipping CVE-2016-5735 as CVE page is older than CVRF-CVE file.
skipping CVE-2016-5725 as CVE page is older than CVRF-CVE file.
skipping CVE-2016-5699 as CVE page is older than CVRF-CVE file.
skipping CVE-2016-5696 as CVE page is older than CVRF-CVE file.
skipping CVE-2016-5691 as CVE page is older than CVRF-CVE file.
skipping CVE-2016-5690 as CVE page is older than CVRF-CVE file.
skipping CVE-2016-5689 as CVE page is older than CVRF-CVE file.
skipping CVE-2016-5688 as CVE page is older than CVRF-CVE file.
skipping CVE-2016-5687 as CVE page is older than CVRF-CVE file.
skipping CVE-2016-5636 as CVE page is older than CVRF-CVE file.
skipping CVE-2016-5630 as CVE page is older than CVRF-CVE file.
skipping CVE-2016-5629 as CVE page is older than CVRF-CVE file.
skipping CVE-2016-5626 as CVE page is older than CVRF-CVE file.
skipping CVE-2016-5624 as CVE page is older than CVRF-CVE file.
skipping CVE-2016-5612 as CVE page is older than CVRF-CVE file.
skipping CVE-2016-5597 as CVE page is older than CVRF-CVE file.
skipping CVE-2016-5584 as CVE page is older than CVRF-CVE file.
skipping CVE-2016-5582 as CVE page is older than CVRF-CVE file.
skipping CVE-2016-5573 as CVE page is older than CVRF-CVE file.
skipping CVE-2016-5568 as CVE page is older than CVRF-CVE file.
skipping CVE-2016-5556 as CVE page is older than CVRF-CVE file.
skipping CVE-2016-5554 as CVE page is older than CVRF-CVE file.
skipping CVE-2016-5552 as CVE page is older than CVRF-CVE file.
skipping CVE-2016-5549 as CVE page is older than CVRF-CVE file.
skipping CVE-2016-5548 as CVE page is older than CVRF-CVE file.
skipping CVE-2016-5547 as CVE page is older than CVRF-CVE file.
skipping CVE-2016-5546 as CVE page is older than CVRF-CVE file.
no cpe found for SUSE Liberty Linux 7 LTSS in CVE-2016-5542
skipping CVE-2016-5507 as CVE page is older than CVRF-CVE file.
skipping CVE-2016-5440 as CVE page is older than CVRF-CVE file.
skipping CVE-2016-5418 as CVE page is older than CVRF-CVE file.
skipping CVE-2016-5417 as CVE page is older than CVRF-CVE file.
skipping CVE-2016-5412 as CVE page is older than CVRF-CVE file.
skipping CVE-2016-5389 as CVE page is older than CVRF-CVE file.
skipping CVE-2016-5387 as CVE page is older than CVRF-CVE file.
skipping CVE-2016-5384 as CVE page is older than CVRF-CVE file.
skipping CVE-2016-5361 as CVE page is older than CVRF-CVE file.
skipping CVE-2016-5320 as CVE page is older than CVRF-CVE file.
skipping CVE-2016-5318 as CVE page is older than CVRF-CVE file.
skipping CVE-2016-5317 as CVE page is older than CVRF-CVE file.
skipping CVE-2016-5316 as CVE page is older than CVRF-CVE file.
skipping CVE-2016-5314 as CVE page is older than CVRF-CVE file.
no cpe found for SUSE Linux Enterprise Real Time 11 SP4 in CVE-2016-5243
skipping CVE-2016-5244 as CVE page is older than CVRF-CVE file.
skipping CVE-2016-5195 as CVE page is older than CVRF-CVE file.
skipping CVE-2016-5104 as CVE page is older than CVRF-CVE file.
no cpe found for SUSE Package Hub 15 SP2 in CVE-2016-5100
skipping CVE-2016-5018 as CVE page is older than CVRF-CVE file.
skipping CVE-2016-5011 as CVE page is older than CVRF-CVE file.
no cpe found for SUSE Liberty Linux 7 LTSS in CVE-2016-5003
no cpe found for SUSE Liberty Linux 7 LTSS in CVE-2016-4994
skipping CVE-2016-4998 as CVE page is older than CVRF-CVE file.
skipping CVE-2016-4997 as CVE page is older than CVRF-CVE file.
skipping CVE-2016-4979 as CVE page is older than CVRF-CVE file.
skipping CVE-2016-4975 as CVE page is older than CVRF-CVE file.
skipping CVE-2016-4964 as CVE page is older than CVRF-CVE file.
skipping CVE-2016-4957 as CVE page is older than CVRF-CVE file.
skipping CVE-2016-4956 as CVE page is older than CVRF-CVE file.
skipping CVE-2016-4955 as CVE page is older than CVRF-CVE file.
skipping CVE-2016-4954 as CVE page is older than CVRF-CVE file.
skipping CVE-2016-4953 as CVE page is older than CVRF-CVE file.
skipping CVE-2016-4913 as CVE page is older than CVRF-CVE file.
no cpe found for SUSE Linux Enterprise Real Time 11 SP4 in CVE-2016-4805
no cpe found for SUSE Linux Enterprise Real Time 12 SP1 in CVE-2016-4805
skipping CVE-2016-4859 as CVE page is older than CVRF-CVE file.
skipping CVE-2016-4858 as CVE page is older than CVRF-CVE file.
skipping CVE-2016-4857 as CVE page is older than CVRF-CVE file.
skipping CVE-2016-4856 as CVE page is older than CVRF-CVE file.
skipping CVE-2016-4809 as CVE page is older than CVRF-CVE file.
skipping CVE-2016-4794 as CVE page is older than CVRF-CVE file.
skipping CVE-2016-4738 as CVE page is older than CVRF-CVE file.
skipping CVE-2016-4658 as CVE page is older than CVRF-CVE file.
skipping CVE-2016-4624 as CVE page is older than CVRF-CVE file.
skipping CVE-2016-4622 as CVE page is older than CVRF-CVE file.
skipping CVE-2016-4612 as CVE page is older than CVRF-CVE file.
skipping CVE-2016-4606 as CVE page is older than CVRF-CVE file.
skipping CVE-2016-4591 as CVE page is older than CVRF-CVE file.
skipping CVE-2016-4590 as CVE page is older than CVRF-CVE file.
no cpe found for SUSE Linux Enterprise Real Time 11 SP4 in CVE-2016-4580
skipping CVE-2016-4578 as CVE page is older than CVRF-CVE file.
skipping CVE-2016-4569 as CVE page is older than CVRF-CVE file.
skipping CVE-2016-4568 as CVE page is older than CVRF-CVE file.
skipping CVE-2016-4565 as CVE page is older than CVRF-CVE file.
skipping CVE-2016-4564 as CVE page is older than CVRF-CVE file.
skipping CVE-2016-4563 as CVE page is older than CVRF-CVE file.
skipping CVE-2016-4562 as CVE page is older than CVRF-CVE file.
skipping CVE-2016-4490 as CVE page is older than CVRF-CVE file.
skipping CVE-2016-4489 as CVE page is older than CVRF-CVE file.
skipping CVE-2016-4488 as CVE page is older than CVRF-CVE file.
skipping CVE-2016-4487 as CVE page is older than CVRF-CVE file.
skipping CVE-2016-4486 as CVE page is older than CVRF-CVE file.
skipping CVE-2016-4485 as CVE page is older than CVRF-CVE file.
skipping CVE-2016-4483 as CVE page is older than CVRF-CVE file.
skipping CVE-2016-4482 as CVE page is older than CVRF-CVE file.
skipping CVE-2016-4470 as CVE page is older than CVRF-CVE file.
skipping CVE-2016-4440 as CVE page is older than CVRF-CVE file.
skipping CVE-2016-4429 as CVE page is older than CVRF-CVE file.
skipping CVE-2016-4347 as CVE page is older than CVRF-CVE file.
skipping CVE-2016-4343 as CVE page is older than CVRF-CVE file.
skipping CVE-2016-4302 as CVE page is older than CVRF-CVE file.
skipping CVE-2016-4301 as CVE page is older than CVRF-CVE file.
skipping CVE-2016-4300 as CVE page is older than CVRF-CVE file.
skipping CVE-2016-4070 as CVE page is older than CVRF-CVE file.
skipping CVE-2016-4049 as CVE page is older than CVRF-CVE file.
skipping CVE-2016-4008 as CVE page is older than CVRF-CVE file.
skipping CVE-2016-3991 as CVE page is older than CVRF-CVE file.
skipping CVE-2016-3990 as CVE page is older than CVRF-CVE file.
skipping CVE-2016-3951 as CVE page is older than CVRF-CVE file.
skipping CVE-2016-3945 as CVE page is older than CVRF-CVE file.
no cpe found for SUSE Package Hub 15 in CVE-2016-3822
no cpe found for SUSE Package Hub 15 SP2 in CVE-2016-3822
skipping CVE-2016-3841 as CVE page is older than CVRF-CVE file.
skipping CVE-2016-3713 as CVE page is older than CVRF-CVE file.
no cpe found for SUSE Linux Enterprise Real Time 11 SP4 in CVE-2016-3707
no cpe found for SUSE Linux Enterprise Real Time 12 SP1 in CVE-2016-3707
skipping CVE-2016-3706 as CVE page is older than CVRF-CVE file.
skipping CVE-2016-3705 as CVE page is older than CVRF-CVE file.
no cpe found for SUSE Linux Enterprise Real Time 12 SP1 in CVE-2016-3689
skipping CVE-2016-3695 as CVE page is older than CVRF-CVE file.
no cpe found for SUSE Linux Enterprise Real Time 12 SP1 in CVE-2016-3672
skipping CVE-2016-3674 as CVE page is older than CVRF-CVE file.
skipping CVE-2016-3632 as CVE page is older than CVRF-CVE file.
skipping CVE-2016-3627 as CVE page is older than CVRF-CVE file.
skipping CVE-2016-3623 as CVE page is older than CVRF-CVE file.
skipping CVE-2016-3616 as CVE page is older than CVRF-CVE file.
skipping CVE-2016-3615 as CVE page is older than CVRF-CVE file.
skipping CVE-2016-3598 as CVE page is older than CVRF-CVE file.
skipping CVE-2016-3521 as CVE page is older than CVRF-CVE file.
skipping CVE-2016-3511 as CVE page is older than CVRF-CVE file.
skipping CVE-2016-3492 as CVE page is older than CVRF-CVE file.
skipping CVE-2016-3477 as CVE page is older than CVRF-CVE file.
skipping CVE-2016-3473 as CVE page is older than CVRF-CVE file.
skipping CVE-2016-3461 as CVE page is older than CVRF-CVE file.
skipping CVE-2016-3449 as CVE page is older than CVRF-CVE file.
skipping CVE-2016-3443 as CVE page is older than CVRF-CVE file.
skipping CVE-2016-3427 as CVE page is older than CVRF-CVE file.
skipping CVE-2016-3426 as CVE page is older than CVRF-CVE file.
skipping CVE-2016-3425 as CVE page is older than CVRF-CVE file.
skipping CVE-2016-3422 as CVE page is older than CVRF-CVE file.
skipping CVE-2016-3189 as CVE page is older than CVRF-CVE file.
skipping CVE-2016-3186 as CVE page is older than CVRF-CVE file.
skipping CVE-2016-3182 as CVE page is older than CVRF-CVE file.
skipping CVE-2016-3181 as CVE page is older than CVRF-CVE file.
skipping CVE-2016-3156 as CVE page is older than CVRF-CVE file.
no cpe found for SUSE Linux Enterprise Real Time 11 SP4 in CVE-2016-3140
no cpe found for SUSE Linux Enterprise Real Time 12 SP1 in CVE-2016-3140
no cpe found for SUSE Linux Enterprise Real Time 12 SP1 in CVE-2016-3136
skipping CVE-2016-3139 as CVE page is older than CVRF-CVE file.
skipping CVE-2016-3138 as CVE page is older than CVRF-CVE file.
skipping CVE-2016-3137 as CVE page is older than CVRF-CVE file.
skipping CVE-2016-3134 as CVE page is older than CVRF-CVE file.
skipping CVE-2016-3120 as CVE page is older than CVRF-CVE file.
skipping CVE-2016-3119 as CVE page is older than CVRF-CVE file.
skipping CVE-2016-3092 as CVE page is older than CVRF-CVE file.
skipping CVE-2016-3075 as CVE page is older than CVRF-CVE file.
skipping CVE-2016-3070 as CVE page is older than CVRF-CVE file.
skipping CVE-2016-3065 as CVE page is older than CVRF-CVE file.
No V5 entry found for CVE-2016-2915 / /home/securitybot/prod/cve-database/cvelistV5/cves/2016/2xxxx/CVE-2016-2915.json:No such file or directory
skipping CVE-2016-3044 as CVE page is older than CVRF-CVE file.
skipping CVE-2016-2851 as CVE page is older than CVRF-CVE file.
skipping CVE-2016-2847 as CVE page is older than CVRF-CVE file.
skipping CVE-2016-2782 as CVE page is older than CVRF-CVE file.
skipping CVE-2016-2779 as CVE page is older than CVRF-CVE file.
skipping CVE-2016-2776 as CVE page is older than CVRF-CVE file.
skipping CVE-2016-2775 as CVE page is older than CVRF-CVE file.
skipping CVE-2016-2549 as CVE page is older than CVRF-CVE file.
skipping CVE-2016-2548 as CVE page is older than CVRF-CVE file.
skipping CVE-2016-2547 as CVE page is older than CVRF-CVE file.
skipping CVE-2016-2546 as CVE page is older than CVRF-CVE file.
skipping CVE-2016-2545 as CVE page is older than CVRF-CVE file.
skipping CVE-2016-2544 as CVE page is older than CVRF-CVE file.
skipping CVE-2016-2543 as CVE page is older than CVRF-CVE file.
no cpe found for HPE Helion OpenStack Cloud 8 in CVE-2016-2533
skipping CVE-2016-2519 as CVE page is older than CVRF-CVE file.
skipping CVE-2016-2518 as CVE page is older than CVRF-CVE file.
skipping CVE-2016-2517 as CVE page is older than CVRF-CVE file.
skipping CVE-2016-2516 as CVE page is older than CVRF-CVE file.
skipping CVE-2016-2391 as CVE page is older than CVRF-CVE file.
skipping CVE-2016-2384 as CVE page is older than CVRF-CVE file.
skipping CVE-2016-2381 as CVE page is older than CVRF-CVE file.
no cpe found for SUSE Studio Onsite Runner 1.3 in CVE-2016-2339
skipping CVE-2016-2338 as CVE page is older than CVRF-CVE file.
skipping CVE-2016-2324 as CVE page is older than CVRF-CVE file.
skipping CVE-2016-2318 as CVE page is older than CVRF-CVE file.
skipping CVE-2016-2315 as CVE page is older than CVRF-CVE file.
skipping CVE-2016-2271 as CVE page is older than CVRF-CVE file.
skipping CVE-2016-2270 as CVE page is older than CVRF-CVE file.
skipping CVE-2016-2193 as CVE page is older than CVRF-CVE file.
no cpe found for SUSE Linux Enterprise Real Time 11 SP4 in CVE-2016-2186
no cpe found for SUSE Linux Enterprise Real Time 12 SP1 in CVE-2016-2186
skipping CVE-2016-2188 as CVE page is older than CVRF-CVE file.
skipping CVE-2016-2187 as CVE page is older than CVRF-CVE file.
no cpe found for SUSE Linux Enterprise Real Time 11 SP4 in CVE-2016-2185
no cpe found for SUSE Linux Enterprise Real Time 12 SP1 in CVE-2016-2185
skipping CVE-2016-2184 as CVE page is older than CVRF-CVE file.
skipping CVE-2016-2183 as CVE page is older than CVRF-CVE file.
skipping CVE-2016-2182 as CVE page is older than CVRF-CVE file.
skipping CVE-2016-2181 as CVE page is older than CVRF-CVE file.
skipping CVE-2016-2180 as CVE page is older than CVRF-CVE file.
skipping CVE-2016-2179 as CVE page is older than CVRF-CVE file.
skipping CVE-2016-2178 as CVE page is older than CVRF-CVE file.
skipping CVE-2016-2177 as CVE page is older than CVRF-CVE file.
skipping CVE-2016-2176 as CVE page is older than CVRF-CVE file.
no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2016-2148
skipping CVE-2016-2161 as CVE page is older than CVRF-CVE file.
skipping CVE-2016-2150 as CVE page is older than CVRF-CVE file.
no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2016-2147
skipping CVE-2016-2143 as CVE page is older than CVRF-CVE file.
skipping CVE-2016-2126 as CVE page is older than CVRF-CVE file.
skipping CVE-2016-2125 as CVE page is older than CVRF-CVE file.
skipping CVE-2016-2123 as CVE page is older than CVRF-CVE file.
skipping CVE-2016-2119 as CVE page is older than CVRF-CVE file.
skipping CVE-2016-2118 as CVE page is older than CVRF-CVE file.
skipping CVE-2016-2115 as CVE page is older than CVRF-CVE file.
skipping CVE-2016-2113 as CVE page is older than CVRF-CVE file.
skipping CVE-2016-2112 as CVE page is older than CVRF-CVE file.
skipping CVE-2016-2111 as CVE page is older than CVRF-CVE file.
skipping CVE-2016-2110 as CVE page is older than CVRF-CVE file.
skipping CVE-2016-2109 as CVE page is older than CVRF-CVE file.
skipping CVE-2016-2107 as CVE page is older than CVRF-CVE file.
skipping CVE-2016-2106 as CVE page is older than CVRF-CVE file.
skipping CVE-2016-2105 as CVE page is older than CVRF-CVE file.
skipping CVE-2016-2104 as CVE page is older than CVRF-CVE file.
skipping CVE-2016-2098 as CVE page is older than CVRF-CVE file.
skipping CVE-2016-2088 as CVE page is older than CVRF-CVE file.
no cpe found for SUSE Linux Enterprise Real Time 11 SP4 in CVE-2016-2053
no cpe found for SUSE Linux Enterprise Real Time 12 SP1 in CVE-2016-2053
skipping CVE-2016-2069 as CVE page is older than CVRF-CVE file.
skipping CVE-2016-2047 as CVE page is older than CVRF-CVE file.
skipping CVE-2016-2037 as CVE page is older than CVRF-CVE file.
skipping CVE-2016-1938 as CVE page is older than CVRF-CVE file.
skipping CVE-2016-1937 as CVE page is older than CVRF-CVE file.
skipping CVE-2016-1924 as CVE page is older than CVRF-CVE file.
skipping CVE-2016-1923 as CVE page is older than CVRF-CVE file.
skipping CVE-2016-1907 as CVE page is older than CVRF-CVE file.
skipping CVE-2016-1866 as CVE page is older than CVRF-CVE file.
skipping CVE-2016-1857 as CVE page is older than CVRF-CVE file.
skipping CVE-2016-1856 as CVE page is older than CVRF-CVE file.
skipping CVE-2016-1840 as CVE page is older than CVRF-CVE file.
skipping CVE-2016-1838 as CVE page is older than CVRF-CVE file.
skipping CVE-2016-1837 as CVE page is older than CVRF-CVE file.
skipping CVE-2016-1836 as CVE page is older than CVRF-CVE file.
skipping CVE-2016-1835 as CVE page is older than CVRF-CVE file.
skipping CVE-2016-1834 as CVE page is older than CVRF-CVE file.
skipping CVE-2016-1833 as CVE page is older than CVRF-CVE file.
skipping CVE-2016-1762 as CVE page is older than CVRF-CVE file.
No V5 entry found for CVE-2016-1604 / /home/securitybot/prod/cve-database/cvelistV5/cves/2016/1xxxx/CVE-2016-1604.json:No such file or directory
skipping CVE-2016-1601 as CVE page is older than CVRF-CVE file.
skipping CVE-2016-1583 as CVE page is older than CVRF-CVE file.
skipping CVE-2016-1575 as CVE page is older than CVRF-CVE file.
skipping CVE-2016-1551 as CVE page is older than CVRF-CVE file.
skipping CVE-2016-1550 as CVE page is older than CVRF-CVE file.
skipping CVE-2016-1548 as CVE page is older than CVRF-CVE file.
skipping CVE-2016-1547 as CVE page is older than CVRF-CVE file.
skipping CVE-2016-1546 as CVE page is older than CVRF-CVE file.
skipping CVE-2016-1544 as CVE page is older than CVRF-CVE file.
skipping CVE-2016-1541 as CVE page is older than CVRF-CVE file.
skipping CVE-2016-1286 as CVE page is older than CVRF-CVE file.
skipping CVE-2016-1285 as CVE page is older than CVRF-CVE file.
skipping CVE-2016-1248 as CVE page is older than CVRF-CVE file.
skipping CVE-2016-1237 as CVE page is older than CVRF-CVE file.
skipping CVE-2016-1234 as CVE page is older than CVRF-CVE file.
skipping CVE-2016-0823 as CVE page is older than CVRF-CVE file.
skipping CVE-2016-0821 as CVE page is older than CVRF-CVE file.
skipping CVE-2016-0800 as CVE page is older than CVRF-CVE file.
skipping CVE-2016-0799 as CVE page is older than CVRF-CVE file.
skipping CVE-2016-0798 as CVE page is older than CVRF-CVE file.
skipping CVE-2016-0797 as CVE page is older than CVRF-CVE file.
skipping CVE-2016-0787 as CVE page is older than CVRF-CVE file.
skipping CVE-2016-0777 as CVE page is older than CVRF-CVE file.
skipping CVE-2016-0772 as CVE page is older than CVRF-CVE file.
skipping CVE-2016-0771 as CVE page is older than CVRF-CVE file.
skipping CVE-2016-0764 as CVE page is older than CVRF-CVE file.
skipping CVE-2016-0763 as CVE page is older than CVRF-CVE file.
skipping CVE-2016-0758 as CVE page is older than CVRF-CVE file.
skipping CVE-2016-0755 as CVE page is older than CVRF-CVE file.
no cpe found for SUSE Studio Onsite Runner 1.3 in CVE-2016-0752
no cpe found for SUSE Studio Onsite Runner 1.3 in CVE-2016-0751
skipping CVE-2016-0749 as CVE page is older than CVRF-CVE file.
skipping CVE-2016-0739 as CVE page is older than CVRF-CVE file.
skipping CVE-2016-0736 as CVE page is older than CVRF-CVE file.
no cpe found for SUSE Linux Enterprise Real Time 11 SP4 in CVE-2016-0723
no cpe found for SUSE Linux Enterprise Real Time 12 SP1 in CVE-2016-0723
skipping CVE-2016-0714 as CVE page is older than CVRF-CVE file.
no cpe found for SUSE Liberty Linux 7 LTSS in CVE-2016-0704
skipping CVE-2016-0705 as CVE page is older than CVRF-CVE file.
no cpe found for SUSE Liberty Linux 7 LTSS in CVE-2016-0703
skipping CVE-2016-0702 as CVE page is older than CVRF-CVE file.
skipping CVE-2016-0701 as CVE page is older than CVRF-CVE file.
skipping CVE-2016-0695 as CVE page is older than CVRF-CVE file.
skipping CVE-2016-0687 as CVE page is older than CVRF-CVE file.
skipping CVE-2016-0686 as CVE page is older than CVRF-CVE file.
skipping CVE-2016-0668 as CVE page is older than CVRF-CVE file.
skipping CVE-2016-0667 as CVE page is older than CVRF-CVE file.
skipping CVE-2016-0666 as CVE page is older than CVRF-CVE file.
skipping CVE-2016-0665 as CVE page is older than CVRF-CVE file.
skipping CVE-2016-0663 as CVE page is older than CVRF-CVE file.
skipping CVE-2016-0662 as CVE page is older than CVRF-CVE file.
skipping CVE-2016-0661 as CVE page is older than CVRF-CVE file.
skipping CVE-2016-0659 as CVE page is older than CVRF-CVE file.
skipping CVE-2016-0658 as CVE page is older than CVRF-CVE file.
skipping CVE-2016-0657 as CVE page is older than CVRF-CVE file.
skipping CVE-2016-0656 as CVE page is older than CVRF-CVE file.
skipping CVE-2016-0655 as CVE page is older than CVRF-CVE file.
skipping CVE-2016-0654 as CVE page is older than CVRF-CVE file.
skipping CVE-2016-0653 as CVE page is older than CVRF-CVE file.
skipping CVE-2016-0652 as CVE page is older than CVRF-CVE file.
skipping CVE-2016-0651 as CVE page is older than CVRF-CVE file.
skipping CVE-2016-0650 as CVE page is older than CVRF-CVE file.
skipping CVE-2016-0649 as CVE page is older than CVRF-CVE file.
skipping CVE-2016-0648 as CVE page is older than CVRF-CVE file.
skipping CVE-2016-0647 as CVE page is older than CVRF-CVE file.
skipping CVE-2016-0646 as CVE page is older than CVRF-CVE file.
skipping CVE-2016-0644 as CVE page is older than CVRF-CVE file.
skipping CVE-2016-0643 as CVE page is older than CVRF-CVE file.
skipping CVE-2016-0642 as CVE page is older than CVRF-CVE file.
skipping CVE-2016-0641 as CVE page is older than CVRF-CVE file.
skipping CVE-2016-0640 as CVE page is older than CVRF-CVE file.
skipping CVE-2016-0639 as CVE page is older than CVRF-CVE file.
skipping CVE-2016-0616 as CVE page is older than CVRF-CVE file.
skipping CVE-2016-0611 as CVE page is older than CVRF-CVE file.
skipping CVE-2016-0610 as CVE page is older than CVRF-CVE file.
skipping CVE-2016-0609 as CVE page is older than CVRF-CVE file.
skipping CVE-2016-0608 as CVE page is older than CVRF-CVE file.
skipping CVE-2016-0607 as CVE page is older than CVRF-CVE file.
skipping CVE-2016-0606 as CVE page is older than CVRF-CVE file.
skipping CVE-2016-0605 as CVE page is older than CVRF-CVE file.
skipping CVE-2016-0602 as CVE page is older than CVRF-CVE file.
skipping CVE-2016-0601 as CVE page is older than CVRF-CVE file.
skipping CVE-2016-0600 as CVE page is older than CVRF-CVE file.
skipping CVE-2016-0599 as CVE page is older than CVRF-CVE file.
skipping CVE-2016-0598 as CVE page is older than CVRF-CVE file.
skipping CVE-2016-0597 as CVE page is older than CVRF-CVE file.
skipping CVE-2016-0596 as CVE page is older than CVRF-CVE file.
skipping CVE-2016-0595 as CVE page is older than CVRF-CVE file.
skipping CVE-2016-0594 as CVE page is older than CVRF-CVE file.
skipping CVE-2016-0592 as CVE page is older than CVRF-CVE file.
skipping CVE-2016-0546 as CVE page is older than CVRF-CVE file.
skipping CVE-2016-0505 as CVE page is older than CVRF-CVE file.
skipping CVE-2016-0504 as CVE page is older than CVRF-CVE file.
skipping CVE-2016-0503 as CVE page is older than CVRF-CVE file.
skipping CVE-2016-0502 as CVE page is older than CVRF-CVE file.
skipping CVE-2016-0495 as CVE page is older than CVRF-CVE file.
no cpe found for SUSE Linux Enterprise Real Time 11 SP4 in CVE-2015-1142857
no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2015-20107
skipping CVE-2015-20109 as CVE page is older than CVRF-CVE file.
skipping CVE-2015-10082 as CVE page is older than CVRF-CVE file.
no entry found for CVE-2015-9679 / /home/securitybot/prod/cve-database/cvelist/2015/9xxxx/CVE-2015-9679.json:No such file or directory
No V5 entry found for CVE-2015-9679 / /home/securitybot/prod/cve-database/cvelistV5/cves/2015/9xxxx/CVE-2015-9679.json:No such file or directory
no cpe found for HPE Helion OpenStack Cloud 8 in CVE-2015-9543
skipping CVE-2015-9541 as CVE page is older than CVRF-CVE file.
skipping CVE-2015-9289 as CVE page is older than CVRF-CVE file.
no cpe found for SUSE Package Hub 15 in CVE-2015-9275
no cpe found for SUSE Package Hub 15 SP1 in CVE-2015-9275
no cpe found for SUSE Liberty Linux 7 LTSS in CVE-2015-9262
no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2015-9261
skipping CVE-2015-9105 as CVE page is older than CVRF-CVE file.
skipping CVE-2015-9104 as CVE page is older than CVRF-CVE file.
skipping CVE-2015-9019 as CVE page is older than CVRF-CVE file.
skipping CVE-2015-8985 as CVE page is older than CVRF-CVE file.
skipping CVE-2015-8983 as CVE page is older than CVRF-CVE file.
skipping CVE-2015-8982 as CVE page is older than CVRF-CVE file.
skipping CVE-2015-8970 as CVE page is older than CVRF-CVE file.
no cpe found for SUSE Linux Enterprise Real Time 11 SP4 in CVE-2015-8964
no cpe found for SUSE Linux Enterprise Real Time 12 SP1 in CVE-2015-8964
skipping CVE-2015-8963 as CVE page is older than CVRF-CVE file.
skipping CVE-2015-8962 as CVE page is older than CVRF-CVE file.
no cpe found for SUSE Linux Enterprise Real Time 11 SP4 in CVE-2015-8956
no cpe found for SUSE Linux Enterprise Real Time 12 SP1 in CVE-2015-8956
skipping CVE-2015-8959 as CVE page is older than CVRF-CVE file.
skipping CVE-2015-8958 as CVE page is older than CVRF-CVE file.
skipping CVE-2015-8957 as CVE page is older than CVRF-CVE file.
skipping CVE-2015-8955 as CVE page is older than CVRF-CVE file.
skipping CVE-2015-8953 as CVE page is older than CVRF-CVE file.
skipping CVE-2015-8952 as CVE page is older than CVRF-CVE file.
skipping CVE-2015-8950 as CVE page is older than CVRF-CVE file.
skipping CVE-2015-8935 as CVE page is older than CVRF-CVE file.
skipping CVE-2015-8934 as CVE page is older than CVRF-CVE file.
skipping CVE-2015-8933 as CVE page is older than CVRF-CVE file.
skipping CVE-2015-8932 as CVE page is older than CVRF-CVE file.
skipping CVE-2015-8931 as CVE page is older than CVRF-CVE file.
skipping CVE-2015-8930 as CVE page is older than CVRF-CVE file.
skipping CVE-2015-8929 as CVE page is older than CVRF-CVE file.
skipping CVE-2015-8928 as CVE page is older than CVRF-CVE file.
skipping CVE-2015-8927 as CVE page is older than CVRF-CVE file.
skipping CVE-2015-8926 as CVE page is older than CVRF-CVE file.
skipping CVE-2015-8925 as CVE page is older than CVRF-CVE file.
skipping CVE-2015-8924 as CVE page is older than CVRF-CVE file.
skipping CVE-2015-8923 as CVE page is older than CVRF-CVE file.
skipping CVE-2015-8922 as CVE page is older than CVRF-CVE file.
skipping CVE-2015-8921 as CVE page is older than CVRF-CVE file.
skipping CVE-2015-8920 as CVE page is older than CVRF-CVE file.
skipping CVE-2015-8919 as CVE page is older than CVRF-CVE file.
skipping CVE-2015-8918 as CVE page is older than CVRF-CVE file.
skipping CVE-2015-8917 as CVE page is older than CVRF-CVE file.
skipping CVE-2015-8916 as CVE page is older than CVRF-CVE file.
skipping CVE-2015-8915 as CVE page is older than CVRF-CVE file.
skipping CVE-2015-8903 as CVE page is older than CVRF-CVE file.
skipping CVE-2015-8902 as CVE page is older than CVRF-CVE file.
skipping CVE-2015-8901 as CVE page is older than CVRF-CVE file.
skipping CVE-2015-8900 as CVE page is older than CVRF-CVE file.
skipping CVE-2015-8898 as CVE page is older than CVRF-CVE file.
skipping CVE-2015-8897 as CVE page is older than CVRF-CVE file.
skipping CVE-2015-8896 as CVE page is older than CVRF-CVE file.
skipping CVE-2015-8895 as CVE page is older than CVRF-CVE file.
skipping CVE-2015-8894 as CVE page is older than CVRF-CVE file.
skipping CVE-2015-8876 as CVE page is older than CVRF-CVE file.
skipping CVE-2015-8853 as CVE page is older than CVRF-CVE file.
skipping CVE-2015-8845 as CVE page is older than CVRF-CVE file.
skipping CVE-2015-8844 as CVE page is older than CVRF-CVE file.
skipping CVE-2015-8839 as CVE page is older than CVRF-CVE file.
skipping CVE-2015-8830 as CVE page is older than CVRF-CVE file.
skipping CVE-2015-8816 as CVE page is older than CVRF-CVE file.
skipping CVE-2015-8812 as CVE page is older than CVRF-CVE file.
skipping CVE-2015-8785 as CVE page is older than CVRF-CVE file.
skipping CVE-2015-8784 as CVE page is older than CVRF-CVE file.
skipping CVE-2015-8783 as CVE page is older than CVRF-CVE file.
skipping CVE-2015-8782 as CVE page is older than CVRF-CVE file.
skipping CVE-2015-8781 as CVE page is older than CVRF-CVE file.
skipping CVE-2015-8779 as CVE page is older than CVRF-CVE file.
skipping CVE-2015-8778 as CVE page is older than CVRF-CVE file.
skipping CVE-2015-8777 as CVE page is older than CVRF-CVE file.
skipping CVE-2015-8776 as CVE page is older than CVRF-CVE file.
skipping CVE-2015-8767 as CVE page is older than CVRF-CVE file.
skipping CVE-2015-8733 as CVE page is older than CVRF-CVE file.
skipping CVE-2015-8732 as CVE page is older than CVRF-CVE file.
skipping CVE-2015-8731 as CVE page is older than CVRF-CVE file.
skipping CVE-2015-8730 as CVE page is older than CVRF-CVE file.
skipping CVE-2015-8729 as CVE page is older than CVRF-CVE file.
skipping CVE-2015-8728 as CVE page is older than CVRF-CVE file.
skipping CVE-2015-8727 as CVE page is older than CVRF-CVE file.
skipping CVE-2015-8726 as CVE page is older than CVRF-CVE file.
skipping CVE-2015-8725 as CVE page is older than CVRF-CVE file.
skipping CVE-2015-8724 as CVE page is older than CVRF-CVE file.
skipping CVE-2015-8723 as CVE page is older than CVRF-CVE file.
skipping CVE-2015-8722 as CVE page is older than CVRF-CVE file.
skipping CVE-2015-8721 as CVE page is older than CVRF-CVE file.
skipping CVE-2015-8720 as CVE page is older than CVRF-CVE file.
skipping CVE-2015-8719 as CVE page is older than CVRF-CVE file.
skipping CVE-2015-8718 as CVE page is older than CVRF-CVE file.
skipping CVE-2015-8717 as CVE page is older than CVRF-CVE file.
skipping CVE-2015-8716 as CVE page is older than CVRF-CVE file.
skipping CVE-2015-8715 as CVE page is older than CVRF-CVE file.
skipping CVE-2015-8714 as CVE page is older than CVRF-CVE file.
skipping CVE-2015-8713 as CVE page is older than CVRF-CVE file.
skipping CVE-2015-8712 as CVE page is older than CVRF-CVE file.
skipping CVE-2015-8711 as CVE page is older than CVRF-CVE file.
skipping CVE-2015-8710 as CVE page is older than CVRF-CVE file.
skipping CVE-2015-8709 as CVE page is older than CVRF-CVE file.
skipping CVE-2015-8705 as CVE page is older than CVRF-CVE file.
skipping CVE-2015-8704 as CVE page is older than CVRF-CVE file.
skipping CVE-2015-8683 as CVE page is older than CVRF-CVE file.
skipping CVE-2015-8668 as CVE page is older than CVRF-CVE file.
skipping CVE-2015-8665 as CVE page is older than CVRF-CVE file.
skipping CVE-2015-8660 as CVE page is older than CVRF-CVE file.
skipping CVE-2015-8631 as CVE page is older than CVRF-CVE file.
skipping CVE-2015-8630 as CVE page is older than CVRF-CVE file.
skipping CVE-2015-8629 as CVE page is older than CVRF-CVE file.
skipping CVE-2015-8605 as CVE page is older than CVRF-CVE file.
skipping CVE-2015-8575 as CVE page is older than CVRF-CVE file.
skipping CVE-2015-8569 as CVE page is older than CVRF-CVE file.
no cpe found for SUSE Linux Enterprise Real Time 11 SP4 in CVE-2015-8552
no cpe found for SUSE Linux Enterprise Real Time 12 SP1 in CVE-2015-8552
no cpe found for SUSE Linux Enterprise Real Time 11 SP4 in CVE-2015-8551
no cpe found for SUSE Linux Enterprise Real Time 12 SP1 in CVE-2015-8551
no cpe found for SUSE Linux Enterprise Real Time 11 SP4 in CVE-2015-8550
no cpe found for SUSE Linux Enterprise Real Time 12 SP1 in CVE-2015-8550
skipping CVE-2015-8543 as CVE page is older than CVRF-CVE file.
skipping CVE-2015-8539 as CVE page is older than CVRF-CVE file.
skipping CVE-2015-8467 as CVE page is older than CVRF-CVE file.
skipping CVE-2015-8461 as CVE page is older than CVRF-CVE file.
skipping CVE-2015-8395 as CVE page is older than CVRF-CVE file.
skipping CVE-2015-8394 as CVE page is older than CVRF-CVE file.
skipping CVE-2015-8393 as CVE page is older than CVRF-CVE file.
skipping CVE-2015-8392 as CVE page is older than CVRF-CVE file.
skipping CVE-2015-8391 as CVE page is older than CVRF-CVE file.
skipping CVE-2015-8390 as CVE page is older than CVRF-CVE file.
skipping CVE-2015-8389 as CVE page is older than CVRF-CVE file.
skipping CVE-2015-8388 as CVE page is older than CVRF-CVE file.
skipping CVE-2015-8387 as CVE page is older than CVRF-CVE file.
skipping CVE-2015-8386 as CVE page is older than CVRF-CVE file.
skipping CVE-2015-8385 as CVE page is older than CVRF-CVE file.
skipping CVE-2015-8384 as CVE page is older than CVRF-CVE file.
skipping CVE-2015-8383 as CVE page is older than CVRF-CVE file.
skipping CVE-2015-8382 as CVE page is older than CVRF-CVE file.
skipping CVE-2015-8381 as CVE page is older than CVRF-CVE file.
skipping CVE-2015-8374 as CVE page is older than CVRF-CVE file.
skipping CVE-2015-8325 as CVE page is older than CVRF-CVE file.
skipping CVE-2015-8324 as CVE page is older than CVRF-CVE file.
skipping CVE-2015-8317 as CVE page is older than CVRF-CVE file.
skipping CVE-2015-8242 as CVE page is older than CVRF-CVE file.
skipping CVE-2015-8241 as CVE page is older than CVRF-CVE file.
no cpe found for SUSE Cloud 2.0 in CVE-2015-8234
skipping CVE-2015-8215 as CVE page is older than CVRF-CVE file.
skipping CVE-2015-8158 as CVE page is older than CVRF-CVE file.
skipping CVE-2015-8140 as CVE page is older than CVRF-CVE file.
skipping CVE-2015-8139 as CVE page is older than CVRF-CVE file.
skipping CVE-2015-8138 as CVE page is older than CVRF-CVE file.
skipping CVE-2015-8104 as CVE page is older than CVRF-CVE file.
skipping CVE-2015-8035 as CVE page is older than CVRF-CVE file.
skipping CVE-2015-8025 as CVE page is older than CVRF-CVE file.
skipping CVE-2015-8023 as CVE page is older than CVRF-CVE file.
skipping CVE-2015-8019 as CVE page is older than CVRF-CVE file.
skipping CVE-2015-8000 as CVE page is older than CVRF-CVE file.
skipping CVE-2015-7995 as CVE page is older than CVRF-CVE file.
skipping CVE-2015-7990 as CVE page is older than CVRF-CVE file.
skipping CVE-2015-7981 as CVE page is older than CVRF-CVE file.
skipping CVE-2015-7979 as CVE page is older than CVRF-CVE file.
skipping CVE-2015-7978 as CVE page is older than CVRF-CVE file.
skipping CVE-2015-7977 as CVE page is older than CVRF-CVE file.
skipping CVE-2015-7976 as CVE page is older than CVRF-CVE file.
skipping CVE-2015-7975 as CVE page is older than CVRF-CVE file.
skipping CVE-2015-7974 as CVE page is older than CVRF-CVE file.
skipping CVE-2015-7973 as CVE page is older than CVRF-CVE file.
skipping CVE-2015-7942 as CVE page is older than CVRF-CVE file.
skipping CVE-2015-7941 as CVE page is older than CVRF-CVE file.
skipping CVE-2015-7872 as CVE page is older than CVRF-CVE file.
skipping CVE-2015-7871 as CVE page is older than CVRF-CVE file.
skipping CVE-2015-7855 as CVE page is older than CVRF-CVE file.
skipping CVE-2015-7854 as CVE page is older than CVRF-CVE file.
skipping CVE-2015-7853 as CVE page is older than CVRF-CVE file.
skipping CVE-2015-7852 as CVE page is older than CVRF-CVE file.
skipping CVE-2015-7851 as CVE page is older than CVRF-CVE file.
skipping CVE-2015-7850 as CVE page is older than CVRF-CVE file.
skipping CVE-2015-7849 as CVE page is older than CVRF-CVE file.
skipping CVE-2015-7848 as CVE page is older than CVRF-CVE file.
skipping CVE-2015-7833 as CVE page is older than CVRF-CVE file.
skipping CVE-2015-7830 as CVE page is older than CVRF-CVE file.
skipping CVE-2015-7810 as CVE page is older than CVRF-CVE file.
skipping CVE-2015-7799 as CVE page is older than CVRF-CVE file.
skipping CVE-2015-7744 as CVE page is older than CVRF-CVE file.
skipping CVE-2015-7705 as CVE page is older than CVRF-CVE file.
skipping CVE-2015-7704 as CVE page is older than CVRF-CVE file.
skipping CVE-2015-7703 as CVE page is older than CVRF-CVE file.
skipping CVE-2015-7702 as CVE page is older than CVRF-CVE file.
skipping CVE-2015-7701 as CVE page is older than CVRF-CVE file.
skipping CVE-2015-7692 as CVE page is older than CVRF-CVE file.
skipping CVE-2015-7691 as CVE page is older than CVRF-CVE file.
skipping CVE-2015-7674 as CVE page is older than CVRF-CVE file.
skipping CVE-2015-7673 as CVE page is older than CVRF-CVE file.
skipping CVE-2015-7613 as CVE page is older than CVRF-CVE file.
no cpe found for SUSE Studio Onsite Runner 1.3 in CVE-2015-7577
skipping CVE-2015-7580 as CVE page is older than CVRF-CVE file.
skipping CVE-2015-7579 as CVE page is older than CVRF-CVE file.
skipping CVE-2015-7578 as CVE page is older than CVRF-CVE file.
no cpe found for SUSE Studio Onsite Runner 1.3 in CVE-2015-7576
skipping CVE-2015-7575 as CVE page is older than CVRF-CVE file.
skipping CVE-2015-7566 as CVE page is older than CVRF-CVE file.
skipping CVE-2015-7560 as CVE page is older than CVRF-CVE file.
skipping CVE-2015-7551 as CVE page is older than CVRF-CVE file.
skipping CVE-2015-7550 as CVE page is older than CVRF-CVE file.
skipping CVE-2015-7515 as CVE page is older than CVRF-CVE file.
skipping CVE-2015-7513 as CVE page is older than CVRF-CVE file.
skipping CVE-2015-7509 as CVE page is older than CVRF-CVE file.
no cpe found for SUSE Liberty Linux 7 LTSS in CVE-2015-7501
skipping CVE-2015-7500 as CVE page is older than CVRF-CVE file.
skipping CVE-2015-7499 as CVE page is older than CVRF-CVE file.
skipping CVE-2015-7498 as CVE page is older than CVRF-CVE file.
skipping CVE-2015-7497 as CVE page is older than CVRF-CVE file.
skipping CVE-2015-7200 as CVE page is older than CVRF-CVE file.
skipping CVE-2015-7199 as CVE page is older than CVRF-CVE file.
skipping CVE-2015-7198 as CVE page is older than CVRF-CVE file.
skipping CVE-2015-7197 as CVE page is older than CVRF-CVE file.
skipping CVE-2015-7196 as CVE page is older than CVRF-CVE file.
skipping CVE-2015-7195 as CVE page is older than CVRF-CVE file.
skipping CVE-2015-7194 as CVE page is older than CVRF-CVE file.
skipping CVE-2015-7192 as CVE page is older than CVRF-CVE file.
skipping CVE-2015-7189 as CVE page is older than CVRF-CVE file.
skipping CVE-2015-7187 as CVE page is older than CVRF-CVE file.
skipping CVE-2015-7183 as CVE page is older than CVRF-CVE file.
skipping CVE-2015-7182 as CVE page is older than CVRF-CVE file.
skipping CVE-2015-7181 as CVE page is older than CVRF-CVE file.
skipping CVE-2015-6937 as CVE page is older than CVRF-CVE file.
skipping CVE-2015-6908 as CVE page is older than CVRF-CVE file.
skipping CVE-2015-6749 as CVE page is older than CVRF-CVE file.
skipping CVE-2015-6525 as CVE page is older than CVRF-CVE file.
skipping CVE-2015-6496 as CVE page is older than CVRF-CVE file.
no cpe found for SUSE Liberty Linux 7 LTSS in CVE-2015-6360
skipping CVE-2015-6252 as CVE page is older than CVRF-CVE file.
skipping CVE-2015-6251 as CVE page is older than CVRF-CVE file.
skipping CVE-2015-5969 as CVE page is older than CVRF-CVE file.
skipping CVE-2015-5738 as CVE page is older than CVRF-CVE file.
no cpe found for SUSE Linux Enterprise Real Time 11 SP3 in CVE-2015-5707
no cpe found for SUSE Linux Enterprise Real Time 11 SP4 in CVE-2015-5707
no cpe found for HPE Helion OpenStack Cloud 8 in CVE-2015-5694
skipping CVE-2015-5697 as CVE page is older than CVRF-CVE file.
skipping CVE-2015-5621 as CVE page is older than CVRF-CVE file.
skipping CVE-2015-5370 as CVE page is older than CVRF-CVE file.
skipping CVE-2015-5366 as CVE page is older than CVRF-CVE file.
skipping CVE-2015-5364 as CVE page is older than CVRF-CVE file.
skipping CVE-2015-5351 as CVE page is older than CVRF-CVE file.
skipping CVE-2015-5346 as CVE page is older than CVRF-CVE file.
skipping CVE-2015-5345 as CVE page is older than CVRF-CVE file.
skipping CVE-2015-5330 as CVE page is older than CVRF-CVE file.
skipping CVE-2015-5313 as CVE page is older than CVRF-CVE file.
skipping CVE-2015-5312 as CVE page is older than CVRF-CVE file.
skipping CVE-2015-5307 as CVE page is older than CVRF-CVE file.
skipping CVE-2015-5300 as CVE page is older than CVRF-CVE file.
skipping CVE-2015-5299 as CVE page is older than CVRF-CVE file.
skipping CVE-2015-5296 as CVE page is older than CVRF-CVE file.
no cpe found for SUSE Cloud 2.0 in CVE-2015-5286
skipping CVE-2015-5276 as CVE page is older than CVRF-CVE file.
skipping CVE-2015-5261 as CVE page is older than CVRF-CVE file.
skipping CVE-2015-5260 as CVE page is older than CVRF-CVE file.
skipping CVE-2015-5252 as CVE page is older than CVRF-CVE file.
no cpe found for SUSE Cloud 2.0 in CVE-2015-5245
skipping CVE-2015-5247 as CVE page is older than CVRF-CVE file.
skipping CVE-2015-5225 as CVE page is older than CVRF-CVE file.
no cpe found for SUSE Cloud 2.0 in CVE-2015-5223
skipping CVE-2015-5219 as CVE page is older than CVRF-CVE file.
skipping CVE-2015-5200 as CVE page is older than CVRF-CVE file.
skipping CVE-2015-5199 as CVE page is older than CVRF-CVE file.
skipping CVE-2015-5198 as CVE page is older than CVRF-CVE file.
skipping CVE-2015-5196 as CVE page is older than CVRF-CVE file.
skipping CVE-2015-5195 as CVE page is older than CVRF-CVE file.
skipping CVE-2015-5194 as CVE page is older than CVRF-CVE file.
skipping CVE-2015-5186 as CVE page is older than CVRF-CVE file.
skipping CVE-2015-5174 as CVE page is older than CVRF-CVE file.
no cpe found for SUSE Cloud 2.0 in CVE-2015-5163
skipping CVE-2015-5157 as CVE page is older than CVRF-CVE file.
skipping CVE-2015-5156 as CVE page is older than CVRF-CVE file.
no cpe found for SUSE Cloud 2.0 in CVE-2015-5145
skipping CVE-2015-5073 as CVE page is older than CVRF-CVE file.
skipping CVE-2015-5041 as CVE page is older than CVRF-CVE file.
skipping CVE-2015-4916 as CVE page is older than CVRF-CVE file.
skipping CVE-2015-4913 as CVE page is older than CVRF-CVE file.
skipping CVE-2015-4911 as CVE page is older than CVRF-CVE file.
skipping CVE-2015-4910 as CVE page is older than CVRF-CVE file.
skipping CVE-2015-4908 as CVE page is older than CVRF-CVE file.
skipping CVE-2015-4906 as CVE page is older than CVRF-CVE file.
skipping CVE-2015-4905 as CVE page is older than CVRF-CVE file.
skipping CVE-2015-4904 as CVE page is older than CVRF-CVE file.
skipping CVE-2015-4903 as CVE page is older than CVRF-CVE file.
skipping CVE-2015-4902 as CVE page is older than CVRF-CVE file.
skipping CVE-2015-4901 as CVE page is older than CVRF-CVE file.
skipping CVE-2015-4895 as CVE page is older than CVRF-CVE file.
skipping CVE-2015-4893 as CVE page is older than CVRF-CVE file.
skipping CVE-2015-4890 as CVE page is older than CVRF-CVE file.
skipping CVE-2015-4883 as CVE page is older than CVRF-CVE file.
skipping CVE-2015-4882 as CVE page is older than CVRF-CVE file.
skipping CVE-2015-4881 as CVE page is older than CVRF-CVE file.
skipping CVE-2015-4879 as CVE page is older than CVRF-CVE file.
skipping CVE-2015-4872 as CVE page is older than CVRF-CVE file.
skipping CVE-2015-4871 as CVE page is older than CVRF-CVE file.
skipping CVE-2015-4870 as CVE page is older than CVRF-CVE file.
skipping CVE-2015-4868 as CVE page is older than CVRF-CVE file.
skipping CVE-2015-4866 as CVE page is older than CVRF-CVE file.
skipping CVE-2015-4864 as CVE page is older than CVRF-CVE file.
skipping CVE-2015-4862 as CVE page is older than CVRF-CVE file.
skipping CVE-2015-4861 as CVE page is older than CVRF-CVE file.
skipping CVE-2015-4860 as CVE page is older than CVRF-CVE file.
skipping CVE-2015-4858 as CVE page is older than CVRF-CVE file.
skipping CVE-2015-4852 as CVE page is older than CVRF-CVE file.
skipping CVE-2015-4844 as CVE page is older than CVRF-CVE file.
skipping CVE-2015-4843 as CVE page is older than CVRF-CVE file.
skipping CVE-2015-4842 as CVE page is older than CVRF-CVE file.
skipping CVE-2015-4840 as CVE page is older than CVRF-CVE file.
skipping CVE-2015-4836 as CVE page is older than CVRF-CVE file.
skipping CVE-2015-4835 as CVE page is older than CVRF-CVE file.
skipping CVE-2015-4833 as CVE page is older than CVRF-CVE file.
skipping CVE-2015-4830 as CVE page is older than CVRF-CVE file.
skipping CVE-2015-4826 as CVE page is older than CVRF-CVE file.
skipping CVE-2015-4819 as CVE page is older than CVRF-CVE file.
skipping CVE-2015-4816 as CVE page is older than CVRF-CVE file.
skipping CVE-2015-4815 as CVE page is older than CVRF-CVE file.
skipping CVE-2015-4810 as CVE page is older than CVRF-CVE file.
skipping CVE-2015-4807 as CVE page is older than CVRF-CVE file.
skipping CVE-2015-4806 as CVE page is older than CVRF-CVE file.
skipping CVE-2015-4805 as CVE page is older than CVRF-CVE file.
skipping CVE-2015-4803 as CVE page is older than CVRF-CVE file.
skipping CVE-2015-4802 as CVE page is older than CVRF-CVE file.
skipping CVE-2015-4800 as CVE page is older than CVRF-CVE file.
skipping CVE-2015-4792 as CVE page is older than CVRF-CVE file.
skipping CVE-2015-4791 as CVE page is older than CVRF-CVE file.
skipping CVE-2015-4766 as CVE page is older than CVRF-CVE file.
skipping CVE-2015-4760 as CVE page is older than CVRF-CVE file.
skipping CVE-2015-4749 as CVE page is older than CVRF-CVE file.
skipping CVE-2015-4748 as CVE page is older than CVRF-CVE file.
skipping CVE-2015-4736 as CVE page is older than CVRF-CVE file.
skipping CVE-2015-4734 as CVE page is older than CVRF-CVE file.
skipping CVE-2015-4733 as CVE page is older than CVRF-CVE file.
skipping CVE-2015-4732 as CVE page is older than CVRF-CVE file.
skipping CVE-2015-4731 as CVE page is older than CVRF-CVE file.
skipping CVE-2015-4729 as CVE page is older than CVRF-CVE file.
skipping CVE-2015-4700 as CVE page is older than CVRF-CVE file.
skipping CVE-2015-4692 as CVE page is older than CVRF-CVE file.
no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2015-4646
no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2015-4645
skipping CVE-2015-4518 as CVE page is older than CVRF-CVE file.
skipping CVE-2015-4515 as CVE page is older than CVRF-CVE file.
skipping CVE-2015-4514 as CVE page is older than CVRF-CVE file.
skipping CVE-2015-4513 as CVE page is older than CVRF-CVE file.
skipping CVE-2015-4167 as CVE page is older than CVRF-CVE file.
skipping CVE-2015-4036 as CVE page is older than CVRF-CVE file.
skipping CVE-2015-4000 as CVE page is older than CVRF-CVE file.
no cpe found for SUSE Cloud 2.0 in CVE-2015-3988
no cpe found for SUSE Cloud 2.0 in CVE-2015-3982
skipping CVE-2015-3636 as CVE page is older than CVRF-CVE file.
skipping CVE-2015-3622 as CVE page is older than CVRF-CVE file.
no cpe found for SUSE Studio Onsite Runner 1.3 in CVE-2015-3448
skipping CVE-2015-3420 as CVE page is older than CVRF-CVE file.
skipping CVE-2015-3416 as CVE page is older than CVRF-CVE file.
no cpe found for SUSE Linux Enterprise Real Time 11 SP3 in CVE-2015-3339
skipping CVE-2015-3331 as CVE page is older than CVRF-CVE file.
no cpe found for SUSE Cloud 2.0 in CVE-2015-3289
skipping CVE-2015-3291 as CVE page is older than CVRF-CVE file.
skipping CVE-2015-3290 as CVE page is older than CVRF-CVE file.
skipping CVE-2015-3288 as CVE page is older than CVRF-CVE file.
no cpe found for SUSE Cloud 2.0 in CVE-2015-3280
skipping CVE-2015-3247 as CVE page is older than CVRF-CVE file.
skipping CVE-2015-3243 as CVE page is older than CVRF-CVE file.
skipping CVE-2015-3239 as CVE page is older than CVRF-CVE file.
skipping CVE-2015-3237 as CVE page is older than CVRF-CVE file.
skipping CVE-2015-3236 as CVE page is older than CVRF-CVE file.
skipping CVE-2015-3225 as CVE page is older than CVRF-CVE file.
skipping CVE-2015-3223 as CVE page is older than CVRF-CVE file.
no cpe found for SUSE Cloud 2.0 in CVE-2015-3219
skipping CVE-2015-3217 as CVE page is older than CVRF-CVE file.
skipping CVE-2015-3216 as CVE page is older than CVRF-CVE file.
skipping CVE-2015-3212 as CVE page is older than CVRF-CVE file.
skipping CVE-2015-3210 as CVE page is older than CVRF-CVE file.
skipping CVE-2015-3197 as CVE page is older than CVRF-CVE file.
skipping CVE-2015-3196 as CVE page is older than CVRF-CVE file.
skipping CVE-2015-3195 as CVE page is older than CVRF-CVE file.
skipping CVE-2015-3194 as CVE page is older than CVRF-CVE file.
skipping CVE-2015-3193 as CVE page is older than CVRF-CVE file.
skipping CVE-2015-3185 as CVE page is older than CVRF-CVE file.
skipping CVE-2015-3164 as CVE page is older than CVRF-CVE file.
skipping CVE-2015-3152 as CVE page is older than CVRF-CVE file.
skipping CVE-2015-3148 as CVE page is older than CVRF-CVE file.
skipping CVE-2015-3146 as CVE page is older than CVRF-CVE file.
skipping CVE-2015-3145 as CVE page is older than CVRF-CVE file.
skipping CVE-2015-3144 as CVE page is older than CVRF-CVE file.
skipping CVE-2015-3143 as CVE page is older than CVRF-CVE file.
skipping CVE-2015-2925 as CVE page is older than CVRF-CVE file.
skipping CVE-2015-2924 as CVE page is older than CVRF-CVE file.
skipping CVE-2015-2922 as CVE page is older than CVRF-CVE file.
skipping CVE-2015-2908 as CVE page is older than CVRF-CVE file.
skipping CVE-2015-2907 as CVE page is older than CVRF-CVE file.
skipping CVE-2015-2906 as CVE page is older than CVRF-CVE file.
no cpe found for SUSE Linux Enterprise Real Time 11 SP3 in CVE-2015-2830
skipping CVE-2015-2808 as CVE page is older than CVRF-CVE file.
skipping CVE-2015-2806 as CVE page is older than CVRF-CVE file.
skipping CVE-2015-2698 as CVE page is older than CVRF-CVE file.
skipping CVE-2015-2697 as CVE page is older than CVRF-CVE file.
skipping CVE-2015-2696 as CVE page is older than CVRF-CVE file.
skipping CVE-2015-2695 as CVE page is older than CVRF-CVE file.
skipping CVE-2015-2694 as CVE page is older than CVRF-CVE file.
skipping CVE-2015-2666 as CVE page is older than CVRF-CVE file.
skipping CVE-2015-2664 as CVE page is older than CVRF-CVE file.
skipping CVE-2015-2659 as CVE page is older than CVRF-CVE file.
skipping CVE-2015-2638 as CVE page is older than CVRF-CVE file.
skipping CVE-2015-2637 as CVE page is older than CVRF-CVE file.
skipping CVE-2015-2632 as CVE page is older than CVRF-CVE file.
skipping CVE-2015-2628 as CVE page is older than CVRF-CVE file.
skipping CVE-2015-2627 as CVE page is older than CVRF-CVE file.
skipping CVE-2015-2625 as CVE page is older than CVRF-CVE file.
skipping CVE-2015-2621 as CVE page is older than CVRF-CVE file.
skipping CVE-2015-2619 as CVE page is older than CVRF-CVE file.
skipping CVE-2015-2613 as CVE page is older than CVRF-CVE file.
skipping CVE-2015-2601 as CVE page is older than CVRF-CVE file.
skipping CVE-2015-2597 as CVE page is older than CVRF-CVE file.
skipping CVE-2015-2596 as CVE page is older than CVRF-CVE file.
skipping CVE-2015-2590 as CVE page is older than CVRF-CVE file.
skipping CVE-2015-2576 as CVE page is older than CVRF-CVE file.
skipping CVE-2015-2575 as CVE page is older than CVRF-CVE file.
skipping CVE-2015-2573 as CVE page is older than CVRF-CVE file.
skipping CVE-2015-2571 as CVE page is older than CVRF-CVE file.
skipping CVE-2015-2568 as CVE page is older than CVRF-CVE file.
skipping CVE-2015-2567 as CVE page is older than CVRF-CVE file.
skipping CVE-2015-2566 as CVE page is older than CVRF-CVE file.
skipping CVE-2015-2328 as CVE page is older than CVRF-CVE file.
skipping CVE-2015-2327 as CVE page is older than CVRF-CVE file.
skipping CVE-2015-2326 as CVE page is older than CVRF-CVE file.
skipping CVE-2015-2325 as CVE page is older than CVRF-CVE file.
no cpe found for SUSE Cloud 2.0 in CVE-2015-2316
No V5 entry found for CVE-2015-2309 / /home/securitybot/prod/cve-database/cvelistV5/cves/2015/2xxxx/CVE-2015-2309.json:No such file or directory
skipping CVE-2015-2304 as CVE page is older than CVRF-CVE file.
no cpe found for SUSE Cloud 2.0 in CVE-2015-2296
no cpe found for SUSE Linux Enterprise Real Time 11 SP3 in CVE-2015-2150
no cpe found for SUSE Linux Enterprise Real Time 11 SP3 in CVE-2015-2042
no cpe found for SUSE Linux Enterprise Real Time 11 SP3 in CVE-2015-2041
skipping CVE-2015-1931 as CVE page is older than CVRF-CVE file.
skipping CVE-2015-1867 as CVE page is older than CVRF-CVE file.
no cpe found for SUSE Cloud 2.0 in CVE-2015-1856
skipping CVE-2015-1855 as CVE page is older than CVRF-CVE file.
no cpe found for SUSE Cloud 2.0 in CVE-2015-1852
no cpe found for SUSE Cloud 2.0 in CVE-2015-1851
no cpe found for SUSE Cloud 2.0 in CVE-2015-1820
skipping CVE-2015-1819 as CVE page is older than CVRF-CVE file.
skipping CVE-2015-1805 as CVE page is older than CVRF-CVE file.
skipping CVE-2015-1804 as CVE page is older than CVRF-CVE file.
skipping CVE-2015-1803 as CVE page is older than CVRF-CVE file.
skipping CVE-2015-1802 as CVE page is older than CVRF-CVE file.
skipping CVE-2015-1794 as CVE page is older than CVRF-CVE file.
skipping CVE-2015-1793 as CVE page is older than CVRF-CVE file.
skipping CVE-2015-1792 as CVE page is older than CVRF-CVE file.
skipping CVE-2015-1791 as CVE page is older than CVRF-CVE file.
skipping CVE-2015-1790 as CVE page is older than CVRF-CVE file.
skipping CVE-2015-1789 as CVE page is older than CVRF-CVE file.
skipping CVE-2015-1788 as CVE page is older than CVRF-CVE file.
skipping CVE-2015-1782 as CVE page is older than CVRF-CVE file.
skipping CVE-2015-1781 as CVE page is older than CVRF-CVE file.
skipping CVE-2015-1607 as CVE page is older than CVRF-CVE file.
skipping CVE-2015-1606 as CVE page is older than CVRF-CVE file.
skipping CVE-2015-1593 as CVE page is older than CVRF-CVE file.
skipping CVE-2015-1572 as CVE page is older than CVRF-CVE file.
skipping CVE-2015-1547 as CVE page is older than CVRF-CVE file.
skipping CVE-2015-1546 as CVE page is older than CVRF-CVE file.
skipping CVE-2015-1545 as CVE page is older than CVRF-CVE file.
skipping CVE-2015-1472 as CVE page is older than CVRF-CVE file.
skipping CVE-2015-1465 as CVE page is older than CVRF-CVE file.
skipping CVE-2015-1421 as CVE page is older than CVRF-CVE file.
skipping CVE-2015-1420 as CVE page is older than CVRF-CVE file.
skipping CVE-2015-1350 as CVE page is older than CVRF-CVE file.
no cpe found for SUSE Linux Enterprise Real Time 11 SP4 in CVE-2015-1339
skipping CVE-2015-0840 as CVE page is older than CVRF-CVE file.
skipping CVE-2015-0839 as CVE page is older than CVRF-CVE file.
no cpe found for SUSE Liberty Linux 7 LTSS in CVE-2015-0816
no cpe found for SUSE Liberty Linux 7 LTSS in CVE-2015-0815
no cpe found for SUSE Liberty Linux 7 LTSS in CVE-2015-0813
no cpe found for SUSE Liberty Linux 7 LTSS in CVE-2015-0807
no cpe found for SUSE Liberty Linux 7 LTSS in CVE-2015-0801
no cpe found for SUSE Linux Enterprise Real Time 11 SP3 in CVE-2015-0777
skipping CVE-2015-0511 as CVE page is older than CVRF-CVE file.
skipping CVE-2015-0508 as CVE page is older than CVRF-CVE file.
skipping CVE-2015-0507 as CVE page is older than CVRF-CVE file.
skipping CVE-2015-0506 as CVE page is older than CVRF-CVE file.
skipping CVE-2015-0505 as CVE page is older than CVRF-CVE file.
skipping CVE-2015-0503 as CVE page is older than CVRF-CVE file.
skipping CVE-2015-0501 as CVE page is older than CVRF-CVE file.
skipping CVE-2015-0500 as CVE page is older than CVRF-CVE file.
skipping CVE-2015-0499 as CVE page is older than CVRF-CVE file.
skipping CVE-2015-0498 as CVE page is older than CVRF-CVE file.
skipping CVE-2015-0441 as CVE page is older than CVRF-CVE file.
skipping CVE-2015-0439 as CVE page is older than CVRF-CVE file.
skipping CVE-2015-0438 as CVE page is older than CVRF-CVE file.
skipping CVE-2015-0433 as CVE page is older than CVRF-CVE file.
skipping CVE-2015-0432 as CVE page is older than CVRF-CVE file.
skipping CVE-2015-0423 as CVE page is older than CVRF-CVE file.
skipping CVE-2015-0411 as CVE page is older than CVRF-CVE file.
skipping CVE-2015-0409 as CVE page is older than CVRF-CVE file.
skipping CVE-2015-0405 as CVE page is older than CVRF-CVE file.
skipping CVE-2015-0391 as CVE page is older than CVRF-CVE file.
skipping CVE-2015-0385 as CVE page is older than CVRF-CVE file.
skipping CVE-2015-0382 as CVE page is older than CVRF-CVE file.
skipping CVE-2015-0381 as CVE page is older than CVRF-CVE file.
skipping CVE-2015-0374 as CVE page is older than CVRF-CVE file.
skipping CVE-2015-0293 as CVE page is older than CVRF-CVE file.
skipping CVE-2015-0292 as CVE page is older than CVRF-CVE file.
skipping CVE-2015-0289 as CVE page is older than CVRF-CVE file.
skipping CVE-2015-0288 as CVE page is older than CVRF-CVE file.
skipping CVE-2015-0287 as CVE page is older than CVRF-CVE file.
skipping CVE-2015-0286 as CVE page is older than CVRF-CVE file.
skipping CVE-2015-0275 as CVE page is older than CVRF-CVE file.
skipping CVE-2015-0274 as CVE page is older than CVRF-CVE file.
no cpe found for SUSE Linux Enterprise Real Time 11 SP3 in CVE-2015-0272
no cpe found for SUSE Linux Enterprise Real Time 11 SP4 in CVE-2015-0272
skipping CVE-2015-0254 as CVE page is older than CVRF-CVE file.
skipping CVE-2015-0253 as CVE page is older than CVRF-CVE file.
skipping CVE-2015-0247 as CVE page is older than CVRF-CVE file.
skipping CVE-2015-0245 as CVE page is older than CVRF-CVE file.
skipping CVE-2015-0240 as CVE page is older than CVRF-CVE file.
skipping CVE-2015-0236 as CVE page is older than CVRF-CVE file.
skipping CVE-2015-0228 as CVE page is older than CVRF-CVE file.
skipping CVE-2015-0209 as CVE page is older than CVRF-CVE file.
skipping CVE-2015-0206 as CVE page is older than CVRF-CVE file.
skipping CVE-2015-0205 as CVE page is older than CVRF-CVE file.
skipping CVE-2015-0204 as CVE page is older than CVRF-CVE file.
skipping CVE-2015-0138 as CVE page is older than CVRF-CVE file.
skipping CVE-2014-9922 as CVE page is older than CVRF-CVE file.
skipping CVE-2014-9914 as CVE page is older than CVRF-CVE file.
skipping CVE-2014-9907 as CVE page is older than CVRF-CVE file.
skipping CVE-2014-9904 as CVE page is older than CVRF-CVE file.
no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2014-9862
skipping CVE-2014-9854 as CVE page is older than CVRF-CVE file.
skipping CVE-2014-9853 as CVE page is older than CVRF-CVE file.
skipping CVE-2014-9852 as CVE page is older than CVRF-CVE file.
skipping CVE-2014-9851 as CVE page is older than CVRF-CVE file.
skipping CVE-2014-9850 as CVE page is older than CVRF-CVE file.
skipping CVE-2014-9849 as CVE page is older than CVRF-CVE file.
skipping CVE-2014-9847 as CVE page is older than CVRF-CVE file.
skipping CVE-2014-9846 as CVE page is older than CVRF-CVE file.
skipping CVE-2014-9845 as CVE page is older than CVRF-CVE file.
skipping CVE-2014-9844 as CVE page is older than CVRF-CVE file.
skipping CVE-2014-9843 as CVE page is older than CVRF-CVE file.
skipping CVE-2014-9842 as CVE page is older than CVRF-CVE file.
skipping CVE-2014-9841 as CVE page is older than CVRF-CVE file.
skipping CVE-2014-9840 as CVE page is older than CVRF-CVE file.
skipping CVE-2014-9839 as CVE page is older than CVRF-CVE file.
skipping CVE-2014-9838 as CVE page is older than CVRF-CVE file.
skipping CVE-2014-9837 as CVE page is older than CVRF-CVE file.
skipping CVE-2014-9836 as CVE page is older than CVRF-CVE file.
skipping CVE-2014-9835 as CVE page is older than CVRF-CVE file.
skipping CVE-2014-9834 as CVE page is older than CVRF-CVE file.
skipping CVE-2014-9833 as CVE page is older than CVRF-CVE file.
skipping CVE-2014-9832 as CVE page is older than CVRF-CVE file.
skipping CVE-2014-9831 as CVE page is older than CVRF-CVE file.
skipping CVE-2014-9830 as CVE page is older than CVRF-CVE file.
skipping CVE-2014-9829 as CVE page is older than CVRF-CVE file.
skipping CVE-2014-9828 as CVE page is older than CVRF-CVE file.
skipping CVE-2014-9826 as CVE page is older than CVRF-CVE file.
skipping CVE-2014-9825 as CVE page is older than CVRF-CVE file.
skipping CVE-2014-9824 as CVE page is older than CVRF-CVE file.
skipping CVE-2014-9823 as CVE page is older than CVRF-CVE file.
skipping CVE-2014-9822 as CVE page is older than CVRF-CVE file.
skipping CVE-2014-9821 as CVE page is older than CVRF-CVE file.
skipping CVE-2014-9820 as CVE page is older than CVRF-CVE file.
skipping CVE-2014-9819 as CVE page is older than CVRF-CVE file.
skipping CVE-2014-9818 as CVE page is older than CVRF-CVE file.
skipping CVE-2014-9817 as CVE page is older than CVRF-CVE file.
skipping CVE-2014-9816 as CVE page is older than CVRF-CVE file.
skipping CVE-2014-9815 as CVE page is older than CVRF-CVE file.
skipping CVE-2014-9814 as CVE page is older than CVRF-CVE file.
skipping CVE-2014-9813 as CVE page is older than CVRF-CVE file.
skipping CVE-2014-9812 as CVE page is older than CVRF-CVE file.
skipping CVE-2014-9811 as CVE page is older than CVRF-CVE file.
skipping CVE-2014-9810 as CVE page is older than CVRF-CVE file.
skipping CVE-2014-9809 as CVE page is older than CVRF-CVE file.
skipping CVE-2014-9808 as CVE page is older than CVRF-CVE file.
skipping CVE-2014-9807 as CVE page is older than CVRF-CVE file.
skipping CVE-2014-9806 as CVE page is older than CVRF-CVE file.
skipping CVE-2014-9805 as CVE page is older than CVRF-CVE file.
skipping CVE-2014-9761 as CVE page is older than CVRF-CVE file.
skipping CVE-2014-9750 as CVE page is older than CVRF-CVE file.
skipping CVE-2014-9731 as CVE page is older than CVRF-CVE file.
skipping CVE-2014-9730 as CVE page is older than CVRF-CVE file.
skipping CVE-2014-9729 as CVE page is older than CVRF-CVE file.
skipping CVE-2014-9728 as CVE page is older than CVRF-CVE file.
skipping CVE-2014-9717 as CVE page is older than CVRF-CVE file.
skipping CVE-2014-9710 as CVE page is older than CVRF-CVE file.
no cpe found for SUSE Linux Enterprise Real Time 11 SP3 in CVE-2014-9683
skipping CVE-2014-9672 as CVE page is older than CVRF-CVE file.
skipping CVE-2014-9668 as CVE page is older than CVRF-CVE file.
skipping CVE-2014-9666 as CVE page is older than CVRF-CVE file.
skipping CVE-2014-9665 as CVE page is older than CVRF-CVE file.
skipping CVE-2014-9662 as CVE page is older than CVRF-CVE file.
skipping CVE-2014-9659 as CVE page is older than CVRF-CVE file.
skipping CVE-2014-9656 as CVE page is older than CVRF-CVE file.
skipping CVE-2014-9655 as CVE page is older than CVRF-CVE file.
skipping CVE-2014-9645 as CVE page is older than CVRF-CVE file.
skipping CVE-2014-9644 as CVE page is older than CVRF-CVE file.
no cpe found for SUSE Cloud 2.0 in CVE-2014-9623
no cpe found for SUSE Cloud 2.0 in CVE-2014-9568
skipping CVE-2014-9585 as CVE page is older than CVRF-CVE file.
skipping CVE-2014-9584 as CVE page is older than CVRF-CVE file.
skipping CVE-2014-9529 as CVE page is older than CVRF-CVE file.
no cpe found for SUSE Cloud 2.0 in CVE-2014-9494
no cpe found for SUSE Cloud 2.0 in CVE-2014-9493
skipping CVE-2014-9423 as CVE page is older than CVRF-CVE file.
skipping CVE-2014-9422 as CVE page is older than CVRF-CVE file.
skipping CVE-2014-9421 as CVE page is older than CVRF-CVE file.
skipping CVE-2014-9420 as CVE page is older than CVRF-CVE file.
skipping CVE-2014-9419 as CVE page is older than CVRF-CVE file.
no cpe found for SUSE Linux Enterprise Real Time 11 SP3 in CVE-2014-9322
skipping CVE-2014-9298 as CVE page is older than CVRF-CVE file.
skipping CVE-2014-9297 as CVE page is older than CVRF-CVE file.
no cpe found for SUSE Liberty Linux 7 LTSS in CVE-2014-9130
no cpe found for SUSE OpenStack Cloud 3.0 in CVE-2014-9130
--- /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2014-9130.xml 2024-09-15 03:47:40.492403000 +0200
+++ /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2014-9130.xml.new 2024-10-29 03:24:48.813409000 +0100
@@ -14,13 +14,13 @@
1
- 96
- 2024-09-15T01:47:40Z
+ 97
+ 2024-10-29T02:24:48Z
current
2021-05-30T13:24:31Z
- 2024-09-15T01:47:40Z
+ 2024-10-29T02:24:48Z
cve-database/bin/generate-cvrf-cve.pl
2020-12-27T01:00:00Z
@@ -1783,6 +1783,9 @@
libyaml-0-2-0.1.6-4.1 as a component of Image SLES12-SP5-GCE-BYOS
+
+ python3-PyYAML-5.1.2-3.3.1 as a component of Image SLES12-SP5-GCE-BYOS
+
libyaml-0-2-0.1.6-4.1 as a component of Image SLES12-SP5-GCE-On-Demand
@@ -2610,6 +2613,7 @@
Image SLES12-SP5-EC2-SAP-On-Demand:libyaml-0-2-0.1.6-4.1
Image SLES12-SP5-EC2-SAP-On-Demand:python3-PyYAML-5.1.2-3.3.1
Image SLES12-SP5-GCE-BYOS:libyaml-0-2-0.1.6-4.1
+ Image SLES12-SP5-GCE-BYOS:python3-PyYAML-5.1.2-3.3.1
Image SLES12-SP5-GCE-On-Demand:libyaml-0-2-0.1.6-4.1
Image SLES12-SP5-GCE-SAP-BYOS:libyaml-0-2-0.1.6-4.1
Image SLES12-SP5-GCE-SAP-BYOS:python3-PyYAML-5.1.2-3.3.1
skipping CVE-2014-9114 as CVE page is older than CVRF-CVE file.
no cpe found for SUSE Linux Enterprise Real Time 11 SP3 in CVE-2014-9090
no cpe found for SUSE Liberty Linux 7 LTSS in CVE-2014-9028
skipping CVE-2014-8991 as CVE page is older than CVRF-CVE file.
no cpe found for SUSE Liberty Linux 7 LTSS in CVE-2014-8962
skipping CVE-2014-8964 as CVE page is older than CVRF-CVE file.
skipping CVE-2014-8884 as CVE page is older than CVRF-CVE file.
No V5 entry found for CVE-2014-8692 / /home/securitybot/prod/cve-database/cvelistV5/cves/2014/8xxxx/CVE-2014-8692.json:No such file or directory
skipping CVE-2014-8709 as CVE page is older than CVRF-CVE file.
skipping CVE-2014-8680 as CVE page is older than CVRF-CVE file.
no cpe found for HPE Helion OpenStack Cloud 8 in CVE-2014-8650
no cpe found for SUSE OpenStack Cloud 3.0 in CVE-2014-8583
skipping CVE-2014-8564 as CVE page is older than CVRF-CVE file.
skipping CVE-2014-8559 as CVE page is older than CVRF-CVE file.
skipping CVE-2014-8500 as CVE page is older than CVRF-CVE file.
skipping CVE-2014-8369 as CVE page is older than CVRF-CVE file.
skipping CVE-2014-8275 as CVE page is older than CVRF-CVE file.
skipping CVE-2014-8184 as CVE page is older than CVRF-CVE file.
no cpe found for SUSE Linux Enterprise Real Time 11 SP3 in CVE-2014-8159
skipping CVE-2014-8160 as CVE page is older than CVRF-CVE file.
skipping CVE-2014-8150 as CVE page is older than CVRF-CVE file.
skipping CVE-2014-8148 as CVE page is older than CVRF-CVE file.
skipping CVE-2014-8143 as CVE page is older than CVRF-CVE file.
skipping CVE-2014-8134 as CVE page is older than CVRF-CVE file.
skipping CVE-2014-8133 as CVE page is older than CVRF-CVE file.
skipping CVE-2014-8132 as CVE page is older than CVRF-CVE file.
skipping CVE-2014-8131 as CVE page is older than CVRF-CVE file.
no cpe found for SUSE Cloud 2.0 in CVE-2014-8124
skipping CVE-2014-8121 as CVE page is older than CVRF-CVE file.
skipping CVE-2014-8119 as CVE page is older than CVRF-CVE file.
skipping CVE-2014-8109 as CVE page is older than CVRF-CVE file.
skipping CVE-2014-8086 as CVE page is older than CVRF-CVE file.
skipping CVE-2014-7975 as CVE page is older than CVRF-CVE file.
skipping CVE-2014-7970 as CVE page is older than CVRF-CVE file.
skipping CVE-2014-7842 as CVE page is older than CVRF-CVE file.
skipping CVE-2014-7841 as CVE page is older than CVRF-CVE file.
no cpe found for SUSE Linux Enterprise Real Time 11 SP3 in CVE-2014-7826
skipping CVE-2014-7824 as CVE page is older than CVRF-CVE file.
skipping CVE-2014-7823 as CVE page is older than CVRF-CVE file.
skipping CVE-2014-7822 as CVE page is older than CVRF-CVE file.
no cpe found for SUSE OpenStack Cloud 3.0 in CVE-2014-7819
skipping CVE-2014-7817 as CVE page is older than CVRF-CVE file.
skipping CVE-2014-7283 as CVE page is older than CVRF-CVE file.
skipping CVE-2014-7187 as CVE page is older than CVRF-CVE file.
skipping CVE-2014-7186 as CVE page is older than CVRF-CVE file.
skipping CVE-2014-7185 as CVE page is older than CVRF-CVE file.
skipping CVE-2014-7169 as CVE page is older than CVRF-CVE file.
skipping CVE-2014-6568 as CVE page is older than CVRF-CVE file.
skipping CVE-2014-6564 as CVE page is older than CVRF-CVE file.
skipping CVE-2014-6559 as CVE page is older than CVRF-CVE file.
skipping CVE-2014-6558 as CVE page is older than CVRF-CVE file.
skipping CVE-2014-6555 as CVE page is older than CVRF-CVE file.
skipping CVE-2014-6551 as CVE page is older than CVRF-CVE file.
skipping CVE-2014-6531 as CVE page is older than CVRF-CVE file.
skipping CVE-2014-6530 as CVE page is older than CVRF-CVE file.
skipping CVE-2014-6527 as CVE page is older than CVRF-CVE file.
skipping CVE-2014-6520 as CVE page is older than CVRF-CVE file.
skipping CVE-2014-6515 as CVE page is older than CVRF-CVE file.
skipping CVE-2014-6512 as CVE page is older than CVRF-CVE file.
skipping CVE-2014-6511 as CVE page is older than CVRF-CVE file.
skipping CVE-2014-6507 as CVE page is older than CVRF-CVE file.
skipping CVE-2014-6506 as CVE page is older than CVRF-CVE file.
skipping CVE-2014-6505 as CVE page is older than CVRF-CVE file.
skipping CVE-2014-6503 as CVE page is older than CVRF-CVE file.
skipping CVE-2014-6502 as CVE page is older than CVRF-CVE file.
skipping CVE-2014-6500 as CVE page is older than CVRF-CVE file.
skipping CVE-2014-6496 as CVE page is older than CVRF-CVE file.
skipping CVE-2014-6495 as CVE page is older than CVRF-CVE file.
skipping CVE-2014-6494 as CVE page is older than CVRF-CVE file.
skipping CVE-2014-6493 as CVE page is older than CVRF-CVE file.
skipping CVE-2014-6492 as CVE page is older than CVRF-CVE file.
skipping CVE-2014-6491 as CVE page is older than CVRF-CVE file.
skipping CVE-2014-6489 as CVE page is older than CVRF-CVE file.
skipping CVE-2014-6484 as CVE page is older than CVRF-CVE file.
skipping CVE-2014-6478 as CVE page is older than CVRF-CVE file.
skipping CVE-2014-6474 as CVE page is older than CVRF-CVE file.
skipping CVE-2014-6469 as CVE page is older than CVRF-CVE file.
skipping CVE-2014-6464 as CVE page is older than CVRF-CVE file.
skipping CVE-2014-6463 as CVE page is older than CVRF-CVE file.
skipping CVE-2014-6458 as CVE page is older than CVRF-CVE file.
skipping CVE-2014-6457 as CVE page is older than CVRF-CVE file.
skipping CVE-2014-6456 as CVE page is older than CVRF-CVE file.
skipping CVE-2014-6418 as CVE page is older than CVRF-CVE file.
skipping CVE-2014-6410 as CVE page is older than CVRF-CVE file.
skipping CVE-2014-6278 as CVE page is older than CVRF-CVE file.
skipping CVE-2014-6277 as CVE page is older than CVRF-CVE file.
skipping CVE-2014-6272 as CVE page is older than CVRF-CVE file.
skipping CVE-2014-6271 as CVE page is older than CVRF-CVE file.
skipping CVE-2014-6055 as CVE page is older than CVRF-CVE file.
skipping CVE-2014-6054 as CVE page is older than CVRF-CVE file.
skipping CVE-2014-6053 as CVE page is older than CVRF-CVE file.
skipping CVE-2014-6052 as CVE page is older than CVRF-CVE file.
skipping CVE-2014-6051 as CVE page is older than CVRF-CVE file.
skipping CVE-2014-5472 as CVE page is older than CVRF-CVE file.
skipping CVE-2014-5471 as CVE page is older than CVRF-CVE file.
skipping CVE-2014-5461 as CVE page is older than CVRF-CVE file.
skipping CVE-2014-5355 as CVE page is older than CVRF-CVE file.
skipping CVE-2014-5354 as CVE page is older than CVRF-CVE file.
skipping CVE-2014-5353 as CVE page is older than CVRF-CVE file.
skipping CVE-2014-5352 as CVE page is older than CVRF-CVE file.
skipping CVE-2014-5326 as CVE page is older than CVRF-CVE file.
skipping CVE-2014-5270 as CVE page is older than CVRF-CVE file.
skipping CVE-2014-5165 as CVE page is older than CVRF-CVE file.
skipping CVE-2014-5164 as CVE page is older than CVRF-CVE file.
skipping CVE-2014-5163 as CVE page is older than CVRF-CVE file.
skipping CVE-2014-5162 as CVE page is older than CVRF-CVE file.
skipping CVE-2014-5161 as CVE page is older than CVRF-CVE file.
skipping CVE-2014-5139 as CVE page is older than CVRF-CVE file.
skipping CVE-2014-5077 as CVE page is older than CVRF-CVE file.
skipping CVE-2014-5045 as CVE page is older than CVRF-CVE file.
skipping CVE-2014-5044 as CVE page is older than CVRF-CVE file.
no cpe found for SUSE Liberty Linux 7 LTSS in CVE-2014-5033
skipping CVE-2014-5031 as CVE page is older than CVRF-CVE file.
skipping CVE-2014-5030 as CVE page is older than CVRF-CVE file.
skipping CVE-2014-5029 as CVE page is older than CVRF-CVE file.
skipping CVE-2014-4975 as CVE page is older than CVRF-CVE file.
skipping CVE-2014-4943 as CVE page is older than CVRF-CVE file.
no cpe found for SUSE Linux Enterprise Real Time 11 SP3 in CVE-2014-4699
no cpe found for SUSE Linux Enterprise Real Time 11 SP3 in CVE-2014-4656
skipping CVE-2014-4667 as CVE page is older than CVRF-CVE file.
no cpe found for SUSE Linux Enterprise Real Time 11 SP3 in CVE-2014-4655
no cpe found for SUSE Linux Enterprise Real Time 11 SP3 in CVE-2014-4654
no cpe found for SUSE Linux Enterprise Real Time 11 SP3 in CVE-2014-4653
no cpe found for SUSE Linux Enterprise Real Time 11 SP3 in CVE-2014-4652
--- /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2014-4650.xml 2024-10-23 04:08:21.993078000 +0200
+++ /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2014-4650.xml.new 2024-10-29 03:27:00.477512000 +0100
@@ -14,13 +14,13 @@
1
- 140
- 2024-10-23T02:08:21Z
+ 141
+ 2024-10-29T02:26:59Z
current
2021-05-30T13:22:08Z
- 2024-10-23T02:08:21Z
+ 2024-10-29T02:26:59Z
cve-database/bin/generate-cvrf-cve.pl
2020-12-27T01:00:00Z
@@ -2667,6 +2667,24 @@
python313-x86-64-v3-3.13.0~b3-1.1
+
+ python314-3.14.0~a1-1.1
+
+
+ python314-curses-3.14.0~a1-1.1
+
+
+ python314-dbm-3.14.0~a1-1.1
+
+
+ python314-idle-3.14.0~a1-1.1
+
+
+ python314-tk-3.14.0~a1-1.1
+
+
+ python314-x86-64-v3-3.14.0~a1-1.1
+
python36
@@ -5760,6 +5778,24 @@
python313-x86-64-v3-3.13.0~b3-1.1 as a component of openSUSE Tumbleweed
+
+ python314-3.14.0~a1-1.1 as a component of openSUSE Tumbleweed
+
+
+ python314-curses-3.14.0~a1-1.1 as a component of openSUSE Tumbleweed
+
+
+ python314-dbm-3.14.0~a1-1.1 as a component of openSUSE Tumbleweed
+
+
+ python314-idle-3.14.0~a1-1.1 as a component of openSUSE Tumbleweed
+
+
+ python314-tk-3.14.0~a1-1.1 as a component of openSUSE Tumbleweed
+
+
+ python314-x86-64-v3-3.14.0~a1-1.1 as a component of openSUSE Tumbleweed
+
python36-3.6.15-1.1 as a component of openSUSE Tumbleweed
@@ -7481,6 +7517,12 @@
openSUSE Tumbleweed:python313-idle-3.13.0~b3-1.1
openSUSE Tumbleweed:python313-tk-3.13.0~b3-1.1
openSUSE Tumbleweed:python313-x86-64-v3-3.13.0~b3-1.1
+ openSUSE Tumbleweed:python314-3.14.0~a1-1.1
+ openSUSE Tumbleweed:python314-curses-3.14.0~a1-1.1
+ openSUSE Tumbleweed:python314-dbm-3.14.0~a1-1.1
+ openSUSE Tumbleweed:python314-idle-3.14.0~a1-1.1
+ openSUSE Tumbleweed:python314-tk-3.14.0~a1-1.1
+ openSUSE Tumbleweed:python314-x86-64-v3-3.14.0~a1-1.1
openSUSE Tumbleweed:python36-3.6.15-1.1
openSUSE Tumbleweed:python36-32bit-3.6.15-1.1
openSUSE Tumbleweed:python36-curses-3.6.15-1.1
skipping CVE-2014-4617 as CVE page is older than CVRF-CVE file.
no cpe found for SUSE OpenStack Cloud 3.0 in CVE-2014-4615
skipping CVE-2014-4611 as CVE page is older than CVRF-CVE file.
skipping CVE-2014-4608 as CVE page is older than CVRF-CVE file.
skipping CVE-2014-4607 as CVE page is older than CVRF-CVE file.
skipping CVE-2014-4508 as CVE page is older than CVRF-CVE file.
skipping CVE-2014-4345 as CVE page is older than CVRF-CVE file.
skipping CVE-2014-4344 as CVE page is older than CVRF-CVE file.
skipping CVE-2014-4343 as CVE page is older than CVRF-CVE file.
skipping CVE-2014-4342 as CVE page is older than CVRF-CVE file.
skipping CVE-2014-4341 as CVE page is older than CVRF-CVE file.
skipping CVE-2014-4330 as CVE page is older than CVRF-CVE file.
skipping CVE-2014-4288 as CVE page is older than CVRF-CVE file.
skipping CVE-2014-4287 as CVE page is older than CVRF-CVE file.
skipping CVE-2014-4274 as CVE page is older than CVRF-CVE file.
skipping CVE-2014-4268 as CVE page is older than CVRF-CVE file.
skipping CVE-2014-4266 as CVE page is older than CVRF-CVE file.
skipping CVE-2014-4265 as CVE page is older than CVRF-CVE file.
skipping CVE-2014-4264 as CVE page is older than CVRF-CVE file.
skipping CVE-2014-4263 as CVE page is older than CVRF-CVE file.
skipping CVE-2014-4262 as CVE page is older than CVRF-CVE file.
skipping CVE-2014-4260 as CVE page is older than CVRF-CVE file.
skipping CVE-2014-4258 as CVE page is older than CVRF-CVE file.
skipping CVE-2014-4252 as CVE page is older than CVRF-CVE file.
skipping CVE-2014-4247 as CVE page is older than CVRF-CVE file.
skipping CVE-2014-4244 as CVE page is older than CVRF-CVE file.
skipping CVE-2014-4243 as CVE page is older than CVRF-CVE file.
skipping CVE-2014-4240 as CVE page is older than CVRF-CVE file.
skipping CVE-2014-4238 as CVE page is older than CVRF-CVE file.
skipping CVE-2014-4233 as CVE page is older than CVRF-CVE file.
skipping CVE-2014-4227 as CVE page is older than CVRF-CVE file.
skipping CVE-2014-4223 as CVE page is older than CVRF-CVE file.
skipping CVE-2014-4221 as CVE page is older than CVRF-CVE file.
skipping CVE-2014-4220 as CVE page is older than CVRF-CVE file.
skipping CVE-2014-4219 as CVE page is older than CVRF-CVE file.
skipping CVE-2014-4218 as CVE page is older than CVRF-CVE file.
skipping CVE-2014-4216 as CVE page is older than CVRF-CVE file.
skipping CVE-2014-4214 as CVE page is older than CVRF-CVE file.
skipping CVE-2014-4209 as CVE page is older than CVRF-CVE file.
skipping CVE-2014-4208 as CVE page is older than CVRF-CVE file.
skipping CVE-2014-4207 as CVE page is older than CVRF-CVE file.
skipping CVE-2014-4171 as CVE page is older than CVRF-CVE file.
skipping CVE-2014-4157 as CVE page is older than CVRF-CVE file.
no cpe found for SUSE Linux Enterprise Real Time 11 SP3 in CVE-2014-4027
skipping CVE-2014-4020 as CVE page is older than CVRF-CVE file.
skipping CVE-2014-3970 as CVE page is older than CVRF-CVE file.
skipping CVE-2014-3917 as CVE page is older than CVRF-CVE file.
skipping CVE-2014-3859 as CVE page is older than CVRF-CVE file.
no cpe found for SUSE OpenStack Cloud 3.0 in CVE-2014-3801
no cpe found for SUSE OpenStack Cloud 3.0 in CVE-2014-3730
skipping CVE-2014-3690 as CVE page is older than CVRF-CVE file.
skipping CVE-2014-3688 as CVE page is older than CVRF-CVE file.
skipping CVE-2014-3687 as CVE page is older than CVRF-CVE file.
skipping CVE-2014-3683 as CVE page is older than CVRF-CVE file.
skipping CVE-2014-3675 as CVE page is older than CVRF-CVE file.
skipping CVE-2014-3673 as CVE page is older than CVRF-CVE file.
skipping CVE-2014-3660 as CVE page is older than CVRF-CVE file.
no cpe found for SUSE Linux Enterprise Real Time 11 SP3 in CVE-2014-3647
skipping CVE-2014-3646 as CVE page is older than CVRF-CVE file.
skipping CVE-2014-3645 as CVE page is older than CVRF-CVE file.
skipping CVE-2014-3639 as CVE page is older than CVRF-CVE file.
skipping CVE-2014-3637 as CVE page is older than CVRF-CVE file.
skipping CVE-2014-3636 as CVE page is older than CVRF-CVE file.
skipping CVE-2014-3634 as CVE page is older than CVRF-CVE file.
skipping CVE-2014-3631 as CVE page is older than CVRF-CVE file.
skipping CVE-2014-3611 as CVE page is older than CVRF-CVE file.
skipping CVE-2014-3610 as CVE page is older than CVRF-CVE file.
skipping CVE-2014-3601 as CVE page is older than CVRF-CVE file.
no cpe found for SUSE OpenStack Cloud 3.0 in CVE-2014-3594
skipping CVE-2014-3583 as CVE page is older than CVRF-CVE file.
skipping CVE-2014-3581 as CVE page is older than CVRF-CVE file.
no cpe found for SUSE Liberty Linux 7 LTSS in CVE-2014-3577
skipping CVE-2014-3572 as CVE page is older than CVRF-CVE file.
skipping CVE-2014-3571 as CVE page is older than CVRF-CVE file.
skipping CVE-2014-3570 as CVE page is older than CVRF-CVE file.
skipping CVE-2014-3569 as CVE page is older than CVRF-CVE file.
skipping CVE-2014-3568 as CVE page is older than CVRF-CVE file.
skipping CVE-2014-3567 as CVE page is older than CVRF-CVE file.
skipping CVE-2014-3566 as CVE page is older than CVRF-CVE file.
skipping CVE-2014-3564 as CVE page is older than CVRF-CVE file.
no cpe found for SUSE OpenStack Cloud 3.0 in CVE-2014-3555
skipping CVE-2014-3540 as CVE page is older than CVRF-CVE file.
skipping CVE-2014-3537 as CVE page is older than CVRF-CVE file.
skipping CVE-2014-3523 as CVE page is older than CVRF-CVE file.
no cpe found for SUSE OpenStack Cloud 3.0 in CVE-2014-3520
no cpe found for SUSE Cloud 2.0 in CVE-2014-3517
skipping CVE-2014-3513 as CVE page is older than CVRF-CVE file.
skipping CVE-2014-3512 as CVE page is older than CVRF-CVE file.
skipping CVE-2014-3511 as CVE page is older than CVRF-CVE file.
skipping CVE-2014-3510 as CVE page is older than CVRF-CVE file.
skipping CVE-2014-3509 as CVE page is older than CVRF-CVE file.
skipping CVE-2014-3508 as CVE page is older than CVRF-CVE file.
skipping CVE-2014-3507 as CVE page is older than CVRF-CVE file.
skipping CVE-2014-3506 as CVE page is older than CVRF-CVE file.
skipping CVE-2014-3505 as CVE page is older than CVRF-CVE file.
no cpe found for SUSE Liberty Linux 7 LTSS in CVE-2014-3499
skipping CVE-2014-3490 as CVE page is older than CVRF-CVE file.
no cpe found for SUSE OpenStack Cloud 3.0 in CVE-2014-3482
no cpe found for SUSE OpenStack Cloud 3.0 in CVE-2014-3476
no cpe found for SUSE OpenStack Cloud 3.0 in CVE-2014-3475
no cpe found for SUSE OpenStack Cloud 3.0 in CVE-2014-3474
no cpe found for SUSE OpenStack Cloud 3.0 in CVE-2014-3473
skipping CVE-2014-3470 as CVE page is older than CVRF-CVE file.
skipping CVE-2014-3466 as CVE page is older than CVRF-CVE file.
skipping CVE-2014-3430 as CVE page is older than CVRF-CVE file.
No V5 entry found for CVE-2014-3253 / /home/securitybot/prod/cve-database/cvelistV5/cves/2014/3xxxx/CVE-2014-3253.json:No such file or directory
skipping CVE-2014-3424 as CVE page is older than CVRF-CVE file.
skipping CVE-2014-3423 as CVE page is older than CVRF-CVE file.
skipping CVE-2014-3422 as CVE page is older than CVRF-CVE file.
skipping CVE-2014-3421 as CVE page is older than CVRF-CVE file.
skipping CVE-2014-3214 as CVE page is older than CVRF-CVE file.
no cpe found for SUSE Linux Enterprise Real Time 11 SP3 in CVE-2014-3186
skipping CVE-2014-3185 as CVE page is older than CVRF-CVE file.
skipping CVE-2014-3184 as CVE page is older than CVRF-CVE file.
skipping CVE-2014-3181 as CVE page is older than CVRF-CVE file.
skipping CVE-2014-3153 as CVE page is older than CVRF-CVE file.
skipping CVE-2014-3145 as CVE page is older than CVRF-CVE file.
skipping CVE-2014-3144 as CVE page is older than CVRF-CVE file.
skipping CVE-2014-3122 as CVE page is older than CVRF-CVE file.
skipping CVE-2014-3068 as CVE page is older than CVRF-CVE file.
skipping CVE-2014-3065 as CVE page is older than CVRF-CVE file.
skipping CVE-2014-2907 as CVE page is older than CVRF-CVE file.
skipping CVE-2014-2892 as CVE page is older than CVRF-CVE file.
skipping CVE-2014-2856 as CVE page is older than CVRF-CVE file.
no cpe found for SUSE Linux Enterprise Real Time 11 SP3 in CVE-2014-2851
no cpe found for SUSE OpenStack Cloud 3.0 in CVE-2014-2828
skipping CVE-2014-2734 as CVE page is older than CVRF-CVE file.
no cpe found for HPE Helion OpenStack Cloud 8 in CVE-2014-2686
skipping CVE-2014-2706 as CVE page is older than CVRF-CVE file.
skipping CVE-2014-2678 as CVE page is older than CVRF-CVE file.
skipping CVE-2014-2672 as CVE page is older than CVRF-CVE file.
--- /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2014-2667.xml 2024-10-23 04:10:57.482449000 +0200
+++ /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2014-2667.xml.new 2024-10-29 03:28:31.345253000 +0100
@@ -14,13 +14,13 @@
1
- 87
- 2024-10-23T02:10:57Z
+ 88
+ 2024-10-29T02:28:30Z
current
2021-05-30T13:20:16Z
- 2024-10-23T02:10:57Z
+ 2024-10-29T02:28:30Z
cve-database/bin/generate-cvrf-cve.pl
2020-12-27T01:00:00Z
@@ -1371,6 +1371,24 @@
python313-x86-64-v3-3.13.0~b3-1.1
+
+ python314-3.14.0~a1-1.1
+
+
+ python314-curses-3.14.0~a1-1.1
+
+
+ python314-dbm-3.14.0~a1-1.1
+
+
+ python314-idle-3.14.0~a1-1.1
+
+
+ python314-tk-3.14.0~a1-1.1
+
+
+ python314-x86-64-v3-3.14.0~a1-1.1
+
python36
@@ -2817,6 +2835,24 @@
python313-x86-64-v3-3.13.0~b3-1.1 as a component of openSUSE Tumbleweed
+
+ python314-3.14.0~a1-1.1 as a component of openSUSE Tumbleweed
+
+
+ python314-curses-3.14.0~a1-1.1 as a component of openSUSE Tumbleweed
+
+
+ python314-dbm-3.14.0~a1-1.1 as a component of openSUSE Tumbleweed
+
+
+ python314-idle-3.14.0~a1-1.1 as a component of openSUSE Tumbleweed
+
+
+ python314-tk-3.14.0~a1-1.1 as a component of openSUSE Tumbleweed
+
+
+ python314-x86-64-v3-3.14.0~a1-1.1 as a component of openSUSE Tumbleweed
+
python36-3.6.15-1.1 as a component of openSUSE Tumbleweed
@@ -3713,6 +3749,12 @@
openSUSE Tumbleweed:python313-idle-3.13.0~b3-1.1
openSUSE Tumbleweed:python313-tk-3.13.0~b3-1.1
openSUSE Tumbleweed:python313-x86-64-v3-3.13.0~b3-1.1
+ openSUSE Tumbleweed:python314-3.14.0~a1-1.1
+ openSUSE Tumbleweed:python314-curses-3.14.0~a1-1.1
+ openSUSE Tumbleweed:python314-dbm-3.14.0~a1-1.1
+ openSUSE Tumbleweed:python314-idle-3.14.0~a1-1.1
+ openSUSE Tumbleweed:python314-tk-3.14.0~a1-1.1
+ openSUSE Tumbleweed:python314-x86-64-v3-3.14.0~a1-1.1
openSUSE Tumbleweed:python36-3.6.15-1.1
openSUSE Tumbleweed:python36-32bit-3.6.15-1.1
openSUSE Tumbleweed:python36-curses-3.6.15-1.1
skipping CVE-2014-2583 as CVE page is older than CVRF-CVE file.
no cpe found for SUSE Cloud 2.0 in CVE-2014-2573
skipping CVE-2014-2525 as CVE page is older than CVRF-CVE file.
skipping CVE-2014-2523 as CVE page is older than CVRF-CVE file.
skipping CVE-2014-2494 as CVE page is older than CVRF-CVE file.
skipping CVE-2014-2490 as CVE page is older than CVRF-CVE file.
skipping CVE-2014-2484 as CVE page is older than CVRF-CVE file.
skipping CVE-2014-2483 as CVE page is older than CVRF-CVE file.
skipping CVE-2014-2451 as CVE page is older than CVRF-CVE file.
skipping CVE-2014-2450 as CVE page is older than CVRF-CVE file.
skipping CVE-2014-2444 as CVE page is older than CVRF-CVE file.
skipping CVE-2014-2442 as CVE page is older than CVRF-CVE file.
skipping CVE-2014-2440 as CVE page is older than CVRF-CVE file.
skipping CVE-2014-2438 as CVE page is older than CVRF-CVE file.
skipping CVE-2014-2436 as CVE page is older than CVRF-CVE file.
skipping CVE-2014-2435 as CVE page is older than CVRF-CVE file.
skipping CVE-2014-2434 as CVE page is older than CVRF-CVE file.
skipping CVE-2014-2432 as CVE page is older than CVRF-CVE file.
skipping CVE-2014-2431 as CVE page is older than CVRF-CVE file.
skipping CVE-2014-2430 as CVE page is older than CVRF-CVE file.
skipping CVE-2014-2428 as CVE page is older than CVRF-CVE file.
skipping CVE-2014-2427 as CVE page is older than CVRF-CVE file.
skipping CVE-2014-2423 as CVE page is older than CVRF-CVE file.
skipping CVE-2014-2422 as CVE page is older than CVRF-CVE file.
skipping CVE-2014-2421 as CVE page is older than CVRF-CVE file.
skipping CVE-2014-2420 as CVE page is older than CVRF-CVE file.
skipping CVE-2014-2419 as CVE page is older than CVRF-CVE file.
skipping CVE-2014-2414 as CVE page is older than CVRF-CVE file.
skipping CVE-2014-2413 as CVE page is older than CVRF-CVE file.
skipping CVE-2014-2412 as CVE page is older than CVRF-CVE file.
skipping CVE-2014-2410 as CVE page is older than CVRF-CVE file.
skipping CVE-2014-2409 as CVE page is older than CVRF-CVE file.
skipping CVE-2014-2403 as CVE page is older than CVRF-CVE file.
skipping CVE-2014-2402 as CVE page is older than CVRF-CVE file.
skipping CVE-2014-2401 as CVE page is older than CVRF-CVE file.
skipping CVE-2014-2398 as CVE page is older than CVRF-CVE file.
skipping CVE-2014-2397 as CVE page is older than CVRF-CVE file.
skipping CVE-2014-2338 as CVE page is older than CVRF-CVE file.
skipping CVE-2014-2309 as CVE page is older than CVRF-CVE file.
skipping CVE-2014-2299 as CVE page is older than CVRF-CVE file.
skipping CVE-2014-2283 as CVE page is older than CVRF-CVE file.
skipping CVE-2014-2282 as CVE page is older than CVRF-CVE file.
skipping CVE-2014-2281 as CVE page is older than CVRF-CVE file.
no cpe found for SUSE OpenStack Cloud 3.0 in CVE-2014-2237
skipping CVE-2014-2240 as CVE page is older than CVRF-CVE file.
skipping CVE-2014-2146 as CVE page is older than CVRF-CVE file.
skipping CVE-2014-2039 as CVE page is older than CVRF-CVE file.
no cpe found for SUSE OpenStack Cloud 3.0 in CVE-2014-1948
skipping CVE-2014-1912 as CVE page is older than CVRF-CVE file.
skipping CVE-2014-1876 as CVE page is older than CVRF-CVE file.
skipping CVE-2014-1874 as CVE page is older than CVRF-CVE file.
no cpe found for SUSE Cloud 2.0 in CVE-2014-1830
no cpe found for SUSE Cloud 2.0 in CVE-2014-1829
no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2014-1745
no cpe found for SUSE Linux Enterprise Real Time 11 SP3 in CVE-2014-1739
skipping CVE-2014-1738 as CVE page is older than CVRF-CVE file.
skipping CVE-2014-1737 as CVE page is older than CVRF-CVE file.
no cpe found for SUSE Cloud 2.0 in CVE-2014-1693
no cpe found for SUSE OpenStack Cloud 3.0 in CVE-2014-1693
skipping CVE-2014-1545 as CVE page is older than CVRF-CVE file.
skipping CVE-2014-1542 as CVE page is older than CVRF-CVE file.
skipping CVE-2014-1541 as CVE page is older than CVRF-CVE file.
skipping CVE-2014-1540 as CVE page is older than CVRF-CVE file.
skipping CVE-2014-1538 as CVE page is older than CVRF-CVE file.
skipping CVE-2014-1537 as CVE page is older than CVRF-CVE file.
skipping CVE-2014-1536 as CVE page is older than CVRF-CVE file.
skipping CVE-2014-1534 as CVE page is older than CVRF-CVE file.
skipping CVE-2014-1533 as CVE page is older than CVRF-CVE file.
skipping CVE-2014-1492 as CVE page is older than CVRF-CVE file.
skipping CVE-2014-1446 as CVE page is older than CVRF-CVE file.
skipping CVE-2014-1445 as CVE page is older than CVRF-CVE file.
skipping CVE-2014-1444 as CVE page is older than CVRF-CVE file.
no cpe found for SUSE OpenStack Cloud 3.0 in CVE-2014-1418
skipping CVE-2014-1402 as CVE page is older than CVRF-CVE file.
no cpe found for SUSE OpenStack Cloud 3.0 in CVE-2014-0592
no cpe found for SUSE OpenStack Cloud 3.0 in CVE-2014-0483
no cpe found for SUSE OpenStack Cloud 3.0 in CVE-2014-0482
no cpe found for SUSE OpenStack Cloud 3.0 in CVE-2014-0481
no cpe found for SUSE OpenStack Cloud 3.0 in CVE-2014-0480
no cpe found for SUSE OpenStack Cloud 3.0 in CVE-2014-0474
no cpe found for SUSE OpenStack Cloud 3.0 in CVE-2014-0473
no cpe found for SUSE OpenStack Cloud 3.0 in CVE-2014-0472
skipping CVE-2014-0464 as CVE page is older than CVRF-CVE file.
skipping CVE-2014-0463 as CVE page is older than CVRF-CVE file.
skipping CVE-2014-0461 as CVE page is older than CVRF-CVE file.
skipping CVE-2014-0460 as CVE page is older than CVRF-CVE file.
skipping CVE-2014-0459 as CVE page is older than CVRF-CVE file.
skipping CVE-2014-0458 as CVE page is older than CVRF-CVE file.
skipping CVE-2014-0457 as CVE page is older than CVRF-CVE file.
skipping CVE-2014-0456 as CVE page is older than CVRF-CVE file.
skipping CVE-2014-0455 as CVE page is older than CVRF-CVE file.
skipping CVE-2014-0454 as CVE page is older than CVRF-CVE file.
skipping CVE-2014-0453 as CVE page is older than CVRF-CVE file.
skipping CVE-2014-0452 as CVE page is older than CVRF-CVE file.
skipping CVE-2014-0451 as CVE page is older than CVRF-CVE file.
skipping CVE-2014-0449 as CVE page is older than CVRF-CVE file.
skipping CVE-2014-0448 as CVE page is older than CVRF-CVE file.
skipping CVE-2014-0446 as CVE page is older than CVRF-CVE file.
skipping CVE-2014-0432 as CVE page is older than CVRF-CVE file.
skipping CVE-2014-0429 as CVE page is older than CVRF-CVE file.
skipping CVE-2014-0384 as CVE page is older than CVRF-CVE file.
skipping CVE-2014-0333 as CVE page is older than CVRF-CVE file.
no cpe found for SUSE OpenStack Cloud 3.0 in CVE-2014-0242
no cpe found for SUSE OpenStack Cloud 3.0 in CVE-2014-0240
skipping CVE-2014-0231 as CVE page is older than CVRF-CVE file.
skipping CVE-2014-0226 as CVE page is older than CVRF-CVE file.
skipping CVE-2014-0224 as CVE page is older than CVRF-CVE file.
skipping CVE-2014-0221 as CVE page is older than CVRF-CVE file.
skipping CVE-2014-0211 as CVE page is older than CVRF-CVE file.
skipping CVE-2014-0210 as CVE page is older than CVRF-CVE file.
skipping CVE-2014-0209 as CVE page is older than CVRF-CVE file.
no cpe found for SUSE Cloud 2.0 in CVE-2014-0204
skipping CVE-2014-0203 as CVE page is older than CVRF-CVE file.
skipping CVE-2014-0198 as CVE page is older than CVRF-CVE file.
no cpe found for SUSE OpenStack Cloud 3.0 in CVE-2014-0187
skipping CVE-2014-0196 as CVE page is older than CVRF-CVE file.
skipping CVE-2014-0195 as CVE page is older than CVRF-CVE file.
skipping CVE-2014-0191 as CVE page is older than CVRF-CVE file.
skipping CVE-2014-0190 as CVE page is older than CVRF-CVE file.
skipping CVE-2014-0181 as CVE page is older than CVRF-CVE file.
no cpe found for SUSE Cloud 2.0 in CVE-2014-0167
no cpe found for SUSE OpenStack Cloud 3.0 in CVE-2014-0167
skipping CVE-2014-0172 as CVE page is older than CVRF-CVE file.
no cpe found for SUSE OpenStack Cloud 3.0 in CVE-2014-0162
skipping CVE-2014-0160 as CVE page is older than CVRF-CVE file.
no cpe found for SUSE Cloud 2.0 in CVE-2014-0157
no cpe found for SUSE OpenStack Cloud 3.0 in CVE-2014-0157
skipping CVE-2014-0155 as CVE page is older than CVRF-CVE file.
no cpe found for SUSE OpenStack Cloud 3.0 in CVE-2014-0134
no cpe found for SUSE OpenStack Cloud 3.0 in CVE-2014-0130
skipping CVE-2014-0131 as CVE page is older than CVRF-CVE file.
skipping CVE-2014-0118 as CVE page is older than CVRF-CVE file.
skipping CVE-2014-0117 as CVE page is older than CVRF-CVE file.
skipping CVE-2014-0114 as CVE page is older than CVRF-CVE file.
no cpe found for SUSE Cloud 2.0 in CVE-2014-0105
skipping CVE-2014-0101 as CVE page is older than CVRF-CVE file.
skipping CVE-2014-0098 as CVE page is older than CVRF-CVE file.
no cpe found for SUSE OpenStack Cloud 2.0 in CVE-2014-0081
no cpe found for SUSE OpenStack Cloud 3.0 in CVE-2014-0081
skipping CVE-2014-0077 as CVE page is older than CVRF-CVE file.
skipping CVE-2014-0076 as CVE page is older than CVRF-CVE file.
skipping CVE-2014-0069 as CVE page is older than CVRF-CVE file.
no cpe found for SUSE Cloud 2.0 in CVE-2014-0056
no cpe found for SUSE OpenStack Cloud 3.0 in CVE-2014-0056
skipping CVE-2014-0055 as CVE page is older than CVRF-CVE file.
skipping CVE-2014-0050 as CVE page is older than CVRF-CVE file.
skipping CVE-2014-0038 as CVE page is older than CVRF-CVE file.
no cpe found for SUSE OpenStack Cloud 2.0 in CVE-2014-0006
no cpe found for SUSE OpenStack Cloud 3.0 in CVE-2014-0006
skipping CVE-2014-0004 as CVE page is older than CVRF-CVE file.
skipping CVE-2013-7470 as CVE page is older than CVRF-CVE file.
skipping CVE-2013-7447 as CVE page is older than CVRF-CVE file.
skipping CVE-2013-7446 as CVE page is older than CVRF-CVE file.
skipping CVE-2013-7422 as CVE page is older than CVRF-CVE file.
skipping CVE-2013-7421 as CVE page is older than CVRF-CVE file.
skipping CVE-2013-7354 as CVE page is older than CVRF-CVE file.
skipping CVE-2013-7353 as CVE page is older than CVRF-CVE file.
skipping CVE-2013-7339 as CVE page is older than CVRF-CVE file.
skipping CVE-2013-7338 as CVE page is older than CVRF-CVE file.
skipping CVE-2013-7271 as CVE page is older than CVRF-CVE file.
skipping CVE-2013-7270 as CVE page is older than CVRF-CVE file.
skipping CVE-2013-7269 as CVE page is older than CVRF-CVE file.
skipping CVE-2013-7268 as CVE page is older than CVRF-CVE file.
skipping CVE-2013-7267 as CVE page is older than CVRF-CVE file.
skipping CVE-2013-7265 as CVE page is older than CVRF-CVE file.
skipping CVE-2013-7264 as CVE page is older than CVRF-CVE file.
skipping CVE-2013-7263 as CVE page is older than CVRF-CVE file.
skipping CVE-2013-7171 as CVE page is older than CVRF-CVE file.
skipping CVE-2013-7041 as CVE page is older than CVRF-CVE file.
no cpe found for SUSE Linux Enterprise Real Time 11 SP2 in CVE-2013-7027
no cpe found for SUSE Linux Enterprise Real Time 11 SP3 in CVE-2013-7027
skipping CVE-2013-7039 as CVE page is older than CVRF-CVE file.
skipping CVE-2013-7038 as CVE page is older than CVRF-CVE file.
skipping CVE-2013-6999 as CVE page is older than CVRF-CVE file.
skipping CVE-2013-6954 as CVE page is older than CVRF-CVE file.
no cpe found for SUSE Linux Enterprise Real Time 11 SP3 in CVE-2013-6885
skipping CVE-2013-6763 as CVE page is older than CVRF-CVE file.
skipping CVE-2013-6629 as CVE page is older than CVRF-CVE file.
no cpe found for SUSE Linux Enterprise Real Time 11 SP2 in CVE-2013-6463
no cpe found for SUSE Linux Enterprise Real Time 11 SP3 in CVE-2013-6463
skipping CVE-2013-6450 as CVE page is older than CVRF-CVE file.
skipping CVE-2013-6449 as CVE page is older than CVRF-CVE file.
no cpe found for SUSE Cloud 2.0 in CVE-2013-6437
skipping CVE-2013-6438 as CVE page is older than CVRF-CVE file.
no cpe found for SUSE OpenStack Cloud 2.0 in CVE-2013-6415
skipping CVE-2013-6401 as CVE page is older than CVRF-CVE file.
no cpe found for SUSE Cloud 2.0 in CVE-2013-6396
skipping CVE-2013-6393 as CVE page is older than CVRF-CVE file.
no cpe found for SUSE Cloud 2.0 in CVE-2013-6384
no cpe found for SUSE Linux Enterprise Real Time 11 SP2 in CVE-2013-6383
no cpe found for SUSE Linux Enterprise Real Time 11 SP3 in CVE-2013-6383
no cpe found for SUSE Linux Enterprise Real Time 11 SP2 in CVE-2013-6380
no cpe found for SUSE Linux Enterprise Real Time 11 SP3 in CVE-2013-6380
skipping CVE-2013-6382 as CVE page is older than CVRF-CVE file.
skipping CVE-2013-6381 as CVE page is older than CVRF-CVE file.
skipping CVE-2013-6378 as CVE page is older than CVRF-CVE file.
skipping CVE-2013-6376 as CVE page is older than CVRF-CVE file.
no cpe found for SUSE Linux Enterprise Real Time 11 SP2 in CVE-2013-6367
no cpe found for SUSE Linux Enterprise Real Time 11 SP3 in CVE-2013-6367
skipping CVE-2013-6371 as CVE page is older than CVRF-CVE file.
skipping CVE-2013-6370 as CVE page is older than CVRF-CVE file.
skipping CVE-2013-6369 as CVE page is older than CVRF-CVE file.
skipping CVE-2013-6368 as CVE page is older than CVRF-CVE file.
no cpe found for SUSE Cloud 2.0 in CVE-2013-6044
skipping CVE-2013-5704 as CVE page is older than CVRF-CVE file.
skipping CVE-2013-5634 as CVE page is older than CVRF-CVE file.
skipping CVE-2013-5607 as CVE page is older than CVRF-CVE file.
skipping CVE-2013-5606 as CVE page is older than CVRF-CVE file.
skipping CVE-2013-5605 as CVE page is older than CVRF-CVE file.
skipping CVE-2013-5123 as CVE page is older than CVRF-CVE file.
skipping CVE-2013-4592 as CVE page is older than CVRF-CVE file.
skipping CVE-2013-4591 as CVE page is older than CVRF-CVE file.
skipping CVE-2013-4587 as CVE page is older than CVRF-CVE file.
skipping CVE-2013-4579 as CVE page is older than CVRF-CVE file.
no cpe found for SUSE Linux Enterprise Real Time 11 SP2 in CVE-2013-4514
no cpe found for SUSE Linux Enterprise Real Time 11 SP3 in CVE-2013-4514
skipping CVE-2013-4516 as CVE page is older than CVRF-CVE file.
skipping CVE-2013-4515 as CVE page is older than CVRF-CVE file.
no cpe found for SUSE Linux Enterprise Real Time 11 SP2 in CVE-2013-4511
no cpe found for SUSE Linux Enterprise Real Time 11 SP3 in CVE-2013-4511
no cpe found for SUSE OpenStack Cloud 2.0 in CVE-2013-4497
skipping CVE-2013-4483 as CVE page is older than CVRF-CVE file.
no cpe found for SUSE OpenStack Cloud 2.0 in CVE-2013-4477
no cpe found for SUSE Linux Enterprise Real Time 11 SP3 in CVE-2013-4470
no cpe found for SUSE OpenStack Cloud 2.0 in CVE-2013-4463
skipping CVE-2013-4458 as CVE page is older than CVRF-CVE file.
skipping CVE-2013-4449 as CVE page is older than CVRF-CVE file.
skipping CVE-2013-4444 as CVE page is older than CVRF-CVE file.
no cpe found for SUSE OpenStack Cloud 2.0 in CVE-2013-4428
skipping CVE-2013-4387 as CVE page is older than CVRF-CVE file.
no cpe found for SUSE OpenStack Cloud 2.0 in CVE-2013-4365
skipping CVE-2013-4353 as CVE page is older than CVRF-CVE file.
skipping CVE-2013-4350 as CVE page is older than CVRF-CVE file.
no cpe found for SUSE Linux Enterprise Real Time 11 SP2 in CVE-2013-4345
no cpe found for SUSE Linux Enterprise Real Time 11 SP3 in CVE-2013-4345
no cpe found for SUSE OpenStack Cloud 2.0 in CVE-2013-4314
skipping CVE-2013-4312 as CVE page is older than CVRF-CVE file.
skipping CVE-2013-4299 as CVE page is older than CVRF-CVE file.
skipping CVE-2013-4282 as CVE page is older than CVRF-CVE file.
skipping CVE-2013-4270 as CVE page is older than CVRF-CVE file.
skipping CVE-2013-4244 as CVE page is older than CVRF-CVE file.
skipping CVE-2013-4243 as CVE page is older than CVRF-CVE file.
skipping CVE-2013-4242 as CVE page is older than CVRF-CVE file.
--- /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2013-4238.xml 2024-09-07 03:37:51.135336000 +0200
+++ /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2013-4238.xml.new 2024-10-29 03:35:09.311493000 +0100
@@ -14,13 +14,13 @@
1
- 97
- 2024-09-07T01:37:50Z
+ 98
+ 2024-10-29T02:35:08Z
current
2021-05-30T13:13:52Z
- 2024-09-07T01:37:50Z
+ 2024-10-29T02:35:08Z
cve-database/bin/generate-cvrf-cve.pl
2020-12-27T01:00:00Z
@@ -2324,6 +2324,24 @@
python313-x86-64-v3-3.13.0~b3-1.1
+
+ python314-3.14.0~a1-1.1
+
+
+ python314-curses-3.14.0~a1-1.1
+
+
+ python314-dbm-3.14.0~a1-1.1
+
+
+ python314-idle-3.14.0~a1-1.1
+
+
+ python314-tk-3.14.0~a1-1.1
+
+
+ python314-x86-64-v3-3.14.0~a1-1.1
+
python36
@@ -5537,6 +5555,24 @@
python313-x86-64-v3-3.13.0~b3-1.1 as a component of openSUSE Tumbleweed
+
+ python314-3.14.0~a1-1.1 as a component of openSUSE Tumbleweed
+
+
+ python314-curses-3.14.0~a1-1.1 as a component of openSUSE Tumbleweed
+
+
+ python314-dbm-3.14.0~a1-1.1 as a component of openSUSE Tumbleweed
+
+
+ python314-idle-3.14.0~a1-1.1 as a component of openSUSE Tumbleweed
+
+
+ python314-tk-3.14.0~a1-1.1 as a component of openSUSE Tumbleweed
+
+
+ python314-x86-64-v3-3.14.0~a1-1.1 as a component of openSUSE Tumbleweed
+
python36-3.6.15-1.1 as a component of openSUSE Tumbleweed
@@ -7004,6 +7040,12 @@
openSUSE Tumbleweed:python313-idle-3.13.0~b3-1.1
openSUSE Tumbleweed:python313-tk-3.13.0~b3-1.1
openSUSE Tumbleweed:python313-x86-64-v3-3.13.0~b3-1.1
+ openSUSE Tumbleweed:python314-3.14.0~a1-1.1
+ openSUSE Tumbleweed:python314-curses-3.14.0~a1-1.1
+ openSUSE Tumbleweed:python314-dbm-3.14.0~a1-1.1
+ openSUSE Tumbleweed:python314-idle-3.14.0~a1-1.1
+ openSUSE Tumbleweed:python314-tk-3.14.0~a1-1.1
+ openSUSE Tumbleweed:python314-x86-64-v3-3.14.0~a1-1.1
openSUSE Tumbleweed:python36-3.6.15-1.1
openSUSE Tumbleweed:python36-32bit-3.6.15-1.1
openSUSE Tumbleweed:python36-curses-3.6.15-1.1
no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2013-4235
--- /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2013-4235.xml 2024-10-20 04:31:05.248874000 +0200
+++ /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2013-4235.xml.new 2024-10-29 03:35:11.732413000 +0100
@@ -14,13 +14,13 @@
1
- 89
- 2024-10-20T02:31:04Z
+ 90
+ 2024-10-29T02:35:10Z
current
2021-05-30T13:13:52Z
- 2024-10-20T02:31:04Z
+ 2024-10-29T02:35:10Z
cve-database/bin/generate-cvrf-cve.pl
2020-12-27T01:00:00Z
@@ -2532,17 +2532,17 @@
shadow-4.2.1-36.12.1 as a component of Image SLES12-SP5-EC2-SAP-On-Demand
-
- shadow-4.2.1-36.12.1 as a component of Image SLES12-SP5-GCE-BYOS
+
+ shadow-4.2.1-36.15.1 as a component of Image SLES12-SP5-GCE-BYOS
shadow-4.2.1-36.12.1 as a component of Image SLES12-SP5-GCE-On-Demand
-
- shadow-4.2.1-36.12.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
+
+ shadow-4.2.1-36.15.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS
-
- shadow-4.2.1-36.12.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
+
+ shadow-4.2.1-36.15.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand
shadow-4.2.1-36.15.1 as a component of Image SLES12-SP5-SAP-Azure-LI-BYOS-Production
@@ -4123,10 +4123,10 @@
Image SLES12-SP5-EC2-On-Demand:shadow-4.2.1-36.12.1
Image SLES12-SP5-EC2-SAP-BYOS:shadow-4.2.1-36.15.1
Image SLES12-SP5-EC2-SAP-On-Demand:shadow-4.2.1-36.12.1
- Image SLES12-SP5-GCE-BYOS:shadow-4.2.1-36.12.1
+ Image SLES12-SP5-GCE-BYOS:shadow-4.2.1-36.15.1
Image SLES12-SP5-GCE-On-Demand:shadow-4.2.1-36.12.1
- Image SLES12-SP5-GCE-SAP-BYOS:shadow-4.2.1-36.12.1
- Image SLES12-SP5-GCE-SAP-On-Demand:shadow-4.2.1-36.12.1
+ Image SLES12-SP5-GCE-SAP-BYOS:shadow-4.2.1-36.15.1
+ Image SLES12-SP5-GCE-SAP-On-Demand:shadow-4.2.1-36.15.1
Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:shadow-4.2.1-36.15.1
Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production:shadow-4.2.1-36.15.1
Image SLES15-SP3-BYOS-Azure:login_defs-4.8.1-150300.4.18.1
no cpe found for SUSE OpenStack Cloud 2.0 in CVE-2013-4222
skipping CVE-2013-4232 as CVE page is older than CVRF-CVE file.
skipping CVE-2013-4231 as CVE page is older than CVRF-CVE file.
skipping CVE-2013-4163 as CVE page is older than CVRF-CVE file.
skipping CVE-2013-4162 as CVE page is older than CVRF-CVE file.
no cpe found for SUSE Liberty Linux 7 LTSS in CVE-2013-4002
no cpe found for SUSE Studio Onsite Runner 1.3 in CVE-2013-3712
skipping CVE-2013-3301 as CVE page is older than CVRF-CVE file.
no cpe found for SUSE Linux Enterprise Real Time 11 SP2 in CVE-2013-3225
skipping CVE-2013-3236 as CVE page is older than CVRF-CVE file.
skipping CVE-2013-3235 as CVE page is older than CVRF-CVE file.
skipping CVE-2013-3234 as CVE page is older than CVRF-CVE file.
skipping CVE-2013-3233 as CVE page is older than CVRF-CVE file.
skipping CVE-2013-3232 as CVE page is older than CVRF-CVE file.
skipping CVE-2013-3231 as CVE page is older than CVRF-CVE file.
skipping CVE-2013-3230 as CVE page is older than CVRF-CVE file.
skipping CVE-2013-3229 as CVE page is older than CVRF-CVE file.
skipping CVE-2013-3228 as CVE page is older than CVRF-CVE file.
skipping CVE-2013-3227 as CVE page is older than CVRF-CVE file.
skipping CVE-2013-3226 as CVE page is older than CVRF-CVE file.
skipping CVE-2013-3224 as CVE page is older than CVRF-CVE file.
skipping CVE-2013-3223 as CVE page is older than CVRF-CVE file.
skipping CVE-2013-3222 as CVE page is older than CVRF-CVE file.
skipping CVE-2013-3076 as CVE page is older than CVRF-CVE file.
no cpe found for SUSE Linux Enterprise Real Time 11 SP3 in CVE-2013-2930
no cpe found for SUSE Linux Enterprise Real Time 11 SP3 in CVE-2013-2929
skipping CVE-2013-2899 as CVE page is older than CVRF-CVE file.
skipping CVE-2013-2898 as CVE page is older than CVRF-CVE file.
skipping CVE-2013-2897 as CVE page is older than CVRF-CVE file.
skipping CVE-2013-2896 as CVE page is older than CVRF-CVE file.
skipping CVE-2013-2895 as CVE page is older than CVRF-CVE file.
skipping CVE-2013-2894 as CVE page is older than CVRF-CVE file.
skipping CVE-2013-2893 as CVE page is older than CVRF-CVE file.
skipping CVE-2013-2892 as CVE page is older than CVRF-CVE file.
skipping CVE-2013-2891 as CVE page is older than CVRF-CVE file.
skipping CVE-2013-2890 as CVE page is older than CVRF-CVE file.
skipping CVE-2013-2889 as CVE page is older than CVRF-CVE file.
skipping CVE-2013-2888 as CVE page is older than CVRF-CVE file.
no cpe found for SUSE Linux Enterprise Real Time 11 SP3 in CVE-2013-2852
no cpe found for SUSE Linux Enterprise Real Time 11 SP2 in CVE-2013-2850
no cpe found for SUSE Linux Enterprise Real Time 11 SP3 in CVE-2013-2850
skipping CVE-2013-2851 as CVE page is older than CVRF-CVE file.
skipping CVE-2013-2636 as CVE page is older than CVRF-CVE file.
skipping CVE-2013-2635 as CVE page is older than CVRF-CVE file.
skipping CVE-2013-2634 as CVE page is older than CVRF-CVE file.
skipping CVE-2013-2460 as CVE page is older than CVRF-CVE file.
skipping CVE-2013-2458 as CVE page is older than CVRF-CVE file.
skipping CVE-2013-2449 as CVE page is older than CVRF-CVE file.
skipping CVE-2013-2442 as CVE page is older than CVRF-CVE file.
skipping CVE-2013-2437 as CVE page is older than CVRF-CVE file.
skipping CVE-2013-2436 as CVE page is older than CVRF-CVE file.
skipping CVE-2013-2431 as CVE page is older than CVRF-CVE file.
skipping CVE-2013-2426 as CVE page is older than CVRF-CVE file.
skipping CVE-2013-2423 as CVE page is older than CVRF-CVE file.
skipping CVE-2013-2421 as CVE page is older than CVRF-CVE file.
skipping CVE-2013-2415 as CVE page is older than CVRF-CVE file.
skipping CVE-2013-2407 as CVE page is older than CVRF-CVE file.
skipping CVE-2013-2266 as CVE page is older than CVRF-CVE file.
no cpe found for SUSE OpenStack Cloud 2.0 in CVE-2013-2255
skipping CVE-2013-2249 as CVE page is older than CVRF-CVE file.
skipping CVE-2013-2237 as CVE page is older than CVRF-CVE file.
skipping CVE-2013-2234 as CVE page is older than CVRF-CVE file.
skipping CVE-2013-2232 as CVE page is older than CVRF-CVE file.
no cpe found for SUSE OpenStack Cloud 2.0 in CVE-2013-2217
skipping CVE-2013-2206 as CVE page is older than CVRF-CVE file.
no cpe found for SUSE OpenStack Cloud 2.0 in CVE-2013-2167
no cpe found for SUSE OpenStack Cloud 2.0 in CVE-2013-2166
no cpe found for SUSE Linux Enterprise Real Time 11 SP2 in CVE-2013-2164
no cpe found for SUSE Linux Enterprise Real Time 11 SP3 in CVE-2013-2164
no cpe found for SUSE Linux Enterprise Real Time 11 SP2 in CVE-2013-2148
no cpe found for SUSE Linux Enterprise Real Time 11 SP3 in CVE-2013-2148
skipping CVE-2013-2147 as CVE page is older than CVRF-CVE file.
skipping CVE-2013-2146 as CVE page is older than CVRF-CVE file.
skipping CVE-2013-2142 as CVE page is older than CVRF-CVE file.
skipping CVE-2013-2141 as CVE page is older than CVRF-CVE file.
skipping CVE-2013-2140 as CVE page is older than CVRF-CVE file.
skipping CVE-2013-2139 as CVE page is older than CVRF-CVE file.
skipping CVE-2013-2128 as CVE page is older than CVRF-CVE file.
no cpe found for SUSE Cloud 2.0 in CVE-2013-2104
skipping CVE-2013-2094 as CVE page is older than CVRF-CVE file.
skipping CVE-2013-2067 as CVE page is older than CVRF-CVE file.
skipping CVE-2013-2015 as CVE page is older than CVRF-CVE file.
skipping CVE-2013-2003 as CVE page is older than CVRF-CVE file.
skipping CVE-2013-2001 as CVE page is older than CVRF-CVE file.
skipping CVE-2013-1998 as CVE page is older than CVRF-CVE file.
skipping CVE-2013-1989 as CVE page is older than CVRF-CVE file.
skipping CVE-2013-1987 as CVE page is older than CVRF-CVE file.
skipping CVE-2013-1986 as CVE page is older than CVRF-CVE file.
skipping CVE-2013-1985 as CVE page is older than CVRF-CVE file.
skipping CVE-2013-1983 as CVE page is older than CVRF-CVE file.
skipping CVE-2013-1982 as CVE page is older than CVRF-CVE file.
skipping CVE-2013-1979 as CVE page is older than CVRF-CVE file.
skipping CVE-2013-1976 as CVE page is older than CVRF-CVE file.
skipping CVE-2013-1961 as CVE page is older than CVRF-CVE file.
skipping CVE-2013-1960 as CVE page is older than CVRF-CVE file.
skipping CVE-2013-1945 as CVE page is older than CVRF-CVE file.
skipping CVE-2013-1943 as CVE page is older than CVRF-CVE file.
skipping CVE-2013-1929 as CVE page is older than CVRF-CVE file.
skipping CVE-2013-1928 as CVE page is older than CVRF-CVE file.
skipping CVE-2013-1873 as CVE page is older than CVRF-CVE file.
skipping CVE-2013-1860 as CVE page is older than CVRF-CVE file.
skipping CVE-2013-1848 as CVE page is older than CVRF-CVE file.
no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2013-1841
skipping CVE-2013-1827 as CVE page is older than CVRF-CVE file.
skipping CVE-2013-1826 as CVE page is older than CVRF-CVE file.
skipping CVE-2013-1819 as CVE page is older than CVRF-CVE file.
no cpe found for SUSE Linux Enterprise Real Time 11 SP2 in CVE-2013-1798
skipping CVE-2013-1797 as CVE page is older than CVRF-CVE file.
skipping CVE-2013-1796 as CVE page is older than CVRF-CVE file.
skipping CVE-2013-1792 as CVE page is older than CVRF-CVE file.
skipping CVE-2013-1774 as CVE page is older than CVRF-CVE file.
skipping CVE-2013-1773 as CVE page is older than CVRF-CVE file.
skipping CVE-2013-1772 as CVE page is older than CVRF-CVE file.
skipping CVE-2013-1767 as CVE page is older than CVRF-CVE file.
skipping CVE-2013-1763 as CVE page is older than CVRF-CVE file.
skipping CVE-2013-1753 as CVE page is older than CVRF-CVE file.
--- /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2013-1752.xml 2024-10-23 04:27:27.374190000 +0200
+++ /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2013-1752.xml.new 2024-10-29 03:38:11.871328000 +0100
@@ -14,13 +14,13 @@
1
- 135
- 2024-10-23T02:27:26Z
+ 136
+ 2024-10-29T02:38:11Z
current
2021-05-30T13:10:33Z
- 2024-10-23T02:27:26Z
+ 2024-10-29T02:38:11Z
cve-database/bin/generate-cvrf-cve.pl
2020-12-27T01:00:00Z
@@ -2408,6 +2408,24 @@
python313-x86-64-v3-3.13.0~b3-1.1
+
+ python314-3.14.0~a1-1.1
+
+
+ python314-curses-3.14.0~a1-1.1
+
+
+ python314-dbm-3.14.0~a1-1.1
+
+
+ python314-idle-3.14.0~a1-1.1
+
+
+ python314-tk-3.14.0~a1-1.1
+
+
+ python314-x86-64-v3-3.14.0~a1-1.1
+
python36
@@ -5018,6 +5036,24 @@
python313-x86-64-v3-3.13.0~b3-1.1 as a component of openSUSE Tumbleweed
+
+ python314-3.14.0~a1-1.1 as a component of openSUSE Tumbleweed
+
+
+ python314-curses-3.14.0~a1-1.1 as a component of openSUSE Tumbleweed
+
+
+ python314-dbm-3.14.0~a1-1.1 as a component of openSUSE Tumbleweed
+
+
+ python314-idle-3.14.0~a1-1.1 as a component of openSUSE Tumbleweed
+
+
+ python314-tk-3.14.0~a1-1.1 as a component of openSUSE Tumbleweed
+
+
+ python314-x86-64-v3-3.14.0~a1-1.1 as a component of openSUSE Tumbleweed
+
python36-3.6.15-1.1 as a component of openSUSE Tumbleweed
@@ -6583,6 +6619,12 @@
openSUSE Tumbleweed:python313-idle-3.13.0~b3-1.1
openSUSE Tumbleweed:python313-tk-3.13.0~b3-1.1
openSUSE Tumbleweed:python313-x86-64-v3-3.13.0~b3-1.1
+ openSUSE Tumbleweed:python314-3.14.0~a1-1.1
+ openSUSE Tumbleweed:python314-curses-3.14.0~a1-1.1
+ openSUSE Tumbleweed:python314-dbm-3.14.0~a1-1.1
+ openSUSE Tumbleweed:python314-idle-3.14.0~a1-1.1
+ openSUSE Tumbleweed:python314-tk-3.14.0~a1-1.1
+ openSUSE Tumbleweed:python314-x86-64-v3-3.14.0~a1-1.1
openSUSE Tumbleweed:python36-3.6.15-1.1
openSUSE Tumbleweed:python36-32bit-3.6.15-1.1
openSUSE Tumbleweed:python36-curses-3.6.15-1.1
skipping CVE-2013-1741 as CVE page is older than CVRF-CVE file.
skipping CVE-2013-1622 as CVE page is older than CVRF-CVE file.
skipping CVE-2013-1620 as CVE page is older than CVRF-CVE file.
skipping CVE-2013-1571 as CVE page is older than CVRF-CVE file.
skipping CVE-2013-1488 as CVE page is older than CVRF-CVE file.
no cpe found for SUSE OpenStack Cloud 2.0 in CVE-2013-1443
skipping CVE-2013-1445 as CVE page is older than CVRF-CVE file.
No V5 entry found for CVE-2013-1089 / /home/securitybot/prod/cve-database/cvelistV5/cves/2013/1xxxx/CVE-2013-1089.json:No such file or directory
no cpe found for SUSE Linux Enterprise Real Time 11 SP2 in CVE-2013-1059
no cpe found for SUSE Linux Enterprise Real Time 11 SP3 in CVE-2013-1059
skipping CVE-2013-0914 as CVE page is older than CVRF-CVE file.
skipping CVE-2013-0913 as CVE page is older than CVRF-CVE file.
skipping CVE-2013-0871 as CVE page is older than CVRF-CVE file.
skipping CVE-2013-0784 as CVE page is older than CVRF-CVE file.
skipping CVE-2013-0783 as CVE page is older than CVRF-CVE file.
skipping CVE-2013-0782 as CVE page is older than CVRF-CVE file.
skipping CVE-2013-0781 as CVE page is older than CVRF-CVE file.
skipping CVE-2013-0779 as CVE page is older than CVRF-CVE file.
skipping CVE-2013-0778 as CVE page is older than CVRF-CVE file.
skipping CVE-2013-0777 as CVE page is older than CVRF-CVE file.
skipping CVE-2013-0775 as CVE page is older than CVRF-CVE file.
skipping CVE-2013-0774 as CVE page is older than CVRF-CVE file.
skipping CVE-2013-0773 as CVE page is older than CVRF-CVE file.
skipping CVE-2013-0755 as CVE page is older than CVRF-CVE file.
skipping CVE-2013-0349 as CVE page is older than CVRF-CVE file.
skipping CVE-2013-0343 as CVE page is older than CVRF-CVE file.
no cpe found for SUSE Liberty Linux 7 LTSS in CVE-2013-0334
no cpe found for HPE Helion OpenStack Cloud 8 in CVE-2013-0326
skipping CVE-2013-0311 as CVE page is older than CVRF-CVE file.
skipping CVE-2013-0310 as CVE page is older than CVRF-CVE file.
skipping CVE-2013-0309 as CVE page is older than CVRF-CVE file.
skipping CVE-2013-0292 as CVE page is older than CVRF-CVE file.
skipping CVE-2013-0290 as CVE page is older than CVRF-CVE file.
skipping CVE-2013-0268 as CVE page is older than CVRF-CVE file.
no cpe found for SUSE Linux Enterprise Real Time 11 SP2 in CVE-2013-0231
skipping CVE-2013-0228 as CVE page is older than CVRF-CVE file.
skipping CVE-2013-0217 as CVE page is older than CVRF-CVE file.
skipping CVE-2013-0216 as CVE page is older than CVRF-CVE file.
skipping CVE-2013-0211 as CVE page is older than CVRF-CVE file.
no cpe found for SUSE Cloud 2.0 in CVE-2013-0179
skipping CVE-2013-0169 as CVE page is older than CVRF-CVE file.
skipping CVE-2013-0166 as CVE page is older than CVRF-CVE file.
no cpe found for SUSE Linux Enterprise Real Time 11 SP2 in CVE-2013-0160
no cpe found for SUSE Package Hub 15 SP3 in CVE-2012-6709
skipping CVE-2012-6708 as CVE page is older than CVRF-CVE file.
skipping CVE-2012-6704 as CVE page is older than CVRF-CVE file.
skipping CVE-2012-6703 as CVE page is older than CVRF-CVE file.
skipping CVE-2012-6702 as CVE page is older than CVRF-CVE file.
skipping CVE-2012-6701 as CVE page is older than CVRF-CVE file.
skipping CVE-2012-6689 as CVE page is older than CVRF-CVE file.
skipping CVE-2012-6657 as CVE page is older than CVRF-CVE file.
skipping CVE-2012-6647 as CVE page is older than CVRF-CVE file.
skipping CVE-2012-6549 as CVE page is older than CVRF-CVE file.
skipping CVE-2012-6548 as CVE page is older than CVRF-CVE file.
skipping CVE-2012-6547 as CVE page is older than CVRF-CVE file.
skipping CVE-2012-6546 as CVE page is older than CVRF-CVE file.
skipping CVE-2012-6545 as CVE page is older than CVRF-CVE file.
skipping CVE-2012-6544 as CVE page is older than CVRF-CVE file.
skipping CVE-2012-6543 as CVE page is older than CVRF-CVE file.
skipping CVE-2012-6542 as CVE page is older than CVRF-CVE file.
skipping CVE-2012-6539 as CVE page is older than CVRF-CVE file.
skipping CVE-2012-6538 as CVE page is older than CVRF-CVE file.
skipping CVE-2012-6537 as CVE page is older than CVRF-CVE file.
skipping CVE-2012-6536 as CVE page is older than CVRF-CVE file.
skipping CVE-2012-6111 as CVE page is older than CVRF-CVE file.
skipping CVE-2012-6094 as CVE page is older than CVRF-CVE file.
skipping CVE-2012-5842 as CVE page is older than CVRF-CVE file.
skipping CVE-2012-5840 as CVE page is older than CVRF-CVE file.
skipping CVE-2012-5839 as CVE page is older than CVRF-CVE file.
skipping CVE-2012-5689 as CVE page is older than CVRF-CVE file.
skipping CVE-2012-5688 as CVE page is older than CVRF-CVE file.
skipping CVE-2012-5615 as CVE page is older than CVRF-CVE file.
skipping CVE-2012-5600 as CVE page is older than CVRF-CVE file.
skipping CVE-2012-5599 as CVE page is older than CVRF-CVE file.
skipping CVE-2012-5598 as CVE page is older than CVRF-CVE file.
skipping CVE-2012-5597 as CVE page is older than CVRF-CVE file.
skipping CVE-2012-5595 as CVE page is older than CVRF-CVE file.
no cpe found for HPE Helion OpenStack Cloud 8 in CVE-2012-5578
no cpe found for HPE Helion OpenStack Cloud 8 in CVE-2012-5577
skipping CVE-2012-5532 as CVE page is older than CVRF-CVE file.
skipping CVE-2012-5517 as CVE page is older than CVRF-CVE file.
skipping CVE-2012-5375 as CVE page is older than CVRF-CVE file.
skipping CVE-2012-5374 as CVE page is older than CVRF-CVE file.
skipping CVE-2012-4929 as CVE page is older than CVRF-CVE file.
skipping CVE-2012-4681 as CVE page is older than CVRF-CVE file.
skipping CVE-2012-4601 as CVE page is older than CVRF-CVE file.
skipping CVE-2012-4571 as CVE page is older than CVRF-CVE file.
skipping CVE-2012-4565 as CVE page is older than CVRF-CVE file.
skipping CVE-2012-4564 as CVE page is older than CVRF-CVE file.
skipping CVE-2012-4542 as CVE page is older than CVRF-CVE file.
skipping CVE-2012-4530 as CVE page is older than CVRF-CVE file.
skipping CVE-2012-4510 as CVE page is older than CVRF-CVE file.
skipping CVE-2012-4508 as CVE page is older than CVRF-CVE file.
skipping CVE-2012-4461 as CVE page is older than CVRF-CVE file.
skipping CVE-2012-4444 as CVE page is older than CVRF-CVE file.
skipping CVE-2012-4398 as CVE page is older than CVRF-CVE file.
skipping CVE-2012-4187 as CVE page is older than CVRF-CVE file.
skipping CVE-2012-4185 as CVE page is older than CVRF-CVE file.
skipping CVE-2012-3992 as CVE page is older than CVRF-CVE file.
skipping CVE-2012-3986 as CVE page is older than CVRF-CVE file.
skipping CVE-2012-3982 as CVE page is older than CVRF-CVE file.
skipping CVE-2012-3878 as CVE page is older than CVRF-CVE file.
skipping CVE-2012-3552 as CVE page is older than CVRF-CVE file.
skipping CVE-2012-3539 as CVE page is older than CVRF-CVE file.
skipping CVE-2012-3520 as CVE page is older than CVRF-CVE file.
skipping CVE-2012-3510 as CVE page is older than CVRF-CVE file.
no cpe found for SUSE Package Hub 15 SP5 in CVE-2012-3505
skipping CVE-2012-3430 as CVE page is older than CVRF-CVE file.
no cpe found for SUSE Linux Enterprise Real Time 11 SP2 in CVE-2012-3412
skipping CVE-2012-3409 as CVE page is older than CVRF-CVE file.
skipping CVE-2012-3386 as CVE page is older than CVRF-CVE file.
skipping CVE-2012-3375 as CVE page is older than CVRF-CVE file.
skipping CVE-2012-3364 as CVE page is older than CVRF-CVE file.
skipping CVE-2012-3136 as CVE page is older than CVRF-CVE file.
skipping CVE-2012-2745 as CVE page is older than CVRF-CVE file.
skipping CVE-2012-2744 as CVE page is older than CVRF-CVE file.
skipping CVE-2012-2737 as CVE page is older than CVRF-CVE file.
skipping CVE-2012-2686 as CVE page is older than CVRF-CVE file.
skipping CVE-2012-2669 as CVE page is older than CVRF-CVE file.
no cpe found for SUSE Package Hub 15 SP2 in CVE-2012-2395
skipping CVE-2012-2390 as CVE page is older than CVRF-CVE file.
skipping CVE-2012-2384 as CVE page is older than CVRF-CVE file.
skipping CVE-2012-2383 as CVE page is older than CVRF-CVE file.
skipping CVE-2012-2375 as CVE page is older than CVRF-CVE file.
skipping CVE-2012-2372 as CVE page is older than CVRF-CVE file.
skipping CVE-2012-2313 as CVE page is older than CVRF-CVE file.
skipping CVE-2012-2137 as CVE page is older than CVRF-CVE file.
skipping CVE-2012-2136 as CVE page is older than CVRF-CVE file.
skipping CVE-2012-2133 as CVE page is older than CVRF-CVE file.
skipping CVE-2012-2127 as CVE page is older than CVRF-CVE file.
skipping CVE-2012-2123 as CVE page is older than CVRF-CVE file.
skipping CVE-2012-2121 as CVE page is older than CVRF-CVE file.
skipping CVE-2012-2119 as CVE page is older than CVRF-CVE file.
skipping CVE-2012-2113 as CVE page is older than CVRF-CVE file.
skipping CVE-2012-2110 as CVE page is older than CVRF-CVE file.
skipping CVE-2012-2100 as CVE page is older than CVRF-CVE file.
skipping CVE-2012-2088 as CVE page is older than CVRF-CVE file.
skipping CVE-2012-1601 as CVE page is older than CVRF-CVE file.
skipping CVE-2012-1583 as CVE page is older than CVRF-CVE file.
skipping CVE-2012-1173 as CVE page is older than CVRF-CVE file.
skipping CVE-2012-1165 as CVE page is older than CVRF-CVE file.
--- /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2012-1150.xml 2024-09-07 03:47:14.563272000 +0200
+++ /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2012-1150.xml.new 2024-10-29 03:46:18.299371000 +0100
@@ -14,13 +14,13 @@
1
- 102
- 2024-09-07T01:47:13Z
+ 103
+ 2024-10-29T02:46:17Z
current
2021-05-30T13:02:31Z
- 2024-09-07T01:47:13Z
+ 2024-10-29T02:46:17Z
cve-database/bin/generate-cvrf-cve.pl
2020-12-27T01:00:00Z
@@ -1921,6 +1921,24 @@
python313-x86-64-v3-3.13.0~b3-1.1
+
+ python314-3.14.0~a1-1.1
+
+
+ python314-curses-3.14.0~a1-1.1
+
+
+ python314-dbm-3.14.0~a1-1.1
+
+
+ python314-idle-3.14.0~a1-1.1
+
+
+ python314-tk-3.14.0~a1-1.1
+
+
+ python314-x86-64-v3-3.14.0~a1-1.1
+
python36
@@ -4366,6 +4384,24 @@
python313-x86-64-v3-3.13.0~b3-1.1 as a component of openSUSE Tumbleweed
+
+ python314-3.14.0~a1-1.1 as a component of openSUSE Tumbleweed
+
+
+ python314-curses-3.14.0~a1-1.1 as a component of openSUSE Tumbleweed
+
+
+ python314-dbm-3.14.0~a1-1.1 as a component of openSUSE Tumbleweed
+
+
+ python314-idle-3.14.0~a1-1.1 as a component of openSUSE Tumbleweed
+
+
+ python314-tk-3.14.0~a1-1.1 as a component of openSUSE Tumbleweed
+
+
+ python314-x86-64-v3-3.14.0~a1-1.1 as a component of openSUSE Tumbleweed
+
python36-3.6.15-1.1 as a component of openSUSE Tumbleweed
@@ -5612,6 +5648,12 @@
openSUSE Tumbleweed:python313-idle-3.13.0~b3-1.1
openSUSE Tumbleweed:python313-tk-3.13.0~b3-1.1
openSUSE Tumbleweed:python313-x86-64-v3-3.13.0~b3-1.1
+ openSUSE Tumbleweed:python314-3.14.0~a1-1.1
+ openSUSE Tumbleweed:python314-curses-3.14.0~a1-1.1
+ openSUSE Tumbleweed:python314-dbm-3.14.0~a1-1.1
+ openSUSE Tumbleweed:python314-idle-3.14.0~a1-1.1
+ openSUSE Tumbleweed:python314-tk-3.14.0~a1-1.1
+ openSUSE Tumbleweed:python314-x86-64-v3-3.14.0~a1-1.1
openSUSE Tumbleweed:python36-3.6.15-1.1
openSUSE Tumbleweed:python36-32bit-3.6.15-1.1
openSUSE Tumbleweed:python36-curses-3.6.15-1.1
no cpe found for SUSE Linux Enterprise Real Time 11 SP1 in CVE-2012-1097
skipping CVE-2012-1096 as CVE page is older than CVRF-CVE file.
skipping CVE-2012-1090 as CVE page is older than CVRF-CVE file.
skipping CVE-2012-1015 as CVE page is older than CVRF-CVE file.
skipping CVE-2012-1014 as CVE page is older than CVRF-CVE file.
skipping CVE-2012-0957 as CVE page is older than CVRF-CVE file.
skipping CVE-2012-0884 as CVE page is older than CVRF-CVE file.
skipping CVE-2012-0880 as CVE page is older than CVRF-CVE file.
skipping CVE-2012-0879 as CVE page is older than CVRF-CVE file.
skipping CVE-2012-0876 as CVE page is older than CVRF-CVE file.
--- /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2012-0845.xml 2024-10-23 04:39:14.889177000 +0200
+++ /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2012-0845.xml.new 2024-10-29 03:46:42.247621000 +0100
@@ -14,13 +14,13 @@
1
- 110
- 2024-10-23T02:39:13Z
+ 111
+ 2024-10-29T02:46:41Z
current
2021-05-30T13:02:12Z
- 2024-10-23T02:39:13Z
+ 2024-10-29T02:46:41Z
cve-database/bin/generate-cvrf-cve.pl
2020-12-27T01:00:00Z
@@ -2076,6 +2076,24 @@
python313-x86-64-v3-3.13.0~b3-1.1
+
+ python314-3.14.0~a1-1.1
+
+
+ python314-curses-3.14.0~a1-1.1
+
+
+ python314-dbm-3.14.0~a1-1.1
+
+
+ python314-idle-3.14.0~a1-1.1
+
+
+ python314-tk-3.14.0~a1-1.1
+
+
+ python314-x86-64-v3-3.14.0~a1-1.1
+
python36
@@ -4533,6 +4551,24 @@
python313-x86-64-v3-3.13.0~b3-1.1 as a component of openSUSE Tumbleweed
+
+ python314-3.14.0~a1-1.1 as a component of openSUSE Tumbleweed
+
+
+ python314-curses-3.14.0~a1-1.1 as a component of openSUSE Tumbleweed
+
+
+ python314-dbm-3.14.0~a1-1.1 as a component of openSUSE Tumbleweed
+
+
+ python314-idle-3.14.0~a1-1.1 as a component of openSUSE Tumbleweed
+
+
+ python314-tk-3.14.0~a1-1.1 as a component of openSUSE Tumbleweed
+
+
+ python314-x86-64-v3-3.14.0~a1-1.1 as a component of openSUSE Tumbleweed
+
python36-3.6.15-1.1 as a component of openSUSE Tumbleweed
@@ -6321,6 +6357,12 @@
openSUSE Tumbleweed:python313-idle-3.13.0~b3-1.1
openSUSE Tumbleweed:python313-tk-3.13.0~b3-1.1
openSUSE Tumbleweed:python313-x86-64-v3-3.13.0~b3-1.1
+ openSUSE Tumbleweed:python314-3.14.0~a1-1.1
+ openSUSE Tumbleweed:python314-curses-3.14.0~a1-1.1
+ openSUSE Tumbleweed:python314-dbm-3.14.0~a1-1.1
+ openSUSE Tumbleweed:python314-idle-3.14.0~a1-1.1
+ openSUSE Tumbleweed:python314-tk-3.14.0~a1-1.1
+ openSUSE Tumbleweed:python314-x86-64-v3-3.14.0~a1-1.1
openSUSE Tumbleweed:python36-3.6.15-1.1
openSUSE Tumbleweed:python36-32bit-3.6.15-1.1
openSUSE Tumbleweed:python36-curses-3.6.15-1.1
skipping CVE-2012-0810 as CVE page is older than CVRF-CVE file.
skipping CVE-2012-0786 as CVE page is older than CVRF-CVE file.
skipping CVE-2012-0698 as CVE page is older than CVRF-CVE file.
skipping CVE-2012-0547 as CVE page is older than CVRF-CVE file.
No V5 entry found for CVE-2012-0416 / /home/securitybot/prod/cve-database/cvelistV5/cves/2012/0xxxx/CVE-2012-0416.json:No such file or directory
No V5 entry found for CVE-2012-0415 / /home/securitybot/prod/cve-database/cvelistV5/cves/2012/0xxxx/CVE-2012-0415.json:No such file or directory
skipping CVE-2012-0058 as CVE page is older than CVRF-CVE file.
skipping CVE-2012-0056 as CVE page is older than CVRF-CVE file.
skipping CVE-2012-0055 as CVE page is older than CVRF-CVE file.
skipping CVE-2012-0050 as CVE page is older than CVRF-CVE file.
no cpe found for SUSE Linux Enterprise Real Time 11 SP1 in CVE-2012-0044
skipping CVE-2012-0045 as CVE page is older than CVRF-CVE file.
skipping CVE-2012-0028 as CVE page is older than CVRF-CVE file.
skipping CVE-2012-0027 as CVE page is older than CVRF-CVE file.
skipping CVE-2011-5327 as CVE page is older than CVRF-CVE file.
no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2011-5325
skipping CVE-2011-5321 as CVE page is older than CVRF-CVE file.
no cpe found for SUSE Package Hub 15 SP2 in CVE-2011-4953
--- /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2011-4944.xml 2024-10-23 04:41:26.039334000 +0200
+++ /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2011-4944.xml.new 2024-10-29 03:48:01.151494000 +0100
@@ -14,13 +14,13 @@
1
- 116
- 2024-10-23T02:41:25Z
+ 117
+ 2024-10-29T02:48:00Z
current
2021-05-30T13:01:01Z
- 2024-10-23T02:41:25Z
+ 2024-10-29T02:48:00Z
cve-database/bin/generate-cvrf-cve.pl
2020-12-27T01:00:00Z
@@ -2117,6 +2117,24 @@
python313-x86-64-v3-3.13.0~b3-1.1
+
+ python314-3.14.0~a1-1.1
+
+
+ python314-curses-3.14.0~a1-1.1
+
+
+ python314-dbm-3.14.0~a1-1.1
+
+
+ python314-idle-3.14.0~a1-1.1
+
+
+ python314-tk-3.14.0~a1-1.1
+
+
+ python314-x86-64-v3-3.14.0~a1-1.1
+
python36
@@ -4574,6 +4592,24 @@
python313-x86-64-v3-3.13.0~b3-1.1 as a component of openSUSE Tumbleweed
+
+ python314-3.14.0~a1-1.1 as a component of openSUSE Tumbleweed
+
+
+ python314-curses-3.14.0~a1-1.1 as a component of openSUSE Tumbleweed
+
+
+ python314-dbm-3.14.0~a1-1.1 as a component of openSUSE Tumbleweed
+
+
+ python314-idle-3.14.0~a1-1.1 as a component of openSUSE Tumbleweed
+
+
+ python314-tk-3.14.0~a1-1.1 as a component of openSUSE Tumbleweed
+
+
+ python314-x86-64-v3-3.14.0~a1-1.1 as a component of openSUSE Tumbleweed
+
python36-3.6.15-1.1 as a component of openSUSE Tumbleweed
@@ -6386,6 +6422,12 @@
openSUSE Tumbleweed:python313-idle-3.13.0~b3-1.1
openSUSE Tumbleweed:python313-tk-3.13.0~b3-1.1
openSUSE Tumbleweed:python313-x86-64-v3-3.13.0~b3-1.1
+ openSUSE Tumbleweed:python314-3.14.0~a1-1.1
+ openSUSE Tumbleweed:python314-curses-3.14.0~a1-1.1
+ openSUSE Tumbleweed:python314-dbm-3.14.0~a1-1.1
+ openSUSE Tumbleweed:python314-idle-3.14.0~a1-1.1
+ openSUSE Tumbleweed:python314-tk-3.14.0~a1-1.1
+ openSUSE Tumbleweed:python314-x86-64-v3-3.14.0~a1-1.1
openSUSE Tumbleweed:python36-3.6.15-1.1
openSUSE Tumbleweed:python36-32bit-3.6.15-1.1
openSUSE Tumbleweed:python36-curses-3.6.15-1.1
skipping CVE-2011-4917 as CVE page is older than CVRF-CVE file.
skipping CVE-2011-4915 as CVE page is older than CVRF-CVE file.
skipping CVE-2011-4862 as CVE page is older than CVRF-CVE file.
no cpe found for SUSE Linux Enterprise Real Time 11 SP2 in CVE-2011-4622
skipping CVE-2011-4619 as CVE page is older than CVRF-CVE file.
skipping CVE-2011-4611 as CVE page is older than CVRF-CVE file.
skipping CVE-2011-4604 as CVE page is older than CVRF-CVE file.
skipping CVE-2011-4594 as CVE page is older than CVRF-CVE file.
skipping CVE-2011-4577 as CVE page is older than CVRF-CVE file.
skipping CVE-2011-4576 as CVE page is older than CVRF-CVE file.
skipping CVE-2011-4517 as CVE page is older than CVRF-CVE file.
skipping CVE-2011-4516 as CVE page is older than CVRF-CVE file.
skipping CVE-2011-4348 as CVE page is older than CVRF-CVE file.
skipping CVE-2011-4330 as CVE page is older than CVRF-CVE file.
skipping CVE-2011-4326 as CVE page is older than CVRF-CVE file.
skipping CVE-2011-4324 as CVE page is older than CVRF-CVE file.
skipping CVE-2011-4132 as CVE page is older than CVRF-CVE file.
skipping CVE-2011-4131 as CVE page is older than CVRF-CVE file.
skipping CVE-2011-4110 as CVE page is older than CVRF-CVE file.
skipping CVE-2011-4108 as CVE page is older than CVRF-CVE file.
skipping CVE-2011-4086 as CVE page is older than CVRF-CVE file.
skipping CVE-2011-4081 as CVE page is older than CVRF-CVE file.
skipping CVE-2011-4080 as CVE page is older than CVRF-CVE file.
skipping CVE-2011-4077 as CVE page is older than CVRF-CVE file.
skipping CVE-2011-3638 as CVE page is older than CVRF-CVE file.
skipping CVE-2011-3593 as CVE page is older than CVRF-CVE file.
skipping CVE-2011-3585 as CVE page is older than CVRF-CVE file.
skipping CVE-2011-3464 as CVE page is older than CVRF-CVE file.
--- /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2011-3389.xml 2024-09-07 03:49:52.539461000 +0200
+++ /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2011-3389.xml.new 2024-10-29 03:49:21.587307000 +0100
@@ -14,13 +14,13 @@
1
- 96
- 2024-09-07T01:49:51Z
+ 97
+ 2024-10-29T02:49:19Z
current
2021-05-30T12:59:44Z
- 2024-09-07T01:49:51Z
+ 2024-10-29T02:49:19Z
cve-database/bin/generate-cvrf-cve.pl
2020-12-27T01:00:00Z
@@ -2554,6 +2554,24 @@
python313-x86-64-v3-3.13.0~b3-1.1
+
+ python314-3.14.0~a1-1.1
+
+
+ python314-curses-3.14.0~a1-1.1
+
+
+ python314-dbm-3.14.0~a1-1.1
+
+
+ python314-idle-3.14.0~a1-1.1
+
+
+ python314-tk-3.14.0~a1-1.1
+
+
+ python314-x86-64-v3-3.14.0~a1-1.1
+
python36
@@ -5818,6 +5836,24 @@
python313-x86-64-v3-3.13.0~b3-1.1 as a component of openSUSE Tumbleweed
+
+ python314-3.14.0~a1-1.1 as a component of openSUSE Tumbleweed
+
+
+ python314-curses-3.14.0~a1-1.1 as a component of openSUSE Tumbleweed
+
+
+ python314-dbm-3.14.0~a1-1.1 as a component of openSUSE Tumbleweed
+
+
+ python314-idle-3.14.0~a1-1.1 as a component of openSUSE Tumbleweed
+
+
+ python314-tk-3.14.0~a1-1.1 as a component of openSUSE Tumbleweed
+
+
+ python314-x86-64-v3-3.14.0~a1-1.1 as a component of openSUSE Tumbleweed
+
python36-3.6.15-1.1 as a component of openSUSE Tumbleweed
@@ -7431,6 +7467,12 @@
openSUSE Tumbleweed:python313-idle-3.13.0~b3-1.1
openSUSE Tumbleweed:python313-tk-3.13.0~b3-1.1
openSUSE Tumbleweed:python313-x86-64-v3-3.13.0~b3-1.1
+ openSUSE Tumbleweed:python314-3.14.0~a1-1.1
+ openSUSE Tumbleweed:python314-curses-3.14.0~a1-1.1
+ openSUSE Tumbleweed:python314-dbm-3.14.0~a1-1.1
+ openSUSE Tumbleweed:python314-idle-3.14.0~a1-1.1
+ openSUSE Tumbleweed:python314-tk-3.14.0~a1-1.1
+ openSUSE Tumbleweed:python314-x86-64-v3-3.14.0~a1-1.1
openSUSE Tumbleweed:python36-3.6.15-1.1
openSUSE Tumbleweed:python36-32bit-3.6.15-1.1
openSUSE Tumbleweed:python36-curses-3.6.15-1.1
skipping CVE-2011-3363 as CVE page is older than CVRF-CVE file.
skipping CVE-2011-3359 as CVE page is older than CVRF-CVE file.
no cpe found for SUSE Linux Enterprise Real Time 11 SP1 in CVE-2011-3353
skipping CVE-2011-3351 as CVE page is older than CVRF-CVE file.
skipping CVE-2011-3328 as CVE page is older than CVRF-CVE file.
skipping CVE-2011-3210 as CVE page is older than CVRF-CVE file.
skipping CVE-2011-3207 as CVE page is older than CVRF-CVE file.
skipping CVE-2011-3191 as CVE page is older than CVRF-CVE file.
skipping CVE-2011-3188 as CVE page is older than CVRF-CVE file.
skipping CVE-2011-3048 as CVE page is older than CVRF-CVE file.
skipping CVE-2011-3026 as CVE page is older than CVRF-CVE file.
skipping CVE-2011-2942 as CVE page is older than CVRF-CVE file.
skipping CVE-2011-2928 as CVE page is older than CVRF-CVE file.
skipping CVE-2011-2918 as CVE page is older than CVRF-CVE file.
skipping CVE-2011-2905 as CVE page is older than CVRF-CVE file.
skipping CVE-2011-2898 as CVE page is older than CVRF-CVE file.
no cpe found for SUSE Package Hub 15 in CVE-2011-2767
no cpe found for SUSE Package Hub 15 SP1 in CVE-2011-2767
skipping CVE-2011-2724 as CVE page is older than CVRF-CVE file.
skipping CVE-2011-2707 as CVE page is older than CVRF-CVE file.
skipping CVE-2011-2700 as CVE page is older than CVRF-CVE file.
skipping CVE-2011-2699 as CVE page is older than CVRF-CVE file.
skipping CVE-2011-2695 as CVE page is older than CVRF-CVE file.
skipping CVE-2011-2692 as CVE page is older than CVRF-CVE file.
skipping CVE-2011-2691 as CVE page is older than CVRF-CVE file.
skipping CVE-2011-2690 as CVE page is older than CVRF-CVE file.
skipping CVE-2011-2689 as CVE page is older than CVRF-CVE file.
skipping CVE-2011-2534 as CVE page is older than CVRF-CVE file.
skipping CVE-2011-2525 as CVE page is older than CVRF-CVE file.
skipping CVE-2011-2518 as CVE page is older than CVRF-CVE file.
skipping CVE-2011-2517 as CVE page is older than CVRF-CVE file.
skipping CVE-2011-2501 as CVE page is older than CVRF-CVE file.
no cpe found for SUSE Linux Enterprise Real Time 11 SP1 in CVE-2011-2496
skipping CVE-2011-2497 as CVE page is older than CVRF-CVE file.
no cpe found for SUSE Linux Enterprise Real Time 11 SP1 in CVE-2011-2495
skipping CVE-2011-2494 as CVE page is older than CVRF-CVE file.
skipping CVE-2011-2493 as CVE page is older than CVRF-CVE file.
skipping CVE-2011-2492 as CVE page is older than CVRF-CVE file.
skipping CVE-2011-2491 as CVE page is older than CVRF-CVE file.
skipping CVE-2011-2484 as CVE page is older than CVRF-CVE file.
skipping CVE-2011-2482 as CVE page is older than CVRF-CVE file.
No V5 entry found for CVE-2011-2390 / /home/securitybot/prod/cve-database/cvelistV5/cves/2011/2xxxx/CVE-2011-2390.json:No such file or directory
skipping CVE-2011-2225 as CVE page is older than CVRF-CVE file.
skipping CVE-2011-2213 as CVE page is older than CVRF-CVE file.
skipping CVE-2011-2203 as CVE page is older than CVRF-CVE file.
skipping CVE-2011-2189 as CVE page is older than CVRF-CVE file.
skipping CVE-2011-2182 as CVE page is older than CVRF-CVE file.
skipping CVE-2011-1945 as CVE page is older than CVRF-CVE file.
skipping CVE-2011-1927 as CVE page is older than CVRF-CVE file.
skipping CVE-2011-1833 as CVE page is older than CVRF-CVE file.
skipping CVE-2011-1776 as CVE page is older than CVRF-CVE file.
skipping CVE-2011-1771 as CVE page is older than CVRF-CVE file.
skipping CVE-2011-1770 as CVE page is older than CVRF-CVE file.
skipping CVE-2011-1767 as CVE page is older than CVRF-CVE file.
skipping CVE-2011-1747 as CVE page is older than CVRF-CVE file.
skipping CVE-2011-1745 as CVE page is older than CVRF-CVE file.
skipping CVE-2011-1598 as CVE page is older than CVRF-CVE file.
no cpe found for SUSE Linux Enterprise Real Time 11 SP1 in CVE-2011-1593
skipping CVE-2011-1585 as CVE page is older than CVRF-CVE file.
skipping CVE-2011-1577 as CVE page is older than CVRF-CVE file.
skipping CVE-2011-1576 as CVE page is older than CVRF-CVE file.
skipping CVE-2011-1573 as CVE page is older than CVRF-CVE file.
skipping CVE-2011-1526 as CVE page is older than CVRF-CVE file.
skipping CVE-2011-1495 as CVE page is older than CVRF-CVE file.
skipping CVE-2011-1494 as CVE page is older than CVRF-CVE file.
skipping CVE-2011-1493 as CVE page is older than CVRF-CVE file.
skipping CVE-2011-1490 as CVE page is older than CVRF-CVE file.
skipping CVE-2011-1489 as CVE page is older than CVRF-CVE file.
skipping CVE-2011-1488 as CVE page is older than CVRF-CVE file.
skipping CVE-2011-1479 as CVE page is older than CVRF-CVE file.
skipping CVE-2011-1478 as CVE page is older than CVRF-CVE file.
skipping CVE-2011-1473 as CVE page is older than CVRF-CVE file.
No V5 entry found for CVE-2011-1410 / /home/securitybot/prod/cve-database/cvelistV5/cves/2011/1xxxx/CVE-2011-1410.json:No such file or directory
No V5 entry found for CVE-2011-1210 / /home/securitybot/prod/cve-database/cvelistV5/cves/2011/1xxxx/CVE-2011-1210.json:No such file or directory
skipping CVE-2011-1182 as CVE page is older than CVRF-CVE file.
skipping CVE-2011-1173 as CVE page is older than CVRF-CVE file.
skipping CVE-2011-1172 as CVE page is older than CVRF-CVE file.
skipping CVE-2011-1171 as CVE page is older than CVRF-CVE file.
skipping CVE-2011-1170 as CVE page is older than CVRF-CVE file.
skipping CVE-2011-1169 as CVE page is older than CVRF-CVE file.
skipping CVE-2011-1163 as CVE page is older than CVRF-CVE file.
skipping CVE-2011-1162 as CVE page is older than CVRF-CVE file.
skipping CVE-2011-1160 as CVE page is older than CVRF-CVE file.
skipping CVE-2011-1098 as CVE page is older than CVRF-CVE file.
skipping CVE-2011-1093 as CVE page is older than CVRF-CVE file.
skipping CVE-2011-1090 as CVE page is older than CVRF-CVE file.
skipping CVE-2011-1083 as CVE page is older than CVRF-CVE file.
skipping CVE-2011-1082 as CVE page is older than CVRF-CVE file.
skipping CVE-2011-1080 as CVE page is older than CVRF-CVE file.
skipping CVE-2011-1079 as CVE page is older than CVRF-CVE file.
skipping CVE-2011-1078 as CVE page is older than CVRF-CVE file.
skipping CVE-2011-1076 as CVE page is older than CVRF-CVE file.
skipping CVE-2011-1023 as CVE page is older than CVRF-CVE file.
skipping CVE-2011-1021 as CVE page is older than CVRF-CVE file.
skipping CVE-2011-1020 as CVE page is older than CVRF-CVE file.
skipping CVE-2011-1019 as CVE page is older than CVRF-CVE file.
skipping CVE-2011-1017 as CVE page is older than CVRF-CVE file.
skipping CVE-2011-1016 as CVE page is older than CVRF-CVE file.
skipping CVE-2011-1013 as CVE page is older than CVRF-CVE file.
skipping CVE-2011-1012 as CVE page is older than CVRF-CVE file.
skipping CVE-2011-1010 as CVE page is older than CVRF-CVE file.
skipping CVE-2011-0999 as CVE page is older than CVRF-CVE file.
skipping CVE-2011-0726 as CVE page is older than CVRF-CVE file.
skipping CVE-2011-0712 as CVE page is older than CVRF-CVE file.
skipping CVE-2011-0711 as CVE page is older than CVRF-CVE file.
skipping CVE-2011-0710 as CVE page is older than CVRF-CVE file.
skipping CVE-2011-0709 as CVE page is older than CVRF-CVE file.
skipping CVE-2011-0699 as CVE page is older than CVRF-CVE file.
skipping CVE-2011-0541 as CVE page is older than CVRF-CVE file.
skipping CVE-2011-0521 as CVE page is older than CVRF-CVE file.
skipping CVE-2011-0463 as CVE page is older than CVRF-CVE file.
skipping CVE-2011-0414 as CVE page is older than CVRF-CVE file.
No V5 entry found for CVE-2011-0068 / /home/securitybot/prod/cve-database/cvelistV5/cves/2011/0xxxx/CVE-2011-0068.json:No such file or directory
skipping CVE-2011-0014 as CVE page is older than CVRF-CVE file.
skipping CVE-2010-5332 as CVE page is older than CVRF-CVE file.
skipping CVE-2010-5331 as CVE page is older than CVRF-CVE file.
skipping CVE-2010-5321 as CVE page is older than CVRF-CVE file.
skipping CVE-2010-5313 as CVE page is older than CVRF-CVE file.
skipping CVE-2010-5304 as CVE page is older than CVRF-CVE file.
skipping CVE-2010-5298 as CVE page is older than CVRF-CVE file.
skipping CVE-2010-4805 as CVE page is older than CVRF-CVE file.
no cpe found for SUSE Linux Enterprise Real Time 11 SP1 in CVE-2010-4668
no cpe found for SUSE Linux Enterprise Real Time 11 SP1 in CVE-2010-4655
no cpe found for SUSE Linux Enterprise Real Time 11 SP1 in CVE-2010-4650
skipping CVE-2010-4649 as CVE page is older than CVRF-CVE file.
skipping CVE-2010-4648 as CVE page is older than CVRF-CVE file.
skipping CVE-2010-4565 as CVE page is older than CVRF-CVE file.
no cpe found for SUSE Linux Enterprise Real Time 11 SP1 in CVE-2010-4529
skipping CVE-2010-4527 as CVE page is older than CVRF-CVE file.
no cpe found for SUSE Linux Enterprise Real Time 11 SP1 in CVE-2010-4525
skipping CVE-2010-4494 as CVE page is older than CVRF-CVE file.
skipping CVE-2010-4347 as CVE page is older than CVRF-CVE file.
skipping CVE-2010-4346 as CVE page is older than CVRF-CVE file.
skipping CVE-2010-4343 as CVE page is older than CVRF-CVE file.
skipping CVE-2010-4342 as CVE page is older than CVRF-CVE file.
No V5 entry found for CVE-2010-4318 / /home/securitybot/prod/cve-database/cvelistV5/cves/2010/4xxxx/CVE-2010-4318.json:No such file or directory
No V5 entry found for CVE-2010-4315 / /home/securitybot/prod/cve-database/cvelistV5/cves/2010/4xxxx/CVE-2010-4315.json:No such file or directory
skipping CVE-2010-4267 as CVE page is older than CVRF-CVE file.
skipping CVE-2010-4263 as CVE page is older than CVRF-CVE file.
skipping CVE-2010-4258 as CVE page is older than CVRF-CVE file.
skipping CVE-2010-4256 as CVE page is older than CVRF-CVE file.
skipping CVE-2010-4251 as CVE page is older than CVRF-CVE file.
skipping CVE-2010-4250 as CVE page is older than CVRF-CVE file.
skipping CVE-2010-4249 as CVE page is older than CVRF-CVE file.
skipping CVE-2010-4248 as CVE page is older than CVRF-CVE file.
skipping CVE-2010-4243 as CVE page is older than CVRF-CVE file.
skipping CVE-2010-4242 as CVE page is older than CVRF-CVE file.
no cpe found for SUSE Linux Enterprise Real Time 11 SP1 in CVE-2010-4175
skipping CVE-2010-4169 as CVE page is older than CVRF-CVE file.
no cpe found for SUSE Linux Enterprise Real Time 11 SP1 in CVE-2010-4164
skipping CVE-2010-4165 as CVE page is older than CVRF-CVE file.
skipping CVE-2010-4163 as CVE page is older than CVRF-CVE file.
skipping CVE-2010-4162 as CVE page is older than CVRF-CVE file.
skipping CVE-2010-4160 as CVE page is older than CVRF-CVE file.
no cpe found for SUSE Linux Enterprise Real Time 11 SP1 in CVE-2010-4157
skipping CVE-2010-4158 as CVE page is older than CVRF-CVE file.
no cpe found for SUSE Linux Enterprise Real Time 11 SP1 in CVE-2010-4083
no cpe found for SUSE Linux Enterprise Real Time 11 SP1 in CVE-2010-4082
skipping CVE-2010-4081 as CVE page is older than CVRF-CVE file.
skipping CVE-2010-4080 as CVE page is older than CVRF-CVE file.
no cpe found for SUSE Linux Enterprise Real Time 11 SP1 in CVE-2010-4077
skipping CVE-2010-4078 as CVE page is older than CVRF-CVE file.
no cpe found for SUSE Linux Enterprise Real Time 11 SP1 in CVE-2010-4076
no cpe found for SUSE Linux Enterprise Real Time 11 SP1 in CVE-2010-4075
no cpe found for SUSE Linux Enterprise Real Time 11 SP1 in CVE-2010-4074
no cpe found for SUSE Linux Enterprise Real Time 11 SP1 in CVE-2010-4073
no cpe found for SUSE Linux Enterprise Real Time 11 SP1 in CVE-2010-4072
skipping CVE-2010-4008 as CVE page is older than CVRF-CVE file.
No V5 entry found for CVE-2010-4004 / /home/securitybot/prod/cve-database/cvelistV5/cves/2010/4xxxx/CVE-2010-4004.json:No such file or directory
No V5 entry found for CVE-2010-4003 / /home/securitybot/prod/cve-database/cvelistV5/cves/2010/4xxxx/CVE-2010-4003.json:No such file or directory
No V5 entry found for CVE-2010-3997 / /home/securitybot/prod/cve-database/cvelistV5/cves/2010/3xxxx/CVE-2010-3997.json:No such file or directory
skipping CVE-2010-3904 as CVE page is older than CVRF-CVE file.
skipping CVE-2010-3881 as CVE page is older than CVRF-CVE file.
skipping CVE-2010-3880 as CVE page is older than CVRF-CVE file.
skipping CVE-2010-3877 as CVE page is older than CVRF-CVE file.
skipping CVE-2010-3876 as CVE page is older than CVRF-CVE file.
skipping CVE-2010-3875 as CVE page is older than CVRF-CVE file.
skipping CVE-2010-3874 as CVE page is older than CVRF-CVE file.
skipping CVE-2010-3873 as CVE page is older than CVRF-CVE file.
skipping CVE-2010-3865 as CVE page is older than CVRF-CVE file.
skipping CVE-2010-3864 as CVE page is older than CVRF-CVE file.
skipping CVE-2010-3861 as CVE page is older than CVRF-CVE file.
skipping CVE-2010-3858 as CVE page is older than CVRF-CVE file.
skipping CVE-2010-3850 as CVE page is older than CVRF-CVE file.
skipping CVE-2010-3849 as CVE page is older than CVRF-CVE file.
skipping CVE-2010-3848 as CVE page is older than CVRF-CVE file.
skipping CVE-2010-3705 as CVE page is older than CVRF-CVE file.
skipping CVE-2010-3698 as CVE page is older than CVRF-CVE file.
No V5 entry found for CVE-2010-3675 / /home/securitybot/prod/cve-database/cvelistV5/cves/2010/3xxxx/CVE-2010-3675.json:No such file or directory
skipping CVE-2010-3448 as CVE page is older than CVRF-CVE file.
skipping CVE-2010-3445 as CVE page is older than CVRF-CVE file.
skipping CVE-2010-3442 as CVE page is older than CVRF-CVE file.
skipping CVE-2010-3437 as CVE page is older than CVRF-CVE file.
skipping CVE-2010-3434 as CVE page is older than CVRF-CVE file.
skipping CVE-2010-3432 as CVE page is older than CVRF-CVE file.
No V5 entry found for CVE-2010-3395 / /home/securitybot/prod/cve-database/cvelistV5/cves/2010/3xxxx/CVE-2010-3395.json:No such file or directory
No V5 entry found for CVE-2010-3392 / /home/securitybot/prod/cve-database/cvelistV5/cves/2010/3xxxx/CVE-2010-3392.json:No such file or directory
No V5 entry found for CVE-2010-3391 / /home/securitybot/prod/cve-database/cvelistV5/cves/2010/3xxxx/CVE-2010-3391.json:No such file or directory
No V5 entry found for CVE-2010-3390 / /home/securitybot/prod/cve-database/cvelistV5/cves/2010/3xxxx/CVE-2010-3390.json:No such file or directory
No V5 entry found for CVE-2010-3388 / /home/securitybot/prod/cve-database/cvelistV5/cves/2010/3xxxx/CVE-2010-3388.json:No such file or directory
No V5 entry found for CVE-2010-3379 / /home/securitybot/prod/cve-database/cvelistV5/cves/2010/3xxxx/CVE-2010-3379.json:No such file or directory
No V5 entry found for CVE-2010-3371 / /home/securitybot/prod/cve-database/cvelistV5/cves/2010/3xxxx/CVE-2010-3371.json:No such file or directory
No V5 entry found for CVE-2010-3370 / /home/securitybot/prod/cve-database/cvelistV5/cves/2010/3xxxx/CVE-2010-3370.json:No such file or directory
No V5 entry found for CVE-2010-3368 / /home/securitybot/prod/cve-database/cvelistV5/cves/2010/3xxxx/CVE-2010-3368.json:No such file or directory
No V5 entry found for CVE-2010-3367 / /home/securitybot/prod/cve-database/cvelistV5/cves/2010/3xxxx/CVE-2010-3367.json:No such file or directory
No V5 entry found for CVE-2010-3356 / /home/securitybot/prod/cve-database/cvelistV5/cves/2010/3xxxx/CVE-2010-3356.json:No such file or directory
No V5 entry found for CVE-2010-3352 / /home/securitybot/prod/cve-database/cvelistV5/cves/2010/3xxxx/CVE-2010-3352.json:No such file or directory
no cpe found for SUSE Linux Enterprise Real Time 11 SP1 in CVE-2010-3310
skipping CVE-2010-3301 as CVE page is older than CVRF-CVE file.
skipping CVE-2010-3298 as CVE page is older than CVRF-CVE file.
skipping CVE-2010-3297 as CVE page is older than CVRF-CVE file.
skipping CVE-2010-3296 as CVE page is older than CVRF-CVE file.
skipping CVE-2010-3192 as CVE page is older than CVRF-CVE file.
skipping CVE-2010-3086 as CVE page is older than CVRF-CVE file.
skipping CVE-2010-3084 as CVE page is older than CVRF-CVE file.
skipping CVE-2010-3081 as CVE page is older than CVRF-CVE file.
skipping CVE-2010-3080 as CVE page is older than CVRF-CVE file.
skipping CVE-2010-3079 as CVE page is older than CVRF-CVE file.
skipping CVE-2010-3078 as CVE page is older than CVRF-CVE file.
skipping CVE-2010-3067 as CVE page is older than CVRF-CVE file.
skipping CVE-2010-3066 as CVE page is older than CVRF-CVE file.
no cpe found for SUSE Linux Enterprise Real Time 11 SP1 in CVE-2010-3015
skipping CVE-2010-2995 as CVE page is older than CVRF-CVE file.
skipping CVE-2010-2994 as CVE page is older than CVRF-CVE file.
skipping CVE-2010-2993 as CVE page is older than CVRF-CVE file.
skipping CVE-2010-2992 as CVE page is older than CVRF-CVE file.
no cpe found for SUSE Linux Enterprise Real Time 11 SP1 in CVE-2010-2962
no cpe found for SUSE Linux Enterprise Real Time 11 SP1 in CVE-2010-2960
no cpe found for SUSE Linux Enterprise Real Time 11 SP1 in CVE-2010-2959
no cpe found for SUSE Linux Enterprise Real Time 11 SP1 in CVE-2010-2955
skipping CVE-2010-2954 as CVE page is older than CVRF-CVE file.
skipping CVE-2010-2946 as CVE page is older than CVRF-CVE file.
skipping CVE-2010-2943 as CVE page is older than CVRF-CVE file.
skipping CVE-2010-2942 as CVE page is older than CVRF-CVE file.
skipping CVE-2010-2939 as CVE page is older than CVRF-CVE file.
skipping CVE-2010-2891 as CVE page is older than CVRF-CVE file.
skipping CVE-2010-2803 as CVE page is older than CVRF-CVE file.
skipping CVE-2010-2798 as CVE page is older than CVRF-CVE file.
skipping CVE-2010-2537 as CVE page is older than CVRF-CVE file.
skipping CVE-2010-2524 as CVE page is older than CVRF-CVE file.
skipping CVE-2010-2521 as CVE page is older than CVRF-CVE file.
skipping CVE-2010-2495 as CVE page is older than CVRF-CVE file.
skipping CVE-2010-2492 as CVE page is older than CVRF-CVE file.
skipping CVE-2010-2249 as CVE page is older than CVRF-CVE file.
skipping CVE-2010-2248 as CVE page is older than CVRF-CVE file.
skipping CVE-2010-2243 as CVE page is older than CVRF-CVE file.
skipping CVE-2010-2240 as CVE page is older than CVRF-CVE file.
skipping CVE-2010-2226 as CVE page is older than CVRF-CVE file.
no cpe found for SUSE Linux Enterprise Real Time 11 SP1 in CVE-2010-2221
skipping CVE-2010-2066 as CVE page is older than CVRF-CVE file.
skipping CVE-2010-1643 as CVE page is older than CVRF-CVE file.
skipping CVE-2010-1641 as CVE page is older than CVRF-CVE file.
skipping CVE-2010-1636 as CVE page is older than CVRF-CVE file.
skipping CVE-2010-1633 as CVE page is older than CVRF-CVE file.
skipping CVE-2010-1446 as CVE page is older than CVRF-CVE file.
skipping CVE-2010-1437 as CVE page is older than CVRF-CVE file.
skipping CVE-2010-1436 as CVE page is older than CVRF-CVE file.
skipping CVE-2010-1205 as CVE page is older than CVRF-CVE file.
skipping CVE-2010-1188 as CVE page is older than CVRF-CVE file.
skipping CVE-2010-1173 as CVE page is older than CVRF-CVE file.
skipping CVE-2010-1172 as CVE page is older than CVRF-CVE file.
skipping CVE-2010-1162 as CVE page is older than CVRF-CVE file.
skipping CVE-2010-1148 as CVE page is older than CVRF-CVE file.
skipping CVE-2010-1146 as CVE page is older than CVRF-CVE file.
skipping CVE-2010-1126 as CVE page is older than CVRF-CVE file.
skipping CVE-2010-1000 as CVE page is older than CVRF-CVE file.
skipping CVE-2010-0926 as CVE page is older than CVRF-CVE file.
no cpe found for SUSE Linux Enterprise Real Time 11 SP1 in CVE-2010-0743
skipping CVE-2010-0742 as CVE page is older than CVRF-CVE file.
skipping CVE-2010-0741 as CVE page is older than CVRF-CVE file.
skipping CVE-2010-0740 as CVE page is older than CVRF-CVE file.
skipping CVE-2010-0730 as CVE page is older than CVRF-CVE file.
skipping CVE-2010-0624 as CVE page is older than CVRF-CVE file.
skipping CVE-2010-0623 as CVE page is older than CVRF-CVE file.
skipping CVE-2010-0415 as CVE page is older than CVRF-CVE file.
skipping CVE-2010-0410 as CVE page is older than CVRF-CVE file.
skipping CVE-2010-0307 as CVE page is older than CVRF-CVE file.
skipping CVE-2010-0205 as CVE page is older than CVRF-CVE file.
skipping CVE-2010-0015 as CVE page is older than CVRF-CVE file.
skipping CVE-2010-0008 as CVE page is older than CVRF-CVE file.
skipping CVE-2010-0007 as CVE page is older than CVRF-CVE file.
skipping CVE-2010-0006 as CVE page is older than CVRF-CVE file.
skipping CVE-2010-0003 as CVE page is older than CVRF-CVE file.
no entry found for CVE-2009-5515 / /home/securitybot/prod/cve-database/cvelist/2009/5xxxx/CVE-2009-5515.json:No such file or directory
No V5 entry found for CVE-2009-5515 / /home/securitybot/prod/cve-database/cvelistV5/cves/2009/5xxxx/CVE-2009-5515.json:No such file or directory
skipping CVE-2009-5146 as CVE page is older than CVRF-CVE file.
skipping CVE-2009-5081 as CVE page is older than CVRF-CVE file.
skipping CVE-2009-4538 as CVE page is older than CVRF-CVE file.
skipping CVE-2009-4537 as CVE page is older than CVRF-CVE file.
skipping CVE-2009-4536 as CVE page is older than CVRF-CVE file.
skipping CVE-2009-4308 as CVE page is older than CVRF-CVE file.
skipping CVE-2009-4307 as CVE page is older than CVRF-CVE file.
skipping CVE-2009-4306 as CVE page is older than CVRF-CVE file.
skipping CVE-2009-4138 as CVE page is older than CVRF-CVE file.
skipping CVE-2009-4131 as CVE page is older than CVRF-CVE file.
no cpe found for SUSE Package Hub 15 SP1 in CVE-2009-4112
skipping CVE-2009-4067 as CVE page is older than CVRF-CVE file.
skipping CVE-2009-4031 as CVE page is older than CVRF-CVE file.
skipping CVE-2009-4030 as CVE page is older than CVRF-CVE file.
skipping CVE-2009-4028 as CVE page is older than CVRF-CVE file.
skipping CVE-2009-4027 as CVE page is older than CVRF-CVE file.
skipping CVE-2009-4026 as CVE page is older than CVRF-CVE file.
skipping CVE-2009-4020 as CVE page is older than CVRF-CVE file.
skipping CVE-2009-4019 as CVE page is older than CVRF-CVE file.
skipping CVE-2009-4012 as CVE page is older than CVRF-CVE file.
skipping CVE-2009-4004 as CVE page is older than CVRF-CVE file.
skipping CVE-2009-3939 as CVE page is older than CVRF-CVE file.
skipping CVE-2009-3889 as CVE page is older than CVRF-CVE file.
skipping CVE-2009-3725 as CVE page is older than CVRF-CVE file.
skipping CVE-2009-3720 as CVE page is older than CVRF-CVE file.
skipping CVE-2009-3640 as CVE page is older than CVRF-CVE file.
skipping CVE-2009-3638 as CVE page is older than CVRF-CVE file.
skipping CVE-2009-3624 as CVE page is older than CVRF-CVE file.
skipping CVE-2009-3623 as CVE page is older than CVRF-CVE file.
skipping CVE-2009-3621 as CVE page is older than CVRF-CVE file.
skipping CVE-2009-3620 as CVE page is older than CVRF-CVE file.
skipping CVE-2009-3612 as CVE page is older than CVRF-CVE file.
skipping CVE-2009-3560 as CVE page is older than CVRF-CVE file.
skipping CVE-2009-3559 as CVE page is older than CVRF-CVE file.
skipping CVE-2009-3556 as CVE page is older than CVRF-CVE file.
skipping CVE-2009-3547 as CVE page is older than CVRF-CVE file.
skipping CVE-2009-3379 as CVE page is older than CVRF-CVE file.
skipping CVE-2009-3297 as CVE page is older than CVRF-CVE file.
skipping CVE-2009-3286 as CVE page is older than CVRF-CVE file.
skipping CVE-2009-3280 as CVE page is older than CVRF-CVE file.
skipping CVE-2009-3228 as CVE page is older than CVRF-CVE file.
no cpe found for Subscription Management Tool 11 in CVE-2009-3050
No V5 entry found for CVE-2009-2941 / /home/securitybot/prod/cve-database/cvelistV5/cves/2009/2xxxx/CVE-2009-2941.json:No such file or directory
skipping CVE-2009-2910 as CVE page is older than CVRF-CVE file.
skipping CVE-2009-2908 as CVE page is older than CVRF-CVE file.
skipping CVE-2009-2905 as CVE page is older than CVRF-CVE file.
skipping CVE-2009-2903 as CVE page is older than CVRF-CVE file.
skipping CVE-2009-2848 as CVE page is older than CVRF-CVE file.
skipping CVE-2009-2844 as CVE page is older than CVRF-CVE file.
skipping CVE-2009-2767 as CVE page is older than CVRF-CVE file.
skipping CVE-2009-2698 as CVE page is older than CVRF-CVE file.
skipping CVE-2009-2691 as CVE page is older than CVRF-CVE file.
skipping CVE-2009-2688 as CVE page is older than CVRF-CVE file.
skipping CVE-2009-2625 as CVE page is older than CVRF-CVE file.
skipping CVE-2009-2408 as CVE page is older than CVRF-CVE file.
skipping CVE-2009-2407 as CVE page is older than CVRF-CVE file.
skipping CVE-2009-2406 as CVE page is older than CVRF-CVE file.
skipping CVE-2009-1961 as CVE page is older than CVRF-CVE file.
skipping CVE-2009-1895 as CVE page is older than CVRF-CVE file.
skipping CVE-2009-1885 as CVE page is older than CVRF-CVE file.
skipping CVE-2009-1883 as CVE page is older than CVRF-CVE file.
skipping CVE-2009-1633 as CVE page is older than CVRF-CVE file.
skipping CVE-2009-1630 as CVE page is older than CVRF-CVE file.
skipping CVE-2009-1439 as CVE page is older than CVRF-CVE file.
skipping CVE-2009-1389 as CVE page is older than CVRF-CVE file.
skipping CVE-2009-1387 as CVE page is older than CVRF-CVE file.
skipping CVE-2009-1386 as CVE page is older than CVRF-CVE file.
skipping CVE-2009-1385 as CVE page is older than CVRF-CVE file.
skipping CVE-2009-1381 as CVE page is older than CVRF-CVE file.
skipping CVE-2009-1379 as CVE page is older than CVRF-CVE file.
skipping CVE-2009-1378 as CVE page is older than CVRF-CVE file.
skipping CVE-2009-1377 as CVE page is older than CVRF-CVE file.
skipping CVE-2009-1337 as CVE page is older than CVRF-CVE file.
skipping CVE-2009-1336 as CVE page is older than CVRF-CVE file.
skipping CVE-2009-1298 as CVE page is older than CVRF-CVE file.
skipping CVE-2009-1265 as CVE page is older than CVRF-CVE file.
skipping CVE-2009-1242 as CVE page is older than CVRF-CVE file.
skipping CVE-2009-1192 as CVE page is older than CVRF-CVE file.
skipping CVE-2009-1185 as CVE page is older than CVRF-CVE file.
skipping CVE-2009-1143 as CVE page is older than CVRF-CVE file.
skipping CVE-2009-1072 as CVE page is older than CVRF-CVE file.
skipping CVE-2009-1046 as CVE page is older than CVRF-CVE file.
skipping CVE-2009-0935 as CVE page is older than CVRF-CVE file.
skipping CVE-2009-0887 as CVE page is older than CVRF-CVE file.
skipping CVE-2009-0835 as CVE page is older than CVRF-CVE file.
skipping CVE-2009-0834 as CVE page is older than CVRF-CVE file.
skipping CVE-2009-0798 as CVE page is older than CVRF-CVE file.
skipping CVE-2009-0789 as CVE page is older than CVRF-CVE file.
skipping CVE-2009-0787 as CVE page is older than CVRF-CVE file.
skipping CVE-2009-0778 as CVE page is older than CVRF-CVE file.
skipping CVE-2009-0745 as CVE page is older than CVRF-CVE file.
skipping CVE-2009-0696 as CVE page is older than CVRF-CVE file.
skipping CVE-2009-0676 as CVE page is older than CVRF-CVE file.
skipping CVE-2009-0591 as CVE page is older than CVRF-CVE file.
skipping CVE-2009-0590 as CVE page is older than CVRF-CVE file.
No V5 entry found for CVE-2009-0539 / /home/securitybot/prod/cve-database/cvelistV5/cves/2009/0xxxx/CVE-2009-0539.json:No such file or directory
skipping CVE-2009-0342 as CVE page is older than CVRF-CVE file.
skipping CVE-2009-0322 as CVE page is older than CVRF-CVE file.
skipping CVE-2009-0269 as CVE page is older than CVRF-CVE file.
skipping CVE-2009-0217 as CVE page is older than CVRF-CVE file.
skipping CVE-2009-0179 as CVE page is older than CVRF-CVE file.
skipping CVE-2009-0065 as CVE page is older than CVRF-CVE file.
skipping CVE-2009-0040 as CVE page is older than CVRF-CVE file.
skipping CVE-2009-0029 as CVE page is older than CVRF-CVE file.
skipping CVE-2009-0025 as CVE page is older than CVRF-CVE file.
skipping CVE-2009-0024 as CVE page is older than CVRF-CVE file.
skipping CVE-2008-7247 as CVE page is older than CVRF-CVE file.
skipping CVE-2008-6123 as CVE page is older than CVRF-CVE file.
skipping CVE-2008-5702 as CVE page is older than CVRF-CVE file.
skipping CVE-2008-5700 as CVE page is older than CVRF-CVE file.
skipping CVE-2008-5351 as CVE page is older than CVRF-CVE file.
skipping CVE-2008-5300 as CVE page is older than CVRF-CVE file.
No V5 entry found for CVE-2008-5255 / /home/securitybot/prod/cve-database/cvelistV5/cves/2008/5xxxx/CVE-2008-5255.json:No such file or directory
No V5 entry found for CVE-2008-5254 / /home/securitybot/prod/cve-database/cvelistV5/cves/2008/5xxxx/CVE-2008-5254.json:No such file or directory
No V5 entry found for CVE-2008-5253 / /home/securitybot/prod/cve-database/cvelistV5/cves/2008/5xxxx/CVE-2008-5253.json:No such file or directory
No V5 entry found for CVE-2008-5251 / /home/securitybot/prod/cve-database/cvelistV5/cves/2008/5xxxx/CVE-2008-5251.json:No such file or directory
skipping CVE-2008-5182 as CVE page is older than CVRF-CVE file.
skipping CVE-2008-5138 as CVE page is older than CVRF-CVE file.
skipping CVE-2008-5079 as CVE page is older than CVRF-CVE file.
skipping CVE-2008-5077 as CVE page is older than CVRF-CVE file.
skipping CVE-2008-5033 as CVE page is older than CVRF-CVE file.
skipping CVE-2008-5029 as CVE page is older than CVRF-CVE file.
skipping CVE-2008-4864 as CVE page is older than CVRF-CVE file.
skipping CVE-2008-4824 as CVE page is older than CVRF-CVE file.
skipping CVE-2008-4554 as CVE page is older than CVRF-CVE file.
No V5 entry found for CVE-2008-4550 / /home/securitybot/prod/cve-database/cvelistV5/cves/2008/4xxxx/CVE-2008-4550.json:No such file or directory
skipping CVE-2008-4503 as CVE page is older than CVRF-CVE file.
skipping CVE-2008-4445 as CVE page is older than CVRF-CVE file.
skipping CVE-2008-4410 as CVE page is older than CVRF-CVE file.
skipping CVE-2008-4307 as CVE page is older than CVRF-CVE file.
skipping CVE-2008-4302 as CVE page is older than CVRF-CVE file.
skipping CVE-2008-4210 as CVE page is older than CVRF-CVE file.
skipping CVE-2008-4113 as CVE page is older than CVRF-CVE file.
skipping CVE-2008-3964 as CVE page is older than CVRF-CVE file.
skipping CVE-2008-3915 as CVE page is older than CVRF-CVE file.
skipping CVE-2008-3911 as CVE page is older than CVRF-CVE file.
skipping CVE-2008-3833 as CVE page is older than CVRF-CVE file.
skipping CVE-2008-3831 as CVE page is older than CVRF-CVE file.
skipping CVE-2008-3792 as CVE page is older than CVRF-CVE file.
skipping CVE-2008-3534 as CVE page is older than CVRF-CVE file.
skipping CVE-2008-3528 as CVE page is older than CVRF-CVE file.
skipping CVE-2008-3527 as CVE page is older than CVRF-CVE file.
skipping CVE-2008-3526 as CVE page is older than CVRF-CVE file.
skipping CVE-2008-3496 as CVE page is older than CVRF-CVE file.
skipping CVE-2008-3277 as CVE page is older than CVRF-CVE file.
skipping CVE-2008-3275 as CVE page is older than CVRF-CVE file.
skipping CVE-2008-3247 as CVE page is older than CVRF-CVE file.
skipping CVE-2008-3144 as CVE page is older than CVRF-CVE file.
skipping CVE-2008-3143 as CVE page is older than CVRF-CVE file.
skipping CVE-2008-3142 as CVE page is older than CVRF-CVE file.
skipping CVE-2008-3077 as CVE page is older than CVRF-CVE file.
skipping CVE-2008-2931 as CVE page is older than CVRF-CVE file.
skipping CVE-2008-2826 as CVE page is older than CVRF-CVE file.
skipping CVE-2008-2812 as CVE page is older than CVRF-CVE file.
skipping CVE-2008-2750 as CVE page is older than CVRF-CVE file.
skipping CVE-2008-2544 as CVE page is older than CVRF-CVE file.
no cpe found for SUSE Package Hub 15 SP5 in CVE-2008-2383
skipping CVE-2008-2365 as CVE page is older than CVRF-CVE file.
skipping CVE-2008-2358 as CVE page is older than CVRF-CVE file.
skipping CVE-2008-2316 as CVE page is older than CVRF-CVE file.
skipping CVE-2008-2315 as CVE page is older than CVRF-CVE file.
No V5 entry found for CVE-2008-2141 / /home/securitybot/prod/cve-database/cvelistV5/cves/2008/2xxxx/CVE-2008-2141.json:No such file or directory
skipping CVE-2008-2079 as CVE page is older than CVRF-CVE file.
skipping CVE-2008-1947 as CVE page is older than CVRF-CVE file.
skipping CVE-2008-1887 as CVE page is older than CVRF-CVE file.
skipping CVE-2008-1721 as CVE page is older than CVRF-CVE file.
skipping CVE-2008-1679 as CVE page is older than CVRF-CVE file.
skipping CVE-2008-1675 as CVE page is older than CVRF-CVE file.
skipping CVE-2008-1673 as CVE page is older than CVRF-CVE file.
skipping CVE-2008-1672 as CVE page is older than CVRF-CVE file.
skipping CVE-2008-1586 as CVE page is older than CVRF-CVE file.
No V5 entry found for CVE-2008-1424 / /home/securitybot/prod/cve-database/cvelistV5/cves/2008/1xxxx/CVE-2008-1424.json:No such file or directory
No V5 entry found for CVE-2008-1418 / /home/securitybot/prod/cve-database/cvelistV5/cves/2008/1xxxx/CVE-2008-1418.json:No such file or directory
skipping CVE-2008-1391 as CVE page is older than CVRF-CVE file.
skipping CVE-2008-1382 as CVE page is older than CVRF-CVE file.
skipping CVE-2008-1367 as CVE page is older than CVRF-CVE file.
skipping CVE-2008-1236 as CVE page is older than CVRF-CVE file.
skipping CVE-2008-1196 as CVE page is older than CVRF-CVE file.
skipping CVE-2008-1195 as CVE page is older than CVRF-CVE file.
skipping CVE-2008-1194 as CVE page is older than CVRF-CVE file.
skipping CVE-2008-1193 as CVE page is older than CVRF-CVE file.
skipping CVE-2008-1192 as CVE page is older than CVRF-CVE file.
skipping CVE-2008-1191 as CVE page is older than CVRF-CVE file.
skipping CVE-2008-1190 as CVE page is older than CVRF-CVE file.
skipping CVE-2008-1189 as CVE page is older than CVRF-CVE file.
skipping CVE-2008-1188 as CVE page is older than CVRF-CVE file.
skipping CVE-2008-1187 as CVE page is older than CVRF-CVE file.
no cpe found for SUSE Package Hub 15 SP3 in CVE-2008-1142
no cpe found for SUSE Package Hub 15 SP4 in CVE-2008-1142
skipping CVE-2008-0891 as CVE page is older than CVRF-CVE file.
skipping CVE-2008-0657 as CVE page is older than CVRF-CVE file.
No V5 entry found for CVE-2008-0637 / /home/securitybot/prod/cve-database/cvelistV5/cves/2008/0xxxx/CVE-2008-0637.json:No such file or directory
skipping CVE-2008-0352 as CVE page is older than CVRF-CVE file.
skipping CVE-2008-0010 as CVE page is older than CVRF-CVE file.
skipping CVE-2008-0009 as CVE page is older than CVRF-CVE file.
skipping CVE-2008-0007 as CVE page is older than CVRF-CVE file.
skipping CVE-2008-0001 as CVE page is older than CVRF-CVE file.
skipping CVE-2007-6762 as CVE page is older than CVRF-CVE file.
skipping CVE-2007-6720 as CVE page is older than CVRF-CVE file.
skipping CVE-2007-6716 as CVE page is older than CVRF-CVE file.
skipping CVE-2007-6304 as CVE page is older than CVRF-CVE file.
skipping CVE-2007-6303 as CVE page is older than CVRF-CVE file.
No V5 entry found for CVE-2007-6251 / /home/securitybot/prod/cve-database/cvelistV5/cves/2007/6xxxx/CVE-2007-6251.json:No such file or directory
skipping CVE-2007-6243 as CVE page is older than CVRF-CVE file.
skipping CVE-2007-6206 as CVE page is older than CVRF-CVE file.
skipping CVE-2007-6063 as CVE page is older than CVRF-CVE file.
skipping CVE-2007-5970 as CVE page is older than CVRF-CVE file.
skipping CVE-2007-5969 as CVE page is older than CVRF-CVE file.
skipping CVE-2007-5966 as CVE page is older than CVRF-CVE file.
skipping CVE-2007-5623 as CVE page is older than CVRF-CVE file.
skipping CVE-2007-5135 as CVE page is older than CVRF-CVE file.
skipping CVE-2007-4995 as CVE page is older than CVRF-CVE file.
skipping CVE-2007-4774 as CVE page is older than CVRF-CVE file.
skipping CVE-2007-4571 as CVE page is older than CVRF-CVE file.
skipping CVE-2007-4567 as CVE page is older than CVRF-CVE file.
skipping CVE-2007-4559 as CVE page is older than CVRF-CVE file.
skipping CVE-2007-4308 as CVE page is older than CVRF-CVE file.
skipping CVE-2007-4133 as CVE page is older than CVRF-CVE file.
skipping CVE-2007-3999 as CVE page is older than CVRF-CVE file.
skipping CVE-2007-3852 as CVE page is older than CVRF-CVE file.
skipping CVE-2007-3851 as CVE page is older than CVRF-CVE file.
skipping CVE-2007-3719 as CVE page is older than CVRF-CVE file.
skipping CVE-2007-3641 as CVE page is older than CVRF-CVE file.
skipping CVE-2007-3513 as CVE page is older than CVRF-CVE file.
skipping CVE-2007-3108 as CVE page is older than CVRF-CVE file.
skipping CVE-2007-3107 as CVE page is older than CVRF-CVE file.
skipping CVE-2007-3105 as CVE page is older than CVRF-CVE file.
skipping CVE-2007-3104 as CVE page is older than CVRF-CVE file.
skipping CVE-2007-3102 as CVE page is older than CVRF-CVE file.
skipping CVE-2007-2878 as CVE page is older than CVRF-CVE file.
skipping CVE-2007-2875 as CVE page is older than CVRF-CVE file.
skipping CVE-2007-2870 as CVE page is older than CVRF-CVE file.
skipping CVE-2007-2788 as CVE page is older than CVRF-CVE file.
skipping CVE-2007-2052 as CVE page is older than CVRF-CVE file.
skipping CVE-2007-1497 as CVE page is older than CVRF-CVE file.
skipping CVE-2007-1496 as CVE page is older than CVRF-CVE file.
skipping CVE-2007-0005 as CVE page is older than CVRF-CVE file.
skipping CVE-2006-20001 as CVE page is older than CVRF-CVE file.
skipping CVE-2006-7250 as CVE page is older than CVRF-CVE file.
skipping CVE-2006-7248 as CVE page is older than CVRF-CVE file.
skipping CVE-2006-7246 as CVE page is older than CVRF-CVE file.
skipping CVE-2006-6106 as CVE page is older than CVRF-CVE file.
skipping CVE-2006-5793 as CVE page is older than CVRF-CVE file.
skipping CVE-2006-5757 as CVE page is older than CVRF-CVE file.
skipping CVE-2006-5751 as CVE page is older than CVRF-CVE file.
skipping CVE-2006-5701 as CVE page is older than CVRF-CVE file.
skipping CVE-2006-5464 as CVE page is older than CVRF-CVE file.
skipping CVE-2006-5052 as CVE page is older than CVRF-CVE file.
skipping CVE-2006-5051 as CVE page is older than CVRF-CVE file.
skipping CVE-2006-4980 as CVE page is older than CVRF-CVE file.
skipping CVE-2006-4814 as CVE page is older than CVRF-CVE file.
skipping CVE-2006-4640 as CVE page is older than CVRF-CVE file.
skipping CVE-2006-4623 as CVE page is older than CVRF-CVE file.
skipping CVE-2006-4572 as CVE page is older than CVRF-CVE file.
skipping CVE-2006-4343 as CVE page is older than CVRF-CVE file.
skipping CVE-2006-4339 as CVE page is older than CVRF-CVE file.
skipping CVE-2006-4227 as CVE page is older than CVRF-CVE file.
skipping CVE-2006-4226 as CVE page is older than CVRF-CVE file.
skipping CVE-2006-3809 as CVE page is older than CVRF-CVE file.
skipping CVE-2006-3738 as CVE page is older than CVRF-CVE file.
skipping CVE-2006-3635 as CVE page is older than CVRF-CVE file.
skipping CVE-2006-2940 as CVE page is older than CVRF-CVE file.
skipping CVE-2006-2937 as CVE page is older than CVRF-CVE file.
No V5 entry found for CVE-2006-2628 / /home/securitybot/prod/cve-database/cvelistV5/cves/2006/2xxxx/CVE-2006-2628.json:No such file or directory
No V5 entry found for CVE-2006-2627 / /home/securitybot/prod/cve-database/cvelistV5/cves/2006/2xxxx/CVE-2006-2627.json:No such file or directory
No V5 entry found for CVE-2006-2626 / /home/securitybot/prod/cve-database/cvelistV5/cves/2006/2xxxx/CVE-2006-2626.json:No such file or directory
No V5 entry found for CVE-2006-2625 / /home/securitybot/prod/cve-database/cvelistV5/cves/2006/2xxxx/CVE-2006-2625.json:No such file or directory
No V5 entry found for CVE-2006-2624 / /home/securitybot/prod/cve-database/cvelistV5/cves/2006/2xxxx/CVE-2006-2624.json:No such file or directory
No V5 entry found for CVE-2006-2623 / /home/securitybot/prod/cve-database/cvelistV5/cves/2006/2xxxx/CVE-2006-2623.json:No such file or directory
No V5 entry found for CVE-2006-2622 / /home/securitybot/prod/cve-database/cvelistV5/cves/2006/2xxxx/CVE-2006-2622.json:No such file or directory
No V5 entry found for CVE-2006-2621 / /home/securitybot/prod/cve-database/cvelistV5/cves/2006/2xxxx/CVE-2006-2621.json:No such file or directory
No V5 entry found for CVE-2006-2620 / /home/securitybot/prod/cve-database/cvelistV5/cves/2006/2xxxx/CVE-2006-2620.json:No such file or directory
No V5 entry found for CVE-2006-2619 / /home/securitybot/prod/cve-database/cvelistV5/cves/2006/2xxxx/CVE-2006-2619.json:No such file or directory
skipping CVE-2006-0903 as CVE page is older than CVRF-CVE file.
skipping CVE-2005-4900 as CVE page is older than CVRF-CVE file.
skipping CVE-2005-4881 as CVE page is older than CVRF-CVE file.
skipping CVE-2005-3623 as CVE page is older than CVRF-CVE file.
skipping CVE-2005-2555 as CVE page is older than CVRF-CVE file.
skipping CVE-2005-2553 as CVE page is older than CVRF-CVE file.
skipping CVE-2005-2492 as CVE page is older than CVRF-CVE file.
skipping CVE-2005-2458 as CVE page is older than CVRF-CVE file.
skipping CVE-2005-2098 as CVE page is older than CVRF-CVE file.
skipping CVE-2005-1918 as CVE page is older than CVRF-CVE file.
skipping CVE-2005-1767 as CVE page is older than CVRF-CVE file.
skipping CVE-2005-1763 as CVE page is older than CVRF-CVE file.
skipping CVE-2005-1265 as CVE page is older than CVRF-CVE file.
skipping CVE-2005-1264 as CVE page is older than CVRF-CVE file.
skipping CVE-2005-0749 as CVE page is older than CVRF-CVE file.
No V5 entry found for CVE-2005-0717 / /home/securitybot/prod/cve-database/cvelistV5/cves/2005/0xxxx/CVE-2005-0717.json:No such file or directory
skipping CVE-2005-0400 as CVE page is older than CVRF-CVE file.
skipping CVE-2005-0210 as CVE page is older than CVRF-CVE file.
skipping CVE-2005-0102 as CVE page is older than CVRF-CVE file.
skipping CVE-2005-0068 as CVE page is older than CVRF-CVE file.
skipping CVE-2005-0067 as CVE page is older than CVRF-CVE file.
skipping CVE-2005-0066 as CVE page is older than CVRF-CVE file.
skipping CVE-2005-0065 as CVE page is older than CVRF-CVE file.
No V5 entry found for CVE-2004-1178 / /home/securitybot/prod/cve-database/cvelistV5/cves/2004/1xxxx/CVE-2004-1178.json:No such file or directory
skipping CVE-2004-1074 as CVE page is older than CVRF-CVE file.
skipping CVE-2004-1060 as CVE page is older than CVRF-CVE file.
skipping CVE-2004-0791 as CVE page is older than CVRF-CVE file.
skipping CVE-2004-0790 as CVE page is older than CVRF-CVE file.
skipping CVE-2004-0657 as CVE page is older than CVRF-CVE file.
skipping CVE-2004-0452 as CVE page is older than CVRF-CVE file.
skipping CVE-2004-0421 as CVE page is older than CVRF-CVE file.
no cpe found for SUSE Linux Enterprise Real Time 11 SP4 in CVE-2004-0230
skipping CVE-2003-1332 as CVE page is older than CVRF-CVE file.
skipping CVE-2003-0282 as CVE page is older than CVRF-CVE file.
skipping CVE-2003-0252 as CVE page is older than CVRF-CVE file.
No V5 entry found for CVE-2003-0250 / /home/securitybot/prod/cve-database/cvelistV5/cves/2003/0xxxx/CVE-2003-0250.json:No such file or directory
skipping CVE-2003-0028 as CVE page is older than CVRF-CVE file.
skipping CVE-2002-20001 as CVE page is older than CVRF-CVE file.
skipping CVE-2001-0851 as CVE page is older than CVRF-CVE file.
skipping CVE-2001-0405 as CVE page is older than CVRF-CVE file.
skipping CVE-2000-1254 as CVE page is older than CVRF-CVE file.
skipping CVE-1999-0524 as CVE page is older than CVRF-CVE file.
skipping CVE-1999-0517 as CVE page is older than CVRF-CVE file.
skipping CVE-1999-0077 as CVE page is older than CVRF-CVE file.
SUCCESS